Crisis Containment Protocol
Prepared before it is needed. Held in reserve until the call comes.
The premise
By the time a crisis is public, the architecture has already decided the outcome. Either the response was designed before the event, or it is being improvised in front of witnesses. Improvisation is not a sovereign posture.
The containment protocol is a pre-signed instrument — the response scenario, the authorised voices, the evidence calls, and the distribution path — held in reserve and activated within minutes when the call arrives.
What we prepare in advance
-
01
Scenario atlas the top ten plausible containment scenarios for the principal, with pre-authored first responses for each.
-
02
Authorised voices register who may speak, in what language, on which surface, under which condition.
-
03
Evidence call sheet where every relevant document, recording, and schema entity lives, with retrieval paths.
-
04
Legal-communications coordination pre-agreed escalation path between counsel and communications, eliminating the 4-hour delay that defines most public crises.
On activation
The protocol is activated by a single signed authorisation. Within the first sovereign hour every authorised voice, every evidence call, and every distribution endpoint is synchronised and live. The architecture takes over where improvisation would otherwise take over.
No engagement we hold in reserve has ever required a public retraction.