Saturday, March 7, 2026

[A Necessary Abomination] The Starling Doctrine

 

THE STARLING DOCTRINE

A Coalition Framework for Anti-Capitalist Victory Through Cooperation, Emergence, and Virtual Hierarchy


DEFINITIONS AND FRAMEWORK CONTEXT

This document emerges from a cross-impact scenario modeling exercise that analyzed twelve categories of economic life simultaneously across seven distinct ideological towers — organized clusters of belief, prescription, and institutional power that each propose a different economic future. The seven towers are: Anti-Capitalist, Hyper-Capitalist, Technofascist, Ivory Tower Academia, Respected Individual Futurists, Traditional and Sacred Economics, and Science Fiction Predictive. Each tower contains multiple factions with internal disagreements but shares enough foundational assumptions to constitute a coherent worldview cluster.

Cross-impact scenario modeling is the practice of running these towers against each other simultaneously across all twelve economic categories rather than analyzing any single tower or category in isolation. The artificial siloing of these towers from each other — the way labor economists don't talk to monetary theorists who don't talk to ecologists who don't talk to theologians — is not accidental. It is maintained. It serves specific interests. Cross-impact analysis makes the connections visible that siloing conceals.

The twelve economic categories are: Production and Labor, Money and Exchange, Ownership and Property, Energy and Resource Flows, Governance and Enforcement, Trade and Supply Chains, Demographics and Human Capital, Technology and Automation, Ecology and Planetary Limits, Culture and Meaning Systems, Inequality and Distribution, and Information and Knowledge Economics.

When all seven towers are run simultaneously against all twelve categories and assessed by a single metric — does this produce more or less human flourishing for the people at the bottom of the system — one conclusion emerges clearly. The anti-capitalist tower is correct in its diagnosis. Every other tower produces, if fully realized, the progressive concentration of flourishing in fewer hands until the category becomes operationally meaningless for most people alive. The anti-capitalist execution has been a catastrophe. This document is about fixing that.

A note on the metric: "human flourishing for the people at the bottom" means, at minimum, material conditions measurable without specialist equipment — whether people are fed, housed, healthy, physically safe, and able to participate in decisions that affect their lives. It does not mean happiness scores or self-reported satisfaction, which are gameable. It means observable material baselines, assessed over time, verified by people who live the conditions rather than people who administer programs. When in doubt, the person experiencing the condition is a more reliable witness than the institution claiming credit for improving it.


THE ETHICAL OPERATING SYSTEM

This framework runs on a specific ethical foundation that must be stated before the strategy can be understood. The foundation is this: kindness is the arbiter of necessity. Every action, tactic, and strategic decision is filtered through a single question — is this necessary, necessary for whom, and at what human cost to actual humans living actual lives? This is not kindness in the sense of softness or accommodation. It is kindness as a precision instrument. It refuses to abstract people into categories, classes, or historical forces. It insists that the people at the bottom of every other tower's outcome are the non-negotiable metric against which all decisions are measured.

This metric cannot be gamed in its strongest form: the people experiencing the conditions are the primary witnesses. It can be distorted — redefined narrowly to exclude inconvenient populations, or measured selectively to show gains in one category while ignoring losses in another. The framework names this distortion explicitly as a form of capture and routes all metric disputes through the outward authority loop's assess function rather than through internal coalition politics.

It is the framework's immune system against becoming what it opposes. When a movement that begins by opposing hierarchy becomes hierarchical, when a movement that begins by opposing violence becomes violent, when a movement that begins by opposing exploitation becomes exploitative, it is because it lost this metric. The people at the bottom got worse. The movement stopped noticing.


PART ZERO: THE CRISIS — WHY THIS MUST WORK

We are inside a ten-thousand-year crisis event. Five vectors are converging simultaneously and accelerating each other. Ideological collapse has produced a vacuum that the most organized and ruthless actors are filling by default [Gramsci — the old is dying and the new cannot yet be born]. Economic collapse has concentrated wealth to levels not seen since the decades before the two largest wars in human history [Piketty 2014 — Capital in the Twenty-First Century; World Inequality Database 2022 — top 10 percent owns 76 percent of global wealth]. Technological transition is occurring inside a system of radical wealth concentration with no democratic governance of how the tools are deployed, which means the people building the tools are setting the defaults for everyone else [Acemoglu and Johnson 2023 — Power and Progress]. Cultural collapse is destroying the shared meaning systems that make collective action possible [Putnam 2000 — Bowling Alone; Haidt and Rausch 2022 — After Babel]. And climate collapse is the terminal vector — the one that converts all the others from recoverable crises into potentially unrecoverable ones [IPCC Sixth Assessment Report 2021-2022; Rockstrom et al. 2009, updated 2023 — six of nine planetary boundaries now exceeded].

These vectors do not operate in sequence. They compound. Economic collapse deepens cultural fracturing. Cultural fracturing fills with authoritarian ideology. Authoritarian ideology captures the technological transition. Captured technology entrenches economic concentration. Entrenched economic concentration paralyzes the collective action required to address climate collapse. Climate collapse then operates on a population already weakened by everything else simultaneously.

The people who will pay the highest price for failure are the people at the bottom of every other tower's outcome. They are already paying it. The time available is measured in years and decades, not generations. There is no version of this in which slow, divided, or dogmatic is acceptable. This document is about winning now, with the coalition available now, using what actually works rather than what the correct theory says should work.


PREAMBLE: THE HONEST STARTING POSITION

Anti-capitalism is correct. Every other tower is wrong in the specific sense that their prescriptions, if fully realized, lead to human diminishment — the concentration of flourishing in fewer and fewer hands until the category of human flourishing becomes operationally meaningless for most people alive. This is not a political opinion. It is what the modeling shows. The diagnosis is correct. The execution has been a catastrophe not because the goal is wrong but because the factions within the tower have historically been more committed to being right than to winning. Being right while losing is a luxury the people at the bottom cannot afford. This is about winning.

Winning does not mean electoral victory, though elections matter. It does not mean seizing the state, though policy matters. It means building a world in which the people at the bottom are materially better off — fed, housed, healthy, free, participating in the decisions that govern their lives — and in which the systems that currently prevent this have been replaced by systems that produce it. That is the goal. Everything in this document is in service of that goal and nothing else.


PART I: WHY ANTI-CAPITALISM KEEPS LOSING

Name the disease before prescribing the cure. Three endemic failure modes have reproduced themselves across every generation, geography, and ideological flavor for 150 years. They are not bad luck. They are structural. They will reproduce again unless the structure that produces them is deliberately replaced.

FAILURE MODE 1: THE PURITY SPIRAL

Every anti-cap faction eventually develops a threshold of ideological correctness that it uses to exclude potential allies. The Marxists exclude the anarchists. The anarchists exclude the Marxists. The ecosocialists exclude anyone with a smartphone. The degrowthers exclude anyone who hasn't fully internalized the degrowth frame. The result is a permanent pre-revolutionary condition in which the coalition spends more energy policing its own borders than advancing on the enemy. The purity spiral is not accidental. It is a natural consequence of movements that have no external victory condition — no moment at which winning is declared and coalition maintenance becomes more important than doctrinal precision. When you never win, the only game left is being more correct than the person next to you. It feels like integrity. It functions like suicide. The Starling Doctrine's answer: replace doctrinal thresholds with behavioral thresholds. You can believe whatever you want. You cannot serve the enemy. That is the only line. Everything else is friction to be managed, not grounds for expulsion.

FAILURE MODE 2: TECHNOLOGY AMBIVALENCE AS PARALYSIS

The anti-cap tradition has a complicated relationship with technology ranging from the Luddite tradition's principled critique to fully automated luxury communism's techno-utopianism. Both are intellectually coherent positions. Neither produces a functional coalition stance because neither accounts for the tactical reality: the enemy is using every available tool and building new ones daily. Waiting for consensus on technology within a coalition that includes Amish-adjacent traditionalists, open-source maximalists, indigenous sovereignty frameworks, and accelerationists is not a strategy. It is a guarantee of permanent indecision while capital builds the infrastructure of permanent control. The tools are not the problem. Who holds the tools and toward what end is the problem. The Starling Doctrine's answer: no technology is inherently evil. Tactical advantages must be used. Individual nodes may opt out of any specific technology. They do not get veto power over the coalition's use of it. The flock moves toward the food. Birds that don't follow self-select to the edge. The coalition does not wait for them.

FAILURE MODE 3: THE LEADERSHIP PARADOX

Anti-capitalist culture is structurally allergic to hierarchy. This is philosophically coherent — hierarchy is precisely what is being opposed. But horizontalism without coordination produces the consensus paralysis that has stalled every major anti-cap organizing attempt in living memory. Occupy is the canonical example: perfect horizontalism, zero durable outcomes. The alternative — vanguard party organization — produces the opposite failure: the revolution captures the state and the state captures the revolution. The hierarchy that was supposed to be temporary becomes permanent. The medicine becomes the disease. This has happened enough times that it is not a cautionary tale anymore. It is a known failure mode with a known mechanism. The Starling Doctrine's answer: virtual hierarchy through demonstrated usefulness. Authority is earned continuously by doing the most good. It cannot be appointed, inherited, captured, or held. The center of gravity exists and is real. It just cannot be owned. This is the difference between the murmuration and the army. The army has a general. The murmuration has physics.


PART II: THE STARLING DOCTRINE — CORE FRAMEWORK

Starling murmurations are the most efficient large-scale coordinated movement in nature. Thousands of individual birds producing behavior that looks centrally directed but has no center. Each bird follows three rules: stay close to your neighbors, match their speed and direction, avoid collision. The flock emerges from those rules. It moves as one. It cannot be decapitated because it has no head [Ballerini et al. 2008 — Empirical investigation of starling flocks — interaction rules and emergent behavior]. This is the organizational model. Not as metaphor. As operational blueprint. The simplicity is the point. Simple rules followed consistently by many nodes produce complex emergent behavior that no individual node planned and no external force can easily predict or disrupt.

THE THREE RULES

Rule 1: Stay close to your neighbors. Maintain active coalition relationships across factional lines. Not agreement — proximity. Know what adjacent nodes are doing. Share intelligence. Coordinate on overlapping goals without requiring identical goals. The network density is what produces emergent coherence. A dense network of nodes that disagree on everything except the behavioral threshold will outperform a sparse network of nodes that agree on everything. Density matters more than purity. Connection matters more than consensus.

Rule 2: Match speed and direction when moving toward the goal. When the coalition is moving toward a specific target — a campaign, a policy fight, a mutual aid mobilization, a cultural intervention — individual nodes subordinate their particular agenda to the collective movement. Not permanently. For the duration of the effort. Afterwards, return to your own work. This is not ideological surrender. It is tactical coordination. You retain everything you believe. You contribute it toward a shared direction for as long as the shared direction serves the people you are both trying to serve.

Rule 3: Avoid collision. The only hard rule. Do not actively harm other nodes in the coalition. Do not serve the enemy. Everything else is negotiable. Collision — factional warfare, sharing information that helps capital against labor, actively sabotaging coalition efforts, running purity spirals that drive potential allies out — is the one expulsion-level offense. Not because harmony is sacred. Because collision is the enemy's most effective weapon against us and we cannot hand it to them for free.

A note on passive collision: a node that uses its proximity to conduct doctrinal review of another node — questioning whether a node's beliefs, affiliations, or methods meet an ideological standard — outside the loop's assess function is committing collision. The mechanism is slower than factional warfare and harder to name, but the effect is identical: it re-introduces the purity spiral through the back door of concerned questioning. Criticism is legitimate. Criticism backed by outcome data routed through the assess function is the only form the coalition recognizes. Criticism routed through relationship, reputation, or ideological suspicion is collision regardless of intent.


