Skip to main content
← Back to Analysis Structural Analysis

Silicon Valley Bank

A bank that appeared well-capitalized was structurally irreversible eighteen months before collapse — the governance architecture that could have corrected course had been systematically dismantled.

Organizational Slow Collapse 34 min read

This is retrospective analysis. The Four Frequencies framework was not applied prospectively to Silicon Valley Bank. The purpose is to demonstrate structural pattern correspondence — that the framework's analytical architecture aligns with documented failure patterns — not to claim predictive accuracy. The analyst had full outcome knowledge during the analysis. Where the framework connects findings that post-mortem investigators documented separately, we say so directly. The claim is structural explanatory power: organizing known facts into a coherent architectural analysis that reveals mechanisms descriptive post-mortems cannot. Where the framework's logic strains against the characteristics of this failure, the strain is documented.

1. Structural State at Failure

The conventional account of Silicon Valley Bank's collapse assigns cause to interest rate mismanagement, concentrated deposits, and weak oversight — findings documented across multiple institutional post-mortems. The Four Frequencies analysis reveals what those separate findings cannot: the specific structural mechanism by which SVB's hedge removal simultaneously deepened its concentration risk and destroyed the measurement instrument that would have made that risk visible to its own board — a single action operating across two frequencies at once. The analysis maps a 6-to-12-month governance gap during which the structural conditions demanded intervention, the governance capacity to intervene still existed, and the organization's own architecture made intervention infeasible. And it identifies SVB as a co-keystone case — a failure driven not by any single structural condition but by the compounding interaction between Permission degradation and Management degradation, where each frequency's collapse accelerated the other's and neither alone would have been sufficient to produce the observed outcome.

The result is a structural map showing not just what failed at SVB, but why the failure could not be stopped once Permission and Management began compounding — and where, specifically, the last viable intervention window closed.

When the California Department of Financial Protection and Innovation closed Silicon Valley Bank on , it ended the life of an institution whose structural condition had been deteriorating for more than two years — even as its headline financial metrics remained ostensibly sound. The Four Frequencies framework, applied retrospectively to the documented record, reveals an organization in Connected Structural Crisis: the most severe structural classification the framework identifies, where every structural vulnerability is connected to and compounding every other.

Every frequency was elevated. What makes this a Connected Crisis rather than isolated frequency failures is the amplification architecture: multiple vulnerabilities were not merely coexisting but actively compounding one another. The framework tests all six frequency pairs for nonlinear interaction — where two elevated frequencies compound rather than merely add. At SVB, four of six pairs were active. No frequency was absorbing compensatory load for any other. The system had no structural buffer.

Thinness

Where there is no buffer: the erosion of safety margins, redundancy, and tolerance for the unexpected. SVB's Thinness was extreme across every dimension — and manifested as eroded margin: buffers that once existed within the bank's risk architecture (interest rate hedges, deposit diversification capacity, liquidity reserves proportionate to the portfolio's duration) were systematically removed through portfolio strategy, hedge unwinding, and growth that outpaced the control infrastructure.

The deposit base was concentrated in a single sector: approximately 50% of all US venture-capital-backed technology and life sciences companies banked with SVB. As of year-end 2022, roughly 94% of the bank's $175 billion in deposits were uninsured — against a large banking organization peer average of approximately 40-50%. The 94% figure matters not because a high uninsured deposit percentage is independently catastrophic — several large institutions carry substantial uninsured balances — but because of what happens when that concentration resides in a single interconnected sector facing a simultaneous liquidity crunch. The combination of uninsured percentage, sector concentration, and duration mismatch is the Thinness condition; any one element in isolation would be manageable. The asset side mirrored this concentration: the held-to-maturity securities portfolio reached $91 billion, approximately 43% of total assets, with a weighted-average duration of 6.2 years.

The framework identifies a Keystone dimension within each frequency — the single vulnerability carrying a disproportionate share of that frequency's structural weight. The Keystone for Thinness — Disruption Amplification, measuring how broadly a single disruption propagates — was at maximum stress. A single trigger (rising interest rates) simultaneously impaired the asset portfolio, compressed the deposit base, and eliminated the bank's capacity to liquidate holdings without realizing catastrophic losses. That is the operational meaning of a Thinness Keystone at maximum: one event, three simultaneous failures, no remaining margin.

Permission

The architecture of controls, approvals, and constraints governing how the organization operates showed severe under-control. The Chief Risk Officer position was vacant from through , an approximately eight-month gap during which no single executive held authority over the bank's risk management function. The board risk committee increased its meetings from seven in 2021 to eighteen in 2022 — a pattern that suggests escalating concern without escalating authority. The 2018 Economic Growth, Regulatory Relief, and Consumer Protection Act (EGRRCPA) had raised the threshold for enhanced prudential standards from $50 billion to $100 billion in assets, removing SVB from tighter regulatory scrutiny precisely as it was tripling in size. Permission's Keystone — Revocability Risk, whether concentrated authority can be reclaimed — was critical: neither the board nor regulators demonstrated capacity to revoke or constrain management's risk appetite. In operational terms, the gates that should have constrained the bank's trajectory had been removed from the outside (regulatory tailoring) and vacated from the inside (CRO departure) simultaneously.

Management

The integrity of information the organization uses to make decisions was structurally compromised. According to the Federal Reserve's post-mortem, SVB management provided the board with information that did not surface liquidity issues until . The bank's internal liquidity stress tests (ILSTs) repeatedly showed shortfalls, but management responded by changing the assumptions in the models rather than addressing the underlying exposure. Interest rate risk simulations were deemed unreliable by supervisors. Management's Keystone — the Metric-Reality Gap — was at maximum: leadership was operating on an information picture that diverged fundamentally from operational reality. Whether the gap resulted from deliberate concealment, optimism bias, or misaligned compensation incentives, the Federal Reserve's post-mortem documents behaviors consistent with all three but does not establish intent. The structural consequence was identical: an information architecture configured so that risk exposure became progressively less visible to the people who needed to see it.

Absence

This frequency — where critical knowledge and capability are concentrated in too few people — was elevated but operated as a secondary amplifier rather than an independent driver. The CRO vacancy is technically an Absence condition (critical expertise missing from the organization), but its structural effects radiated primarily through Permission and Management — the authority vacuum degraded the control architecture, and the expertise gap degraded the information pipeline.

