OPEN PUBLICATION | PUBLIC CATALOG RECORD
DOC AA-2026.III | EDITION 01
Authority&Architecture
Imprint of Record · Est. 2026
Acquire
AA / III.II.I · THREE VOLUMES · 2026 · RECORD 02

Autonomous Authority. Governing Machine-Speed Power
from Sensor to Strategy

The first book was an equation. This book is a world. A three-volume work extending the Human-Machine Authority Architecture into the operational layer across orbital, cyber, allied, cognitive, and extraterrestrial domains, and submitting the architecture to the empirical record of Operation Epic Fury.

“Operation Epic Fury processed 437 targets per day for 29 days. Human cognitive capacity processes targets at 10 to 20 per day. The arithmetic of autonomous warfare is no longer a forecast. It is operational record.”

From Chapter 1
Master Equation α = β · (C / τ) · e−γE
FIG·01 AA · HMAA VOLUME I FOUNDATIONS & ENGINEERING PROMETHEUS GOLEM TALOS LABYRINTH OS CASSANDRA MAD SELCO DAMOCLES PANDORA PENELOPE
Title
Autonomous Authority
Author
Burak Oktenli
Foreword
Prof. Dr. Cagatay Oktenli
Volumes
I · II · III
Pages
480 · 458 · 484
Publisher
Authority & Architecture
§ 01 / THE TRILOGY DOC AA-2026.I/II/III

Three volumes.
Fourteen domains.

The architecture, the operational layer, the empirical record. Autonomous Authority is published in three sequential volumes: theoretical, applied, and empirical. Volume I includes a foreword by Prof. Dr. Cagatay Oktenli, M.D., Colonel (Retired), Turkish Armed Forces. Each volume is independently rigorous; collectively a single argument about how authority must be governed when machine speed exceeds human cognition.

FILE I · FOUNDATIONS & ENGINEERING
B U R A K  O K T E N L I AUTONOMOUS AUTHORITY VOLUME I FOUNDATIONS & ENGINEERING PROMETHEUS GOLEM TALOS LABYRINTH OS CASSANDRA MAD SELCO DAMOCLES PANDORA PENELOPE Governing Machine-Speed Power from Sensor to Strategy
VOL. I § Foundations & Engineering

Foundations and Engineering The framework. Six engineering modules.

Volume I formalizes the master equation, derives the Authority Migration Function (Δα), and specifies the six engineering modules that constitute the architecture. Includes a foreword by Prof. Dr. Cagatay Oktenli and a retroactive simulation against the 2008 financial crisis.

Part I · Theoretical Foundations
  • Structural Incompatibility of Human Control
  • The HMAA Formal Model
  • Five-Tier Authority Spectrum
  • The C, E, and G Variables
Part II · The Engineering Stack
  • SATA · Sensor Attestation
  • ADARA · Adversarial Deception
  • HMAA Engine · Real-Time Authority
  • MAIVA, FLAME, CARA, RTFDM, SALM
480 pages · 15 chapters Print  979-8-9958757-6-5 eBook 979-8-9958757-7-2
FILE II · OPERATIONAL LAYER & DOMAINS
B U R A K  O K T E N L I AUTONOMOUS AUTHORITY VOLUME II OPERATIONAL LAYER & DOMAINS PROMETHEUS GOLEM TALOS LABYRINTH OS CASSANDRA MAD SELCO DAMOCLES PANDORA PENELOPE Governing Machine-Speed Power from Sensor to Strategy
VOL. II § Operational Layer & Domains

Operational Layer and Domains Fourteen domains. Four failure modes.

Five chapters of operational analysis followed by fourteen domain chapters: orbital, cyber, allied, cognitive, and extraterrestrial authority; runtime hardware enforcement; multi-physics coupling; swarm emergence; counter-autonomy; quantum-resilient cryptographic foundations.