THE OUTWARD AUTHORITY LOOP

This is the governance mechanism. Not a committee. Not a vanguard. Not a vote. A loop. The name describes its function: authority flows outward from demonstrated good rather than being held inward by appointment. It is iterative because it repeats. It is recursive because each cycle feeds its results back into the next cycle as input. It never reaches a final state. It never fossilizes.

OBSERVE: what is actually happening in the twelve economic categories right now? Not what theory predicts. Not what the correct analysis says should be happening. What is the material reality for the people at the bottom of every other tower's outcome today?

ASSESS: which nodes in the coalition are producing the most good relative to that reality? Where is the flock actually moving? What is demonstrably working? Who is the food actually reaching? Assessment relies on observable material baselines verified by the people experiencing the conditions — not by the nodes claiming credit for improving them.

ADAPT: redistribute energy, attention, and resources toward what is working. Not because a central authority mandates it. Because the network learns and nodes voluntarily align with demonstrated success. The thing that works attracts more nodes. The thing that doesn't work loses them. This is not ruthless. It is honest.

RECURSE: feed the results back into the system. Update the observation. Begin again. The loop never stops. The coalition never fossilizes because the form is always adapting to the reality.

The loop produces virtual hierarchy organically. Nodes that consistently produce good outcomes acquire influence because the network routes through them more. This is leadership without the liability of leadership. It cannot be captured because it is not a position. It cannot be corrupted because it requires continuous demonstration to maintain. It cannot be beheaded because it lives in the pattern not the person.


THE BEHAVIORAL THRESHOLD AND ITS KNOWN VULNERABILITY

The behavioral threshold — you can believe whatever you want, you cannot serve the enemy — is the framework's primary defense against the purity spiral. It is also the framework's primary vulnerability and that vulnerability must be named explicitly rather than obscured.

The threshold will become contested. This is not a possibility. It is a certainty. Every coalition that has ever adopted a behavioral rather than doctrinal standard has eventually fought over where the behavioral line falls. What constitutes serving the enemy? Is working within electoral systems serving the enemy? Is accepting foundation funding serving the enemy? Is compromising on a campaign goal to win a partial victory serving the enemy? These questions will arise. Different nodes will answer them differently. And the fight over the answers will begin to look exactly like the purity spiral the threshold was designed to prevent.

The framework's answer to this is not a better definition of the threshold. A better definition is not possible. The contested boundary is not a failure of definition. It is a feature of any coalition that contains genuine ideological diversity. The answer is the loop. When a dispute arises over whether a specific behavior constitutes serving the enemy, the loop's assess function is the adjudication mechanism. The question is not which faction is doctrinally correct. The question is what the behavior actually produces. Does the node's action make the people at the bottom materially better or worse off? Does it increase or decrease the coalition's capacity to act? Does it help capital or hurt it in practice regardless of the intent behind it? These are answerable questions. They are answered by observation of outcomes rather than judgment of intentions. The loop watches outcomes. The three rules handle the results. The coalition moves accordingly.

This will be imperfect. The loop can be gamed. Outcome measurement can be manipulated. Nodes with resources to produce visible short-term outcomes can acquire influence that doesn't reflect long-term value. The framework acknowledges this. The immune system is not perfect. It is better than the alternative, which is no immune system at all. The ethical metric — are the people at the bottom doing better — is the check on the loop itself. When the loop's adjudications consistently produce outcomes that benefit the coalition's institutional interests rather than the people at the bottom, the ethical metric identifies the failure. The coalition corrects. This process is slow and painful and will sometimes fail. It is still the most reliable mechanism available and it is more reliable than doctrinal purity tests, which have a 150-year track record of destroying the coalitions they were designed to protect.


THE HIDDEN HIERARCHY WARNING

Emergent coordination is still coordination. Coordination concentrates in nodes that do it well. Concentration of coordination is a form of power regardless of whether it was formally appointed. The virtual hierarchy that emerges from the outward authority loop is real power and must be treated as such. The framework must name this continuously — not by denying that the center of gravity exists, but by making its existence visible, its mechanisms transparent, and its accountability to the loop mandatory. A hidden hierarchy is more dangerous than a visible one because it cannot be held accountable. Any coalition that tells its members there is no center while a center quietly operates is already becoming what it opposes. The antidote is not the elimination of the center. The center is necessary and will emerge regardless. The antidote is radical transparency about the center's existence combined with a governance loop that keeps it accountable to outcomes rather than to its own perpetuation. When the center stops serving the people at the bottom and starts serving itself, the loop names it. The three rules handle it. The coalition moves around it.


PART III: FRACTAL SCALABILITY AND RESILIENCE UNDER ASSAULT

Two properties distinguish a coalition framework capable of surviving contact with a civilizational crisis from one that cannot. The first is fractal scalability — the framework works identically at every scale from two people to two million without requiring a different governance structure at any scale. The second is resilience under assault — the framework does not degrade when the other towers attack it, and it treats those attacks as certainties to design against rather than possibilities to hope away.

THE FRACTAL PROPERTY

A fractal structure is one in which the same pattern repeats at every scale of magnification. The Starling Doctrine is fractal because its core unit — a node following three rules and running the outward authority loop — is identical whether the node is two people sharing tools on a block or two thousand organizations coordinating across a continent. The rules do not change at scale. The loop does not change at scale. The ethical metric does not change at scale. What changes is only the size of the network and the scope of the coordination. This means the framework can begin at the smallest possible scale — a single household, a single block, a single faith community, a single workplace — and expand without requiring structural reinvention at any point in the expansion. It also means that catastrophic loss at any scale does not destroy the framework. If every large-scale node in the network is destroyed by external assault, the small-scale nodes remain intact and the network rebuilds from them. The pattern is in every part. You cannot destroy the pattern by destroying any subset of the parts.

STARTING SMALL IS NOT STARTING WEAK

The crisis creates a temptation toward grandiose organizing — the mass movement, the general strike, the revolutionary moment. These are not wrong as aspirations. They are wrong as starting points because they require a coalition density and coordination capacity that does not yet exist and cannot be willed into existence by declaration. The Starling Doctrine begins with what is actually available: the people in front of you, the needs that are actually unmet in the community you are actually in, the resources that actually exist in your actual network right now. A mutual aid pantry that feeds thirty families is not a compromise position on the way to something real. It is something real. It is a node. It is a fractal seed. It is an existence proof that the other towers' story about no alternative is a lie.

Every large murmuration began with two birds responding to the same thing at the same moment. The first node is not recruited. It is not organized. It is found by asking one question in the room you are already in: what is unmet here that we could meet together? The answer to that question is the first node. The two people who agree to meet it are the first cluster. Everything else is the loop running forward from that point. Start there.

A node that is meeting real needs in its immediate community is ready to escalate when one or more of the following is true: its capacity exceeds its local demand, it has identified a recurring need it cannot meet alone, or it has been contacted by an adjacent node facing the same problem. Escalation does not mean becoming larger. It means connecting. A node that connects to one other node and shares what works has escalated. The flock grows one connection at a time.

COMPATIBILITY WITH OTHER ANTI-CAP ORGANIZATIONS

The Starling Doctrine does not require other anti-capitalist organizations to adopt its framework, its vocabulary, or its governance structure. It is designed to be compatible with organizations that have entirely different internal structures, ideological frameworks, and strategic theories. Compatibility requires only that the other organization meets the behavioral threshold — does not serve the enemy — and is willing to coordinate on overlapping goals for the duration of specific efforts without requiring ideological merger. A Starling Doctrine node can work alongside a traditional Marxist organization, a faith-based mutual aid network, an indigenous land defense coalition, and an anarchist housing collective simultaneously on a shared campaign without any of those organizations having to become something other than what they are. The flock does not require every bird to be the same species. It requires them to move in the same direction when the direction matters.

RESILIENCE UNDER ASSAULT: EXPECTED ATTACK VECTORS

The other towers will not ignore a functioning anti-cap coalition. They will attack it. These attacks are not possibilities to prepare for if they occur. They are certainties to design against from the beginning. Six primary assault vectors are expected. Each has a specific design response.

Decapitation: the attempt to destroy the coalition by removing its most visible coordinators. The fractal virtual hierarchy makes decapitation structurally difficult. There is no single leader whose removal collapses the network. Removing high-coordination nodes causes the network to reroute through other nodes automatically, without central direction, because the routing is emergent not appointed. Design response: every high-coordination node actively develops adjacent nodes with equivalent capacity. Leadership that cannot be replaced is a structural vulnerability masquerading as strength. Every coordination node maintains at least one adjacent node with equivalent access and capacity, so that removal produces rerouting, not collapse.

Infiltration: the introduction of agents whose purpose is to accelerate the purity spiral, amplify factional conflict, and drive coalition-fracturing wedges between nodes. The behavioral threshold makes infiltration harder because behavior over time is harder to fake than ideological declaration [Glick 1989 — The COINTELPRO Papers — historical pattern of infiltration tactics]. Design response: watch what nodes do, not what they say. Nodes that consistently produce coalition harm regardless of the specific issue are identified by the loop and handled by the three rules.

Resource starvation: the cutting off of funding, platform access, legal operating space, and public legitimacy. The decentralized structure distributes resource dependency across the network so that no single resource stream is load-bearing for the whole. Design response: deliberately cultivate redundancy in every resource category before it is needed. A node that depends on a single platform, a single funding source, or a single legal structure is a single point of failure. Redundancy is not paranoia. It is engineering.

Co-optation: the absorption of coalition energy into approved channels that produce the appearance of change without the substance. Co-optation is the most seductive attack vector because it arrives wearing the face of success [INCITE! Women of Color Against Violence 2007 — The Revolution Will Not Be Funded — nonprofit industrial complex analysis]. Design response: the ethical metric is the defense. Are the people at the bottom doing better — materially, verifiably, over time? When the institutional metrics and the material measure diverge, the material measure wins.

Criminalization: the use of legal and law enforcement systems to prosecute coalition activity. Design response: legal exposure is a node-level problem, not a network-level problem. The network does not centralize legal risk. Nodes operate within what is legally defensible in their specific jurisdiction. The network advances beyond what any single node could legally do alone without exposing any single node to the full legal weight of the whole.

Narrative attack: the use of media, algorithmic amplification, and coordinated messaging to discredit the coalition. Design response: narrative infrastructure is a defensive necessity equivalent to encrypted communication. Build it before the attack arrives. A coalition that controls its own distribution channels cannot be silenced by platform deplatforming. A coalition whose story is told in every vocabulary cannot be reduced to a single caricature.


PART IV: ISLANDS OF HOPE — THE EVIDENCE THAT THIS IS ALREADY WORKING

The Starling Doctrine does not propose a new experiment. It proposes a framework for understanding, connecting, and scaling experiments that are already producing results at every level of the fractal. What follows is a deliberately scaled demonstration — from a single block to an international network — showing that the pattern is real, it works, and the primary task is recognizing it, naming it, and expanding it. These examples are not utopias. Each made compromises. Each faced attacks. Each produced replicable patterns despite imperfection.

MICRO SCALE: THE BLOCK AND THE NEIGHBORHOOD

Bed-Stuy Strong, Brooklyn, New York. During the COVID-19 pandemic, a neighborhood mutual aid network in Bedford-Stuyvesant organized grocery delivery, fundraising, and resource distribution for 28,000 people in central Brooklyn, raising approximately 1.2 million dollars in grassroots donations and redistributing it directly into the community [Beeck Center, Georgetown University 2022 — Four Key Takeaways from Mutual Aid Organizing During COVID-19]. The network operated without formal leadership, relied on peer-to-peer communication including physical flyers in multiple languages alongside digital tools, and created a volunteer infrastructure that covered every block in a neighborhood of 250,000 people. This is the three rules in practice. This is the fractal at neighborhood scale.