This is the Concentration Dependency variant of Absence: the capability had not physically departed the banking system (unlike, for instance, the geographic departure of pharmaceutical manufacturing capacity documented in the Drug Shortage analysis); it was concentrated in a single role that went unfilled. The bank's rapid growth from $71 billion to $211 billion in assets (2019–2021) compounded the Absence condition by outpacing the development of institutional risk management capability. The risk management apparatus was designed for a $70 billion institution and was now operating inside a $210 billion one — not because expertise had walked away, but because it had never been developed at the required scale.

Amplification pairs were active at strong intensity across four of six pairs:

  • Thinness—Management (strong): The concentrated interest rate exposure was invisible to leadership because the information architecture was broken. Concentration risk that leadership can see is manageable; concentration risk hidden by a metric-reality gap compounds silently. This pair operated through a specific mechanism: the hedge removal that was simultaneously a portfolio management decision and an information architecture decision (see Section 6, Finding 1).
  • Thinness—Permission (strong): The concentrated business model operated without proportionate control architecture. The regulatory tailoring that removed enhanced prudential standards, combined with the CRO vacancy, meant concentration existed without constraint.
  • Permission—Management (strong): The absence of a CRO meant the control architecture couldn't generate accurate risk information. The permission gap fed the information gap — when no one has the authority to demand accurate reporting, the information architecture degrades. This is the co-keystone pair: Permission degradation and Management degradation were not merely co-occurring but mutually accelerating. Each made the other worse in ways neither could have produced alone.
  • Management—Absence (moderate): The CRO vacancy degraded both the information pipeline and the expertise needed to interpret what information did exist. Without the interpretive authority of a Chief Risk Officer, raw risk data existed in the organization but could not be translated into executive-level warnings.

The framework's co-keystone finding — that Permission and Management operated as a dominant pair rather than either serving as an independent keystone — is itself a structural result. The analysis cannot complete the standard counterfactual ("if this single frequency had been at its functional level, the cascade would have been prevented") for either frequency alone. If Permission had been intact (CRO in position, regulatory oversight proportionate) but Management remained degraded, the CRO would have been operating on the same distorted information. If Management had been intact (accurate risk reporting, hedges maintained) but Permission remained degraded, accurate information would have reached a governance architecture without the structural capacity to act on it. The pair is the keystone: the interaction between degraded governance and degraded information created the structural conditions for catastrophe in ways neither frequency could have produced independently.

This co-keystone pattern — where the amplification pair itself is the structural driver — corresponds to the framework's finding in the Boeing analysis, where a Permission—Management co-keystone operated through the certification architecture rather than the banking information environment.

The framework ranks which dimensions, if degraded, produce the steepest system-wide resilience decline. The top three cascade pathways were: (1) Disruption Amplification (Thinness Keystone), (2) Metric-Reality Gap (Management Keystone), and (3) Revocability Risk (Permission Keystone). All three Keystones were simultaneously at maximum stress — a disproportionate share of each frequency's structural weight was in crisis.

In a structurally sound system, strength in one frequency absorbs compensatory stress for weaknesses elsewhere — a well-functioning information architecture might compensate for concentration risk by ensuring leadership sees it clearly enough to manage it. At SVB, no frequency was performing this stabilizing function. Every frequency was elevated, every amplification pathway was active, and no structural buffer existed to slow the cascade once triggered.


2. How Each Condition Developed: Trajectory and Pressure Sources

The structural state described above did not materialize overnight. The framework traces the temporal arc of each condition — when it emerged, how long it persisted, the trajectory from manageable to irreversible, and why the governance architecture could not intervene as conditions deteriorated.

Thinness: Concentration risk was the business model (1983–2023)

SVB's concentration in technology and venture capital was not an accident of timing but a defining feature of its forty-year business model. The bank was founded in 1983 to serve the innovation economy. By the pre-pandemic period, nearly half of US VC-backed companies banked with SVB. This represents a sustained migration toward a structural boundary under consistent pressure, a condition persisting well over two years. The pandemic-era liquidity boom drove deposits from $62 billion in to $200 billion by , a 220% increase against 26% for all FDIC-insured institutions. SVB's management invested this surge into long-duration held-to-maturity securities, locking in the concentration.

The critical inflection was the decision to shift heavily into HTM classification. This was not merely a portfolio allocation — it was a structural commitment. HTM accounting meant unrealized losses would not appear on the income statement or balance sheet, but it also meant the securities could not be sold without "tainting" the entire portfolio and triggering fair value recognition. The bank was, in effect, building a one-way door: easy to walk through going in, catastrophic to walk back through.

The trajectory was accelerating throughout 2022 — conditions were getting worse each quarter, not holding steady. As interest rates rose from 0.25% in March to 4.5% by December, unrealized losses on the HTM portfolio exploded from approximately $1.3 billion at year-end 2021 to $15.2 billion at year-end 2022. Simultaneously, VC funding activity declined 62% from its Q4 2021 peak, compressing the deposit base that was supposed to remain stable long enough for the securities to mature.

Why governance couldn't intervene on Thinness: Decision authority over portfolio allocation and concentration limits was nominally internal — SVB's board and management controlled investment decisions. But the information quality was a bidirectional failure. Upward, risk information from models and stress tests was being filtered and distorted before reaching the board; the Federal Reserve documented that liquidity concerns were not substantively reported to the board until . Downward, board directives about risk appetite were not translating into operational constraints — the board risk committee met eighteen times in 2022 but produced no binding limits that altered management behavior. No informal systems were compensating for the formal governance failure. People were not working around the problem; they were enduring it. The board had the authority to constrain concentration. It did not have the information to understand why it should, and when information did surface, it did not translate into action.

Permission: The control architecture eroded from two directions simultaneously (2018–2023)

The erosion was multi-layered and long-duration. The 2018 EGRRCPA raised the enhanced prudential standards threshold, removing SVB from stress testing requirements and liquidity coverage ratio (LCR) obligations. The Federal Reserve's post-mortem calculates that SVB's LCR never exceeded 100% between and February 2023 — had the standard applied, the bank would have been forced to take remedial action more than a year before failure. This regulatory tailoring was the macro-level permission failure; it persisted for years and was driven by an external statutory change that reduced control architecture.

At the micro level, the CRO departure in was acute, but it occurred against a chronic backdrop of weak board governance. The Federal Reserve's report documented that SVB's governance was rated "Satisfactory" through 2022 despite repeated observations of weakness stretching back to 2017. The supervisory approach emphasized accumulating evidence and reducing burden on firms — a cultural shift under the then-Vice Chair for Supervision that delayed escalation.

