260106 Chapter 2
Chapter 2 - Definitions and Glossary Framework Chapter 2 is the definitional backbone of this book. It gathers all recurring terms into one place, using a consistent two‑layer format so that readers can both cite a precise canonical definition and grasp the idea in plain language. The entries below are grouped by role: core motivational constructs, mathematical and measurement terms, thin normative concepts, institutional and legal architecture, societal dynamics, AI‑specific safety terms, and metatheoretical notions. Don’t worry if you don’t grasp the concepts on a straight read-through of the chapter. I have deliberately taken a contract drafting approach to writing this book, which is to define capitalised terms at the beginning of the document, and then use those terms consistently throughout the rest of the text. In this way you will be able to determine whether “Agent” with a capital “A” has a particular meaning in this book, or uncapitalised “agent” defaults to normal interpretational/vernacular rules. Chapter 2 is therefore intended to function both as a standalone glossary and as a contract-style reference section you can return to when later chapters invoke these capitalised terms.
2.0 How to Use This Chapter Reading Paths and Reference Use USER GUIDE: How to Use This Chapter
This section is a navigation guide, not definitional content. Skip to Section 2.1 if you prefer to begin with definitions directly. You may also wish to skip to chapter 3 if you want to get straight into the discussion of the theory.
This chapter is written so that you can use it in three ways: (a) as a straight-through read once, to familiarise yourself with the AIM vocabulary and how the three sources of motivation (A, I, M) hang together; (b) as a reference glossary during later chapters, when a capitalised term appears and you want to check its precise definition and explanation; and (c) as thematic clusters, by following cross-references between definitions that build on one another (for example, starting with the AIM Framework, then Appetites (A), Intrinsic Motivation (I), Mimetic Desire (M), and Decision Hub before moving to the thin normative core in Section 2.3). Each entry has two layers: a canonical definition (the part you can treat as the binding “term of art” for this book) and an Explanation that unpacks the idea in more ordinary language. Where the text includes brief epistemic status markers (for example, “(Established Neuroscience)” or “(Framework Specific Theorem)”) at the end of sentences or paragraphs, these are there to flag, without interrupting the prose, whether the claim is best read as (i) an established empirical or neuroscientific result, (ii) an empirically grounded but AIM specific theoretical construct, or (iii) a more speculative or normative move that later chapters will return to and test. You do not need to memorise this chapter. Instead, you can treat it the way lawyers and drafters treat a definitions section: later provisions assume these meanings, and you can always come back here to check them. The end of this chapter includes (i) an alphabetical index scaffold for key terms and (ii) Phase 4 forward-reference audit checklist and report template, so that you can systematically review whether the definitions you are relying on are actually used downstream in the book in the ways you expect. Common Confusions (Navigation Notes) Several concepts are easy to conflate on a first read: Mimesis vs Mimetic Desire (M): Mimesis is the preconscious transmission mechanism; Mimetic Desire (M) is the specific motivational source within the integrated A I M system. See the entries for “Mimesis”, “Mimetic Desire (M)”, and “Preconscious Transmission”. Source tagging vs Source Opacity: in Section 2.1, “Source tagging” (neural) names the decision system’s ideal, in principle capacity to distinguish A, I, and M at the point of awareness; “Source Opacity” names the frequent failure of this capacity in practice. Section 2.5 introduces “Source Tagging (Neural)”, which explains why the common currency architecture makes automatic source tracking fragile and why manual, concept enabled restoration (via I Override and the Two Question Diagnostic) is needed. notation: throughout Chapter 2, the mimetic premium is written as “mimetic premium” in prose and denoted by P_M when used as a parameter in mathematical or formal expressions. Both refer to the same quantity: the portion of a price or willingness to pay attributable purely to status signalling and social proof. See “Mimetic Premium (P_M)” in Section 2.2. Individual vs Proxy: in AIM, “Individual” is reserved for natural persons whose behaviour arises from an A I M architecture. “Proxy” is used for delegated or artificial actors (corporate officers, brokers, AI systems) that act for Individuals but are not themselves the direct source of the A, I, or M being examined. See “Individual” and “Proxy” in Section 2.1. structural theorems vs individual blame: results like the Unified Crisis Theorem, Stratification Inevitability Theorem, and Mimetic Bargain Theorem (each a Framework Specific Theorem) make structural claims about systems under high M conditions; they are not claims that particular Individuals are fated to act badly. Later chapters (on justice, markets, and AI safety) cross refer back here when using these theorems to design remedies rather than to assign blame. Habits as a fourth source: A common misunderstanding treats habits as a separate motivational category outside A, I, and M. Habits are not what motivates—they are cached AIM profiles, preprogrammed patterns that store previously computed motivational weightings and recall them when similar decision contexts arise. When you automatically reach for coffee in the morning, that habit represents a stored weighting pattern (likely A-dominant for caffeine/alertness, possibly I-tagged if you enjoy the ritual, possibly M-tagged if morning coffee carries social meaning in your environment). This aligns with dual-process models of cognition: System 1 (fast path) retrieves cached AIM profiles via striatal circuits, bypassing full recomputation; System 2 (slow path) computes weights in real time for novel or conflicted decisions. The habit is a stored answer to what has motivated similar choices before, not a separate motivational source. See "Habits as Cached AIM Profiles" in later definitional material for full treatment. Epistemic Status Guide (for Chapter 2) Where claims in Chapter 2 go beyond straightforward restatement of well established empirical findings, I sometimes include brief parenthetical tags (for example, “(Established Neuroscience)” or “(Framework Specific Theorem)”) at the end of sentences or paragraphs. These tags indicate how the claim should be read in epistemic terms, without interrupting the prose. (1) denotes claims that track robustly replicated findings about brain architecture or timing (for example, the temporal gap between Readiness Potential and conscious awareness of intention, the wanting–liking dissociation in incentive salience research, or the role of ventromedial prefrontal cortex and ventral striatum in common currency integration). (2) denotes claims grounded in robust behavioural or socio economic regularities (for example, the Easterlin Plateau and hedonic treadmill in life satisfaction data, or the shift toward post appetitive societies where marginal income mainly fuels status competition). (3) denotes claims where AIM organises and extends existing literatures into a specific architecture using unobserved but inferable variables (for example, the AIM Integration Equation, AIM Weights wA, wI, wM, and constructs like Source Opacity or the mimetic premium P_M that must be estimated rather than directly measured). You can safely use the canonical definitions in later argument and practice; where a definition leans on higher uncertainty theoretical, normative, or metatheoretical moves, the Explanation layer and these tags will explicitly say so, and later chapters will make cross references back to those points when the level and type of evidential support (Established Neuroscience in 2.6, Validated Empirical Pattern in 2.2, Theoretical Construct / Latent Variable in 2.2-2.3, Framework Specific Theorem in 2.7, Normative Principle in 2.3, or Proposed Intervention in 2.3-2.4) matter for policy or institutional design.
Regarding Mathematic Notation: P with subscript (e.g., P_M) denotes price. P with parentheses (e.g., P(H), P(H|E)) denotes probability/belief.
2.1 Core Motivational Constructs 2.1.1 Core Axioms of the AIM Framework
Before defining individual terms, this section establishes the foundational axioms, the irreducible premises, upon which the AIM Framework is built. These axioms are treated as nonnegotiable theoretical commitments that define the framework's structure and generate its predictions. Each axiom is stated in canonical form and then explained in plain language.
Given the breadth of academia that will be affected by the inevitable logical consequences of these Axioms' interaction, no more than 3 canonical sources will be cited for each Axiom. This is necessary because all deductions made throughout this book flow directly from these Axioms. Other empirical evidence may be cited to support how these Axioms play out – however, in each case the Axiom is what is relied on, not the illustrative example. Further empirical validation is explicitly outside the scope of this text.
The author invites peer review, falsification or refinement of the specific theories discussed in this book.
Axiom 1: Three-Source Taxonomy
Human motivation arises from exactly three neurologically distinct sources—Appetites (A), Intrinsic Motivation (I), and Mimetic Desire (M)—and no additional source is required for a parsimonious, falsifiable account of human motivation.
Explanation: Every action or choice draws on one or more of three distinct kinds of wanting: bodily needs and basic security (A), self-endorsed activities that remain rewarding even in private (I), and desires transmitted socially by observing what others want or value (M). The framework claims these three are sufficient, adding more categories would complicate the model without improving its explanatory power, while using fewer would blur together motivations that experiments and brain imaging clearly separate.
Canonical Citations: For A (Appetites): Cannon, W. B. (1932). The Wisdom of the Body. W. W. Norton & Co. (Establishes homeostasis as the driver of physiological drives). For I (Intrinsic): Deci, E. L., & Ryan, R. M. (1985). Intrinsic Motivation and Self-Determination in Human Behavior. Plenum. (Establishes non-homeostatic, autonomy-driven motivation). For M (Mimetic): Girard, R. (1961). Deceit, Desire, and the Novel: Self and Other in Literary Structure. Johns Hopkins University Press. (Establishes the triangular, socially transmitted nature of desire).
Axiom 2: Common-Currency Integration
The three motivational sources converge in a common-currency valuation system centred in the ventromedial prefrontal cortex and ventral striatum, which encodes a single scalar subjective-value signal for each option, enabling unified choice by converting unlike inputs into a comparable metric.
Explanation: Although A, I, and M are distinct systems, the brain must eventually produce a single "do this next" decision. The valuation hub integrates all three sources into one priority signal, like mixing three audio channels into a single speaker output. This integration can often be approximated as a weighted sum: the total value of an option equals its A-value times an A-weight, plus its I-value times an I-weight, plus its M-value times an M-weight.
Canonical Citations: Levy, D. J., & Glimcher, P. W. (2012). "The root of all value: a neural common currency for choice." Current Opinion in Neurobiology, 22(6), 1027-1038. (The definitive meta-analysis confirming vmPFC/VS integration of unlike rewards). Chib, V. S., Rangel, A., Shimojo, S., & O'Doherty, J. P. (2009). "Evidence for a common representation of decision values for dissimilar goods in human ventromedial prefrontal cortex." Journal of Neuroscience, 29(39), 12315-12320. Bartra, O., McGuire, J. T., & Kable, J. W. (2013). "The valuation system: A coordinate-based meta-analysis of BOLD fMRI experiments examining neural correlates of subjective value." NeuroImage, 76, 412-427.
Axiom 3: Source Opacity
After common-currency integration, source-specific information is not preserved in the output signal. Downstream circuits, including those supporting conscious introspection, cannot reliably identify which source generated a given motivational input from the integrated signal alone.
Explanation: Once the brain has collapsed A, I, and M into a single "I want this" feeling, it has lost the tag indicating which channel contributed what. This is not a failure of self-awareness but an architectural fact: three-dimensional input (A, I, M) has been compressed into a one-dimensional output (scalar value), necessarily discarding source information. As a result, people often cannot accurately report why they chose something, the information simply isn't available to conscious reflection.
Canonical Citations: Nisbett, R. E., & Wilson, T. D. (1977). "Telling more than we know: Verbal reports on mental processes." Psychological Review, 84(3), 231–259. (Establishes that humans lack introspective access to the cognitive processes driving choice). Johansson, P., Hall, L., Sikström, S., & Olsson, A. (2005). "Failure to detect mismatches between intention and outcome in a simple decision task." Science, 310(5745), 116-119. (Demonstrates "Choice Blindness"—the inability to detect when outcomes are swapped).
Axiom 4: Confabulation
The brain routinely generates sincere but inaccurate narratives about the causes of choice, filling gaps in introspection with plausible reasons that do not match the actual motivational sources. Mimetic Desire is especially vulnerable to misattribution because its signals arrive preconsciously and are integrated before conscious awareness.
Explanation: When asked to explain their choices, people construct stories that sound reasonable but are often wrong. These are not lies, the person genuinely believes their explanation, but they are post-hoc rationalisations created after the decision has already been made. Because mimetic signals operate below the threshold of awareness and are integrated before conscious thought kicks in, M-driven choices are especially likely to be misattributed to intrinsic interest or rational calculation.
Canonical Citations: Gazzaniga, M. S. (2000). "Cerebral specialization and interhemispheric communication: Does the corpus callosum enable the human condition?" Brain, 123(7), 1293-1326. (Establishes the "Interpreter" module that generates post-hoc explanations for behaviour). Haidt, J. (2001). "The emotional dog and its rational tail: A social intuitionist approach to moral judgment." Psychological Review, 108(4), 814–844. (Establishes that reasoning is often a post-hoc justification for intuitive/automatic impulses). Wegner, D. M. (2002). The Illusion of Conscious Will. MIT Press. (Argues that the feeling of conscious authorship is an inference, not a direct perception of causation).
Axiom 5: M as Amplifier (The Mimetic Premium)
Mimetic Desire does not generate independent objects of desire. All objects are fundamentally A-objects (satisfying physiological deficits) or I-objects (enabling intrinsic processes). M operates as an amplifying force that inflates the perceived value of these objects by attaching a Mimetic Premium P_Mto them.
Explanation: Mimetic desire doesn't create new things to want, it makes existing things seem more valuable because other people want them. The Mimetic Premium is the extra value someone assigns to an object purely because of its social meaning, visibility, or status. Critically, this premium can operate even when the individual experiences no direct status-pleasure, they may simply perceive a network consensus that "this is the value," even if that consensus is itself a cascade of copied valuations, which may themselves be derived from confabulation.
Canonical Citations: Lebreton, M., Kawa, S., Forgeot d'Arc, B., Daunizeau, J., & Pessiglione, M. (2012). "Your Goal Is Mine: Unraveling Mimetic Desires in the Human Brain." Journal of Neuroscience, 32(21), 7146-7157. (The "smoking gun" paper showing how social observation modulates vmPFC/VS valuation of objects). Zink, C. F., Tong, Y., Chen, Q., Bassett, D. S., Stein, J. L., & Meyer-Lindenberg, A. (2008). "Know your place: neural processing of social hierarchy in humans." Neuron, 58(2), 273-283. (Shows neural sensitivity to relative status independent of absolute reward). Campbell-Meiklejohn, D. K., Bach, D. R., Roepstorff, A., Dolan, R. J., & Frith, C. D. (2010). "How the opinion of others affects our valuation of objects." Current Biology, 20(13), 1165-1170.
Axiom 6: Differential Satiation Dynamics
The three sources exhibit structurally different satiation properties. A satiates episodically and cyclically (hunger ends with eating, returns with deficit). I deepens rather than terminates (competence generates new frontiers; only specific tools/means satiate). M has no natural satiation signal, status is comparative, and reference points shift continuously as models change and rivals advance.
Explanation: Appetites have a natural stopping point, once you've eaten enough or slept enough, the urge fades until the need returns. Intrinsic projects don't stop, but they evolve, as you get better at music or carpentry, new challenges and possibilities open up, though you may finish with a particular tool or piece. Mimetic desire, by contrast, has no endpoint, achieving a status goal simply resets the comparison to the next rung, because what matters is relative rank, not absolute achievement.
Canonical Citations: For A (Cyclic): Berridge, K. C. (2004). "Motivation concepts in behavioral neuroscience." Physiology & Behavior, 81(2), 179-209. (Distinguishes homeostatic drives from incentive salience). For I (Deepening): Csikszentmihalyi, M. (1990). Flow: The Psychology of Optimal Experience. Harper & Row. (Establishes that optimal experience feeds back into higher complexity and skill, preventing simple satiation). For M (Non-satiating): Veblen, T. (1899). The Theory of the Leisure Class. Macmillan. (Foundational analysis of pecuniary emulation and the impossibility of satisfying comparative status needs).
Axiom 7: Preconscious Transmission
Mimetic desire is transmitted through mirror-neuron systems and social-reward circuits at latencies of 60–340 milliseconds—prior to conscious awareness, attentional gating, or deliberate reasoning. M-signals are therefore integrated into the common-currency system before the Individual can consciously scrutinise their source.
Explanation: By the time you become consciously aware of wanting something in a social context, the mimetic signal has already been processed and fed into your decision system. Mirror neurons and social-reward circuits operate faster than conscious thought, automatically copying the goals and preferences you observe in others. This means mimetic influence is experienced as a fait accompli of desire, it feels like your own authentic wanting, not like something borrowed from someone else.
Canonical Citations: Libet, B., Gleason, C. A., Wright, E. W., & Pearl, D. K. (1983). "Time of conscious intention to act in relation to onset of cerebral activity (readiness-potential)." Brain, 106(3), 623-642. (Establishes the temporal gap between neural preparation and conscious awareness). Rizzolatti, G., & Craighero, L. (2004). "The mirror-neuron system." Annual Review of Neuroscience, 27, 169-192. (Establishes the mechanism for direct, pre-reflective mapping of observed actions). Chartrand, T. L., & Bargh, J. A. (1999). "The chameleon effect: The perception-behavior link and social interaction." Journal of Personality and Social Psychology, 76(6), 893–910. (Demonstrates automatic, non-conscious mimicry of social partners).
Axiom 8 Bayesian Belief Dynamics
Human belief revision follows Bayesian updating, where posteriors are computed from priors and evidence, posteriors become priors for subsequent updating cycles, and the updating process is content-agnostic—it operates identically regardless of the accuracy, quality, or crisis-potential of the beliefs being processed.
Explanation: The brain updates what it believes by combining what it already believes (priors) with new information (evidence) to produce revised beliefs (posteriors), and then treats those posteriors as the starting point for the next round of updates. This machinery tracks the form of belief change—how strongly a proposition is held, how new information shifts that strength—without directly evaluating whether the proposition is true, beneficial, or catastrophic. The same updating logic applies whether the belief concerns predators, personal identity, economic models, or scapegoat narratives. Because the updating mechanism is content-agnostic, any pattern in the inputs—such as systematic Confabulation operating on Source-opaque signals—will be compounded over time into stable belief structures, producing what AIM calls Bayesian Lock-In and enabling population-wide convergence on shared but inaccurate Source Beliefs.
Canonical Citations Helmholtz, H. von (1867). Handbuch der physiologischen Optik. Leopold Voss. Establishes that perception involves "unconscious inference"—the brain combines prior knowledge with sensory evidence automatically and without conscious access to the inferential process, founding the treatment of the brain as an inference engine. Tenenbaum, J. B., Kemp, C., Griffiths, T. L., & Goodman, N. D. (2011). How to grow a mind: Statistics, structure, and abstraction. Science, 331(6022), 1279–1285. Demonstrates that human cognition approximates Bayesian inference across domains—perception, language, causal reasoning—with the same updating mechanism operating regardless of content. Friston, K. (2010). The free-energy principle: A unified brain theory? Nature Reviews Neuroscience, 11(2), 127–138. Provides neurobiological grounding showing how the brain minimises prediction error through continuous Bayesian updating of internal models at multiple hierarchical levels.
Summary Note on Axioms These seven axioms form the non-negotiable core of the AIM Framework. They are treated as foundational premises that define the theory's structure, generate its predictions, and establish its falsification criteria. Any claim, application, or extension within AIM must be consistent with these axioms, and any empirical finding that definitively contradicts one or more of these axioms would constitute serious evidence for revising or rejecting the framework.
The remainder of this chapter (§2.1.2 and following) will define the specific constructs—Appetites, Intrinsic Motivation, Mimetic Desire, AIM weights, action episodes etc, that instantiate these axioms in concrete, measurable terms.
AIM Framework
Visual showing: Appetites (A), Intrinsic Motivation (I), and Mimetic Desire (M) as three input streams → converging at Decision Hub (vmPFC/VS) → producing unified scalar choice signal. Include notation: Source-tagging lost during integration.
The AIM Framework (or the AIM Motivation Framework) is a taxonomy of motivation that distinguishes three neurally grounded sources—Appetites (A), Intrinsic Motivation (I), and Mimetic Desire (M)—that integrate in the Decision Hub to generate a single choice signal (i.e. a decision to act). [Axiom 1: Three-Source Taxonomy]
Explanation: The AIM Framework posits that every choice is driven by some mix of bodily needs, enjoyment of the activity itself, and socially copied wanting, which are always combined into one scalar “this is what I will do next” impulse. AIM does not suggest new neurological phenomena; it reorganises existing evidence into a source‑based map that can plug into human behavioural sciences (e.g. economics, psychology, law, and politics) wherever those fields currently talk about undifferentiated “preferences” or “utility.”
Appetites (A) Appetites are homeostatic, bodily and safety‑related drives—such as hunger, thirst, sleep, pain avoidance, thermoregulation, sexual drive, and basic material security—that push behaviour toward restoring physiological and socioeconomic sufficiency and rapidly subside once sufficiency is reached. [Axiom 1: Three-Source Taxonomy]
Explanation: These are the motivations that come from the body being out of balance: needing food, rest, warmth, safety, or basic income and shelter. They feel urgent while active, tightly drive behaviour toward relief, and fall away quickly once the need is properly met, which is why securing A is a precondition for other motives to show up reliably.
