Burak Oktenli Governance Architectures for Safe Autonomous Systems
Developing operational governance architectures that enable safe, accountable, and controllable deployment of autonomous systems in critical infrastructure and national security environments. These architectures function as control layers governing how authority is granted, restricted, and recovered within autonomous systems. This work focuses on authority lifecycle control, decision integrity, and fail-safe recovery mechanisms that maintain human oversight in high-speed human-machine environments.
Research Mission
The Problem. Autonomous systems are increasingly deployed in high-stakes operational environments including critical infrastructure, defense, and large-scale automated decision systems. Current architectures often lack robust mechanisms for managing authority delegation, revocation, and recovery when automated decisions interact with human oversight.
The Gap. Existing governance models typically focus on policy or high-level ethics frameworks rather than operational system architectures capable of enforcing authority boundaries in real-time autonomous decision environments.
My Contribution. I develop governance architectures that manage the full lifecycle of authority within autonomous systems, including assignment, monitoring, revocation, and recovery. These architectures are designed to preserve human control, maintain system accountability, and prevent uncontrolled escalation in high-speed decision environments. The resulting systems (HMAA, CARA, and SATA) are documented in three U.S. provisional patent submissions and three publicly available technical reports with DOIs on Zenodo.
Current Status. Pursuing a Master of Professional Studies in Applied Intelligence at Georgetown University. CARA evaluation methodology: 10M-iteration arithmetic property testing and 68-state control-flow enumeration, as documented in the Zenodo disclosure. Formal proof and hardware-in-the-loop validation remain future work.
Authority Lifecycle Governance
Assignment, delegation, monitoring, and revocation of operational authority in autonomous decision systems. Implemented in HMAA (U.S. Provisional 63/999,105).
Fail-Safe Control Recovery
Emergency override, automated escalation controls, and deterministic authority recovery following lockout events. Implemented in CARA (U.S. Provisional 64/000,170).
Decision Integrity Monitoring
Hardware-anchored sensor trust computation, continuous attestation verification, and anomaly detection for autonomous mission authority. Implemented in SATA (U.S. Provisional 64/002,453).
Escalation Risk Analysis
Quantitative analysis of decision-time compression and escalation pathways in AI-enabled command-and-control systems. Documented in ERAM framework papers on SSRN.
Flash War Latency Control
FLAME architecture: deterministic latency injection middleware preventing autonomous escalation in multi-domain command environments. Implements Strategic Latency as a formal engineered system with 5-state Circuit Breaker and D(A, tier, domain) delay function. Patent submitted: U.S. Provisional 64/005,607. Published on Zenodo: DOI 10.5281/zenodo.19015618.
Multi-Agent Trust Verification
MAIVA architecture: Byzantine-resilient swarm trust aggregation with CUSUM-augmented detection, graduated escalation, and DoDD 3000.09 action gate classification. 37 self-tests, TLA+ specification, sensitivity analysis. DOI: 10.5281/zenodo.19015517.
Adversarial Deception-Aware Risk
ADARA architecture: proactive deception prior that adjusts authority downward pre-emptively based on P(adversarial). Deception Probability Engine computes adversarial likelihood from input distribution anomalies, temporal correlation, and cross-sensor consistency. Includes Phantom Fleet detection module for AI-hallucinated hostile force scenarios.
Research Mission &
National Interest
1. Substantial Merit & National Importance
The proposed endeavor is the development of operational governance architectures for autonomous systems deployed in U.S. national security, defense, and critical infrastructure environments. This work addresses how authority is assigned, monitored, revoked, and recovered in human-machine teaming systems where operational decisions occur faster than human reaction time.