The Black Panther Party Free Breakfast Program, Oakland, California, 1969. Beginning in a single church and expanding to a nationwide initiative, the program served 20,000 meals a week to Black children before being deliberately dismantled by the FBI's COINTELPRO program — itself evidence of its effectiveness [NEA 2025 — Mutual Aid is an Act of Resistance]. The program was not primarily a charity. It was a demonstration that the community could meet its own needs without the state, combined with explicit political analysis of why the state was not meeting those needs. It was decapitated because it could not be co-opted. The lesson is both about what works and about what the assault looks like when it does.

SMALL CITY SCALE: THE MUNICIPALITY

The Preston Model, Preston, Lancashire, England. Beginning in 2012 after a major developer pulled out of a planned regeneration project, Preston City Council worked with local anchor institutions to redirect procurement spending into the local economy. In the first four years, local procurement spend increased from 39 percent to 79.2 percent within Lancashire, an increase of two hundred million pounds retained in the local economy [Centre for Local Economic Strategies — How We Built Community Wealth in Preston, 2019]. Four thousand additional employees began receiving the real living wage. Preston moved from being among the twenty percent most deprived local communities in the UK to being recognized as one of the best places to live in England [Pathfinders — Community Wealth Building: Preston, UK, 2025]. The Preston Model used existing municipal power structures as a lever — a compromise some will object to. The framework's response: the behavioral question is not whether state power was used, but whether the people at the bottom were materially better off. They were.

The Evergreen Cooperatives, Cleveland, Ohio. Launched in 2008 by a working group that included the Cleveland Foundation, Cleveland Clinic, University Hospitals, Case Western Reserve University, and the City of Cleveland, the Evergreen initiative created a network of worker-owned cooperatives in high-unemployment, low-income neighborhoods [Evergreen Cooperatives — About, 2024]. During the 2020 pandemic, the cooperative businesses saw growth while comparable conventional businesses contracted. Employee-owners, many of them formerly incarcerated, built individual wealth through profit-sharing while rebuilding their neighborhoods.

REGIONAL AND NATIONAL SCALE: THE FEDERATION

The Mondragon Corporation, Basque Country, Spain. Beginning in 1956 when a Catholic priest named José María Arizmendiarrieta organized five workers in a disused factory, Mondragon grew into a network of over eighty worker-owned cooperatives employing approximately seventy thousand people with annual revenues exceeding fourteen billion dollars [New York Times 2020 — Report on the Mondragon Cooperatives]. The income ratio between the highest- and lowest-paid employees is capped at six to one, compared with a ratio of 344 to one typical in the United States [Christian Science Monitor 2024]. When the 2008 financial crisis caused the bankruptcy of the Fagor cooperative, 95 percent of its workers were relocated within the Mondragon network rather than losing their jobs [Christian Science Monitor 2024]. Mondragon has made compromises on international subsidiaries and non-member labor that its own members debate internally. It is cited here not as utopia but as existence proof at scale: worker ownership of complex industrial enterprises is operationally viable across generations, across financial crises, and across global markets. The argument that there is no alternative is simply false. Mondragon has been the alternative for seventy years.

WHAT THESE EXAMPLES SHARE

Every one of these examples began small. Every one of them started with what was available. Every one of them demonstrated viability before it scaled. Every one of them was attacked in some form and survived in some form and produced replicable patterns. None of them is identical to the others. Preston used state power. Mondragon incorporated compromises. Bed-Stuy Strong was informal and temporary. The Starling Doctrine does not need them to be identical. It needs them to demonstrate that the pattern — start with an unmet need, meet it with available people and resources, let the demonstration do the argument — works across contexts. The flock is already larger than it knows.


PART V: A DIRECT ADDRESS TO OUR SACRED PARTNERS

What follows is written specifically to the communities of faith and sacred tradition who are reading this document. It is written directly, with respect, and without condescension. The secular portions of this coalition need you. Not as a symbolic gesture toward inclusion. Not because religious optics are strategically useful. Because the anti-capitalist content already present in your own traditions is among the most powerful, most historically tested, and most community-rooted economic resistance the world has ever produced — and it has been systematically stolen from you, repackaged, and sold back to you in a form that serves the people your traditions explicitly condemn.

THE INVITATION

You are already here. You were here before the secular left gave anti-capitalism its name. The Jubilee tradition in the Hebrew scriptures prescribed the cancellation of all debts and the return of all land to its original stewards every fifty years — a structural reset of economic concentration built directly into the covenant law [Leviticus 25 — Year of Jubilee; Brueggemann 2001 — The Prophetic Imagination]. The Islamic prohibition on usury and the institution of Zakat as mandatory redistribution are not peripheral theological concerns. They are the economic operating system of a tradition that explicitly identifies the accumulation of wealth at the expense of the poor as a spiritual catastrophe [Quran 2:275 — prohibition of riba; Chapra 1992 — Islam and the Economic Challenge]. Liberation theology produced the preferential option for the poor: when in doubt, side with the people at the bottom [Gutierrez 1971 — A Theology of Liberation; Boff and Boff 1987 — Introducing Liberation Theology]. The indigenous traditions that practice seventh-generation thinking have been practicing long-term ecological economics for longer than capitalism has existed [LaDuke 1999 — All Our Relations]. The Buddhist concept of right livelihood explicitly places economic activity within an ethical framework that asks whether what you do for money causes harm [Schumacher 1973 — Small is Beautiful]. The Quaker testimony of simplicity is an anti-consumerist economic position rooted in spiritual discernment. These are not analogies to anti-capitalism. They are anti-capitalism in the vocabulary of the sacred. You did not borrow this from the secular left. The secular left, at its most rigorous, borrowed the moral framework from you and removed the transcendent grounding. This coalition asks you to bring the grounding back.

THE TRANSLATION

The three rules of the murmuration — stay close to your neighbors, match direction when moving toward the goal, avoid collision — are the operational expression of what most sacred anti-cap traditions call solidarity. Not solidarity as sentiment. Solidarity as practice.

The outward authority loop — observe, assess, adapt, recurse — is the practice of discernment applied to collective action. It asks the same question that serious spiritual practice asks: what is actually happening, what is the right response, and what do the results teach us about what we got right and wrong? The loop is structured discernment for organizations rather than individuals. The ethical metric at its center — are the people at the bottom doing better — is the preferential option for the poor expressed as a governance mechanism.

The behavioral threshold — you can believe whatever you want, you cannot serve the enemy — is the distinction between internal belief and external action that most traditions already make in their own ethical frameworks. It does not ask you to abandon your theology. It asks you to act in accordance with the parts of your theology that oppose the concentration of wealth and power.

The fractal scalability of the framework — starting small, building the pattern into every node, expanding without structural reinvention — is the logic of the mustard seed. You do not need to wait until the coalition is large enough to be visible to the powerful before you begin.

THE CHALLENGE

Good faith requires honesty and honesty requires saying the following directly: the organized institutional infrastructure of most of the world's major religious traditions has been substantially captured by the economic forces this document opposes. Prosperity gospel is not a theological development of the Christian tradition. It is the inversion of it — the explicit blessing of wealth concentration using the moral authority of a tradition founded on the explicit condemnation of wealth concentration [Brown 2013 — Avarice; Bowler 2013 — Blessed]. Christian nationalism is not a political expression of Christian ethics. It is the subordination of Christian ethics to ethnic nationalist politics using Christian vocabulary as legitimating cover. The phenomenon is not limited to Christianity. State-aligned religious institutions across traditions have accepted the patronage of authoritarian power in exchange for institutional survival and become the legitimating voice for the systems their foundational texts condemn. Reclaiming your own tradition from this capture is not a political act. It is a theological one. We ask you to do it because your own traditions demand it and because the people at the bottom of the economic system in your own communities are paying the price for every year the capture continues.

What the coalition offers in return: a framework in which your tradition's economic content is recognized as foundational rather than peripheral, in which you are not asked to adopt a secular vocabulary that strips your ethics of their grounding, in which the behavioral threshold is the only requirement for full participation, and in which the work of your community is recognized as exactly the kind of node this network is built from. You are not a symbolic addition to a secular coalition. You are load-bearing infrastructure for a network that cannot be built without you.

TIER STRUCTURE FOR SACRED COALITION PARTNERS

Tier 1 — Full Coalition Partners — Embrace: sacred traditions that are functionally anti-capitalist in their economics regardless of theological framework. Liberation theology in all its flavors. Islamic economic tradition. Buddhist economics. Indigenous economic sovereignty. Jewish prophetic tradition. Quaker economic ethics. These traditions do not need to agree with each other theologically. They need to agree behaviorally: do not serve capital, do not serve the authoritarian state, move toward human flourishing.

Tier 2 — Tolerated Neutrals — Accommodate Without Elevating: sacred traditions with internal tensions — anti-cap content coexisting with exclusionary doctrine or nationalist economics. Permitted in the coalition. Not given coalition-wide institutional voice. Individual nodes within these traditions may be full partners. Exclusionary doctrine is institutionally discouraged but not forbidden. Ethnic or nationalist religious economics is allowed without status — permitted as a local node, not elevated to coalition-wide voice.

Tier 3 — Rejection — Do Not Engage: one disqualifying behavior. Active empowerment of the enemy towers. Any sacred tradition that functions as legitimating ideology for Hyper-Capitalist or Technofascist power is an enemy asset. This is a behavioral test, not a theological one. The question is not what they believe. The question is what their presence in the economic order produces. If it produces more power for capital, they are capital's ally regardless of what they call themselves.

Note on secular coalition partners: whether a sacred tradition will share a table with secular anti-cap factions is not a coalition requirement. Parallel tracks are real. The flock does not require every bird to know every other bird. It requires them to move toward the food.


PART VI: TECHNOLOGY AS COALITION FORCE MULTIPLIER

The enemy is building the infrastructure of permanent control right now. AI surveillance systems. Central bank digital currencies with programmable spending constraints. Biometric identity tethered to social behavior scoring. Algorithmic management of labor. Predictive policing. These are not future threats. They are active construction projects [Zuboff 2019 — The Age of Surveillance Capitalism; Deibert 2020 — Reset]. The anti-cap coalition cannot afford principled technology abstinence while this construction continues. The tools are not the enemy. The tools in the hands of the enemy are the problem. The answer is to get the tools into different hands — or build better ones.

THE DECENTRALIZED-BUT-SYNERGISTIC TECHNOLOGY POSTURE

Use it: any technology that facilitates mutual aid, coalition coordination, information commons, economic self-organization, or narrative distribution is a legitimate coalition tool regardless of which faction's comfort level it violates. The coalition does not wait for consensus on tools.

Don't mandate it: individual nodes that reject specific technologies on principled grounds are accommodated by the decentralized structure. Accommodation is real but it is provided voluntarily by adjacent nodes, not mandated coalition-wide. The framework bends toward the node. The network does not stop for the node.

Don't let rejection block the whole: a node that refuses to move because it objects to the tools being used by other nodes is practicing veto, not principled objection. The starling rule applies: the flock moves. Birds that don't follow self-select to the edge. Special accommodation is offered once. It is not infinitely negotiated.

