Sicarius · Lumen

Intelligence that stops theft
before it compounds.

LUMEN converts critical infrastructure theft incidents into structured, decision-grade intelligence — giving security teams the signal they need to act, not just a record of what was lost.

Built for critical infrastructure operators — power, gas, mining, rail, telco, councils, and construction.

Contact us about LUMEN →

The problem

Copper and infrastructure theft is not random.
It is coordinated, repeat, and escalating.

Most organisations respond to each incident in isolation — logging it, reporting it, and moving on. The pattern goes unseen. The crew returns.

Copper theft, cable theft, and infrastructure vandalism cost Australian critical infrastructure operators hundreds of millions of dollars annually — in direct asset losses, operational downtime, and safety incidents.

If your incidents are going into a spreadsheet and staying there,
you are building a record of losses — not intelligence against them.

What LUMEN is

A controlled intelligence production platform.

LUMEN transforms raw incident reports into cumulative, QA-validated intelligence that builds a structured picture across every theft event — not just the one you're looking at now.

Every incident is analysed against a structured framework. Every output is reviewed and approved before it reaches the client. Every report is defensible, traceable, and actionable.

This is not a dashboard. This is not a data lake. It is an intelligence production system — designed to produce outputs that inform real decisions.

How it works

Four stages. One governed intelligence cycle.

01

Incident Capture

Security staff submit structured incident reports via the LUMEN client portal. Location, assets, timing, method, and evidence are captured in a controlled format — no free text, no gaps.

02

Intelligence Production

Sicarius analysts work each incident through an eight-step analytical framework — classifying the offender profile, assessing disposal pathways, identifying pattern indicators, and scoring the signal against prior incidents.

03

Quality Gate

Every intelligence record passes through a QA review before release. Analytical findings are validated, action recommendations are tested against pattern triggers, and confidence is assessed against a three-pillar framework before any output leaves the system.

04

Client Intelligence Report

A structured, classified intelligence report is published to the client portal — what happened, what it means, the likely offender profile, what the client should do next, and what happens if they don't.

What makes it different

Built to produce intelligence, not paperwork.

Cumulative intelligence, not isolated incidents

LUMEN builds signal across incidents over time. A single theft is a loss. Three thefts in the same corridor in 30 days is a pattern — and a pattern demands a different response. LUMEN surfaces that automatically.

Actionable outputs, not reports

Every LUMEN intelligence product includes a specific, executable action — WHERE to focus, WHAT to do, and WHAT happens if they do nothing. Clients receive intelligence, not paperwork.

QA-enforced quality

No intelligence product leaves LUMEN without passing a structured quality gate. Analytical standards are enforced by the system, not left to individual judgement.

Built for regulated environments

LUMEN is designed for organisations that need defensible, auditable intelligence — not a tool that produces findings that can't be explained under scrutiny. Every output is traceable to the evidence that produced it.

Outcomes

What clients using LUMEN gain.

LUMEN builds something that works against the people causing your losses — not just a record of what they took.

Early warning on emerging corridors

Pattern detection across incidents before repeat targeting escalates.

Offender profiling

Structured classification of offender type, methodology, and disposal pathway.

Prioritised action

Clear, executable recommendations with consequence framing for inaction.

Cumulative intelligence base

A growing, structured signal set that improves with every incident processed.

Defensible outputs

QA-approved intelligence that can be shared with law enforcement, insurers, and executives.

For critical infrastructure operators

Built specifically for this environment.

LUMEN understands the asset classes, the offender scenarios, the disposal networks, and the escalation triggers that matter across critical infrastructure sectors. It was not adapted from a general-purpose tool — it was built for this operating environment.

LUMEN is available to critical infrastructure operators and asset-intensive organisations — power, gas, mining, rail, telco, councils, and construction — facing repeat theft or targeted criminal activity. Engagements are structured, managed, and governed by Sicarius from day one.

Engage Sicarius

Contact us about LUMEN.

Tell us about your operating environment. We'll discuss whether LUMEN is right for your situation and what a structured engagement would look like.

Get in touch →

Or reach us directly — 1300 027 401 · info@sicarius.com.au