Part VI — Integrity, Safeguards & Self-Review
Derived from Axioms 4 (every power checked — including the checkers), 5 (transparency), 7 (verifiability), 10 (self-correction), 11 (anti-capture). This is the system's immune system. It improves on model5 in two decisive ways: it answers "who guards the guardians", and it adds the missing outcome-measurement feedback loop that tells the people whether governance is actually working.
VI.1 The Integrity & Safeguard Assembly
An independent body whose sole job is the integrity of the whole system. It does not govern; it guarantees that those who govern do so honestly. Its functions:
- Algorithm & data oversight (§VI.4)
- Procurement forensics & anti-corruption (§VI.5)
- Custody of the transparency ledger (§VI.6)
- Outcomes measurement (§VI.7)
- Rights & doctrine compliance monitoring (referring breaches to the Court)
- The Public Information function (Part II.5)
- Whistleblower protection & enforcement (§VI.9)
It has investigatory powers, the Pause power (§V.7), and powers of referral (to the Court for legality, to the Assembly for removal) — but not the power to govern or to punish unilaterally. It exposes and refers; others adjudicate. This separation is deliberate: an integrity body that could both investigate and punish would itself be too powerful.
VI.2 Independence — structural, not promised
The Integrity Assembly must be independent of every body it watches, or it is theatre:
- Separate appointment (not by the executive or experts it oversees) — multi-stage, like §IV.4, with a strong sortition component.
- Secured, constitutionally guaranteed funding that cannot be cut by those it investigates — defunding is the classic way to neuter a watchdog.
- Cannot be disbanded or restructured except by the §I.9 amendment process — it is Charter-level, not at the mercy of ordinary politics.
- Operational transparency: it works in the open by default (its own investigations excepted only while live and only on published criteria).
VI.3 Who guards the guardians — closing the loop
model5 shows an Integrity Assembly watching everyone, but nothing watching it. Axiom 4 forbids any unchecked power, so the Integrity Assembly is itself checked, by four independent means at once:
- Citizen oversight juries (sortition). Standing panels of citizens, chosen by lot, with real powers over the Integrity Assembly: access to its records, the ability to investigate it, to commission independent audits of it, and to refer its members for removal. Ordinary citizens, immune to insider capture, are the ultimate watchers — and they rotate, so they cannot themselves be captured.
- The Rights & Constitutional Court (Part IX) — legality of the Integrity Assembly's own actions.
- Radical self-transparency — the watchdog's own operations, budgets, and decisions are on the public ledger.
- The people — via the amendment power and the elected Assembly's confirmation/removal role.
This is the recursive answer Axiom 4 demands: every box has a check, including the boxes that do the checking, and the chain terminates in the rotating, unbribable judgement of ordinary citizens.
VI.4 Algorithm and data oversight
Given the technological layer (Part VIII), opaque algorithms are a new route to unaccountable power. Therefore:
- No secret algorithms in government. Every algorithm or AI used in a governing function is registered in a public register, auditable, explainable, and bias-tested before and during use.
- Data governance: what data the state holds, why, for how long, and under what rights constraints (§I.3 privacy) is public and audited.
- Independent testing: the Integrity Assembly (and citizen juries) can audit any government algorithm, including its training data and its real-world impact, at any time.
VI.5 Procurement forensics and anti-corruption
Corruption is a primary capture vector (Criterion 5), and procurement is where public money meets private interest:
- Real-time spend transparency: public money is recorded to the transparency ledger as it is committed — who, what, how much, why.
- Automated anomaly detection: continuous forensic analysis flags irregular patterns (bid-rigging signatures, conflict-linked awards, price anomalies) for investigation.
- Asset & interest declarations for all office-holders, public and audited (links §IV.7).
- Revolving-door enforcement (§IV.7).
- Beneficial-ownership transparency for entities contracting with the state — no hiding behind shells.
VI.6 The transparency ledger
The shared spine of verifiability (Axiom 7): an immutable, tamper-evident, public record of decisions, public money, anonymised votes/results, reasoning artefacts, appointments, and declarations. Properties:
- Append-only and tamper-evident — entries cannot be silently altered or deleted; any tampering is detectable.
