Swedish Political Intelligence Platform โ democratic transparency, evidence-based analysis, and OSINT-powered accountability for the Riksdag, the Government, and Swedish public agencies.
๐ต๏ธ Political intelligence ยท ๐ Radical transparency ยท ๐ 50+ years of evidence ยท ๐ก๏ธ ISMS-aligned ยท โ๏ธ Independent & non-partisan
Strengthen Swedish democracy through systematic transparency.
The Citizen Intelligence Agency (CIA) is an independent, volunteer-driven, open-source-intelligence (OSINT) platform that puts rigorous, evidence-based political intelligence in the hands of every citizen, journalist, researcher, and policymaker. It monitors Sweden's Riksdag (Parliament), the Government (Regeringskansliet), and public agencies (Myndigheter) โ applying structured intelligence techniques (ACH, SWOT, MITRE ATT&CK, STRIDE, political-risk scoring) to the full open-data corpus going back to 1971.
We deliver:
- ๐ Financial performance metrics for politicians and government bodies
โ ๏ธ Risk assessment analytics โ 50 behavioral detection rules across politicians, parties, committees, ministries and decisions- ๐ Political trend analysis โ temporal, comparative, pattern-recognition, predictive, network and decision intelligence frameworks
- ๐ Politician scoreboards & rankings with multi-decade longitudinal coverage
- ๐ Performance comparisons โ party effectiveness, committee productivity, ministry oversight
- ๐ Transparency insights โ every metric traces back to a primary parliamentary source
The platform is strictly independent, non-partisan, and Apache 2.0 licensed, operated under the public Hack23 ISMS with full ISO 27001:2022 / NIST CSF 2.0 / CIS Controls v8.1 alignment. It does not collect end-user PII, does not run ads, and does not push narratives.
CIA is the canonical data backbone for Hack23's growing portfolio of democratic-transparency platforms. Each repository is independently auditable, ISMS-aligned, and cross-linked through open data products and the public ISMS.
| Project | Role | Stack | Status |
|---|---|---|---|
| ๐ต๏ธ Citizen Intelligence Agency (this repo) | Sweden โ full data backbone, 110 DB views, 50 risk rules, JSON export specifications | Java 26 / Spring / Vaadin / PostgreSQL 18 | |
| ๐ณ๏ธ Riksdagsmonitor ยท riksdagsmonitor.com | Sweden โ public news & dashboards, AI agentic newsroom (14 languages), consumes CIA exports nightly | TypeScript / Vite / Chart.js / D3 / GitHub Actions Agentic Workflows | |
| ๐๏ธ EU Parliament Monitor ยท euparliamentmonitor.com | European Parliament โ political intelligence, AI newsroom (14 languages) | TypeScript / Vite / GitHub Actions Agentic Workflows | |
| ๐ค European Parliament MCP Server | EP Open Data MCP server โ 60+ tools, OSINT analytics for AI agents | TypeScript / Model Context Protocol | |
| ๐ก๏ธ Hack23 ISMS-PUBLIC | The apex Information Security Management System โ 32+ public policies governing all repositories | Markdown / Mermaid / GitHub-native | โ |
| ๐ Hack23 Homepage ยท hack23.com | Corporate site, blog, agent biographies, feature showcase | TypeScript / Static | โ |
Data flow: CIA โ JSON export specs (
json-export-specs/) โ Riksdagsmonitor consumes viaupdate-cia-csv-data.ymlโ AI newsroom publishes daily articles in 14 languages, every claim traceable to adok_idin the CIA corpus.
Explore the comprehensive feature showcase on hack23.com:
- ๐ Interactive political dashboards (๐ฌ๐ง English ยท ๐ธ๐ช Svenska)
- ๐ Politician scoreboards and ranking systems
- ๐ 50 risk rules ยท 110 database views ยท 6 analytical frameworks
- ๐ Transparency metrics across 49 Maven modules (1,300+ Java files)
- โ๏ธ Accountability measures spanning Riksdag, Government, agencies
- ๐ฑ Data-driven insights backed by official Swedish open data
- ๐ต๏ธ Full OSINT pipeline โ Riksdagen API, Valmyndigheten, World Bank, ESV
- ๐ Defense-in-depth security, OpenSSF Scorecard 7.2/10, zero critical CVEs for 5+ years
For the conceptual model, see ARCHITECTURE.md and MINDMAP.md.