Why governance couldn't intervene on Permission: The control architecture for SVB's permission structure was partially outside the organization's control. The EGRRCPA and subsequent tailoring rules were federal statutory and regulatory decisions. The regulatory transition period — SVB entered the LFBO (Large and Foreign Banking Organization) supervisory portfolio with a "default view as satisfactory" and was given a long runway to meet enhanced standards — was a supervisory policy choice. The Federal Reserve's own report acknowledges that "supervisory policy placed a greater emphasis on reducing burden on firms." The "soft" regulatory approach meant that identified problems were documented but not enforced — the supervisory team discussed escalating to enforcement actions but never recommended a single formal enforcement action before the bank's failure.

Management: The information architecture was configured to suppress risk visibility (2020–2023)

The information architecture failure was long-developing. SVB's interest rate risk deficiencies were identified in CAMELS examinations (the standardized supervisory rating framework for banks) in 2020, 2021, and 2022 — but were communicated only as written advisories or verbal notifications, never as formal supervisory findings (MRAs/MRIAs) requiring remediation. Management's response to ILST shortfalls was to adjust model assumptions rather than address the underlying risk. In the first half of 2022, the bank realized $517 million in gains by unwinding $11 billion of interest rate hedges on its available-for-sale (AFS) portfolio — booking short-term profits while removing the protection that would have buffered against rising rates. By , SVBFG had removed the rest of its hedges protecting against rising rates and began positioning for rate decreases.

Whether these actions reflected deliberate concealment, institutional optimism bias, or the predictable consequence of a compensation structure tied to short-term earnings — the Federal Reserve documented all three as contributing dynamics — the structural outcome was the same: an information environment in which risk exposure became progressively less visible to the board and regulators during precisely the period when visibility would have enabled intervention. The Federal Reserve noted that management's compensation was tied to short-term earnings and equity returns, creating a structural incentive to manage the information picture rather than the underlying exposure.

Why governance couldn't intervene on Management: Management held internal decision authority over how risk data was collected, modeled, interpreted, and reported. Information flowed neither upward (board received incomplete risk picture) nor downward (risk function operated without a CRO and with a committee of new senior risk officers completing "baseline assessments"). The workaround absence is itself diagnostic. When information systems are recognized as broken, people build workarounds — informal channels, back-channel reporting, escalation to external parties. None of this was documented at SVB. The metric-reality gap had been absorbed into operating assumptions. People were not routing around the bad information; they were using it. The deeper structural condition: the information failure was not perceived as a failure at all.

The CrowdStrike analysis documents a structurally parallel phenomenon — the "validation trap," where cumulative success evidence substitutes for structural analysis and the absence of failure is mistaken for the presence of safety — operating through the software validation pipeline rather than the banking information environment. See the CrowdStrike analysis, Section 7.

Absence: Growth outpaced the organization's capacity to manage what it was building (2019–2023)

The CRO vacancy beginning was sudden — an acute event with an immediately degrading trajectory. But it overlaid a chronic condition: SVB's risk management infrastructure had never scaled proportionally to its growth. The bank tripled in size between 2019 and 2021, but the risk management function did not triple in sophistication or staffing. The Federal Reserve found that when SVB moved to the LFBO supervisory portfolio "it was clear to supervisors that there were serious problems at the bank." The risk management apparatus was designed for a $70 billion institution, not a $210 billion one.

Why Absence operated as amplifier rather than independent driver: After the CRO's departure, risk management was run by a committee of senior risk officers, many of whom were new to SVB and still completing baseline assessments. Decision authority was fragmented and accountability diffused. SVB was in violation of Regulation YY (the Federal Reserve rule requiring large banking organizations to maintain a Chief Risk Officer at all times). Technical risk data existed within the organization, but the interpretive authority to contextualize it for executive decision-making was absent — there was no CRO to say: these numbers mean we need to act now. The CRO vacancy's structural effects, however, radiated primarily through Permission (the authority vacuum in risk governance) and Management (the degraded information pipeline). This is the Concentration Dependency variant of Absence — the capability was not physically gone from the system but concentrated in a role that went unfilled, and its structural consequences were primarily expressed through the two frequencies it amplified.


3. The Structural Configuration That Prevented Self-Correction

By the time SVB's vulnerabilities reached critical severity, the organization's governance architecture had locked into configurations that prevented self-correction across three distinct mechanisms.

The governance lock on Thinness operated through information architecture failure. The concentration was chronic (well over two years of drift), and the board's eighteen risk committee meetings in 2022 suggest awareness of something being wrong — ruling out the deepest form of structural blindness. But the information architecture and decision authority configuration prevented awareness from converting into action. The concentration was visible in principle; the governance apparatus could not translate visibility into constraint. The eighteen risk committee meetings documented above — activity generating concern without constraint — confirm the pattern.

The governance lock on Permission operated through external structural constraint. The regulatory tailoring was outside SVB's control. The supervisory approach — emphasizing burden reduction and evidence accumulation — created a governance environment in which the bank received a long runway with weak enforcement. The permission architecture had been structurally thinned from the outside, a finding that connects SVB's Permission failure to its Thinness failure at a deeper level than the amplification pair analysis alone captures.

The governance lock on Management operated through structural absorption. The metric-reality gap was not perceived as a problem to be solved — it was the way SVB managed. Changing model assumptions was standard practice. Removing hedges to book gains was a management strategy, not a red flag. The Federal Reserve's finding that management compensation incentivized short-term earnings over sound risk management confirms this: when the incentive structure rewards the metric-reality gap, the gap becomes invisible to the people operating within it.

Absence retained modest intervention capacity — the CRO position could have been filled faster, and this was the shortest-duration condition with a clear intervention path. It did not reach the deeper structural lock of the other three frequencies.

Three of four frequencies showed governance configurations that prevented self-correction. The dominant pattern: an organization where the control architecture — internal information systems and external regulatory oversight alike — was configured to permit rather than constrain the trajectory toward failure. This is the structural signature of a Connected Crisis: the corrective mechanisms that should activate when individual frequencies deteriorate were themselves compromised, so each degradation made the next correction less likely.


