Saga V — The Restoration

The Restoration

"Four sagas documented what was broken. This one documents what fixing it actually requires."

Four series. The affirmative turn. Law. Design. Measurement. Practice. Not a vision of what could be — a specification of what must be done.

Status: Architecture committed. Papers forthcoming. The series structure, argument chain, and paper list for Saga V are committed to the Institute's research program. Papers are in development. This page documents the architecture. It will be updated as papers publish.

The Saga Thesis

The four prior sagas are diagnostic. Saga I documented the mechanism of capture and its biological, legal, and epistemic consequences. Saga II documented three institutional collapses sharing one root architecture. Saga III documented the historical defenses, the degraded environmental substrate, and the path of individual recovery. Saga IV unified all prior series into one event and asked why it matters.

Saga V is the consequent question: now that we know what happened, what does fixing it actually require? Not at the individual level — Saga III's Recovery Architecture handles that. At the institutional level. What law would function? What design principles are non-negotiable? What measurements would replace the ones that failed? What practical framework can translate the Institute's body of work into individual and organizational action? These are not rhetorical questions. They have answers. The four series of Saga V document them.

The Argument Chain
Legal Architecture
Series I · LA
Conclusion: Effective cognitive sovereignty law has a specific anatomy — and none of the major frameworks implemented to date have it.
GDPR, COPPA, DSA, KOSA — the regulatory record is documented and specific. Each framework's failure is traceable to a specific architectural gap: consent theater, enforcement distance, definitional capture, jurisdictional arbitrage. The Legal Architecture series documents both what failed and what statutory language, enforcement mechanism, and treaty design would function. The legal architecture becomes the design covenant's constraint.
Design Covenant
Series II · DC
Conclusion: Ethical attention design is not the absence of bad practices — it is the presence of specific design commitments that are technically achievable and commercially suppressable.
The variable reward schedule, infinite scroll, engagement-maximizing notification architecture, and social comparison engine are design choices. There are specific alternative design choices that have been documented, tested, and in some cases deployed. The Design Covenant series names them. It also documents why the market will not produce them without external constraint — which is what the Legal Architecture series must supply. The design standards become the measurement reformation's target set.
Measurement Reformation
Series III · MR
Conclusion: What gets measured gets optimized. The Measurement Crisis documented what the current metrics optimize for. The Measurement Reformation documents what to measure instead.
Time-on-platform, engagement rate, daily active users — these are not measures of value, they are measures of capture efficiency. Alternative metrics exist: attentional quality, voluntary return rates, reported cognitive agency, community health indicators. The Measurement Reformation series specifies what a cognitive sovereignty dashboard would track, how the data would be collected, and why the industry has not produced it. The measurement framework becomes the HEXAD's operational instrument.
The HEXAD Series
Series IV · HX
Conclusion: Cognitive sovereignty is not an abstract condition — it has six concrete, assessable, practicable dimensions. The HEXAD is the Institute's implementation layer.
The six dimensions of the HEXAD framework — attention, perception, reasoning, emotional regulation, social cognition, and epistemic agency — are not a philosophical model. They are a diagnostic and practice framework derived from the research the prior twelve series document. The HEXAD Series translates the Institute's entire body of work into assessable individual and organizational practice. The HEXAD framework is the answer to the question all prior sagas imply: what does a person with cognitive sovereignty actually do differently?
Planned Reading Order — 20 Papers
1
Legal Architecture · LA-001
What Cognitive Sovereignty Law Requires
Five Anatomical Elements of Any Adequate Legal Framework for Digital Attention Governance
The existing regulatory canon — GDPR, COPPA, DSA — is reviewed against the standard of whether it addresses the mechanisms documented in Sagas I and II. It does not. This paper specifies the statutory elements a functioning cognitive sovereignty framework requires: design standards with enforcement teeth, age-differentiated protections with verification requirements, algorithmic transparency mandates, and liability structures that reach platform design decisions rather than individual data transactions.
Published · ICS-2026-LA-001
2
Legal Architecture · LA-002
The GDPR and What It Actually Changed
Lessons from Eight Years of the World's Most Comprehensive Privacy Regulation
The GDPR is the most cited regulatory achievement in digital rights history. This paper asks what it actually changed in terms of the mechanisms the Attention Series documents. The consent dialog proliferation, the cookie banner theater, the persistent behavioral advertising infrastructure — a decade after the regulation took effect, the evidence of what changed and what didn't is available. The lessons for future regulatory design are specific.
Published · ICS-2026-LA-002
3
Legal Architecture · LA-003
The Kids Online Safety Act Record
From 91–3 to Zero: What the First Amendment Argument Actually Covers
KOSA passed the Senate 91–3 in 2024 and died in the House. This paper traces the legislative history, documents the arguments that defeated it — primarily first amendment concerns from both the ACLU and technology industry — and examines whether those concerns were constitutionally well-founded or strategically constructed. The paper identifies the specific design changes to the legislation that would have addressed the constitutional objections without eliminating the protective mechanism.
