JIL Sovereign Technologies, Inc. Platform Spec - JIL-CREB-001 - Rev 2026.05
Platform - Court Ready Evidence Bundle

What's inside a Court Ready Evidence Bundle?

A CREB is the standardized, versioned, court-ready evidence package that JIL Sovereign produces from deterministic rule execution, source evidence, chain-of-custody records, and human-reviewed findings. This page is the full specification - 19 folders, 16 states, every exhibit ID prefix, every PDF/A-2b conformance claim, every disclaimer. It is written for the MCO compliance lead, the payer's outside counsel, the regulator, and the Federal judge who needs to understand what is in front of them.

14-of-20
BFT Validator Quorum
Dilithium-III
Post-Quantum (NIST FIPS 204)
84
Patent Claims (Filed)
13+
Jurisdictions
230
Active Deterministic Checks
19
Folders per package
16
Case lifecycle states
PDF/A-2b
Long-term archival
SHA-256
Per-exhibit hash manifest
22
Vertical programs supported
FRE 902(14)
Self-authentication target

Section 01 The 30-second version

A Court Ready Evidence Bundle (CREB) is a versioned, sealed, deterministically-built evidence package. It contains every artifact a reviewer needs to evaluate a fraud, denial, billing, payment, or program-integrity matter without having to re-derive any conclusion. The package is produced from a set of deterministic rules executed against immutable source records, packaged in a 19-folder directory standard with Bates-numbered exhibits, SHA-256 hash manifests, chain-of-custody logs, AVA operational notes, and a Dilithium-III post-quantum-signed manifest anchored to CourtChain.

One-line definition
"A CREB is a deterministic evidentiary packaging artifact - not an AI accusation - that a Federal judge, an MCO general counsel, and a state Medicaid program-integrity director can all read from the same copy and reach the same factual conclusions."

Section 02 The 19-folder package layout

Every CREB lives at a versioned root directory of the form CREB-YYYY-CASEID-V###/. Inside that root are exactly nineteen numbered folders, in the order below. The ordering is intentional - it is the order in which a reviewer reads the package. Case admin first, executive summary second, narrative third, findings fourth, rule execution fifth, then evidence, then chain of custody, then financial trace, then parties, then timeline, then communications, then citations, then privilege, then hash manifest, then AVA operational notes, then delta, then counsel acknowledgement, then archive.

Reviewers, opposing counsel, and admissibility experts know this layout. It does not change between matters, customers, or verticals. A claims-fraud CREB built for an MCO and a grant-fraud CREB built for a foundation share the exact same directory shape. The contents differ; the structure does not.

Folder What is inside File formats Who reads it
00_CASE_ADMIN/ CASE_MANIFEST.json, CASE_SUMMARY.pdf, CASE_STATUS_HISTORY.csv, CLIENT_INFO.json, CLASSIFICATION_LABEL.txt (L1/L2/L3/L4), RETENTION_POLICY.txt. JSON, PDF/A-2b, CSV, TXT Reviewing counsel; package custodian; archival operator
01_EXECUTIVE_SUMMARY/ Matter summary, parties, amount-at-issue, key findings, key evidence, current submission status, requested action, mandatory disclaimers. Designed to be read first and read alone. PDF/A-2b (canonical), DOCX (optional) Decision-maker, board, attorney general, IG, MCO general counsel
02_NARRATIVE/ Neutral, chronological factual narrative. Every assertion references an exhibit ID. No accusations, no AI-authored conclusions, no opinion. The narrative is what survives cross-examination. PDF/A-2b, DOCX (optional) Trial team, prosecutor, regulator, judge
03_FINDINGS/ FINDINGS_REPORT.pdf, FINDINGS_INDEX.xlsx, FINDINGS_INDEX.csv. Each finding records: finding_id, rule_match_ids, rule_versions, evidence_ids, amount_at_issue, human review status, CREB inclusion status, reviewer_id, reviewed_at, review_notes. PDF/A-2b, XLSX, CSV Investigator, compliance lead, expert witness
04_RULE_EXECUTION_REPORT/ RULE_EXECUTION_REPORT.pdf, RULE_EXECUTION_RESULTS.csv, RULESET_MANIFEST.json, RULE_VERSION_HISTORY.csv. Records every (rule_id, rule_version, input_hash, output_hash, started_at, completed_at, execution_status) tuple. PDF/A-2b, CSV, JSON Forensic technologist, defense expert, admissibility witness
05_EVIDENCE_INDEX/ The master cross-reference. Maps every exhibit ID, Bates range, SHA-256 hash, custodian, acquisition timestamp, privilege flag, confidentiality flag, related rule IDs, and related finding IDs. XLSX, CSV, PDF/A-2b Every reviewer; the index is the entry point
06_EVIDENCE/ Native originals and rendered exhibits. Two sub-trees: 06_EVIDENCE/native/ stores immutable originals (EX-000001_claim_batch_original.csv, EML-000003_email_original.eml); 06_EVIDENCE/rendered/ stores court-readable PDFs (EX-000001_RENDERED.pdf). Native formats + PDF/A-2b renders Trier of fact; opposing counsel during discovery
07_CHAIN_OF_CUSTODY/ CHAIN_OF_CUSTODY_REPORT.pdf, CHAIN_OF_CUSTODY_LOG.csv, ACCESS_LOG.csv, TRANSFER_LOG.csv. Records custodian, privilege_status, chain_status, and every read/write/export event. PDF/A-2b, CSV Admissibility witness; forensic auditor; FRE 902(14) challenger
08_FINANCIAL_TRACE/ FINANCIAL_TRACE_REPORT.pdf, FINANCIAL_TRACE.xlsx, AMOUNT_AT_ISSUE_CALCULATION.xlsx, PAYMENT_FLOW_DIAGRAM.pdf. Every dollar followed from source to destination with payment record exhibit IDs. PDF/A-2b, XLSX Forensic accountant; restitution calculator; IG
09_PARTIES/ PARTIES_MATRIX.xlsx, WITNESS_MATRIX.pdf, AFFIDAVITS/. Provider, member, payer, vendor, beneficial owner. Includes affidavit metadata where signed declarations exist. PDF/A-2b, XLSX Investigator; counsel preparing testimony
10_TIMELINE/ TIMELINE.xlsx, TIMELINE.pdf. Every event: event_id, ISO 8601 UTC timestamp, neutral factual event, actors, evidence_ids, finding_ids, rule_ids, dollar amount where applicable. PDF/A-2b, XLSX Opening statement preparer; expert witness
11_COMMUNICATIONS/ Email headers (EMAIL_HEADER_REPORT.pdf), source system metadata, IM exports, call logs. EML- prefixed exhibits live here in addition to 06_EVIDENCE/. PDF/A-2b, EML, CSV Discovery counsel; intent-element analyst
12_REGULATORY_CITATIONS/ CITATIONS.pdf, CITATIONS_INDEX.csv. Source rule citation for every rule that fired - CMS regulation, HHS OIG advisory, state Medicaid plan amendment, anti-kickback safe harbor reference, False Claims Act citation, contract clause reference, MCO policy section. PDF/A-2b, CSV Regulator; outside counsel; expert
13_PRIVILEGE_LOG/ PRIVILEGE_LOG.xlsx, PRIVILEGE_LOG.pdf. Every withheld or partially-redacted item with privilege_status (attorney_client, work_product, medical_record, pii_protected) and the basis for withholding. PDF/A-2b, XLSX Producing counsel; receiving counsel; magistrate
14_HASH_MANIFEST/ HASH_MANIFEST_SHA256.txt, HASH_MANIFEST_SHA256.csv, PACKAGE_HASH.txt, HASH_VERIFICATION_INSTRUCTIONS.txt. Every byte hashed; the whole package hashed; instructions for an external verifier. TXT, CSV, PDF/A-2b Forensic verifier; opposing expert; auditor
15_AVA_OPERATIONAL_LOG/ AVA_GAP_ANALYSIS.pdf, AVA_PRIORITY_QUEUE.csv, AVA_RECOMMENDATION_LOG.jsonl. Every AVA call: model_version, prompt_template_version, input_context_ids, output_hash, accepted_by_user, user_action_taken. Operational only. Not evidence. PDF/A-2b, CSV, JSONL Internal QA; external auditor; not the trier of fact
16_DELTA_REPORT/ Only present from V002 onward. DELTA_REPORT.pdf: prior_package_id, current_package_id, added evidence count, added findings count, updated amount-at-issue, new rule matches, removed items (with reason), submission rationale. PDF/A-2b Recipient evaluating resubmission
17_COUNSEL_ACKNOWLEDGEMENT/ COUNSEL_ACKNOWLEDGEMENT.pdf - signed acknowledgement by the package's reviewing counsel that human review checkpoints were completed before submission. Signed via the platform's two-party e-signature workflow. PDF/A-2b Recipient; the producing party's E&O carrier
18_ARCHIVE/ Superseded prior versions. CREB-2026-000145-V001.zip, CREB-2026-000145-V001.zip.sha256, prior counsel acknowledgements, prior delta reports. Read-only. ZIP, TXT, PDF/A-2b Auditor reviewing version history