4. Recovery Zone Timeline and Governance Gap

Investigators documented the CRO vacancy, the portfolio concentration, the hedge removal, the board oversight failures, and the regulatory tailoring as separate findings. The framework connects them as a single structural phenomenon: the measurable period during which the structural conditions demanded intervention, the capacity for intervention existed, but the governance architecture could not execute it. The framework maps each frequency's trajectory through three zones: Recoverable (demonstrated recovery capacity), At Risk (elevated vulnerability with uncertain recovery capacity), and Structurally Irreversible (no realistic recovery path given existing governance).

Thinness: Interest rate concentration

Recoverable (2019—Q3 2021): SVB's deposit surge was funding long-duration securities purchases, but the concentration was still at a scale where portfolio rebalancing, duration management, or hedging could have materially reduced exposure. The bank maintained approximately $15.2 billion in interest rate swaps at end of 2021 — insufficient relative to the portfolio but evidence that hedging infrastructure existed. The HTM portfolio was growing but had not yet reached the dominance that would make restructuring self-destructive. The governance infrastructure to execute a portfolio correction was also intact: the CRO was in position, the board risk committee was functional, and the hedging instruments were in place. The structural need for action was present but not acute. The governance capacity to act was present and operational.

At Risk (Q4 2021—Q1 2022): The HTM portfolio had grown to dominate the balance sheet, and the structural commitment was hardening. Unrealized losses were approximately $1.3 billion at year-end 2021 — significant but not yet capital-threatening. Interest rates had not yet risen dramatically, but the Federal Reserve had signaled the tightening cycle that would begin in . Intervention at this stage required: active duration management, expanded hedging, and potentially reclassifying portions of the HTM portfolio despite the accounting consequences. The CRO was still in position (Laura Izurieta would not depart until ). The hedging infrastructure still existed. The board risk committee had the authority to impose concentration limits. The structural need was escalating. The governance capacity to act was narrowing but still present. This is the inflection point — the last period where both need and capacity coexisted at sufficient levels.

Structurally Irreversible (Q4 2022 onward): Unrealized HTM losses reached $15.2 billion — equivalent to 89% of the bank's common equity tier 1 capital. Selling any HTM securities would taint the entire portfolio, triggering recognition of the full loss. The concentration had become a structural trap: holding the securities required deposit stability that was evaporating, but liquidating the securities would realize losses that exceeded available capital. The hedges had been removed. The CRO position was vacant. Management had first presented liquidity concerns to the board in — accurate information arriving months after the condition had crossed beyond correction. The structural need was desperate. The governance capacity to act had been eliminated.

Action Window Close: Q1 2022. This is the last period in which SVB possessed both the structural need for intervention and the governance capacity to execute it — at least in theory. The CRO was still in position. The board risk committee was functioning (albeit weakly). Interest rate hedges still existed — $15.2 billion in swaps at year-end 2021, not yet unwound. Unrealized losses were material but not catastrophic. A CRO with authority, a board willing to enforce concentration limits, and an information pipeline that accurately conveyed rate-risk severity could have initiated portfolio rebalancing. The theoretical availability of this window must be qualified: the governance configuration that made intervention infeasible later in 2022 was already substantially present in Q1 2022. The CRO was in position but operating within a board culture that had produced no binding risk constraints despite years of documented concerns. The hedges existed but were already being evaluated for unwinding. The action window's theoretical existence (structural components present) was cleaner than its practical existence (institutional appetite for bold portfolio restructuring not demonstrated). This distinction matters for the framework's governance gap methodology: the gap measures when structural capacity existed, but the practical probability of that capacity being exercised was already declining before the window formally closed.

Structural Closure: Q4 2022. By this point, the hedges had been removed (unwound for $517 million in gains during H1 2022, with remaining hedges stripped by ). The CRO position was vacant. Unrealized losses had grown to $15.2 billion, making any portfolio adjustment self-destructive. The deposit base was actively contracting as VC funding dried up.

The Governance Gap: approximately 6–12 months (Q1 2022 to Q4 2022)

During this window, the interest rate exposure was structurally addressable but governmentally infeasible. The specific governance components that failed during this period form a causal chain — each failure removing the capacity that would have been needed to prevent the next:

  1. Decision authority collapsed when the CRO departed in with no immediate replacement. The risk function operated by committee for eight months, with no single executive owning the portfolio-level risk decision. Regulation YY required a CRO at all times; the violation was identified but not enforced.
  2. Information quality degraded as management removed hedges (eliminating the financial instruments whose mark-to-market fluctuations would have made rate-risk severity visible on the income statement) and adjusted model assumptions to show ILST adequacy. The hedge removal was simultaneously a portfolio decision and an information architecture decision — it destroyed the measurement instrument that served as the warning system.
  3. Control structure failed as the board received information that did not surface liquidity issues and the regulatory approach emphasized evidence accumulation over enforcement. The board risk committee's eighteen meetings in 2022 produced activity without authority — concern without constraint.

The causal chain is tight: the CRO departure removed the decision authority needed to challenge management's hedge removal. The hedge removal eliminated the financial feedback mechanism that would have made the loss trajectory visible to the board. The board's information deficit prevented it from enforcing concentration limits. And the regulatory framework provided no external corrective because SVB was operating below the enhanced prudential standards threshold during precisely the period when those standards would have flagged the LCR violations.

Permission: Control architecture erosion

Recoverable (pre-2018): SVB was subject to Dodd-Frank stress testing and enhanced prudential standards that, while not perfectly calibrated, provided external structural constraint. The bank was small enough that the constraint architecture — LCR requirements, stress testing obligations, enhanced prudential standards — was proportionate to its risk profile.

At Risk (2018–2021): EGRRCPA raised the EPS threshold. SVB's rapid growth moved it into a regulatory gap — too large for community bank oversight, too small (or too recently grown) for large bank scrutiny. The transition to LFBO portfolio status carried a long runway with a default "satisfactory" rating. During this period, the bank tripled in size while the constraint architecture that should have scaled with it was being dismantled externally. The internal permission structure (board governance, CRO function) was nominally intact but weakening — the Federal Reserve documented governance deficiencies stretching back to 2017 that were communicated as observations rather than requirements.

Structurally Irreversible (2022): By the time the Federal Reserve's LFBO examination identified fundamental governance weaknesses (communicated ), the regulatory response operated at supervisory tempo rather than crisis tempo. Three MRIAs were issued; SVB was given 90 days to respond. No formal enforcement action was recommended before the bank's failure. The supervisory team discussed conducting an interest rate risk exam during 2022 but deferred it to Q3 2023 — a scheduling decision that placed the examination after the bank's failure.