| Category | Count | Description |
|---|---|---|
| ๐ง Analysis Frameworks | 6 | Temporal ยท Comparative ยท Pattern Recognition ยท Predictive ยท Network ยท Decision Intelligence |
| 50 | 24 politician ยท 10 party ยท 4 committee ยท 4 ministry ยท 5 decision ยท 3 other | |
| ๐๏ธ Database Views | 110 | 77 regular + 33 materialized โ see DATABASE_VIEW_INTELLIGENCE_CATALOG.md |
| ๐ OSINT Data Sources | 4 | Riksdagen ยท Valmyndigheten ยท World Bank ยท ESV |
| ๐ฐ Intelligence Products | 10+ | Scorecards ยท Coalition analysis ยท Risk assessments ยท Trend reports ยท Decision tracking |
| ๐งฉ Maven Modules | 49+ | Multi-module, layered architecture |
| ๐ค Custom Copilot Agents | 6 | task-agent ยท stack-specialist ยท ui-enhancement-specialist ยท intelligence-operative ยท business-development-specialist ยท marketing-specialist |
| ๐ง Copilot Skills | 80+ | Security ยท Compliance ยท Testing ยท Architecture ยท Intelligence ยท UI/UX ยท Cloud (see .github/skills/) |
Coverage policy: per the Hack23 Secure Development Policy, we maintain โฅ 80 % line coverage and โฅ 70 % branch coverage across all modules. Live JaCoCo: hack23.github.io/cia/jacoco/.
CIA's analyses are powered exclusively by authoritative Swedish government and international open data:
| Source | Scope | Module |
|---|---|---|
| ๐๏ธ Swedish Parliament Open Data | Members, committees, motions, propositions, votes, documents | service.external.riksdagen |
| ๐ณ๏ธ Swedish Election Authority โ Valmyndigheten | Election results, voter turnout, electoral statistics | service.external.val |
| ๐ World Bank Open Data | Global economic, governance and demographic indicators | service.external.worldbank |
| ๐น Ekonomistyrningsverket โ ESV | Government finances, budget execution, agency spending | service.external.esv |
All data is processed under GDPR Art. 6(1)(e) (public interest) and Art. 9(2)(e)/(g) (manifestly made public / substantial public interest) for the political opinions of public officials. No end-user PII is collected.
Full system architecture (C4 Context / Container / Component / Dynamic views) lives in
ARCHITECTURE.md(v1.1, 2026-04-20).
| Document | Focus | Description |
|---|---|---|
| ๐๏ธ Architecture | C4 model | Current system structure |
| ๐ Data Model | Data | Database schema, entity relationships |
| ๐ Flowcharts | Process | Data processing workflows |
| ๐ State Diagrams | Behavior | System state transitions |
| ๐บ๏ธ Mindmaps | Concept | Component relationships |
| ๐ผ SWOT Analysis | Business | Strategic assessment |
| ๐ก๏ธ Security Architecture | Security | Defense-in-depth implementation |
| ๐ฏ Threat Model | Security | STRIDE / MITRE ATT&CK analysis |
| ๐ก๏ธ CRA Assessment | Compliance | EU Cyber Resilience Act conformity |
| ๐ ISMS Compliance Mapping | ISMS | 32 ISMS policies โ CIA controls |
| ๐ฐ Financial Security Plan | Cost | AWS security cost & ROI |
| ๐ Business Continuity Plan | Resilience | RTO / RPO targets |
| ๐ผ Business Product Document | Business | Data-product strategy |
| โ๏ธ CI/CD Workflows | DevOps | Automation processes |
| ๐งช Unit Test Plan | Testing | Strategy & coverage |
| ๐ E2E Test Plan | Testing | End-to-end testing |
| ๐ End-of-Life Strategy | Lifecycle | Maintenance and EOL planning |
| ๐ Documentation Naming Convention | Standards | Naming standards |
| Document | Focus |
|---|---|
| ๐ Future Architecture | Future C4 model |
| ๐ Future Data Model | Enhanced data architecture |
| ๐ Future Flowcharts | AI-driven workflows |
| ๐ Future State Diagrams | Adaptive transitions |
| ๐บ๏ธ Future Mindmaps | Capability evolution |
| ๐ผ Future SWOT | Strategic opportunities |
| ๐ก๏ธ Future Security Architecture | PQC / AI-augmented controls |
| ๐ฏ Future Threat Model | AI / PQC threat landscape |
| โ๏ธ Future Workflows | ML-enhanced CI/CD |
CIA's intelligence operations (INTOP) and OSINT capabilities are documented and version-controlled. Every framework, rule, and view has a public source of truth.