- Publicly auditable — any citizen, journalist, or researcher can inspect and verify it (privacy-preserving where personal data is involved — §II.1).
- The default home of state reasoning — §V.3 decision artefacts live here.
Technical design (consensus, custody, privacy, integrity) is specified in Part VIII; here it is mandated as a constitutional requirement.
VI.7 Outcomes measurement — the missing feedback loop
model5's largest omission: it shows decisions being made but never shows the country finding out whether they worked. This model adds a public outcomes ledger:
- The wellbeing composite (§0.2) is measured and published continuously, by dimension.
- Decisions are tracked against their own predictions (§V.3 falsification tests) — every major decision's predicted outcome is recorded in advance and scored against reality.
- The system's own performance is scored against the §0.4 rubric on a live basis (feeds Part XVII).
- The data is open so citizens, academics, and the press can hold the measurement itself to account.
This closes the loop in the architecture diagram: outcomes flow back to the people as accountability and renewed (or withdrawn) consent. It is what makes "best long-run outcomes for citizens" a measurable commitment rather than a slogan.
Guarding the measurement (Goodhart's law)
"When a measure becomes a target, it ceases to be a good measure." Defences:
- A basket, not a number — many indicators across dimensions, so no single metric can be gamed to fake success.
- Independent measurement — the Integrity Assembly (watched by citizen juries) measures; the governed do not grade their own homework.
- Periodic indicator review — the composite is revised to defeat emerging gaming, transparently.
- Outcome-vs-prediction tracking — gaming a metric shows up as predictions that "succeed" on paper while lived reality and the wider basket diverge.
VI.8 Institutionalised self-correction
Self-correction (Axiom 10) is made structural, not aspirational:
- Mandatory post-implementation reviews on a published schedule (§V.7).
- An open error register — recorded mistakes, openly, feeding learning.
- Sunset clauses on major policies — they expire and must be re-justified against measured outcomes, rather than persisting by inertia.
- Continuous rubric scoring (§VI.7) so decline is detected early.
VI.9 Whistleblowing and enforcement
Integrity needs eyes inside and teeth outside:
- Protected, anonymous channels to the Integrity Assembly, constitutionally shielded from retaliation.
- Real consequences: referral to the Court, removal for cause, recovery of funds.
- Retaliation is itself an offence, investigated independently.
VI.10 Failure modes and safeguards
| Failure mode | How it attacks | Safeguard |
|---|---|---|
| Capture of the integrity body | Watchdog is bought or packed | Independent appointment + guaranteed funding + Charter-level protection (§VI.2); citizen-jury oversight (§VI.3) |
| Watchers collude with watched | Cosy regulatory capture | Rotating sortition juries with real powers over the watchdog (§VI.3); radical self-transparency |
| Defund the watchdog | Starve it quietly | Constitutionally guaranteed funding, uncuttable by those it watches (§VI.2) |
| Secret/opaque algorithms | Unaccountable automated power | Public algorithm register; auditable, explainable, bias-tested; no secret gov algorithms (§VI.4) |
| Procurement corruption | Public money to insiders | Real-time spend ledger; anomaly detection; beneficial-ownership + revolving-door rules (§VI.5) |
| Gaming the metrics (Goodhart) | Hit the target, miss the point | Basket not number; independent measurement; outcome-vs-prediction; indicator review (§VI.7) |
| Suppressing bad-outcome data | Hide failure to avoid accountability | Open outcomes ledger; concealment is itself a failure (§0.6); whistleblower channels (§VI.9) |
| Whistleblower retaliation | Silence the insider who tells the truth | Constitutional protection; retaliation an offence (§VI.9) |
| Integrity body overreaches | Watchdog becomes a power itself | Expose-and-refer only; cannot govern or punish unilaterally (§VI.1); Court + juries check it |
Part VI ends. The system can now form an honest mandate, execute it competently, and police its own integrity and outcomes. Next: Part VII — Crisis & Resilience.