A note on the directory ordering

The numbering is part of the design. 00_ through 18_ is not decorative - it controls the order in which the package is read by every operating system's default sort, and by every legal review tool that ingests evidence by directory order. It is also the order in which the JIL creb-builder service writes the package on disk; the build process is deterministic and idempotent against the same case state.

Reviewer entry point
Counsel new to a CREB should open 01_EXECUTIVE_SUMMARY/EXECUTIVE_SUMMARY.pdf first, then 05_EVIDENCE_INDEX/EVIDENCE_INDEX.xlsx as the navigation manifest, then drill into individual exhibits in 06_EVIDENCE/ as needed. 04_RULE_EXECUTION_REPORT/ is the technical reproducibility proof and should be reviewed by the admissibility expert. 07_CHAIN_OF_CUSTODY/ and 14_HASH_MANIFEST/ together establish the FRE 902(14) self-authentication path.

Section 03 The 16-state case lifecycle

A case in the JIL CREB platform moves through sixteen defined lifecycle states. Each transition is governed by a state-machine; only valid transitions are allowed; every transition writes an audit event. The lifecycle covers the entire continuous evidence reinforcement loop - intake, triage, investigation, evidence collection, rule execution, finding proposal, finding review, package build, quality check, counsel review, submission, response receipt, resubmission, and archive.