| Document | Focus | Description |
|---|---|---|
| ๐ Intelligence Evolution Changelog | Unified | Comprehensive tracking of intelligence capabilities, views, risk rules, frameworks |
| Document | Focus | Highlights |
|---|---|---|
| ๐ฏ Data Analysis โ INTOP / OSINT | Frameworks | 6 frameworks (Temporal, Comparative, Pattern, Predictive, Network, Decision) |
| ๐ด Risk Rules โ INTOP / OSINT | Rules | 50 behavioral detection rules across 6 categories |
| ๐๏ธ Database View Intelligence Catalog | Views | 110 views (77 regular + 33 materialized) |
| ๐ Data Quality Monitoring Dashboard | Quality | OSINT, DB-health, view-validation metrics |
| ๐บ๏ธ Intelligence Data Flow Map | Pipeline | Framework-to-view relationships |
| ๐๏ธ Liquibase Intelligence Analysis | Schema | Database schema evolution from intelligence perspective |
| โ๏ธ Drools Risk Rules | Engine | Drools rules engine documentation |
| Tool | Purpose | Location |
|---|---|---|
| Intelligence Changelog Generator | Auto-detection of view / rule / framework changes | generate-intelligence-changelog.sh |
| GitHub Actions Workflow | On-demand changelog generation | generate-intelligence-changelog.yml |
# Generate intelligence changelog from recent changes
.github/scripts/generate-intelligence-changelog.sh
# Compare specific commits
.github/scripts/generate-intelligence-changelog.sh <prev_commit> <current_commit>
|
|
Full controls in
SECURITY_ARCHITECTURE.mdยท threat analysis inTHREAT_MODEL.mdยท CRA conformity inCRA-ASSESSMENT.mdยท ISMS-PUBLIC โ CIA mapping inISMS_COMPLIANCE_MAPPING.md(32 policies, 100+ controls).
"Our commitment to transparency extends to our security practices โ demonstrating that true security comes from robust processes, continuous improvement, and a culture where security is integrated into every business decision."
โ James Pether Sรถrling, CISSP, CISM, CEO/Founder, Hack23 AB
|
Complete Information Security Management System |
The apex policy governing every Hack23 repository |
Classification (per Hack23 Classification Framework)
| Dimension | Level | Note |
|---|---|---|
| ๐ Confidentiality | ๐ข Public | Open civic-transparency platform; all source data intentionally disclosed |
| โ Integrity | ๐ High | Automated validation, GPG-signed commits, SLSA 3 build provenance, Javers auditing |
| โฑ๏ธ Availability | ๐ก Moderate | Multi-AZ AWS deployment with RDS Multi-AZ, ALB, automated patching |
| ๐ท๏ธ Privacy | ๐ Personal (public officials only) | GDPR Art. 6(1)(e/f) ยท Art. 9(2)(e)/(g); no end-user PII, no accounts forced, no ads, no tracking |
| โฑ๏ธ RTO / RPO | 1โ4 h / 1โ4 h | Automated backups, multi-region disaster recovery |
| ๐ฐ Business impact | ๐ข Negligible (financial) ยท ๐ High (reputational) ยท ๐ก Moderate (regulatory) | Open-source, volunteer-driven |
- โ ISO 27001:2022 โ Annex A controls implemented (see ISMS_COMPLIANCE_MAPPING.md)
- โ NIST CSF 2.0 โ 6 functions aligned (Govern ยท Identify ยท Protect ยท Detect ยท Respond ยท Recover)
