Governing Doctrine

The doctrine
is the architecture.

The governing doctrine of the Signals of Agency Foundation is not a set of aspirational principles. It is the structural specification to which every authorized deployment is held. These are not guidelines that yield under pressure. They are architectural constraints that hold because they are built into the systems that operate under this Foundation's authority — and because the Foundation's independence from commercial structure ensures they cannot be traded away.

Core Governing Statement

Class C does not escalate. It informs. What authorized NGOs choose to do with that awareness is entirely their determination. The system has no opinion on what should happen next. It has no mechanism for forming one.

I

No System Governed by This Foundation Escalates

Escalation is defined as any system action that does more than record and transmit a signal to authorized recipients. A system governed by this Foundation does not alert. It does not notify. It does not trigger. It does not dispatch. It does not contact any authority, any operator, or any party not expressly defined as an authorized recipient under the governing SSA.

The system witnesses. The system records. The system transmits the record to authorized NGOs. That is the full scope of system action. Everything beyond that scope belongs to a human.

Structurally Prohibited
  • Real-time alerts to any party
  • Automated notifications to law enforcement or emergency services
  • Any action triggered by pattern detection without human decision
  • Escalation pathways of any kind at the system level
II

The Signal Is Not the Person

A signal is a record of a brief expression of agency. It is not a record of a person. The system does not identify individuals. It does not associate signals with identities. It does not collect, store, or transmit any information that would allow an authorized NGO, a host, or any other party to determine who expressed a signal.

The distinction between witnessing an expression of agency and identifying the person who expressed it is not semantic. It is the structural boundary that makes this infrastructure deployable in public environments where people have not consented to identification — and where requiring that consent as a condition of access would defeat the purpose of the infrastructure entirely.

III

The Host Is Blind

The host environment — the hotel, transit hub, retail environment, or educational institution in which infrastructure is deployed — does not receive, access, or hold any record produced by the system. The host is blind to the signal record by design. Not by policy. Not by agreement. By architecture.

This is not a limitation on the host's participation. It is the condition that makes the host's participation legally and operationally possible. A host that could access the record would carry legal exposure for what it knew and did not act on. A host that cannot access the record carries none. The architecture protects the host by ensuring there is nothing for the host to know at the system level.

IV

Authorization Is Not Self-Serve

Access to the aggregated pattern record is not available to any organization that wishes to have it. It is available only to organizations that have completed the Foundation's authorization process, executed a System Scope Acknowledgement, and demonstrated alignment with the mission and governance standards under which the Foundation operates.

The Foundation's authorization process exists because access to this record — even in aggregated, non-identifying form — carries responsibility. Organizations that hold early awareness of patterns of expressed agency are expected to treat that awareness with the discipline the governance structure was built to enforce.

Authorization Requirements
  • Completed Foundation authorization review
  • Executed System Scope Acknowledgement (SSA)
  • Demonstrated mission alignment
  • Ongoing compliance with Foundation governance standards
V

Structural Impossibility Is the Standard

The governing doctrine of this Foundation does not rely on policy compliance. It does not rely on organizational commitment. It does not rely on the good intentions of system operators or authorized NGOs. It relies on structural impossibility.

The system cannot escalate because it has no escalation pathway. The host cannot access the record because no pathway exists by which the host could receive it. The system cannot identify persons because it does not collect identifying information. These are not things the system is prohibited from doing. They are things the system cannot do. The distinction matters because intention does not hold. Structure does.

"

The signal was witnessed. Not determined. Action belongs to a human at every level, in every environment, without exception.

Governing Doctrine · Signals of Agency Foundation

If your organization is considering operating under this doctrine, the right next step is understanding what the authorization process involves. If you have questions about specific deployments, begin on the Contact page.