Opus A.S.
Empowering U.S. & allied leaders with expert human insight.
Global battlespaces are shifting rapidly. To preserve and protect our interests at home and abroad, we must adapt.
Security threats are evolving in novel ways. To keep pace, Opus A.S. puts new paradigms of thinking ahead of policy and develops strategic communication and influence frameworks to position the United States and its national security partners dramatically ahead in ability and reach.
Image Case Study 1: Decommissioned Titan II Missile, one of the largest nuclear ICBMs ever deployed by the United States. This silo was in service from 1963 to 1984. The Titan II was what is known as a Launched Under Attack (LUA) weapon, a doctrine used during the Cold War to ensure a devastating retaliatory strike launching these missiles upon confirmation of an incoming confirmed nuclear strike. This allows the weapons to be launched before they could be theoretically destroyed. This bolstered a credible and survivable nuclear deterrent.
Our Mission
Our goal is to ensure the current and future prosperity & security of the United States, its citizens, and allies by transforming national security for the next generation.
National security cannot be achieved without a credible civil defense, the ability for you and your administrative teams to communicate securely, and purposeful privacy in your freedom of movement.
strategic communication
Grounded in Reality, Impartial and Resolute
Image Case Study 2: Due to arms treaties, the missile silo doors on this decommissioned Titan II ICBM are locked in a half-open state, to show any satellites passing overhead that the silo is not operational.
If you look at the top of the image, you can see the open sky to the left of the silo top, while the right side remains covered.
Image Case Study 3: Private orbital launches are increasingly common. This is just one example of many in which individuals and corporations now possess unprecedented capabilities and power on par with nation-states.
Private individuals, corporations, and adversaries can collect previously secret remote sensor data in ways that governments have not yet fully understood.
peace through strength
Context and audience are everything.
Visible indicators of defensive or offensive capabilities serve as both a message and a deterrent to potential adversaries, fostering stability and trust.
Image Case Study 4: When seen and analyzed in different geographical contexts, an image like this could convey readiness, strength, or transparency, as well as a commitment to peace through deterrence.
This image shows a decommissioned Titan II ICBM in Arizona half-open, which is intended to convey a symbolic state of unpreparedness to passing adversary satellites.
nonproliferation challenges
While the goal of a nuclear-free world is noble and desirable from a security perspective, the practical challenges of achieving complete disarmament are immense and likely insurmountable.
Addressing reality means that nuclear weapons diplomacy remains one of the most pressing and complex issues facing humanity today.
Meeting these challenges and maintaining superiority in the nuclear order requires high levels of international cooperation, trust, and both transparent and clandestine verification mechanisms.
These issues cannot be addressed by governments alone. In the coming decades, there will likely be private arsenals of nuclear and biological weapons.
This trend will be facilitated by the increasing likelihood of AGI (Artificial General Intelligence) and the probability that it will develop novel physics packages, materials, and even delivery vehicles unknown to the defense industry today.
Prepare for the future
Image Case Study 1 & 2: Based on analysis done in 2021, China appears to be rapidly building and deploying nuclear capable ICBM fields.
Image Case Study 3:Zoom view in January 2025 shows the support facilities and a clearly low resolution patch stitched on the lower part of the image, dividing the frame.
Governments are adapting to publicly available data that was never so widely accessible, nor cheap, for general public access.
Image Case Study 4: At high elevations, public imagery from January 2025 clearly shows the grid pattern of the Hami missile field in Xinjiang, China.
Marked progress can be seen by comparing the image above, from January 2025, to the image below from 2021 from Planet Labs/FAS.
Image Case Study 5: Private satellite imagery from Planet Labs/FAS reveals the details of the construction completed in the Hami fields in 2021. The ability for individuals and organizations to monitor on state activity in this manner is a new phenomenon.
Despite governments desire to conceal critical national security data from the public, most leaders have no answer to the impending surge of privately available satellite imagery.
Image Case Study 6: As of January 2025, Google no longer shows a detailed view of these missile fields outside Hami in Xinjiang, China.
Clearly, this imagery has been manipulated by Google to hide the detailed current state and layout of this weapons complex.
Future-proof Your Administration
Is your administration prepared for the hybrid threats of today and the future?
How do you communicate with the public after a major cyber attack, or in advance of a major cyber offensive?
How do you prevent smartphone GPS and metadata tracking for your civilian and military personnel?