Governance Gap: approximately 18–24 months (mid-2021 to early 2023)

The Federal Reserve's own supervisory apparatus was structurally configured to delay rather than accelerate response. Supervisors identified problems. They documented problems. They discussed escalating. They deferred to future examination cycles. The governance gap in Permission was not an absence of awareness — it was an institutional architecture that converted awareness into documentation rather than action.

Management: Metric-reality gap

Recoverable (pre-2021): Information deficiencies existed but were manageable. Interest rate risk had been rated satisfactory for years, and hedging infrastructure was in place. The metric-reality gap was present but narrow enough that the underlying risk exposure remained within the corrective capacity of normal governance processes.

At Risk (2021—mid-2022): The gap began widening as management shifted assumptions, removed hedges, and focused on net interest income (NII) protection in down-rate scenarios. Supervisors identified interest rate risk (IRR) deficiencies in CAMELS examinations but communicated them only as advisories — informal observations rather than formal findings requiring remediation. The distinction matters structurally: an advisory creates awareness without compelling action, which is precisely the governance configuration that allows a metric-reality gap to widen while appearing to be monitored.

Structurally Irreversible (H2 2022): When the board received substantive liquidity reporting in , the information was accurate for the first time in months — but the underlying condition was already beyond correction. The metric-reality gap had closed only because reality had caught up with the metrics: unrealized losses were now too large to ignore. The information architecture became accurate at the precise moment when accuracy could no longer change the outcome.

Governance Gap: approximately 12–18 months (early 2021 to mid-2022)

The information architecture was configured to suppress risk visibility during the period when intervention was feasible. The gap's duration corresponds almost exactly to the period during which hedge removal, model assumption changes, and compensation-driven short-term optimization were reshaping the information environment. By the time accurate information reached the board, it was a damage report rather than a decision input.


5. Intervention Feasibility Assessment

For each of the three highest-leverage interventions identified by the cascade pathway analysis, the framework asks the recursive question: could the organization execute this intervention given its actual governance configuration?

Intervention 1: Portfolio duration management

The highest-leverage intervention was reducing the HTM portfolio's duration exposure — through hedging expansion, partial reclassification, or structured divestiture of longer-duration securities.

Decision authority: Required the CRO. Position vacant April—December 2022. Decision authority did not exist during the critical window. The committee of senior risk officers that substituted for the CRO was completing baseline assessments, not executing portfolio-level restructuring.

Information quality: Required accurate interest rate risk modeling. SVB's models were deemed unreliable by the Federal Reserve. Management had removed the hedges whose mark-to-market fluctuations would have made the exposure visible on the income statement. The information to design the intervention correctly was structurally unavailable — not because the data did not exist, but because the financial instruments that would have translated the data into executive-visible signals had been unwound.

Control structure: Required board enforcement of concentration limits. The board received information that did not surface liquidity issues until . The control structure to translate a portfolio management decision into execution was absent. Eighteen risk committee meetings produced no binding constraints.

Prerequisite governance repair: Filling the CRO position, restoring information flow to the board, recalibrating risk models. Was this governance repair itself feasible? The board had the authority to hire a CRO faster — and eventually did, in . But the compensation structure that incentivized short-term earnings over risk management, the regulatory environment that de-emphasized burden on firms, and the board culture that held eighteen risk committee meetings without producing binding constraints all suggest that the kind of CRO needed — one empowered to challenge management's risk appetite and enforce portfolio constraints — would have required a board willing to overrule the CEO. There is no evidence in the documentary record that this willingness existed.

This is the recursive governance lock: the governance repair (empowered CRO) needed to enable the intervention (portfolio restructuring) itself required governance capacity (board willingness to overrule management) that the organization did not demonstrate. The intervention was structurally available but governmentally locked.

Intervention 2: Deposit diversification

Reducing the uninsured deposit concentration by actively diversifying the depositor base, attracting retail deposits, or establishing reciprocal deposit arrangements.

Decision authority: Internal — management and board could have pursued deposit diversification. But SVB's business model was built on sector concentration. Diversifying the deposit base would have meant fundamentally altering the bank's value proposition to its VC and startup clients.

Information quality: The concentration was visible. Unlike the interest rate exposure (hidden by model manipulation and hedge removal), the deposit concentration was a known, measured, marketed feature of the bank. This is a case where the information architecture was functioning — leadership knew the concentration existed — but the organizational identity prevented the information from being interpreted as risk.

Feasibility assessment: This intervention was structurally available but strategically inconceivable within SVB's operating culture. The bank marketed itself as "the bank" for the innovation economy. Deposit concentration was not a bug; it was the product. The intervention was technically feasible but practically impossible without a willingness to restructure the business model — a willingness that no documentary source suggests existed at any leadership level. The governance lock here is identity-level: the organization could not pursue the intervention without ceasing to be itself.

Intervention 3: Restoring regulatory constraint

Re-imposing enhanced prudential standards (LCR, stress testing) through either regulatory action or voluntary adoption.

Decision authority: Mixed. Regulatory reimposition was the Federal Reserve's decision. Voluntary adoption was SVB's decision. Neither occurred.

Information quality: The Federal Reserve's own surveillance identified SVB on a systemwide watch list in with a high adverse change probability warning. The information existed within the regulatory system. It did not translate into action proportionate to the risk.

Was regulatory self-correction feasible? The Federal Reserve's post-mortem acknowledges that supervisory culture had shifted toward reducing burden on firms and accumulating evidence before escalating. The institutional momentum against assertive supervision — reinforced by political pressure from Senate Republicans and the legacy of the EGRRCPA — meant that the regulatory control structure was itself structurally constrained from acting. The supervisors who identified the risk did not have the institutional authority (or cultural permission) to force rapid correction. This is the Permission frequency operating at the regulatory level: the gate that should have constrained SVB's trajectory was itself ungated.

Was voluntary adoption feasible? SVB could have voluntarily adopted LCR standards and enhanced stress testing. The Federal Reserve's analysis suggests that LCR compliance alone would have forced remedial action more than a year before failure. But voluntary adoption of stricter standards contradicted the same management incentives that drove the hedge removal and model manipulation. An organization whose information architecture was configured to suppress risk visibility would not voluntarily adopt a measurement standard designed to reveal it.