STATE 01
Draft
Case shell exists. case_id assigned (CREB-YYYY-######). Owner set. No evidence yet. Trigger to next: first evidence upload.
STATE 02
Intake
Source feeds connected; bulk upload in progress. Each file hashed (SHA-256) at intake, immutable original stored, intake audit event written.
STATE 03
Triaged
Classification (L1/L2/L3/L4) assigned. Matter type set (claims fraud, denial pattern, kickback, billing, contract). AVA may recommend priority - human confirms.
STATE 04
Investigation
Active human review of source records. Custodian assignments confirmed. Privilege flags asserted on candidate items. Witness list built in 09_PARTIES/.
STATE 05
Evidence_Collected
Evidence intake substantially complete for the current cycle. 06_EVIDENCE/ populated. Evidence index draft generated. Chain of custody is intact for every item.
STATE 06
Rules_Run
Deterministic ruleset executed. Each execution writes (execution_id, ruleset_id, rule_version, input_hash, output_hash, started_at, completed_at, executed_by, execution_status).
STATE 07
Findings_Proposed
Rule matches grouped into findings by the findings engine. AVA may recommend grouping; deterministic engine creates the records. Each finding is candidate until reviewed.
STATE 08
Findings_Reviewed
Human reviewer validates, rejects, or marks needs_more_evidence for each candidate. Reviewer ID, timestamp, and notes recorded. Audit event written per finding.
STATE 09
Package_Built
CREB generator produces the 19-folder directory. Bates numbers assigned. 14_HASH_MANIFEST/ computed. Package SHA-256 computed. Manifest signed with Dilithium-III.
STATE 10
Quality_Check
Automated QC verifies: every finding -> rule_match; every rule_match -> evidence; every evidence -> hash; every PDF is PDF/A-2b conformant; every page Bates-numbered.
STATE 11
Counsel_Reviewed
Reviewing counsel opens the sealed package, validates the executive summary and narrative, and signs 17_COUNSEL_ACKNOWLEDGEMENT/ via two-party e-signature.
STATE 12
Submitted
Package delivered to the recipient_entity over the chosen recipient_channel (email, SFTP, portal_upload, mail, API). delivery_reference captured. CourtChain attestation anchored.
STATE 13
Response_Received
Recipient response captured: acknowledged, accepted, rejected, more_evidence_requested, or no_action. Response document attached.
STATE 14
Resubmission_Queued
New evidence has arrived, a new rule version triggers, the amount-at-issue has shifted, or the recipient requested more support. The continuous loop engine queues the case for V_n+1.
STATE 15
Resubmitted
V_n+1 has been built, counsel-reviewed, submitted. Prior version moved to 18_ARCHIVE/. Delta report (16_DELTA_REPORT/) accompanies the new version.
STATE 16
Archived
Case closed. Retention clock runs from this transition. Legal hold (if any) overrides retention. Final hash sealed to CourtChain. Package read-only.

Transition rules

Section 04 Bates numbering & exhibit IDs

Two parallel numbering schemes operate inside every CREB. Bates numbers identify pages of rendered exhibits; exhibit IDs identify logical pieces of evidence (a claim row, an email thread, a denial notice). The two schemes are cross-referenced in 05_EVIDENCE_INDEX/EVIDENCE_INDEX.xlsx.

Bates numbering

Every rendered page in 06_EVIDENCE/rendered/ is stamped with a sequential Bates number in the footer. The format is fixed:

CREB-000001
CREB-000002
CREB-000003
...
CREB-000382

Rules:

Exhibit ID prefixes

Exhibit IDs use a typed prefix so a reader can identify the evidence category at a glance. The prefix taxonomy is fixed across the platform.

Prefix Category Where used / example
EX- General evidence Used when no more specific prefix applies. EX-000001_claim_batch_original.csv.
EML- Email / communication EML-000003_email_original.eml. Header metadata extracted into 11_COMMUNICATIONS/EMAIL_HEADER_REPORT.pdf.
CLM- Claim record Individual adjudicated or denied claim. CLM-000145_837P_PRO_CLAIM_20260512.json.
DEN- Denial record Denial notice or denial reason code occurrence. DEN-000145_DENIAL_RECORD_UNSUPPORTED_CODE_20260518.csv.
PAY- Payment record EFT, 835, paper-check imaging. PAY-000099_835_EOB_20260512.json.
FIN- Financial evidence Ledger extracts, bank statements, escrow records. FIN-000201_BANK_STMT_20260430.pdf.
LOG- System log SIEM extracts, application logs, access logs. LOG-000044_SIEM_AUTH_20260518.json.
AFF- Affidavit Signed declarations under penalty of perjury. AFF-000001_RN_DECL_J_SMITH_20260514.pdf.
IMG- Image / scan Scanned forms; with OCR layer. IMG-000022_INTAKE_FORM_SCAN_20260301.pdf.
AUD- Audio Recorded calls (where lawful). AUD-000007_PRIOR_AUTH_CALL_20260205.wav.
VID- Video Recorded video evidence. VID-000001_FRONT_DESK_CAM_20260112.mp4.

Naming convention

Native files inside 06_EVIDENCE/native/ follow the canonical naming pattern:

[EXHIBIT_ID]_[TYPE]_[SHORT_DESCRIPTION]_[DATEUTC].[ext]

Examples:
  DEN-000145_DENIAL_RECORD_UNSUPPORTED_CODE_20260518.csv
  EML-000003_EMAIL_PRIOR_AUTH_THREAD_20260201.eml
  PAY-000099_PAYMENT_835_EOB_PROVIDER_FOO_20260512.json
Why typed prefixes
A reviewer can scan the evidence index column "Exhibit ID" and immediately answer the question "how much of this case is claim records vs. how much is communications vs. how much is financial trace" without opening a single file. The taxonomy is also how the deterministic rule engine cross-references inputs - a rule tagged inputs: [claim_record, denial_record] only consumes CLM- and DEN- exhibits.

Section 05 The deterministic rule engine

The deterministic rule engine is the evidentiary core of CREB. Every material finding in a CREB is produced by this engine, and only by this engine. AVA may recommend which rules to run, prioritize matches for review, or flag missing inputs - AVA does not produce findings. The engine is explicit, versioned, source-referenced, testable, reproducible, audit-logged, effective-dated, human-readable, and machine-executable, by design.

Rule structure (canonical schema)

{
  "rule_id": "MCO-DENIAL-001",
  "rule_key": "unsupported_denial_after_approved_auth",
  "semver": "1.2.0",
  "rule_source": "MCO Provider Manual sec. 4.2.3; CMS 42 CFR 438.404",
  "effective_date": "2026-01-01",
  "expiration_date": null,
  "logic_type": "deterministic",
  "inputs": ["claim_record", "authorization_record", "denial_record"],
  "conditions": [
    { "field": "authorization_status", "operator": "=", "value": "approved" },
    { "field": "denial_reason_code", "operator": "IN", "value": ["X123", "X456"] },
    { "field": "claim_amount", "operator": ">", "value": "$0.00" }
  ],
  "output": "rule_match",
  "severity": "high",
  "active": true
}

Reproducibility - input_hash and output_hash

Every execution writes a row to the rule_execution table with both an input hash and an output hash. The input hash is computed over the canonicalized JSON-serialized input batch manifest (every input record's SHA-256, in deterministic order, concatenated and re-hashed). The output hash is computed over the JSON-serialized rule_match output set, again in deterministic order.

