THE STARLING DOCTRINE
A Coalition Framework for Anti-Capitalist Victory Through Cooperation, Emergence, and Virtual Hierarchy
DEFINITIONS AND FRAMEWORK CONTEXT
This document emerges from a cross-impact scenario modeling exercise that analyzed twelve categories of economic life simultaneously across seven distinct ideological towers — organized clusters of belief, prescription, and institutional power that each propose a different economic future. The seven towers are: Anti-Capitalist, Hyper-Capitalist, Technofascist, Ivory Tower Academia, Respected Individual Futurists, Traditional and Sacred Economics, and Science Fiction Predictive. Each tower contains multiple factions with internal disagreements but shares enough foundational assumptions to constitute a coherent worldview cluster.
Cross-impact scenario modeling is the practice of running these towers against each other simultaneously across all twelve economic categories rather than analyzing any single tower or category in isolation. The artificial siloing of these towers from each other — the way labor economists don't talk to monetary theorists who don't talk to ecologists who don't talk to theologians — is not accidental. It is maintained. It serves specific interests. Cross-impact analysis makes the connections visible that siloing conceals.
The twelve economic categories are: Production and Labor, Money and Exchange, Ownership and Property, Energy and Resource Flows, Governance and Enforcement, Trade and Supply Chains, Demographics and Human Capital, Technology and Automation, Ecology and Planetary Limits, Culture and Meaning Systems, Inequality and Distribution, and Information and Knowledge Economics.
When all seven towers are run simultaneously against all twelve categories and assessed by a single metric — does this produce more or less human flourishing for the people at the bottom of the system — one conclusion emerges clearly. The anti-capitalist tower is correct in its diagnosis. Every other tower produces, if fully realized, the progressive concentration of flourishing in fewer hands until the category becomes operationally meaningless for most people alive. The anti-capitalist execution has been a catastrophe. This document is about fixing that.
A note on the metric: "human flourishing for the people at the bottom" means, at minimum, material conditions measurable without specialist equipment — whether people are fed, housed, healthy, physically safe, and able to participate in decisions that affect their lives. It does not mean happiness scores or self-reported satisfaction, which are gameable. It means observable material baselines, assessed over time, verified by people who live the conditions rather than people who administer programs. When in doubt, the person experiencing the condition is a more reliable witness than the institution claiming credit for improving it.
THE ETHICAL OPERATING SYSTEM
This framework runs on a specific ethical foundation that must be stated before the strategy can be understood. The foundation is this: kindness is the arbiter of necessity. Every action, tactic, and strategic decision is filtered through a single question — is this necessary, necessary for whom, and at what human cost to actual humans living actual lives? This is not kindness in the sense of softness or accommodation. It is kindness as a precision instrument. It refuses to abstract people into categories, classes, or historical forces. It insists that the people at the bottom of every other tower's outcome are the non-negotiable metric against which all decisions are measured.
This metric cannot be gamed in its strongest form: the people experiencing the conditions are the primary witnesses. It can be distorted — redefined narrowly to exclude inconvenient populations, or measured selectively to show gains in one category while ignoring losses in another. The framework names this distortion explicitly as a form of capture and routes all metric disputes through the outward authority loop's assess function rather than through internal coalition politics.
It is the framework's immune system against becoming what it opposes. When a movement that begins by opposing hierarchy becomes hierarchical, when a movement that begins by opposing violence becomes violent, when a movement that begins by opposing exploitation becomes exploitative, it is because it lost this metric. The people at the bottom got worse. The movement stopped noticing.
PART ZERO: THE CRISIS — WHY THIS MUST WORK
We are inside a ten-thousand-year crisis event. Five vectors are converging simultaneously and accelerating each other. Ideological collapse has produced a vacuum that the most organized and ruthless actors are filling by default [Gramsci — the old is dying and the new cannot yet be born]. Economic collapse has concentrated wealth to levels not seen since the decades before the two largest wars in human history [Piketty 2014 — Capital in the Twenty-First Century; World Inequality Database 2022 — top 10 percent owns 76 percent of global wealth]. Technological transition is occurring inside a system of radical wealth concentration with no democratic governance of how the tools are deployed, which means the people building the tools are setting the defaults for everyone else [Acemoglu and Johnson 2023 — Power and Progress]. Cultural collapse is destroying the shared meaning systems that make collective action possible [Putnam 2000 — Bowling Alone; Haidt and Rausch 2022 — After Babel]. And climate collapse is the terminal vector — the one that converts all the others from recoverable crises into potentially unrecoverable ones [IPCC Sixth Assessment Report 2021-2022; Rockstrom et al. 2009, updated 2023 — six of nine planetary boundaries now exceeded].
These vectors do not operate in sequence. They compound. Economic collapse deepens cultural fracturing. Cultural fracturing fills with authoritarian ideology. Authoritarian ideology captures the technological transition. Captured technology entrenches economic concentration. Entrenched economic concentration paralyzes the collective action required to address climate collapse. Climate collapse then operates on a population already weakened by everything else simultaneously.
The people who will pay the highest price for failure are the people at the bottom of every other tower's outcome. They are already paying it. The time available is measured in years and decades, not generations. There is no version of this in which slow, divided, or dogmatic is acceptable. This document is about winning now, with the coalition available now, using what actually works rather than what the correct theory says should work.
PREAMBLE: THE HONEST STARTING POSITION
Anti-capitalism is correct. Every other tower is wrong in the specific sense that their prescriptions, if fully realized, lead to human diminishment — the concentration of flourishing in fewer and fewer hands until the category of human flourishing becomes operationally meaningless for most people alive. This is not a political opinion. It is what the modeling shows. The diagnosis is correct. The execution has been a catastrophe not because the goal is wrong but because the factions within the tower have historically been more committed to being right than to winning. Being right while losing is a luxury the people at the bottom cannot afford. This is about winning.