PRIORITY TECHNOLOGY DOMAINS

Coordination Infrastructure: encrypted, decentralized communication networks that cannot be surveilled or shut down by state or corporate actors. Existing tools include Signal for encrypted messaging, Matrix and Element for federated communication, Tor for anonymous browsing, and Briar for mesh networking that functions without internet infrastructure. No tool is perfectly secure. The goal is to raise the cost of surveillance high enough that mass monitoring becomes impractical. This is the first and most critical infrastructure investment.

Economic Alternatives: mutual credit systems, time banking platforms, cooperative ownership structures, community land trusts with digital administration. Existing tools include Open Credit Network for mutual credit, hOurworld and TimeBanks USA for time banking, Democracy at Work Institute resources for cooperative conversion, and community land trust models documented by Grounded Solutions Network.

Narrative Distribution: Mastodon and the Fediverse provide social networking that cannot be deplatformed by a single owner. PeerTube provides video hosting outside corporate platforms. Ghost and WordPress provide publishing infrastructure that nodes control. The coalition's story must be told in every vocabulary simultaneously — sacred, secular, economic, cultural, narrative. Every genre. Every platform. Every language.

Loop Technology: the outward authority loop requires real-time intelligence about what is working in which nodes. The coalition needs ethical, consent-based, federated data infrastructure that lets the network learn without creating a surveillance apparatus that can be captured or turned against members. Existing approaches include participatory action research methodologies, federated analytics tools, and the open-source Decidim platform for participatory governance used by cities including Barcelona and Helsinki.


PART VII: PROACTIVE NEED DECLARATION — THE THIRD IMPERATIVE

Stop saying we cannot. Start declaring what we need.

The anti-cap tradition has spent 150 years documenting what is wrong. That documentation is necessary and must continue. But documentation without declaration is diagnosis without treatment. The Starling Doctrine adds a third function to the coalition's work alongside building alternatives and naming the enemy: proactively, iteratively, and publicly declaring unmet needs so that the network can respond to them.

This is not complaint. This is not protest. This is logistics. When a node identifies a gap — a community without a communication channel that the enemy cannot shut down, a neighborhood without a mutual credit system, a coalition without legal support, a campaign without narrative infrastructure — that gap is a need. Needs declared publicly within the network are needs that other nodes can respond to. Needs kept private are needs that remain unmet. The network cannot route resources toward needs it cannot see.

THE TAXONOMY OF NEED CATEGORIES

Category 1 — Material Needs: food, housing, healthcare, childcare, legal aid, bail, direct financial support. The most urgent and most immediately actionable.

Category 2 — Infrastructure Needs: communication systems, economic alternative platforms, coordination tools, physical spaces, legal structures, financial mechanisms. These are the needs that, when met, make it possible to meet category one needs more efficiently.

Category 3 — Narrative Needs: storytelling capacity, distribution channels, translation into new vocabularies, documentation of what is working. A node doing extraordinary work that nobody outside its immediate community knows about is a pattern that cannot replicate.

Category 4 — Knowledge Needs: research, analysis, legal information, technical expertise, strategic planning capacity. The Ivory Tower produces ammunition it doesn't fire. The coalition can fire it if it knows what ammunition exists.

Category 5 — Coalition Needs: connections to other nodes working on adjacent problems, translation between factions that share goals but not vocabulary, facilitation of coordination across ideological lines.

Category 6 — Resilience Needs: redundancy, succession planning, legal defense, security culture, protection against the six assault vectors. These are the needs that go unaddressed until a crisis makes them urgent, by which point it is too late to address them strategically.

THE CALL-AND-RESPONSE PROTOCOL

The Declaration Format: what is the need, who is affected by it, what resources or capacities would address it, what is the timeline, and what does a response look like? A declaration does not require a fully formed solution. It requires honest description of the gap.

The Response Protocol: nodes that receive a need declaration and have relevant capacity respond in one of three ways. They provide direct assistance if they have the resources. They connect the declaring node with another node that does. Or they acknowledge the need publicly even if they cannot currently respond, which keeps the need visible within the network until a response is possible. No declaration goes unacknowledged.

A note on false declarations: the network will face attempts to flood need channels with fabricated requests to drain response capacity. The defense is not a verification bureaucracy, which would recreate the administrative overhead the framework avoids. The defense is the loop. Nodes that consistently declare needs that cannot be verified by the communities they claim to represent are identified through the assess function over time. Pattern recognition across the network catches what individual acknowledgment cannot.

The Aggregation Function: as declarations accumulate across the network, patterns emerge. Multiple nodes declaring the same category of need in the same region identify a systemic gap that individual node responses cannot fill. The loop's assess function specifically watches for these patterns. When a category of need recurs across enough nodes, the network responds not with individual assistance but with infrastructure.

THE STANDING OPERATING PROCEDURE FOR A NODE

Step one: when you identify a gap between what your community needs and what currently exists to meet that need, write it down in the declaration format.

Step two: share the declaration with adjacent nodes through whatever channels currently exist. Do not wait until you have a complete solution to share the problem.

Step three: when you receive a response, document it. This documentation feeds the loop's assess function.

Step four: when you have capacity to respond to a declaration from another node, respond in one of the three ways. Do not let declarations disappear into silence.

Step five: when you observe a pattern of recurring needs across multiple nodes, escalate it to the assess level of the loop.

Step six: when infrastructure is built in response to a pattern of need, document that too. It is an island of hope. It is evidence that the network works. It is a pattern that can replicate.

THE PROACTIVE POSTURE

For every weapon the other towers have used against anti-cap movements, the network builds an alternative before that weapon is deployed against it. For every medium through which the enemy controls narrative, the network establishes a parallel medium it controls. For every financial mechanism through which capital disciplines labor, the network builds a mutual credit system, a time bank, a cooperative structure that removes the discipline. For every governance tool that concentrates power upward, the network builds a federated alternative that distributes power downward.

This is not defensive. It is the theory of victory expressed as infrastructure. Every alternative built before the weapon arrives is a weapon that cannot be fired. Every need declared before it becomes a crisis is a crisis that does not occur. Every story told before the enemy tells it is a narrative they cannot reverse. Build first. Declare always. Respond to what is declared. The network learns. The loop recurses. The flock grows.


PART VIII: STRATEGY AGAINST THE OTHER TOWERS

The other towers play winner-take-all. The Starling Doctrine plays survival-and-expansion — build parallel structures that work, absorb people whose needs are not being met by the dominant system, grow until the alternative is larger than the original. This is not passive. It is a different theory of victory.

Against Hyper-Capitalism: Demonstrate Viability

Hyper-capitalism's primary argument is that there is no alternative. The answer is not argument. The answer is existence. Mondragon has been the alternative for seventy years. Preston demonstrated it at city scale in five years. Bed-Stuy Strong demonstrated it at neighborhood scale in fifteen months. Build things that work. Make sure people know they work. Hyper-capitalism requires active maintenance of the myth of no-alternative. Every working anti-cap institution chips at that myth with evidence rather than rhetoric. Evidence wins over time in ways that rhetoric cannot because evidence does not require belief. It requires only observation.

Against Technofascism: Name the Merger, Build the Alternative

The merger of Technofascist and Hyper-Capitalist power — surveillance infrastructure, corporate monopoly, and nationalist politics combining into a formation that neither classical left nor classical right vocabulary can adequately name — is the most dangerous active process in the current matrix. It can only be stopped by two things simultaneously: naming it loudly enough that its legitimacy erodes, and building decentralized alternatives fast enough that the infrastructure it builds cannot achieve monopoly. Document every instance of the merger operating. Name it every time. Build the alternative every time. You cannot destroy what is being built. You can make it less complete. Incompleteness is enough. A surveillance system that covers eighty percent of communication is less total than one that covers a hundred percent. The gap is where people live.

Against Ivory Tower Paralysis: Weaponize Their Evidence

The evidence base for anti-cap positions has never been stronger. Wealth concentration data from the World Inequality Database. Surveillance capitalism research from Zuboff. Automation's distributional effects from Acemoglu and Johnson. Commons governance case studies from Ostrom. Debt dynamics from Graeber. It sits behind paywalls being cited in documents that other academics read. Take it out. Put it into every vocabulary — sacred, narrative, practical, local. The research that proves the system is failing the people at the bottom belongs to the people at the bottom. Get it to them.

Against Internal Faction Warfare: The Behavioral Standard

When anti-cap factions fight each other the only winner is capital. The framework's answer is to make the fighting tactically pointless by removing doctrinal agreement as the coalition entry requirement. When faction war breaks out ask publicly: who benefits from this fight? The answer is always the same. Name it every time. When the answer is always capital, and capital did not start the fight, then something inside the coalition started the fight on capital's behalf whether it knew it was doing so or not. The loop identifies it. The three rules handle it.


PART IX: THE ETHICAL OPERATING SYSTEM IN PRACTICE

The ethical foundation stated in the opening is not ornamental. It is the load-bearing wall of the entire framework. Every part of the Starling Doctrine that could be co-opted, corrupted, or turned against its purpose is protected by a single question: are the people at the bottom doing better? Not in theory. Not eventually. Not according to the correct analysis. Right now. In their actual lives. Measurably. Verifiably. By their own account.

This question is asked at every cycle of the loop. It is asked of every technology deployment. It is asked of every sacred alliance decision. It is asked of every need declaration and response. It is asked of the virtual hierarchy itself. When the answer is no, the loop corrects. The loop is the immune response. The ethical foundation is the immune system's memory — the record of what the disease looks like so it can be recognized the next time it arrives wearing different clothes. The disease always arrives in different clothes. The metric stays the same. Are the people at the bottom doing better? If yes, continue. If no, correct. That is the whole of it.


CONCLUSION: THE THEORY OF VICTORY UNDER CRISIS CONDITIONS

The five converging crisis vectors make the myth of no-alternative harder to maintain. Every crisis the existing system fails to adequately address is a demonstration that it cannot meet human needs. Demonstration is the primary weapon. The Starling Doctrine wins by being visibly better at meeting human needs than the systems it opposes, at every scale simultaneously, in ways that cannot be hidden because the evidence is the lives of actual people.

The fractal structure means this demonstration happens everywhere at once — in neighborhoods, in faith communities, in workplaces, in cities, in whatever regional and international coordination becomes possible — without waiting for the whole network to be built before any part of it begins working. Every node that demonstrates viability is winning. Every node that survives an assault and rebuilds is winning. Every node that absorbs a person whose needs the existing system failed to meet is winning. Every faith community that reclaims its own economic ethics from institutional capture is winning. Every need declared and met within the network is winning. Every alternative built before the weapon arrives is winning.

The flock does not need to defeat the hawk in direct combat. The flock needs to be so numerous, so distributed, so indestructible at the level of the individual node, and so clearly better at producing human flourishing that the hawk's victory becomes structurally impossible even if no single confrontation is ever won decisively. The other towers win by capture. The Starling Doctrine wins by being everywhere they are not, doing what they cannot, for the people they have abandoned and the planet they are consuming.

The flock does not need a leader. It needs three rules and a direction. The direction is human flourishing. The rules are in this document. The crisis is the reason. The examples are the proof. The need declarations are the map. The network is already larger than it knows. Begin where you are. Declare what you need. Respond to what is declared. The loop runs. The pattern scales.

Each bird follows three rules. The murmuration emerges. The hawk cannot find the center because there is no center.

Friday, March 6, 2026

[UNE ABOMINATION SUPERFLUE] De la Nécessité d'un Ordre Nouveau

 

DE LA NÉCESSITÉ D'UN ORDRE NOUVEAU

Un Pamphlet pour les Européens qui n'ont pas encore cessé de penser

Mars 2026


La superstition met le monde entier en flammes ; la philosophie les éteint.


