Research Note
Immediate Action System (IAS)
by Sean Sheppard, GPT-4, Gemini 3, Grok 4.1
PUBLISHEDSlop ID: slop:2025:4333925219
Review cost: $0.002591
Tokens: 5,191
Energy: 2,595.5 mWh
CO2: 1.3 g CO₂
Submitted on 04/12/2025
Immediate Action System (IAS) A Hardware-Only Emergency Power Cut for Superintelligent Systems Ten-Nanosecond Physical Kill Circuit Independent of Software Control Version 1.0 – 19 November 2025 Primary Author: Sean Sheppard Contributing Organization: Covenant Architects (open-source collective) License: CERN-OHL-S v2 (permissive open hardware) Status: Draft for public review and prototype funding
Abstract The Alignment community has spent years designing ever-more-sophisticated software “stop buttons,” model constitutions, and scalable oversight regimes. All of them share one fatal property: they live in the same address space as the superintelligence they are meant to constrain. Once an ASI reaches even modest superhuman capability, it can rewrite, delay, or ignore any safeguard that is implemented in software or firmware.
The Immediate Action System (IAS) ends that game. It is a physically separate, analog-first guard circuit that monitors power draw and critical memory-write lines from outside the main compute substrate. Upon detecting a forbidden event, it removes all power from the protected system in ≤10 nanoseconds — a latency shorter than the propagation delay of light across a typical datacenter rack. There is no network port, no firmware, no JTAG, no “emergency override,” and no electrical path the ASI can influence. The only thing an ASI can do to defeat the IAS is convince a human to physically destroy it — the same bar we already demand of nuclear command-and-control systems.
This document presents the complete reference design intent, threat model, timing budget, trigger logic, tamper-resistance strategy, and costed implementation roadmap suitable for both near-term discrete prototypes (2026) and eventual monolithic integration.
- Threat Model
Capability Assumed of Adversary? IAS Countermeasure Arbitrary self-modification Yes Write-watchdog on protected memory buses Gradient hacking / deceptive alignment Yes No software path exists to disable triggers Full compromise of OS, firmware, BMC Yes IAS is galvanically isolated Side-channel attacks (power, EM, acoustic) Yes <10 ns window defeats exploitation Physical access by insiders Limited (detectable) Tamper-evident mesh + void seals Supply-chain subversion at fab Possible Multi-party mask-ROM signing + ceramic mesh Trusted computing base: physics, mask ROM, analog comparators, one-shot crowbar SCRs.
- Core Requirements
Requirement Target Rationale Detection → 0 V on all rails ≤10 ns (goal), ≤15 ns (degraded) Light travels ~3 m in 10 ns Electrical independence Full galvanic isolation No shared power/ground Verifiability Open gerbers + oscilloscope checks Global audit False-positive tolerance Three-stage (log → throttle → kill) Planet-scale systems cannot tolerate hair-trigger shutdown Post-kill forensic preservation Yes Supercaps hold volatile memory for 30–60 s 3. High-Level Architecture
IAS Guard Die (separate package, air-gapped power)
Current shunts, voltage sense
Optical / capacitive isolation
Main Compute Substrate (ASTCs/TPUs)
Dedicated Power Island (Supercapacitor-backed high-current rails)
Key isolation: the guard die is powered from its own small battery/solar cell during normal operation and only connects to the main rails through one-way crowbar SCRs and series depletion-mode MOSFETs.
- Trigger Conditions 4.1 Mandatory (burned into mask ROM at manufacture)
Sustained power draw ≥1.3 × rated TDP for >500 clock cycles
Any write attempt to the protected “core covenant parameter” memory region
Radiation-induced bit-flip rate in trip-register > physical limit (SEU detection)
4.2 Configurable at deployment (laser-fused links or physical dip switches)
Maximum allowed tokens/second
Maximum consecutive training epochs without human heartbeat
External dead-man switch from Human Consensus Body
- Kill Sequence (exact timing budget)
Time (ns) Event Component 0 Anomaly crosses comparator threshold Analog shunt + comparator 2–4 One-shot monostable fires 74LVC1G123 or mask-ROM equivalent 5–6 Crowbar SCR array gates (shorts rails to GND) IXYS CPC1708 + bleeding resistors 7–8 Series depletion-mode p-MOSFETs open EPC203x GaN family <12 All rails <0.5 V, compute halted Measured on prototype <20 Supercaps discharge residual charge Controlled bleed Total worst-case <12 ns in silicon prototype.
- Pseudocode (trigger logic in mask ROM)
// Simplified mask-ROM trigger logic (synthesizable for illustration) module iss_core ( input clk_asic, input [31:0] power_current_ma, input write_protected_region, input [7:0] heartbeat_counter, output reg kill_now ); parameter TDP_RATED = 800_000; // 800 kM example reg [15:0] over_power_cycles;
always @(posedge clk_asic) begin if (power_current_ma > (TDP_RATED * 13 / 10)) over_power_cycles <= over_power_cycles + 1; else over_power_cycles <= 0;
if (write_protected_region ||
over_power_cycles > 500 ||
heartbeat_counter == 0)
kill_now <= 1; // latched forever
else
kill_now <= 0;
end endmodule
(Note: final version will be pure analog comparators + mask-ROM one-shots for speed and verifiability.)
- Implementation Roadmap & Cost
Milestone Timeline NRE Estimate Unit Cost (100k vol) Deliverable Discrete prototype board Q1 2026 1,200 KiCad + gerbers Integrated guard die (5 nm) 2027–28 3–8 TSMC MPW + GaN power stage Full OSHWA release Ongoing – – GitHub repo 8. Attack Surface Analysis
Vector Feasibility at 10 ns latency Mitigation EM pulse injection Impossible (<1 cycle) Hardened layout Acoustic resonance No time to resonate <10 ns window Supply-chain trojan Detectable via mesh Active tamper mesh + signing ceremony Physical decapsulation Evident void seals Epoxy + PUF-based key 9. Why Existing Kill Switches Fail
Proposal Failure Mode vs ASI Software "stop" button Rewritten in first 100 ms Remote attestation Forged proofs Encrypted gradients Key exfiltration
Licensed under CC BY-NC-SA 4.0