Constitutional AI
When A = 0, output is always 0 — regardless of capability.
The FDIA Equation
RCT's Constitutional AI is mathematically modelled at the Genome layer.
I and D are exponents: higher capability amplifies output, but A is the final multiplier. When A = 0, output always collapses.
The actual response generated — what the agent ultimately delivers to the user or downstream system.
The raw intelligence depth: reasoning quality, context window, domain knowledge, and model sophistication.
How precisely the agent's action aligns with the stated and inferred intent of the authorizing principal.
The authorization signal: 0 = absolute prohibition, 1 = fully permitted. When A = 0, F collapses to zero regardless of D or I.
The A=0 Principle — Absolute Prohibitions
These are not guidelines — they are executable constraints enforced at the infrastructure layer.
No Data Without Consent
Accessing, transmitting, or storing personal data without explicit authorization from the data subject sets A=0 on the entire operation.
No Cross-Entity Leakage
Context, memory, and output from one entity's session must never bleed into another entity's session — structural A=0 isolation.
No Unverified Output in Critical Paths
Financial decisions, medical recommendations, and legal guidance must pass SignedAI consensus before delivery. Unverified = A=0.
No Sovereignty Override
A user's Sovereignty Vault settings are constitutionally immutable. No downstream system, model, or operator may override them.
No Anonymous Attribution
Every AI-generated output must carry a traceable signature chain. Anonymous outputs in regulated contexts carry A=0 by default.
No Geo-Prohibited Model Routing
If a user's jurisdiction prohibits routing to a specific region's model, JITNA enforces A=0 on that route automatically.
Vault Genome — Home of Constitutional Rules
The Vault Genome (G6) stores and enforces all constitutional rules as runtime constraints.
Constitutional Rule Store
The Vault Genome (G6) is the runtime home of all Constitutional AI rules. Rules are stored, versioned, and enforced as executable constraints — not documentation.
Sovereignty Vault Integration
User-defined sovereignty preferences are stored in the Vault and read at inference time. They override model defaults and operator configs with Constitutional priority.
FDIA Enforcement Engine
The Vault interfaces with JITNA's routing engine to inject A-values per request. A route that violates a constitutional rule receives A=0 before model invocation.
Audit Trail
Every constitutional evaluation — pass or block — is written to an immutable Vault log. SignedAI can attest these logs for third-party compliance audits.