Winning does not mean electoral victory, though elections matter. It does not mean seizing the state, though policy matters. It means building a world in which the people at the bottom are materially better off — fed, housed, healthy, free, participating in the decisions that govern their lives — and in which the systems that currently prevent this have been replaced by systems that produce it. That is the goal. Everything in this document is in service of that goal and nothing else.
PART I: WHY ANTI-CAPITALISM KEEPS LOSING
Name the disease before prescribing the cure. Three endemic failure modes have reproduced themselves across every generation, geography, and ideological flavor for 150 years. They are not bad luck. They are structural. They will reproduce again unless the structure that produces them is deliberately replaced.
FAILURE MODE 1: THE PURITY SPIRAL
Every anti-cap faction eventually develops a threshold of ideological correctness that it uses to exclude potential allies. The Marxists exclude the anarchists. The anarchists exclude the Marxists. The ecosocialists exclude anyone with a smartphone. The degrowthers exclude anyone who hasn't fully internalized the degrowth frame. The result is a permanent pre-revolutionary condition in which the coalition spends more energy policing its own borders than advancing on the enemy. The purity spiral is not accidental. It is a natural consequence of movements that have no external victory condition — no moment at which winning is declared and coalition maintenance becomes more important than doctrinal precision. When you never win, the only game left is being more correct than the person next to you. It feels like integrity. It functions like suicide. The Starling Doctrine's answer: replace doctrinal thresholds with behavioral thresholds. You can believe whatever you want. You cannot serve the enemy. That is the only line. Everything else is friction to be managed, not grounds for expulsion.
FAILURE MODE 2: TECHNOLOGY AMBIVALENCE AS PARALYSIS
The anti-cap tradition has a complicated relationship with technology ranging from the Luddite tradition's principled critique to fully automated luxury communism's techno-utopianism. Both are intellectually coherent positions. Neither produces a functional coalition stance because neither accounts for the tactical reality: the enemy is using every available tool and building new ones daily. Waiting for consensus on technology within a coalition that includes Amish-adjacent traditionalists, open-source maximalists, indigenous sovereignty frameworks, and accelerationists is not a strategy. It is a guarantee of permanent indecision while capital builds the infrastructure of permanent control. The tools are not the problem. Who holds the tools and toward what end is the problem. The Starling Doctrine's answer: no technology is inherently evil. Tactical advantages must be used. Individual nodes may opt out of any specific technology. They do not get veto power over the coalition's use of it. The flock moves toward the food. Birds that don't follow self-select to the edge. The coalition does not wait for them.
FAILURE MODE 3: THE LEADERSHIP PARADOX
Anti-capitalist culture is structurally allergic to hierarchy. This is philosophically coherent — hierarchy is precisely what is being opposed. But horizontalism without coordination produces the consensus paralysis that has stalled every major anti-cap organizing attempt in living memory. Occupy is the canonical example: perfect horizontalism, zero durable outcomes. The alternative — vanguard party organization — produces the opposite failure: the revolution captures the state and the state captures the revolution. The hierarchy that was supposed to be temporary becomes permanent. The medicine becomes the disease. This has happened enough times that it is not a cautionary tale anymore. It is a known failure mode with a known mechanism. The Starling Doctrine's answer: virtual hierarchy through demonstrated usefulness. Authority is earned continuously by doing the most good. It cannot be appointed, inherited, captured, or held. The center of gravity exists and is real. It just cannot be owned. This is the difference between the murmuration and the army. The army has a general. The murmuration has physics.
PART II: THE STARLING DOCTRINE — CORE FRAMEWORK
Starling murmurations are the most efficient large-scale coordinated movement in nature. Thousands of individual birds producing behavior that looks centrally directed but has no center. Each bird follows three rules: stay close to your neighbors, match their speed and direction, avoid collision. The flock emerges from those rules. It moves as one. It cannot be decapitated because it has no head [Ballerini et al. 2008 — Empirical investigation of starling flocks — interaction rules and emergent behavior]. This is the organizational model. Not as metaphor. As operational blueprint. The simplicity is the point. Simple rules followed consistently by many nodes produce complex emergent behavior that no individual node planned and no external force can easily predict or disrupt.
THE THREE RULES
Rule 1: Stay close to your neighbors. Maintain active coalition relationships across factional lines. Not agreement — proximity. Know what adjacent nodes are doing. Share intelligence. Coordinate on overlapping goals without requiring identical goals. The network density is what produces emergent coherence. A dense network of nodes that disagree on everything except the behavioral threshold will outperform a sparse network of nodes that agree on everything. Density matters more than purity. Connection matters more than consensus.
Rule 2: Match speed and direction when moving toward the goal. When the coalition is moving toward a specific target — a campaign, a policy fight, a mutual aid mobilization, a cultural intervention — individual nodes subordinate their particular agenda to the collective movement. Not permanently. For the duration of the effort. Afterwards, return to your own work. This is not ideological surrender. It is tactical coordination. You retain everything you believe. You contribute it toward a shared direction for as long as the shared direction serves the people you are both trying to serve.
Rule 3: Avoid collision. The only hard rule. Do not actively harm other nodes in the coalition. Do not serve the enemy. Everything else is negotiable. Collision — factional warfare, sharing information that helps capital against labor, actively sabotaging coalition efforts, running purity spirals that drive potential allies out — is the one expulsion-level offense. Not because harmony is sacred. Because collision is the enemy's most effective weapon against us and we cannot hand it to them for free.
A note on passive collision: a node that uses its proximity to conduct doctrinal review of another node — questioning whether a node's beliefs, affiliations, or methods meet an ideological standard — outside the loop's assess function is committing collision. The mechanism is slower than factional warfare and harder to name, but the effect is identical: it re-introduces the purity spiral through the back door of concerned questioning. Criticism is legitimate. Criticism backed by outcome data routed through the assess function is the only form the coalition recognizes. Criticism routed through relationship, reputation, or ideological suspicion is collision regardless of intent.