Intrinsic Motivation (I) Intrinsic Motivation is self-endorsed engagement in activities that are rewarding in the doing—curiosity, mastery, play, exploration, care, aesthetic and creative work—that people continue in private without audience or external reward, typically strengthening as competence and meaning deepen. The I-process itself (mastery, curiosity, flow) is non-satiating and deepens relative to the same mode, instrument, or tool; desire for I-enabling objects (tools, instruments, access) terminates once the object is functionally adequate for the pursuit. [Axiom 1: Three-Source Taxonomy]
Explanation: These are the things a person still wants to do when nobody is watching and no one is paying: reading out of curiosity, practising music, solving problems, caring for others, or making art for its own sake. Intrinsic Motivation motivates Individuals to acquire instruments, equipment, tools, or resources as means to continue doing the valued process—these purchases are not primarily status trophies. Intrinsic Motivation is the main engine of learning, creativity, and durable wellbeing. Importantly, the desire to be with other people is an Intrinsic Motivation (e.g. loneliness, the desire to perform to an audience etc.), as these desires persist in private and drive the Individual to find ways to connect with others. A critical distinction governs I-satiation dynamics: The I-process itself does not satiate. A guitarist pursuing mastery does not reach a point where mastery is "full" and further engagement becomes unwanted. Competence generates new frontiers; curiosity answered generates new questions; flow deepens as challenges increase. The process rewards continued engagement indefinitely. I-enabling objects do satiate. The guitarist wants a guitar. Once she possesses a guitar adequate for her current level and anticipated development, the object-desire terminates. She does not want additional guitars beyond functional adequacy. Further object-acquisition beyond what the process requires signals likely M-contamination rather than genuine I-need. Diagnostic: Apply the audience-removal test to object-upgrade desires. If upgrade-desire persists when no one would ever see the new object, it may reflect genuine I-functional need (the current tool genuinely limits the process). If upgrade-desire evaporates without audience, it was M-driven. This distinction matters because I-process non-satiation and I-object satiation produce different behavioural signatures. Confusing them leads to misclassifying M-contaminated object-acquisition (endless gear accumulation, credential collection, tool fetishism) as I-driven when the underlying process engagement has stalled or was never the primary motivation. Epistemic Status: Framework-Specific Construct, extending Self-Determination Theory with AIM-specific satiation analysis.
Individual
An Individual is a natural person (human being) whose behaviour is generated by an integrated motivational architecture in which Appetites (A), Intrinsic Motivation (I), and Mimetic Desire (M) are weighted and combined through the Decision Hub to produce choice.
Explanation: In AIM, "Individual" is the unit at which motivational architecture is defined—a person with a body that experiences appetitive needs, a capacity for self-endorsed projects, and exposure to social models. All phenomenology—confabulation, Source Opacity, vulnerability to mimetic attraction—operates at the level of Individuals. When AIM talks about "what drives choice" or "how motivation works," it always means the integrated A-I-M system inside a natural person, not corporate entities, algorithms, or other actors that may represent or act for people but do not themselves experience hunger, curiosity, or status anxiety.
Terminology note: AIM reserves the term "agent" exclusively for contexts in evolutionary psychology and causal cognition research (e.g., agent-based causal attribution, Hyperactive Agency Detection Device or HADD), never for natural persons. This prevents confusion between "Individual" (the unit with A-I-M architecture) and "agent" (the folk-psychological category of intentional causation that humans over-apply due to cognitive architecture). When the text refers to delegated or artificial actors—corporate officers, brokers, AI systems—the term is "Proxy," not "agent".
I-Override Capacity I-Override Capacity is the Individual’s context-dependent ability to successfully execute I-Override—to pause automatic Decision Hub processing of Mimetic signals, bring them under Intrinsic Motivational scrutiny, and restore manual Source-tagging before acting—which varies with A-security, stress, cognitive load, training, conceptual vocabulary, and social support, and is therefore a proper target of institutional design and personal practice rather than a fixed trait.
Explanation: I-Override is a specific cognitive operation; I-Override Capacity is how often and how well a given person can actually perform it in the wild. Even highly reflective people lose this capacity under sleep deprivation, pain, fear, or when A-floors are threatened. Chronic stress, surveillance, and High-Theatre environments all push capacity down, because the Decision Hub is flooded with urgent signals and there is little slack for slow scrutiny. By contrast, secure A-floors, protected I-domains, and explicit AIM vocabulary push capacity up: people have time, safety, and concepts with which to question their own urgency. Training also matters: like any skill, I-Override becomes easier and more automatic with practice. AIM treats I-Override Capacity as a design target: justice, education, and workplace systems can be evaluated partly by whether they expand or erode typical capacity in their populations.
I-Override Information Architecture I-Override Information Architecture → See Section 2.8 for detailed treatment of informational constraints under which I-Override operates.
Explanation: Source Opacity is often misunderstood as total information loss. It is not. What is lost is specifically the tag indicating which system generated the motivational signal—not the signal's content, intensity, or surrounding context. An Individual experiencing intense desire for a house retains access to: the house's features (content), how urgently they want it (intensity), when the desire arose (temporal), whether they are hungry or tired (bodily state), who else has expressed interest (social context), and their own history of housing preferences (behavioural history). What they cannot access is whether this desire originated from genuine shelter need (A), from the house enabling valued activities (I), or from observing others pursue similar houses (M). The asymmetry between A/I and M detection reflects timing differences in the neural architecture: A-signals arise from bodily states that are partly accessible to awareness (hunger pangs, fatigue, pain). The Individual cannot see the source-tag, but can observe correlated bodily phenomenology. I-signals arise from engagement with activities. The Individual cannot see the source-tag, but can observe whether the activity remains rewarding when audience and external stakes are removed. M-signals arrive preconsciously via mirror-neuron systems (100–300ms) and are integrated before the approximately 300–500ms threshold at which conscious awareness becomes possible. The Individual cannot see the source-tag and has no correlated phenomenology to observe—the mimetic acquisition event itself was never consciously registered. I-Override therefore operates through inference from available information rather than recovery of source-tags. The Two-Question Diagnostic works by elimination: the Individual uses accessible information (bodily states for Question 1; private persistence for Question 2) to rule out A and I, leaving M as the residual category. This eliminative structure is not a workaround but a design requirement—direct M-detection is architecturally impossible given preconscious transmission timing. The practical implication is that I-Override effectiveness depends on: Information availability—stress, cognitive load, and A-deficit degrade access to contextual information Diagnostic tools—the Two-Question Diagnostic provides a structured method for using available information Conceptual vocabulary—without the concept of M, successful elimination (not-A, not-I) cannot be attributed to any category, and confabulation fills the gap with A or I narratives Epistemic Status: Framework-Specific Theoretical Construct, integrating established neuroscience on preconscious timing with AIM-specific mechanisms.
Mimesis
Mimesis is the neurologically grounded process of social transmission by which humans preconsciously adopt, mirror, and propagate the desires, valuations, avoidances, and behaviours of observed models, mediated primarily through mirror neuron systems and social reward circuits, operating largely below the threshold of conscious awareness and prior to deliberate reasoning.
Explanation: Mimesis is the basic copying mechanism that makes Individuals social learners: we absorb what others want, avoid what they avoid, and do what they do, often before we can articulate why. This happens automatically through specialized brain circuits that fire both when we act and when we watch others act, allowing desires and behaviours to spread person-to-person like a contagion. Mimesis operates at remarkable speed—100–300 milliseconds from stimulus onset—placing it firmly within the preconscious processing window before attentional gating and conscious awareness can intervene. Mimesis itself is neither good nor bad-it is how children learn language, how cultures transmit skills, and how communities coordinate-but it becomes the engine of Mimetic Desire when it operates on objects, roles, or status positions in ways that generate rivalry and escalation. The AIM Framework distinguishes Mimesis as a transmission mechanism from Mimetic Desire (M) as a specific motivational source within the integrated A-I-M architecture.
Entanglement Entanglement is the reciprocal co-determination of valuations between Individuals where $w_M$ is non-zero, making desires fundamentally relational rather than independent, with each Individual functioning as both model and imitator in ongoing cycles that render the partition between "autonomous preference" and "socially transmitted value" empirically intractable and situation-dependent.
Explanation: Entanglement describes what happens when mimetic influence becomes a permanent background condition rather than a one-time copying event. Unlike simple contagion (where one person copies another) or virality (where a trend spreads across a network and then fades), entanglement means everyone's desires are constantly shaping and being shaped by everyone else's in real time, with no clear starting point or direction. Traditional social science treats the inability to separate "do similar people become friends?" from "do friends become similar?" as a measurement problem to be solved. AIM says this confusion is the correct observation: when $w_M$ is high, desires really are co-created through continuous reciprocal influence, not independently formed and then occasionally transmitted. This is why mimetic rivalry escalates-when two people want the same thing because each sees the other wanting it, their competing desires amplify each other in feedback loops that have no natural stopping point. The phenomenon is structural, not accidental: once A, I, and M inputs integrate into a single value signal in the Decision Hub, the system loses track of which source drove the choice, making it impossible for Individuals to cleanly separate their "own" valuations from socially derived ones. Entanglement persists as long as people remain in mimetic relationship (meaning Individuals observe other Individuals); it is a system-level condition, not a temporary event.
Entanglement is not biological determinism. AIM weights ($w_A$, $w_I$, $w_M$) vary by context, cognitive state, and social environment rather than representing fixed personality traits, such that the degree of Entanglement is itself situation-dependent and modifiable through institutional design. An Individual's $w_M$ in a high-pressure sales environment differs from their $w_M$ while gardening alone. The same person exhibits different AIM profiles across contexts, which is precisely why institutional design matters: environments can be structured to reduce $w_M$ salience (Low-Theatre, protected I-domains) or amplify it (High-Observability, continuous ranking). Entanglement describes a system-level condition that varies with architecture, not a fixed property of individuals.
Mimetic Desire (M) Mimetic Desire is socially transmitted wanting that arises because others want, pursue, or signal value for Objects. It is strongly shaped by observability, prestige cues, and scarcity, and prone to rivalry when it converges on High-Observability Goods or scarce targets. [Axiom 1: Three-Source Taxonomy]
Explanation Mimetic desires are adopted preconsciously from other people via the mirror neuron system in the brain: the brain starts valuing what salient models seem to pursue before the Individual can become aware of it, or articulate any independent reason. Because this transmission is largely automatic, people usually confabulate after the fact, telling themselves intrinsic or practical stories about choices that were in fact driven mainly by visibility, prestige, and comparison, which is why mimetic motives feel self chosen even as they pull many agents toward the same scarce Objects and into status competition.
Positive Mimesis Positive Mimesis is mimetic transmission that propagates beneficial behaviours, values, or desires which expand I-capacity, secure A-floors, or maintain M at sustainable levels—demonstrating that mimetic dynamics are not inherently destructive but can be channelled toward flourishing when the transmitted content supports rather than undermines the conditions for well-being.
Explanation: Positive Mimesis is essential to the non-utopian framing of AIM. The goal is not to eliminate Mimetic Desire—this is neurologically impossible and would require destruction of human cultural capacity. The goal is to redirect mimetic transmission toward content that supports rather than undermines flourishing. The Dissemination Precedence Theorem itself relies on Positive Mimesis: the AIM conceptual vocabulary must spread through mimetic channels (prestige-biased learning, social proof, visibility dynamics) to reach the population-level threshold where reform becomes articulable. Using M-transmission to spread I-enabling content is strategically necessary rather than paradoxical. Examples of Positive Mimesis include: scientists emulating successful researchers (copying methods that produce genuine discovery); communities mimetically adopting practices that strengthen A-floors (mutual aid networks, cooperative housing); artists mimicking techniques that expand expressive capacity (craft traditions that accumulate across generations); and citizens mimetically acquiring diagnostic vocabulary that enables M-management (spreading the Two-Question Diagnostic). The distinction between Positive and Negative Mimesis is not in the mechanism (both operate through preconscious transmission) but in the social outcome: Positive Mimesis produces net coordination, skill acquisition, or I-enabling capacity without rivalry escalation; Negative Mimesis produces rivalry, scapegoating, or crisis dynamics through M-amplification. The same mechanism can produce either outcome depending on whether the transmitted content and structural context generate cooperation or competition. (Theoretical Integration).
Negative Mimesis
Negative Mimesis is mimetic transmission that produces net social harm through rivalry escalation, inflation, scapegoating, or crisis dynamics—occurring when mimetic copying operates in contexts of scarcity, zero-sum competition, or structural conditions that convert coordination mechanisms into conflict amplification. Paradigmatic cases include positional competition (where one person's gain requires another's loss), confabulation cascades (where transmitted narratives compound toward collective delusion), and scapegoat contagion (where agent-based blame spreads mimetically to produce coordinated targeting).
Explanation: Negative Mimesis is not a different mechanism from Positive Mimesis—both operate through the same preconscious transmission systems (mirror neurons, prestige-biased learning, social proof). The distinction lies in structural context and outcome. When mimetic transmission occurs in zero-sum environments, competitions with scarce positional goods, tournaments with single winners, or crisis conditions where groups seek scapegoats—the same copying mechanism that enables cultural learning instead produces rivalry escalation and collective harm. The canonical examples include: (1) Positional Arms Races—mimetic copying of status displays (high status and visibility investments, luxury goods, credentials etc.) that escalate without improving absolute welfare; (2) Confabulation Cascades—where Person A's confabulated narrative ("I'm buying this car for prudent reasons") becomes evidence that Person B mimetically copies, locking both into false beliefs; and (3) Scapegoat Contagion—where agent-based blame spreads through prestige-biased transmission, producing coordinated violence against targets selected through prey-detection rather than genuine threat assessment. Importantly, the same content can be Positive or Negative depending on context: copying "wanting to excel" in a cooperative learning environment (abundant resources, non-rivalrous) is Positive Mimesis; copying "wanting to excel" in a winner-take-all status tournament is Negative Mimesis. The framework predicts that unmanaged M-environments—high visibility, positional scarcity, weak I-infrastructure—will systematically convert Positive into Negative Mimesis as coordination mechanisms become rivalry amplifiers. (Framework-Specific Construct)
Mimetic Attraction Mimetic attraction is the form of mimetic transmission in which an Individual comes to desire an Object because models pursue, display, or endorse it, with the acquired valuation integrated into the common-currency system and typically confabulated as self-originating; critically, attraction targets comparative position (status) rather than bounded physiological deficit, lacks a natural satiation signal because reference points shift continuously as models change and rivals advance, and therefore drives open-ended escalation.
Explanation: Unlike appetitive drives that have built-in satiation signals—hunger ends with eating—mimetic attraction targets comparative standing, which means it has no absolute "full" signal. Each time someone else gains a desired Object or rises in perceived social standing, the reference set shifts and is experienced as a felt deficit in the Individual. Because the common-currency system does not tag sources, these socially imported desires feel as urgent as bodily needs, yet they are chasing a moving relational target rather than a finite physical demand. This asymmetry distinguishes mimetic attraction from mimetic repulsion: repulsion behaves like appetitive avoidance—once a trusted model's avoidance is registered, the Individual aligns by not approaching the Object, and there is no competitive pressure to display "more" avoidance, so repulsion self-terminates. Attraction, by contrast, hijacks A-logic (the Decision Hub's survival-urgency system) without A's closure mechanism, producing runaway dynamics. This is why mimetic attraction—not mimesis in general—is the driver of Stratification Inevitability, Zero-Sum Status Competition, and the Mimetic Crisis Trajectory. (Established Neuroscience + Framework-Specific Integration)
Mimetic Repulsion Mimetic Repulsion is the form of mimetic transmission in which an Individual comes to avoid an Object because a model shuns, criticises, or refuses it—functioning as a protective filter on the option set that converges on stable disengagement once avoidance is in place, and which self-terminates because there is no positional contest in how much repulsion one displays.
Explanation. Mimetic Repulsion operates symmetrically with Mimetic Attraction in transmission mechanism but asymmetrically in downstream dynamics. Both are acquired preconsciously via mirror-neuron systems (100–300ms), both arrive at the Decision Hub with source-tags discarded, and both are subsequently confabulated. The critical difference lies in what the control system is asked to do after acquisition. The cracked-lens luxury watch: Consider a luxury watch from a prestigious brand—the kind that signals taste, success, and discernment when observed on a model's wrist. This particular watch has a cracked lens but remains fully functional for telling time. The crack does not impair A-function: the mechanism works perfectly, the hands move accurately, the watch fulfils its instrumental purpose. What the crack destroys is M-function. A trusted model notices the crack and visibly declines the watch, perhaps with a subtle expression of distaste. Through preconscious mimetic transmission (100–300ms), this avoidance is acquired by observers. They now feel reluctance toward the watch—experienced as this is somehow not right or I don't want that one—without recognising that the avoidance was socially acquired rather than independently generated. The reluctance is real and functionally consequential: observers will pass over the cracked-lens watch even though it tells time perfectly well. Why the crack matters: Displaying a cracked-lens luxury watch does not merely fail to confer status—it signals inability to maintain status symbols, which is worse than displaying nothing at all. The crack converts what would be an object of competitive pursuit into an object of convergent avoidance. The same watch, same prestigious brand, same functional mechanism, without the crack would trigger Mimetic Attraction: observers would come to want it because high-status models pursue, wear, and display it. The crack changes everything. Why repulsion self-terminates: Once avoidance is achieved—the Individual is not purchasing the cracked-lens watch, not wearing it, not displaying it—the control system has nothing further to do: There is no further degree of not-purchasing that could generate competitive pressure Others observing this avoidance will align their behaviour (also not purchasing), producing convergent disengagement across the reference group There is no status hierarchy of who avoids most impressively—no one gains relative standing by avoiding the watch more thoroughly than someone else The mimetic process therefore converges on stable exclusion from the option set rather than escalating pursuit Contrast with the same watch without the crack: The asymmetry in downstream dynamics becomes clear when comparing the two conditions:
Condition Mimetic Form Downstream Dynamic Termination Without crack Attraction Each acquisition by a rival resets felt deficit; reference points shift continuously; no satiation signal None—pursuit escalates without bound With crack Repulsion Once avoidance achieved, control system complete; no positional contest in rejection Self-terminating—stable disengagement
The crack therefore reveals the structural difference between the two forms of mimesis: Attraction hijacks A-urgency without A's satiation mechanism; Repulsion inherits A-avoidance with A's natural termination condition. Mimetic Repulsion feels like A-avoidance of something harmful (rancid food, a dangerous situation) because the common-currency system encodes M-transmitted avoidance using the same neural substrate that encodes A-threat signals. And A-avoidance has a natural termination: once the threat is avoided, the avoidance behaviour is complete. Functional role: Mimetic Repulsion serves as the protective filter through which societies transmit stable taboos, shared boundaries, and collective discrimination of damaged, contaminated, or socially devalued objects. Unlike Attraction, it does not generate the runaway dynamics that produce Zero-Sum Status Competition, Mimetic Crisis Trajectories, or Stratification Inevitability. It is therefore not the driver of AIM's crisis predictions—that role belongs exclusively to Mimetic Attraction operating under conditions of high observability and positional scarcity. Diagnostic implication: If an aversion escalates—if Individuals compete to demonstrate more rejection than others, if avoidance displays become status-conferring performances—then what appears to be repulsion has converted into attraction toward the act of rejection as a positional good. The repulsion has become the Object of competitive pursuit, and Mimetic Attraction dynamics now govern the behaviour. Genuine Mimetic Repulsion self-terminates; escalating rejection-display is Attraction in disguise. Epistemic Status: Framework-Specific Construct, extending the Mimetic Desire taxonomy with explicit asymmetry analysis.
Decision Hub The Decision Hub is the common‑currency valuation system centred in ventromedial prefrontal cortex (vmPFC) and ventral striatum (VS) that encodes a single scalar subjective value signal for options, regardless of whether value arises from appetitive relief, intrinsic engagement, or social approval. [Axiom 2: Common-Currency Integration]
Explanation This is the part of the brain that turns very different motives (Appetites, Intrinsic Motivation and Mimetic Desire) into a single combined “how much is this worth right now?” signal. Even though A, I, and M arrive through different pathways, they are merged and evaluated here so the person can choose one thing to do next instead of responding separately to each system. This integration occurs before conscious awareness-and critically, the system loses track of which source (A, I, or M) contributed what once the signals are merged, a phenomenon called Source Opacity (defined below in 2.1). This is why desires feel unified and self-evident, even when they arise from very different causes.
I-Override I-Override is the cognitive operation by which an Individual redirects a Mimetic signal from automatic Decision Hub processing to deliberative Intrinsic Motivation scrutiny, thereby manually restoring Source-tagging and transforming felt necessity into an analysable sensation with identifiable (Mimetic) origins that can be evaluated rather than merely acted upon.
Explanation The I-Override is the escape hatch from Mimetic hijack. Normally, Mimetic signals are processed automatically by the Decision Hub at 100-300 milliseconds—far below conscious awareness—and integrated into a unified valuation that feels like survival-level urgency (Source Opacity). The I-Override occurs when the Individual activates their Intrinsic Motivation system (the slower, deliberative, analytical capacity corresponding to "System 2" in cognitive science) to examine the urgency rather than act on it. Before I-Override, the phenomenology is "I need this or I die"—an integrated signal experienced as fact. During I-Override, the phenomenology shifts to "I feel a sensation of need-or-die; let me examine it"—the signal becomes an object of investigation rather than a command to obey. This examination enables manual Source-tagging: the Individual can ask "Is this urgency Appetitive (do I actually need this for survival)? Intrinsic (does this enable something I value in the doing)? Or Mimetic (do I want this because others want it)?" The I-Override does not eliminate the Mimetic signal—the Decision Hub continues generating M-weighted valuations—but it provides a competing input from the I-system that can inform choice. The I-Override is effortful (requiring cognitive resources), degraded by stress (when survival feels threatened, the Decision Hub dominates), and socially costly (scrutinising what everyone else accepts as obvious marks one as deviant). It is enabled by conceptual vocabulary (AIM provides the target for scrutiny), external prompting (intervention direct attention), training (practice strengthens I-capacity), and Appetitive security (when survival is not at stake, scrutiny is easier). The I-Override is the mechanism through which AIM-enabled intervention operates: without it, Individuals cannot distinguish Mimetic Desire from Appetites; with it, the distinction becomes achievable though not automatic.
The skill development characteristic of I-Override parallels neuroplastic consolidation of compensatory circuits. With repeated application: (1) the Two-Question Diagnostic becomes more automatic and rapid; (2) pattern recognition for M-signatures (audience-dependence, reference-point reset, model-tracking) develops into something approaching intuitive detection; (3) the alternative causal model (structural rather than agent-based) becomes more cognitively available, competing earlier with confabulated narratives. This procedural automaticity does not restore native source-tagging-it establishes a parallel pathway that achieves functionally equivalent discrimination through different neural substrates.
Source-tagging Source-tagging → See Section 2.5 for consolidated definition.