- โ CIS Controls v8.1 โ implementation tracked
- โ GDPR โ public-interest / legitimate-interest grounds for public-official data; political opinions under Art. 9(2)(e)/(g)
- โ
EU Cyber Resilience Act (CRA) โ self-assessment in
CRA-ASSESSMENT.md - โ OpenSSF Best Practices โ Project #770
- โ AWS Well-Architected โ Security pillar aligned
- ๐ Authentication & authorization โ Spring Security 5.8.16, MFA, role-based access control, login blocking, Passay password policies
- ๐งฑ Network security โ AWS VPC with private subnets, NACLs, NAT Gateway, VPC Flow Logs, AWS WAF (OWASP rule set), VPC Endpoints
- ๐ Cryptography โ TLS 1.3 (HTTPS-only, HSTS), AES-256 encryption at rest (KMS-managed keys), Bouncy Castle 1.84
- ๐ Audit & integrity โ Javers data auditing, pgaudit, CloudTrail, immutable Git history, GPG-signed commits
- ๐ต๏ธ Threat detection โ AWS GuardDuty, Security Hub, CloudWatch alarms, CodeQL, OWASP Dependency-Check, ZAP DAST scans
- ๐ก๏ธ Supply chain security โ SHA-pinned actions, Dependabot, secret scanning, dependency review, SLSA 3 attestations, FOSSA license analysis
- ๐ค AI governance โ agent operations governed by Hack23 AI Policy (OWASP LLM + EU AI Act alignment)
| Evidence | Status | Link |
|---|---|---|
| ๐ OpenSSF Scorecard | 7.2 / 10 | scorecard.dev |
| ๐ก๏ธ CodeQL Scanning | โ Active | Security tab |
| ๐จ Dependabot | โ Active | Vulnerability alerts |
| ๐ Secret Scanning | โ Active | GitHub Advanced Security |
| ๐ SonarCloud Security | โ Active | Security hotspots |
| ๐ก๏ธ SLSA Provenance | Level 3 | Attestations |
| ๐ FOSSA License Compliance | โ Active | License report |
| ๐ CII Best Practices | โ Passing | Project #770 |
| ๐ก๏ธ Zero critical CVEs | โ 5+ years | Continuously verified |
| JDK Version | Status | Notes |
|---|---|---|
| Source Level (LTS) | Maven maven.compiler.source / target = 21 |
|
| Compatible (LTS) | Previous production runtime | |
| Current Runtime | Active production runtime |
| Component | Version | Purpose |
|---|---|---|
| Java JDK | 26 (Temurin) | Runtime โ Adoptium |
| Java Source | 21 | Source compatibility โ Maven compiler |
| Maven | 3.9.15+ | Build automation โ Maven |
| Node.js | 24+ | Copilot MCP servers, Playwright testing |
| PostgreSQL | 18 | Database with pgaudit, pgcrypto, pg_stat_statements |
For the canonical setup, see copilot-setup-steps.yml and End-of-Life-Strategy.md.
# Build the project (skipping tests)
mvn clean install -DskipTests
# Build with tests
mvn clean install
# Run only unit tests (skip integration & XML adapter tests)
mvn test -Dtest='!**ITest*,!**/XmlDateTypeAdapterTest,!**/XmlTimeTypeAdapterTest,!**/XmlDateTimeTypeAdapterTest'
# Tests with JaCoCo coverage
mvn clean test jacoco:report
# OWASP dependency-check
mvn dependency-check:check
# Run the main module
cd citizen-intelligence-agency
mvn spring-boot:run๐ก Database changes must follow
service.data.impl/README-SCHEMA-MAINTENANCE.md. Never manually editfull_schema.sqlโ always regenerate viapg_dump.