Published · ICS-2026-LA-003
4
Legal Architecture · LA-004
The Australian Model
The Age 16 Floor, Platform Liability, and What Binding Legislation Actually Looks Like
Australia's Online Safety Amendment (Social Media Minimum Age) Act 2024, establishing a minimum age of 16 for social media with platform liability for violations, represents the most legally significant youth digital protection legislation enacted to date. This paper examines the drafting choices, enforcement mechanism, constitutional basis, and early implementation data. It identifies what elements of the Australian model are transferable to US and European legislative contexts and where the design would need to be adapted.
Published · ICS-2026-LA-004
5
Legal Architecture · LA-005
The Treaty Framework
Jurisdictional Arbitrage, Treaty Precedents, and What Binding International Standards Require
Digital platforms operate globally. National regulation produces jurisdictional arbitrage — platforms relocate compliance obligations to the most permissive jurisdiction. The only durable solution to this arbitrage is transnational binding standards. This paper examines the treaty precedents (chemical weapons, tobacco, climate), identifies why digital platforms present a harder coordination problem than prior cases, and specifies what binding transnational cognitive sovereignty standards would require to function.
Published · ICS-2026-LA-005
6
Design Covenant · DC-001
The Principles of Ethical Attention Design
What Replacing Engagement Maximization as a Design Objective Actually Requires
The Attention Series documented what attention-maximizing design does. This paper documents what ethical attention design requires in its place — not as a philosophical aspiration but as an engineering specification. Chronological content ordering, no engagement-metric display, opt-in notification architecture, session awareness, voluntary return rates as the primary performance metric. Each principle is grounded in the research base the prior series establish and in the technical and commercial feasibility constraints the industry faces.
Published · ICS-2026-DC-001
7
Design Covenant · DC-002
Chronological Feeds and Why They Matter
The Single Smallest Viable Design Change and the Evidence for Why Platforms Resist It
Replacing the engagement-ranked feed with a chronological feed is a design change so simple that its absence is itself informative. This paper examines the evidence on what the engagement-ranked feed does to content exposure, emotional state, time-on-platform, and political polarization, versus what chronological feeds produce. It then examines the internal platform data on engagement impacts, documents why platforms have resisted the change, and argues that chronological-by-default feed ordering is the minimum viable design standard a cognitive sovereignty framework should mandate.
Published · ICS-2026-DC-002
8
Design Covenant · DC-003
What Notification Architecture Could Be
Friction by Design — the Case for Opt-In, Batched, and Time-Bounded Notification Systems
The Attention Series documented that push notifications are the primary interrupt mechanism sustaining the attention-capture loop: each notification reinstates the dopaminergic seeking circuit that would otherwise extinguish through non-reinforcement. This paper specifies what a notification system designed for user cognitive benefit rather than platform engagement metrics would look like: opt-in by default, batched at user-chosen intervals, with no variable-ratio reinforcement scheduling. It documents why this design is commercially viable and technically trivial to implement.
Published · ICS-2026-DC-003
9
Design Covenant · DC-004
The Open Protocol Future
Decentralized Attention Infrastructure and What It Would Change About the Incentive Architecture
The capture mechanisms documented in Saga I are properties of the attention economy's incentive architecture — which is, in turn, a property of centralized platform control over distribution. Decentralized, open-protocol social infrastructure (ActivityPub, AT Protocol, Nostr) separates the attention infrastructure from the advertising revenue model, potentially eliminating the incentive to maximize engagement. This paper examines what the open protocol landscape actually looks like, what it has achieved, and what it would take for open protocols to displace rather than merely complement the centralized platforms.
Published · ICS-2026-DC-004
10
Design Covenant · DC-005
The Design Covenant
A Proposed Voluntary Standard for Platforms That Commit to Cognitive Sovereignty of Their Users
The series capstone. Draws on the four preceding papers to propose a specific, signable Design Covenant — a voluntary standard that platforms could adopt to publicly commit to design principles that do not weaponize user attention. The Covenant is designed to be verifiable (specific measurable commitments), auditable (third-party assessment criteria), and meaningful (addressing the specific mechanisms the Attention Series documents). It is proposed as a voluntary instrument because the Legal Architecture series documents why binding standards take longer — but designed to become the template for mandatory standards once the legal architecture catches up.
Published · ICS-2026-DC-005
11
Measurement Reformation · MR-001
What Replaces the Engagement Metric
Alternative Performance Indicators for Platforms That Are Not Optimizing for Capture
The Measurement Crisis documented how engagement metrics have become targets rather than measures, optimizing for capture efficiency rather than user value. This paper proposes specific alternative metrics: voluntary return rate (the percentage of sessions initiated without notification prompt), session satisfaction ratings (self-reported quality of the time spent), attentional completion rates (content consumed to completion versus abandoned mid-scroll), and post-session well-being scores. Each alternative metric is operationally defined, data-collectible within existing platform architectures, and resistant to the specific gaming behaviors that have corrupted the engagement metrics they would replace.
Published · ICS-2026-MR-001
12
Measurement Reformation · MR-002