A second reviewer with a copy of the package, the rule definition at the same semver, and the cited source data can re-run the rule and verify that the recomputed output_hash matches what is stored in the package's 04_RULE_EXECUTION_REPORT/. That is the property that makes CREB findings reproducible at the byte level, and it is the property that distinguishes a CREB from a generative-AI-authored memo.

No silent edits - new (rule_key, semver) rows

Rule definitions are append-only. If the policy team needs to change MCO-DENIAL-001 logic, they do not edit the existing row. They insert a new row with the same rule_key and a new semver (e.g., 1.2.0 -> 1.2.1 for a patch, 1.2.0 -> 1.3.0 for a non-breaking enhancement, 1.2.0 -> 2.0.0 for a breaking change). Prior executions remain pinned to the version that was effective on their claim date.

Effective-date evaluation

The engine evaluates rules against the version that was effective on the event_date of the record being checked, not the version that is effective on the run date. A claim dated 2026-03-01 is evaluated against rule version 1.2.0 if 1.2.0 covers 2026-01-01 through 2026-06-30, even if 1.3.0 took effect on 2026-07-01 before the analyst ran the rule.

Test harness - five required test classes

Every rule definition must have a passing test set covering five classes:

Class Purpose Example
Positive match A record set that must trigger the rule An approved authorization + a subsequent denial coded X123 + claim_amount $1,200.
Negative non-match A record set that must not trigger The denial is coded Y999 instead of X123 - rule must not fire.
Boundary Edge of numeric / date thresholds claim_amount exactly $0.00 (must not fire because > $0.00).
Missing data One required input absent No authorization record at all - rule must report missing_input, not fire.
Effective date Pre- or post-window event claim_date 2025-12-29 - rule version 1.2.0 (effective 2026-01-01) must not fire.

Rule match vs. finding - the distinction

Rule Match (technical event)
A row in rule_match

Generated automatically by the engine when a rule's conditions are satisfied against a specific source record. Carries match_id, rule_id, rule_version, case_id, source_record_id, evidence_ids, triggered_at, match_result JSON, amount_at_issue, status. Not yet a finding.

Finding (reviewable assertion)
A row in finding

Created when a human reviewer (or a system rule) groups one or more rule matches into an evidentiary assertion. Carries finding_id, finding_title, neutral factual finding_summary, rule_match_ids, evidence_ids, entities, amount_at_issue, reviewer_id, reviewed_at, review_notes, and CREB inclusion status.

Deterministic evidence statement
"All material evidentiary findings in this CREB were generated from deterministic, traceable, reproducible rule execution against identified source records. AI-assisted systems, including AVA, were used only for operational orchestration, prioritization, gap analysis, and workflow support unless expressly identified otherwise."

Section 06 Hash manifest & SHA-256 chain of custody

Every byte that enters the CREB platform is hashed. Every access to that byte is logged. Every audit event is hash-chained to the prior event. The result is a tamper-evident package that an external verifier can validate without holding any JIL secret - the whole verification path is open SHA-256.

Per-exhibit hashing at intake

  1. A file arrives via upload, SFTP, S3 event, or scheduled ingest job.
  2. The intake worker reads the bytes, computes sha256_hash (and optionally sha512_hash for Tier-3 matters), stores the hash on the evidence_item row.
  3. The original file is written to the immutable vault with immutable_original = true.
  4. An intake audit event is appended to the audit log with event_type = "upload", actor_id, case_id, object_type = "evidence", object_id = evidence_id, details = { sha256, original_filename, file_size_bytes }.
  5. Chain of custody log gets a row: custodian = uploader, chain_status = "intake".

Per-access logging

Every read of an evidence item writes an access_log row: actor_id, evidence_id, action (read|render|export), timestamp_utc, source_ip, purpose_code. A reviewer cannot view an exhibit without leaving a footprint. The access log is exported into 07_CHAIN_OF_CUSTODY/ACCESS_LOG.csv at package build time.

Hash-chained audit log

The audit log itself is hash-chained. Each audit event carries a prior_hash (the event_hash of the immediately preceding event for the same case) and an event_hash over its own canonicalized JSON. Tampering with one event invalidates every subsequent event in the chain.

// audit_event row at rest
{
  "audit_id":        "AUD-2026-000145-00482",
  "event_type":      "generate_package",
  "actor_id":        "svc:creb-builder@2026-05-18T03:14:22Z",
  "case_id":         "CREB-2026-000145",
  "object_type":     "creb_package",
  "object_id":       "CREB-2026-000145-V002",
  "event_timestamp": "2026-05-18T03:14:22.451Z",
  "details":         { /* event-specific fields */ },
  "prior_hash":      "e7a4...c819",
  "event_hash":      "f2b1...9d04"
}

Package-level hash

When the builder finishes writing all 19 folders, it computes a package_sha256 over the canonicalized concatenation of every file's hash in stable path order. That single 64-character hex string is recorded in 14_HASH_MANIFEST/PACKAGE_HASH.txt, written into CASE_MANIFEST.json, signed with Dilithium-III, anchored to CourtChain, and printed in the footer of the executive summary. A reviewer can take just that one value and verify the entire package.

External verification workflow

The 14_HASH_MANIFEST/HASH_VERIFICATION_INSTRUCTIONS.txt file explains the standalone verification recipe:

1. Unzip CREB-2026-000145-V002_SUBMISSION.zip
2. Run:   sha256sum -c HASH_MANIFEST_SHA256.txt
3. Verify every file reports "OK"
4. Recompute package-level hash:
     find . -type f -not -name PACKAGE_HASH.txt \
       | sort | xargs sha256sum \
       | sha256sum
5. Compare against PACKAGE_HASH.txt
6. Verify Dilithium-III signature over PACKAGE_HASH.txt
     using the JIL validator public key set
     (published at trust.jilsovereign.com/validators)
7. Resolve the CourtChain anchor TX in step 6 to confirm
   the package hash was notarized at the claimed UTC instant.
What this prevents
The hash chain is the answer to "how do we know this evidence was not altered after the case was packaged?" If a single byte changes anywhere in the package, the per-file hash fails. If a per-file hash is silently updated to match the change, the package-level hash fails. If the package-level hash is silently updated, the Dilithium-III signature fails. If the signature is silently re-issued, the CourtChain anchor at the original UTC instant does not match. There is no edit path that survives all four checks.