THE OUTWARD AUTHORITY LOOP
This is the governance mechanism. Not a committee. Not a vanguard. Not a vote. A loop. The name describes its function: authority flows outward from demonstrated good rather than being held inward by appointment. It is iterative because it repeats. It is recursive because each cycle feeds its results back into the next cycle as input. It never reaches a final state. It never fossilizes.
OBSERVE: what is actually happening in the twelve economic categories right now? Not what theory predicts. Not what the correct analysis says should be happening. What is the material reality for the people at the bottom of every other tower's outcome today?
ASSESS: which nodes in the coalition are producing the most good relative to that reality? Where is the flock actually moving? What is demonstrably working? Who is the food actually reaching? Assessment relies on observable material baselines verified by the people experiencing the conditions — not by the nodes claiming credit for improving them.
ADAPT: redistribute energy, attention, and resources toward what is working. Not because a central authority mandates it. Because the network learns and nodes voluntarily align with demonstrated success. The thing that works attracts more nodes. The thing that doesn't work loses them. This is not ruthless. It is honest.
RECURSE: feed the results back into the system. Update the observation. Begin again. The loop never stops. The coalition never fossilizes because the form is always adapting to the reality.
The loop produces virtual hierarchy organically. Nodes that consistently produce good outcomes acquire influence because the network routes through them more. This is leadership without the liability of leadership. It cannot be captured because it is not a position. It cannot be corrupted because it requires continuous demonstration to maintain. It cannot be beheaded because it lives in the pattern not the person.
THE BEHAVIORAL THRESHOLD AND ITS KNOWN VULNERABILITY
The behavioral threshold — you can believe whatever you want, you cannot serve the enemy — is the framework's primary defense against the purity spiral. It is also the framework's primary vulnerability and that vulnerability must be named explicitly rather than obscured.
The threshold will become contested. This is not a possibility. It is a certainty. Every coalition that has ever adopted a behavioral rather than doctrinal standard has eventually fought over where the behavioral line falls. What constitutes serving the enemy? Is working within electoral systems serving the enemy? Is accepting foundation funding serving the enemy? Is compromising on a campaign goal to win a partial victory serving the enemy? These questions will arise. Different nodes will answer them differently. And the fight over the answers will begin to look exactly like the purity spiral the threshold was designed to prevent.
The framework's answer to this is not a better definition of the threshold. A better definition is not possible. The contested boundary is not a failure of definition. It is a feature of any coalition that contains genuine ideological diversity. The answer is the loop. When a dispute arises over whether a specific behavior constitutes serving the enemy, the loop's assess function is the adjudication mechanism. The question is not which faction is doctrinally correct. The question is what the behavior actually produces. Does the node's action make the people at the bottom materially better or worse off? Does it increase or decrease the coalition's capacity to act? Does it help capital or hurt it in practice regardless of the intent behind it? These are answerable questions. They are answered by observation of outcomes rather than judgment of intentions. The loop watches outcomes. The three rules handle the results. The coalition moves accordingly.
This will be imperfect. The loop can be gamed. Outcome measurement can be manipulated. Nodes with resources to produce visible short-term outcomes can acquire influence that doesn't reflect long-term value. The framework acknowledges this. The immune system is not perfect. It is better than the alternative, which is no immune system at all. The ethical metric — are the people at the bottom doing better — is the check on the loop itself. When the loop's adjudications consistently produce outcomes that benefit the coalition's institutional interests rather than the people at the bottom, the ethical metric identifies the failure. The coalition corrects. This process is slow and painful and will sometimes fail. It is still the most reliable mechanism available and it is more reliable than doctrinal purity tests, which have a 150-year track record of destroying the coalitions they were designed to protect.
THE HIDDEN HIERARCHY WARNING
Emergent coordination is still coordination. Coordination concentrates in nodes that do it well. Concentration of coordination is a form of power regardless of whether it was formally appointed. The virtual hierarchy that emerges from the outward authority loop is real power and must be treated as such. The framework must name this continuously — not by denying that the center of gravity exists, but by making its existence visible, its mechanisms transparent, and its accountability to the loop mandatory. A hidden hierarchy is more dangerous than a visible one because it cannot be held accountable. Any coalition that tells its members there is no center while a center quietly operates is already becoming what it opposes. The antidote is not the elimination of the center. The center is necessary and will emerge regardless. The antidote is radical transparency about the center's existence combined with a governance loop that keeps it accountable to outcomes rather than to its own perpetuation. When the center stops serving the people at the bottom and starts serving itself, the loop names it. The three rules handle it. The coalition moves around it.
PART III: FRACTAL SCALABILITY AND RESILIENCE UNDER ASSAULT
Two properties distinguish a coalition framework capable of surviving contact with a civilizational crisis from one that cannot. The first is fractal scalability — the framework works identically at every scale from two people to two million without requiring a different governance structure at any scale. The second is resilience under assault — the framework does not degrade when the other towers attack it, and it treats those attacks as certainties to design against rather than possibilities to hope away.
THE FRACTAL PROPERTY
A fractal structure is one in which the same pattern repeats at every scale of magnification. The Starling Doctrine is fractal because its core unit — a node following three rules and running the outward authority loop — is identical whether the node is two people sharing tools on a block or two thousand organizations coordinating across a continent. The rules do not change at scale. The loop does not change at scale. The ethical metric does not change at scale. What changes is only the size of the network and the scope of the coordination. This means the framework can begin at the smallest possible scale — a single household, a single block, a single faith community, a single workplace — and expand without requiring structural reinvention at any point in the expansion. It also means that catastrophic loss at any scale does not destroy the framework. If every large-scale node in the network is destroyed by external assault, the small-scale nodes remain intact and the network rebuilds from them. The pattern is in every part. You cannot destroy the pattern by destroying any subset of the parts.