| Category | Technologies |
|---|---|
| Core Framework | Spring Framework 5.x |
| Security | Spring Security 5.8.16 ยท Bouncy Castle 1.84 ยท Passay 2.0.0 |
| Persistence | Hibernate ยท JPA / Jakarta ยท PostgreSQL 18 ยท Liquibase |
| Transactions | Narayana (XA / 2PC) integrated with Spring JpaTransactionManager |
| Auditing | Javers โ change tracking & versioning |
| Rules Engine | Drools โ 50 behavioral risk rules |
| Messaging | ActiveMQ Artemis ยท Spring JMS |
| Web / UI | Vaadin 8.14.4 ยท Vaadin Sass / Themes ยท Jetty 12.1.8 EE8 |
| Monitoring | JavaMelody ยท AWS SDK CloudWatch |
| Testing | JUnit ยท Mockito ยท Spring Test ยท Selenium WebDriver ยท Playwright |
| Utilities | Apache Commons ยท Google Guava ยท SLF4J ยท Logback ยท Jackson |
| Build | Apache Maven 3.9.15+ โ 49+ modules |
| CI / CD | GitHub Actions ยท SonarCloud ยท CodeQL ยท OWASP ZAP ยท Dependabot ยท Step Security Harden-Runner |
For the full stack and current versions, see techstack.yml and the per-module Maven sites at hack23.github.io/cia/.
CIA's reference deployment is provisioned via CloudFormation (cia-dist-cloudformation/) and follows the AWS Well-Architected Security Pillar.
| Layer | Service | Purpose |
|---|---|---|
| ๐ Networking | VPC ยท NAT Gateway ยท NACLs ยท VPC Endpoints ยท WAF ยท VPC Flow Logs | Isolated, segmented, web-attack-protected network |
| ๐ IAM & Crypto | IAM ยท KMS ยท ACM ยท Secrets Manager | Least privilege ยท key management ยท TLS ยท rotated secrets |
| ๐ DNS / SSL | Route 53 ยท ACM | Domain & certificate management |
| โ๏ธ Compute | EC2 ยท ALB | Stateless application tier |
| ๐พ Data | RDS PostgreSQL Multi-AZ ยท S3 (KMS-encrypted, lifecycle-policied) | Persistence + artifact storage |
| ๐ Observability | CloudWatch ยท CloudTrail ยท Config | Metrics ยท logs ยท audit ยท compliance drift |
| ๐ก๏ธ Threat Detection | GuardDuty ยท Security Hub | ML-based threat detection ยท centralized findings |
| ๐ Operations | Systems Manager ยท Resilience Hub | Automated patching ยท DR posture |
For full security-control mapping, see SECURITY_ARCHITECTURE.md and FinancialSecurityPlan.md.
- Download the CloudFormation template
- Create a stack in the AWS CloudFormation console
- Upload the template, configure parameters, acknowledge IAM, launch
- Access the application via the URL in the stack outputs
# 1. Add PostgreSQL PGDG repository (required for PostgreSQL 18 on Ubuntu 24.04)
sudo install -d /usr/share/postgresql-common/pgdg
sudo curl -o /usr/share/postgresql-common/pgdg/apt.postgresql.org.asc --fail https://www.postgresql.org/media/keys/ACCC4CF8.asc
echo "deb [signed-by=/usr/share/postgresql-common/pgdg/apt.postgresql.org.asc] https://apt.postgresql.org/pub/repos/apt $(lsb_release -cs)-pgdg main" | sudo tee /etc/apt/sources.list.d/pgdg.list
sudo apt-get update
# 2. Install prerequisites
sudo apt-get install openjdk-21-jdk postgresql-18 postgresql-contrib-18 postgresql-18-pgaudit postgresql-18-pgvector
# 3. Configure PostgreSQL (see "PostgreSQL 18 Configuration Guide" below)
# 4. Install the CIA Debian package
wget https://github.com/Hack23/cia/releases/download/2025.1.2/cia-dist-deb-2025.1.2.all.deb
sudo dpkg -i cia-dist-deb-2025.1.2.all.deb
# 5. Access at https://localhost:28443/cia/A reference configuration with SSL, prepared transactions, and the required extensions.