Section 07 Post-quantum signing - Dilithium-III (ML-DSA-65, NIST FIPS 204)

The final attestation over every CREB package is signed with Dilithium-III (the NIST-standardized name is ML-DSA-65, formalized in NIST FIPS 204, August 2024). Validator votes are signed with a hybrid Ed25519 + Dilithium-III scheme - both algorithms must verify, both keys must sign. The package's package_sha256 is bound to the signed attestation via SHA3-256.

Why a post-quantum scheme

Classical signatures (ECDSA, Ed25519, RSA) are exposed to "harvest now, decrypt later" risk: an adversary that captures a signed attestation today can wait for a cryptographically-relevant quantum computer (CRQC) to break the signature retroactively. A CREB that ends up in court in 2031 or 2034 needs to survive that exposure. Dilithium-III is currently the leading NIST-standardized lattice-based signature algorithm and is considered secure against both classical and quantum adversaries with the next-decade time horizon CREB targets.

The hybrid scheme on validator votes

Every validator vote on an attestation is signed by both Ed25519 and Dilithium-III. The verifier must successfully verify both. This protects against three categories of failure:

SHA3-256 binding to attestation params

The validator does not sign the package alone. It signs a SHA3-256 commitment over the tuple (package_sha256, attestation_class, case_classification, validator_id, timestamp_utc, courtchain_target_block). That binds the signature to the specific attestation parameters; a signature on one attestation cannot be replayed onto another.

Key custody

Validator signing keys live in hardware security modules (HSMs) in geographically distributed JIL validator facilities. Operator access to the HSM is gated by attestation: a request to sign must come from a JIL validator workload that has presented a current TPM remote attestation quote tied to a known software image. No human operator can extract a signing key, and no software image can sign without first proving it is the published image.

Section 08 Chain of custody log

Every evidence item in a CREB has a chain of custody record. The record names the custodian, the privilege status, and the chain status, and every access to the item is appended to an access-event log that is exported into 07_CHAIN_OF_CUSTODY/ at package build time. This is the artifact the producing party relies on to authenticate evidence at trial under Federal Rules of Evidence 901 and 902(14).

The custodian field

Every evidence_item row carries a non-null custodian field. The custodian is the named individual or system principal under whose authority the item was acquired and is held - a Special Investigations Unit analyst, a payer IT operator, a contracted forensic accountant, a system service principal. The custodian field is the person who would be deposed if the evidence's provenance were challenged.

privilege_status

Value Meaning
none No privilege asserted. Default for routine business records and ordinary-course source data.
attorney_client Communications between client and counsel for the purpose of seeking legal advice. Excluded from production by default; appears only in 13_PRIVILEGE_LOG/.
work_product Materials prepared in anticipation of litigation. Excluded by default; logged.
medical_record PHI under HIPAA. May still appear in production but routed through PHI-handling controls; recipient must be a HIPAA-permitted recipient under 45 CFR 164.512.
pii_protected Personally identifying information under GLBA, GDPR, CCPA, or comparable. Redaction or pseudonymization applied per the matter's protective order.

chain_status

Value Meaning
intake Item just acquired; SHA-256 computed; immutable original stored.
verified Custodian has affirmed the acquisition method and source; metadata reconciled with source-system records.
sealed Item incorporated into a CREB package version. Hash recorded in 14_HASH_MANIFEST/.
released_to_counsel Item has been exported under a two-party-approved release to a named counsel of record. Each release is a separate audit event with a distinct delivery_reference.
challenged Authenticity, completeness, or admissibility is under challenge; review pending. Counsel acknowledgement records the challenge basis.

Access-event log

Every read, render, or export of an evidence item appends to the access log:

access_event = {
  access_id,
  evidence_id,
  case_id,
  actor_id,           // user or service principal
  action,             // "read", "render", "export", "redact"
  purpose_code,       // "review", "deposition_prep", "production", "qc"
  source_ip,
  user_agent,
  timestamp_utc,
  prior_hash,
  event_hash
}

At package build time, all access events scoped to the case are exported to 07_CHAIN_OF_CUSTODY/ACCESS_LOG.csv. Counsel reviewing the package sees the full read history of every exhibit.

Section 09 PDF/A-2b conformance

Every generated PDF in a CREB is PDF/A-2b conformant. PDF/A-2b (ISO 19005-2, conformance level B for "basic visual reproduction") is the long-term archival profile recognized by Federal courts, state regulators, and ISO-aligned recordkeeping standards as the format that will remain renderable in twenty years.

What PDF/A-2b requires

OCR on scanned content

Every scanned exhibit in IMG- or 06_EVIDENCE/rendered/ carries a hidden OCR text layer. The visual representation is faithful to the scan; the hidden layer makes the document searchable. The OCR engine is recorded in the file's XMP metadata (jil:ocr_engine, jil:ocr_version, jil:ocr_confidence_min).

Why this matters for 20-year retention

Healthcare program integrity matters, False Claims Act qui tam actions, and grant recovery cases routinely take five to ten years from packaging to final resolution. The recordkeeping obligation on top of that can run twenty years or longer. A CREB submitted today must still be openable, renderable, searchable, and visually faithful in 2046. PDF/A-2b is the format the National Archives and Records Administration, the U.S. Federal Judicial Center, the Library of Congress, and every state records management authority have adopted for exactly that horizon.

