BLADE-EDGE = Beam-Layer Authority for Directed Engagements — Edge Node
A rugged, portable edge computing device that serves as the ethical decision-making authority for autonomous defense platforms — determining in real-time whether systems should EXECUTE, DELAY, ABORT, or HANDOFF based on multi-sensor trust consensus.
Design Complete · Published on Zenodo · DOI: 10.5281/zenodo.19177472This is NOT a weapon. It is a governance layer — a hardware-enforced ethical checkpoint that sits between autonomous defense systems and lethal action. It implements the human-judgment requirements mandated by DoD Directive 3000.09 directly in silicon and firmware.
Zenodo Publication: Oktenli, B. (2026). BLADE-EDGE: A Deterministic Governance Simulation Framework for Multi-Agent Decision Systems (5.0.3). Zenodo. https://doi.org/10.5281/zenodo.19177472
Autonomous defense systems — directed-energy weapons, interceptor drones, and swarm platforms — can react in milliseconds, far faster than any human operator. As these systems proliferate, the critical question shifts from "can they act?" to "should they act?"
Current autonomous systems face critical governance challenges: no standardized hardware governance layer exists (most rely on software-only rules that can be bypassed or fail silently), single-sensor systems are vulnerable to spoofing and deception, individual platforms make isolated decisions without cross-validating with friendly units, and cloud-based governance introduces unacceptable latency for tactical engagements.
The BLADE-EDGE Governance Node directly addresses DoD Directive 3000.09, which requires "appropriate levels of human judgment" in autonomous weapon systems. This device implements that requirement at the hardware level — with a physically hardwired normally-open safety interlock that literally cannot close unless the full 9-module governance pipeline confirms authority.
Autonomous defense systems face a fundamental governance challenge: they can react in milliseconds, but no standardized hardware exists to enforce rules of engagement at machine speed. Current approaches rely on software-only governance that can be bypassed, corrupted, or fail silently under adversarial conditions.
The BLADE-EDGE Governance Node addresses five specific capability gaps:
This platform demonstrates that authority-governed autonomy can be implemented at the hardware level for defense applications, with physically enforced safety interlocks, multi-sensor cross-validation, and swarm consensus — capabilities that software-only approaches cannot guarantee.
The BLADE-EDGE extends the authority-governed autonomy framework to directed-energy weapon systems, where engagement decisions must account for beam-specific factors that kinetic weapons do not face. The final authority computation includes a beam suitability scalar (β_beam) that gates the pipeline output based on physical engagement feasibility.
Atmospheric clarity (humidity, obscurants, turbulence), track stability, dwell feasibility, thermal cooldown margin, collateral exclusion confidence, target classification
If beam conditions are unfavorable (atmospheric turbulence, thermal limits exceeded), the system can automatically HANDOFF to a kinetic interceptor via MIL-STD-1553, maintaining engagement authority while switching effectors
This extension demonstrates that authority-governed autonomy is not limited to navigation or surveillance systems but can govern lethal engagement decisions where the governance layer must operate at machine speed while maintaining human-judgment requirements.
The BLADE-EDGE receives data from six sensor categories, processes it through a 9-module governance pipeline on dual-redundant compute hardware, and outputs one of four decisions: EXECUTE, DELAY, ABORT, or HANDOFF.
Every engagement decision passes through nine sequential modules targeting 50-300ms end-to-end latency. Each stage can independently trigger an ABORT, preventing downstream execution.
Computes trust scalar τ from ALL sensor inputs combined with beam-path confidence scoring. Atmospheric sensors measuring humidity, obscurants, and turbulence feed directly into trust computation because a clear sensor picture is useless if the beam cannot reach the target.
GPU-accelerated anomaly detection targeting decoys, reflectivity manipulation, adversarial track shaping, GPS spoofing, and sensor-to-sensor inconsistency. Any deception flag independently triggers ABORT.
Verifies target classification against known friendly signatures. Prevents fratricide through cryptographic IFF challenge-response before authority confirmation.
Derives authority score A with laser-specific gating: target classification tiers, engagement authorization levels, dwell feasibility, atmospheric propagation, and thermal management before granting authority.