STARTING SMALL IS NOT STARTING WEAK
The crisis creates a temptation toward grandiose organizing — the mass movement, the general strike, the revolutionary moment. These are not wrong as aspirations. They are wrong as starting points because they require a coalition density and coordination capacity that does not yet exist and cannot be willed into existence by declaration. The Starling Doctrine begins with what is actually available: the people in front of you, the needs that are actually unmet in the community you are actually in, the resources that actually exist in your actual network right now. A mutual aid pantry that feeds thirty families is not a compromise position on the way to something real. It is something real. It is a node. It is a fractal seed. It is an existence proof that the other towers' story about no alternative is a lie.
Every large murmuration began with two birds responding to the same thing at the same moment. The first node is not recruited. It is not organized. It is found by asking one question in the room you are already in: what is unmet here that we could meet together? The answer to that question is the first node. The two people who agree to meet it are the first cluster. Everything else is the loop running forward from that point. Start there.
A node that is meeting real needs in its immediate community is ready to escalate when one or more of the following is true: its capacity exceeds its local demand, it has identified a recurring need it cannot meet alone, or it has been contacted by an adjacent node facing the same problem. Escalation does not mean becoming larger. It means connecting. A node that connects to one other node and shares what works has escalated. The flock grows one connection at a time.
COMPATIBILITY WITH OTHER ANTI-CAP ORGANIZATIONS
The Starling Doctrine does not require other anti-capitalist organizations to adopt its framework, its vocabulary, or its governance structure. It is designed to be compatible with organizations that have entirely different internal structures, ideological frameworks, and strategic theories. Compatibility requires only that the other organization meets the behavioral threshold — does not serve the enemy — and is willing to coordinate on overlapping goals for the duration of specific efforts without requiring ideological merger. A Starling Doctrine node can work alongside a traditional Marxist organization, a faith-based mutual aid network, an indigenous land defense coalition, and an anarchist housing collective simultaneously on a shared campaign without any of those organizations having to become something other than what they are. The flock does not require every bird to be the same species. It requires them to move in the same direction when the direction matters.
RESILIENCE UNDER ASSAULT: EXPECTED ATTACK VECTORS
The other towers will not ignore a functioning anti-cap coalition. They will attack it. These attacks are not possibilities to prepare for if they occur. They are certainties to design against from the beginning. Six primary assault vectors are expected. Each has a specific design response.
Decapitation: the attempt to destroy the coalition by removing its most visible coordinators. The fractal virtual hierarchy makes decapitation structurally difficult. There is no single leader whose removal collapses the network. Removing high-coordination nodes causes the network to reroute through other nodes automatically, without central direction, because the routing is emergent not appointed. Design response: every high-coordination node actively develops adjacent nodes with equivalent capacity. Leadership that cannot be replaced is a structural vulnerability masquerading as strength. Every coordination node maintains at least one adjacent node with equivalent access and capacity, so that removal produces rerouting, not collapse.
Infiltration: the introduction of agents whose purpose is to accelerate the purity spiral, amplify factional conflict, and drive coalition-fracturing wedges between nodes. The behavioral threshold makes infiltration harder because behavior over time is harder to fake than ideological declaration [Glick 1989 — The COINTELPRO Papers — historical pattern of infiltration tactics]. Design response: watch what nodes do, not what they say. Nodes that consistently produce coalition harm regardless of the specific issue are identified by the loop and handled by the three rules.
Resource starvation: the cutting off of funding, platform access, legal operating space, and public legitimacy. The decentralized structure distributes resource dependency across the network so that no single resource stream is load-bearing for the whole. Design response: deliberately cultivate redundancy in every resource category before it is needed. A node that depends on a single platform, a single funding source, or a single legal structure is a single point of failure. Redundancy is not paranoia. It is engineering.
Co-optation: the absorption of coalition energy into approved channels that produce the appearance of change without the substance. Co-optation is the most seductive attack vector because it arrives wearing the face of success [INCITE! Women of Color Against Violence 2007 — The Revolution Will Not Be Funded — nonprofit industrial complex analysis]. Design response: the ethical metric is the defense. Are the people at the bottom doing better — materially, verifiably, over time? When the institutional metrics and the material measure diverge, the material measure wins.
Criminalization: the use of legal and law enforcement systems to prosecute coalition activity. Design response: legal exposure is a node-level problem, not a network-level problem. The network does not centralize legal risk. Nodes operate within what is legally defensible in their specific jurisdiction. The network advances beyond what any single node could legally do alone without exposing any single node to the full legal weight of the whole.
Narrative attack: the use of media, algorithmic amplification, and coordinated messaging to discredit the coalition. Design response: narrative infrastructure is a defensive necessity equivalent to encrypted communication. Build it before the attack arrives. A coalition that controls its own distribution channels cannot be silenced by platform deplatforming. A coalition whose story is told in every vocabulary cannot be reduced to a single caricature.
PART IV: ISLANDS OF HOPE — THE EVIDENCE THAT THIS IS ALREADY WORKING
The Starling Doctrine does not propose a new experiment. It proposes a framework for understanding, connecting, and scaling experiments that are already producing results at every level of the fractal. What follows is a deliberately scaled demonstration — from a single block to an international network — showing that the pattern is real, it works, and the primary task is recognizing it, naming it, and expanding it. These examples are not utopias. Each made compromises. Each faced attacks. Each produced replicable patterns despite imperfection.