This domain has been identified as a national priority by:
- U.S. Department of Defense (DoD Directive 3000.09, autonomous weapons governance)
- NIST AI Risk Management Framework (AI RMF 1.0)
- Presidential Policy Directive 21 (critical infrastructure protection)
- National Security Commission on Artificial Intelligence (final report, 2021)
- JADC2 strategy (human-machine command authority in contested environments)
2. Well Positioned to Advance the Endeavor
Evidence of positioning to advance this endeavor:
- Four U.S. provisional patent submissions (2026) for original governance architectures (HMAA, CARA, SATA, MAIVA)
- Three technical reports with DOIs on Zenodo (Georgetown University affiliation)
- Nine research papers on AI governance and national security (SSRN / independent)
- Six interactive technical simulations implementing the research architectures
- M.P.S. Applied Intelligence, Georgetown University (STEM-designated, in progress)
- B.Sc. Computer Science Engineering (USF) and MBA (Lynn University, 4.0 GPA)
- STEM-OPT authorized employment in ITAR/EAR-regulated U.S. cloud infrastructure
- 140+ professional credentials from 25+ institutions (IEEE, NIST, CompTIA, CISSP)
3. Benefit to the United States
Governance architectures for autonomous systems are increasingly important for U.S. national security, critical infrastructure resilience, and responsible deployment of advanced AI systems. Developing technical frameworks that maintain human oversight while enabling advanced automation contributes to safe adoption of autonomous technologies across strategic sectors.
- No standardized authority lifecycle governance exists for autonomous systems in defense
- The applicant's architectures address this gap with publicly disclosed, DOI-registered specifications
- The work is grounded in U.S. institutions and U.S. regulatory frameworks (NIST, DoD)
- Waiving the job offer requirement enables continued independent research in this critical domain
Research Programs
The proposed endeavor consists of four structured research programs, each with associated patent filings, technical reports, and published research:
- Authority Lifecycle Governance (HMAA): A system for managing the delegation, monitoring, and revocation of operational authority within autonomous decision systems. Applications: defense systems, automated infrastructure management, high-reliability AI operations. Patent: U.S. Provisional 63/999,105.
- Fail-Safe Control Recovery (CARA): Deterministic recovery protocol for authority lockout events with a terminal non-compensatory policy gate. Applications: autonomous weapons safety, nuclear-adjacent platform governance. Patent: U.S. Provisional 64/000,170.
- Decision Integrity Monitoring (SATA): Hardware-anchored sensor trust computation providing continuous attestation verification for autonomous mission authority. Applications: sensor fusion governance, unmanned systems trust. Patent: U.S. Provisional 64/002,453.
- Escalation Risk Analysis (ERAM): Quantitative framework for decision-time compression and escalation pathway modeling in AI-enabled command-and-control environments. Published on SSRN.
- Flash War Latency Control (FLAME): Deterministic latency injection middleware for preventing autonomous escalation in multi-domain command architectures. Implements Strategic Latency as a formal engineered system with a 5-state Circuit Breaker State Machine, Dynamic Delay Function D(A, tier, domain), and Keep-Alive heartbeat protocol. Patent: U.S. Provisional 64/005,607. Published on Zenodo: DOI 10.5281/zenodo.19015618. Interactive simulation live.
- Multi-Agent Trust Verification (MAIVA): Byzantine-resilient swarm trust aggregation architecture extending HMAA to multi-agent environments. Implements trimmed weighted median aggregation resistant to f adversaries in 3f+1 rosters, three-layer CUSUM-augmented anomaly detection, graduated escalation with per-level action permissions, and DoDD 3000.09 action gate classification. 37 self-tests, TLA+ formal specification. Published on Zenodo: DOI 10.5281/zenodo.19015517. Interactive simulation live.
- Adversarial Deception-Aware Risk (ADARA): Proactive deception prior architecture that adjusts operational authority downward pre-emptively based on the probability that current inputs are adversarially manipulated. Implements a Deception Probability Engine computing P(adversarial) from input distribution anomalies, temporal correlation patterns, cross-sensor consistency scores, and Bayesian update over mission history. Deception-Adjusted Authority Formula: A_adj = A_hmaa × (1 - λ × P_deception). Includes Phantom Fleet detection module. Interactive simulation live.