Exchanges trust and authority values with nearby BLADE-EDGE units via encrypted MANET mesh radio. Byzantine fault-tolerant consensus ensures no single compromised node can fool the swarm.
Enforces 50-300ms recheck windows before firing in ambiguous conditions. Three modes: immediate pass-through (high confidence), micro-deliberation (ambiguous), auto-handoff (engagement window exceeded).
Post-abort recovery: steps authority to zero, revalidates all sensors from scratch, re-acquires target track, feeds back to SATA for fresh trust computation. Prevents false confidence buildup from abort cycling.
Post-engagement sensor revalidation. Confirms engagement outcome, updates target track state, and feeds back to SATA for trust recomputation before next engagement cycle.
Normally-open hardwired safety relay. Closes ONLY when the full 9-module pipeline confirms authority. Physical circuit break prevents engagement without verified governance chain.
The BLADE-EDGE outputs one of four decisions based on pipeline authority and beam suitability. Unlike binary fire/no-fire systems, the governance model provides graduated response with automatic effector handoff.
Full pipeline authority confirmed. Beam conditions favorable (β_beam > threshold). Safety interlock relay closes. Engagement authorized.
Ambiguous conditions detected by FLAME. System holds for 50-300ms micro-deliberation, re-queries sensors, re-runs ADARA, re-checks MAIVA consensus.
Trust collapse, deception detected, or consensus failure. Safety interlock remains open. CARA recovery initiates: authority zeroed, sensors revalidated from scratch.
Pipeline authority confirmed but beam conditions unfavorable (atmospheric turbulence, thermal limits). Engagement transferred to kinetic interceptor via MIL-STD-1553.
The safety interlock relay is physically hardwired normally-open — the weapon literally cannot fire unless the BLADE-EDGE actively confirms full authority through all six pipeline stages. This is hardware-enforced governance, not software-only.
The BLADE-EDGE implements SATA trust evaluation across six sensor categories simultaneously. Each feed is independently evaluated for signal integrity, noise floor, expected pattern consistency, and cross-correlation with other sensors. The output is a single trust scalar τ ∈ [0,1].
Trust(s_i) = weighted belief function with beam-path confidence integration.
Cross-sensor validation: radar + EO/IR + LIDAR + GPS/IMU + atmospheric.
A degraded GPS signal reduces τ even if radar is strong.
Atmospheric sensors feed directly into trust computation (beam propagation feasibility).
Key innovation: beam-path confidence is integrated at the trust layer rather than post-pipeline. Atmospheric sensors measuring humidity, obscurants, and turbulence feed directly into SATA because a clear sensor picture is useless if the directed-energy beam cannot reach the target. This tight coupling between sensing and beam physics is unique to BLADE-EDGE.
72 components across 8 subsystems with full dual-redundancy on all critical paths.
| Component | Product | Qty | Cost | Role |
|---|---|---|---|---|
| Primary GPU | NVIDIA Jetson AGX Orin 64GB | 1 | $1,999 | AI inference: ADARA, SATA, sensor fusion |
| Backup GPU | NVIDIA Jetson AGX Orin 64GB | 1 | $1,999 | Hot standby failover |
| Primary FPGA | Xilinx Zynq UltraScale+ | 1 | $1,850 | Real-time deterministic preprocessing |
| Backup FPGA | Xilinx Zynq UltraScale+ | 1 | $1,850 | Hot standby failover |
| Carrier Board | BLADE-EDGE Custom PCB | 1 | $500 | Jetson + FPGA bridge, all interfaces |
| MIL-STD-1553 | Condor PCIe Card | 1 | $700 | Legacy military bus communication |
| Component | Qty | Cost | Role |
|---|---|---|---|
| M-Code GPS Receiver (BAE Systems) | 2 | $15,000 ea | Encrypted military GPS, immune to jamming/spoofing |
| Tactical MEMS IMU (Honeywell HG1120) | 1 | $8,500 | Primary inertial navigation |
| Tactical MEMS IMU (ADI ADIS16505) | 2 | $3,500 ea | Triple-redundant IMU voting |
| Industrial LIDAR | 1 | $1,800 | Point cloud target verification |
| Atmospheric Sensor (BME688) | 1 | $180 | Beam-path confidence scoring |
| Component | Qty | Cost | Role |
|---|---|---|---|
| MANET Radio (Persistent Systems MPU5) | 1 | $11,500 | Swarm consensus mesh |
| MANET Radio (L3Harris AN/PRC-158) | 1 | $18,000 | Redundant mesh |
| MIL-STD-1553 Link Encryptor | 2 | $9,000 ea | Military bus encryption |
Every critical subsystem has a backup. The system continues operating with any single component failure. Power is fully dual-redundant with OR-diode isolation, battery backup for 5-minute graceful shutdown, and supercapacitor ride-through for power transients.