MICRO SCALE: THE BLOCK AND THE NEIGHBORHOOD
Bed-Stuy Strong, Brooklyn, New York. During the COVID-19 pandemic, a neighborhood mutual aid network in Bedford-Stuyvesant organized grocery delivery, fundraising, and resource distribution for 28,000 people in central Brooklyn, raising approximately 1.2 million dollars in grassroots donations and redistributing it directly into the community [Beeck Center, Georgetown University 2022 — Four Key Takeaways from Mutual Aid Organizing During COVID-19]. The network operated without formal leadership, relied on peer-to-peer communication including physical flyers in multiple languages alongside digital tools, and created a volunteer infrastructure that covered every block in a neighborhood of 250,000 people. This is the three rules in practice. This is the fractal at neighborhood scale.
The Black Panther Party Free Breakfast Program, Oakland, California, 1969. Beginning in a single church and expanding to a nationwide initiative, the program served 20,000 meals a week to Black children before being deliberately dismantled by the FBI's COINTELPRO program — itself evidence of its effectiveness [NEA 2025 — Mutual Aid is an Act of Resistance]. The program was not primarily a charity. It was a demonstration that the community could meet its own needs without the state, combined with explicit political analysis of why the state was not meeting those needs. It was decapitated because it could not be co-opted. The lesson is both about what works and about what the assault looks like when it does.
SMALL CITY SCALE: THE MUNICIPALITY
The Preston Model, Preston, Lancashire, England. Beginning in 2012 after a major developer pulled out of a planned regeneration project, Preston City Council worked with local anchor institutions to redirect procurement spending into the local economy. In the first four years, local procurement spend increased from 39 percent to 79.2 percent within Lancashire, an increase of two hundred million pounds retained in the local economy [Centre for Local Economic Strategies — How We Built Community Wealth in Preston, 2019]. Four thousand additional employees began receiving the real living wage. Preston moved from being among the twenty percent most deprived local communities in the UK to being recognized as one of the best places to live in England [Pathfinders — Community Wealth Building: Preston, UK, 2025]. The Preston Model used existing municipal power structures as a lever — a compromise some will object to. The framework's response: the behavioral question is not whether state power was used, but whether the people at the bottom were materially better off. They were.
The Evergreen Cooperatives, Cleveland, Ohio. Launched in 2008 by a working group that included the Cleveland Foundation, Cleveland Clinic, University Hospitals, Case Western Reserve University, and the City of Cleveland, the Evergreen initiative created a network of worker-owned cooperatives in high-unemployment, low-income neighborhoods [Evergreen Cooperatives — About, 2024]. During the 2020 pandemic, the cooperative businesses saw growth while comparable conventional businesses contracted. Employee-owners, many of them formerly incarcerated, built individual wealth through profit-sharing while rebuilding their neighborhoods.
REGIONAL AND NATIONAL SCALE: THE FEDERATION
The Mondragon Corporation, Basque Country, Spain. Beginning in 1956 when a Catholic priest named José María Arizmendiarrieta organized five workers in a disused factory, Mondragon grew into a network of over eighty worker-owned cooperatives employing approximately seventy thousand people with annual revenues exceeding fourteen billion dollars [New York Times 2020 — Report on the Mondragon Cooperatives]. The income ratio between the highest- and lowest-paid employees is capped at six to one, compared with a ratio of 344 to one typical in the United States [Christian Science Monitor 2024]. When the 2008 financial crisis caused the bankruptcy of the Fagor cooperative, 95 percent of its workers were relocated within the Mondragon network rather than losing their jobs [Christian Science Monitor 2024]. Mondragon has made compromises on international subsidiaries and non-member labor that its own members debate internally. It is cited here not as utopia but as existence proof at scale: worker ownership of complex industrial enterprises is operationally viable across generations, across financial crises, and across global markets. The argument that there is no alternative is simply false. Mondragon has been the alternative for seventy years.
WHAT THESE EXAMPLES SHARE
Every one of these examples began small. Every one of them started with what was available. Every one of them demonstrated viability before it scaled. Every one of them was attacked in some form and survived in some form and produced replicable patterns. None of them is identical to the others. Preston used state power. Mondragon incorporated compromises. Bed-Stuy Strong was informal and temporary. The Starling Doctrine does not need them to be identical. It needs them to demonstrate that the pattern — start with an unmet need, meet it with available people and resources, let the demonstration do the argument — works across contexts. The flock is already larger than it knows.
PART V: A DIRECT ADDRESS TO OUR SACRED PARTNERS
What follows is written specifically to the communities of faith and sacred tradition who are reading this document. It is written directly, with respect, and without condescension. The secular portions of this coalition need you. Not as a symbolic gesture toward inclusion. Not because religious optics are strategically useful. Because the anti-capitalist content already present in your own traditions is among the most powerful, most historically tested, and most community-rooted economic resistance the world has ever produced — and it has been systematically stolen from you, repackaged, and sold back to you in a form that serves the people your traditions explicitly condemn.
THE INVITATION
You are already here. You were here before the secular left gave anti-capitalism its name. The Jubilee tradition in the Hebrew scriptures prescribed the cancellation of all debts and the return of all land to its original stewards every fifty years — a structural reset of economic concentration built directly into the covenant law [Leviticus 25 — Year of Jubilee; Brueggemann 2001 — The Prophetic Imagination]. The Islamic prohibition on usury and the institution of Zakat as mandatory redistribution are not peripheral theological concerns. They are the economic operating system of a tradition that explicitly identifies the accumulation of wealth at the expense of the poor as a spiritual catastrophe [Quran 2:275 — prohibition of riba; Chapra 1992 — Islam and the Economic Challenge]. Liberation theology produced the preferential option for the poor: when in doubt, side with the people at the bottom [Gutierrez 1971 — A Theology of Liberation; Boff and Boff 1987 — Introducing Liberation Theology]. The indigenous traditions that practice seventh-generation thinking have been practicing long-term ecological economics for longer than capitalism has existed [LaDuke 1999 — All Our Relations]. The Buddhist concept of right livelihood explicitly places economic activity within an ethical framework that asks whether what you do for money causes harm [Schumacher 1973 — Small is Beautiful]. The Quaker testimony of simplicity is an anti-consumerist economic position rooted in spiritual discernment. These are not analogies to anti-capitalism. They are anti-capitalism in the vocabulary of the sacred. You did not borrow this from the secular left. The secular left, at its most rigorous, borrowed the moral framework from you and removed the transcendent grounding. This coalition asks you to bring the grounding back.