Future Research Roadmap
This roadmap demonstrates a sustained, multi-year research agenda in the United States:
- Near Term (1-3 years): Formal verification of HMAA/CARA/SATA governance architectures using TLA+ and model checking; expanded simulation environments with hardware-in-the-loop testbeds; human-machine authority interface models; FLAME (Flash War Latency Architecture) patent filed, Zenodo publication complete; completion of Georgetown M.P.S. Applied Intelligence program
- Mid Term (3-5 years): Deployment frameworks for integration with U.S. critical infrastructure control systems; standards body engagement with NIST and IEEE for governance architecture standardization; pilot implementations in defense-adjacent operational environments; peer-reviewed publication of formal verification results
- Long Term (5+ years): Standardized governance architecture specifications adopted across U.S. defense, intelligence, and critical infrastructure sectors; authority lifecycle governance as an established discipline within autonomous systems engineering; open reference implementations enabling U.S. industry adoption
Policy & Societal Impact
The applicant's work contributes to the following policy objectives:
- Autonomous Systems Safety: Technical frameworks for maintaining human oversight and preventing uncontrolled autonomous escalation
- AI Accountability: Cryptographically auditable authority decisions enabling post-incident reconstruction and regulatory compliance
- Responsible Deployment: Governance architectures that enable advanced automation while preserving meaningful human control in safety-critical operations
- Flash War Prevention: Decision latency architectures (FLAME, in development) designed to prevent AI-driven conflict escalation before human awareness
U.S. Impact: Potential Deployment Scenarios
The governance architectures developed in this research program address concrete operational needs across U.S. strategic sectors. The following deployment scenarios illustrate how these systems would function in real-world environments:
- Autonomous Defense Systems: HMAA provides real-time authority computation for unmanned combat platforms, ensuring that weapons engagement authority follows a verifiable chain from human commander through automated decision layers, with CARA providing deterministic recovery if authority lockout occurs during a mission.
- Critical Infrastructure Automation: Power grid, water treatment, and transportation systems using autonomous controllers require SATA-style continuous sensor attestation to verify that the data feeding automated decisions has not been tampered with or degraded.
- AI Command and Control (JADC2): Multi-domain military operations increasingly rely on AI-assisted decision-making. ERAM provides escalation risk quantification that allows commanders to understand how decision-time compression affects authority integrity across interconnected systems.
- Industrial Safety Systems: Aerospace manufacturing, petrochemical operations, and nuclear-adjacent facilities use autonomous monitoring systems that require formal governance over when automated systems can act independently versus when human authorization is mandatory.
- Intelligence Community Applications: Automated intelligence processing and AI-augmented analysis systems require governance architectures that maintain auditable authority chains, ensuring that AI-assisted assessments can be traced back to human-authorized parameters.
Independently Verifiable
Documentation
HMAA: U.S. Provisional No. 63/999,105 (March 7, 2026)
CARA: U.S. Provisional No. 64/000,170 (March 9, 2026)
SATA: U.S. Provisional No. 64/002,453 (March 11, 2026)
FLAME: U.S. Provisional No. 64/005,607 (March 14, 2026)
All three submitted via USPTO Patent Center. Awaiting review.
HMAA: DOI 10.5281/zenodo.18861653
CARA: DOI 10.5281/zenodo.18917790
SATA: DOI 10.5281/zenodo.18936251
MAIVA: DOI 10.5281/zenodo.19015517
FLAME: DOI 10.5281/zenodo.19015618
Verify on Zenodo ↗Georgetown University listed on Zenodo publication records. M.P.S. Applied Intelligence program (STEM-designated), School of Continuing Studies.
ORCID 0009-0001-8573-1667, verified researcher identity linking publications, patents, and institutional affiliation.
Verify on ORCID ↗Publication index with citation tracking and research metrics.
Verify on Google Scholar ↗Policy and strategic research papers on AI governance, escalation risk, and national security.
Verify on SSRN ↗STEM-OPT authorized employment at Blue.Cloud (Tampa, FL, 2021–2024). Data governance and cloud infrastructure in regulated environments.
