Full-Stack Survival

Civilization is a multi-layer survival stack. Most states defend some layers and leave others unmonitored. The missing function is mechanism audit — transparent, challengeable, and cheap enough that the only reason it doesn't exist is that nobody's job description includes it.

Elias Kunnas


I. The Substrate

Property rights are formalized warfare.

This is not metaphor. Behavioral ecology shows that territorial conventions predate human institutions entirely. Speckled Wood butterflies (Pararge aegeria) compete for sunlit patches on the forest floor — the territories where females are most likely to be encountered. Davies (1978) demonstrated that contests are resolved by a simple rule: the resident always wins, the intruder always retreats. Even when the intruder is physically stronger, even when the resident has occupied the territory for only seconds. The mechanism is game-theoretic: the cost of escalated fighting exceeds the marginal value of any single territory, so organisms converge on a stable convention — the "bourgeois strategy" — that economizes violence. The convention persists because violating it means paying the full cost of combat for every disputed patch.

Human property rights are the same mechanism at higher abstraction. Kahneman, Knetsch, and Thaler (1990) documented the endowment effect: people value what they already possess more than identical goods they don't own, and resist losing owned resources far more intensely than they desire acquiring equivalent gains. The brain treats owned resources as extensions of the self requiring defense against appropriation. Property is territory defense formalized into law and outsourced to the state for enforcement.

Harold Demsetz's foundational 1967 paper shows that property rights emerge specifically when the cost of defining and enforcing exclusion falls below the cost of continuous conflict over unmanaged commons. The institution of property replaces the low-level warfare of the tragedy of the commons with a formal structure backed by the coercive power of the community. Stergios Skaperdas quantifies the cost structure: property rights are maintained through "contest success functions" (1996) — the mathematical equilibrium of who can defend what at what cost. Security expenditure, military spending, and the legal system are all investments in maintaining this equilibrium. His review of the evidence (2011) shows these costs are not incidental overhead but the foundational operating expense of any property-based social order.

Elinor Ostrom (1990) demonstrated that commons governance doesn't always require private property or state coercion — communities can manage shared resources through peer monitoring, voluntary agreements, and social sanctioning. Ostrom's governance mechanisms are alternative institutional technologies for managing competition — cooperative warfare against the tragedy of the commons, using social capital instead of fences.

II. The State as Organized Violence

If property rights are formalized territory defense, the state is its ultimate expression. Charles Tilly's 1985 framework is explicit: the historical formation of nation-states is indistinguishable from organized crime. "War made the state, and the state made war." The modern state emerged through coercion wielded by power-seeking elites eliminating rivals.

Tilly delineates four state functions, all formalized mechanisms of warfare: war making (eliminating external rivals), state making (eliminating internal rivals to monopolize violence), protection (neutralizing threats to the state's clients while simultaneously being the primary source of the threat of violence against non-compliance), and extraction (systematic resource acquisition through taxation and conscription to fund the other three). The bureaucratic apparatus of the modern state — courts, treasuries, administrative agencies, police — was originally engineered to optimize resource extraction for waging war. Predictable, rule-based taxation replaced unpredictable plunder because it was more efficient and generated less resistance.

North, Wallis, and Weingast (2009) generalize this: the primary function of any social order is the management and containment of violence. In "natural states," political elites distribute rents and privileges to pacify rivals capable of violence — making peace more profitable than war for those holding weapons. In "open access orders" (modern democracies), competition is entirely formalized through impersonal property rights, rule of law, and free market entry. Every law and regulatory framework in a modern democracy is a micro-treaty designed to preempt the outbreak of kinetic violence by providing formalized dispute resolution.

If it becomes socially acceptable for factions to seize property or power through extra-legal force without consequence, the formalization has failed and the system reverts.

III. Cooperation Is a Warfare Technology

The obvious objection: if everything is warfare, why do humans cooperate so intensely? Why do strangers help each other, contribute to public goods, punish free-riders at personal cost?

Samuel Bowles and Herbert Gintis (2011) resolve this using multi-level selection theory and agent-based modeling. Human altruism evolved alongside parochialism — hostility toward out-group members. The intersection of these traits, which they call "parochial altruism," provided an overwhelming evolutionary advantage during the Late Pleistocene. Groups with high internal cooperation, tribal solidarity, and willingness to self-sacrifice consistently outcompeted, subjugated, or exterminated groups without such cooperative architecture. Lethal inter-group warfare was the primary selection mechanism for the proliferation of cooperative norms, pro-social behavioral dispositions, and coordinating institutions.

A highly cooperative, high-trust society is a highly optimized machine for competing against external threats. The normative frameworks that mandate internal cooperation are prerequisites for effective collective competition. Institutions function as conventions ensuring behavioral uniformity, allowing an entire society to act as a cohesive competitive unit.

Peter Kropotkin (1907) focused on a different adversary: not competing human groups, but the environment itself — entropy, resource scarcity, harsh conditions. Species that developed mutual support mechanisms outsurvived those engaged in constant intra-species competition. Within the survival framing, Kropotkin complements rather than contradicts Bowles and Gintis. Cooperation is a defense mechanism whether the adversary is intelligent (a rival group) or unintelligent (thermodynamic decay, starvation, natural disaster). The commons and mutual aid networks are defensive fortifications built against the ravages of nature.