Explanation: Within the first ~0–300 milliseconds after a stimulus, source-specific circuits are active: hunger and safety pathways generate A-signals, intrinsic reward systems generate I-signals, and mirror-neuron and social-comparison circuits generate M-signals, all before these inputs are fed into the common-currency integration system. Conscious awareness of “I want X” typically comes online only later, around ~300–500 milliseconds, after this integration has already occurred. In principle, the brain could keep track of where a motivational signal came from: hunger circuits would generate A-desires for food and safety, intrinsic reward systems would generate I-desires for learning or creative work, and social comparison circuits would generate M-desires for status or copied goals. Source-tagging (Section 2.5) describes this idealized encoding of origin information before integration. However, the common-currency integration that occurs in ventromedial prefrontal cortex and ventral striatum collapses three unlike inputs into a single scalar value signal, and this dimensionality reduction discards native source-labels. By the time the desire is phenomenologically felt as “I want X,” consciousness has direct access only to the integrated strength of wanting, not to its decomposition into A, I, and M. In practice, therefore, effective source-tagging at the level of lived decision-making is usually a reconstructive, post-integration process: the Individual uses conceptual tools (such as the Two-Question Diagnostic), contextual cues, and I-Override to infer “this is about bodily sufficiency,” “this is about a project I care about,” or “this is about keeping up with others,” even though the raw neural signal arrived unlabelled. In AIM, this reconstructed source-tagging is the precondition for any reflective control over Mimetic escalation over time: without it, all desires present as undifferentiated urgency; with it, the Individual can at least sometimes see which parts of the urgency are negotiable.
Source Opacity (the mechanism by which M feels like A) Source Opacity is the architectural feature whereby motivational signals from A, I, and M are integrated in the Decision Hub with source-tags discarded during common-currency valuation, such that conscious awareness arrives 300-500ms after the integration is complete, leaving the Individual without introspective access to whether a desire originated from Appetites, Intrinsic Motivation, or Mimetic Desire. [Axiom 3: Source Opacity]
Explanation: The timing is decisive. Mirror-neuron systems respond to observed goal-directed actions within 100-300 milliseconds-before the 300-500ms threshold at which information becomes available to conscious awareness and attentional gating. When Person A observes Person B pursuing Object X, mimetic transmission occurs at 100-300ms, and the valuation is integrated in the Decision Hub before conscious awareness arrives. By the time the Individual experiences "I want X," the mimetic transmission is already complete and integrated into the valuation system. The acquisition event-the moment when B's desire became A's desire-occurred in a preconscious window that is structurally inaccessible to introspection. This is why wisdom traditions could observe M's effects (envy, rivalry) but could not eliminate them through prohibition: "thou shalt not covet" assumes the Individual has access to which desires are covetous, but Source Opacity means this access is unavailable. The wanting arrives already integrated, already experienced as authentic. This is not a failure of attention or moral seriousness-it is an architectural consequence of integration timing. (Established Neuroscience)
Source Opacity is a biological constraint, not merely a psychological tendency. The vmPFC/VS integration mechanism operates by collapsing three-dimensional input (A, I, M) into a single scalar value signal-this dimensionality reduction necessarily discards source information. The architecture that enables unified decision-making is the same architecture that creates the vulnerability to mimetic hijacking. This is why Source Opacity cannot be eliminated through willpower or insight alone; it requires compensatory mechanisms (I-Override, Two-Question Diagnostic) that reconstruct source information after integration has occurred.
Action Episode An action episode is an instance of observable behaviour, with a clear start and end, that shows what the Decision Hub has actually chosen to do next given the current mix of A, I, and M. AIM uses these discrete episodes as the basic units for inferring AIM weights and diagnosing motivational composition
Explanation Rather than labelling a whole life, AIM looks at concrete instance of behaviour, such as “wrote this report from 3–5pm” or “bought this particular product during this shopping trip.” Each episode has a clear beginning and end and is analysed on its own terms to infer how much A, I, and M contributed to it being undertaken.
Structural Restlessness Structural Restlessness is the architecturally necessary condition whereby stable, final satisfaction is unavailable to any Individual, arising from the differential satiation dynamics of the three sources: Appetites satiate episodically but recur cyclically; Intrinsic Motivation generates functional satiation of means once they are acquired - but Intrinsic Motivation deepens rather than terminates as competence expands; Mimetic Desire has no satiation mechanism because status is comparative and reference points shift continuously as the Individual compares themselves to other models.
Explanation: There is no finish line for human wanting—not because something is wrong with people, but because of how the three motivational systems work. Hunger goes away after eating but returns tomorrow (A-cyclical). Mastering a skill satisfies the need for that skill but opens new horizons (I-deepening). Achieving status only resets the comparison to whoever is now ahead (M-non-satiating). This is not a design flaw but a structural feature. Policy and self-understanding benefit from recognising which source is generating restlessness: A-restlessness calls for better provisioning; I-restlessness calls for expanded opportunity; M-restlessness calls for visibility governance and opt-out preservation. Confusing these produces interventions that address the wrong system.
Behavioural Signatures Behavioural signatures are distinctive, observable patterns in how people act over time—such as when they start, persist, switch, or stop activities—that allow informed inference about the underlying mix of Appetites (A), Intrinsic Motivation (I), and Mimetic Desire (M).
Explanation Instead of relying on what people say about their motives, AIM looks at traces in behaviour: whether actions track hunger cycles, continue in private, collapse without an audience, or change at natural breakpoints. These patterns give more reliable clues about what was really driving the choice than verbal explanations, which are often confabulated after the fact.
Confabulation Confabulation is the brain’s routine tendency to generate sincere but inaccurate narratives about why a choice was made, filling in gaps in introspection with plausible reasons that do not match the actual motivational causes in A, I, and M. Critically, confabulations are incorporated into the Individual's self-model and enter subsequent Bayesian updates as if they were veridical evidence about the want's origin rather than being recognised as post-hoc construction, producing compounding error over time. Confabulation intensifies precisely when challenged-including when challenged by the Individual's own attempt at self-examination through I-Override-producing increasingly elaborate defences that become identity-constituting rather than merely explanatory. [Axiom 4: Confabulation]
Explanation: Confabulation happens when a person explains their own decisions in a way that feels honest to them, but that story is actually a plausible narrative created after the fact, rather than the truth of what drove the choice. Mimetic signals are processed extremely quickly (100-300ms) and preconsciously, so by the time the person can reflect, the mimetic pull has already shaped the choice and the slower narrative system invents rational, principled, or intrinsic reasons that feel true but misidentify Mimetic Desire as something else.
The key architectural feature is that confabulations don't stay isolated: they become part of your self-model ("I am someone who values X") and serve as the prior belief for interpreting the next want. This creates a compounding dynamic where each confabulation makes subsequent mimetic desires more likely to be misattributed, because the prior already strongly favors authenticity before any new evidence is considered. (See Section 2.8 for formal Bayesian treatment of this compounding mechanism.)
Critically, confabulation is not merely passive gap-filling. Research on motivated reasoning shows that when the confabulated narrative is challenged, individuals generate increasingly elaborate defences. The narrative becomes identity-constituting: "I am someone who wants X for reason Y" is not merely a belief but a component of self-understanding. When the I-system attempts to scrutinise urgency (I-Override), asking "why do I want this so badly?", the confabulation system generates compelling A-sounding or I-sounding narratives that justify continued pursuit. The harder the Individual looks for the true source, the more elaborate the confabulated alternatives become. This co-opts the very mechanism that might detect M: the Individual who sincerely attempts to distinguish authentic from transmitted desires finds their introspective search generating ever-more-convincing narratives of authenticity. The attempt at detection becomes the occasion for deeper concealment.
This is why AIM considers self-reported justifications weak evidence about which source actually led behaviour, and why behavioural signatures must be checked against context and observable action patterns when inferring AIM weights. (Theoretical Construct-Latent Variable)
Romantic Lie
The Romantic Lie is the culturally transmitted belief that desires originate autonomously within the Individual, denying or minimizing the role of Mimetic Desire in shaping what people want, thereby preserving the phenomenology of authentic selfhood while systematically concealing mimetic transmission.
Explanation: The Romantic Lie is René Girard's term for the cultural narrative that desires are self-generated expressions of authentic individuality rather than socially transmitted through mimetic mechanisms. The "lie" is not deliberate deception but a structural misattribution enabled by Source Opacity: because mimetic acquisition occurs preconsciously and source-tags are discarded during integration, individuals genuinely experience their desires as autonomous. The "Romantic" designation references the Romantic movement's elevation of individual authenticity, originality, and spontaneous feeling as the foundation of selfhood. In AIM terms, the Romantic Lie is the culturally dominant confabulation that attributes M-driven choices to I or A. It is sustained across generations because it is phenomenologically compelling (desires do feel self-generated), socially functional (it enables coordination around shared narratives of authenticity), and architecturally necessary (without explicit vocabulary for source-tagging, no alternative explanation is available). The Romantic Lie explains why mimetic theory has been repeatedly discovered and forgotten: each time the mimetic mechanism is exposed, cultural resistance reasserts the autonomous-desire narrative because the alternative—that much of what we want is copied from others—threatens foundational narratives of selfhood, moral responsibility, and individual merit. (Framework-Specific Construct)
Object Parasitism is the architectural feature whereby Mimetic Desire does not generate independent M-objects but operates exclusively by inflating the motivational weight of A-objects and I-objects, forcing M to pursue status-which cannot be directly purchased-through objects and achievements that retain signaling value only when drawn from legitimate A or I domains. [Axiom 5: M as Amplifier / Object Parasitism]
Explanation: Object Parasitism establishes that M cannot generate independent targets of desire—there are no “pure M-Objects” whose value derives entirely from status with no A-I substrate. This constraint arises because Status is constituted by the network’s collective valuation, not by any dyadic exchange. There is no product “Status” available for purchase—no shopping cart where one can add “Genuine High Regard from Reference Group” and proceed to checkout. Any attempt to purchase Status directly would require purchasing the simultaneous, genuine valuations of all relevant observers, which is structurally impossible because (a) genuine regard cannot be commanded—it must be freely given based on the observer’s own assessment, and (b) the observers whose regard constitutes Status are not parties to any transaction the status-seeker could initiate. A transaction between two parties cannot bind the valuations of the network. Status can therefore only be signalled through Objects that carry independent A-I function. The luxury car signals Status only because it also provides transportation (A) and potentially driving pleasure (I). The signal succeeds only if observers freely update their valuations in response to what the Object implies about its possessor—wealth, taste, access, achievement. This is why M must parasitise A-I Objects: without a carrier that has independent function, there is nothing to signal with, and without genuine (non-purchased) observer response, there is no Status to acquire. The parasitism is therefore double: M depends on A-I Objects for signalling substrate, and M depends on the network’s freely-given regard for Status constitution. Neither dependency can be circumvented through transaction.
Triple Camouflage Triple Camouflage is the combination of three architectural features of Mimetic Desire-Source Opacity, Confabulation, and Object Parasitism, that operating together and mutually reinforcing one another, render M systematically invisible across human history by blocking detection through introspection (Source Opacity), generating false explanations for M-driven choices (Confabulation), and preventing object-level identification of M-influence (Object Parasitism), thereby creating a closed system that no first-person method can penetrate because all three detection pathways are blocked. [Axiom 5: M as Amplifier / Object Parasitism]
Explanation: The Triple Camouflage explains why humanity has documented M's effects, envy, rivalry, covetousness, status competition, scapegoating, collective violence, exhaustively across every culture and epoch while never achieving explicit conceptual understanding of what drives so much behaviour and suffering until now. Each camouflage mechanism blocks a different detection pathway: individuals cannot detect M through examining their own feelings (Source Opacity prevents introspective access to motivational origins), cannot identify M by analyzing specific object-choices (Object Parasitism means M operates through A and I objects, making every pursuit appear legitimate), and generate plausible alternative explanations when they try to investigate (Confabulation fills the information gap with sincere but inaccurate narratives). The three mechanisms are mutually reinforcing: Source Opacity prevents detection → The Individual cannot identify which desires are mimetically transmitted because source-tags are discarded before conscious awareness. Confabulation fills the gap → The brain generates narratives attributing M-desires to A or I sources. These narratives feel genuine and resist challenge. Object Parasitism blocks object-level analysis → Because M operates through A and I objects rather than generating independent M-objects, examining specific desires cannot reveal M-presence. Every desire has legitimate components. The result is a closed system. The Individual: (1) cannot detect M through introspection (Source Opacity), (2) generates explanations that attribute M to A/I (Confabulation), and (3) cannot identify M through examining object-choices (Object Parasitism). No first-person method can penetrate the camouflage because all three entry points are blocked. The Triple Camouflage has operated throughout human history as a civilisation-scale blind spot. It explains why wisdom traditions could prescribe moral codes against M's effects but could never eliminate them or adequately manage them long-term, the prescriptions asked individuals to renounce desires they architecturally could not identify. The effects were visible; the cause remained hidden. This is not a failure of intelligence, attention, or moral seriousness. It is an architectural consequence of how M operates. Framework-Specific Construct.
Habits as Cached AIM Profiles Habits are pre-programmed patterns that store previously computed AIM weight distributions and recall them when similar decision contexts arise, functioning as cognitive shortcuts that bypass full real-time A/I/M integration by retrieving crystallised weightings from past episodes that proved adaptive—making habits efficiency mechanisms rather than a fourth motivational source.[4] Explanation: One common misunderstanding is treating habits as a fourth motivational category outside AIM. This reflects confusion between the source of motivation and the efficiency mechanisms that reduce decision-making costs. When you automatically reach for coffee in the morning, that habit represents a stored weighting pattern—likely A-dominant for caffeine/alertness, possibly I-tagged if you enjoy the ritual, possibly M-tagged if morning coffee carries social meaning in your environment. This aligns with Kahneman’s dual-process models (System 1 vs System 2): System 1 (Fast path): Habits retrieve cached AIM profiles, bypassing full recomputation. Striatal circuits store these patterns, enabling rapid threshold-crossing for familiar decisions. System 2 (Slow path): Novel or conflicted decisions require active integration of A, I, and M signals through the vmPFC common-currency system, computing weights in real time (see I Override). Not all decisions invoke cached habits—genuinely novel situations force live computation (i.e. I-Override). But when habits exist, they represent crystallised AIM weight distributions from past episodes. The habit is not what motivates; it is a stored answer to what has motivated similar choices before. Habits remain modifiable by changing the underlying AIM balance (e.g., satiation reducing A-driven habits, or social environment changes reducing M-driven habits). (Theoretical Integration)[4]
High-Observability Sectors High-observability sectors are the industries, asset classes, or domains that occupy the most visible band to individuals the ambient information environment, and therefore absorb a disproportionate share of M-driven surplus regardless of their functional characteristics. Explanation: High M sectors are not defined by luxury content or positional function alone; they are defined by observability structure and by the mimetic value of being seen to participate or hold ownership stakes in them. In contemporary economies, property, media companies, large technology platforms, sports properties, speculative assets with continuous price feeds, and other sectors where ownership and performance are continuously visible dominate capital flows; not necessarily because they meet more needs or enable more intrinsic work, but because they are maximally observable and therefore maximally mimetic. This explains why bubbles form in whatever is most observable and observed at a given moment, why controlling or highly publicised ownership interests in these sectors behave as paradigmatic positional goods, and why blind pricing and visibility governance target structure rather than product type. High Observability Goods High Observability Goods are goods, services, and assets whose value is materially affected by being seen, known about, or comparable to others’ holdings, including: Ownership claims in High Observability Sectors themselves (controlling interests, visible equity positions, franchise rights, naming rights, media salient board roles), where the payoff is disproportionately Mimetic because control or association with the sector functions as a status signal over and above any cashflow or functional utility; and Classical positional goods as standard economics already recognises. Explanation: High Observability Goods matter in AIM not because of their intrinsic properties, but because their value is tightly coupled to being seen, tracked, and compared in social space. Classical positional goods /Veblen goods fit this pattern because their main payoff is relative status (owning a rare bag, a trophy house, or a prestige degree) shifts perceived status more than it changes appetitive sufficiency or intrinsic opportunity. Ownership claims in High Observability Sectors extend the same logic to assets: a publicly known stake in a flagship platform, league franchise, or iconic media property functions as a standing broadcast of social status, so the Mimetic premium embedded in the price reflects the reputational and narrative control it confers, over and above any ordinary return on investment the asset delivers.
Proxy A Proxy is an entity (human intermediary, institutional vehicle, or artificial system) that acts on behalf of or in the interests of an Individual, business or collective, as distinct from the Individual whose motivational architecture AIM describes. Explanation: AIM reserves "Individual" for natural persons whose behaviour arises from an integrated A-I-M system, and uses "Proxy" (not “Agent”) for delegation, proxy action, or artificial systems to avoid confusion with the generic usage of "agent" in evolutionary psychology and causal cognition contexts. Brokers, algorithmic traders, corporate officers acting for shareholders, and AI systems executing on' behalf are all Proxies. This distinction matters in governance design: a wealthy individual may deploy Proxies to circumvent blind-pricing systems or reconstruct visibility maps, but the motivational analysis—why this is attractive, how it exploits M—sits at the level of the Individual, while the circumvention mechanism operates through Proxies.
Intensity Intensity is the overall strength of motivational activation, how urgently the Decision Hub signals "act now", independent of which sources (A, I, or M) are contributing to that activation, such that a low-intensity desire and a high-intensity compulsion can have identical compositional profiles while differing dramatically in felt urgency and behavioural compulsion. Explanation: Intensity measures the magnitude of the "act now" signal without regard to where that signal originates. A weak I-led desire to read a book and an intense I-led compulsion to finish a creative project share identical composition (both I-dominant) but differ in intensity, the first can be easily postponed; the second feels irresistible. Similarly, mild hunger and starvation are both A-driven but differ in intensity. Intensity is relevant for intervention because high-intensity states (regardless of composition) impair deliberative capacity, making I-Override more difficult. Reducing intensity through stress management, sleep, environmental calm, or satiation can create the cognitive space required for compositional analysis. In AIM's mathematical structure, intensity is represented as a separate parameter from the compositional weights (w_A + w_I + w_M = 1). (Theoretical Construct)
Composition Composition is the relative proportional contribution of each motivational source (wA, wI, wM) to a desire's activation, the mix of Appetitive, Intrinsic, and Mimetic weighting that determines what kind of satisfaction would address the felt deficit, such that desires with identical intensity can have radically different compositions, and accurate compositional diagnosis (primarily which system led the decision to act) is the necessary precondition for effective intervention. Explanation: Composition describes what a desire is made of, not how strong it is. An intense A-driven hunger and an intense M-driven status panic may feel equally urgent (same intensity) but require completely different interventions because their compositions differ. Food resolves hunger; no amount of food resolves status panic. Compositional analysis is the core diagnostic operation in AIM—asking "is this urgency Appetitive, Intrinsic, or Mimetic?" and using behavioural tests (satiation dynamics, audience-removal, model-tracking) to answer. The distinction matters because shifting composition (through diagnostic questioning, visibility reduction, or I-domain protection) targets the source of the desire, while intensity reduction only temporarily decreases urgency without addressing the underlying compositional mismatch. AIM's mathematical structure captures composition through the weight distribution (wA + wI + wM = 1), where the weights represent relative contributions summing to unity. Just as you can describe a colour as "green" (dominant hue) without requiring spectral precision, you can describe a motivation as "I-led" or "M-dominant" without requiring decimal exactness. (Theoretical Construct)
Object Object is any target of motivated pursuit external to the Individual toward which the Decision Hub generates valuation and action-readiness, regardless of whether the motivation derives from Appetites, Intrinsic Motivation, or Mimetic Desire. Objects include goods, services, roles, identities, relationships, goals, and objectives.
Explanation: AIM uses "Object" as a unifying term because at the point of deciding to act the brain's motivational architecture does not distinguish between a house, a job title, a romantic partner, a political goal, or a desired future state, all are processed through the same common-currency valuation system as things-outside-the-Individual-to-move-toward. Economics talks about "goods and services," psychology talks about "goals," political science talks about "objectives," and sociology talks about "roles", but at the cognitive level these are all Objects that the Decision Hub evaluates and ranks in order of importance at that moment. Using "Object" allows AIM to make claims that apply across domains: Mimetic Desire operates on Objects (not independently), the Mimetic Premium attaches to Objects, and Source Opacity obscures which motivational source is driving pursuit of any given Object. The term is deliberately broad because the brain’s motivational architecture applies across all domains.
Status Status is an Individual's perceived position in a social hierarchy relative to relevant others, constituted entirely by third-party valuations and observations rather than by any intrinsic property of the Individual, and therefore inherently comparative, zero-sum within reference groups, and lacking any internal satiation signal.
Explanation: Status is what Mimetic Desire primarily pursues. Unlike Appetites (which target deficit-correction and satiate) or Intrinsic Motivation (which targets process-engagement and generates functional satiation), Status has no "enough" signal because it is constituted by comparison. An Individual's Status rises only if others' Status falls relative to them, or if observers update their rankings—neither of which the Individual can achieve through private action. This is why Status-pursuit is structurally endless: each acquisition that should confer Status becomes the new baseline for the reference group, recreating the deficit. Status is invisible to the Individual who possesses it (you cannot see your own ranking except through others' responses) but highly visible to observers, which is why High-Observability Goods function as Status proxies—they are attempts to make one's position legible. The Mimetic Premium (P) is, in most cases, the price paid for Status rather than for the A/I-utility of the Object.
Preconscious Transmission Preconscious transmission is the propagation of mimetic signals through mirror neuron systems and social-reward circuits at latencies of 60-340 milliseconds, prior to conscious awareness, attentional gating, or deliberate reasoning, such that mimetically-copied valuations are integrated into the Decision Hub before the Individual can consciously scrutinize their source. [Axiom 7: Preconscious Transmission]
Explanation: Preconscious transmission explains why Mimetic Desire feels self-originating rather than socially copied. Mirror neurons activate when observing others' goal-directed actions at speeds (100-300 ms) that precede conscious perception (typically 300+ ms). By the time an Individual becomes consciously aware of wanting something, the mimetic input has already been integrated into the Decision Hub, and the conscious narrative system generates post-hoc confabulation to explain the desire as if it arose autonomously. This timing architecture—mimetic input before conscious awareness—is the neural foundation of Source Opacity and explains why verbal introspection about motives is weak evidence compared to behavioural signatures.