CompTIA Security+ · CISSP Domain 1 · NIST RMF · NIST 800-171 · NIST CSF · AI in National Security (SCSP) · AI Strategy (Oxford/Wharton).
Six browser-based interactive simulations implementing the patent architectures and research frameworks (HMAA, CARA, SATA, FLAME, MAIVA, ADARA). All run client-side with real-time computation and verifiable outputs.
View Simulations ↗Academic Training
Governance Architectures
for Autonomous Systems
Sensor Attestation & Trust Anchoring (SATA)
Hardware-anchored τ-Chain protocol producing continuous trust scalar τ ∈ [0,1] from TPM attestation records for autonomous mission authority.
Human-Machine Authority Architecture (HMAA)
Real-time authority computation engine with six-tier HMAS spectrum, hardware-gated actuator interface, and cryptographic SALM audit logging.
Adversarial Deception-Aware Risk Architecture (ADARA)
Proactive deception prior: A_adj = A_hmaa × (1 - λ × P_deception). Computes P(adversarial) from input anomalies, temporal correlation, cross-sensor consistency, and Bayesian mission history. Phantom Fleet detection module.
Multi-Agent Integrity Verification (MAIVA)
Byzantine-resilient swarm trust aggregation (3f+1 BFT), CUSUM-augmented detection, graduated escalation, DoDD 3000.09 action gates. 37 self-tests, TLA+ specification.
Flash War Latency Architecture (FLAME)
Strategic Latency as engineered system. Dynamic Delay Function D(A, tier, domain), 5-state Circuit Breaker with crypto-signed transitions, Keep-Alive heartbeat protocol.
Control Authority Regulation Architecture (CARA)
Deterministic authority recovery via GREP phases I-IV with non-compensatory terminal gate. 10M-iteration verification, 68-state control-flow enumeration.
Escalation Risk Assessment Model (ERAM)
Decision-time compression analysis for AI-enabled C2 systems. Quantitative framework modeling how authority integrity degrades across interconnected multi-domain environments.
Interactive Technical
Demonstrations
View All Repositories
Each simulation below is a fully functional, browser-based implementation of the corresponding patent architecture or technical report. These are not mockups; they execute the actual algorithms described in the filed patent disclosures and published specifications, with real-time computation, cryptographic operations, and verifiable outputs.
HMAA Simulation
Full implementation of the real-time authority computation engine. Includes the six-tier HMAS authority spectrum, live calculator with parameter sliders, escalation sweep analysis, EW hysteresis modeling, Monte Carlo tier distribution (n=1000), determinism proof, RTB failsafe timeline, multi-run overlay comparison, fault-tolerance analysis, uncertainty quantification, and a complete compliance audit with safety case.
CARA Simulation
Full implementation of the deterministic authority recovery protocol. Includes the live GREP phase calculator, adversary model analysis, 68-state control-flow replay, parameter space heatmap, and the non-compensatory terminal gate that makes CARA structurally irreducible to any utility-maximization framework.
SATA Simulation
Real-time sensor attestation engine computing the continuous trust scalar τ ∈ [0,1] consumed by HMAA. Implements TPM-anchored cryptographic chain verification, Monte Carlo trust distribution analysis, FMEA/FTA fault trees, live finite state machine visualization, and DoDAF OV-1 architecture views. All cryptographic operations run in-browser using WebCrypto.
FLAME Simulation
The first technical architecture implementing Strategic Latency as an engineered system. Includes a Latency Injection Engine (LIE) middleware, the Dynamic Delay Function D(A, tier, domain), a formal 5-state Circuit Breaker State Machine (NOMINAL, CAUTION, HOLD, FREEZE, LOCKOUT) with cryptographically signed transitions, Keep-Alive heartbeat protocol with safe-mode link failure defaults, domain-tier risk heatmap, and physical interlock reset verification.
