Five indicators. Fifteen points. Deployable against any public body — regardless of who controls it.
The Institutional Capture Audit (ICA) is the primary output of the Institutional Capture Record series. It formalizes the five Red Flags documented in IC-001 through IC-006 into a deployable diagnostic instrument — five accounting and governance questions, each with a quantitative threshold derived from the documented cases, scored against peer-institution benchmarks. The ICA is designed to be cited, applied, and updated as new cases are documented.
The ICA's most important design property is what it does not contain: identity variables. No indicator asks about the religion, ethnicity, ideology, or political affiliation of the institution's controlling group. Every indicator is expressed in financial or governance terms that are documentable from public records — budget documents, audit reports, procurement records, organizational charts. The ICA applies the cognitive sovereignty principle established in IC-001: the accounting is the antidote to the identity layer.
The ICA is explicitly non-dispositive. A score of 10–15 does not establish that institutional capture has occurred. It establishes a prima facie case that a forensic audit is warranted. The ICA is a triage instrument — a systematic way of identifying public bodies where the accounting pattern is consistent with institutional capture and where more intensive scrutiny is justified. It is the starting point for investigation, not the conclusion.
This indicator operationalizes Revenue Sabotage (IC-002). A score of 3 on Indicator 1 means the institution's documented fiscal shortfall is traceable to a deliberate revenue decision, not an external constraint — the condition the Alcantara court found dispositive in Lakewood.
This indicator operationalizes Discretionary Inversion (IC-003). Lakewood scores 3 on this indicator: $33M in discretionary busing maintained while special education, per-pupil instructional spending, and facilities all fell below constitutional standard simultaneously.
This indicator operationalizes the Gatekeeper Premium (IC-004). The Lakewood $850,000 per year no-bid attorney contract scores 3 on this indicator, particularly with the documented $15M unrecovered cyber-theft loss during the contract period — the clearest consequence of the escalation failure.
This indicator operationalizes Identity Shielding (IC-005). The Lakewood record documents a pattern of invoking antisemitism claims in response to financial scrutiny — a classic score-3 Audit Resistance Pattern. The Bell record documents a different variant: city management actively concealing salary information from state oversight, which scores similarly on the avoidance and non-engagement dimensions.
This is the only indicator that references demographic characteristics — but it does so in service of the structural analysis, not the identity analysis. The question is not "who controls the board?" but "does the board's composition create a structural conflict of interest with the institution's mandatory service obligations?" A board dominated by people who do not use the institution's services has a structurally different incentive structure than a board dominated by people who do. The indicator measures that structural feature.
The ICA scoring is additive: each indicator scored 0–3, maximum total 15. The interpretation thresholds:
The ICA is designed to be conducted from public records: annual budget documents, audit reports, procurement records, board minutes, organizational charts, and state oversight reports. It does not require access to internal documents or confidential information. Its inputs are the documents that public institutions are required to produce and make available.
The ICA is also designed to be updated. The five indicators derive their thresholds from four documented cases — Lakewood, Bell, Flint, and the Catholic Church governance failure. As additional cases are documented and verified, the thresholds can be refined and the instrument improved. The ICA version documented in this paper is version 1.0, derived from the four cases in this series.
A scoring instrument applied to public institutions could be misused — deployed selectively against minority-controlled institutions while majority-controlled institutions with the same scores escape scrutiny. The instrument itself could become a tool of Identity Shielding in reverse.
The objection identifies a real deployment risk that the instrument's design addresses in two ways. First, the ICA is designed for universal application — to any public body, regardless of who controls it. Its deployment against minority-controlled institutions while majority-controlled institutions with equivalent scores escape scrutiny would itself be documentable and challengeable. Second, the instrument's output is not a finding of capture — it is a recommendation for forensic audit. The forensic audit then produces or fails to produce the documentary evidence that either confirms or refutes the ICA's prima facie finding. Selective deployment of the ICA without subsequent audit of majority-controlled institutions with equivalent scores would be a governance failure in the oversight body, not a flaw in the instrument. The appropriate remedy for selective deployment is application of the same standard to all institutions — which is precisely what the ICA's identity-neutral design enables.
Internal: This paper is part of The Institutional Capture Record (IC series), Saga VII. It draws on and contributes to the argument documented across 69 papers in 13 series.
External references for this paper are in development. The Institute’s reference program is adding formal academic citations across the corpus. Priority papers (P0/P1) have complete references sections.