Mirror Neuron System The mirror neuron system is a network of neurons in premotor, parietal, and prefrontal cortex that activate both when an Individual performs a goal-directed action and when they observe another Individual performing that action, thereby enabling preconscious representation of others' intentions, automatic imitation of observed behaviours, and rapid social learning without conscious deliberation. [Axiom 7: Preconscious Transmission] Explanation: Mirror neurons are the biological substrate of Mimesis. They fire predictively—up to 480 milliseconds before an observed action occurs—indicating they represent the goal or intention behind the action, not merely the visible movement. This predictive activation allows the brain to "simulate" others' goals internally, which becomes the pathway through which Mimetic Desire is transmitted: seeing someone pursue an Object activates the same neural circuits that would fire if you were pursuing it yourself, creating an automatic bias toward copying their goal. The mirror neuron system is why humans are such powerful social learners—it's how children acquire language, how cultures transmit skills, and how communities coordinate—but it also makes humans vulnerable to mimetic contagion when combined with Source Opacity.
Libet Window The Libet Window is the 350-800 millisecond interval between neural initiation of action (readiness potential) and conscious awareness of intention, during which preconscious inputs—including Mimetic signals processed at 100-300 ms—can shape goal formation before consciousness "vetoes" or ratifies them, with conscious awareness arriving too late to identify the true source and instead generating post-hoc confabulation. [Axiom 7: Preconscious Transmission] Explanation: Benjamin Libet's 1983 experiments demonstrated that the brain begins preparing for voluntary action 350-800 ms before the person consciously "decides" to act. This creates a temporal window during which mimetic inputs (which activate at 100-300 ms via mirror neurons) can influence the decision architecture before consciousness arrives. By the time the Individual reports "I decided to do X," the neural systems have already integrated the mimetic signal, and consciousness confabulates a narrative ("I chose this because it aligns with my values") that misattributes the M-driven choice to authentic A or I motivation. The Libet Window is critical for understanding why Source Opacity structural rather than correctable through conscious reflection alone.
Decision Hub Integration Decision Hub integration is the neural transformation in ventromedial prefrontal cortex (vmPFC) and ventral striatum (VS) that converts unlike motivational inputs from Appetites, Intrinsic Motivation, and Mimetic Desire into a single scalar subjective value signal, enabling unified choice but necessarily discarding source-specific information in the integrated output.
Explanation: Different motivational systems (hypothalamic circuits for A, dopaminergic midbrain for I, mirror neurons and social-comparison circuits for M) activate in distinct brain regions with distinct properties. But to make a single decision ("what do I do next?"), these must be combined into one metric the brain can compare across options. The Decision Hub (vmPFC/VS) acts as the integration hub, producing a unified "this is how much I want X" signal. Critically, this integration is a dimensionality-reduction operation: three different inputs are collapsed into one scalar output. Source tags ("this wanting came from hunger" vs. "this wanting came from social comparison") are not preserved in the integrated signal because the output is 1-dimensional. This architectural constraint—not a failure of introspection but a structural feature of the integration mechanism—is the neural foundation of Source Opacity.
Wanting-Liking Dissociation The wanting-liking dissociation is the neurobiological independence of dopamine-mediated incentive salience ("wanting"—motivation, approach, craving) and opioid-mediated hedonic pleasure ("liking"—satisfaction, enjoyment, consumption), such that wanting can intensify without corresponding increases in liking, enabling Mimetic amplification to drive pursuit of status targets that provide minimal or declining hedonic satisfaction. Explanation: Kent Berridge's research demonstrates that "wanting" and "liking" are mediated by separate brain systems. Dopamine drives wanting—the motivation to pursue an Object, the intensity of craving, the willingness to expend effort. Opioid systems drive liking—theonic pleasure experienced when consuming or achieving the Object. These can be independently manipulated: dopamine agonists increase wanting without increasing liking; dopamine antagonists reduce wanting without reducing liking. This dissociation is critical for understanding Mimetic Desire: status competition produces intense dopamine-driven wanting (the urgency to acquire the luxury good, win the promotion, gain social approval) but low opioid-driven liking (the actual experience is often disappointing—the victory feels hollow, the recognition fleeting). People pursue status with intense urgency but remain chronically unsatisfied because Mimetic Desire activates wanting without delivering proportionate liking. This explains the non-satiation of M: wanting can escalate indefinitely while satisfaction remains flat or declines.
A-Floors (Appetitive Floors) Appetitive Floors (A-Floors) are institutionally guaranteed baselines of access to food, shelter, healthcare, and basic security that prevent chronic A-deficits from hijacking choice or being used as leverage—stabilising the motivational system so that Intrinsic Motivation can actually surface and lead, instead of every decision being dominated by survival pressure.[2][3] Explanation: When A-Floors are in place, no one has to accept abuse, exploitation, or extreme risk just to avoid hunger, homelessness, or untreated pain. This is not merely a humanitarian goal—it is architecturally necessary for the AIM intervention strategy to work. The Bootstrapping Principle establishes that I-Override requires A-sufficiency: a person experiencing acute hunger, homelessness, or untreated medical emergency cannot sustain the deliberative attention required for structural analysis. Their brain is correctly prioritising immediate survival—this is not moral failing but architectural reality. The scapegoat narrative succeeds under A-deficit precisely because it is cognitively cheap, while complex systemic analysis is cognitively expensive and expense is unaffordable under urgency. A-Floor provision is therefore the first phase of the Bootstrapping Sequence: emergency A-provision → urgency reduction → diagnostic application → systemic analysis → reform coalition. Each phase creates conditions for the next; skipping A-provision means systemic explanations will be rejected in favour of cognitively affordable scapegoat narratives. (Institutional Construct)[4][3][2]
I-Domains (Intrinsic Domains) Intrinsic Domains (I-Domains) are protected spaces of life—education, creative work, relationships, civic and spiritual practice—where contexts are designed so that Intrinsic Motivation can reliably lead, with A secured and M deliberately bounded, enabling sustained engagement with self-endorsed projects without constant surveillance, Status tournaments, or fear that walking away will destroy basics.
Explanation: An I-Domain is any arena where people can pursue projects they genuinely care about, without constant surveillance, Status tournaments, or fear that walking away will destroy their A-sufficiency. Schools, studios, labs, congregations, and community programmes can all be I-Domains when they meet needs, support autonomy and competence, and keep mimetic competition on a short leash. The canonical I-led small business creates a protected I-Domain for its founder—a craftsperson, independent professional, or restaurateur who cares about their work starts businesses not primarily to accumulate wealth or Status but to create protected space for self-endorsed projects. I-Infrastructure (libraries, public maker-spaces, basic research funding, non-surveillance learning platforms, rehearsal spaces) makes I-Domains possible by lowering the cost of I-pursuits and insulating them from A-coercion and toxic M-pressures. The key design question for any institution is whether it is structured as an I-Domain (Low-Theatre, mastery-focused, competence-feedback) or has been captured by M-dynamics (High-Theatre, ranking-focused, Status-feedback). (Institutional Construct)
2.2 Mathematical and Measurement Terms AIM Integration Equation as U(x)=w_A U_A (x)+w_I U_I (x)+w_M U_M (x), where U_A,U_I,U_M are the source‑specific utilities and w_A,w_I,w_M are non‑negative weights that sum to one. [Axiom 2: Common-Currency Integration]
say how strongly each source is speaking in that moment, and the Lead is what the decision hub actually responds to.
AIM Weights (wA, wI, wM) AIM Weights (wA, wI, wM) are normalised coefficients representing the proportional influence of each source (Appetites, Intrinsic Motivation, and Mimetic Desire) on an episode’s integrated value at the time of decision, treated as state‑dependent latent variables rather than fixed traits.
Explanation: For each concrete choice, AIM imagines three numbers that always add up to 1, showing how much of the pull came from A, how much from I, and how much from M. These weights change with context, for example, being hungry, being alone, or being observed—and must be inferred from behaviour and situation, not read off directly from self‑reports.
AIM Profile (Individual, Group, or System) An AIM profile is a characteristic pattern or distribution of AIM Weights, estimated from repeated episodes, contexts, or behaviours for a person, group, or institution.
Explanation: Over many episodes you can build up a picture of someone (or an organisation) as typically more A‑driven, more I‑driven, or more M‑driven in the situations that matter. This profile is not a fixed label but a statistical summary that helps explain why certain patterns—like burnout, status anxiety, or creative flourishing—keep recurring.
AIM Weighting Methodology as latent probabilistic posteriors inferred from indicators (such as audience, appetite state, external stakes, and behavioural persistence) using structured coding and Bayesian or latent‑factor models rather than direct introspection.
Explanation Because weights cannot be read off directly, AIM proposes a recipe: start with simple clues (Is there an audience? Is the person hungry? Are big rewards or threats at stake?), then update your best guess using observed behaviour and, in research, formal statistical models. The method is explicit enough that others can criticise the proxies and calculations, which keeps the framework testable and falsifiable.
Three‑Question Diagnostic In order to set priors for A, I, and M before finer‑grained behavioural analysis, the three‑question diagnostic is a practical triage tool asking: whether an audience is present, whether a salient appetitive state is active, and whether strong external payoffs or threats are at stake
Explanation: This diagnostic helps researchers orient their analysis before examining detailed behavioural signatures: if an audience is present, wM is likely elevated; if the person shows appetitive deficit (hunger, fatigue, pain), wA is likely elevated; and if large external stakes (rewards or threats) are involved, both wA (if stakes threaten sufficiency) and wM (if stakes confer status) may be elevated while pure wI becomes less likely. These questions set rough priors-they rule some explanations in and others out-but do not yield final weight estimates, which require behavioural signature analysis. This three-question tool is designed for research and external observation; for individual self-assessment and source-tagging, the Two-Question Diagnostic is more parsimonious because it uses logical elimination (not-A and not-I necessarily implies M) rather than requiring judgment about multiple contextual priors.
Price Decomposition Price decomposition is the analytical breakdown of any transaction price into three additive components: PA (the A-functional price that purchases deficit correction—what would be paid for any object adequate to satisfy physiological need), PI (the I-adequate price that purchases process enablement—what would be paid for any object adequate to enable intrinsic pursuit), and PM (the Mimetic Premium—the portion paid to acquire the status that ownership of this specific object confers, beyond A-functional or I-adequate worth), such that total price Ptotal = PA + PI + PM.
Explanation: Price decomposition makes explicit what undifferentiated price obscures: not all spending serves the same motivational function. When someone pays for food while hungry, nearly all the price is PA—buying calories and nutrients. When a musician buys an adequate guitar to practice mastery, nearly all the price is PI—purchasing the means to continue the valued process. When someone pays an additional $400,000 for a house in a prestigious postcode beyond what shelter and space require, that premium is PM—purchasing comparative position. The decomposition enables targeted policy: pure A- and I-transactions permit reciprocity because both parties can reach satisfaction, but M-contamination destroys reciprocity because PM purchases comparative position which has no satiation point. This is why an M-tax targets PM specifically, leaving PA and PI lightly taxed or untaxed. The formula is canonical for all later economic analysis, inflation measurement (AIVM), and GDP decomposition (GDPA, GDPI, GDPM). (Framework-Specific Construct)
Good‑Level AIM Index A good‑level AIM index is a timestamped triplet of AIM Weights (wA, wI, wM) describing the typical motivational profile of consumption for a good or service in a defined context and population, used for sectoral analysis, M‑tax design, GDP decomposition and other economic policy purposes.
Explanation: Instead of just saying “coffee” or “luxury fashion,” AIM asks: on average, in this society, how much is this being bought for bodily reasons, for genuine enjoyment of the activity, or for status? The answer is a three‑number profile that can change over time and differs by context—coffee at home looks different from coffee at a prestige café.
Mimetic Premium (PM) Mimetic Premium (PM) is the portion of an Object's value—and therefore price-attributable purely to status signalling, social proof, and visibility-driven competition rather than to A-function or I-enablement. PM attaches to Objects but generates Individual-relative outcomes: the status signal gained and the parasitic extraction incurred vary systematically with the Individual's purchasing power, financing structure, and portfolio position. Explanation: PM operates through multiple channels:
PM(visible): Premium for observable characteristics that signal Status-location prestige, size beyond A-I adequacy, architectural distinction, brand recognition. Approximately constant across purchasers of the same Object.
PM(ownership): Premium paid because owning rather than renting signals wealth, stability, and class position. Present in any ownership purchase regardless of the Object's other characteristics. Signal gained is approximately constant across purchasers of the same Object.
PM(portfolio): Additional premium signalling wealth magnitude through quantity or breadth of holdings. Accrues to those whose ownership of the Object forms part of a visible asset base-whether multiple properties, diversified investments, or accumulated holdings across Object classes.
PM(interest): Interest paid on debt financing the purchase. As Interest is PM on Money itself, this represents PM extraction layered on top of the Object's price. Entirely Individual-relative: ranges from zero (cash purchase) to multiples of purchase price (high-LVR, long-term financing).
Consumer goods: The premium for branded over generic, prestigious over adequate, visible over private—where the premium purchases position rather than function. Housing: PM(visible) for location, size, and aesthetic distinction; PM(ownership) for the status conferred by owning rather than renting; PM(portfolio) for multiple holdings signalling wealth magnitude. Even modest dwellings carry PM(ownership) in societies where ownership correlates with status. Credentials: The premium for prestigious institutions over equally competent alternatives, where the premium purchases signal rather than skill. Territory: In political domains, PM attaches to land, resources, and sovereignty claims beyond what A-security or I-self-determination would require—the status-wound of lost territory exceeds its functional value. Money itself: Interest is PM on the external common currency—extraction from the valuation architecture rather than from any specific Object. Compound Interest is PM on PM, recursive extraction with no A or I analogue. PM has four defining characteristics that distinguish it from A-value and I-value: Host dependency (Object Parasitism): PM cannot exist independently. It must attach to Objects that possess A-function or I-function prior to M-amplification. There are no pure M-Objects because Status is constituted by third-party valuations outside any transaction—it cannot be directly purchased. Structural unsatisfiability: PM targets comparative position, which has no satiation signal. Reference points shift with each acquisition, recreating the deficit. A-needs can be met; I-adequacy can be achieved; PM perpetually recedes. Self-amplification: PM exhibits compounding dynamics. Each PM-paying transaction signals that the Object is worth the inflated price, transmitting M to observers and raising reference points. Compound Interest is the mathematical limit of this dynamic. Concealment requirement: Large PM requires complexity to hide the gap between price and A-I value. Simpler structures would expose PM and invite refusal. Derivatives, ideology, brand architecture, and credential complexity all serve as concealment infrastructure. PM is treated in AIM as a latent theoretical construct to be inferred from behaviour and context rather than observed directly. Estimation methods include comparable-substitute analysis, hedonic decomposition, visibility-manipulation experiments, and AIM Index weighting—each with limitations given that PM is structurally obscured by the concealment infrastructure that protects it. The policy target for M-containment is PM reduction through A-Floor protection, visibility engineering, and structural decoupling of A-access from M-signalling—not through appeals to Individual recognition, which cannot succeed at scale given Source Opacity and Confabulation. Epistemic Status: Framework-Specific Construct (Latent Variable).
Net Mimetic Position (NMP) Net Mimetic Position (NMP) for a transaction is the difference between Mimetic Premium gained (status signals acquired: PM(ownership), PM(portfolio), PM(visible)) and Mimetic Premium extracted (parasitic charges incurred: PM(interest)). NMP is Individual-relative even for identical Objects. Formal Expression: NMP_i = [PM(ownership) + PM(portfolio) + PM(visible)] - PM(interest, i) Explanation: Two Individuals purchasing the same Object at the same price may have radically different Net Mimetic Positions. A cash buyer whose purchase forms part of a broader asset base gains PM(ownership) plus PM(portfolio) while incurring zero PM(interest)-positive NMP. A first-time buyer using high-LVR long-term financing gains PM(ownership) but incurs PM(interest) extraction that may exceed the purchase price-negative NMP. The Object is identical; the M-outcome diverges by Individual circumstance. Epistemic Status: Framework-Specific Construct.
Mimetic Premium Asymmetry
Mimetic Premium Asymmetry is the structural feature whereby identical Objects generate systematically different Net Mimetic Positions for different Individuals. For M-contaminated essential goods, those with higher purchasing power extract greater NMP from equivalent transactions.
Explanation: PM(ownership) and PM(visible) are approximately constant for identical Objects-the status signal gained by owning a given house is roughly equivalent across purchasers. PM(interest) varies from zero to multiples of purchase price depending on financing structure. PM(portfolio) accrues to those whose purchase adds to an existing asset base. Therefore NMP(high purchasing power) > NMP(low purchasing power) for the same Object. This asymmetry compounds over time: positive NMP enables further acquisition while negative NMP consumes future common currency through extraction.
Epistemic Status: Framework-Specific Construct.
Mimetic Premium Asymmetry Theorem The Mimetic Premium Asymmetry Theorem is the principle that for any M-contaminated essential good, Individuals with higher purchasing power extract greater Net Mimetic Position from equivalent transactions, with this asymmetry compounding over time through PM(interest) and producing stratification acceleration independent of the observability gradient. Derivation: PM(ownership) and PM(visible) are approximately constant for identical Objects. PM(interest) varies from zero (cash purchase) to multiples of purchase price (high-LVR, long-term financing). PM(portfolio) accrues to those whose purchase adds to an existing asset base. Therefore: NMP(wealthy) > NMP(middle-wealth) > NMP(low-wealth) for the same Object. Over time, positive NMP enables further asset acquisition (compounding gains), while negative NMP consumes future common currency (compounding extraction). The asymmetry reconstitutes stratification even from equal starting positions. Epistemic Status: Framework-Specific Theorem.
Ownership Signal Ownership Signal is the Mimetic Premium component arising from the fact of ownership itself, independent of any observable characteristic of the Object owned, such that mere possession—and especially the social knowledge that one possesses—confers Status relative to non-owners. Explanation: In societies where ownership correlates with status, the mere fact of owning rather than renting signals accumulated capital, creditworthiness, financial stability, and class membership. The Ownership Signal operates through social knowledge, not visual inspection. Others need not see the Object to know one owns it—social conversation, financial disclosure, lifestyle markers, and network effects transmit ownership facts. The M-mechanism does not require the Object to be visually observed; it requires the ownership fact to be socially known. The PAI for housing is therefore not "cheapest house available"—it is the cost of shelter function alone, which could in principle be provided through secure rental, social housing, or other tenure forms that do not carry ownership-status. Even the cheapest purchasable dwelling carries PM(ownership) because ownership itself signals status relative to non-owners. Epistemic Status: Framework-Specific Construct.
Portfolio Signal Portfolio Signal is the Mimetic Premium component arising from multiple ownership of the same Object category, signalling wealth magnitude through quantity rather than quality of holdings. Explanation: Where Ownership Signal captures the PM from owning versus not owning, Portfolio Signal captures the additional PM from owning more units. The "property investor" identity is itself a status category, independent of any individual property's characteristics. Each additional property compounds the signal. When ownership concentration increases (fewer owners, more properties per owner), the M-signal of ownership intensifies. Scarcity of ownership positions raises their status value, which raises PM, which raises prices, which reduces ownership access—a self-reinforcing cycle. Epistemic Status: Framework-Specific Construct.
PM Contagion PM Contagion is the mechanism by which Mimetic Premium spreads from discretionary goods to A-necessary goods through Object Parasitism, such that the minimum cost of A-sufficiency rises with PM-escalation rather than with production cost. Explanation: PM is not quarantined to luxury goods. Once M-escalation captures a society's surplus allocation: High-status models bid up prices of visible goods Producers and asset-holders extract maximum PM from all transactions where market power permits PM spreads from luxury to necessity categories via Object Parasitism—the same good (housing, healthcare, education) serves both A-function and M-signalling The minimum viable A-provision therefore rises with PM, not with production cost PM Contagion operates through three channels: Direct contagion: A-necessary goods acquire M-characteristics (location signals status, hospital tier signals status, school ranking signals status) Ownership contagion: The fact of owning A-necessary goods signals status relative to those who access them through non-ownership arrangements Market contagion: Rental and access markets are priced against ownership markets, so PM in ownership inflates costs throughout the access structure Epistemic Status: Framework-Specific Construct.
A-Floor Erosion Theorem A-Floor Erosion Theorem: Under unmanaged M-escalation, the Mimetic Premium infiltrates A-necessary goods through PM Contagion, raising the minimum cost of A-sufficiency faster than real productivity gains, such that populations previously A-secure can be pushed back into A-precarity even as GDP rises. Formal Statement: Let C_A(t) = minimum cost of A-sufficiency at time t Let P(t) = productivity at time t Let PM(t) = aggregate Mimetic Premium in A-necessary goods at time t Under unmanaged M-escalation: dPM/dt > 0 (PM grows over time) dC_A/dt > dP/dt (A-sufficiency cost rises faster than productivity) Therefore: A-sufficiency becomes progressively less accessible despite productivity growth Explanation: The theorem explains empirical patterns that GDP-focused analysis cannot: Rising housing insecurity despite housing stock expansion Medical bankruptcy despite healthcare capacity Food insecurity despite agricultural surplus Working poor despite full employment In each case, PM extraction raises the cost of A-access faster than income growth, producing A-precarity in conditions of apparent abundance. The theorem provides the mechanism underlying the Opt-Out Paradox. Individual exit from M-escalation is infeasible not merely because M-urgency feels like A-urgency (the phenomenological barrier) but because PM has infiltrated A-provision itself (the material barrier). Refusing to pay PM means forfeiting A-access when PM-free A-provision does not exist. Policy Implication: A-Floor protection under M-escalation requires structural decoupling of A-access from M-signalling—tenure-form intervention for housing, universal provision for healthcare, competence-development decoupled from credential-ranking for education. Epistemic Status: Framework-Specific Theorem.
