CCMM Applied Intelligence — Public Library

Intelligence Briefings.
Free to Download.

A dated, evidence-labelled record of the 2026 Iran conflict. Every claim sourced. Every probability auditable. Every assessment traceable to the evidence that produced it.

Verifiable Pre-Event Record
The CCMM methodology paper was submitted to SSRN on 7 March 2026, establishing a dated probabilistic baseline from the opening days of the conflict. All branch probabilities, scenario structures, and consequence pathways were documented before the major escalation events covered in this library. SSRN Abstract ID: 6364078 ↗
Revised edition now published on Zenodo (2 April 2026) — incorporating Day 28 live event verification, null model, and cross-domain application. Open access, CC BY 4.0. DOI: 10.5281/zenodo.19382186 ↗
CCMM Applied IntelligenceOperation Epic FuryAsia‑Pacific ConsequencesAustralia Domestic Exposure SSRN 6364078 ↗ Zenodo DOI ↗
Evidence labels used in all CCMM publications
[OF] Observed Fact Official statement or wire report, two or more independent outlets[CC] Corroborated Claim Credible outlet plus at least one independent corroborating source[RC] Reported Claim Single source or interested-party source only — treat with caution[AA] Analytical Assessment Analyst inference drawn from available evidence[MO] Model Output Bayesian posterior derived from CCMM framework — not a prediction
7
Reports published
28
Days covered
28 Feb – 28 Mar 2026
5
Evidence labels
OF · CC · RC · AA · MO
7+
Peer review passes
Week 3 Final Edition
CCMM Methodology

CCMM turns fragmented signals into structured consequence intelligence

The Conditional Consequence Mapping Methodology goes beyond descriptive reporting. It maps how evidence, escalation, infrastructure disruption, financial pressure, and regional responses interact across the same decision space — and assigns calibrated, auditable probabilities to the consequences that follow.

What makes CCMM different
Most analytical frameworks are applied after events are already understood. CCMM is built to operate prospectively — probabilities are assigned before outcomes are known, consequence branches are structured before events resolve, and the entire analytical record is dated and verifiable. The methodology paper was submitted to SSRN on 7 March 2026, from the opening days of the 2026 Iran conflict, establishing a baseline that cannot be constructed in hindsight. SSRN Abstract ID: 6364078 ↗

Why CCMM is different

CCMM is not a reporting model. It is a structured methodology for connecting events to downstream consequences across operational, economic, investigative, and strategic domains — applied prospectively, with every claim labelled at the point of writing.

Each brief documents not only what happened, but what the evidence supports, what remains unverified, and what the CCMM framework infers from that evidence base. Readers can distinguish verified facts from analytical assessments from model outputs — in every paragraph, across every publication.

Because probabilities are dated and tied to specific evidence, readers can audit every assessment: if the assigned probability was wrong, the evidence and reasoning that produced it remain on the record.

Core strengths

  • Prospective probability assignment Probabilities are set before outcomes resolve — not calibrated after the fact. Every [MO] output has a dated evidence basis.
  • Five-label evidence discipline Every claim is labelled [OF], [CC], [RC], [AA], or [MO] at the point of writing. Confidence tiers are never retrofitted.
  • Consequence pathway mapping Events are connected to follow-on effects across branches. Convergence across pathways drives probability updates.
  • Falsifiable by design Each assessment specifies the observable conditions that would confirm or disconfirm it. The framework does not produce unfalsifiable claims.

What [MO] Model Output means in practice

Every probability figure in a CCMM brief is a Bayesian posterior — a calibrated estimate updated as new evidence is incorporated, expressed as a range rather than a point value to reflect the limits of available information. The range reflects genuine analytical uncertainty, not imprecision. A rising probability signals that the evidence base has shifted toward that scenario; a falling probability signals the reverse. Because all [MO] outputs are dated, documented, and tied to the evidence that produced them, every assessment is auditable — and every error is recoverable, because the reasoning remains on the record.