Part III · Operational Layer
  • Four-Archetype Convergence
  • Speed Wins · Temporal Compression
  • The E_econ Revolution
  • The G-Variable in Practice
Part IV · Operational Domains
  • Orbital, Cyber, Allied, Cognitive
  • Extraterrestrial · Multi-Physics
  • Swarm · Recursive Self-Improvement
  • Counter-Autonomy · Quantum-Resilient
458 pages · 19 chapters · 4 case appendices Print  979-8-9958757-8-9 eBook 979-8-9958757-9-6
FILE III · EMPIRICAL VALIDATION
B U R A K  O K T E N L I AUTONOMOUS AUTHORITY VOLUME III EMPIRICAL VALIDATION PROMETHEUS GOLEM TALOS LABYRINTH OS CASSANDRA MAD SELCO DAMOCLES PANDORA PENELOPE Governing Machine-Speed Power from Sensor to Strategy
VOL. III § Empirical Validation

Empirical Validation The architecture survived. The test transformed it.

Submits the framework to the empirical record of Operation Epic Fury, develops a ten-myth analytical taxonomy as the civilizational substrate of governance, and concludes with an Open Letter to the Seventh CCW Review Conference for distribution to delegations ahead of the November 2026 meeting in Geneva.

Part V · Critical Infrastructure
  • Energy · Human · Economic Foundations
  • Subterranean & Maritime Authority
  • The Six Platforms · Legislative Architecture
Part VI · The Culminating Argument
  • Governance Deficiency or Fate
  • Governance Convergence
  • Ancient Era and Ten Myths
Conclusion + Open Letter to CCW
484 pages · 10 chapters · 7 theatre appendices Print  979-8-9959471-0-3 eBook 979-8-9959471-1-0
§ 02 / THE FRAMEWORK REF HMAA-AA/I.II

An equation that makes lethal autonomy governable.

The Human-Machine Authority Architecture parameterizes the migration of lethal authority through three core variables and a governance ceiling anchored in international humanitarian law. Volume I specifies six engineering modules that constitute the Computation, Enforcement, and Audit triad. Volume II extends the architecture into the operational layer across fourteen distinct authority domains.

Master Equation · HMAA
α = β · (C / τ) · e−γE
Authority Migration Function
REF · AA-VOL-I § 3.2
τ
Temporal Compression
The collapse of decision time toward zero. As τ decreases, machine authority α rises. The kill chain compels migration from the human node when biological reaction time exceeds engagement windows.
C
System Confidence
Measured reliability of the autonomous decision stack. Authority scales linearly with C: as confidence falls, authority must regress to the human tier. Confidence collapse is itself a governance event.
E
Escalation Coupling
The damping coefficient e−γE exponentially restricts machine authority as engagements couple to strategic escalation. The higher the coupling, the closer authority returns to human command.
αcap
Governance Ceiling
The legally-anchored upper bound on machine authority, derived from international humanitarian law. The ceiling is enforced even when β·(C/τ)·e−γE would otherwise permit higher migration.
REF VOL I / Part II

Six engineering modules.

MODULE 01 · SENSING

SATA

Sensor Attestation & Trust Anchoring

Cryptographic hardware attestation of sensor data at the source. Authority computation depends on inputs that cannot be forged or tampered between sensor and decision substrate.

MODULE 02 · DETECTION

ADARA

Adversarial Deception-Aware Risk

Continuous adversary modeling. Detects spoofing, poisoning, and evasion attacks that would otherwise corrupt the C variable and produce false confidence in autonomous action.

MODULE 03 · COMPUTATION

HMAA Engine

Real-Time Authority Computation

FPGA-implemented engine evaluates α = β · (C / τ) · e−γE at line rate. Decision-window middleware enforces the normative envelope at machine speed.

MODULE 04 · INTEGRITY

MAIVA

Multi-Agent Integrity Verification

Byzantine fault tolerance for distributed authority computation. No single compromised agent can authorize action beyond its envelope; consensus is cryptographically required.