How do you communicate privately (and in private, despite the ubiquity of IOT devices listening) with your cabinet or board?
How can you best prepare for multiple possible outcomes of consequential decisions without relying solely on machines?
How can machines be used to positively influence public sentiment at home or abroad?
Since the introduction of the smartphone, metadata and GPS tracking have become major issues for governments, militaries, and corporate executives.
Fitness application Strava famously exposed the locations of CIA black sites, clandestine US military bases, and, most recently, the locations and dates of French Nuclear Submarine patrols.
Apps like Strava often release this data for free to the public, making tracking users and their habits trivial.
This data can be used to either expose your sensitive intelligence OR consciously employed as a tool to distract or mislead.
Image Case Study 1: In 2019, The New York Times ran an in-depth article on the ability to purchase, parse, and monitor GPS pings from millions of American smartphones, including data revealing the detailed habits and daily routes of individuals working at the Pentagon.
Image Case Study 2: Tracking data from data brokers is only slightly more difficult to obtain because it is not free. This data is far more detailed and can be purchased on the open market.
For example, an easily purchased dataset (in the image above) revealed the presence and frequency of phones in the proximity of President Trump — shown here at his Winter White House at Mar-a-Logo in West Palm Beach, Florida.
Image Case Study 3: Freely available data from FitBit, Strava, and other similar sources reveal incredibly detailed interior designs and spatial renderings of Burning Man.
While obtaining the original blueprints of many military administrative buildings would be nearly impossible, yet seemingly innocuous usage of trivial apps, such as games, can easily map and provide near real-time Top Secret (TS) geospatial data like this.
Photo Case Study 4: Publicly available tracking data from the fitness app Strava routinely exposes the locations of sensitive U.S. and allied military sites globally.
Quantum Computing & Artificial Intelligence
Drawing from insights gained through discussions with the creators of AI and industry experts, we anticipate that this dynamic will transform politics, business, and culture in ways that exceed most imaginations.
The next few years will determine whether artificial intelligence (AI) results in catastrophe and which nation, China or the U.S., emerges as the leader in the AI arms race.
unlike previous groundbreaking technological advancements (atomic weapons, space, the internet), AI development is largely outside the realm of government control and security clearances, and is instead driven by private companies wielding the power & influence comparable to nation-states.
A failure by the U.S. leaders to navigate this landscape effectively, could have severe and far-reaching negative consequences, including the proliferation of extremely powerful and lethal weapons, significant job disruption and displacement, and a surge of misinformation.
forward vigilance
Anticipate threats, assert peace decisively.
Image Case Study 1: Google DeepMind researchers’ graphic explanation of the difference between a Bit and a Qubit.
proactive defense
Progress in AI routinely exceeds projections in advancement.
America must quickly perfect a technology that many believe will be smarter and more capable than humans. We need to do this without decimating U.S. jobs, and inadvertently unleashing something with capabilities we didn't anticipate or prepare for.
We need to both beat China on the technology and in shaping and setting global usage and monitoring of it, so bad actors don't use it catastrophically.
This can only be done with unprecedented government-private sector collaboration — and difficult, but vital, cooperation with China.
There's going to have to be a new model of pubic-private relationships because of the sheer capability in the hands of private actors today.
"What exactly that model looks like, whether it takes more the form of guardrails and regulation, and some forms of support from the government — or whether it involves something more ambitious than that — I will tell you that some of the smartest people I know who sit at the intersection of policy and technology are working through the answer to that question right now."
- Jake Sullivan, Biden White House National Security Adviser (taken from AXIOS.com)
This is beyond uncharted waters. It's an unexplored galaxy — "a new frontier," in his words [Jake Sullivan, Biden White House National Security Adviser].
Regardless of what has been said in public, every background conversation we had with President Biden's high command came back to China and AI.
Yes, they had concerns about the ethics, misinformation and job loss resulting from AI. They talked about that.
But they were unusually blunt in private: Every move, every risk is calculated to keep China from beating us to the AI punch. Nothing else matters, they said.
- (taken from AXIOS.com)
Our goal is to ensure the current and future prosperity & security of the United States, its citizens, and allies by transforming national security for the next generation.
National security cannot be achieved without a credible civil defense, the ability for you and your administrative teams to communicate securely, and purposeful privacy in your freedom of movement.