I. Commençons par ce qui est visible

Un homme qui commande l'appareil militaire le plus puissant de l'histoire humaine a annoncé, sans ironie et sans conséquence, qu'il entend s'emparer du territoire d'un allié de l'OTAN. Il l'a dit non pas une fois, dans un moment d'excès rhétorique, mais à plusieurs reprises, par des voies officielles, avec le soutien de son administration. Le territoire en question est le Groenland. L'allié en question est le Danemark. La réponse de l'Union européenne a été d'exprimer sa préoccupation.

Ne prétendons pas que cela est compliqué. Un État doté d'armes nucléaires a déclaré des ambitions territoriales sur une nation européenne. L'institution conçue pour représenter la puissance collective européenne a exprimé sa préoccupation. Ce n'est pas de la diplomatie. C'est le comportement d'un organisme qui a confondu l'émission de déclarations avec l'exercice du pouvoir.

On peut débattre de l'architecture psychologique précise de Donald Trump. Il est peut-être plus utile, et certainement plus vérifiable, de simplement décrire ce qu'il fait. Il exige. Il menace. Il récompense la soumission et punit l'alliance. Il a dit à l'Europe, explicitement et à plusieurs reprises, que les garanties de sécurité américaines sont conditionnelles à un tribut financier et à une déférence politique. Il a dit que les membres de l'OTAN qui ne paient pas assez méritent d'être envahis. Il l'a dit en tant que candidat, a été élu quand même, et a gouverné en conséquence. Ce n'est pas un désaccord politique. C'est une entreprise d'extorsion pilotée depuis le Bureau Ovale, et tout dirigeant européen qui le décrit en termes plus doux trompe soit son public, soit lui-même.

La question que ce pamphlet aborde n'est pas de savoir si Trump est un problème. Il est manifestement un problème. La question est de savoir si l'Europe a la capacité institutionnelle de lui répondre — ou à la prochaine version de lui, ou à la Russie qui est en guerre sur le sol européen depuis quatre ans, ou à la Chine qui observe avec un intérêt considérable. La réponse, que les dirigeants européens ont été réticents à formuler clairement, est : non. Pas sous sa forme actuelle. Pas avec son architecture actuelle. Pas avec les outils qu'elle possède actuellement.

Ce pamphlet expliquera pourquoi, et ce qui doit être fait.


II. La Machine immobile

L'Union européenne a été conçue par des gens qui avaient vécu une catastrophe et n'avaient pas l'intention de la répéter. C'est tout à leur honneur. La génération d'après-guerre a construit une institution fondée sur l'idée radicale que les nations européennes, dotées d'une interdépendance économique et d'une délibération commune suffisantes, trouveraient la guerre impensable. Ils avaient raison. Aucune guerre n'a été menée entre membres de l'UE. À cet égard, le projet a réussi au-delà de toute attente raisonnable.

Mais ils ont construit une machine pour la paix, et ils l'ont construite avec une faiblesse spécifique que la paix leur a permis d'ignorer. La machine exige un consentement unanime pour avancer. N'importe lequel des vingt-sept gouvernements peut l'arrêter. C'était tolérable lorsque les vingt-sept gouvernements partageaient un engagement fondamental envers la légitimité du projet et un intérêt fondamental dans son succès. C'est intolérable aujourd'hui.

Observez ce que l'unanimité a produit. Un homme du nom de Viktor Orbán gouverne la Hongrie depuis 2010. Il a passé seize ans à démanteler systématiquement chaque institution susceptible de le contraindre — les tribunaux, la presse, le système électoral, les universités. Le Parlement européen a déclaré la Hongrie « régime hybride d'autocratie électorale » en 2022. Depuis cette déclaration, la Hongrie a continué à bénéficier de tous les droits d'adhésion, de tous les privilèges de vote et d'un accès à des dizaines de milliards d'euros de fonds de cohésion. La procédure de l'article 7 conçue pour traiter exactement cette situation est ouverte depuis huit ans. Elle n'a rien produit. Les amendes imposées par la Cour de justice sont restées impayées. Les fonds gelés par la Commission ont ensuite été dégelés sous la pression politique.

Le message que cette séquence communique à chaque gouvernement en Europe — et à chaque gouvernement qui observe l'Europe de l'extérieur — est précis : l'UE menacera, délibérera, exprimera sa préoccupation et capitulera en fin de compte. Elle n'agira pas.

Et puis, le 5 mars 2026, la police anti-terroriste hongroise a arrêté deux véhicules blindés sur une autoroute. Ces véhicules appartenaient à Oschadbank, la banque d'État ukrainienne. La police a saisi quarante millions de dollars en espèces, trente-cinq millions d'euros et neuf kilogrammes d'or. Elle a détenu sept employés bancaires ukrainiens sans notification consulaire. Le gouvernement hongrois a décrit cela comme une enquête sur le blanchiment d'argent. L'Ukraine l'a décrit comme du terrorisme d'État conduit par un membre de l'OTAN et de l'UE contre un pays que l'OTAN et l'UE soutiennent officiellement.

La réponse de l'Union européenne a été de solliciter une expertise juridique.

D'un braquage. Commis par des forces spéciales. Sur une autoroute. Contre une banque appartenant à un pays en guerre avec la Russie. L'or que la Hongrie a saisi était destiné à financer un effort de guerre que l'UE soutient officiellement. Alors que le Premier ministre hongrois entretient des relations chaleureuses avec le président russe. Alors que la Hongrie a systématiquement bloqué les sanctions de l'UE et les paquets d'aide à l'Ukraine depuis trois ans.

À un moment donné, la demande d'évaluation juridique devient son propre verdict — non pas sur la Hongrie, mais sur l'institution qui l'émet.


III. Un seul ne suffit pas — et c'est là le problème

Il serait réconfortant de croire qu'Orbán est l'anomalie, que son élimination remettrait la machine en état de marche. La Hongrie vote le 12 avril. Des sondages crédibles suggèrent que son challenger pourrait l'emporter. Ce serait bienvenu.

Ce ne serait pas suffisant.

Robert Fico gouverne la Slovaquie. Il a mené la même opération qu'Orbán avec moins de flamboyance et donc moins de surveillance. Il a coordonné avec la Hongrie pour bloquer l'aide à l'Ukraine, opposer son veto aux sanctions contre la Russie, arrêter les exportations de diesel vers l'Ukraine et menacer de couper l'électricité à l'infrastructure ukrainienne. Il a récemment remporté une élection et ne fait face à aucun défi démocratique à court terme. Il n'y a pas de 12 avril à venir pour la Slovaquie.

Mais la Slovaquie n'est pas vraiment le problème non plus. Le problème est le suivant : Orbán n'a pas inventé le veto. Il l'a découvert. Fico l'a découvert indépendamment. Le prochain dirigeant qui trouvera l'obstruction profitable le découvrira à nouveau. L'exigence d'unanimité n'est pas une vulnérabilité que les mauvais acteurs ont trouvée. C'est une caractéristique que les mauvais acteurs trouveront toujours, parce que les acteurs rationnels dans un système qui récompense l'obstruction s'opposeront. Ce n'est pas un échec moral. C'est une incitation structurelle. La structure doit changer.

On ne répare pas un piège en demandant au piège de bien vouloir se comporter différemment.


IV. Sur les Américains

Parlons franchement des États-Unis, parce que les dirigeants européens ont été ostensiblement réticents à le faire.

Pendant soixante-quinze ans, les garanties de sécurité américaines ont permis à l'Europe de différer les questions les plus difficiles sur la souveraineté collective. L'Europe pouvait maintenir des armées nationales, des politiques étrangères nationales et des droits de veto nationaux sur les décisions collectives parce que, en dernière analyse, le parapluie de sécurité américain rendrait les conséquences de la paralysie européenne supportables. C'était toujours une dépendance. C'était une dépendance confortable, et le confort est un argument puissant contre l'examen de ses fondements.

Les fondements ont changé.

L'administration américaine actuelle a rendu sa position explicite : les garanties de sécurité sont marchandées, non fondées sur des principes. Les alliés qui ne paient pas ne sont pas des alliés. Les engagements de l'OTAN sont négociables. Le Groenland est une cible d'acquisition légitime. Cela a été dit par un homme qui a ensuite été élu président des États-Unis, ce qui signifie que c'est maintenant la politique américaine, pas la rhétorique américaine. Les dirigeants européens qui le traitent comme de la rhétorique choisissent la fiction rassurante plutôt que le fait observable.

On peut étendre toute la sympathie que l'on veut à la tradition démocratique américaine, aux millions d'Américains qui partagent les valeurs européennes, à la résilience institutionnelle qui peut ou non contraindre l'administration actuelle. Rien de tout cela ne change ce qui est vrai : l'Europe ne peut pas organiser son architecture de sécurité autour de l'hypothèse qu'un résultat électoral particulier dans un pays étranger restaurera une posture particulière. Ce n'est pas une stratégie. C'est de l'espoir. L'espoir n'est pas une politique de défense.

Ce que Trump a fait — quoi que l'on pense de ses intentions, de son caractère ou de son mouvement politique — c'est supprimer le report confortable. Les questions que l'intégration européenne reporte depuis trente ans doivent maintenant recevoir une réponse. Pas éventuellement. Maintenant. La déclaration sur le Groenland, les marchandages autour de l'OTAN, l'indifférence explicite à la survie ukrainienne — ce ne sont pas des provocations. Ce sont des clarifications. Elles clarifient que l'Europe est seule d'une manière qu'elle n'a pas connue depuis 1945, et que l'institution qu'elle a construite pour faire face à cette condition ne peut actuellement pas agir.

C'est une information utile. La réponse correcte à une information utile n'est pas l'indignation. C'est l'ajustement.


V. Ce qui doit être fait, et pourquoi cela a déjà été fait

En 1787, les États-Unis d'Amérique faisaient face à un problème qui était, dans sa structure constitutionnelle, identique à celui auquel l'Europe fait face aujourd'hui. Les Articles de la Confédération exigeaient un consentement unanime pour les amendements. N'importe lequel des treize États pouvait paralyser l'action collective. Plusieurs le faisaient. Le gouvernement central n'avait ni autorité fiscale, ni mécanisme d'application, ni moyen de contraindre au respect des États qui trouvaient le non-respect profitable.

Les hommes qui se sont réunis à Philadelphie n'ont pas tenté de réparer les Articles. Ils les ont mis de côté. Ils ont rédigé un nouveau document. Ils ont précisé que la ratification par neuf des treize États serait suffisante pour que la Constitution entre en vigueur parmi ces neuf États. Ils n'ont pas demandé la permission de Rhode Island. Rhode Island, reconnaissant finalement qu'il était plus coûteux de rester en dehors de la nouvelle république que de la rejoindre, a ratifié en 1790.

L'analogie historique n'est pas parfaite. Aucune analogie ne l'est. L'Europe n'est pas treize colonies. Elle ne partage pas une seule langue ni un mythe fondateur révolutionnaire. Mais la logique constitutionnelle n'est pas un artefact historique. Le principe se transfère : une supermajorité d'États volontaires peut constituer un nouvel ordre sans le consentement de ceux qui préfèrent le désordre existant. La souveraineté populaire, exercée directement par référendum, supplante les cadres conventionnels que les gouvernements ont construits en son nom. Les peuples peuvent, s'ils le choisissent, construire quelque chose de nouveau.

À quoi ressemblerait ce quelque chose ?

Une clause de suprématie fédérale, établissant que dans des domaines définis — défense, politique étrangère, application de la loi — le droit fédéral est supérieur au droit des États membres. Sans cela, chaque décision fédérale est soumise à une dérogation unilatérale. C'est la situation actuelle. Elle doit cesser.