MODULE 05 · LATENCY

FLAME

Flash-War Latency Architecture

Sub-millisecond authority decisions for engagement windows below human cognitive processing. Hardware interlocks prevent escalation when timing constraints exceed reasoning capacity.

MODULE 06 · RECOVERY

CARA

Cognitive Authority Recovery

Reversion architecture: when confidence collapses, authority must regress to the human tier. CARA is the structural guarantee of the Vertical Alignment Principle under failure conditions.

REF VOL II / Part IV

Fourteen operational domains.

DOMAIN 21
Orbital Authority
DOMAIN 22
Cyber Authority
DOMAIN 23
Allied Authority
DOMAIN 24
Cognitive Authority
DOMAIN 25
Extraterrestrial
DOMAIN 26
Runtime Enforcement
DOMAIN 27
Multi-Physics
DOMAIN 28
Temporal Authority
DOMAIN 29
Swarm Emergence
DOMAIN 30
Recursive Self-Improvement
DOMAIN 31
Verifiable Autonomy
DOMAIN 32
Distributed Governance
DOMAIN 33
Counter-Autonomy
DOMAIN 34
Quantum-Resilient
REF VOL I / Foreword & Cover

Ten codenames.

The mythological codenames around the cover spiral are not ornament. Each maps to a specific mechanism in the architecture. "the Golem's emet rendered in normally-open relays, Ariadne's thread woven through a labyrinth of 437 daily targeting decisions, Mevlana's open door translated into physics."

Prometheus

The fire that cannot be unlit. Once authority is delegated to autonomous nodes, it cannot be wholly recalled. The Pandora's Box analysis: dSα/dt ≥ 0.

Golem

Hardware interlock; the emet inscription. The hardware-enforcement commitment is the Golem's emet rendered in normally-open relays. Erase the inscription, the system halts.

Talos

Bronze guardian with a single vein. The single point of failure that makes autonomy lethal. Architectural hedge: distribute authority such that no Talos exists.

Labyrinth OS

Ariadne's thread through 437 daily decisions. The SALM audit chain. Without the thread, the Minotaur roams unconstrained; with it, every authority migration is traceable.

Cassandra

True warning, ignored. The C variable's calibration failure mode: when system confidence is correct but institutional trust collapses, authority migrates anyway.

MAD

Mutually Assured Destruction. The escalation coupling coefficient e−γE. As nuclear consequences become probable, machine authority must asymptotically approach zero.

Damocles

Authority hanging by a thread. The governance ceiling α_cap. The legally-anchored upper bound that constrains migration even when the equation would permit higher.

Pandora

The irreversibility analysis. What escapes from autonomous deployment cannot be recalled, but Elpis (Hope) remains: the structural guarantee that human accountability traces every authority migration.

Penelope

The reweaving of authority. CARA's recovery architecture. Every night what the day's autonomy asserted is unwoven and reauthored under deliberate human review.

Selco

The quiet protector. RTFDM and SALM, the failure detection and secure audit modules. Constant watch without intervention, until intervention becomes the only correct action.

§ 03 / VALIDATION CASE AA-VOL-III / EPIC FURY

The framework survived the test.
What it revealed transformed it.

Volume III submits the architecture to the empirical record of Operation Epic Fury, the most complex multi-domain conflict of the algorithmic age. The HMAA emerges from validation as more than a governance scheme. It is an adaptive meta-architecture.

CASE FILE · AA-VOL-III PRIMARY-SOURCED

Operation Epic Fury.

For 29 days, the autonomous pipeline processed 437 targets per day. Human cognitive capacity processes targets at 10 to 20 per day. The arithmetic of autonomous warfare is no longer a forecast. It is operational record.

The extended dataset comprises 3.2 million engagement records across 61 days of high-intensity operations at an operational cost of approximately $891 million per day. The framework survived the test, but only after extending from three core variables to a family of new governance concepts (Ψ targeting momentum, Π cross-theatre propagation, the E_econ revolution) that Volume III makes explicit.