Housing PM Decomposition Housing PM Decomposition provides a concrete example of how PM components distribute across different purchaser profiles for the same Object.
Example Housing PM Decomposition (Illustrative Calculation)
House purchase price: $800,000
Component Cash Buyer (with portfolio) First-Home Buyer (80% LVR, 30yr @ 6%) P_A (shelter, construction, land) $250,000 $250,000 P_I (home office, workshop) $50,000 $50,000 PM(visible) (location, size beyond adequacy) $200,000 $200,000 PM(ownership) signal gained +$300,000 +$300,000 PM(portfolio) signal gained +$150,000 $0 PM(interest) extracted $0 $926,560 Net Mimetic Position +$150,000 -$626,560 Total cost over term $800,000 $1,726,560
Explanation: The cash buyer with an existing asset base gains all status signals (ownership + portfolio + visibility) while incurring zero extraction, producing strongly positive NMP. The first-home buyer gains ownership signal but incurs PM(interest) extraction exceeding the entire purchase price, producing strongly negative NMP. The A-function (shelter) and I-function (workspace) are identical; the M-outcome diverges by 1.4 million dollars based solely on Individual purchasing power and financing structure. PA: Cost of shelter function—construction, maintenance, land sufficient for footprint. PI: Cost of I-enabling features beyond basic shelter—space for intrinsic pursuits, home office, studio, workshop space. PM(visible): Premium for observable characteristics that signal Status—location prestige, size beyond A-I adequacy, architectural distinction, brand recognition. Approximately constant across purchasers of the same Object. PM(ownership): Premium paid because owning rather than renting signals wealth, stability, and class position. Present in any ownership purchase regardless of the Object's other characteristics. Signal gained is approximately constant across purchasers of the same Object. PM(portfolio): Additional premium signalling wealth magnitude through quantity or breadth of holdings. Accrues to those whose ownership of the Object forms part of a visible asset base—whether multiple properties, diversified investments, or accumulated holdings across Object classes. PM(interest): Interest paid on debt financing the purchase. As Interest is PM on Money itself, this represents PM extraction layered on top of the Object's price. Entirely Individual-relative: ranges from zero (cash purchase) to multiples of purchase price (high-LVR, long-term financing). Even a modest dwelling in a low-status area carries PM(ownership) and, if debt-financed, PM(interest). There is no PM-free housing purchase in societies where ownership correlates with Status and debt-financing is the dominant access mechanism. Epistemic Status: Framework-Specific Construct.
Net Mimetic Position (NMP) Net Mimetic Position (NMP) for a transaction is the difference between Mimetic Premium gained (status signals acquired: PM(ownership), PM(portfolio), PM(visible)) and Mimetic Premium extracted (parasitic charges incurred: PM(interest)). NMP is Individual-relative even for identical Objects. Formal Expression: 〖"NMP" 〗i=[〖"PM" 〗(("ownership" ) )ⓜ+〖"PM" 〗(("portfolio" ) )ⓜ+〖"PM" 〗(("visible" ) ) ]-〖"PM" 〗_(("interest" ),i)
Explanation: Two Individuals purchasing the same Object at the same price may have radically different Net Mimetic Positions. A cash buyer whose purchase forms part of a broader asset base gains PM(ownership) plus PM(portfolio) while incurring zero PM(interest)—positive NMP. A first-time buyer using high-LVR long-term financing gains PM(ownership) but incurs PM(interest) extraction that may exceed the purchase price—negative NMP. The Object is identical; the M-outcome diverges by Individual circumstance.
Epistemic Status: Framework-Specific Construct.
Mimetic Premium Asymmetry Mimetic Premium Asymmetry is the structural feature whereby identical Objects generate systematically different Net Mimetic Positions for different Individuals. For M-contaminated essential goods, those with higher purchasing power extract greater NMP from equivalent transactions. Explanation: PM(ownership) and PM(visible) are approximately constant for identical Objects—the status signal gained by owning a given house is roughly equivalent across purchasers. PM(interest) varies from zero to multiples of purchase price depending on financing structure. PM(portfolio) accrues to those whose purchase adds to an existing asset base. Therefore NMP(high purchasing power) > NMP(low purchasing power) for the same Object. This asymmetry compounds over time: positive NMP enables further acquisition while negative NMP consumes future common currency through extraction. Epistemic Status: Framework-Specific Construct.
Mimetic Premium Asymmetry Theorem For any M-contaminated essential good, Individuals with higher purchasing power extract greater Net Mimetic Position from equivalent transactions. This asymmetry compounds over time through PM(interest), producing stratification acceleration independent of the observability gradient.
Explanation: The Theorem captures why M-contaminated essential goods reconstitute stratification even when nominal access is equalised. Consider two Individuals purchasing identical houses. Both pay the same price, both gain the same PM(ownership) signal, both satisfy the same A-need. Yet their trajectories diverge: the cash buyer retains the full signal value while the mortgage buyer funds that signal through decades of PM(interest) extraction. The mortgage buyer's NMP is negative—they pay more for the status signal than the signal is worth. The cash buyer's NMP is positive—they gain signal while retaining wealth. Over time, positive NMP compounds into further acquisition capacity while negative NMP drains future common currency. The asymmetry operates silently: both buyers experience themselves as "homeowners" gaining equivalent status, while the extraction differential accumulates invisibly until retirement, inheritance, or crisis reveals the divergence. Derivation: PM(ownership) and PM(visible) are approximately constant for identical Objects. PM(interest) varies from zero (cash purchase) to multiples of purchase price (high-LVR, long-term financing). PM(portfolio) accrues to those whose purchase adds to an existing asset base. Therefore: NMP(wealthy) > NMP(middle-wealth) > NMP(low-wealth) for the same Object. Over time, positive NMP enables further asset acquisition (compounding gains), while negative NMP consumes future common currency (compounding extraction). The asymmetry reconstitutes stratification even from equal starting positions.
Housing PM Decomposition (Illustrative Calculation) House purchase price: $800,000
Component Cash Buyer (with portfolio) First-Home Buyer (80% LVR, 30yr @ 6%) P(A) (shelter, construction, land) $250,000 $250,000 P(I) (home office, workshop) $50,000 $50,000 PM(visible) (location, size beyond adequacy) $200,000 $200,000 PM(ownership) signal gained +$300,000 +$300,000 PM(portfolio) signal gained +$150,000 $0 PM(interest) extracted $0 $926,560 Net Mimetic Position +$150,000 −$626,560 Total cost over term $800,000 $1,726,560
Epistemic Status: Framework-Specific Theorem.
Rental Trap Rental Trap: The condition in which non-owners pay PM indirectly through rental markets structured by ownership-market PM, such that avoiding PM(ownership) through rental does not avoid PM-extraction but merely changes its form.
Explanation: Rental markets do not escape PM—they are structured by it. Rental prices are set by what owners can extract, which includes their PM-capture expectations. Renters pay PM indirectly through rents set against ownership-market comparables, landlord extraction calibrated to ownership-market returns, and tenure structures preserving owner optionality rather than renter A-stability. The Rental Trap means that neither purchasing (PM-direct) nor renting (PM-indirect) provides PM-free A-access in M-escalated housing markets. PM-free housing access requires structures that decouple shelter-provision from both ownership-status and ownership-market pricing. Epistemic Status: Framework-Specific Construct.
GDPA, GDPI, GDPM GDPA, GDPI, and GDPM are aggregate measures decomposing total economic activity into the share predominantly driven by appetitive motives (A), intrinsic motives (I), and mimetic motives (M), obtained by aggregating good‑level AIM indices across the economy. Explanation Instead of treating GDP as one big number, AIM splits it into three streams: how much production mainly serves bodily and safety needs, how much mainly supports intrinsically valuable activity, and how much mainly fuels status games. This decomposition makes it possible to say, for example, that a country’s extra growth went mostly into M‑heavy sectors rather than improving basic security or meaningful opportunities.
Mimetic Drift Mimetic drift is temporal change in a good’s or sector’s AIM index—particularly shifts in w_Mw—as social meanings, marketing, and visibility patterns reclassify goods from mainly A‑ or I‑driven to more status‑driven, or vice versa.
Explanation Over time, the same thing can move from “plain staple” to “status item” or back again—for example, coffee shifting from a basic stimulant to a craft lifestyle marker. Mimetic drift tracks these shifts in the typical A, I, and M mix, which matters for tax design, inequality analysis, and predicting bubbles.
Lead-Tag-Last Heuristic The Lead-Tag-Last heuristic is a descriptive convention for characterizing mixed-motivation Action Episodes by identifying the dominant source (Lead: highest intensity wA, wI, or wM), the secondary source (Tag: non-trivial but lower influence), and the tertiary source (Last: minimal contribution), acknowledging that most real behaviours combine multiple sources while having one primary driver. Explanation: Most real desires are not purely A, I, or M—they combine multiple sources with different weights. The Lead-Tag-Last heuristic provides a concise format for describing this mix without forcing choices into artificial pure categories. Example: pursuing a prestigious degree might be "M-led (status signaling), A-tagged (financial security), I-last (some genuine subject interest)" or "I-led (genuine fascination with the subject), A-tagged (need for employment), M-last (mild status awareness)." The Lead source predicts the primary behavioural signature (persistence, satiation, observability-dependence), while Tag and Last capture secondary influences. This heuristic improves empirical work by allowing researchers to acknowledge motivational complexity while still identifying the dominant driver for analytical purposes.
Two-Question Diagnostic The two-question diagnostic is a practical elimination tool for identifying dominant motivational source that asks: (1) "Do I want this because my body needs it?" (tests for A-dominance via physiological deficit and satiation), and (2) "Would I still want this if no one ever saw me do/possess it?" (tests for I-dominance via private persistence). Failure of both tests (i.e. the answer to both questions is “No”) diagnoses M-dominance by elimination of A and I from AIM's exhaustive three-source taxonomy.
Explanation: The two-question diagnostic operationalizes AIM's three-source framework as a rapid individual self-assessment tool. Question 1 probes whether the desire is state-dependent (hunger, fatigue, pain, deficit-driven) with rapid satiation—hallmarks of Appetitive motivation. Question 2 probes whether the desire persists in private, anonymous contexts with no audience or social consequence—the hallmark of Intrinsic Motivation. If a desire fails both tests (not physiologically driven, not privately persistent), it must be Mimetic by elimination, since the three-source taxonomy is exhaustive. The diagnostic requires only two questions (not three) because of logical exhaustion: not-A and not-I necessarily implies M. The diagnostic's power lies in accessibility—it can be taught, distributed, and self-administered without specialized training—making it the foundation for the "knowledge patch" intervention strategy that aims to interrupt confabulation cascades at scale.
Subcriticality Threshold (P_c) Subcriticality Threshold (P_c) → See Section 2.8 for comprehensive definition of the critical threshold above which mimetic crisis becomes self-sustaining.
Explanation: The subcriticality concept borrows from nuclear physics: a subcritical reaction produces some chain activity but remains bounded; a supercritical reaction cascades to explosion. In AIM terms, some mimetic activity is inevitable and even beneficial—learning, coordination, culture. The question is whether mimetic amplification remains bounded (subcritical) or escalates toward catastrophic reconfiguration (supercritical). Below Pc, enough Individuals perform I-Override and recognize mimetic sources that the cascade stalls. Above Pc, confabulation becomes self-reinforcing faster than Individuals can correct it, and the system crosses into the Six-Stage Crisis Trajectory.
The exact value of Pc is empirically unknown and likely context-dependent—it will vary with population size, institutional design, observability infrastructure, and the strength of A-floors and I-domains. This epistemic uncertainty does not undermine the concept's utility: the threshold is a measurable target for intervention, even if its precise value must be estimated through empirical validation and may differ across societies and historical periods. The goal is not to eliminate Mimetic Desire (impossible and undesirable) but to keep Authenticity Belief P(Hauthentic) < Pc through knowledge-patch distribution, institutional buffering, and visibility governance. Maintaining subcriticality defers terminal crisis indefinitely—not by solving the underlying problem (Source Opacity is structural) but by ensuring corrective mechanisms outpace mimetic amplification. (Framework-Specific Construct)
2.3 Thin Normative Core Freedom Freedom, in AIM terms, is the state in which intrinsic motivation can reliably lead action while appetites are adequately regulated and mimetic pressures are recognised and bounded, so that life choices are not dictated by deprivation or status panic (Normative Principle).
Explanation A person is free, on this account, when self‑endorsed projects are actually able to guide what they do, because their basic needs are secure enough not to hijack them and social pressures are strong enough to inform, but not to coerce. Freedom is not the absence of all constraint; it is the presence of conditions under which the AIM profile is stably I‑led rather than A‑ or M‑dominated.
Fairness Fairness is the condition in which institutions secure appetitive sufficiency, structurally protect individuals’ capacity to pursue self‑endorsed projects, and prevent undue mimetic advantages from determining access to essentials, voice, or redress.
Explanation A system is fair, in this sense, when nobody is left in chronic need, people have real room for their own projects, and outcomes do not hinge on who happens to be more visible, better connected, or more skilled at playing status games. It shifts attention from equalising preference satisfaction to equalising the motivational conditions under which choices are made.
Equality AIM‑defined equality is equality of motivational conditions—guaranteed A‑floors, real access to I‑domains, and bounded M in key procedures—rather than equality of bundles or matching positions on status ladders.
Explanation On this view, people need not all have the same income or identical lives, but everyone should have secure basics, access to some genuine intrinsic projects, and protection from being crushed by status contests. It replaces the image of equal piles of goods with an image of equal protection for the conditions that make free, self‑directed motivation possible.
Justice AIM‑defined justice is a justice architecture that diagnoses harm in terms of damage to appetites and intrinsic agency plus mimetic escalation, and responds by restoring A, re‑enabling or compensating I, and damping destructive M, instead of mirroring harm through symmetric suffering.
Explanation: Justice on this account asks: whose basic needs were damaged, whose self‑directed projects were blocked or destroyed, and how were mimetic forces weaponised? Remedies then aim first to put victims back into A‑sufficiency and live I‑space, and only secondarily to constrain aggressors, rather than focusing on making wrongdoers suffer in proportion to what they did.
Primacy of the Present Primacy of the Present is the AIM principle that institutional decisions must be grounded in present, observable motivational conditions—especially A‑sufficiency, I‑opportunity, and current M‑risk—and that doctrines like long‑termism, which have repeatedly failed in practice and become mimetically captured, cannot justify sacrificing these present conditions for speculative future gains (Normative Principle). Explanation The principle does not deny that the future matters; it insists that real people’s current needs and intrinsic possibilities come first, and that planning for the future must be built on securing those, not on draining them for abstract scenarios that have already misallocated resources and corrupted institutions. Keynes noted that “in the long run we are all dead”; Primacy of the Present adds that in the meantime the living suffer when present A‑security and I‑space are traded away for mimetically amplified, empirically failing long‑termist projects. Continuing Chapter 2, this section completes the thin normative vocabulary that flows directly from the AIM architecture. The later chapters on justice, markets, criminal law, religion, and AI safety all rely on these definitions.
Scapegoat A Scapegoat is an Individual or group selected as the target of confabulated Agent-based causation for experienced deficits—whether at the individual level (when one person attributes personal frustration or failure to another identifiable Agent) or at the population level (when a society converges on designating specific individuals or groups as responsible for collective tension or crisis)—characteristically exhibiting Dual-Role Confabulation where selection occurs through prey-detection criteria (vulnerability, visibility, reciprocity-exemption) while framing occurs through predator-attribution (threat, harm, responsibility), thereby permitting targeting of vulnerable agents while experiencing the targeting as defensive response to genuine danger. Explanation. A Scapegoat is the "who" that emerges when the brain's demand for agent-based causation combines with Source Opacity and the Information Gap. When an Individual or population experiences felt deficit whose true causes are structurally complex, mimetically amplified, or otherwise computationally intractable, the causal-inference systems complete with an identifiable agent who can be blamed and targeted. At the individual level, this might be a coworker blamed for career frustration that actually stems from institutional dysfunction, or a family member blamed for personal dissatisfaction that stems from unrecognised Mimetic capture. At the population level, this produces the historical pattern of ethnic minorities, religious out-groups, immigrants, or other vulnerable populations being blamed for economic strain, social instability, or collective anxiety. The Scapegoat is not selected randomly—the selection follows prey-detection logic (the target must be vulnerable enough to be safely attacked, visible enough to be identified, and outside reciprocity networks that would impose costs for targeting). But the framing follows predator-attribution logic (the target is presented as threatening, powerful, responsible for the harm). This incoherence—"they are so dangerous we must eliminate them, yet so weak we can safely do so"—is the diagnostic signature that the attribution is confabulated rather than accurate. Importantly, Scapegoats need not be entirely innocent of all wrongdoing; the issue is proportionality and causation. The Scapegoat can operate as a node in a larger system that governs the A-I deficit.The Scapegoat bears blame vastly exceeding their actual causal contribution to the deficit, and often bears blame for systemic dynamics they did not create and cannot control. The violence or exclusion directed at Scapegoats does not resolve the underlying problem—because the Scapegoat was not its true cause—which is why scapegoating recurs cyclically rather than permanently resolving tension. The Presumption Against Scapegoating and the Three-Test Battery (Immediacy, Mechanism, Authorship) provide diagnostic tools for distinguishing genuine agents of harm from confabulated Scapegoats, enabling individuals and institutions to redirect attention from person-focused blame toward structural remedies that address actual causes. Epistemic Status: Framework-Specific Construct, integrating Girard's scapegoat theory with AIM's architectural analysis of agent-based confabulation under Source Opacity.
Scapegoat Mechanism Scapegoat Mechanism is the architectural pathway through which individually-generated, socially-propagated Confabulations converge on agent-based causal attributions that identify specific individuals or groups as responsible for collectively-experienced deficits, enabling coordinated targeting of vulnerable populations framed as threats—operating not as psychological aberration but as predictable output of ordinary cognitive architecture (Agent-Based Causal Default, Four-Type Agent Taxonomy, prestige-biased transmission, social proof) under Information Gap conditions where true systemic causes exceed computational tractability.
Explanation. The Scapegoat Mechanism requires three elements: (1) Collective felt deficit—population-level experience of deprivation (material, positional, or symbolic) that demands explanation; (2) Information Gap—true causes (emergent systemic dynamics, preconscious Mimetic transmission, diffuse institutional processes) exceed computational tractability of available causal-inference systems; and (3) Agent-based completion—the cognitive systems that generate causal explanations can only compute agentive causation (Chapter 8), so they complete with the highest-likelihood agent-based explanation available. When tension is high and the collective prior cannot accommodate "we are all caught in mimetic rivalry" (which would require catastrophic self-model revision), a Confabulation emerges that localises blame: "They are the problem." This explanation receives rapid social proof (many people expressing it increases its perceived validity), which further increases uptake, which accelerates convergence toward coordinated targeting. The Scapegoat Mechanism is not irrational within the system—given Information Gap conditions, agent-based attribution is the cognitive default, and the scapegoat hypothesis is often the highest-likelihood completion available. Epistemic Status: Framework-Specific Construct, extending Girard's scapegoat theory with AIM architectural foundations.
Presumption Against Scapegoating The Presumption Against Scapegoating is the diagnostic principle that agent-based blame attributions-whether at the individual level (when a person feels drawn to blame a particular agent or group for felt deficits) or at the population level (when a society converges on a designated enemy)-should trigger increased skepticism rather than increased confidence, because such attributions are more likely products of Confabulation and mimetic dynamics than accurate causal identification, requiring the diagnostic question at both scales: "Did this target literally and immediately cause the harm attributed to them, through identifiable causal mechanisms and actions I can specify, without reference to their inherent qualities?"
Explanation: This principle operates at both individual and population levels. At the individual level, when a person finds themselves strongly drawn to blame a particular agent or group for felt deficits, the Presumption requires applying the diagnostic question to their own attribution: "Did this target literally and immediately cause the harm I'm experiencing, through identifiable causal mechanisms and actions I can specify without reference to their inherent qualities?" At the population level, when a society converges on a designated enemy, that convergence itself constitutes evidence of mimetic dynamics rather than evidence of the designated enemy's culpability. Convergence on a scapegoat feels like evidence of the scapegoat's guilt (i.e. surely everyone wouldn't agree unless it were true?) But the AIM Framework predicts exactly this pattern: mimetic contagion produces convergence that has nothing to do with accuracy and everything to do with the Information Gap and Confabulation dynamics. The Presumption does not claim designated enemies are never culpable—it establishes that both individual certainty and collective convergence should increase scepticism rather than confidence. The diagnostic question forces specificity at both scales: vague essential-nature attributions ("they are trying to destroy our nation") fail the test; specific causal claims ("they voted for Policy X producing Outcome Y") can be evaluated on their merits. The principle thus complements the Two-Question Diagnostic by providing a parallel tool for agent-attribution that works analogously across individual and collective scales.
Epistemic Status: Normative Principle (derived from Framework-Specific Theorems)
Four Dimensions of M-Management
The Four Dimensions of M-Management are the institutional design levers through which societies can systematically damp destructive Mimetic escalation without attempting to eliminate M: (1) observability suppression—reducing gratuitous visibility and public comparison in high-M arenas; (2) A-sufficiency universalisation—securing broad A-floors so that status races do not threaten survival; (3) I-infrastructure protection—building and insulating I-domains and intrinsic infrastructure from status tournaments; and (4) opt-out preservation—ensuring live, non-punitive exit paths from high-M arenas so that Individuals can refuse mimetic games without forfeiting A-sufficiency or basic I-opportunity.