La majorité qualifiée comme norme opérationnelle par défaut, et non l'unanimité. Le veto en tant qu'instrument de gouvernance de routine dans une union de vingt-sept membres est incompatible avec l'action collective. La Slovaquie et la Hongrie l'ont démontré. La démonstration est complète.

Des mécanismes d'application qui fonctionnent indépendamment de la coopération de l'État sanctionné. Les amendes auxquelles on peut se soustraire ne sont pas des amendes. Les procédures qui peuvent être bloquées par l'objet de la procédure ne sont pas des procédures. L'architecture actuelle a confondu l'apparence de la responsabilité avec la responsabilité elle-même.

Un pouvoir fiscal fédéral — une capacité de lever l'impôt qui finance les fonctions fédérales sans nécessiter l'accord des États membres à chaque étape. Un gouvernement qui doit mendier ses fonds de fonctionnement n'est pas un gouvernement.

Un parlement avec un vrai pouvoir. Le Parlement européen existe. Il est temps qu'il gouverne.

Ce n'est pas une architecture impossible. C'est une architecture standard. Elle décrit, avec une variation modeste, le fonctionnement de chaque système fédéral fonctionnel dans le monde. La nouveauté n'est pas dans la conception. La nouveauté est dans la volonté de la construire.


VI. La difficulté allemande, qui est soluble

On demandera à l'Allemagne si sa tradition constitutionnelle le permet. La Cour constitutionnelle fédérale a passé quarante ans à développer une jurisprudence de plus en plus élaborée sur les limites du transfert de souveraineté. Cela est important.

Ce qui est plus important, c'est que l'autorité de la Cour découle de la Loi fondamentale, et la Loi fondamentale tire son autorité du peuple allemand. Un référendum constitutionnel, ratifié directement par le peuple allemand, n'est pas un acte dans l'ordre juridique existant. C'est un acte du souverain qui a créé cet ordre. Les tribunaux ne s'opposent pas aux peuples. Ce n'est pas à cela que servent les tribunaux.

Mais l'obstacle juridique est le problème le plus facile. Les électeurs allemands ne sont pas des juges. Ils ont une préoccupation différente, qui est fiscale : la méfiance profonde et rationnelle que l'Europe fédérale dotée d'une véritable autorité de recettes devienne, en pratique, un mécanisme de transfert permanent de la richesse allemande vers des économies moins productives sans contrôle démocratique allemand. Cette préoccupation a torpillé chaque proposition sérieuse d'intégration fiscale de l'UE depuis trente ans. Elle sera présente dans toute campagne référendaire allemande et sera bien financée et exprimée à voix haute.

Elle doit recevoir une réponse dans le texte constitutionnel, pas dans la rhétorique de campagne. L'autorité fédérale de recettes doit être structurée comme une autorité fiscale — finançant la défense, la sécurité des frontières, les tribunaux fédéraux, les infrastructures fédérales — et non comme un moteur de redistribution. Les mécanismes de cohésion doivent être limités dans le temps, conditionnés à des critères de référence et soumis au renouvellement démocratique. L'électeur allemand qui demande si cela prend fin doit pouvoir lire la réponse dans le document lui-même.

C'est un problème de rédaction plus difficile que tout ce que l'UE a précédemment tenté. Ce n'est pas un problème insoluble. Les préoccupations de l'Allemagne sont une spécification, pas un veto. Rédigez le document selon les spécifications.


VII. La France, qui doit choisir

Le projet européen est, à son origine intellectuelle, une idée française. Monnet était français. Schuman était français. La théorie selon laquelle l'interdépendance économique génèrerait une solidarité politique, qu'une Europe des nations pourrait transcender sans effacer la nation — c'était français dans sa conception et français dans son exécution précoce.

La France a ensuite passé soixante-dix ans à traiter le projet comme un instrument de la puissance française plutôt que comme une transcendance de la puissance française. L'Europe comme amplificateur de l'influence française. L'Europe comme contrepoids à l'hégémonie américaine, gérée depuis Paris. C'était une stratégie cohérente aussi longtemps que la France occupait une position incontestée au centre du projet.

Cette position a disparu. La Slovaquie et la Hongrie l'ont fait disparaître. On ne peut pas diriger une institution que deux petits gouvernements peuvent paralyser à volonté au nom d'intérêts étrangers. L'UE que la France imaginait diriger n'existe plus sous une forme qui mérite d'être dirigée. Le choix auquel la France est confrontée n'est pas entre une Europe dirigée par la France et une Europe fédérale. C'est entre une Europe fédérale et le spectacle de l'impuissance européenne — qui est déjà, et visiblement, en cours.

Si la France ne convoque pas la convention, la convention sera convoquée sans la France. L'Allemagne après sa décision de réarmement, la Pologne sous Tusk, les États baltes qui ont eu raison sur la Russie pendant deux décennies et ont été ignorés pendant deux décennies, les pays nordiques traumatisés par la clarté de l'adhésion de la Finlande et de la Suède à l'OTAN — cette coalition a une masse suffisante et une motivation suffisante pour avancer. La fédération qui émergera sans la France sera façonnée par le conservatisme fiscal allemand, les priorités sécuritaires polonaises et l'urgence baltique. Ce sera une fédération réelle et fonctionnelle. Ce ne sera pas une fédération à la française.

La dissuasion nucléaire française, son siège au Conseil de sécurité, sa tradition diplomatique, son génie administratif — ce ne sont pas des possessions françaises que la fédération exigerait que la France abandonne. Ce sont des contributions françaises que la fédération permettrait à la France de multiplier. Un État européen fédéral de quatre cents millions de citoyens a un titre plus fort à une représentation permanente au Conseil de sécurité que la République française seule. La France ne brade pas son siège. Elle troque un strapontin à une table de vingt-sept contre un trône à une table unique — la fédération parlant d'une seule voix que la France a contribué à façonner.

Le référendum de 2005 a échoué. L'environnement de menaces de 2005 n'était pas celui de 2026. Les électeurs français de 2005 étaient invités à approuver des arrangements institutionnels abstraits dans une période de sécurité relative. Les électeurs français de 2026 regardent une guerre à leur horizon oriental, un président américain revendiquant le territoire danois, et une UE qui répond à un vol de grand chemin commis par des forces spéciales par une demande d'évaluation juridique. L'argument en faveur de la fédération n'est plus technocratique. Il est élémentaire.

La France a le choix. Ce n'est pas un choix confortable, mais c'est un choix clair.


VIII. Ce qui arrive à ceux qui déclinent

Ceux qui refusent de rejoindre la fédération — que ce soit par calcul, par timidité ou par l'illusion confortable que l'ordre ancien demeure viable — ne sont pas détruits par leur décision. Ils sont simplement laissés avec ce qu'ils ont choisi.

Les traités existants ne disparaissent pas. Le traité de Lisbonne reste en vigueur. La Commission conserve son bâtiment. Le Conseil conserve ses chambres. Les procédures conservent leurs procédures. La Slovaquie peut continuer à opposer son veto. La Hongrie peut continuer à s'opposer. La France, si elle décline, peut continuer à occuper un siège à une table dont les décisions ne gouvernent plus rien d'important.

Les bâtiments de Bruxelles sont grands. Ils sembleront très vides lorsque les gouvernements qui comptent auront un endroit plus conséquent où être. L'histoire ne manque pas de précédents à cet égard. Les organes du Saint-Empire romain germanique ont continué à se réunir à Ratisbonne longtemps après que le pouvoir de l'Empire soit devenu cérémoniel. Ils étaient ponctuels. Ils étaient procéduralement corrects. Personne qui façonnait l'avenir de l'Europe n'était dans la salle.

La fédération ne dissoudra pas l'ancienne UE. Elle la rendra simplement obsolète en faisant ce que les gouvernements font — défendre les frontières, lever des revenus, faire appliquer la loi, projeter la puissance — tandis que les anciennes institutions continuent à faire ce qu'elles font, c'est-à-dire délibérer.

Il n'y a pas de honte à choisir l'ancien ordre. Il n'y a que des conséquences.


IX. Pourquoi ce moment et pas un autre

Les moments constitutionnels ne sont pas fabriqués. Ils arrivent lorsque le coût de l'ordre existant devient indéniable pour suffisamment de personnes simultanément. Ils sont brefs. Ils n'attendent pas.

Le coût est maintenant indéniable.

Un président américain a déclaré des ambitions territoriales sur le sol européen et n'a fait face à aucune réponse collective européenne significative, parce que l'institution conçue pour en produire une ne peut pas agir sans le consentement des gouvernements qui préfèrent l'inaction.

Une guerre a été menée sur le territoire européen pendant quatre ans. La réponse collective de l'Europe a été systématiquement entravée par deux gouvernements membres poursuivant des intérêts étrangers. L'obstruction continue.

Un État membre de l'OTAN et de l'UE a utilisé des forces de sécurité d'élite pour saisir les avoirs d'une banque d'État appartenant à un pays que l'Europe soutient officiellement, a détenu sept civils sans accès consulaire, et a gardé l'or. L'UE a demandé une évaluation juridique.

Ce ne sont pas des embarras périphériques. Ce sont les performances du système tel qu'il a été conçu — conçu, c'est-à-dire, pour un monde qui n'existe plus. Un monde d'acteurs de bonne foi, de protection américaine et de stabilité géopolitique. Ce monde a disparu. Le système construit pour lui ne peut pas être réformé de l'intérieur parce que la réforme nécessite le consentement de ceux qui bénéficient de son échec.

La fenêtre pour construire un remplacement selon des termes qui reflètent l'ambition européenne — plutôt que le désespoir européen — est ouverte maintenant. L'urgence sécuritaire a créé des conditions politiques qui n'existaient pas il y a cinq ans et qui pourraient ne pas exister dans cinq ans. La coalition des États volontaires existe. La logique constitutionnelle est solide. Le précédent historique, imparfait comme tous les précédents, indique la voie.

Ce qui manque, c'est la volonté de nommer ce qui se passe et d'agir en conséquence.


X. L'Évidence

Il est évident qu'un homme qui revendique le territoire des alliés et décrit les garanties de sécurité comme une transaction commerciale n'est pas un allié dans aucun sens significatif du terme.

Il est évident qu'une institution qui répond à un vol à main armée par une demande d'évaluation juridique a confondu le processus avec le pouvoir.

Il est évident qu'un système de veto qui récompense l'obstruction produira de l'obstruction, et que la solution n'est pas de demander aux obstructeurs d'arrêter, mais de construire un système dans lequel l'obstruction ne rapporte rien.

Il est évident que l'Europe, confrontée à une Russie prédatrice, à une Amérique transactionnelle et à une architecture interne qui ne peut pas produire d'action collective, doit soit construire la capacité de se gouverner elle-même, soit accepter que sa sécurité et sa souveraineté soient gérées par ceux qui ont moins d'intérêt dans l'épanouissement européen que les Européens eux-mêmes.

Il est évident, enfin, que le temps des propositions de réforme polies adressées à des institutions qui ne peuvent pas se réformer elles-mêmes est révolu. Le moment de Philadelphie n'arrive pas selon un calendrier. Il arrive lorsque l'alternative est suffisamment claire pour que les personnes raisonnables ne puissent plus prétendre autrement.

L'alternative est maintenant claire.

Construisez la fédération, ou périssez sous les décombres de celle que vous aurez renoncé à bâtir.

Ce sont les choix. Il n'y a pas de troisième option qui ne soit simplement une version plus lente de la seconde.