Edit /etc/postgresql/18/main/postgresql.conf:
max_prepared_transactions = 100
shared_preload_libraries = 'pg_stat_statements, pgaudit, pgcrypto'
pgaudit.log = ddl
pg_stat_statements.track = all
pg_stat_statements.max = 10000Edit /etc/postgresql/18/main/pg_hba.conf:
host all all ::1/128 md5# Generate passphrase, key and self-signed certificate (10-year validity)
openssl rand -base64 48 > passphrase.txt
openssl genrsa -des3 -passout file:passphrase.txt -out server.pass.key 2048
openssl rsa -passin file:passphrase.txt -in server.pass.key -out server.key && rm server.pass.key
openssl req -new -key server.key -out server.csr \
-subj "/C=UK/ST=Postgresqll/L=Docker/O=Hack23/OU=demo/CN=127.0.0.1"
openssl x509 -req -days 3650 -in server.csr -signkey server.key -out server.crt
rm passphrase.txt server.csrcp server.crt /var/lib/postgresql/18/main/server.crt
cp server.key /var/lib/postgresql/18/main/server.key && rm server.key
chmod 600 /var/lib/postgresql/18/main/server.key
chmod 644 /var/lib/postgresql/18/main/server.crt
chown -R postgres:postgres /var/lib/postgresql/18/main/
echo "ssl_cert_file = '/var/lib/postgresql/18/main/server.crt'" \
>> /etc/postgresql/18/main/postgresql.conf
echo "ssl_key_file = '/var/lib/postgresql/18/main/server.key'" \
>> /etc/postgresql/18/main/postgresql.confmkdir -p /opt/cia/.postgresql
cp server.crt /opt/cia/.postgresql/root.crt
chmod 700 /opt/cia/.postgresql/root.crt
chown -R cia:cia /opt/cia/.postgresql/root.crt
rm server.crtFor optimal performance with CIA's 110 views and 93 tables:
| Setting | 4 GB RAM | 8 GB RAM | 16 GB+ RAM (production) |
|---|---|---|---|
shared_buffers |
1 GB | 2 GB | 4 GB |
effective_cache_size |
3 GB | 6 GB | 12 GB |
maintenance_work_mem |
256 MB | 512 MB | 1 GB |
work_mem |
16 MB | 32 MB | 50 MB |
-- 8 GB RAM example โ adjust to your hardware
ALTER SYSTEM SET shared_buffers = '2GB';
ALTER SYSTEM SET effective_cache_size = '6GB';
ALTER SYSTEM SET maintenance_work_mem = '512MB';
ALTER SYSTEM SET work_mem = '32MB';
-- Checkpoints, WAL
ALTER SYSTEM SET checkpoint_completion_target = 0.9;
ALTER SYSTEM SET wal_buffers = '16MB';
ALTER SYSTEM SET max_wal_size = '4GB';
ALTER SYSTEM SET min_wal_size = '1GB';
-- SSD-optimised query planner
ALTER SYSTEM SET random_page_cost = 1.1;
ALTER SYSTEM SET effective_io_concurrency = 200;
-- Connections
ALTER SYSTEM SET max_connections = 200;
-- Apply
SELECT pg_reload_conf();๐ For full performance tuning, monitoring and advanced configuration, see
service.data.impl/README-SCHEMA-MAINTENANCE.md.
sudo su - postgres
psql
postgres=# CREATE USER eris WITH password 'discord';
postgres=# CREATE DATABASE cia_dev;
postgres=# GRANT ALL PRIVILEGES ON DATABASE cia_dev TO eris;
โ ๏ธ The credentials above are for local development only. Use custom credentials and update/opt/cia/webapps/cia/WEB-INF/database.propertiesfor any non-development deployment.
CIA uses GitHub Copilot custom agents and skills as first-class development assets, governed by the Hack23 AI Policy.