The work concludes with an Open Letter to the Seventh CCW Review Conference, distributed to delegations ahead of the November 2026 meeting in Geneva.

Sources: CENTCOM · JINSA · ISW
Conflict Archetypes · Tested Simultaneously
01
Counterterrorism

Discrete-target authority migration under positive identification constraints. Tier 2 to 3 dominant. E_perception high; kinetic E low.

02
Grey-Zone Operations

Sub-threshold engagement under attribution ambiguity and escalation coupling. E_deny dominant; E_econ significant.

03
Asymmetric Conflict

Defensive authority compression against missile and drone arsenals at saturation. Selectively compressed τ; full E spectrum.

04
High-End Engagement

Peer-conflict envelopes including autonomous swarm warfare and contested kill chains. Tier 3 to 4 dominant; nuclear-coupled E.

§ 04 / THE AUTHOR FILE AA-PR/01

Burak Oktenli.

Independent autonomous systems governance researcher. Architect of the Human-Machine Authority Architecture and the AUTHREX research program comprising seven governance architectures across defense, automotive, maritime, and critical infrastructure domains.

Burak Oktenli is an independent researcher working at the intersection of autonomous systems engineering, decision theory, and military doctrine. Autonomous Authority is his second three-volume work, following The Authority Equation.

The work formalizes the conditions under which decision authority must transition between human and machine at machine speed, and the governance machinery required to keep that transition lawful, auditable, and reversible.

“The first book was an equation. This book is a world.”
Foreword, Volume I · Prof. Dr. Cagatay Oktenli

Volume I includes a foreword by Prof. Dr. Cagatay Oktenli, M.D., Colonel (Retired), Turkish Armed Forces, Specialist in Internal Medicine and Geriatrics, GATA, 1983 to 2011, the author's father and the bridge between three thousand years of moral reasoning and the autonomous systems that will determine whether that reasoning survives the century.

The work is dedicated "to the three thousand who perished on the eleventh of September, two thousand and one" and to the firefighters, police officers, and paramedics who walked into the burning towers knowing they might not walk out. Architecture does not grieve. Algorithms do not mourn. But every equation in the volume was written with them in mind.

The research is validated across six cross-domain prototype platforms, twenty-four open-access deposits on Zenodo and SSRN, and four U.S. provisional patents. Verifiable through ORCID 0009-0001-8573-1667.

PERSONNEL RECORD · FILE AA-PR/01

Education

Georgetown University
M.P.S. Applied Intelligence (STEM) · expected 2027
Lynn University
M.B.A. International Business
University of South Florida
B.Sc. Computer Science Engineering (STEM)

Verifiable Identity

ORCID 0009-0001-8573-1667

Provisional Patents

HMAA 63/999,105 · Mar 7, 2026
CARA 64/000,170 · Mar 9, 2026
SATA 64/002,453 · Mar 11, 2026
FLAME 64/005,607 · Mar 14, 2026

Society Memberships

IEEE #102193505 · AIAA #1936005 · ACM #9952787 · AAAI #656504 · INFORMS #2009712 · NDIA #1700222 · Sigma Beta Delta Lifetime #2007930

Validation

Six cross-domain prototype platforms · twenty-four open-access deposits (Zenodo, SSRN) · View full verification record →
Authority
& Architecture
Imprint of Record · Established 2026
§ 05 / THE IMPRINT

Authority & Architecture is the publishing imprint dedicated to the formal governance of autonomous systems: the books, monographs, and technical records that define how decision authority is parameterized, migrated, and bounded when machine speed exceeds human cognition.

Our publications target the readership that operates at the intersection of policy and engineering: defense planners, doctrine writers, AI governance researchers, acquisitions program offices, and the legal infrastructure that bounds them. Our standard is institutional. The rigor of a defense research center, the clarity of a technical manual.

All titles distributed via the IngramSpark global network. Print and ebook formats. ISBNs registered through Bowker.