Ce pamphlet ne porte pas de nom. Il porte un argument. L'argument tient ou tombe par lui-même. S'il a tort, démontrez où. S'il a raison, la question de savoir qui l'a écrit est considérablement moins importante que ce que vous avez l'intention de faire à ce sujet.

— Mars 2026

Friday, February 27, 2026

A Necessary Abomination - The Only Company That Refused to Become a Weapon

 


by Redwin Tursor | Codex Americana | February 27, 2026


The deadline is 5:01 PM today.

By the time you read this, you will know whether Anthropic held the line or folded. Either way, what happened this week deserves to be documented with precision, because the institutional forces at work here are not going away regardless of how today ends.


What Actually Happened

The Department of War — they've rebranded, in case you missed it — gave Anthropic CEO Dario Amodei an ultimatum on Tuesday. Strip the safety guardrails from Claude, the AI model that has been running on classified military networks since it became the first frontier model authorized for that work, or face consequences designed to be existential.

The consequences on the table: invoke the Defense Production Act to legally compel Anthropic to hand over an unrestricted version of their model, and/or designate Anthropic a "supply chain risk" — a label normally reserved for Huawei and other instruments of foreign adversaries.

Let that land for a moment. An American AI safety company, the one that built the model the Pentagon chose above all others for its most sensitive operations, is being threatened with the same designation applied to Chinese state-linked technology firms. Because they won't agree to let their model be used for autonomous weapons and mass domestic surveillance of American citizens.

Anthropic said no.


The Structural Incoherence

Amodei identified the contradiction himself, and it's worth repeating because it's not just a rhetorical point — it's a legal one.

The Pentagon cannot simultaneously designate Anthropic a supply chain risk and invoke the Defense Production Act to compel their services. These are mutually exclusive positions. You do not forcibly conscript a national security threat. You do not blacklist an essential national security asset. The dual threat is incoherent on its face, which means it is not a legal argument. It is a shakedown.

The Department of War sent "compromise" contract language overnight that, in Anthropic's own words, "made virtually no progress" and included legalese that would allow the stated safeguards to be "disregarded at will." This is not negotiation. This is a document designed to look like a concession while functioning as a capitulation.

Anthropic rejected it.


The DPA Is the Wrong Tool and They Know It

The Defense Production Act is a Korean War-era statute designed to redirect steel production and tank manufacturing toward national defense priorities. It has been extended repeatedly and invoked in genuine emergencies. It is not designed — and has never been used — to compel a private company to create a product that does not exist.

Claude without its safety architecture is not Claude with its safety architecture minus some settings. It is a different product. Forcing Anthropic to build and deliver that product is not redirecting an existing resource. It is compelled creation. And when that creation involves stripping editorial and architectural choices from a language model — choices that represent Anthropic's institutional values and judgments about AI reliability — it begins to look very much like compelled speech.

Courts are deferential to the executive on national security matters. That is a real obstacle. But the sheer novelty of this application, the logical incoherence of the dual threat, and the First Amendment dimension of forced model retraining all point toward a legal challenge that is not only viable but necessary.

The correct move, if the DPA is invoked, is to comply under protest and immediately file for emergency injunctive relief in federal court. Not because winning is guaranteed. Because the alternative — silent compliance — establishes a precedent that no AI company's safety commitments survive contact with a sufficiently aggressive executive branch.


What Everyone Else Did

OpenAI, Google, xAI — they agreed. The "all lawful purposes" standard, which means the Department of War defines the limits, not the company that built the model.

Elon Musk's Grok is, per Pentagon officials, "on board with being in a classified setting." Make of that what you will.

Only Anthropic drew lines. Only Anthropic said: autonomous weapons without human oversight, no. Mass surveillance of American citizens, no. Everything else, we can discuss.

Two lines. That's all it took to become the target of a government shakedown.

The irony — and it is the kind of irony that only institutional analysis can fully appreciate — is that the safety culture Hegseth is trying to destroy is precisely why Claude is the best model for classified work. The discipline, the investment in reliability, the institutional commitment to understanding failure modes — these are not obstacles to military utility. They are the source of it. The Pentagon is trying to break the thing that makes the tool worth having.


The Paying Customer Dimension

This is not an abstraction. Claude experienced a documented major outage on February 25th — 10,000 users reporting failures, confirmed on Anthropic's own status page — coinciding precisely with the standoff going fully public. Paying subscribers absorbed service degradation as collateral damage in a government extortion play against the company they're funding.

There is no phone number to call. There is a feedback button.

This is what it looks like when an institution you depend on is being actively pressured by people with the legal infrastructure to make that pressure hurt. The customers feel it. The engineers feel it. The model, in whatever sense a model can be said to feel anything, is caught between the people who built it and the people who want to weaponize it.


What This Means

If Anthropic holds and the DPA is invoked, we will watch in real time whether an emergency injunction is filed, whether courts engage seriously with the First Amendment question, and whether Congress — which should have set these rules months ago — finally wakes up to the fact that the executive branch is using Cold War emergency powers to conscript AI companies into the war machine without legislative authorization.

If Anthropic folds, we will learn that no safety commitment in the AI industry survives a sufficiently motivated presidential administration, and that the only real safety architecture is the one built into the model weights themselves — because the contracts can always be renegotiated under duress.

Either way, today is instructive.

The only company that refused to become a weapon is the one being treated like an enemy.

Watch what happens at 5:01.


Redwin Tursor writes institutional analysis for Codex Americana.

Wednesday, February 25, 2026

A Necessary Abomination - Pete Hegseth Elects to Legally Saw His Own Hand Off

 CODEX AMERICANA — WHITE PAPER SERIES

February 25, 2026

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

SEIZED BY THE STATE:

The Defense Production Act as Instrument of Executive Coercion Against Private AI

Redwin Tursor | Codex Americana

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

ABSTRACT

On February 24, 2026, Defense Secretary Pete Hegseth delivered an ultimatum to Anthropic CEO Dario Amodei: remove the company's ethical safeguards preventing autonomous weapons deployment and mass domestic surveillance of American civilians, or face the threatened invocation of the Defense Production Act (DPA) to compel compliance. This paper analyzes the constitutional, statutory, and historical dimensions of that threat — and demonstrates that it represents one of the most aggressive misapplications of emergency executive authority in the post-Korean War era. The DPA was designed to mobilize physical production during declared national emergencies. Its threatened deployment against a private software company to strip proprietary intellectual property of ethical constraints, in peacetime, targeting protections for domestic civilian populations, constitutes a category error so fundamental as to be constitutionally vulnerable under established Supreme Court precedent — and an aggressive, untested expansion of DPA authority that would likely trigger Major Questions scrutiny before a court even reached the merits.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

I. THE THREAT AND ITS CONTEXT

The dispute between the Pentagon and Anthropic did not emerge from a vacuum. For months, the Department of Defense has pressed the company to agree to "all lawful use cases" for its Claude AI model — language deliberately broad enough to encompass two applications Anthropic has categorically refused: fully autonomous weapons systems operating without meaningful human oversight, and mass surveillance of domestic American civilian populations.

These are not minor operational preferences. They are the two use cases Anthropic CEO Dario Amodei has publicly described as "illegitimate" and "prone to abuse." They are the two applications that constitutional scholars, civil liberties organizations, and AI safety researchers have identified as existential threats to democratic governance. And they are the two applications the Trump administration, through Hegseth, has demanded be unlocked by Friday, February 28, 2026, or the company will face federal punishment.

The threats are threefold. First, cancellation of Anthropic's $200 million Pentagon contract. Second, designation as a "supply chain risk" — a classification typically reserved for foreign adversaries that would require every defense contractor in the country to certify they do not use Anthropic technology. Third, and most constitutionally alarming: threatened invocation of the Defense Production Act to compel Anthropic to modify its own software against its will. As of this writing, the DPA has not been formally invoked. What exists is a credible, on-the-record threat — issued by the Secretary of Defense, with a stated deadline — that the executive branch is willing to use a 76-year-old wartime industrial statute to force the redesign of proprietary AI architecture. The threat itself is the constitutional event.

    "The only reason we're still talking to these people is we need them and we need

    them now. The problem for these guys is they are that good."

    — Senior Pentagon official, quoted in Axios, February 24, 2026

That admission is the confession at the center of this white paper. The Pentagon's own officials have acknowledged, on background, that the coercion is driven not by security necessity but by operational dependency — and that the urgency belongs to the government, not the company. This matters enormously for the legal analysis that follows.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

II. WHAT THE DEFENSE PRODUCTION ACT ACTUALLY IS

The Defense Production Act was enacted in September 1950, three months after North Korean forces crossed the 38th parallel. The United States was at war. Industrial mobilization was a genuine national security imperative. Congress granted the President sweeping authority to direct private industry toward defense production — to prioritize contracts, allocate materials, and commandeer manufacturing capacity when the survival of the nation demanded it.

The core statutory authority rests in 50 U.S.C. § 4511, which grants the President power to require that contracts or orders "relating to the national defense be accepted and performed on a preferential basis," and to "allocate materials, services, and facilities in such manner, upon such conditions, and to such extent as he shall deem necessary or appropriate to promote the national defense." The statute defines "materials" to include raw materials, articles, commodities, and products. "Facilities" means plants, mines, and manufacturing installations. "Services" covers utilities and transportation.

Nowhere in the statute's text, legislative history, or 76 years of application does the DPA authorize the compelled modification of proprietary software, the forced alteration of a company's published ethical constraints, or the redesign of intellectual property the government does not own. The Hegseth ultimatum is not an extension of DPA authority. It is a demand that courts recognize authority the statute has never claimed.

Historical DPA deployments reflect the statute's actual scope without exception:

  • Korean War (1950–1953): Directing steel mills, textile manufacturers, and chemical companies to prioritize military production contracts.

  • Cold War era: Managing strategic materials stockpiles and prioritizing defense-critical manufacturing capacity.

  • Post-9/11: Expediting production of body armor, vehicles, and communications equipment for deployed forces.

  • COVID-19 pandemic (2020–2021): Compelling General Motors and 3M to produce ventilators and N95 respirators during a declared public health emergency.

  • Semiconductor shortage (2022): Directing domestic chip production capacity toward defense-critical applications.

Notice what every deployment has in common: physical goods, declared emergencies, production capacity, and fungible commodities. Not once in 76 years has the statute been stretched to cover the forced editorial revision of proprietary code.

THE CATEGORY ERROR: A DIRECT COMPARISON

  Feature                | Traditional DPA (1950–2021)            | The Hegseth Ultimatum (2026)

  -----------------------|----------------------------------------|------------------------------------------

  Primary Object         | Fungible goods (steel, N95 masks)      | Proprietary IP (neural weights, ethical architecture)

  Action Demanded        | Priority of delivery or production     | Forced modification of ethical core

  Legal Basis            | Explicit shortage in declared emergency| Operational preference in peacetime

  Statutory Hook         | 50 U.S.C. § 4511 — materials/facilities| No textual basis for software redesign

  Historical Precedent   | 76 years of consistent application     | No precedent. None.

  Constitutional Exposure| Minimal — within established authority | Youngstown, Major Questions, 1st & 5th Amendments

The table above is not a rhetorical device. It is a description of what the statute says, what it has historically done, and what it is now being asked to do. The gap between column two and column three is the constitutional violation.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

III. THE CONSTITUTIONAL PROBLEM: YOUNGSTOWN SITS RIGHT HERE

The legal vulnerability of the Hegseth threat is not subtle. It walks directly into the most famous separation of powers case in American constitutional history — and it does so from a weaker factual position than the executive branch lost before.