6. Distinctive Structural Findings

Finding 1: The hedge removal as information architecture destruction

A conventional post-mortem shows that SVB removed interest rate hedges during 2022, booking $517 million in short-term gains. The hedge removal was simultaneously a portfolio management decision and an information architecture decision. Interest rate swaps on the AFS portfolio generated mark-to-market fluctuations that would have made rate-risk severity visible on the income statement. Removing the hedges eliminated the financial feedback loop that would have forced the board to confront the exposure. This is not two problems (bad hedging + bad information); it is one structural mechanism: the destruction of a measurement instrument that was also a warning system. The framework identifies this as a Thinness—Management amplification mechanism — the concentration risk and the information failure are not separate conditions but a single structural dynamic where each reinforces the other.

The Boeing analysis documents a structurally parallel Thinness—Management amplification mechanism operating through the certification architecture — where single-sensor concentration risk was validated by an information system that filtered out the evidence of its danger — see the Boeing 737 MAX analysis, Section 6, Finding 1.

Finding 2: The board's eighteen meetings as structural diagnostic

Conventional analysis reads eighteen board risk committee meetings in 2022 (up from seven in 2021) as evidence of growing awareness and engagement. The meetings represent something more precise: activity without authority. The committee met two to three times per month and yet produced no binding risk limits, no mandate to restore hedging, no acceleration of CRO hiring, and no override of management's risk appetite. The Federal Reserve's post-mortem documents that these meetings generated documentation of concern but no enforceable constraints on management behavior — the characteristic output of governance that has awareness but not agency. This is the structural signature of the precise middle stage in a governance degradation arc. In the framework's terms, this is Permission architecture that appears functional from the outside (meetings are happening, agendas are set, minutes are taken) while lacking the structural capacity to constrain behavior. The eighteen meetings are not evidence of engagement; they are evidence of the gap between engagement and authority.

Finding 3: The regulatory divergence as diagnostic evidence

The Federal Reserve and FDIC post-mortems, while largely aligned in their conclusions, reveal a diagnostic tension. The Fed's report emphasizes supervisory culture and tailoring policy as causal factors; the FDIC's review (and the Federal Reserve OIG's subsequent investigation) more specifically faults the Federal Reserve Bank of San Francisco for failing to escalate despite having the evidence. This divergence between sources is itself structural evidence: the same institutional configuration that prevented the Fed from acting assertively also shaped the Fed's subsequent self-assessment. The BPI analysis of the examination records found that of 31 open supervisory findings at failure, only six concerned liquidity risk and only one concerned interest rate risk. The supervisory apparatus was substantially focused on the wrong things — a Management frequency failure operating at the regulatory level, not just the bank level.

Across the full six-case collection, information architecture emerges as the decisive structural battlefield — the frequency that most consistently determines whether vulnerability converts into catastrophe. SVB's case demonstrates this through the hedge removal's dual function: a single mechanism that simultaneously deepened the concentration risk and destroyed the measurement instrument that would have made it visible.

Finding 4: The HTM accounting classification as a structural one-way door

A conventional analysis treats the HTM accounting classification as a portfolio management decision. It functioned as a structural permission commitment: once securities were classified HTM, selling any portion would taint the entire portfolio and trigger recognition of all unrealized losses. This created a structural asymmetry — easy entry, catastrophic exit — that progressively eliminated the organization's intervention options as losses accumulated. The one-way door was not merely an accounting choice; it was a structural reduction in the organization's future permission to act. Each quarter that passed with rising rates narrowed the exit further, converting what began as a reversible portfolio allocation into an irreversible structural constraint. The CrowdStrike analysis documents a structurally parallel one-way door operating through kernel-level access architecture rather than accounting classification — see the CrowdStrike analysis, Section 7.


7. Where the Framework Doesn't Fit Cleanly

These are the points where the framework's logic encounters friction with the observed evidence.

Edge Case 1: The CRO vacancy as cross-frequency phenomenon

The CRO departure is simultaneously an Absence condition (critical expertise missing), a Permission condition (decision authority vacancy), and a Management condition (information pipeline degradation). The framework's frequency-level classification asks: which frequency does this belong to? The answer is all three, which creates an analytical tension. Classifying the CRO vacancy under Absence captures the expertise loss but understates the permission and information effects. Classifying it under Permission captures the authority vacuum but understates the knowledge gap. The framework handles cross-frequency effects through amplification pair analysis, but the CRO vacancy is a single event that is the amplification — it doesn't produce cross-frequency compounding so much as constitute it.

Calibration recommendation: The framework specification would benefit from a formal mechanism for "nexus events" — single organizational events or conditions that simultaneously degrade multiple frequencies not through compounding but through shared structural cause. The current architecture captures the effects of such events through amplification, but doesn't formally recognize the event itself as a distinct structural phenomenon. The Boeing analysis documents a structurally parallel nexus event in the certification delegation architecture — see the Boeing 737 MAX analysis, Section 7.

Edge Case 2: Management frequency — structural consequence regardless of intent

The framework's Management frequency measures the gap between what leadership believes and what is actually happening. SVB's case exposes a specific dynamic worth naming: the information environment was configured so that risk exposure became progressively less visible to the people who needed to see it. The hedge removal, the model assumption changes, and the delayed board reporting all had the structural effect of suppressing risk visibility — regardless of whether any individual intended that outcome.

The Federal Reserve's post-mortem documents behaviors consistent with multiple motivations: deliberate risk concealment, institutional optimism bias, and compensation-driven short-termism. It does not establish which was operative, and for the framework's purposes, the distinction does not change the structural finding. An information architecture configured to suppress risk visibility produces the same governance failure whether the configuration was deliberate, emergent, or incentive-driven. The structural consequence — leadership operating on a picture that diverged from operational reality during the window when accurate information would have enabled intervention — is identical across all three motivational accounts.

Calibration recommendation: The Management frequency's analytical vocabulary should distinguish between information systems that are broken (bidirectional failure from neglect or institutional decay) and information systems that are configured to produce a specific picture (whether through deliberate design, incentive alignment, or accumulated practice). The governance response — and the difficulty of intervention — differs materially between the two. The first responds to better measurement tools; the second requires intervention upstream of the information architecture itself.

The WeWork analysis documents a parallel Management frequency dynamic — where "community adjusted EBITDA" and the tech-company framing raise the same diagnostic question, with identical structural consequences regardless of whether the metrics were self-deception or deliberate narrative construction. See the WeWork analysis, Section 7.