Conformance verification

During Quality_Check (lifecycle state 10), the builder runs every generated PDF through a PDF/A validator (veraPDF or equivalent). Any non-conformance fails the QC pass and the package cannot move to Counsel_Reviewed. The conformance report is itself a PDF/A file written to 00_CASE_ADMIN/PDFA_CONFORMANCE_REPORT.pdf.

Section 10 AVA - the operational boundary

AVA stands for Adversarial Validation and Assessment (alternative gloss in operational materials: Adaptive Validation Aid). AVA is JIL's AI-assisted operational orchestration layer. AVA recommends, prioritizes, summarizes, and flags. AVA never produces findings. Every AVA call is audited at the schema level. The schema-level constraint creb_ava_cannot_be_finding physically prevents AVA-authored content from being inserted into the finding table.

What AVA may do

What AVA must not do

Allowed
Operational orchestration
  • "AVA recommends prioritizing this finding for review because it relates to an unresolved prior submission."
  • "AVA suggests pulling additional payment records for the lookback window 2026-03-01 through 2026-05-18."
  • "AVA gap analysis: no authorization records found for claims X, Y, Z; consider re-querying the prior-auth system."
Prohibited
Legal / evidentiary conclusions
  • "AVA determined this was fraud."
  • "AVA concludes the provider committed False Claims Act violations."
  • "AVA recommends prosecution."
  • "AVA computes damages of $4.2M."

Per-call audit log - what is recorded

ava_call = {
  ava_event_id,
  case_id,
  recommendation_type,        // gap | rule_suggestion | priority | resubmission | summary
  input_context_ids,          // array of evidence_ids, finding_ids, rule_ids
  generated_at_utc,
  model_version,              // pinned model identifier
  prompt_template_version,    // pinned prompt template hash
  output_hash,                // SHA-256 of canonicalized output
  output_text,                // the recommendation itself
  accepted_by_user,
  user_action_taken,
  prior_hash,
  event_hash
}

Every AVA recommendation accompanying a CREB is exported into 15_AVA_OPERATIONAL_LOG/AVA_RECOMMENDATION_LOG.jsonl. A reviewer can audit exactly what AVA suggested, when, on what input, with what model version, and what the human did with the recommendation.

The schema-level constraint

The constraint creb_ava_cannot_be_finding is enforced at the database layer. The finding table requires that finding.rule_match_ids be non-empty - in other words, every finding must point to at least one deterministic rule match. AVA does not create rule matches. Therefore AVA cannot create a finding. The constraint is the architectural commitment that the boundary cannot be silently crossed by a future code change.

Disclaimer printed on every AVA output
"AVA output is an operational workflow aid. It is not a legal conclusion, evidentiary finding, or determination of fraud. Material findings must be supported by deterministic rule execution, source evidence, and human review."

Section 11 The 14-of-20 BFT validator quorum

Every attestation produced by the JIL platform - including every CREB attestation - is approved by a 14-of-20 Byzantine-Fault-Tolerant validator quorum. Twenty validator nodes are geographically and legally distributed across thirteen-plus jurisdictions; fourteen must independently vote to approve before the attestation is sealed.

Why 14-of-20

A standard BFT safety threshold is n - f where n = 3f + 1 and f is the maximum number of faulty validators tolerated. With n = 20 and f = 6, the safety threshold is n - f = 14. The system can tolerate up to six simultaneously faulty (Byzantine, offline, or compromised) validators and still produce a valid attestation. Below that threshold, the attestation cannot be sealed.

Jurisdictional diversity

The twenty validator slots are allocated across thirteen-plus legal jurisdictions, with no single jurisdiction holding more than four validators. The objective is twofold:

Hybrid post-quantum signatures on each vote

Each of the fourteen approving votes is itself a hybrid Ed25519 + Dilithium-III signature over the attestation commitment. The aggregate attestation - what is anchored to CourtChain - is the SHA3-256 commitment plus the fourteen-or-more validator signatures. A verifier can independently re-check every signature without trusting JIL.

What this gives the reviewer
"An MCO general counsel, a state Medicaid director, and a Federal IG can each pick a different subset of the fourteen-plus signing validators and re-verify the package independently. No single party - not JIL, not the customer, not the recipient - is the single point of trust."

Section 12 CREB versioning - V001 -> V002 -> V_n

A CREB is never a one-time artifact. The whole point of the continuous evidence reinforcement loop is that more data arrives, more rule matches surface, and a stronger version supersedes the prior one. CREBs are versioned V001, V002, V003, and each new version carries a delta report explaining what changed.

Version naming

CREB-YYYY-CASEID-V###

Examples:
  CREB-2026-000145-V001   // initial package
  CREB-2026-000145-V002   // supersedes V001
  CREB-2026-000145-V003   // supersedes V002

When a new version is built

A new CREB version is generated when at least one of the following becomes true:

prior_package_id linkage

Every creb_package row carries a prior_package_id column. V002's prior_package_id points to V001's creb_package_id. The linkage is auditable in the database and printed in 00_CASE_ADMIN/CASE_MANIFEST.json. The chain of versions for any case can be walked backward to the original V001.

The delta report

Every version from V002 onward includes 16_DELTA_REPORT/DELTA_REPORT.pdf. The delta report carries:

Field Meaning
Prior CREB Version The package this one supersedes (e.g., V001).
Current CREB Version This package (e.g., V002).
New Evidence Count Number of new evidence items added.
Removed Evidence Count Items withdrawn (with reason - typically privilege re-evaluation or duplicate consolidation).
New Findings Count Number of new validated findings added.
Superseded Findings Findings replaced or merged into stronger findings.
Updated Amount at Issue Delta in dollars, including a per-finding breakdown.
New Rule Matches Rules newly triggered, with rule_id and rule_version.
New Corroboration Evidence that strengthens prior findings without creating a new finding.
Submission Reason Why this version is being submitted (recipient request, new evidence, escalation, etc.).