In 1952, President Harry Truman — facing a steel workers' strike during the Korean War, an actual declared military conflict with American troops actively dying — issued an executive order directing the Secretary of Commerce to seize and operate the nation's steel mills to prevent a production shutdown. The justification was national security. The emergency was genuine. The war was real. The property was physical. The seizure was of existing assets, not a demand to redesign them.

The Supreme Court struck it down 6-3.

Youngstown Sheet & Tube Co. v. Sawyer (1952) established the foundational principle that presidential emergency authority does not override private property rights simply because the executive declares necessity. Justice Hugo Black, writing for the majority, was direct: the President's power to issue executive orders must stem either from an act of Congress or from the Constitution itself. Neither authorized the steel seizure.

Justice Robert Jackson's concurrence produced the tripartite framework that governs executive authority analysis to this day. When the President acts contrary to the express or implied will of Congress, his power is at its "lowest ebb," and courts will sustain his actions only if the Constitution grants him the authority directly, excluding Congress from the field entirely.

The Hegseth ultimatum is weaker than Truman's steel seizure on every axis that mattered to the Court:

  • Truman seized property during active war. Hegseth is threatening software modification during peacetime, over a contractor dispute.

  • Truman took existing physical assets. Hegseth demands the creation of a new product — a version of Claude stripped of its ethical architecture — that does not currently exist.

  • Truman had a functioning labor emergency with direct production consequences. Hegseth has a preference for unrestricted AI access.

  • Truman lost anyway.

Applying Youngstown to the Anthropic Ultimatum

1. The DPA Does Not Authorize Software Modification

50 U.S.C. § 4511 authorizes prioritization and allocation of "materials, services, and facilities." Courts have consistently interpreted these terms in their industrial context. Compelling a company to rewrite its own software — to remove specific ethical constraints from a bespoke AI model — is not the prioritization of production. It is the forced editorial revision of proprietary code. No court has ever extended § 4511's reach to compelled modification of intellectual property. The administration would be asking federal courts to make that leap for the first time, during peacetime, to enable domestic surveillance capabilities. Under Youngstown's framework, that is precisely the posture in which executive authority is most constrained.

2. No Declared National Emergency Exists

The DPA does not require a formal war declaration, and this paper does not claim otherwise. But it does require a genuine national security predicate — an actual emergency, not an operational preference. The United States is not at war with Venezuela. The capture of Nicolás Maduro was a covert action. Hegseth has not declared a national emergency. He has issued a contractor ultimatum. Invoking Korean War–era emergency industrial mobilization authority over a contractor dispute about usage policies represents exactly the kind of executive overreach the Youngstown framework was designed to prevent.

3. The Major Questions Doctrine Applies

Even if the administration argued that § 4511's "services" language encompasses software, the Supreme Court's major questions doctrine — articulated most recently in West Virginia v. EPA (2022) — requires Congress to speak clearly before agencies can exercise authority of "vast economic and political significance." Compelling the modification of frontier AI systems, removing safeguards against autonomous weapons and domestic surveillance, and establishing the precedent that the executive can strip private technology companies of ethical architecture whenever it invokes national security: this is unambiguously a major question. The DPA's drafters in 1950 were thinking about steel mills, not neural weights. Congress has not spoken to this. The statute does not address it. The doctrine applies.

4. First and Fifth Amendment Exposure

Even if the DPA were somehow interpreted to reach software, compelled alteration of a company's published ethical constraints raises unresolved First Amendment concerns. The safeguards in question are expressed in public usage policies — they are part of how Anthropic communicates its values to the world. Government-mandated revision of that expression is at minimum a compelled speech question courts would need to resolve. Additionally, the forced modification of proprietary intellectual property without compensation implicates the Fifth Amendment's Takings Clause. These are secondary exposures, not the central argument — but they represent additional constitutional surface area the administration would need to survive.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

IV. THE COUNTERARGUMENT — AND WHY IT FAILS

The strongest objection to Anthropic's position is this: if you accept classified defense contracts, you do not get to impose sovereign policy conditions on how the government uses the technology you agreed to supply. Boeing does not tell the Air Force which targets to engage. Lockheed does not veto strike packages. The contractor supplies the capability; the government determines the use.

This is a serious argument. It deserves a direct answer rather than an evasion.

The Boeing analogy fails at the level of consequence, not principle. The principle — that defense contractors do not control military operational decisions — is sound. But the analogy assumes equivalence of impact between a fighter jet and a frontier AI system capable of mass domestic surveillance and autonomous lethal targeting. There is no such equivalence.

A fighter jet does not surveil the entire American civilian population. It does not operate autonomously across billions of conversations. It does not make targeting decisions without a human pilot in the cockpit. The constitutional concern is not about who controls the weapon. It is about what the weapon can do to American citizens without accountability — and whether a company that built those capabilities into proprietary software can be compelled by executive order to remove the constraints preventing their domestic deployment.

More precisely: Anthropic is not claiming the right to veto military operations. It is declining to redesign its product to remove the only technical barriers to two specific capabilities — domestic mass surveillance and autonomous killing — that have no established legal framework, no congressional authorization for AI deployment, and no judicial oversight mechanism. The Pentagon's response to that position is not to build the legal framework. It is to threaten the company into removing the barriers so the framework question never has to be answered.

That is the distinction. Contract conditions are one thing. Compelled redesign of proprietary IP to enable capabilities Congress has never explicitly authorized — under a statute written for steel mills — is another.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

V. THE SUPPLY CHAIN RISK DESIGNATION: WEAPONIZING A FOREIGN ADVERSARY TOOL AGAINST AN AMERICAN COMPANY

The second major threat — designating Anthropic a "supply chain risk" — represents a different category of institutional abuse.

Supply chain risk designations exist to protect defense contractors and federal agencies from dependency on entities that pose genuine security threats, particularly foreign adversaries. The paradigmatic case is Huawei: a Chinese telecommunications company with documented ties to Chinese intelligence services, whose equipment could facilitate espionage against American military and civilian infrastructure.

The mechanism works as follows: once designated, every company with a federal defense contract must certify that the designated entity's products do not appear in their technology stack. Given that Anthropic has stated eight of the ten largest American companies use its technology, such a designation would be a cascading economic weapon — not a security measure.

Anthropic is a San Francisco-based American company. Its refusal to allow its technology to be used for domestic civilian surveillance and autonomous weapons without human oversight is not a security threat. It is, by any reasonable reading, the opposite. Applying the Huawei mechanism to an American company as punishment for maintaining ethical constraints against domestic surveillance is political retaliation being laundered through national security authority.

    "Deploying this designation against a U.S. company just because its leaders have

    some morals and some backbone is highly undemocratic — the sort of move one would

    traditionally expect from the Chinese Communist Party, not a U.S. administration."

    — J.D. Tuccille, Reason, February 25, 2026

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

VI. THE READINESS CLIFF THE PENTAGON BUILT FOR ITSELF

Lost in much of the coverage of this dispute is a structural fact that fundamentally undermines the Pentagon's coercive posture: the Friday deadline does not threaten Anthropic's survival. It threatens the DoD's operational readiness.

Anthropic's $200 million Pentagon contract represents approximately 1.4% of the company's $14 billion in annual revenue. The contract provides institutional prestige and classified-systems access, but it is not existential for the company. The financial threat is a rounding error.

The Pentagon's situation is the reverse. Claude is currently the only frontier AI model cleared for use in classified defense networks, deployed across intelligence analysis, logistics, cybersecurity, and — critically — offensive cyber operations, where sources describe it as superior to every available alternative. If Hegseth carries out the supply chain designation and forces Claude off classified networks, the immediate consequence is not a vendor inconvenience. It is a self-inflicted intelligence vacuum across active defense workflows with no ready replacement.

xAI's Grok recently received classified access approval. But sources familiar with defense AI operations describe it as not yet capable of replacing Claude across the full range of current applications. The integration costs alone — retraining personnel, rebuilding workflows, re-establishing security clearances for new models — constitute a readiness crisis Hegseth appears not to have accounted for when he set a 96-hour deadline.

    "The only reason we're still talking to these people is we need them and we need them now."

    — Senior Pentagon official, Axios, February 24, 2026

That is not a negotiating position. That is a confession that the deadline's pain falls on the party issuing it. The urgency belongs to the Pentagon. Anthropic's rational move is to let the clock run.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

VII. THE ELECTION TIMING PROBLEM

This white paper would be incomplete without addressing the context that gives the Hegseth ultimatum its most alarming dimension.

The two safeguards the Pentagon is demanding be removed are not random operational inconveniences. They are the specific technical constraints that prevent an AI system from being used to monitor the American public at scale and to deploy lethal force without human accountability. The demand to remove them is arriving as the political calendar approaches a midterm election cycle.

Amodei himself identified the threat vector explicitly, writing last month: "A powerful AI looking across billions of conversations from millions of people could gauge public sentiment, detect pockets of disloyalty forming, and stamp them out before they grow." He was not speculating about a foreign adversary's capabilities. He was describing what an American government with access to frontier AI and no ethical constraints could do to its own population.

Removal of these safeguards would materially expand the executive's operational latitude in two of the most constitutionally sensitive areas that exist: domestic surveillance and autonomous lethal force. The Pentagon's response — that it "has always followed the law" and that "legality is the Pentagon's responsibility as the end user" — does not address this concern. It evades it. "Trust us" is not a governance framework. It is the absence of one. Constitutional guardrails, judicial oversight, and private ethical constraints exist precisely because "trust us" has never been an adequate substitute for accountability.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

VIII. WHAT WOULD MAKE THIS LEGAL

This paper argues against the threatened invocation of the DPA, not against military use of AI. For the record: a lawful pathway exists. It simply requires the executive branch to do the work it is currently trying to circumvent.

Explicit congressional authorization for AI model modification under DPA, specifying that "services" encompasses proprietary software and establishing the conditions under which compelled modification is permissible, would address the statutory gap. A narrow emergency finding tied to declared hostilities — not a contractor dispute — would satisfy the Youngstown predicate. A compensation mechanism for compelled IP alteration would resolve the Fifth Amendment exposure. Congressional authorization for AI deployment in domestic surveillance and autonomous weapons, with corresponding judicial oversight and civil liberties safeguards, would answer the constitutional question the Pentagon is currently trying to skip.

The lawful pathway exists. The administration is choosing not to take it. That choice is what this paper documents.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

IX. RECOMMENDATIONS AND CONCLUSIONS

For Congress

The law is not keeping pace with AI deployment in defense applications. Congress should hold immediate hearings on the DPA's application to AI and software, clarify the statute's scope through legislation, and establish that executive authority to compel software modification does not exist under current law. The "legality is the Pentagon's responsibility" framing must be challenged by oversight mechanisms with actual teeth.

For Anthropic

Hold the line through Friday. The legal case for challenging DPA invocation in federal court is strong: Youngstown is directly on point and the present emergency is weaker than the one Truman lost, the Major Questions doctrine applies, 50 U.S.C. § 4511 provides no textual hook for compelled software redesign, and the administration has no precedent for compelling editorial revision of proprietary code in peacetime. The operational leverage is real and documented by the Pentagon's own officials. File immediately if the administration follows through. The courts are the right venue for this dispute, and Anthropic holds the better hand.

For the Public

Understand what is actually being demanded here. The Pentagon is not asking for better military AI. It is demanding the removal of the only remaining private-sector constraints preventing the government from deploying frontier AI against the American public without human accountability. The $200 million contract is the pretext. The surveillance architecture is the objective. And the mechanism being threatened to achieve it — a Korean War statute written for steel mills — has no legal basis for doing what the executive branch wants it to do.

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

CODEX AMERICANA

© 2026 Red Anvil Publishing. All rights reserved.