THE TRANSLATION
The three rules of the murmuration — stay close to your neighbors, match direction when moving toward the goal, avoid collision — are the operational expression of what most sacred anti-cap traditions call solidarity. Not solidarity as sentiment. Solidarity as practice.
The outward authority loop — observe, assess, adapt, recurse — is the practice of discernment applied to collective action. It asks the same question that serious spiritual practice asks: what is actually happening, what is the right response, and what do the results teach us about what we got right and wrong? The loop is structured discernment for organizations rather than individuals. The ethical metric at its center — are the people at the bottom doing better — is the preferential option for the poor expressed as a governance mechanism.
The behavioral threshold — you can believe whatever you want, you cannot serve the enemy — is the distinction between internal belief and external action that most traditions already make in their own ethical frameworks. It does not ask you to abandon your theology. It asks you to act in accordance with the parts of your theology that oppose the concentration of wealth and power.
The fractal scalability of the framework — starting small, building the pattern into every node, expanding without structural reinvention — is the logic of the mustard seed. You do not need to wait until the coalition is large enough to be visible to the powerful before you begin.
THE CHALLENGE
Good faith requires honesty and honesty requires saying the following directly: the organized institutional infrastructure of most of the world's major religious traditions has been substantially captured by the economic forces this document opposes. Prosperity gospel is not a theological development of the Christian tradition. It is the inversion of it — the explicit blessing of wealth concentration using the moral authority of a tradition founded on the explicit condemnation of wealth concentration [Brown 2013 — Avarice; Bowler 2013 — Blessed]. Christian nationalism is not a political expression of Christian ethics. It is the subordination of Christian ethics to ethnic nationalist politics using Christian vocabulary as legitimating cover. The phenomenon is not limited to Christianity. State-aligned religious institutions across traditions have accepted the patronage of authoritarian power in exchange for institutional survival and become the legitimating voice for the systems their foundational texts condemn. Reclaiming your own tradition from this capture is not a political act. It is a theological one. We ask you to do it because your own traditions demand it and because the people at the bottom of the economic system in your own communities are paying the price for every year the capture continues.
What the coalition offers in return: a framework in which your tradition's economic content is recognized as foundational rather than peripheral, in which you are not asked to adopt a secular vocabulary that strips your ethics of their grounding, in which the behavioral threshold is the only requirement for full participation, and in which the work of your community is recognized as exactly the kind of node this network is built from. You are not a symbolic addition to a secular coalition. You are load-bearing infrastructure for a network that cannot be built without you.
TIER STRUCTURE FOR SACRED COALITION PARTNERS
Tier 1 — Full Coalition Partners — Embrace: sacred traditions that are functionally anti-capitalist in their economics regardless of theological framework. Liberation theology in all its flavors. Islamic economic tradition. Buddhist economics. Indigenous economic sovereignty. Jewish prophetic tradition. Quaker economic ethics. These traditions do not need to agree with each other theologically. They need to agree behaviorally: do not serve capital, do not serve the authoritarian state, move toward human flourishing.
Tier 2 — Tolerated Neutrals — Accommodate Without Elevating: sacred traditions with internal tensions — anti-cap content coexisting with exclusionary doctrine or nationalist economics. Permitted in the coalition. Not given coalition-wide institutional voice. Individual nodes within these traditions may be full partners. Exclusionary doctrine is institutionally discouraged but not forbidden. Ethnic or nationalist religious economics is allowed without status — permitted as a local node, not elevated to coalition-wide voice.
Tier 3 — Rejection — Do Not Engage: one disqualifying behavior. Active empowerment of the enemy towers. Any sacred tradition that functions as legitimating ideology for Hyper-Capitalist or Technofascist power is an enemy asset. This is a behavioral test, not a theological one. The question is not what they believe. The question is what their presence in the economic order produces. If it produces more power for capital, they are capital's ally regardless of what they call themselves.
Note on secular coalition partners: whether a sacred tradition will share a table with secular anti-cap factions is not a coalition requirement. Parallel tracks are real. The flock does not require every bird to know every other bird. It requires them to move toward the food.
PART VI: TECHNOLOGY AS COALITION FORCE MULTIPLIER
The enemy is building the infrastructure of permanent control right now. AI surveillance systems. Central bank digital currencies with programmable spending constraints. Biometric identity tethered to social behavior scoring. Algorithmic management of labor. Predictive policing. These are not future threats. They are active construction projects [Zuboff 2019 — The Age of Surveillance Capitalism; Deibert 2020 — Reset]. The anti-cap coalition cannot afford principled technology abstinence while this construction continues. The tools are not the enemy. The tools in the hands of the enemy are the problem. The answer is to get the tools into different hands — or build better ones.
THE DECENTRALIZED-BUT-SYNERGISTIC TECHNOLOGY POSTURE
Use it: any technology that facilitates mutual aid, coalition coordination, information commons, economic self-organization, or narrative distribution is a legitimate coalition tool regardless of which faction's comfort level it violates. The coalition does not wait for consensus on tools.
Don't mandate it: individual nodes that reject specific technologies on principled grounds are accommodated by the decentralized structure. Accommodation is real but it is provided voluntarily by adjacent nodes, not mandated coalition-wide. The framework bends toward the node. The network does not stop for the node.
Don't let rejection block the whole: a node that refuses to move because it objects to the tools being used by other nodes is practicing veto, not principled objection. The starling rule applies: the flock moves. Birds that don't follow self-select to the edge. Special accommodation is offered once. It is not infinitely negotiated.