Volume 1 — Available

Financial Crime & Fraud

The first published CCMM framework application. Evidence weighting, convergence scoring, prosecution pathway reasoning, and structured inference across complex financial crime environments.

View framework ↗
Volume 2 — Forthcoming

Homicide & Serious Crime

Extending the methodology into high-consequence investigative environments where signal correlation, pathway discipline, and evidence convergence are critical.

Volume 3 — Forthcoming

Digital Forensics & Organised Crime

Applying consequence logic to digital evidence interpretation, networked offending, and multi-actor investigative analysis.

Planned

Cybercrime

Mapping cyber-enabled offending, escalation pathways, and evidence convergence in digitally mediated offence environments.

Planned

Corruption

Structured consequence analysis for public-sector fraud, corruption indicators, and linked evidentiary behaviour.

Applied Use — Live

Intelligence Outputs

The applied intelligence library demonstrates how CCMM performs in real analytical publishing contexts — dated, evidence-labelled, and auditable.

Browse the archive ↗
Report Archive

Access the CCMM document archive

Archive documents are delivered through a controlled download handler rather than direct file links, keeping storage paths out of the page markup. Select a document to review its details, then download.

Request access

Download statistics by country

Aggregated country-level download figures, displayed to provide transparency on the reach and utility of CCMM publications. Figures assist GABEY Consulting Pty Ltd in monitoring the legitimate use of its published resources.

0Total downloads
Country Downloads Share
Reader Analysis

Ask a question. Get a CCMM response.

GABEY selects a small number of reader questions each cycle and publishes a short CCMM analysis as a response. All published responses carry full evidence-label discipline. Submission does not guarantee a response. Where a question involves organisational sensitivity, it is handled confidentially and privately.

Public Analysis

What do you want CCMM to analyse?

Submit a question about future events, geopolitical trajectories, sector risk, or consequence pathways. GABEY selects questions at its sole discretion. Selected responses are published as evidence-labelled CCMM analytical outputs and attributed to the question asked, not the individual who asked it.

  • 1 Submit your question via the GABEY contact form
  • 2 GABEY reviews submissions and selects a small number each cycle
  • 3 Selected responses are published here as CCMM analytical outputs
  • 4 You are notified by email if your question is selected
Submit a public question
Confidential Concern

Do you have an organisational concern?

If your question involves suspected fraud, internal misconduct, whistleblower concerns, or other operationally sensitive matters, submit it as a confidential concern. Your submission is handled privately by GABEY, is never entered into the public queue, and is never published without your explicit written consent.

  • 1 Select "Reader Analysis — Confidential Concern" on the contact form
  • 2 GABEY reviews your submission privately within 2 business days
  • 3 GABEY contacts you directly to assess scope and sensitivity
  • 4 If engagement proceeds, it is treated as a business relationship
Submit a confidential concern

GABEY selects at sole discretion

Submission does not guarantee a response or publication. Most questions will not be selected. Submission creates no obligation on GABEY.

All published responses are CCMM-labelled

Every published response carries full evidence-label discipline — [OF], [CC], [RC], [AA], [MO] — and is framed as analysis, not advice.

Confidential submissions are never published

Questions submitted as confidential concerns are permanently excluded from the public queue and require your explicit written consent before any disclosure.

Published Reader Responses

Inaugural cycle pending

First responses coming soon

GABEY is reviewing the inaugural batch of reader submissions. Selected responses will be published here as evidence-labelled CCMM analytical outputs.

Privacy notice. When you submit a question, GABEY Consulting Pty Ltd collects your name, email address, and question text for the purpose of reviewing and potentially responding to your submission. This information is handled in accordance with the GABEY Privacy Policy and the Australian Privacy Act 1988. Confidential submissions are stored and accessed only by authorised GABEY personnel. Public submissions may be published in edited or summarised form; your personal details are never published. You may withdraw your submission at any time prior to publication by contacting GABEY directly.