MAIVA Simulation
Byzantine-resilient swarm trust aggregation extending HMAA to multi-agent environments. Implements trimmed weighted median aggregation (3f+1 BFT), three-layer CUSUM-augmented anomaly detection, graduated escalation with per-level action permissions, DoDD 3000.09 action gate classification, sensitivity analysis, WCET profiling, and a 14-tab PDR briefing package. 37 self-tests run automatically on load. TLA+ formal specification included.
ADARA Simulation
The first proactive deception prior architecture that adjusts authority downward pre-emptively based on P(adversarial). Implements a Deception Probability Engine computing adversarial likelihood from input distribution anomalies, temporal correlation patterns, cross-sensor consistency, and Bayesian mission history updates. Deception-Adjusted Authority: A_adj = A_hmaa × (1 - λ × P_deception). Includes Phantom Fleet detection module for AI-hallucinated hostile force scenarios.
These simulations implement the patent architectures and research frameworks. HMAA, CARA, SATA, MAIVA, FLAME, and ADARA execute published specifications and research architectures. All run entirely client-side with real-time computation and verifiable outputs.
Research Papers
& Policy Analysis
-
01
CARA: A Deterministic Authority Recovery Architecture for Human-Machine Authority-Gated Autonomous SystemsZenodo · DOI 10.5281/zenodo.18917790 2026 Patent Disclosure
-
02
HMAA: An Operational AI Governance Engine for Real-Time Authority Computation in Autonomous SystemsZenodo · DOI 10.5281/zenodo.18861653 2026 Patent Disclosure
-
03
Sensor Attestation and Trust Anchoring (SATA): A Hardware-Anchored τ-Chain Protocol for Autonomous Mission Authority — Technical Assurance Report v3.8.9Zenodo · DOI 10.5281/zenodo.18936251 · Georgetown University 2026 Technical Report
-
04
MAIVA: Multi-Agent Integrity Verification Architecture — Byzantine-Resilient Trust Aggregation for Autonomous Action Authorization, v5.17Zenodo · DOI 10.5281/zenodo.19015517 · Georgetown University 2026 Technical Report
-
05
FLAME: Flash War Latency Architecture for Multi-Domain Escalation Control, v5.11Zenodo · DOI 10.5281/zenodo.19015618 · Georgetown University 2026 Software
All papers publicly available on SSRN with individual permalink URLs. These are working papers, not peer-reviewed publications.
-
06
Decision Compression and Escalation Risk in AI-Enabled Military Command and Control: An Operational Analysis of the ERAM FrameworkSSRN · ID 6176802 2026 Policy Paper
-
07
The Governance of Velocity: Doctrine, Entanglement, and Risk in the Joint All-Domain Command and Control (JADC2) EraSSRN · ID 6083970 2026 Policy Paper
-
08
AI-Enabled Military Decision-Making and Escalation Risk: Human-Machine Command Authority in Great Power CompetitionSSRN · ID 6082847 2026 Policy Paper
-
09
Strategic Subterranean Domain Awareness: A Comprehensive Technical and Operational Evaluation of Next-Generation AI-Fused Counter-Tunnel ArchitecturesSSRN · ID 6046594 2026 Policy Paper
-
10
The Strategic Convergence: AI Has Outpaced Human Clearance ModelsSSRN · ID 5940814 2025 Policy Paper
-
11
The Strategic Convergence: Risk-Adaptive AI for Reducing Insider Exfiltration and Improving Forensic ReadinessSSRN · ID 5919022 2025 Policy Paper
-
12
Strategic Assessment: The Operationalization of Artificial Intelligence in U.S. Defense DoctrineSSRN · ID 5909983 2025 Policy Paper
-
13
Shadows in the Marketplace: Operational Doctrine for Project AURELIUS (AI-Driven Economic Counter-Warfare)SSRN · ID 5897442 2025 Policy Paper
-
14
The Strategic Convergence: Microreactor Technology as the Foundation for AI Hyperscale AutonomySSRN · ID 5867163 2025 Policy Paper
Submitted to SSRN, currently in preliminary upload / review status.