The resubmission auto-flag

The continuous loop engine runs on a scheduled cadence - daily for high-volume operational refresh, weekly for formal CREB reinforcement review. For each active case, it pulls new source data in the configured lookback window, re-runs the deterministic ruleset, compares the new rule matches against the existing findings, and auto-flags the case for resubmission if any of the trigger conditions are met. The flagged case enters lifecycle state Resubmission_Queued and waits for human review before package build.

Section 13 Submission tracking

Every CREB submission is a tracked, audited delivery event. The submission record captures who received it, how, when, what they said back, and what follow-up is required.

Submission record fields

Field Description
submission_id Unique submission ID, format SUB-YYYY-CASEID-V###-NNN.
creb_package_id The CREB package being submitted (a specific version).
recipient_entity Named recipient organization - DOJ Civil Division, state Medicaid Fraud Control Unit, payer Special Investigations Unit, OIG, foundation board, etc.
recipient_channel One of: email, sftp, portal_upload, mail, api.
submitted_at UTC timestamp of delivery.
submitted_by Actor ID of the submitter (named user or service principal).
delivery_reference Channel-specific receipt (SMTP message-id, SFTP transfer ID, portal upload UUID, USPS tracking, API response correlation ID).
response_status One of: acknowledged, accepted, rejected, more_evidence_requested, no_action.
response_received_at UTC timestamp of the recipient's first substantive response.
response_notes Substantive content of the response. The response letter itself is stored as an exhibit under 14_SUBMISSION_RECORDS/RESPONSE_LETTERS/ in the next version.
follow_up_due Scheduled date for the next action (default: 30 days from submitted_at, configurable per matter type).

Response taxonomy

Status What it means in the loop
acknowledged Recipient confirmed receipt. No substantive decision yet. Follow-up date set; loop continues to monitor.
accepted Recipient agreed to pursue, refer, or investigate. Case may move toward Archive at the producing party's discretion, or stay open as further evidence arrives.
rejected Recipient declined. Reason recorded. The loop continues to pull new evidence; if a stronger version becomes possible, the resubmission auto-flag fires.
more_evidence_requested Recipient needs specific additional support. The request itself becomes input to AVA gap analysis for the next loop pass.
no_action Recipient did not act within the response window. Treated as soft-rejected for loop purposes; resubmission may proceed.

Two complementary controls govern how long a case and its evidence live in the system: legal hold pins a case in place and overrides every other retention setting, and a retention policy expires data on a defined schedule once the hold is released. Privilege flags layered on top prevent accidental disclosure during both phases.

Legal hold

Retention policy

Each case carries a retention policy reference recorded in 00_CASE_ADMIN/RETENTION_POLICY.txt. Healthcare program-integrity matters typically inherit a twenty-year retention horizon from CMS recordkeeping rules; commercial fraud matters typically inherit a seven-year retention horizon from the applicable statute of limitations plus discovery tail. The retention clock starts at the transition to Archived. If a hold is active when the clock would have triggered expiry, the clock pauses until the hold is released.

Privilege flags as a disclosure guard

Privilege flags (attorney_client, work_product, medical_record, pii_protected) carry forward through every version of a case. When a CREB is built, the builder cross-checks each candidate exhibit against its privilege flag and the matter's protective order; items flagged for exclusion appear only in 13_PRIVILEGE_LOG/ with their basis-for-withholding entry. They never appear in the production exhibits set.

Section 15 Two-party export approval

Every CREB package download from the platform requires two-party authorization: a named requester plus a named approver, with a logged reason, an explicit acknowledgement of the export's purpose, and a twenty-four-hour expiry on the approval token.

The two-party flow

  1. Requester opens an export request. The requester is an authenticated user with the platform role investigator, compliance_analyst, compliance_lead, outside_counsel, or service_principal.
  2. Reason recorded. The requester selects a purpose code (production, deposition_prep, expert_review, internal_qc, regulatory_submission) and writes a free-text reason. Both fields are required.
  3. Approver named. The platform routes the request to an approver. The approver must hold the role compliance_lead or outside_counsel and must be distinct from the requester. The requester cannot approve their own request.
  4. Acknowledgement. The approver must affirmatively acknowledge that the export is consistent with the matter's protective order and applicable privacy obligations. The acknowledgement language is fixed by the platform.
  5. Token issued, 24-hour expiry. A single-use download token is issued, scoped to the specific creb_package_id. The token expires after twenty-four hours regardless of whether the download has occurred.
  6. Download logged. The actual download event writes an audit row with the source IP, user agent, and timestamp. Counsel reviewing later can see exactly which approval authorized which download.
Why this matters
The two-party rule is the single most effective control against insider-driven evidence exfiltration. A compromised single account cannot extract a CREB - the approver is a separate identity, on a separate device, with a separate access pathway. The twenty-four-hour expiry guarantees that an approval cannot be silently held in reserve for later misuse.

Section 16 CourtChain anchoring

Every CREB attestation - the Dilithium-III-signed commitment over the package_sha256 - is anchored to CourtChain, JIL's purpose-built Layer 1 tamper-evident audit ledger. Anchoring writes the attestation hash as a transaction on CourtChain at a notarized UTC instant. External parties can verify the package's pre-clearance chain after the fact without holding any JIL secret.

What gets anchored

What CourtChain is

CourtChain is a JIL-operated Layer 1 ledger with public read access, BFT consensus, and a purpose-built schema for attestation transactions. It is not Ethereum, it is not Bitcoin, it is not a generic enterprise blockchain. It is engineered for one workload: append-only attestation notarization with sovereign jurisdictional replication.