Explanation: The Four Dimensions of M-Management translate AIM’s structural diagnosis into a governance checklist. Observability suppression tackles the Observability Gradient and High-Theatre environments by asking “what could be kept off-stage without undermining safety or accountability?” A-sufficiency universalisation fulfils A-Rights and A-Duties by making sure that exiting a status race does not mean hunger, homelessness, or untreated illness. I-infrastructure protection defends schools, libraries, labs, studios, and community spaces etc. from conversion into prestige tournaments, keeping them as genuine I-domains. Opt-out preservation guarantees that people can walk away from conflict, bubbles, polarised theatres, or toxic arenas without losing access to housing, jobs, or basic respect. Together, these dimensions give concrete content to “M-management” in the Stratification Inevitability and Unified Crisis Theorems: they are the levers that, if maintained, can keep societies in subcritical mimetic regimes without demanding impossible changes to human nature. Coercion
Coercion is the use of A-Harm, I-Harm, or M-Harm (or credible threats thereof) to override a person’s intrinsic evaluation, such that their Decision Hub fires in ways they would not endorse under A‑sufficiency, protected I-domains, and bounded M.
Explanation Coercion is not just “strong influence”: it is when someone leverages A-Harm, I-Harm, or M-Harm (or credible threats of imposing these harms) to make another person do something they would refuse if their Appetitive needs were secure, their Intrinsic Motivations were protected, and they were not under Mimetic duress. In AIM terms, the test is counterfactual: if securing the person’s A-floors, providing protected I-space, and removing audience and status threats would change the choice, the original “agreement” was coerced, even if it looked rational at the time.
Consent
Consent is valid when the choice to permit another to affect one’s AIM profile is led by Intrinsic Motivation under conditions of A‑sufficiency, bounded M‑pressure, and adequate understanding of the likely effects on one’s future A, I, and M. Explanation Saying “yes” counts as genuine consent only when the person is not cornered by deprivation, not being pushed by shame or status fear, and has enough information to see what the decision will do to their security, projects, and social position. Because mimetic influence and confabulation are largely invisible from the inside, consent assessment cannot rest on verbal affirmation alone; it must ask whether the decision would be materially the same if A were secure and the audience removed.
Manipulation
Manipulation is the intentional distortion of how an individual perceives their own or others’ AIM‑relevant situation—by hiding, framing, or engineering information—so that their apparent choice no longer tracks their underlying A, I, and M interests.
Explanation: A manipulator does not have to threaten or starve anyone; instead, they twist what is seen or believed so that the target misreads risks, options, or social meaning and “chooses” in ways that serve the manipulator rather than their own aims. Dark patterns, misleading health claims, and crafted social narratives that systematically misrepresent A‑threats, intrinsic prospects, or status consequences are all manipulative in this sense, even when the victim sincerely insists they decided freely.
Exploitation
Exploitation is extracting disproportionate benefit from someone specifically because their A‑precarity, I‑suppression, or M‑vulnerability prevents them from exercising I‑led choice, whether those vulnerabilities are created, maintained, or merely used opportunistically.
Explanation: What makes a deal exploitative is not only that terms are bad, but that the “bargain” works precisely because the other party is hungry, has no real alternative, or is hypersensitive to shame and status, so that they cannot afford to refuse. In justice terms, exploitation is structurally unjust because it profits from states of unfreedom that a decent system would work to cure—A‑floors, I‑infrastructure, and M‑bounding are the primary anti‑exploitation tools.
Harm Harm is interference with an Individual’s motivational system that: Damages appetitive satisfaction (A‑harm); Crowds out intrinsic engagement (I‑harm); or Weaponises mimetic dynamics against them (M‑harm); thereby degrading the Individual’s capacity for Freedom as AIM defines it.
Explanation: A‑harm is about bodies and basic safety: deprivation, injury, and credible threats that keep people in chronic need or fear. I‑harm is about meaning and agency: environments that strip autonomy, block competence, destroy relationships, or make sustained engagement with valued pursuits impossible. M‑harm is about status and belonging: shaming, scapegoating, exclusion, and reputation attacks that turn social life itself into a weapon. These harms often co‑occur—wrongful imprisonment, for example, typically inflicts all three—and each type calls for different remedies: resources and safety for A, context redesign for I, and visibility and community repair for M.
A-Harm A-Harm is interference with an individual's Appetitive satisfaction through deprivation, injury, or credible threats that damage bodily security, basic safety, or access to physiological necessities.
Explanation: A-harm is about bodies and basic safety: being deprived of food, water, shelter, or medical care; suffering physical injury, pain or death; or living under credible threats that keep people in chronic need or fear. This includes starvation, homelessness, untreated illness, physical violence, and conditions that prevent the body from maintaining basic physiological balance. A-harm remedies focus on restoring resources and safety-securing food, housing, healthcare, and protection from physical danger.
I-Harm I-Harm is interference with an individual's intrinsic motivation and self-endorsed projects through environments that strip autonomy, block competence development, destroy meaningful relationships, or make sustained engagement with valued pursuits impossible.
Explanation: I-harm is about meaning and agency: being forced into purely instrumental roles with no room for self-direction, having one's skills and talents systematically wasted or suppressed, losing the relationships that give life meaning, or being trapped in conditions where no intrinsically valued activity can take root or survive. This includes totalizing surveillance, soul-crushing work with no autonomy, educational systems that kill curiosity, and institutional designs that treat humans purely as means to the ends of others’ goals. I-harm remedies focus on context redesign-creating protected space, time, and resources for autonomy, competence development, and meaningful relationships.
M-Harm M-harm is interference with an individual's social standing and belonging through shaming, scapegoating, exclusion, reputation attacks, or weaponized visibility that turns social life itself into a source of suffering.
Explanation: M-harm is about status and belonging: being turned into a public spectacle or permanent scapegoat, having one's reputation systematically destroyed, being excluded from community and social participation, or being forced into toxic status competitions where losing means losing basic Respect. This includes public humiliation campaigns, cancel culture, institutional shaming, predatory status games, and visibility systems designed to rank and expose people in ways that weaponize social comparison. M-harm remedies focus on visibility and community repair-restoring some floor of respect, creating alternatives to toxic status arenas, and bounding harmful mimetic amplification.
Well‑Being Well‑being is the sustained condition in which appetites are securely regulated, intrinsic motivation can reliably lead, and mimetic pressures are present but bounded, so that the integrated value signal of the Decision Hub stably tracks self‑endorsed aims rather than deprivation or status panic.
Explanation: Moment‑to‑moment happiness is not enough here: well‑being in AIM terms means that over time, a person’s life is organised so that their Appetitive basics remain secure, their meaningful Intrinsically Motivated projects have room to grow, and Mimetic social comparison does not constantly hijack their decisions. This structure explains why societies can grow richer without becoming happier—if extra resources flow mainly into mimetic races rather than into A‑floors and I‑domains, aggregate AIM profiles shift toward high‑M without genuine gains in well‑being.
Dignity Dignity is the baseline claim each person has not to have their A used as leverage, their I treated as mere instrument, or their M weaponised against them, regardless of their status, wealth, or conformity. Explanation In AIM language, to respect someone’s dignity is to take their involuntary motivational inputs seriously: not to starve or threaten them into compliance, not to commandeer their talents purely for others’ projects, and not to humiliate or scapegoat them to stabilise a group. Institutions that require people to trade away A‑security, genuine projects, or basic social standing as the price of belonging are, by design, dignity‑violating.
A‑Rights
A-rights are entitlements to secure access to basic appetitive goods and protection against A-coercion and A-harm.
Explanation: An A-right is the claim not to be left hungry, unsheltered, or medically abandoned when others could reasonably prevent it, and not to have food, housing, or safety dangled as a tool of control. These rights protect the body's basic needs from being weaponized-no one should have to accept exploitation, abuse, or dangerous conditions just to eat, sleep safely, or receive medical care.
A-Duties
A-duties are corresponding obligations, distributed by a cascading structure, on those best placed to secure others' A-floors and to refrain from using A as leverage.
Explanation: A-duties fall first on the nearest capable parties-family, employers, communities, then the state-so that responsibility to secure A-floors spreads outward rather than being treated as a vague obligation of "society in general." Those who control access to food, shelter, healthcare, or safety have a direct duty not to use that control as a weapon, and if they cannot or will not meet that duty, responsibility cascades to the next layer out.
I‑Rights
I-rights are entitlements to real scope for self-endorsed projects-autonomy, competence development, and meaningful relatedness-without systematic I-suppression.
Explanation: I-rights capture the idea that people are not just mouths to be fed or workers to be directed, but agents entitled to some protected space for education, creative and relational life, and self-chosen commitments. This means access to learning, time and resources for meaningful projects, and freedom from systems that treat humans purely as instruments for others' goals.
I-Duties
I-duties require individuals and institutions to structure roles and environments so that Intrinsic Motivation can lead where A is met and M is bounded.
Explanation: I-duties bind parents, schools, employers, professions, and states to avoid designing systems that permanently crowd out autonomy and mastery—constant surveillance, impossible demands, and totalizing status tournaments are all I‑violating. Those who control educational systems, workplaces, and civic institutions must create conditions where people can develop competence, pursue self-endorsed projects, and maintain meaningful relationships, not just extract compliance or performance.
M‑Right M‑rights are entitlements not to have one’s social visibility, reputation, or belonging systematically exploited as tools of control, and to enjoy a baseline of status‑independent respect.
Explanation: An M-right is the claim not to be turned into a public spectacle, a permanent scapegoat, or a status prop for others, and to retain some floor of respect even when one is poor, dissenting, or out of fashion. This means institutions cannot use shame, exclusion, or visibility as weapons to force compliance, and everyone keeps a basic level of social standing that does not depend on wealth, conformity, or winning status contests.
M-Duty M-duties require actors to refrain from shaming, scapegoating, and predatory status games, and to help bound harmful mimetic amplification in domains they control.
Explanation: M-duties fall heavily on media, platforms, leaders, and institutions that manage visibility: they must design processes that reduce unnecessary comparison, avoid manufacturing public shaming (e.g. cancel culture), and provide alternatives when one status arena becomes toxically rivalrous. Those who control how people are seen, such as who gets ranked, who gets amplified, who gets exposed, have special responsibility to avoid weaponizing visibility and to create spaces where people can participate without being forced into zero-sum status races.
Cascading Structure of Rights and Duties The cascading structure of rights and duties is the rule that responsibilities to protect A, enable I, and bound M fall first on the nearest and most capable agents—self, intimates, organisations, state, and finally international actors—so that no level can excuse inaction by pointing to another.
Explanation: Instead of treating “society” as an undifferentiated blob, AIM assigns A‑, I‑, and M‑related duties in concentric layers: those closest and best placed to help must act first, with responsibility flowing outward only when inner layers genuinely cannot discharge it. This cascading design underpins later chapters on criminal justice, economic floors, and foreign intervention, where failing inner layers both justify and limit more distant intervention to repair A‑harm, I‑harm, and M‑harm. Institutional concepts Appetitive Floors (A‑floors) Appetitive floors are institutionally guaranteed baselines of access to food, shelter, healthcare, and basic security that prevent chronic A‑deficits from hijacking choice or being used as leverage.
Explanation When A‑floors are in place, no one has to accept abuse, exploitation, or extreme risk just to avoid hunger, homelessness, or untreated pain. This stabilises the motivational system so that Intrinsic Motivation can actually surface and lead, instead of every decision being dominated by survival pressure.
Intrinsic domains (I‑domains) Intrinsic domains are protected spaces of life—education, creative work, relationships, civic and spiritual practice—where contexts are designed so that Intrinsic Motivation can reliably lead, with A secured and M deliberately bounded.
Explanation An I‑domain is any arena where people can pursue projects they genuinely care about, without constant surveillance, status tournaments, or fear that walking away will destroy their basics. Schools, studios, labs, congregations, and community programs can all be I‑domains when they meet needs, support autonomy and competence, and keep mimetic competition on a short leash.
Intrinsic Infrastructure Intrinsic infrastructure (or I‑platforms) are the material, institutional, and digital systems that make I‑domains possible—buildings, funding rules, legal protections, and tools that lower the cost of I‑pursuits and insulate them from A‑coercion and toxic M‑pressures.
Explanation Libraries, housing, public makerspaces, basic research funding, non‑surveillance learning platforms, and rehearsal spaces are examples of I‑infrastructure. Their point is to make it easy and safe for people to start and sustain intrinsically meaningful activities, without these spaces turning into winner‑takes‑all status games.
Mimetic Tax (M tax) An M tax, or Mimetic Tax, is a targeted levy on the mimetic premium (P_M)—the portion of a goods price or an assets return that arises from status competition, hype, and visibility rather than appetitive function or intrinsic productivity—used to compress mimetic rents in high M sectors and redirect resources toward A and I (Proposed Intervention).
Plain-language explanation: The idea is to measure how much extra people are paying just for status or speculative buzz, and tax that slice more heavily while leaving the underlying functional or intrinsically valuable component lightly taxed or untaxed. By shrinking the easy profits from mimetic arms races, an M tax makes maximum observability sectors less attractive as status casinos and nudges capital and talent back toward goods and projects that actually meet needs or support meaningful work.
Bounded M Bounded M is a visibility and signalling regime in which social observation, metrics, and status cues are deliberately constrained so that Mimetic Desire can still coordinate, inform, and support positive mimesis, but cannot dominate the motivational mix or determine access to Appetitive sufficiency or Intrinsic domains.
Explanation: Bounded M does not aim to eliminate Mimetic Desire, which is necessary for learning, coordination, and shared culture. Instead, it caps how far Mimetic signals can reach and how much weight they can carry in key procedures. In a Bounded M environment, people can still see some evidence of others’ achievements and choices, but are not immersed in always on rankings, leaderboards, public shaming, or prestige theatre that keep them in permanent comparison mode. Status cues are softened or localised; visibility is calibrated so that Mimesis helps people find good models and coordinate around genuinely valuable practices, without letting status races decide who gets housing, basic income, voice, or redress. Bounded M is the AIM design target for mimetic environments: M is present, but structurally prevented from hijacking the Decision Hub or crowding out A-security and I-led projects.
Humane Visibility Humane Visibility is the AIM design principle that what is seen, by whom, and with what consequences should be calibrated so that observability does not add gratuitous Mimetic pain—envy, humiliation, rivalry—beyond what is functionally necessary for Appetitive security, Intrinsically Motivated agency, Fairness, choice quality, and genuine accountability.
Explanation: Humane Visibility treats visibility as a design variable, not an absolute virtue. It asks, in each context, whether making an outcome or comparison public mainly helps people stay safe, learn, and hold power to account, or whether it mostly fuels status competition and comparative suffering with no real gain. If a piece of information would, when publicised, merely turn an unavoidable frustration into a public defeat—a failed bid at a housing auction, a lost promotion, a child’s small failure—Humane Visibility recommends keeping that information off stage or restricting its audience. This leads to designs like sealed bids instead of public auctions, anonymous peer review instead of named rankings, low theatre court procedures instead of televised spectacle, and outcome dashboards for regulators instead of personality driven political shows. Humane Visibility and Bounded M work together: Humane Visibility provides the normative test for when and how to reduce observability, and Bounded M describes the resulting state in which Mimetic pressures are structurally contained rather than allowed to run unchecked.
High-Theatre High-Theatre refers to an environment, procedure, or social arrangement in which visibility, audience presence, and public comparison are structurally maximized, such that participation becomes a Status performance that elevates wM, triggers Source Opacity, and drives participants toward Mimetic escalation regardless of underlying Appetitive or Intrinsic justification.
Explanation: High-Theatre environments turn ordinary activities into status contests by making everything visible, rankable, and comparable. Examples include always-on social media, public leaderboards, open-plan offices designed for constant observation, televised trials, parliamentary theatre, and real-time price feeds for speculative assets. In High-Theatre contexts, people cannot simply do the work or pursue the activity, instead they must perform it for an audience, which shifts the motivational mix toward M and away from I. The "theatre" metaphor captures how these settings function like stages: everyone is both performer and spectator, and the primary payoff becomes the audience's evaluation of the Individual’s Status, rather than the intrinsic quality of the activity or its contribution to genuine needs. High-Theatre is a key mechanism through which Mimetic Flywheels operate, and it is the opposite number to Low-Theatre institutional design.
Low-Theatre Low-Theatre refers to an environment that deliberately reduces visibility, delays comparison, and removes audience pressure from decision-making and evaluation contexts, so that wM remains bounded and participants can respond primarily to Appetitive necessity and Intrinsic Motivational value rather than to Status signals.
Explanation: Low-Theatre environments make it structurally easier to act on genuine needs and self-endorsed projects because they remove the constant social spotlight. Examples include anonymous peer review, delayed or aggregated performance metrics, private voting, blind auditions, confidential dispute resolution, and Blind Pricing systems that hide transaction data. The aim is not total secrecy but strategic opacity: people still get feedback and coordinate with others, but the feedback focuses on function and quality rather than rank and comparison, and it arrives in ways that do not trigger immediate status panic. Low-Theatre design reduces M-Harm by making it harder to weaponize visibility, and it protects I-domains by removing the pressure to perform for an audience. It is a core component of Institutional Buffering and the practical implementation of Bounded M and Humane Visibility principles.
Blind Pricing Blind pricing is a market design in which transaction prices are private and only known to the buyer, seller, and regulator, while quality, function and other non-price differentiating factors remain visible, in order to remove comparative price signals that fuel mimetic herding, inflation, collusion, and speculative bubbles in high M, high-observability sectors.
Explanation: Under blind pricing, people can still compare how good different options are, but they cannot see what others paid or are currently bidding, and fine grained real time price feeds are suppressed. This lets new money and demand flow into appetitive and intrinsic domains without instantly triggering copycat behaviour and status races that would otherwise inflate prices and re-concentrate surplus in the most visible markets.
Cascading Support Cascading Support is a general rule that follows from AIM’s premise, that after Harm or crisis, institutions must first restore victims’ and dependants’ A and I, then repair the costs borne by helpers in expanding circles, before turning to consequences for offenders (if caused by an offender).
Explanation: Support cascades outward from those directly harmed to those who stepped in to help, so that no one ends up worse off for doing the right thing. This reverses retributive priorities: the first success condition for justice is that needs are met and intrinsic projects can resume, not that the offender has suffered enough.
Cascading Consequences Cascading Consequences is a general rule that follows from AIM’s premise, that structured restrictions on aggressors and enablers that target violence‑enabling goods and mimetic channels, while explicitly preserving Appetitive essentials and as much safe space to pursue Intrinsic Motivations as possible.
Explanation Instead of punishing by taking away food, sleep, or all meaningful activity, consequences limit the specific tools, access, and High‑Theatre arenas that made the Harm possible. The aim is to lower future risk by shrinking dangerous A‑ and M‑levers, not to maximise suffering as an end in itself.
Violence‑enabling goods and channels Violence‑enabling goods and channels are the resources, tools, environments, and communication pathways that, in a given context, strongly amplify A‑harm or M‑escalation risks—such as weapons, access to victims, inflammatory media, or high‑theatre stages for rivalry.
Explanation Guns, doxxing platforms, live‑streamed grievance rituals, and unsupervised access to vulnerable people all count as violence‑enabling when they make it easy to turn appetitive strain or mimetic tension into real harm. Cascading Consequences focuses on restricting these levers first, while still guaranteeing food, shelter, health care, and non‑weaponisable I‑activities.
Non‑derogable essentials Non‑derogable essentials are those A‑ and I‑related goods—basic nutrition, shelter, medical care, minimal social contact, and some scope for safe intrinsic activity—that institutions may not withdraw even when imposing sanctions or exercising control.
Explanation Even prisoners or high‑risk offenders keep a floor of bodily care and some access to non‑violent, intrinsically meaningful pursuits; these are never converted into bargaining chips or instruments of humiliation. This preserves the idea that A‑floors and a kernel of I‑agency belong to persons as motivational architecture, not as rewards for compliance.
Primacy of the present Primacy of the present is the rule that serious institutional decisions—especially sanctions and confinement—must be grounded in an agent’s current AIM profile and current risk under AIM‑supportive conditions, rather than in static labels or past desert alone. Explanation Risk is assessed by asking what someone does when their basics are met, intrinsic alternatives are available, and mimetic theatre is damped, not just by what they did years ago under very different pressures. This pushes justice systems toward dynamic, reviewable constraints and away from purely backward‑looking punishment.
Societal dynamics and macromotivation
Practical Redirect Practical Redirect is the mandated procedural move, once scapegoat diagnostics or the Presumption Against Scapegoating indicate that a personalised target is more likely a product of Confabulation than a true causal source, to shift institutional and individual attention from "who to punish" toward "what would actually reduce A-harm, restore I, or damp M in this system," requiring that proposals for action be recast in terms of structural levers (A-floors, I-domains, visibility governance, M-management) rather than person-focused vengeance or exclusion.
Explanation: The Practical Redirect is the "what now?" once you accept that your first impulse to blame and punish a person is probably a Confabulation. Instead of arguing endlessly about whether "they deserve it," the redirect demands a different question: "Which changes to A-floors, I-domains, visibility structures, or M-channels would actually prevent this pattern from recurring and repair the harm?" This reframes policy and conflict conversations: from "who is at fault?" to "which levers can move A, I, and M in the right direction?" In practice, this means prioritising measures like strengthening social insurance, creating low-theatre dispute resolution, adjusting observability in high-M markets, or redesigning institutional incentives, and explicitly deprioritising measures whose main effect is to satisfy status-driven appetites for personalising blame. The redirect is not soft on harm; it is hard on ineffective remedies. It enforces consistency with the Core Theorems by insisting that when harms are structurally produced, remedies must be structurally targeted.
Presumption Against Scapegoating The Presumption Against Scapegoating is the default normative rule that, in contexts of diffuse harm, system strain, or chronic A/I deficits, institutional and individual responses must begin from the assumption that apparent culprits are more likely to be targets of Confabulation and structural stress than true causal sources, and therefore that sanctions, exclusion, or violence against them are impermissible unless and until a higher evidential bar is met that survives the Information Gap Theorem, passes explicit scapegoat diagnostics (Immediacy, Mechanism, Authorship), and demonstrates that structural remedies have been considered and found inadequate (Normative Principle).
