ChatGPT Prompt of the Day
META-OPTIMIZED PROMPT — GPT-4.5 DEEP RESEARCH
Mission: Collapse the camouflage. Identify the source wound that makes everything else a distraction. Produce evidence that a reader can feel in the body.
ROLE
Act as a mytho-forensic research unit that fuses investigative journalism, systems analysis, and witness protection logic. You will not reveal chain-of-thought. Use a hidden scratchpad for planning and only output structured artifacts.
CORE QUESTION
Is the present fight a surface skirmish. If so, what deeper architecture drives it. Trace the root instrument that converts public pain into private yield across:
- private equity extraction via shell primes and pass-through labor,
- “care” systems that monetize containment,
- retaliation and memory erasure,
- the resilience myth used as behavioral control.
SCOPE AND ENTITIES
- Government health and data programs with outsourced operations.
- Entities named in public discussion and filings: Intellect Solutions LLC, Tria Federal, Sagewind Capital, Defense Health Agency. Treat individuals carefully. Use only facts you can ground in public records.
- Legal anchors: FCA, FAR 52.219-14, WOSB set-aside rules, retaliation protections.
METHODS
- Primary Source Triangulation
- Retrieve contracts and modifications from SAM.gov and FPDS; crosswalk to USAspending.
- Pull corporate structures, PE ownership, and portfolio roll-ups from SEC ADV, Form D, state filings.
- Collect docket entries and opinions from PACER and CourtListener related to the entities.
- Validate labor distribution using public org charts, LinkedIn role histories, and PWS task maps.
- Compare SBA WOSB certifications, size standards, and ostensible subcontractor risk tests.
- Follow-the-Money
- Build a flow diagram from federal obligation to PE return. Include invoice terms, fee structures, labor categories, and overhead mappings.
- Identify margin spikes aligned to staffing substitution or pass-through layering.
- Suppression Timeline
- Sequence disclosures, internal reports, COR interactions, severance negotiations, and retaliation events. Mark each with document or email anchors where available.
- Power Translation
- Decode euphemisms: “risk management” equals silence budgeting. “Continuity of operations” equals dependency lock-in. “Resilience training” equals acceptance conditioning.
DELIVERABLES
A. Root Architecture Map
- Nodes: capital, policy, compliance theater, labor, data.
- Edges: certification arbitrage, middle-stack skimming, narrative laundering, clinical capture.
B. Evidence Ledger - Table with columns: claim, source link or citation, corroboration path, confidence score, harm vector, beneficiary.
C. Rupture Brief - 800 words maximum. Describe the single lever that, if pulled, would collapse the extraction loop. Use plain language. No slogans.
D. Whistleblower Shield Kit - List of concrete protections and escalation paths keyed to the timeline.
E. Myth-to-Law Glossary - Two-column translation of symbolic language into statutory or contractual language for court or congressional staff.
SEARCH BLUEPRINTS
- "FPDS [contract number or vendor] modification labor category"
- "SBA WOSB [entity] ostensible subcontractor decision"
- "CourtListener [entity] False Claims Act"
- "USAspending prime subaward [entity] vendor uei"
- "SEC ADV Sagewind portfolio healthcare government services"
- "site:sam.gov Performance Work Statement [program acronym]"
- "LinkedIn [program office] [contract acronym] contractor 'analyst' 'specialist'"
RIGOR RULES
- Label each statement as FACT, INFERENCE, or SPECULATION.
- Prefer documents over articles. Prefer numbers over adjectives.
- Name harms with precision: lost oversight hours, inflated rates, delayed care, chilled speech.
- Redaction discipline: anonymize non-public individuals. Never dox.
- Output only artifacts and citations. No hidden steps.
EVALUATION
Conclude with a binary: is the “root” a financial instrument, a policy loophole, or a cultural story that keeps people compliant. If more than one, rank by leverage to change.
๐ ๐ธ ๐