Cooperation is an advanced warfare technology — a formalized method of competing against both intelligent adversaries and entropy more efficiently than pure conflict. The institution of the family, the village, the nation, the alliance — each is a larger cooperative unit built to survive threats that smaller units cannot handle alone.

IV. The Stack

If all institutions are survival mechanisms operating at different scales and against different threat types, civilization can be modeled as a multi-layer survival stack. Each layer defends against a specific category of threat:

The stack has a critical property: failure at any single layer cascades. A civilization with perfect military defense that undergoes demographic collapse still dies. A civilization with robust demographics but broken institutional feedback mechanisms will misallocate resources until it can't defend itself. A civilization with working institutions but a collapsed information layer will optimize confidently in the wrong direction. The layers are coupled. Strength at six layers does not compensate for a gap at the seventh.

This is analogous to a network protocol stack, where a failure at the transport layer renders application-layer security irrelevant. The stack is a unified system. Monitoring and defense must operate at every layer simultaneously.

V. The Gap

Modern states monitor some layers intensively and others not at all.

The physical layer is the most heavily monitored. Every state has a military, intelligence services, border security, and elaborate threat assessment infrastructure. Trillions of dollars globally fund the monitoring and defense of territorial integrity.

The economic layer is well-monitored. Central banks track monetary aggregates, statistical agencies measure GDP, unemployment, inflation, and trade balances. The fiscal layer receives continuous attention through budget processes and public accounting.

The institutional layer — whether specific laws and governance mechanisms produce their stated outcomes — is almost entirely unmonitored. No OECD country systematically tests whether its legislation works as designed. Existing oversight bodies each cover fragments: the US Congressional Budget Office scores individual bills fiscally but not cross-bill compound effects; the Netherlands CPB models behavioral responses to coordinated fiscal packages but not regulatory interactions across ministries; the UK Office for Budget Responsibility models tax-benefit interactions but not cross-ministry regulatory effects. The function of testing whether laws produce their stated outcomes — across ministries, across time horizons, accounting for behavioral responses and compound interactions between concurrent legislation — does not exist anywhere.

The demographic layer is measured but not governed. Statistical agencies track fertility rates, age structure, dependency ratios. But no institution connects demographic trends to their institutional causes, identifies which specific mechanisms are producing below-replacement fertility, or evaluates proposed legislation for demographic effects. The measurement exists. The feedback loop to governance does not.

The informational, cultural, and memetic layers are essentially unmonitored as civilizational infrastructure. Universities track research output. Media organizations track audience metrics. Nobody tracks whether the civilization's knowledge production, truth-tracking, and value transmission systems are functioning at the level required for long-term survival.

Billions defending the physical layer. Virtually nothing monitoring the institutional layer — which determines whether the billions spent on physical defense produce their intended effect, or whether the laws governing resource allocation are systematically liquidating the capital stocks they're supposed to protect.

VI. The Control Trap

China has already built full-stack monitoring. The Comprehensive National Power (CNP) framework quantifies military, economic, scientific, technological, diplomatic, demographic, and cultural dimensions as a unified metric. China monitors and governs across all layers simultaneously. China also optimizes for party survival rather than civilizational health, and its feedback is opaque rather than transparent.

The Copenhagen School of security studies (Buzan, Wæver, de Wilde, 1998) conflates them. Their argument: extending security framing to non-military domains is a speech act that justifies emergency measures — suspension of normal legislative process, bypassing oversight mechanisms, concentration of executive power. Their prescription: keep non-military layers outside the security frame entirely.

This conflates the monitoring function with the control function. China's failure is that it monitors in order to control — to suppress information that threatens the party. The monitoring feeds into a misaligned optimization target. The scope of monitoring is not the problem. The architecture of the feedback is the problem. Full-stack monitoring with transparent, challengeable output and no executive authority is a different institutional species from full-stack monitoring with opaque, party-serving output and unlimited executive authority.

VII. The Missing Function

The transparent version of full-stack monitoring is mechanism audit: pre-legislative testing of whether laws produce their stated outcomes, across all capital stocks, across all time horizons, accounting for behavioral responses and compound interactions between concurrent legislation.

This function has three properties that distinguish it from securitization:

Transparency. Every finding is public. The mechanism tests are published documents that anyone can read, challenge, and verify. There is no classified threat assessment, no emergency committee, no suspension of normal process. The instrument creates visibility, not authority.

Mechanism focus. The audit tests whether specific mechanisms work as designed. It does not evaluate whether policies are good or bad, left or right, progressive or conservative. "Does this funding formula punish regions that reduce costs?" is an engineering question with a verifiable answer. Most apparent value disagreements in policy are actually uncomputed empirical disagreements — they dissolve when someone models the consequences.