PRIORITY TECHNOLOGY DOMAINS
Coordination Infrastructure: encrypted, decentralized communication networks that cannot be surveilled or shut down by state or corporate actors. Existing tools include Signal for encrypted messaging, Matrix and Element for federated communication, Tor for anonymous browsing, and Briar for mesh networking that functions without internet infrastructure. No tool is perfectly secure. The goal is to raise the cost of surveillance high enough that mass monitoring becomes impractical. This is the first and most critical infrastructure investment.
Economic Alternatives: mutual credit systems, time banking platforms, cooperative ownership structures, community land trusts with digital administration. Existing tools include Open Credit Network for mutual credit, hOurworld and TimeBanks USA for time banking, Democracy at Work Institute resources for cooperative conversion, and community land trust models documented by Grounded Solutions Network.
Narrative Distribution: Mastodon and the Fediverse provide social networking that cannot be deplatformed by a single owner. PeerTube provides video hosting outside corporate platforms. Ghost and WordPress provide publishing infrastructure that nodes control. The coalition's story must be told in every vocabulary simultaneously — sacred, secular, economic, cultural, narrative. Every genre. Every platform. Every language.
Loop Technology: the outward authority loop requires real-time intelligence about what is working in which nodes. The coalition needs ethical, consent-based, federated data infrastructure that lets the network learn without creating a surveillance apparatus that can be captured or turned against members. Existing approaches include participatory action research methodologies, federated analytics tools, and the open-source Decidim platform for participatory governance used by cities including Barcelona and Helsinki.
PART VII: PROACTIVE NEED DECLARATION — THE THIRD IMPERATIVE
Stop saying we cannot. Start declaring what we need.
The anti-cap tradition has spent 150 years documenting what is wrong. That documentation is necessary and must continue. But documentation without declaration is diagnosis without treatment. The Starling Doctrine adds a third function to the coalition's work alongside building alternatives and naming the enemy: proactively, iteratively, and publicly declaring unmet needs so that the network can respond to them.
This is not complaint. This is not protest. This is logistics. When a node identifies a gap — a community without a communication channel that the enemy cannot shut down, a neighborhood without a mutual credit system, a coalition without legal support, a campaign without narrative infrastructure — that gap is a need. Needs declared publicly within the network are needs that other nodes can respond to. Needs kept private are needs that remain unmet. The network cannot route resources toward needs it cannot see.
THE TAXONOMY OF NEED CATEGORIES
Category 1 — Material Needs: food, housing, healthcare, childcare, legal aid, bail, direct financial support. The most urgent and most immediately actionable.
Category 2 — Infrastructure Needs: communication systems, economic alternative platforms, coordination tools, physical spaces, legal structures, financial mechanisms. These are the needs that, when met, make it possible to meet category one needs more efficiently.
Category 3 — Narrative Needs: storytelling capacity, distribution channels, translation into new vocabularies, documentation of what is working. A node doing extraordinary work that nobody outside its immediate community knows about is a pattern that cannot replicate.
Category 4 — Knowledge Needs: research, analysis, legal information, technical expertise, strategic planning capacity. The Ivory Tower produces ammunition it doesn't fire. The coalition can fire it if it knows what ammunition exists.
Category 5 — Coalition Needs: connections to other nodes working on adjacent problems, translation between factions that share goals but not vocabulary, facilitation of coordination across ideological lines.
Category 6 — Resilience Needs: redundancy, succession planning, legal defense, security culture, protection against the six assault vectors. These are the needs that go unaddressed until a crisis makes them urgent, by which point it is too late to address them strategically.
THE CALL-AND-RESPONSE PROTOCOL
The Declaration Format: what is the need, who is affected by it, what resources or capacities would address it, what is the timeline, and what does a response look like? A declaration does not require a fully formed solution. It requires honest description of the gap.
The Response Protocol: nodes that receive a need declaration and have relevant capacity respond in one of three ways. They provide direct assistance if they have the resources. They connect the declaring node with another node that does. Or they acknowledge the need publicly even if they cannot currently respond, which keeps the need visible within the network until a response is possible. No declaration goes unacknowledged.
A note on false declarations: the network will face attempts to flood need channels with fabricated requests to drain response capacity. The defense is not a verification bureaucracy, which would recreate the administrative overhead the framework avoids. The defense is the loop. Nodes that consistently declare needs that cannot be verified by the communities they claim to represent are identified through the assess function over time. Pattern recognition across the network catches what individual acknowledgment cannot.
The Aggregation Function: as declarations accumulate across the network, patterns emerge. Multiple nodes declaring the same category of need in the same region identify a systemic gap that individual node responses cannot fill. The loop's assess function specifically watches for these patterns. When a category of need recurs across enough nodes, the network responds not with individual assistance but with infrastructure.
THE STANDING OPERATING PROCEDURE FOR A NODE
Step one: when you identify a gap between what your community needs and what currently exists to meet that need, write it down in the declaration format.
Step two: share the declaration with adjacent nodes through whatever channels currently exist. Do not wait until you have a complete solution to share the problem.
Step three: when you receive a response, document it. This documentation feeds the loop's assess function.
Step four: when you have capacity to respond to a declaration from another node, respond in one of the three ways. Do not let declarations disappear into silence.
Step five: when you observe a pattern of recurring needs across multiple nodes, escalate it to the assess level of the loop.
Step six: when infrastructure is built in response to a pattern of need, document that too. It is an island of hope. It is evidence that the network works. It is a pattern that can replicate.
THE PROACTIVE POSTURE
For every weapon the other towers have used against anti-cap movements, the network builds an alternative before that weapon is deployed against it. For every medium through which the enemy controls narrative, the network establishes a parallel medium it controls. For every financial mechanism through which capital disciplines labor, the network builds a mutual credit system, a time bank, a cooperative structure that removes the discipline. For every governance tool that concentrates power upward, the network builds a federated alternative that distributes power downward.