Calibration: Frequency Activation and Structural Role

The Four Frequencies framework examines all four structural dimensions in every analysis — not because all four are equally consequential in every failure, but because a comprehensive diagnostic must assess all load-bearing dimensions to determine which are under primary stress, which are amplifying that stress, and which are absorbing compensatory load. In this case, Permission and Management operated as co-keystones driving the primary failure pathway, with Thinness as an independently elevated condition whose severity was structurally predetermined by the business model, and Absence operating as a secondary amplifier through the CRO vacancy's effects on risk governance and information architecture. The asymmetric activation pattern is itself a structural finding: it identifies where intervention carries the most structural leverage — the Permission—Management interaction — and where the framework's diagnostic value lies in confirming that a frequency, while elevated, is not the primary point of failure.

The framework identifies structural co-occurrence and amplification patterns, but cannot retrospectively determine minimal sufficient cause sets. Whether SVB would have survived with a functional CRO but the same HTM concentration, or with the same CRO vacancy but a properly hedged portfolio, involves counterfactuals the documentary record cannot resolve. The framework's claim is structural correspondence — that the frequency architecture maps coherently onto the documented failure dynamics — not causal sufficiency for any individual frequency.

Falsification Architecture

The structural analysis above could be wrong in specific, testable ways. The following conditions would weaken or invalidate the framework's conclusions if demonstrated:

Control case — institutions that managed comparable risk without structural failure

JPMorgan Chase provides the structural control case. Both institutions operated in the same interest rate environment and both held substantial securities portfolios with significant unrealized losses. JPMorgan's own asset management division charted the comparison explicitly: after adjusting common equity tier 1 (CET1) capital ratios for theoretical full liquidation of unrealized securities losses across 23 major U.S. banks, JPMorgan maintained the highest adjusted capital ratio while SVB's equity was effectively eliminated.

The structural differentiators were Permission and Management, not Thinness exposure alone. JPMorgan maintained continuous chief risk officer coverage, active hedging programs, and a deposit base diversified across consumer, commercial, and institutional segments — no single sector represented a coordination risk. SVB operated with an eight-month CRO vacancy, removed its remaining interest rate hedges mid-cycle, and concentrated 87.5% of its deposits in a single interconnected venture capital ecosystem where depositors were networked closely enough to coordinate withdrawal behavior.

The comparison must be read with a structural qualification: JPMorgan's scale (approximately 17 times SVB's total assets) and global systemically important bank (GSIB) designation provide systemic buffers unavailable to mid-size institutions. Some of JPMorgan's resilience reflects structural market position, not governance quality alone. The control case isolates Permission and Management as the governance variables that differentiated outcomes within comparable interest rate exposure — it does not claim that governance alone would have saved SVB at JPMorgan's scale disadvantage.

Control case — SVB's own pre-2021 hedging history

SVB itself maintained approximately $15.2 billion in interest rate swaps through 2021. The bank's earlier history demonstrates that it possessed the institutional capability to hedge duration risk. The capability was not absent — it was removed. This supports the framework's finding that the Management failure operated through an information architecture that became progressively configured to suppress risk visibility, and distinguishes the SVB case from an organization that never developed the relevant expertise (which would be a pure Absence failure).

Disconfirming condition 1

If SVB's failure can be fully explained by the magnitude of interest rate increases alone — that is, if no bank could have survived 425 basis points of tightening with SVB's asset composition regardless of governance quality — then the framework's emphasis on Permission, Management, and Absence as amplifying factors would be overclaiming. The JPMorgan control case argues against this: comparable rate exposure was managed successfully by institutions with intact governance architectures. However, the framework should acknowledge that the speed and magnitude of the 2022 rate cycle were historically unusual, and that a slower tightening path might have permitted SVB's governance failures to self-correct before reaching irreversibility.

Disconfirming condition 2

If the CRO vacancy had no measurable effect on the trajectory — that is, if the same hedge removal and model manipulation would have occurred with a CRO in position — then the framework's treatment of the CRO vacancy as a nexus event overstates its structural significance. The documentary evidence suggests otherwise (the hedge removal accelerated during the vacancy period, and the committee structure that replaced the CRO produced no comparable challenge to management decisions), but this cannot be definitively established from the available record.

Disconfirming condition 3

If the 2018 EGRRCPA regulatory tailoring had no effect on supervisory outcomes — that is, if the Federal Reserve would have applied the same supervisory approach to SVB even under pre-2018 enhanced prudential standards — then the framework's identification of regulatory tailoring as a Permission failure overstates the external constraint dimension. The Federal Reserve's own post-mortem partially supports this concern, noting that supervisory culture had shifted independently of the statutory changes. The framework's analysis should hold both factors (statutory and cultural) rather than attributing the Permission failure solely to EGRRCPA.

Alternative explanation

The bank run itself — triggered by the Silvergate closure and SVB's announcement of its AFS portfolio sale on — was driven by social media coordination and digital banking speed that no governance structure could have contained. If the proximate trigger was ungovernable regardless of structural health, the framework's emphasis on the governance gap may overstate the period during which intervention could have altered the outcome. The framework's response: the bank run was the trigger, not the cause. The structural conditions that made SVB vulnerable to a run (uninsured deposit concentration, unrealized losses exceeding capital, no hedging protection) were established over years and were the product of the governance failures the framework documents. An institution with SVB's Thinness exposure but functional Permission and Management architectures would have been less vulnerable to the same trigger — or would have had the structural capacity to respond without triggering recognition of catastrophic losses.


This analysis demonstrates structural pattern correspondence between The Four Frequencies framework's analytical architecture and the documented failure patterns at Silicon Valley Bank. Federal regulators, supervisory inspectors, and independent analysts documented the CRO vacancy, the portfolio concentration, the hedge removal, the board oversight failures, and the regulatory tailoring as separate findings. The framework connects them as a single structural phenomenon: a Connected Crisis in which every frequency was elevated, four of six amplification pairs were active, and the governance architecture was configured to permit rather than constrain the trajectory toward failure. The claim is structural explanatory power — not predictive accuracy.

The full evidentiary foundation for this analysis draws on 13 verified citations in the Evidence Library.