The Cognitive Sovereignty Index
A Scored, Citable Metric for Individual and Population-Level Cognitive Agency
The Measurement Crisis argued that what gets measured gets optimized, and that the current measurements optimize for the wrong things. This paper proposes the Cognitive Sovereignty Index (CSI) — a scored, reproducible, citable composite metric that operationalizes cognitive sovereignty at the individual and population levels. The CSI draws on the six dimensions of the HEXAD framework, is calibrated against the existing evidence base the prior series establish, and is designed to be deployable both as a research instrument and as a self-assessment tool.
Published · ICS-2026-MR-002
13
Measurement Reformation · MR-003
The Attentional Commons
Measuring Collective Cognitive Health at Population Scale
Cognitive sovereignty is currently measured — where it is measured at all — at the individual level. But attention is also a collective resource. A population whose attention infrastructure has been systematically captured loses deliberative capacity, collective sense-making ability, and the epistemic infrastructure of democratic governance. This paper proposes population-level cognitive health indicators: polarization indices adjusted for informational environment, public discourse quality metrics, and institutional trust measures that distinguish genuine trust from captured deference.
Published · ICS-2026-MR-003
14
Measurement Reformation · MR-004
The Measurement Reformation
What It Would Take for Alternative Metrics to Become Standard — Institutionally, Commercially, and Legally
The series capstone. Good alternative metrics exist. They are not becoming standard because the institutions that would adopt them — platforms, regulators, academic journals, advertisers — have structural incentives to maintain the current measurement regime. This paper documents those incentives and the specific interventions — regulatory mandates, advertiser standards, academic journal disclosure requirements, public reporting obligations — that would be necessary to shift the measurement regime without requiring voluntary adoption from actors whose interests are served by the current metrics.
Published · ICS-2026-MR-004
15
The HEXAD Series · HX-001
What the Six Dimensions Are
The Framework, Its Derivation, and Why These Six and Not Others
The HEXAD framework formally specifies six dimensions of cognitive sovereignty: Attentional, Perceptual, Reasoning, Emotional, Social Cognitive, and Epistemic Sovereignty. This paper documents how those six were derived — through mechanism analysis, intervention analysis, and independence testing — and provides full research-grounded specifications for each. Names The Specification Absence.
Published · ICS-2026-HX-001
16
The HEXAD Series · HX-002
How Each Dimension Degrades Under Capture
A Diagnostic Map — How the Mechanisms Documented in Sagas I–IV Operate on Each Dimension
Maps how attentional, perceptual, reasoning, emotional, social cognitive, and epistemic sovereignty each degrade through distinct capture mechanisms — and how degradation compounds across dimensions. Introduces the Capture Profile: the characteristic multi-dimensional degradation signature produced by a given capture environment. Names The Capture Profile.
Published · ICS-2026-HX-002
17
The HEXAD Series · HX-003
The Dimensional Assessment Protocol
How to Measure Where You Are Across All Six Dimensions
Proposes the Dimensional Assessment Protocol (DAP): a multi-input assessment instrument combining self-report subscales, behavioral indicator modules, and contextual exposure profiling across all six HEXAD dimensions. Specifies six validation studies required before clinical deployment. Names The Assessment Void: the absence of any validated cross-dimensional instrument in the prior literature.
Published · ICS-2026-HX-003
18
The HEXAD Series · HX-004
The Dimensional Practice Guide
Evidence-Based Practices for Each of the Six Dimensions
Eighteen evidence-based practices organized across the six HEXAD dimensions in three tiers — entry, intermediate, and deep — guided by the principle that environment redesign precedes behavioral willpower. Provides practice sequencing logic based on DAP assessment profiles. Names The Practice Gap: the absence of a dimensional, evidence-grounded practice specification for cognitive sovereignty restoration.
Published · ICS-2026-HX-004
19
The HEXAD Series · HX-005
The HEXAD and the Sagas — A Reading Map
How the Entire Research Program of the Institute Connects to the Six Dimensions
The series capstone and the Institute's terminal paper. Maps all 17 series and 88 papers across five Sagas onto the six HEXAD dimensions, provides dimension-first reading paths for new readers, and reveals three structural observations about the architecture of the research program. Names The Connection Gap: the absence of an explicit map between a multi-series research program and the organizing framework that gives it coherence.
Published · ICS-2026-HX-005
Saga V Synthesis · I5-001
The Restoration — What It Actually Takes
A Single Argument Connecting Law, Design, Measurement, and Practice into One Coherent Program
The keystone paper of Saga V. Draws on all 19 papers to make the unified argument: cognitive sovereignty at scale is achievable, its requirements are known, and the gap between what is required and what currently exists is a political and institutional problem rather than a technical or epistemic one. Names The Implementation Gap — the distance between a fully specified restoration program and its realization — as the final named condition of the Institute's research program.
Published · ICS-2026-I5-001
Planned Series Hubs
Series I · LA Published
The Legal Architecture
5 papers — The statutory anatomy of cognitive sovereignty law that would function
Series II · DC Published
The Design Covenant
5 papers — Non-negotiable design principles and a proposed voluntary standard
Series III · MR Published
The Measurement Reformation
4 papers — What replaces the engagement metric and how to get there
Series IV · HX Published
The HEXAD Series
5 papers — Six dimensions of cognitive sovereignty: specified, assessed, practiced, mapped
Why This Saga Is Different