This is not defensive. It is the theory of victory expressed as infrastructure. Every alternative built before the weapon arrives is a weapon that cannot be fired. Every need declared before it becomes a crisis is a crisis that does not occur. Every story told before the enemy tells it is a narrative they cannot reverse. Build first. Declare always. Respond to what is declared. The network learns. The loop recurses. The flock grows.
PART VIII: STRATEGY AGAINST THE OTHER TOWERS
The other towers play winner-take-all. The Starling Doctrine plays survival-and-expansion — build parallel structures that work, absorb people whose needs are not being met by the dominant system, grow until the alternative is larger than the original. This is not passive. It is a different theory of victory.
Against Hyper-Capitalism: Demonstrate Viability
Hyper-capitalism's primary argument is that there is no alternative. The answer is not argument. The answer is existence. Mondragon has been the alternative for seventy years. Preston demonstrated it at city scale in five years. Bed-Stuy Strong demonstrated it at neighborhood scale in fifteen months. Build things that work. Make sure people know they work. Hyper-capitalism requires active maintenance of the myth of no-alternative. Every working anti-cap institution chips at that myth with evidence rather than rhetoric. Evidence wins over time in ways that rhetoric cannot because evidence does not require belief. It requires only observation.
Against Technofascism: Name the Merger, Build the Alternative
The merger of Technofascist and Hyper-Capitalist power — surveillance infrastructure, corporate monopoly, and nationalist politics combining into a formation that neither classical left nor classical right vocabulary can adequately name — is the most dangerous active process in the current matrix. It can only be stopped by two things simultaneously: naming it loudly enough that its legitimacy erodes, and building decentralized alternatives fast enough that the infrastructure it builds cannot achieve monopoly. Document every instance of the merger operating. Name it every time. Build the alternative every time. You cannot destroy what is being built. You can make it less complete. Incompleteness is enough. A surveillance system that covers eighty percent of communication is less total than one that covers a hundred percent. The gap is where people live.
Against Ivory Tower Paralysis: Weaponize Their Evidence
The evidence base for anti-cap positions has never been stronger. Wealth concentration data from the World Inequality Database. Surveillance capitalism research from Zuboff. Automation's distributional effects from Acemoglu and Johnson. Commons governance case studies from Ostrom. Debt dynamics from Graeber. It sits behind paywalls being cited in documents that other academics read. Take it out. Put it into every vocabulary — sacred, narrative, practical, local. The research that proves the system is failing the people at the bottom belongs to the people at the bottom. Get it to them.
Against Internal Faction Warfare: The Behavioral Standard
When anti-cap factions fight each other the only winner is capital. The framework's answer is to make the fighting tactically pointless by removing doctrinal agreement as the coalition entry requirement. When faction war breaks out ask publicly: who benefits from this fight? The answer is always the same. Name it every time. When the answer is always capital, and capital did not start the fight, then something inside the coalition started the fight on capital's behalf whether it knew it was doing so or not. The loop identifies it. The three rules handle it.
PART IX: THE ETHICAL OPERATING SYSTEM IN PRACTICE
The ethical foundation stated in the opening is not ornamental. It is the load-bearing wall of the entire framework. Every part of the Starling Doctrine that could be co-opted, corrupted, or turned against its purpose is protected by a single question: are the people at the bottom doing better? Not in theory. Not eventually. Not according to the correct analysis. Right now. In their actual lives. Measurably. Verifiably. By their own account.
This question is asked at every cycle of the loop. It is asked of every technology deployment. It is asked of every sacred alliance decision. It is asked of every need declaration and response. It is asked of the virtual hierarchy itself. When the answer is no, the loop corrects. The loop is the immune response. The ethical foundation is the immune system's memory — the record of what the disease looks like so it can be recognized the next time it arrives wearing different clothes. The disease always arrives in different clothes. The metric stays the same. Are the people at the bottom doing better? If yes, continue. If no, correct. That is the whole of it.
CONCLUSION: THE THEORY OF VICTORY UNDER CRISIS CONDITIONS
The five converging crisis vectors make the myth of no-alternative harder to maintain. Every crisis the existing system fails to adequately address is a demonstration that it cannot meet human needs. Demonstration is the primary weapon. The Starling Doctrine wins by being visibly better at meeting human needs than the systems it opposes, at every scale simultaneously, in ways that cannot be hidden because the evidence is the lives of actual people.
The fractal structure means this demonstration happens everywhere at once — in neighborhoods, in faith communities, in workplaces, in cities, in whatever regional and international coordination becomes possible — without waiting for the whole network to be built before any part of it begins working. Every node that demonstrates viability is winning. Every node that survives an assault and rebuilds is winning. Every node that absorbs a person whose needs the existing system failed to meet is winning. Every faith community that reclaims its own economic ethics from institutional capture is winning. Every need declared and met within the network is winning. Every alternative built before the weapon arrives is winning.
The flock does not need to defeat the hawk in direct combat. The flock needs to be so numerous, so distributed, so indestructible at the level of the individual node, and so clearly better at producing human flourishing that the hawk's victory becomes structurally impossible even if no single confrontation is ever won decisively. The other towers win by capture. The Starling Doctrine wins by being everywhere they are not, doing what they cannot, for the people they have abandoned and the planet they are consuming.
The flock does not need a leader. It needs three rules and a direction. The direction is human flourishing. The rules are in this document. The crisis is the reason. The examples are the proof. The need declarations are the map. The network is already larger than it knows. Begin where you are. Declare what you need. Respond to what is declared. The loop runs. The pattern scales.
Each bird follows three rules. The murmuration emerges. The hawk cannot find the center because there is no center.
No comments:
Post a Comment