| Primary | Backup | Failover |
|---|---|---|
| Jetson AGX Orin | Jetson AGX Orin (backup) | Hot standby, auto switchover |
| Zynq UltraScale+ | Zynq UltraScale+ (backup) | Hot standby |
| NVMe SSD | NVMe SSD (redundant) | RAID-1 mirroring |
| Ethernet Switch | Ethernet Switch (redundant) | Failover routing |
| MANET Radio (MPU5) | MANET Radio (AN/PRC-158) | Auto frequency hopping |
| M-Code GPS 1 | M-Code GPS 2 | Cross-validation + failover |
| IMU 1 (HG1120) | IMU 2 + 3 (ADIS16505) | Triple-redundant voting (2-of-3) |
| MIL-STD-1275 PSU | Redundant PSU | OR-diode isolation |
| Battery Backup 1 | Battery Backup 2 | Automatic failover |
| Link Encryptor 1 | Link Encryptor 2 | Bus A/Bus B redundancy |
IP67 sealed aluminum chassis, MIL-STD-810G rated, tamper-evident seals, chassis intrusion switch, EMI/EMP shielding with BeCu gaskets + TVS diodes + gas discharge tubes.
Tamper mesh overlay (breaks if probed), TVS protection array, antenna surge protection, dual hardware supervisor/watchdog ICs forcing reset on compromise.
PUF HSM generating unclonable keys from silicon variations, dual MIL-STD-1553 link encryptors ($9K each), dual secure FPGA EEPROMs, conformal coating on all PCBs.
| Subsystem | Cost | % |
|---|---|---|
| Communications (MANET + Encryptors) | $47,500 | 34.2% |
| Sensors (GPS + IMU + LIDAR + Atmo) | $47,480 | 34.2% |
| Power (PSU + Battery + Caps + PDU) | $12,480 | 9.0% |
| Actuation (Flight Recorder + GPIO + Relay) | $12,065 | 8.7% |
| Compute (Jetson + Zynq + SSD + Switch) | $10,948 | 7.9% |
| Enclosure and Thermal | $3,825 | 2.8% |
| Connectors and Wiring | $3,531 | 2.5% |
| Security (PUF + Tamper + TVS) | $1,079 | 0.8% |
The top 3 cost drivers (GPS + radios + encryptors) account for 56% of the BOM. These are military-controlled items whose cost decreases significantly in production quantities. Production units (100+) estimated at $60-80K per unit.
72 components, 103 electrical connections (53 power + 50 data). Full dual-redundancy on all critical paths.
The BLADE-EDGE simulation environment executes the complete 9-module governance pipeline in real-time with configurable scenarios, multi-target tracking, and heterogeneous effector assignment. The simulator mirrors the hardware pipeline architecture, enabling direct validation of governance behavior before physical prototype fabrication.
This simulation demonstrates executable validation of the defense-grade governance pipeline — not conceptual design alone. Every decision visible in the simulator corresponds to the exact same pipeline logic that would execute on the Jetson AGX Orin + Zynq UltraScale+ hardware.
SATA → ADARA → IFF → HMAA → MAIVA → FLAME → CARA → BDA → EFFECTOR
Ballistic, saturation attack, IFF friendly, GPS spoofing, dust storm, human-on-the-loop veto
Hungarian algorithm optimizer assigning laser, kinetic, and dazzle effectors to simultaneous targets
Research Simulation Environment (v5.0.3). This environment validates governance behavior across all 9 pipeline modules with real-time multi-target tracking and heterogeneous effector assignment. All computations run client-side in the browser.