External verification path

  1. The reviewer receives the CREB ZIP. They open 14_HASH_MANIFEST/PACKAGE_HASH.txt and recompute the package-level hash.
  2. They open 00_CASE_ADMIN/CASE_MANIFEST.json and read the courtchain_anchor object: { tx_hash, block_height, anchored_at_utc, validator_quorum_id }.
  3. They visit the public CourtChain explorer (courtchain.jilsovereign.com/tx/<tx_hash>) and confirm the transaction exists at the claimed block height with the claimed payload.
  4. They cross-check that the timestamp the package claims is the timestamp at which CourtChain recorded the anchor.
  5. If all four match, the package is verified pre-clearance: the package contents existed in their current state at the recorded UTC instant, and any later edit would have to be re-signed by the validator quorum and re-anchored.
Why an L1 anchor and not just a timestamp service
A centralized timestamp service can be retroactively manipulated by its operator. An L1 anchor with BFT consensus and jurisdictional replication cannot - rewriting history requires compromising the quorum across multiple jurisdictions simultaneously. CourtChain inherits that property from its consensus model, and CREBs inherit it from CourtChain.

Section 17 Conformance posture - the disclaimers that ship with every CREB

A CREB is a deterministic evidentiary packaging artifact. It is not legal advice, it is not an attorney-client relationship, it is not a guarantee of any outcome. Every CREB carries the following conformance posture in 01_EXECUTIVE_SUMMARY/ and 00_CASE_ADMIN/, and counsel acknowledges them in 17_COUNSEL_ACKNOWLEDGEMENT/.

MCO program-integrity conformance

DISCLAIMER 01
Not legal advice
This CREB package and related platform outputs are provided for evidentiary organization, investigative support, forensic analysis, and operational review purposes only. They do not constitute legal advice, legal representation, or a legal opinion.
DISCLAIMER 02
No attorney-client relationship
Use of the CREB platform or receipt of a CREB package does not create an attorney-client relationship with JIL Sovereign Technologies, Inc., its affiliates, personnel, contractors, or platform operators.
DISCLAIMER 03
No guarantee of prosecution or recovery
Submission, delivery, or generation of a CREB package does not guarantee investigation, prosecution, enforcement action, litigation, settlement, recovery, restitution, conviction, or any particular legal or regulatory outcome.
DISCLAIMER 04
Deterministic findings
Material evidentiary findings in this CREB are generated through deterministic, traceable, reproducible rule execution against identified source records. The rule source, rule version, input records, execution logs, and supporting evidence references are maintained for audit and review.
DISCLAIMER 05
AVA operational role only
AVA is an operational workflow and validation support layer. AVA may assist with prioritization, gap analysis, workflow sequencing, and resubmission readiness. AVA does not determine legal liability, criminal guilt, fraud, damages, or prosecutorial action.
DISCLAIMER 06
Healthcare and government funds notice
Healthcare, Medicaid, Medicare, and government-funded matters may involve specialized statutory, regulatory, privacy, anti-kickback, False Claims Act, and contractual requirements. Users should obtain appropriate healthcare regulatory and legal review before external submission or commercial enforcement activity.

Wording boundaries

Use
Defensible vocabulary
  • Court-ready evidence bundle
  • Deterministic rule-based findings
  • Reproducible evidence package
  • Prosecutor-ready organization
  • Enforcement referral support
  • Chain-of-custody documentation
  • Human-reviewed findings
  • Operational AVA support
Avoid
Wording that mis-states the artifact
  • AI proves fraud
  • AI prosecutes fraud
  • Guaranteed prosecution
  • Guaranteed DOJ acceptance
  • Guilty party
  • Conviction-ready
  • AI adjudication
  • Automated legal judgment

Section 18 What is NOT inside a CREB

Just as important as what a CREB contains is what it does not contain. A CREB excludes several categories of artifact by design. The exclusions are architectural commitments enforced at the schema, build, and review layers.

Excluded Why excluded
AVA-authored findings Findings come only from the deterministic rule engine + human review. The creb_ava_cannot_be_finding schema constraint enforces this at the database layer.
Generative-AI text presented as conclusions Generative-AI text may appear in 15_AVA_OPERATIONAL_LOG/ labeled as operational orchestration, never in 02_NARRATIVE/ or 03_FINDINGS/.
Mutable rule definitions Rule definitions are append-only. Edits create new (rule_key, semver) rows. A CREB version is forever pinned to the rule versions effective at the event_date of its source records.
Unhashed evidence Every evidence item must carry a non-null sha256_hash. The builder refuses to include unhashed items.
Evidence without a custodian The custodian field is required and non-null at the database layer. An item with no named custodian cannot be sealed into a CREB.
Untracked access Every read of an evidence item writes an access_log row. Access events that are absent from the log (e.g., direct DB query bypassing the application) are flagged as integrity exceptions and block package build.
Black-box AI accusations "AVA determined this was fraud" is prohibited by the rule engine's no-black-box-finding constraint.
Predictions or forecasts A CREB describes what is, not what might be. Predictive analytics, if used operationally, live in 15_AVA_OPERATIONAL_LOG/ labeled as forecast.
Items collected unlawfully The platform's intake gate refuses to ingest material flagged as obtained through unauthorized access, unlawful surveillance, improper recording, hacking, or privilege violation.
Architectural commitment
Every exclusion above is enforced at a structural layer - database constraint, builder pre-check, ingest filter, or schema-level invariant - not by policy alone. A future code change cannot silently cross any of these boundaries without removing the corresponding structural enforcement, which itself is auditable.
Talk to JIL

The CREB is what makes JIL admissible.

If you operate an MCO Special Investigations Unit, a state Medicaid program-integrity team, a federal Inspector General office, a foundation grant-integrity function, or an outside-counsel referral practice, this is the artifact you receive from the JIL platform. Below are the next-step links - product page, pricing model, the institutional valuation memo (gated), and a direct connection to the team.

The CREB design is documented across eleven internal specifications (00_README through 11_Developer_Backlog). This page is the institutional summary of those specifications, intended to give a buyer or reviewer enough technical depth to evaluate the platform before signing a master services agreement. The full specifications are available under NDA upon request via /connect.

JIL Sovereign Technologies, Inc. - Platform Spec JIL-CREB-001 - Revision 1.0 - 2026.05 - Confidential, Institutional Distribution