-
15
Physics-Based Analysis of Submarine Surface Signatures: Hydrodynamic Mechanisms, Detection Theory, and Countermeasure ConstraintsSSRN · ID 6233601 · Preliminary Upload 2026 Policy Paper
-
16
If Snowden Were an AI: Military Defense in the Age of Autonomous IntelligenceSSRN · ID 6186118 · Preliminary Upload 2026 Policy Paper
- Energy Resilience for AI-Dependent Systems: Infrastructure Security in Autonomous Operational Environments
Professional Background
- Engineered enterprise-grade data governance architectures with RBAC enforcement in regulated cloud environments
- Executed cloud infrastructure risk assessments aligned with ITAR/EAR need-to-know data handling requirements
- Developed automated data-validation pipelines for high-velocity enterprise data, reducing time-to-decision for executive operations
- Scaled cross-functional engineering capabilities; modernized legacy pipelines with disaster recovery alignment
- Directed system-level security strategy for advanced materials networks across Eastern European and Middle Eastern corridors
- Designed and implemented Zero Trust governance for ICS operating in high-velocity environments
- Executed threat-modeling protocols, transitioning legacy infrastructure to NIST-aligned security frameworks
- Conducted systemic vulnerability assessments across distributed critical food-infrastructure nodes in a NATO-allied jurisdiction
- Authored operational continuity frameworks mitigating cyber-physical threats, mirroring U.S. CISA strategies
- Managed cross-border intelligence flows in regulated markets under international export-constraint regimes
- Engineered data-governance frameworks for high-precision aerospace manufacturing in regulated commercial sectors
- Deployed Data Loss Prevention (DLP) strategies to safeguard proprietary engineering data
- Optimized manufacturing workflows through predictive risk modeling and security audits
- Managed operational risk and supply chain logistics for a major petrochemical entity in volatile energy markets
- Overhauled OT reporting protocols to eliminate data latency in high-velocity operational decision cycles
- Conducted risk-informed decision support analysis to remediate systemic distribution network vulnerabilities
Technical Credentials
& Domain Expertise
- CompTIA Security+
- CISSP Domain 1: Security & Risk Management
- NIST Risk Management Framework (RMF)
- NIST 800-171 Awareness
- NIST Cybersecurity Framework (CSF)
- AI Strategy (Oxford / Wharton Executive Education)
- AI in National Security (SCSP)
- Generative AI Governance (University of Michigan)
- Open-Source Intelligence (Basel Institute on Governance)
- Advanced System Security Design (University of Colorado)
- AI for Cybersecurity (Johns Hopkins University)
- NYU Cybersecurity Specialization
- Cloud Computing Security (University of Colorado)
Research & Publication Presence
ORCID
0009-0001-8573-1667, Verified researcher identity with Georgetown University affiliation
Google Scholar
Full publication index with citations and research metrics
SSRN
Policy and strategic research papers on AI governance, escalation risk, and national security
Zenodo, CARA
DOI 10.5281/zenodo.18917790 · Control Authority Regulation Architecture
Zenodo, HMAA
DOI 10.5281/zenodo.18861653 · Human-Machine Authority Architecture
Zenodo, SATA
DOI 10.5281/zenodo.18936251 · Sensor Attestation and Trust Anchoring Protocol
Get In Touch
Available for research collaborations, expert advisory engagements, and discussions on AI governance, autonomous systems safety, and national security technology policy.
Washington, D.C. / Miami, Florida
English (Professional) · Turkish (Native) · Russian (Reading Proficiency)
AI Governance · Autonomous Systems Safety · National Security Technology · Escalation Risk Modeling · Human-Machine Teaming
HMAA: U.S. Provisional 63/999,105 (March 7, 2026) · CARA: U.S. Provisional 64/000,170 (March 9, 2026) · SATA: U.S. Provisional 64/002,453 (March 11, 2026) · FLAME: U.S. Provisional 64/005,607 (March 14, 2026) · All submitted via USPTO Patent Center, awaiting review