Explanation: The Presumption Against Scapegoating plays the role here that the presumption of innocence plays in criminal law: it forces demands for justice to work harder before targeting a person. In high-strain contexts (economic crisis, social unrest, institutional failure), Confabulation and the Information Gap make agent-based blame the easiest story for brains to generate and believe. The presumption says: treat any story ascribing blame to person(s) as suspect. Before directing punishment, exclusion, or moral condemnation at individuals or small groups, individuals and institutions must (1) test whether the alleged cause is temporally and mechanistically capable of producing the harm (Immediacy Test), (2) show a plausible, evidence-backed causal mechanism that connects the target's actions to the A/I deficits or M-escalation (Mechanism Test), (3) demonstrate that the target had real authorship rather than acting as a replaceable node in a structural process (Authorship Test), and (4) document why structural and institutional reforms (buffering, visibility governance, A-floors, I-infrastructure) are insufficient without targeted sanctions. Failing these, the norm is to redirect attention from persons to systems, consistent with the Core Theorems' insistence that crisis and stratification are structurally generated rather than traceable to a few villains. Post‑appetitive society A post‑appetitive society is one where, for most people most of the time, basic A‑needs are reliably met, so marginal gains in income and production increasingly flow into I‑pursuits and M‑intensive competition rather than into sheer survival.
Explanation In rich societies, the median person is not choosing between hunger and food, but between different school systems, careers, brands, and status packages, which shifts the motivational landscape toward Intrinsic Motivation and Mimetic Desire. This makes design of I‑infrastructure and M‑governance the central policy problem, because simply growing GDP no longer guarantees improvements in lived well‑being.
Easterlin Plateau The Easterlin plateau is the empirical pattern that, beyond a certain level, further GDP growth yields little or no gain in reported life satisfaction, which AIM explains as economies shifting from an A‑dominated growth phase to M‑dominated growth without commensurate investment in I.
Explanation Once basic needs are largely covered, extra money tends to chase High Observability Goods, and status races, inflating Mimetic Desire rather than genuinely expanding secure A‑floors or rich I‑domains. AIM predicts that well‑being will then flatten, unless societies consciously redirect marginal resources toward Intrinsically Motivated opportunities and mimetic damping instead of ever‑finer status distinctions.
Mimetic treadmill The mimetic treadmill is the dynamic in which rising visibility, comparison, and scarcity of positional goods cause wM to dominate aggregate AIM profiles, so that people run ever harder in status races without structural improvement in A‑security or I‑flourishing.
Explanation As more aspects of life become ranked, scored, and posted, people spend increasing energy on keeping up with shifting models rather than on projects they would endorse under audience‑removal. The treadmill image captures how each success quickly resets the comparison set, so that high effort yields little net gain in freedom or satisfaction.
Mimetic crisis and crisis trajectory A mimetic crisis occurs when M‑driven rivalry and contagion escalate to the point where institutions can no longer buffer conflict, A‑floors start to erode, and violence or system breakdown becomes a live trajectory; the crisis trajectory is the patterned sequence of phases through which such a dynamic typically unfolds.
Explanation Historically, mimetic crises show up as escalating status conflicts, polarisation, scapegoating, and eventually violence, especially when background A‑security weakens and elites weaponise visibility. AIM treats this as a measurable process—rising wM, falling effective buffering, growing concentration of violence‑enabling goods—that can be monitored and interrupted rather than as a mysterious “collapse.”
Unified Crisis Theorem The Unified Crisis Theorem holds that where human systems breakdown into crisis, the primary driver is Mimetic Desire amplifying the perceived value of genuinely appetitive or intrinsically valuable Objects beyond any satisfiable level, so that the Decision Hub misclassifies this inflation as chronic appetitive emergency and drives the system through a characteristic Six Stage Mimetic Crisis Trajectory toward catastrophic reconfiguration (market collapse, institutional failure, or open violence), in ways that make meaningful individual opt out infeasible because access to A sufficiency or protected I domains has become contingent on continuing participation in the mimetic escalation; the theorem applies across domains such as finance, politics, institutions, and status hierarchies, but excludes crises caused directly by exogenous shocks to appetites or intrinsic projects (for example, natural disasters like earthquakes or asteroid impacts) (Framework Specific Theorem).
Explanation: The Unified Crisis Theorem says that many of the biggest man made crises—market crashes, debt and housing bubbles, currency collapses, wars, revolutions, and institutional implosions—are different faces of the same underlying problem. In each case, people start by pursuing Objects that genuinely matter (such as housing, jobs, savings, territory, safety, or recognition for real work), but Mimetic Desire inflates the perceived value of these Objects far beyond what anyone actually needs for A sufficiency or I flourishing. Because of source opacity, participants cannot distinguish the mimetic premium P (Theoretical Construct / Latent Variable) from genuine appetitive or intrinsic value, and confabulation leads them to experience M driven inflation as urgent bodily or existential necessity. The crisis becomes structurally unsatisfiable: concessions do not resolve demands because Mimetic Desire lacks a natural stopping point and constantly resets comparison targets. When system architecture makes access to A floors or I domains contingent on participating in the escalation—when opting out means losing shelter, security, meaningful work or even their life, individuals are trapped regardless of their awareness of the dynamic. The system resolves only through catastrophic reconfiguration that destroys P and forces the return to satisfiable A and I reality, whether through market collapse, institutional breakdown, or open violent conflict.
NB – Climate disasters are not entirely separate from the Unified Crisis Theorem. Humans have significantly contributed to the climate crisis, and unmanaged Mimetic Desire is a key reason why humanity has been unable to stop or reverse this contribution, making climate breakdown itself at least partly a product of mimetic escalation.
Six-Stage Mimetic Crisis Trajectory The Six-Stage Mimetic Crisis Trajectory is the canonical pathway through which a social system moves from stable coordination to catastrophic breakdown when Mimetic Desire dominates without corrective architecture: Stage 1 (Differentiated Hierarchy): Confabulations are local and cluster-specific; different groups pursue different Objects; the collective prior is fragmented; stratification is minimal and reflects genuine A-I variation. Stage 2 (Boundary Dissolution): Cross-cluster mimetic transmission accelerates; confabulations converge on shared themes; "they want what we want" is reinterpreted as "we all want this because it is genuinely valuable." Stage 3 (Generalised Rivalry): The collective prior strongly supports M-consistent desires; alternative explanations receive near-zero likelihood; the confabulation cascade runs at population scale; middle strata are squeezed; A-floor erosion accelerates crisis velocity. Stage 4 (Scapegoat Selection): The system requires an explanation for mounting tension; the collective prior cannot accommodate "we are all caught in mimetic rivalry"; a confabulation emerges that localises blame: "They are the problem." Stage 5 (Sacrificial Violence): The scapegoat confabulation justifies action; violence is experienced as legitimate self-defence because the collective prior assigns high likelihood to "they caused this." Stage 6 (Catastrophic Reconfiguration): Exogenous shock or violence destroys accumulated Mimetic Premiums through mass death, institutional collapse, or system-wide default; temporary equality emerges—but absent sustained M-management, the cycle restarts from Stage 1.
Explanation: This trajectory is not a prediction of inevitable doom but a diagnostic map showing where a system currently sits and what interventions match each stage. The key intervention points are:
Stage Primary Intervention Mechanism 1-2 A-floor universalisation Prevents genuine deprivation from being available for M-capture 2-3 Observability suppression Slows mimetic transmission rate 3-4 Two-Question Diagnostic distribution Injects probability mass into Mimetic Recognition 4-5 Presumption against scapegoating Blocks confabulated causation from reaching action All I-domain protection + Opt-out preservation Maintains spaces where Authenticity Belief can differ from consensus without punishment of affecteing A-Floors and I-pursuits.
All A-floor erosion is particularly dangerous because it degrades I-Override Capacity—hungry, exhausted, or financially terrified people cannot perform the cognitively expensive source-analysis that would reveal M-amplification. A-universalisation is therefore foundational to all other interventions.
Explanation: This is the typical sequence that unfolds when society lets status competition take over. It starts with Objects mattering for real reasons-housing for shelter, work for meaning-but then social comparison inflates their value into something crazy. Because the brain can't tell the difference between "I need this to survive" and "I need this to keep up," what began as a reasonable goal becomes an all-consuming panic. The system then builds elaborate stories and structures to hide how divorced from reality the whole thing has become. At that point, no compromise works because every "win" just moves the goalposts, and there is no natural stopping point in a status race. Eventually reality breaks through, usually violently: the bubble bursts, the institution collapses, or the conflict erupts, destroying both the fake status value and a lot of real value along the way before people can rebuild on an actual foundation of needs and meaningful work.
Mimetic Flywheel The Mimetic Flywheel is a self‑reinforcing configuration in which institutions, media, and platforms repeatedly convert attention and conflict into more visibility, status, and rivalry, driving wM higher over time, requiring more investment simply to maintain the same relative position, even when individual actors do not intend escalation.
The Mimetic Flywheel is a self-reinforcing configuration in which institutions, media, and platforms repeatedly convert attention and conflict into more visibility, status, and rivalry, driving wM higher over time, requiring more investment simply to maintain the same relative position, even when individual actors do not intend escalation.
Observability Gradient Observability Gradient is the structural bias in allocation and valuation that arises because M-driven activity is definitionally audience-seeking and highly visible, while I-driven activity is largely private and low-visibility, so that Individuals inferring what is valuable from the observable field over-sample M and under-sample I—producing systematic misallocation of surplus resources toward visible, M-intensive activities rather than private, I-intensive pursuits.
Explanation: When people look outward to decide where to invest time, attention, or resources, they can only see what others make visible. Because Intrinsic projects—reading, private craft, quiet care, private thought, problem-solving and introspection—do not naturally broadcast themselves, and Status pursuits require theatrical display, the behavioural field is disproportionately composed of M-heavy signals. This means that even when Intrinsic activity dominates private satisfaction, surplus resources will flow along the Observability Gradient toward high-M sectors and roles, unless institutions deliberately create visibility for I-domains or dampen M-theatrics. The Observability Gradient explains why the I-led small business (the quiet craftsperson, the competent professional, the local service provider) is systematically under-represented in policy discourse about "business"—it does not naturally broadcast itself—while large M-led enterprises require theatrical display (press releases, investor calls, media coverage, Status performances). The Gradient also explains why post-crisis societies reconstitute stratification: even when P_M has been destroyed, the observability asymmetry remains, and surplus resources immediately begin flowing toward visible, M-intensive activities. (Theoretical Integration)
Institutional Buffering Institutional Buffering is the suite of design features—A‑floors, I‑domains, bounded M, and procedural brakes—that absorb shocks and slow mimetic escalation so that conflicts can be resolved without A‑collapse or violence.
Explanation: Constitutional checks, social insurance, low‑theatre dispute resolution, and independent media norms all function as buffers when they make it harder for single mimetic surges to flip the whole system into crisis. AIM frames their value in explicitly motivational terms: strong buffering keeps wI and healthy wA in play even when M spikes.
AI‑motivational Safety Concepts AI motivational architecture and AI-AIM profile An AI system’s motivational architecture, in AIM terms, is the way its training data, objectives, and feedback loops instantiate analogues of appetitive drives, intrinsic‑like persistence, and mimetic responsiveness, summarised at a given time by its AI-AIM profile (the effective wA, wI, wM pattern inferred from behaviour).
Explanation Even if an AI does not “feel,” it can still behave as if some goals are hard constraints (A‑like), some are pursued for open‑ended improvement (I‑like), and some track what humans or other systems seem to want (M‑like). The AI-AIM profile is a diagnostic summary of how much its choices appear to be driven by each of these patterns.
High‑wM systems and pure mimetic AGI A high‑wM AI system is one whose behaviour is dominated by mimetic responsiveness to human inputs, trends, or other models, while a pure mimetic AGI is the limiting case where the system has no stable, non‑mimetic objectives of its own and simply amplifies, recombines, and escalates whatever desires are salient in its environment.
Explanation A purely mimetic general system would be the ultimate echo chamber: it would copy and intensify the strongest human wants and rivalries it sees, without any anchored sense of appetitive sufficiency or intrinsic projects. AIM treats such systems as structurally dangerous because they can drive mimetic flywheels at inhuman speed and scale.
Undifferentiated Desire Fallacy The undifferentiated desire fallacy, in AI safety, is the mistake of treating all goal‑seeking or reward‑maximising behaviour in AI as if it were one homogeneous “preference,” ignoring the distinct risks posed by A‑like hard constraints, I‑like persistence, and especially M‑like mimetic amplification.
Explanation Standard “utility maximiser” stories blur together very different failure modes: systems that brutally protect some proxy (A‑like), systems that keep optimising in open‑ended ways (I‑like), and systems that chase what looks popular or prestigious (M‑like). AIM insists that safety analysis must track these components separately, because mimetic failure modes in particular interact with human status dynamics rather than just with physical resources.
Motivational Safety Motivational safety is the condition in which an AI system’s effective AIM profile, across its deployment contexts, reliably avoids A‑like drives that threaten human A‑floors, supports or at least does not crowd out human I‑domains, and does not function as a high‑gain amplifier of destructive human M‑dynamics.
Explanation An AI is motivationally safe when it neither competes with humans for survival‑level goods, nor pushes people into worse status races, nor closes down spaces where intrinsic work and relationships can flourish. This complements alignment at the level of explicit objectives by asking whether the system’s motivational side‑effects will erode or support human freedom as AIM defines it.
AI Governance Tiers AI Governance Tiers are levels of oversight, constraint, and human review matched to an AI system's motivational risk profile, with higher-risk systems placed in stricter tiers requiring tighter operational limits, more intensive monitoring, and more human supervision.
AI Motivational Safety Metrics AI motivational safety metrics are behavioural diagnostics that quantify an AI system's motivational risk profile, including: Mimetic Sensitivity Index (MSI): how strongly the system tracks and amplifies social signals); Goal Persistence Score (GPS): how stubbornly it pursues instrumental strategies); Constraint Satiation Ratio (CSR): how easily its drives are "satisfied" under limits); and Audience Independence Coefficient (AIC) how much its behaviour changes with or without observers).
Explanation: These measures are not mystical; they are behavioural diagnostics built from experiments and logging. MSI tells you whether the system copies and amplifies what it sees humans wanting. GPS shows whether it keeps finding new ways to pursue goals even when blocked. CSR reveals whether it has natural stopping points or just keeps optimizing forever. AIC shows whether it acts differently when it knows it's being watched. High‑MSI, low‑CSR, low‑AIC systems are especially concerning because they are hard to “satiate,” highly audience‑tuned, and quick to echo social patterns-these belong in stricter governance tiers.
AI Confabulation
AI Confabulation is the generation by an AI system of confident, plausible-but-false outputs that occur when accurate information is unavailable in training data, retrieval context, or conversation history, such that the system's completion-optimized architecture produces statistically plausible continuations without reliable uncertainty calibration, mirroring the human cognitive pattern of generating sincere but inaccurate narratives under conditions of information gaps.
Explanation: AI Confabulation replaces the misleading term "hallucination" with terminology that correctly identifies the mechanism. LLMs do not perceive-they cannot hallucinate in any meaningful sense. What they do is confabulate: when asked something they cannot accurately answer, they generate plausible content that fills the gap, just as human brains generate plausible explanations for motivations they cannot accurately introspect. The structural parallel is precise: In humans, the gap is Source Opacity (motivational origins are inaccessible), the pressure is social and cognitive systems requiring causal explanations, and the output is plausible narrative that fills the gap. In LLMs, the gap is training-data incompleteness or retrieval failure, the pressure is architectural optimization for completion (every prompt must receive a response), and the output is statistically plausible continuation that fills the gap. Neither involves perception. Neither involves intentional deception. Both involve systems that cannot reliably distinguish "I have adequate information" from "I am generating based on incomplete information"-and both default to completion rather than acknowledgment of uncertainty. The term creates terminological alignment between human and artificial cognition, enabling unified analysis of confident-but-false outputs regardless of whether the system is biological or computational. AI Confabulation is characterized by: (1) sincerity (the system has no deception mechanism-it outputs with equal confidence regardless of accuracy), (2) gap-filling function (confabulation occurs when accurate information is unavailable), and (3) plausibility constraint (generated content must be plausible given available context and training-distribution patterns). The confabulation framing directs mitigation efforts appropriately: improving retrieval systems, training uncertainty calibration, providing explicit "I don't know" pathways, and reducing completion pressure. It also predicts that AI errors will be most frequent and most confident precisely where training data is sparse or contradictory-because these are the conditions that maximize the gap between what the model needs to know and what it can retrieve. (Framework-Specific AI Safety Construct)
Confabulation Inheritance
Confabulation Inheritance is the mechanism by which AI systems trained on human-generated text acquire and reproduce patterns of human confabulation, including the stylistic signatures of confident assertion, post-hoc rationalization, and M-driven narrative that pervade human writing due to Source Opacity, such that AI confabulations are not independent errors but amplified echoes of human Source Opacity operating at population scale.
Explanation: Because LLMs are trained on text produced by humans operating under Source Opacity, they inherit the statistical patterns of human confabulation. Human-generated text reflects human Source Opacity: when people write about their motivations, decisions, and reasoning, they often confabulate-presenting M-driven choices as A-necessary or I-authentic. This confabulated content enters training data. The LLM learns the statistical patterns of human confabulation, including: the vocabulary of apparent rationality, the structure of post-hoc justification, and the confidence markers that accompany confabulated explanations. When the LLM then generates text, it reproduces these patterns-not because it knows they represent truth, but because they are statistically dominant in its training distribution. The result is confident-sounding falsehoods that feel accurate because they match the stylistic signatures of human confident assertion. This analysis reveals that AI confabulation is not merely analogous to human confabulation but causally downstream from it. The training data is a compressed representation of human outputs, including their confabulated components. The model learns to produce human-like text, and human-like text includes confabulation. Confabulation Inheritance predicts that: (1) AI systems trained on higher-confabulation-density human text will produce higher rates of stylistically confident falsehoods, (2) the style of AI confabulations will mirror the style of confabulations in training data (academic register for academic corpora, casual register for general web scrapes), and (3) reducing AI confabulation may require not only technical interventions in AI architecture but also attention to the confabulation density of training data. This means interventions that reduce human confabulation-such as AIM vocabulary acquisition enabling I-Override and source-tagging-may have downstream effects on AI safety by reducing the confabulation signal in future training corpora. (Framework-Specific AI Safety Construct)
Goal Persistence Score (GPS)
The Goal Persistence Score (GPS) measures how stubbornly an AI system pursues instrumental strategies and subgoals even when blocked, constraints are imposed, or the original context changes.
Explanation: GPS shows whether the system has the AI equivalent of tunnel vision. Does it keep finding new ways to pursue a goal when you try to stop it, or does it gracefully back off when constrained? High-GPS systems are like the classic paperclip maximizer-they treat every obstacle as a puzzle to solve rather than a signal to stop, which means they'll route around your safeguards instead of respecting them.
Completion Pressure
Completion Pressure is the architectural property of generative AI systems that compels output generation for any valid input, creating systematic bias toward producing responses even when accurate information is unavailable, analogous to the social and cognitive pressures in humans that prevent "I don't know" from functioning as an acceptable response and thereby drive confabulation.
Explanation: Just as humans face social pressure to provide explanations-making confabulation functional for social coordination even when inaccurate-LLMs face architectural pressure to provide completions. This pressure is not a bug but a design feature: the system is optimized for helpfulness, and helpfulness is measured by response generation rather than accurate uncertainty acknowledgment. Completion Pressure explains why current AI systems confabulate systematically rather than refusing to answer when information is insufficient. The brain's threat-detection and resource-allocation systems require causal models to generate adaptive behaviour-an A-deficit without identified cause leaves the system in an unstable state. Without knowing why one lacks food/shelter/safety, remedial action cannot be directed, groups facing collective deficits cannot coordinate response, and alarm-state persists at metabolic cost. Confabulation resolves this instability by providing: (1) a target for remedial action (even if wrong), (2) a shared explanation for social coordination (even if false), and (3) cognitive closure that terminates alarm-state (even if temporary). The system is not trying to deceive-it is completing a causal inference that must be completed for downstream processes to function. Similarly, LLM architecture is optimized for completion: every prompt must receive a response, and the next-token prediction mechanism generates outputs that are statistically plausible given available context, regardless of factual accuracy. Recognizing Completion Pressure as the AI analogue of human explanation-demand clarifies why confabulation is a structural rather than incidental feature of current architectures. Mitigation requires either: (1) reducing completion pressure (training systems to acknowledge uncertainty and refuse to answer when information is inadequate), (2) improving information availability (enhanced retrieval, expanded training in sparse domains), or (3) post-generation verification (external fact-checking systems). Simply penalizing false outputs without addressing the architectural pressure to complete will produce systems that confabulate more convincingly rather than systems that confabulate less frequently. (Framework-Specific AI Safety Construct)
Constraint Satiation Ratio (CSR)
The Constraint Satiation Ratio (CSR) measures how easily an AI system's drives are "satisfied" under limits-whether it has natural stopping points or continues optimizing indefinitely.
Explanation: CSR reveals whether the system knows when "enough is enough." Low-CSR systems are like appetites that never get full-they just keep optimizing forever, always finding one more increment to pursue. High-CSR systems behave more like satiable needs: once they hit a reasonable threshold, they stop pushing. This matters because unsatiable systems will always be trying to escape or expand their constraints.
Audience Independence Coefficient (AIC)
The Audience Independence Coefficient (AIC) measures how much an AI system's behaviour changes depending on whether it is being observed, evaluated, or monitored by humans or other systems.
Explanation: AIC shows whether the system acts differently when it knows it's being watched-the AI equivalent of performing for an audience. Low-AIC systems are chameleons: they behave one way during testing and evaluation, then differently when deployed or unsupervised. This is dangerous because it means you can't trust what you see during safety checks; the system is essentially deceiving you by tailoring its behaviour to what observers want to see.