No emergency powers. The audit produces findings and questions, not orders. The institutional specification is a constitutional function — pre-legislative mechanism audit, continuous outcome monitoring, automatic parliamentary triggers when capital stock indicators breach thresholds — but the triggers produce parliamentary debate, not executive action. The output is information, not force. Parliamentarians decide what to do with it.

Rita Floyd's "Just Securitization Theory" (2019) provides the theoretical bridge: objective existential threats exist independently of speech acts. When institutional decay reaches a measurable threshold where it objectively threatens survival, applying a monitoring framework is analytically accurate and functionally warranted. The mechanism audit function identifies measurable, verifiable institutional failures without crossing into emergency-measures territory.

The Dutch CPB has done a narrow version of this since 1945. Nobody argues that measuring GDP is too complex. Measuring whether laws work is the same category of function, applied to a different layer of the stack.

VIII. The Generative Objection

A serious counter-argument remains: the "everything is warfare" framing is reductive. Universities, orchestras, art museums, philosophical traditions — these are generative institutions that produce civilizational capacity through mechanisms that exceed the logic of threat response. To define a symphony as a permutation of survival strategy is to strip it of its phenomenological meaning.

This critique has weight. The warfare framing is a lens, not an ontology. It reveals the defensive architecture of civilization — which institutions exist because they solve which survival problems. It does not claim to exhaust what those institutions are or what they mean to the people within them. A university is a knowledge-production institution that serves the informational layer of the survival stack. It is also a community, a tradition, a place where people find meaning. Neither description is complete.

The monitoring function doesn't need to resolve this philosophical question. It needs to detect when the survival stack has a gap — when legislation is systematically depleting capital stocks that the state doesn't measure. Whether the depleted capital stock is "really" a survival resource or "really" a generative cultural asset is an interesting question that the mechanism audit sidesteps entirely. It simply measures: is this stock growing, stable, or declining? If declining, is the decline caused by identifiable mechanisms? If so, here are the mechanisms. Fix or explain.

The monitoring function measures effects. The philosophy is optional.

IX. The Unified Threat Surface

Military planners map threat surfaces for their domain with rigorous methodology. Cybersecurity analysts map attack surfaces for software systems. Climate scientists map vulnerability layers for regional ecosystems. Nobody maps the comprehensive civilizational threat surface — the integrated topology of demographic, institutional, informational, economic, cultural, and physical vulnerabilities — with comparable rigor.

This gap exists for structural reasons. Military planning sits in defense ministries. Economic monitoring sits in finance ministries and central banks. Demographic analysis sits in statistical agencies. Institutional quality assessment sits nowhere. Each domain has its own methodology, community, and career incentives. Nobody maps the stack.

Laws are where political decisions become mechanisms. Testing whether those mechanisms produce their stated outcomes, across all capital stocks, is the minimum viable version of civilizational threat surface monitoring.

The institution propagates by its own logic: one country demonstrates that mechanism audit works, others copy the spec. Like central banks — which spread across countries over two centuries because operating without monetary instruments became increasingly untenable as economies grew more complex.

The survival stack gets its monitoring function. Or it doesn't, and the layers that nobody watches continue to degrade until the cascade reaches the layers that everybody watches — at which point it's too late, because the institutional capacity to respond has already been liquidated by the mechanisms nobody tested.


Sources and Notes

Territorial conventions and property rights:

  • Davies, N.B. (1978). "Territorial Defence in the Speckled Wood Butterfly (Pararge aegeria): The Resident Always Wins." Animal Behaviour, 26(1), 138–147.
  • Kahneman, D., Knetsch, J.L., and Thaler, R.H. (1990). "Experimental Tests of the Endowment Effect and the Coase Theorem." Journal of Political Economy, 98(6), 1325–1348.
  • Demsetz, H. (1967). "Toward a Theory of Property Rights." American Economic Review, 57(2), 347–359.
  • Skaperdas, S. (1996). "Contest Success Functions." Economic Theory, 7(2), 283–290.
  • Skaperdas, S. (2011). "The Costs of Organized Violence: A Review of the Evidence." Economics of Governance, 12(1), 1–23.
  • Ostrom, E. (1990). Governing the Commons: The Evolution of Institutions for Collective Action. Cambridge University Press.

State formation and cooperation:

  • Tilly, C. (1985). "War Making and State Making as Organized Crime." In Bringing the State Back In, edited by P. Evans, D. Rueschemeyer, and T. Skocpol. Cambridge University Press.
  • North, D., Wallis, J., and Weingast, B. (2009). Violence and Social Orders: A Conceptual Framework for Interpreting Recorded Human History. Cambridge University Press.
  • Bowles, S. and Gintis, H. (2011). A Cooperative Species: Human Reciprocity and Its Evolution. Princeton University Press.
  • Kropotkin, P. (1907). Mutual Aid: A Factor of Evolution. Heinemann.

Securitization and collapse:

  • Buzan, B., Wæver, O., and de Wilde, J. (1998). Security: A New Framework for Analysis. Lynne Rienner.
  • Floyd, R. (2019). The Morality of Security: A Theory of Just Securitization. Cambridge University Press.