Launch Governance Simulator (v5.0.3)The BLADE-EDGE Governance Node represents the defense-grade implementation of the authority-governed autonomy framework. All seven governance architectures (SATA, HMAA, ADARA, MAIVA, FLAME, CARA, ERAM) are deployed in hardware form within this platform, extending the research from simulation to a production-specification system designed for real-world contested environments.
Related platforms: Rover Testbed (~$484) · UAV Platform (~$4,200) · BLADE-EDGE (defense, ~$139K) · BLADE-AV (automotive, ~$16K) · BLADE-MARITIME (maritime, ~$43K) · BLADE-INFRA (infrastructure, ~$12K). Six platforms demonstrating governance stack portability across four domains.
Seven planned experiments designed to validate the BLADE-EDGE governance pipeline under increasingly adversarial conditions. Each experiment measures decision correctness, latency compliance, and safety interlock behavior.
Each experiment targets minimum 30 trials for statistical significance. Metrics: decision correctness, end-to-end latency, safety interlock state, false positive rate, recovery time.
Complete engineering documentation for the BLADE-EDGE Governance Node. All files are original work by Burak Oktenli.
This project provides complete reproducible artifacts enabling independent verification of the system design, component selection, and governance architecture.
Full blueprint PDF, system overview SVG, pipeline diagram SVG, security architecture SVG, 3D render. Complete electrical schematic with all 103 connections.
72-component BOM with verified sources across 8 subsystems. All components commercially available (some ITAR-controlled). Cost breakdown with production scaling estimates.
7 defined experiments targeting sensor spoofing, GPS manipulation, swarm consensus failure, atmospheric degradation, and compound attacks. 30+ trials each.
MIL-STD-810G (environmental), MIL-STD-1275 (power), IP67 (sealing), MIL-DTL-38999 (connectors), MIL-DTL-27500 (wiring), DoDD 3000.09 (autonomy).
The BLADE-EDGE design specification represents the first phase. Future work focuses on physical realization and operational validation.
Custom carrier board design and validation, ITAR component procurement, system assembly and integration testing
Field evaluation with directed-energy weapon platforms and counter-UAS systems in controlled test environments
Multi-unit MAIVA consensus testing over encrypted MANET mesh, Byzantine fault injection, swarm governance validation
Independent MIL-STD-810G environmental testing, EMI/EMP validation, and safety certification at accredited facility
Cost optimization for 100+ unit production runs (~$60-80K per unit), defense procurement pathway, ITAR compliance documentation
The BLADE Governance SDK provides a unified API across all four domains. The same
blade_governance
library drives defense weapons governance (BLADE-EDGE), autonomous vehicle authority (BLADE-AV),
maritime surveillance (BLADE-MARITIME), and critical infrastructure protection (BLADE-INFRA).
Only the domain configuration file changes.
Cross-Domain Portability:
The blade_governance SDK
uses the same evaluate() →
result API across all four domains.
Switching from defense weapons governance to autonomous vehicle authority requires changing only the YAML
configuration file — not the application code. This is how the same governance pipeline operates under
DoDD 3000.09, ISO 26262 ASIL-D, MIL-STD-810G, and SIL 3 / NERC CIP simultaneously.
The BLADE-EDGE Governance Node is part of the authority-governed autonomy research program by Burak Oktenli at Georgetown University (M.P.S. Applied Intelligence). It demonstrates mastery across 12 technical domains: GPU-accelerated edge AI, FPGA real-time processing, multi-sensor fusion, military standard compliance, hardware security architecture, distributed consensus, thermal management, power systems engineering, EMI/EMP hardening, real-time operating systems, autonomous systems ethics, and defense systems integration.
Related research architectures: SATA (sensor trust), HMAA (authority computation), CARA (recovery), MAIVA (multi-agent trust), FLAME (latency control), ADARA (deception-aware risk).