Counter-Action Selection Under Hostility Classification
by Nick Clark | Published April 25, 2026
When an entity is classified hostile, the operating unit's response set expands: defensive maneuvers, hardened postures, evasive routing, broadcast alerts, and (in defense contexts) escalation to authorized counter-measures. Counter-action selection is itself governed by composite admissibility — hostility classification produces a permissive admissibility envelope rather than automatic counter-attack.
What Counter-Action Admissibility Specifies
Hostility classification of an entity expands the operating unit's admissibility envelope: actions that would normally be inadmissible (sharp evasive maneuvers, broadcast alerts to allied units, defensive posture changes, in defense contexts engagement of counter-measures) become admissible candidates. The expansion is structural — the admissibility evaluator's policy specifies what becomes admissible under hostility classification of the relevant entity.
Selection within the expanded envelope still runs through composite admissibility. The unit may but need not use the expanded options; the actual selection is determined by environmental observations, mission policy, capability envelope, and confidence-governed actuation evaluation. Hostility widens the option space; the gating decides what to do within it.
Why 'Hostility Triggers Counter-Action' Is Structurally Wrong
The naive pattern — hostile classification triggers counter-attack — produces predictable failure modes. False-positive hostility classifications produce inappropriate responses. Operating context that makes counter-action inadvisable (collateral risk, mission priorities, escalation considerations) is not architecturally consulted before counter-action commits. The architecture treats classification and response as a single coupled event rather than as separate governance decisions.
Confidence-governed actuation, applied to counter-action, treats them as separate decisions. Classification opens the option space. Composite admissibility evaluates each option against environmental, mission, and policy considerations. The actual response is the result of the gating, not of the classification alone.
How Expanded Admissibility Composes With Mode Selection
The hostility classification is itself a credentialed observation that the admissibility evaluator consumes. The evaluator's policy specifies the admissibility envelope expansion: hostility classification of class X expands admissibility for actions in set Y. The expanded set then enters the standard mode-selection computation alongside the rest of the request context.
The selected response may be: full counter-action commit (under unambiguous classification, clear environmental conditions, mission policy admitting), stage-gated counter-action (commitment in successive stages with intermediate verification), advisory display of contemplated counter-action (the operator ratifies before commit), or no counter-action despite the expanded envelope (admissibility fails on environmental or mission grounds). Each is recorded in lineage with the supporting computation.
What This Enables for Defense and Civilian Protective Response
Defense autonomy gains structural counter-action governance. Hostility classification expands the option space; mission ROE, theater conditions, and operational context govern what actually commits. The audit-grade lineage covers every counter-action with its supporting computation and policy.
Civilian protective response — vehicle defense against road-rage attackers, drone defense in contested airspace, anti-piracy maritime response, anti-stalker personal protection — gains the same architectural primitive scaled to civilian use. The mechanism is the same; the configurations differ. The patent positions the primitive at the layer that protective autonomy has been ad-hoc reconstructing.