| Surface | Catalog | Count |
|---|---|---|
| ๐ค Custom agents | .github/agents/README.md |
6 |
| ๐ง Skills library | .github/skills/README.md |
80+ |
| โ๏ธ Workflows | .github/workflows/ |
13 |
| ๐ MCP servers | .github/copilot-mcp-config.json |
github ยท filesystem ยท memory ยท sequential-thinking ยท playwright |
| ๐ Setup contract | .github/workflows/copilot-setup-steps.yml |
Java 26 ยท Maven 3.9.15 ยท PostgreSQL 18 |
| Agent | Specialty |
|---|---|
| ๐ Task Agent | Product quality, GitHub issue management, ISMS compliance |
| ๐ ๏ธ Stack Specialist | Java 26 ยท Spring ยท Vaadin ยท Hibernate / JPA ยท PostgreSQL |
| ๐จ UI Enhancement Specialist | Vaadin ยท WCAG 2.1 AA ยท data visualization ยท privacy-by-design UI |
| ๐ต๏ธ Intelligence Operative | Political science ยท OSINT ยท structured analysis ยท Swedish politics |
| ๐ผ Business Development Specialist | Strategic planning ยท partnerships ยท sustainable revenue ยท market expansion |
| ๐ข Marketing Specialist | Digital marketing ยท content strategy ยท community building |
The skills library contains 80+ skills across security-by-design, ISMS compliance, testing, architecture, intelligence, UI/UX, cloud, and product management. Highlights:
- ๐ Security: secure-code-review ยท threat-modeling ยท secrets-management ยท input-validation ยท crypto-best-practices ยท cis-controls ยท iso-27001-controls ยท ai-governance ยท ci-cd-security
- โ Compliance: hack23-information-security-policy ยท hack23-isms-compliance ยท gdpr-compliance ยท compliance-frameworks ยท classification-framework-enforcement ยท open-source-policy
- ๐งช Testing: unit-testing-patterns ยท integration-testing ยท e2e-testing ยท playwright-ui-testing ยท testing-strategy-enforcement ยท code-quality-checks
- ๐๏ธ Architecture: hack23-future-architecture-standards ยท data-pipeline-engineering ยท api-integration ยท mcp-server-development ยท mcp-gateway-configuration ยท mcp-gateway-security
- ๐ต๏ธ Intelligence & OSINT: political-science-analysis ยท osint-methodologies ยท intelligence-analysis-techniques ยท swedish-political-system ยท electoral-analysis ยท legislative-monitoring ยท risk-assessment-frameworks ยท behavioral-analysis ยท strategic-communication-analysis ยท cia-data-integration ยท european-parliament-api
- ๐จ UI / UX: accessibility-wcag-patterns ยท advanced-data-visualization ยท data-visualization-principles ยท ui-ux-design-system ยท seo-best-practices
For the full taxonomy and agent โ skill matrix, see .github/skills/README.md and .github/agents/README.md.
System Architect Simon Moon provides deep architectural analysis of CIA through the lens of pattern recognition:
- ๐๏ธ CIA Architecture: The Five Pentacles โ Five container types crystallised from the parliamentary domain
- ๐ CIA Security: Defense Through Transparency โ Five defensive layers; OpenSSF Scorecard 7.2/10; zero critical CVEs over 5+ years
- ๐ CIA Future Security: The Pentagon of Tomorrow โ Post-quantum cryptography & AI-augmented detection
- ๐ฐ CIA Financial Strategy: $24.70/Day Democracy โ AWS-optimised cost architecture
- โ๏ธ CIA Workflows: Five-Stage CI/CD & State Machines โ DevSecOps automation
- ๐บ๏ธ CIA Mindmaps: Conceptual Sacred Geometry โ Hierarchical organisational patterns
Developer George Dorn provides hands-on code analysis based on actual repository inspection:
- ๐ CIA Code Analysis โ 49 modules, 1,300+ Java files, OpenSSF Scorecard 7.2/10
Full collection of 50+ blog posts on cybersecurity, ISMS policies and architectural patterns: Hack23 Security Blog.
See the descriptive Classification table above for confidentiality, integrity, availability, privacy and RTO/RPO levels with rationale. The formal badges below cover project type, Business Impact Analysis (BIA) and strategic position.
| Impact | Financial | Operational | Reputational | Regulatory |
|---|---|---|---|---|
| ๐ Confidentiality | ๐ข Negligible | ๐ข Negligible | ๐ข Low | ๐ข Low |
| โ Integrity | ๐ข Negligible | ๐ High | ๐ High | ๐ก Moderate |
| โฑ๏ธ Availability | ๐ข Negligible | ๐ High | ๐ข Low | ๐ข Low |
The complete Maven-generated project documentation is published at hack23.github.io/cia:
| Resource | Link |
|---|---|
| ๐ Project reports & module sites | Maven Site Home |
| ๐๏ธ Hibernate entity model (hbm2doc) | Entity Model |
| ๐ Javadoc API reference | Javadoc |
| ๐ฆ Visual package dependencies | Package graph |
| ๐งช JaCoCo test coverage | Coverage |
| ๐๏ธ Architecture overview | Architecture |
| ๐พ Liquibase database documentation | DB docs |
| Module | Description | Site |
|---|---|---|
| citizen-intelligence-agency | Main web application | link |
| service.data.impl | Data access & entity model | link |
| service.impl | Core service implementation | link |
| service.api | Service API definitions | link |
| service.external.riksdagen | Swedish Parliament integration | link |
| service.external.worldbank | World Bank integration | link |
| service.external.val | Swedish Election Authority | link |
| service.external.esv | ESV financial data | link |
| web-widgets | UI widget components | link |
Contributions welcome under Hack23's secure-development standards.