→ View all sources in the Evidence Library
  1. CIT-628 Board of Governors of the Federal Reserve System. Review of the Federal Reserve's Supervision and Regulation of Silicon Valley Bank. .
  2. CIT-629 Federal Deposit Insurance Corporation. FDIC's Supervision of Signature Bank. .
  3. CIT-630 Federal Reserve Office of Inspector General. Material Loss Review of Silicon Valley Bank. Report 2023-SR-B-013. .
  4. CIT-631 Bank Policy Institute. A Failure of (Self-) Examination: A Thorough Review of SVB's Exam Reports Yields Conclusions Very Different From Those in the Fed's Self Assessment. .
  5. CIT-632 Silicon Valley Bank Financial Group (SVBFG). SEC Filings: Annual Reports (10-K) and Quarterly Reports (10-Q), .
  6. CIT-633 Federal Financial Institutions Examination Council (FFIEC). Call Report Data for Silicon Valley Bank, .
  7. CIT-634 Economic Growth, Regulatory Relief, and Consumer Protection Act (EGRRCPA). Public Law 115–174, 2018.
  8. CIT-635 Congressional Research Service. Bank Failures: The FDIC's Takeover of Silicon Valley Bank and Signature Bank. Updated 2023.
  9. CIT-636 FDIC. Quarterly Banking Profile and Deposit Insurance Statistics, .
  10. CIT-682 Cembalest, Michael. Eye on the Market: Silicon Valley Bank Failure. J.P. Morgan Asset Management, .
  11. CIT-683 JPMorgan Chase & Co. Annual Report on Form 10-K, 2022.

Frequently Asked Questions

What caused Silicon Valley Bank to collapse?

SVB's collapse resulted from structural conditions that accumulated over years — concentrated deposit base, removed interest rate hedges, a chief risk officer vacancy, and information architecture that obscured portfolio risk from the board. The governance architecture that could have corrected course was systematically dismantled before the March 2023 bank run.

Could the SVB collapse have been prevented?

The Four Frequencies analysis identifies a six-to-twelve-month governance gap during which intervention was structurally possible but governmentally infeasible. The same forces that created SVB's vulnerability had simultaneously degraded the board's capacity to address it.

What does it mean that SVB was "structurally irreversible" before it collapsed?

Approximately eighteen months before the March 2023 bank run, SVB's conditions had crossed a threshold the organization could no longer reverse on its own. The held-to-maturity accounting classification had converted $91 billion in securities into a one-way door: selling any portion would taint the entire portfolio and force recognition of all unrealized losses. The chief risk officer position sat vacant for eight months while rates climbed. The board's risk committee was meeting two to three times per month and producing no enforceable constraints on management behavior. And the hedge removal had eliminated the financial feedback mechanism that would have made rate-risk visible on the income statement. By the time the conditions became externally apparent, every governance mechanism that could have corrected course had already been dismantled.

Why did the SVB board meet eighteen times and still fail to act?

The eighteen board risk committee meetings in 2022, up from seven in 2021, look like engagement. They are actually evidence of the gap between engagement and authority. This is the precise middle stage in a governance degradation arc: Permission architecture that appears functional from the outside (meetings happen, agendas are set, minutes are taken) while lacking the capacity to constrain behavior. The committee generated documentation of concern but no binding risk limits, no mandate to restore hedging, no acceleration of CRO hiring, and no override of management's risk appetite. Activity without authority. That is the signature of governance that has awareness but not agency.

How did removing interest rate hedges destroy SVB's warning system?

The hedge removal is this case's central finding, and it operates through a single mechanism doing two things at once. Interest rate swaps on the available-for-sale portfolio generated mark-to-market fluctuations that would have forced the board to confront rate-risk exposure on the income statement. Removing them booked $517 million in short-term gains while eliminating the financial feedback loop that made the underlying risk visible. This is not two separate problems (bad hedging plus bad information). It is one mechanism: concentration risk and information failure reinforcing each other through a single action. The Thinness and Management frequencies compound here because the same decision that deepened the exposure also destroyed the instrument that would have measured it.

Why didn't banking regulators prevent SVB's collapse?

Of 31 open supervisory findings at the time of SVB's failure, only six concerned liquidity risk and only one concerned interest rate risk. The supervisory apparatus was substantially focused on the wrong conditions. The Federal Reserve's own post-mortem emphasizes supervisory culture and tailoring policy as causal factors, while the FDIC review and the Federal Reserve OIG investigation more specifically fault the San Francisco Fed for failing to escalate despite having the evidence. That divergence between institutional self-assessments is itself revealing: the same configuration that prevented assertive regulatory action also shaped the subsequent analysis of why action was not taken. The Management frequency failure was not confined to the bank. It operated at the regulatory level as well.

What does the SVB analysis mean for organizations that look healthy on standard metrics?

SVB appeared well-capitalized by every conventional measure while its governance architecture was being systematically dismantled beneath the surface. The held-to-maturity classification concealed unrealized losses. The hedge removal eliminated the measurement instrument that would have surfaced risk. The board's meeting frequency created the appearance of oversight. Capital ratios, board activity, audit compliance: all read green. The conditions beneath them were compounding toward irreversibility. Organizations whose resilience assessments depend primarily on reporting metrics face the same structural exposure: those metrics can remain reassuring while the conditions they are supposed to detect accumulate out of view.

Where does the framework encounter analytical friction in the SVB case?

Two points of friction. First, the CRO vacancy simultaneously degraded three frequencies through a single structural cause: Permission (risk authority absent), Management (risk information flow disrupted), and Absence (institutional risk knowledge departed with the CRO). The framework's frequency-by-frequency architecture does not have a clean way to classify an event that is simultaneously a Permission, Management, and Absence condition. The analysis recommends the concept of a nexus event, where a single structural change degrades multiple frequencies through shared cause. Second, the Management frequency analysis must remain agnostic on intent. Whether SVB's leadership deliberately obscured risk information or genuinely failed to understand it produces the same structural outcome: the board lacked the information quality necessary for effective oversight. The framework diagnoses the structural consequence regardless of which interpretation is correct, and names the ambiguity as itself diagnostically significant.

Are the structural conditions documented in the SVB case unique to banking?

No. The one-way door (a classification or architectural decision that is easy to enter and catastrophic to exit) appears independently in the CrowdStrike analysis, where kernel-level access created the same structural asymmetry through technology architecture that HTM classification created through accounting architecture. The measurement destruction mechanism (the same action that deepens risk also eliminates the instrument that would detect it) has parallels in the Boeing case, where certification delegation placed the entity creating safety information in charge of evaluating it. The structural conditions documented at SVB operate through banking-specific mechanisms but the underlying patterns are present wherever an organization's risk measurement systems can be degraded by the same forces that increase the risk being measured.