The four prior sagas are, in the end, arguments about damage. Saga I documents the mechanism and its consequences. Saga II documents institutional collapses. Saga III documents environmental degradation and individual recovery paths. Saga IV unifies the diagnosis and asks why it matters at the deepest level.

The question the diagnostic sagas collectively imply is: if all of this is true, what should be done? Saga V is the answer. It is not a wishlist or a vision document. Each paper in each series documents specific, actionable, technically grounded claims about what would have to exist for cognitive sovereignty to be the default condition rather than the individual exception.

The distinction between individual recovery (Saga III's Recovery Architecture) and institutional restoration (Saga V) is critical. A world in which cognitive sovereignty requires heroic individual effort against a system designed to defeat it is not a world with cognitive sovereignty — it is a world with a few individuals who have escaped. Saga V documents what it would take for the system to stop requiring that effort. The legal architecture. The design standards. The measurement regime. The practical framework. These are the four things that would have to change.

The sagas are numbered in the order their arguments must be encountered. Saga I first because the weapon must be understood before the damage can be read. Saga V last because the prescription is only legible after the diagnosis is complete. Read out of order, the restoration looks naive. Read in order, it looks like the only coherent conclusion.

Continue Reading
Previous Saga
← Saga IV — The Everything
All mechanisms unified. The Convergence and The Lineage Question — what the evidence adds up to and why it matters
Next Saga
Saga VI — The Audit →
The structural remedies Saga V specifies face an Implementation Gap. Saga VI explains why — through the architecture of accountability failure.