- Fork the repo and create a descriptive feature branch
- GPG-sign every commit ยท enable MFA on your GitHub account
- Run quality checks locally:
mvn clean install(must pass tests + SonarCloud quality gate) - Submit a pull request with a comprehensive description; address review feedback
- Sign the CLA
- Never introduce security vulnerabilities; follow
CONTRIBUTING.md,CODE_OF_CONDUCT.md, and the Hack23 Secure Development Policy
For coordinated vulnerability disclosure, follow SECURITY.md. The process aligns with the Hack23 Vulnerability Management Policy and the Incident Response Plan.
- ๐๏ธ Architecture ยท ๐ Future Architecture
- ๐ง Mindmap ยท ๐ Future Mindmap
- ๐ Data Model ยท ๐ Future Data Model
- ๐ Flowcharts ยท ๐ Future Flowcharts
- ๐ State Diagrams ยท ๐ Future State Diagrams
- ๐๏ธ Entity Model (hbm2doc) ยท ๐ Javadoc ยท ๐ฆ Package graph
- ๐ Maven Site ยท ๐ DeepWiki
- ๐ Security Architecture ยท ๐ Future Security Architecture
- ๐ฏ Threat Model ยท ๐ฎ Future Threat Model
- ๐ ISMS Compliance Mapping ยท ๐ฐ Financial Security Plan
- ๐ CRA Assessment ยท ๐ Security Policy ยท ๐ Business Continuity Plan
- โก Workflows ยท ๐ Future Workflows
- ๐ End-of-Life Strategy ยท ๐งช Unit Test Plan ยท ๐ E2E Test Plan
- ๐ค Contributing ยท ๐ Code of Conduct ยท ๐ Doc naming
- ๐ก๏ธ Information Security Policy (apex)
- ๐ ๏ธ Secure Development Policy
- ๐ท๏ธ Classification Framework
- ๐ฏ Threat Modeling
- ๐ Vulnerability Management
- ๐จ Incident Response Plan
- ๐ Network Security Policy
- ๐ Access Control Policy
- ๐ Cryptography Policy
- ๐พ Backup & Recovery Policy
- ๐ค AI Policy
- ๐ Secrets Management Policy
- ๐ฆ Open Source Policy
- ๐ Privacy Policy ยท ๐ก๏ธ Data Protection Policy
- ๐ Information Security Strategy ยท ๐ Security Metrics
Hack23 AB (Org.nr 559534-7807) โ Swedish cybersecurity & open-source-intelligence consultancy.
- ๐ Website: www.hack23.com ยท ๐ฐ Blog
- ๐ผ LinkedIn โ Hack23 AB
- ๐จโ๐ป Founder: James Pether Sรถrling, CISSP, CISM
- ๐ก๏ธ Public ISMS ยท ๐ต๏ธ Citizen Intelligence Agency ยท ๐ณ๏ธ Riksdagsmonitor ยท ๐๏ธ EU Parliament Monitor ยท ๐ค European Parliament MCP Server
Copyright ยฉ 2008โ2026 Hack23 AB (Org.nr 559534-7807). Licensed under the Apache License 2.0 โ see LICENSE.txt.
๐ Project Classification: see the Project Classification section above for the full BIA matrix and strategic position. Summary: Data Analytics Platform (OSINT) ยท Operations ยท Confidentiality ๐ข Public ยท Integrity ๐ High ยท Availability ๐ก Moderate ยท Aligned with ISO 27001:2022 ยท NIST CSF 2.0 ยท CIS Controls v8.1 ยท AWS Well-Architected.
๐ต๏ธ Empower citizens ยท ๐ Strengthen democratic accountability ยท ๐๏ธ Illuminate the political process