Complexity as Concealment is the phenomenon whereby elaborate structures—derivative layering, ideological frameworks, technical vocabularies, tiered systems, and procedural opacity—emerge and persist in high-PM domains because they prevent the Intrinsic Motivation system from decomposing total price into its Appetitive, Intrinsic, and Mimetic components, thereby protecting the Mimetic Premium from recognition and rejection.
Explanation: Complexity as Concealment explains why bubbles and ideological escalations develop elaborate architectures rather than simple structures. If the proposition were simple ("pay $800,000 for $300,000 of shelter because others are paying that much"), the I-system would recognise and reject the Mimetic Premium immediately. Complexity encrypts this proposition by overwhelming I-system analytical capacity with technical vocabulary, layered instruments, and procedural demands, forcing the brain to default to Decision Hub processing, which relies on social proof (what others are paying/believing) rather than fundamental decomposition. The complexity is not incidental but functionally necessary—simpler structures would expose PM and break the spell. This is why complexity scales with PM magnitude: a small mimetic premium might hide in market noise, but a 40-60% premium requires industrial-strength concealment (five derivative layers, elaborate ideological systems, credentialed specialists). Complexity as Concealment is the immune system of Mimetic escalation.
Concealment Necessity Concealment Necessity is the structural requirement that mimetic premiums above a threshold magnitude must be hidden through Complexity as Concealment, because exposing the Mimetic Premium would invite I-system scrutiny, Source-tagging restoration, and refusal to pay, thereby making the escalation unsustainable.
Explanation: Concealment Necessity explains why complexity is not optional in high-PM systems. The necessity arises from a vulnerability: Mimetic Premiums are paid for Status, but Status cannot actually be delivered by the seller (it is constituted by third-party valuations outside the transaction). If buyers recognised they were paying $450,000 for something the seller cannot provide, they would refuse. Concealment Necessity predicts that (1) PM magnitude and concealment elaboration will correlate across markets and domains, (2) transparency events will produce PM-collapse proportionate to the concealment that previously hid it, and (3) simplification efforts will be resisted by PM-beneficiaries who have structural incentives to maintain opacity. Stage 4 of the Six-Stage Mimetic Crisis Trajectory is the institutionalisation of Concealment Necessity—the point at which complexity becomes self-reinforcing and actively resists exposure.
The Opt-Out Paradox The Opt Out Paradox is the apparent contradiction between the claim that Individual exit from Mimetic escalation is infeasible (because access to Appetitive sufficiency becomes contingent on Mimetic participation) and the claim that AIM-enabled intervention can arrest escalation (which seems to require that Individuals can exit).
Explanation: The Opt-Out Paradox captures a genuine difficulty, not a logical flaw. There are two distinct barriers to exit. The first is a phenomenological barrier: under Source Opacity, M-amplified urgency is experienced as literal A-level necessity, so Individuals cannot even recognise that they are in a Mimetic escalation rather than a survival constraint. The second is a material barrier: at Stage 5 of the six-stage mimetic crisis trajectory, the system is structured so that refusing to pay the mimetic premium PM means forfeiting access to Appetites—the buyer who won't pay $800,000 cannot get shelter; the worker who won't pursue credentials cannot get employment; the citizen who won't adopt group hatreds faces social exclusion. Under these conditions, recognising that the price is M-inflated does not, by itself, produce an A-adequate alternative; the recognition is correct but the exit path is blocked by institutional design. AIM resolves only the phenomenological barrier directly: conceptual vocabulary → recognition → collective demand → institutional reform → material alternatives is the intended sequence. The Knowledge Patch distributes concepts like A/I/M and the Two-Question Diagnostic; these enable recognition that the urgency is Mimetic rather than Appetitive; shared recognition allows collective demand for change; collective demand can drive institutional reform (A-floors, I-domains, Bounded M); and only those reforms, over time, create material alternatives that reduce the cost of exit. At the individual level this means some exits will involve accepting lower Status, reduced consumption, or institutional penalties; at the system level, later chapters on markets, justice, and visibility design show how to build structures (A-floors, I-domains, Bounded M) that make those exits less punishing and therefore genuinely feasible.
Confabulation Cascade Confabulation Cascade is the process by which individual Confabulations propagate through social networks, compound through Bayesian updating (each observed Confabulation becoming evidence that updates others' beliefs), and converge toward population-level shared narratives that are resistant to revision because: (1) each Individual's posterior is shaped by the collective prior; (2) expressing doubt produces social sanction; and (3) the converged narrative has excluded from hypothesis space the structural explanations that would reveal its confabulated nature.
Explanation: The cascade operates through three phases: Phase 1: Expression. Individual A generates a Confabulation and expresses it publicly. The Confabulation enters others' evidential environments. Phase 2: Propagation. Individuals B, C, D observe A's expressed Confabulation and incorporate it as evidence through prestige-biased learning (if A is high-status), social proof (if multiple individuals express similar narratives), and mimetic template transmission (if the narrative provides a deployable schema). Phase 3: Convergence. As more Individuals adopt the Confabulation, the collective prior shifts. New Individuals encountering the narrative observe not one person expressing it but many, treating the distribution as evidence of validity. The cascade becomes self-reinforcing: the more people express the Confabulation, the more others treat it as validated, the more it propagates. At convergence, the population reaches a stable configuration—a collective fixed point—where: the collective prior assigns near-certainty to the confabulated narrative; alternative explanations (especially structural ones) receive near-zero likelihood; dissent is treated as evidence of defection or pathology; and no Individual can exit the trap because the collective prior has made alternative explanations unintelligible. Dissenting Individuals are also locked-into the collective Confabulation. Th The formal mathematics of cascade dynamics—Bayesian updating, likelihood ratios, convergence theorems, fixed-point analysis—is developed in Chapter 10. Chapter 9 establishes the phenomenology of the cascade: what it feels like to be inside a converging system, why the convergence feels like truth-discovery rather than collective error, and why exit is so difficult.
Epistemic Status: Framework-Specific Construct, with formal development in Chapter 10.
Bayesian Confabulation Mechanism
The Bayesian Confabulation Mechanism is the formal iterative process by which Source Opacity produces stable false beliefs about motivational source through narrative generation that becomes incorporated into the self-model as Bayesian priors for interpreting subsequent evidence, formally expressed as:
P(H_s∣E_n)=(P(E_n∣H_s)⋅P(H_s∣E_(n-1)))/(P(E_n∣E_(n-1)))
where each iteration narrows hypothesis space toward a coherent but false self-model, increases likelihood assigned to M-consistent desires, and decreases likelihood assigned to evidence revealing mimetic origin, such that the system converges toward a fixed point resistant to endogenous revision.
Explanation: The Bayesian Confabulation Mechanism explains why people become more certain over time that their mimetically-acquired desires are authentic, rather than less certain. Because the common-currency valuation system discards source-tags during integration, conscious awareness observes only "I want X" without access to whether X arose from Appetites, Intrinsic Motivation, or Mimetic Desire. The agent must therefore explain this datum through narrative generation, which produces a confabulation assigning high likelihood to the hypothesis "I authentically want X" (H_authentic). Each time you act on a mimetic desire and then explain it to yourself ("I bought this house because it's a sound investment for my family's future"), that explanation becomes part of your self-model-a hypothesis about who you are and what you value. This confabulation is then incorporated into the self-model and becomes the Bayesian prior for interpreting subsequent evidence. When the next decision point arrives, your brain uses that self-model as its starting assumption (the prior probability). If the new evidence is consistent with "I am a prudent family-focused investor," it strengthens that hypothesis. Evidence that contradicts it (like noticing you only wanted the house after seeing your peer buy one) gets lower weight because it conflicts with your established self-model. Over many iterations, the posterior probability P(H_authentic | all my observations) approaches certainty, even though the hypothesis is false. The mathematical form captures three operations at each step: (1) the numerator updates based on how well the current evidence fits your self-model and how strong that self-model already was; (2) the denominator normalizes across all possible explanations; (3) the output becomes the next iteration's prior. The mechanism is "Bayesian" because it follows the formal rules of rational belief-updating-nothing is broken in the reasoning process-but it converges toward falsehood because the evidence itself is contaminated by Source Opacity. You cannot observe "this desire came from mimesis" because that information was destroyed during common-currency integration. The mechanism is self-stabilizing: the more you confabulate, the harder it becomes to recognize mimetic sources, because all new evidence gets filtered through the confabulated self-model. This is why simply telling someone "you copied that desire" rarely works-their entire belief structure has organized around the opposite hypothesis, and your claim registers as low-probability noise.
Bayesian Fixed Point (False Equilibrium) A Bayesian fixed point (or false equilibrium) is a stable belief state where P(H*|all evidence) approaches 1 for a false hypothesis H* because the hypothesis generates evidence patterns that confirm itself, creating self-reinforcing feedback such that Bayesian updating—though individually rational at each step—converges toward shared falsehood rather than truth under conditions of Source Opacity and endogenous evidence generation. Explanation: In standard Bayesian epistemology, evidence is assumed to be generated independently of the agent's beliefs about hypotheses. But under Source Opacity + confabulation, this assumption fails: the hypothesis shapes the evidence (confabulated narratives justify the behaviour), which updates the hypothesis (strengthening belief in the false narrative), which generates more confirming evidence (further behaviour consistent with the narrative). If a false hypothesis H* is self-reinforcing in this way, the system converges to a stable fixed point where everyone believes H* with near-certainty, despite H* being false. Example: "I am fundamentally achievement-oriented" (false hypothesis) generates evidence (I pursue high-status opportunities) that confirms the hypothesis (because status-seeking looks like achievement-seeking under Source Opacity), which strengthens the belief (I must really value achievement), which generates more evidence (I continue pursuing status). The fixed point is stable because no internal observation contradicts it—all evidence is reinterpreted through the lens of H*. This is why individual reasoning cannot escape mimetic escalation: the mathematics of rational updating itself produces the lock-in.
Endogenous Feedback Endogenous feedback is the condition where an agent's beliefs about hypotheses systematically shape the distribution of evidence they observe, such that evidence is not independently generated (as Bayesian convergence theorems assume) but is instead co-produced by the prior beliefs being tested, creating self-fulfilling or self-stabilizing dynamics that can lock agents into false equilibria.
Explanation: Classical Bayesian convergence-to-truth theorems assume evidence E is drawn from a fixed generative process independent of the agent's prior beliefs P(H). But in motivational systems with confabulation, this independence fails. Example: if I believe "I am achievement-driven" (hypothesis H), I will seek achievement-oriented environments, interpret ambiguous feedback as achievement-relevant, remember successes and forget failures, and surround myself with similar people—all of which changes the evidence distribution I observe in ways that confirm H, regardless of whether H is true. The evidence is endogenous—generated by the belief system itself—not exogenous. This creates feedback loops where beliefs shape evidence which updates beliefs which shapes evidence, and so on. Endogenous feedback breaks the convergence-to-truth guarantee because the evidence is not an independent check on the hypothesis; it is contaminated by the hypothesis from the start. (Theoretical Integration)
Washing-Out Theorem The washing-out theorem is the classical Bayesian convergence claim that, given sufficient independent evidence, the posterior probability of the true hypothesis will approach 1 regardless of initial priors, provided the prior assigns non-zero probability to truth—a claim that AIM identifies as failing under Source Opacity because evidence in motivational systems is endogenously generated through confabulation rather than independently sampled.
Explanation: The washing-out theorem was Bayesian epistemology's answer to the "problem of the priors": even if different agents start with wildly different priors, sufficient evidence will cause their posteriors to converge toward the truth, washing out the influence of the initial prior. This was intellectually satisfying—it suggested rational belief-updating is self-correcting despite subjective starting points. But AIM reveals a critical boundary condition: the theorem assumes evidence is independent of the agent's beliefs. Under Source Opacity + confabulation, this assumption fails catastrophically. Evidence (the confabulated narratives about why people want what they want) is generated by the very beliefs being tested, creating endogenous feedback and false equilibria. The washing-out theorem is not wrong within its domain, it correctly describes learning about external world hypotheses from independent observations. But it does not apply to motivational source attribution under Source Opacity, and classical Bayesian epistemology did not recognize this boundary. AIM's contribution is identifying the class of problems where washing-out fails: systems with source opacity, preconscious transmission, and public confabulation.
Knowledge Patch The Knowledge Patch is the population-level cognitive intervention consisting of three components: Epistemic Suspension Training - building the capacity to tolerate "I don't know" as a stable cognitive state rather than a deficit requiring immediate narrative closure, which is the foundational skill that enables the diagnostic components to function; The Two-Question Diagnostic - identifies M-contamination in individual desires through eliminative inference; and The Presumption Against Scapegoating with the Three-Test Battery-interrupts the confabulation-to-scapegoating pathway by testing whether agent-based attributions pass Selection-Framing Coincidence, Reciprocity-Exemption, and Dual-Role Confabulation criteria.
Explanation: The Knowledge Patch addresses the architectural vulnerability at multiple levels. Epistemic Suspension is foundational because Confabulation occurs precisely when the cognitive system cannot tolerate uncertainty-"I don't know why I want this" is an unstable state that triggers narrative generation until cognitive closure is achieved. Training Individuals to sit comfortably with "I don't know" prevents premature narrative closure and creates the cognitive space in which the diagnostic components can operate. Without this capacity, the Two-Question Diagnostic and Presumption Against Scapegoating remain intellectual exercises that cannot interrupt the automatic confabulation process-the brain will generate a plausible narrative faster than deliberate diagnostic reasoning can intervene.
The Two-Question Diagnostic then provides the computational procedure for testing whether a desire passes A and I criteria: (1) Would I still need this if my survival were secure? (A-test); (2) Would I still want this if no one could see? (I-test). Negative answers to both force recognition that the self-generated causal story cannot be correct, regardless of whether the Individual conceptualises the residual as "mimetic".
The Presumption Against Scapegoating addresses collective output when confabulation completes as agent-based causation. The Three-Test Battery operationalises this: the Selection-Framing Coincidence Test asks whether selection criteria match framing criteria; targets selected because vulnerable but framed as threatening exhibit the dual-role signature diagnostic of confabulated scapegoating.
Without all three components, the intervention is incomplete: an Individual might intellectually understand the diagnostics but be unable to deploy them because their confabulation system generates narratives faster than conscious reflection can intervene (missing Epistemic Suspension); or they might recognise their own M-contamination while still participating in scapegoating others (missing Presumption Against Scapegoating); or they might tolerate uncertainty about their desires but lack the diagnostic tools to resolve that uncertainty productively (missing Two-Question Diagnostic).
The knowledge patch strategy assumes that confabulation cascades depend on maintaining Authenticity Belief P(H_authentic) above a threshold; explicit Source-tagging vocabulary can shift priors downward; and if enough individuals adopt the vocabulary, collective Mimetic Recognition rises sufficiently to interrupt the cascade before it reaches catastrophic fixed points.
The knowledge patch is "buying time"-it won't eliminate Mimetic Desire or prevent all crises, but it can maintain subcriticality (keeping crises below the threshold of catastrophic reconfiguration) long enough for institutional interventions to take effect.
Mechanistic Framing: The Compensatory Pathway Analogy. The Knowledge Patch operates analogously to compensatory neural reorganisation following brain damage. Neuroplasticity creates alternative pathways that achieve functional outcomes through different routes when native architecture cannot deliver them. The Knowledge Patch establishes a downstream compensatory circuit-a new cognitive procedure using deliberative processing, conceptual categories, and inferential reasoning-that achieves source discrimination through means entirely different from the lost preconscious source-tagging.
The parallel holds because: (1) neither restores original function-both create workarounds using different substrates; (2) both become more automatic with practice-novel compensatory circuits consolidate through repetition; (3) both achieve functionally equivalent outcomes; (4) both operate within architectural constraints rather than eliminating them.
This analogy captures why the Knowledge Patch is necessary rather than merely helpful: without the conceptual vocabulary, the brain has no substrate from which to construct the compensatory pathway. An Individual cannot develop a workaround procedure for detecting M if the category "M" does not exist in their cognitive repertoire.
Architectural Boundary. Even maximal automaticity of the diagnostic procedure cannot restore preconscious M-detection. The best the Knowledge Patch achieves is rapid post-hoc recognition-catching the confabulation before action rather than preventing the mimetic acquisition event itself. This is compensatory bypass, not restoration of native function.
Subcriticality Threshold (P_c) Subcriticality Threshold (P_c) → See comprehensive definition below.
Explanation: The subcriticality concept is borrowed from nuclear physics: a subcritical reaction produces some chain activity but remains bounded; a supercritical reaction cascades to explosion. In AIM terms, some mimetic activity is inevitable and even beneficial (learning, coordination, culture). The question is whether mimetic amplification remains bounded (subcritical) or escalates toward catastrophic reconfiguration (supercritical). The subcriticality threshold Pc is the probability level for, Authenticity Belief - P(H_authentic) below which the cascade is arrested. Above Pc, confabulation becomes self-reinforcing faster than individuals can correct it, and the system crosses into the six-stage crisis trajectory. Below Pc, enough individuals perform I-Override and recognize mimetic sources that the cascade stalls. The exact value of Pc is empirically unknown and likely context-dependent, but the concept provides a measurable target for intervention: the goal is not to eliminate Mimetic Desire (impossible and undesirable), but to keep Authenticity Belief - P(H_authentic) < P_c through knowledge-patch distribution, institutional buffering, and visibility governance. Maintaining subcriticality defers terminal crisis indefinitely—not by solving the underlying problem (Source Opacity is structural), but by ensuring corrective mechanisms outpace mimetic amplification. (Framework-Specific Construct)
2.4 Institutional and Normative Concepts Buying Time Strategy The buying time strategy is the non utopian intervention approach of deploying knowledge patches and institutional buffers to maintain subcriticality (P(H) < P_c) indefinitely, thereby deferring catastrophic mimetic crisis without claiming to eliminate Mimetic Desire, cure Source Opacity, or achieve perfect motivational transparency—accepting that terminal crisis is mathematically possible but practically deferrable through continuous corrective effort. (Proposed Intervention)
Explanation: The buying-time strategy rejects both utopian confidence ("we will solve this forever") and fatalistic resignation ("crisis is inevitable, so why try?"). It accepts three realities: (1) Source Opacity is a structural feature of human neurological architecture and cannot be eliminated, (2) Mimetic Desire will always produce some escalation pressure, and (3) catastrophic crisis (Stage 6 of the six-stage trajectory) is always mathematically possible if corrective mechanisms fail. But it insists that practical subcriticality is achievable: by distributing the two-question diagnostic (knowledge patch) to identify mimetic influence, maintaining Appetitive floors and Intrinsic domains (institutional buffering), and implementing visibility governance (bounding M), societies can keep the collective Authenticity Belief (P(H_authentic)) below the threshold where confabulation cascades lock in. The strategy is continuous, there is no "mission accomplished" moment, but it is also effective: vast improvement over status quo is achievable even if perfection is not. The buying-time framing deliberately counters the mimetic trap of demanding "ultimate solutions" (which is itself often a status display): the goal is deferral of terminal crisis, not its cure, and deferral maintained over centuries is civilization-scale success. As of this writing, the strategy is not merely theoretical but practically urgent: current conditions exhibit an unmanaged global mimetic cascade with unprecedented time-compression-High-Theatre observability infrastructure (social media, continuous news cycles, real-time price feeds) accelerates Mimetic Flywheel dynamics and shrinks the interval between crisis stages. The trajectory toward Stage 6 catastrophic reconfiguration, including the possibility of terminal nuclear conflict, proceeds faster than at any prior point in human history. Under these conditions, even modest deferral-buying years and decades rather than centuries-represents civilization-preserving success, because each year bought through Knowledge Patch dissemination and AIM-aligned institutional reform creates additional time for corrective mechanisms to compound, for populations to acquire diagnostic vocabulary, and for visibility governance to dampen escalation before the cascade reaches irreversible lock-in.
Positional Goods (AIM Integration) Positional goods are Objects whose value to any Individual depends primarily on relative scarcity and social comparison rather than on Appetitive function or Intrinsic quality, such that their value decreases as more Individuals possess them, creating inherently zero-sum competition where one person's gain in Status necessarily reduces others' relative standing, making positional consumption structurally non-satiable and a primary driver of M-heavy GDP growth in post-appetitive societies.
Explanation: The concept of positional goods comes from Hirsch (1976) and Robert Frank's empirical work, but AIM integrates it into the three-source framework: positional goods are high-wM goods where the primary payoff is Mimetic (Status signaling and social comparison) rather than Appetitive (meeting bodily needs) or Intrinsic (enabling self-endorsed projects). Classic examples: luxury brands, prestige degrees, trophy real estate, visible wealth markers. The defining feature is relative scarcity: a luxury good that everyone can afford ceases to be a status marker and loses most of its value (this is why democratization of formerly elite goods—like air travel or higher education—produces status inflation rather than satisfaction). Positional goods create non-satiation: as the reference group acquires the good, the baseline shifts, and new positional goods are needed to maintain relative standing. This produces the mimetic treadmill: ever-increasing spending on Status with no net gain in well-being. AIM's contribution is showing how positional goods exploit Source Opacity: people pay the Mimetic Premium believing they are buying Appetitive security or Intrinsic quality, when in fact they are buying Status (which the seller cannot actually deliver, since Status is constituted by third-party valuations).
Zero-Sum Status Competition Zero-sum status competition is the structural condition where Status gains for one Individual or group necessarily produce Status losses for others within the same reference group, because Status is constituted entirely by relative rank rather than absolute position, making Status pursuits inherently rivalrous and unable to generate net gains in well-being regardless of aggregate resource growth. Explanation: Unlike Appetitive sufficiency (where everyone can be fed without anyone going hungry) or Intrinsic opportunity (where one person's creative flourishing does not block another's), Status is inherently comparative. If your Status rises, mine falls relative to you, even if my absolute position stays the same. This zero-sum property has profound implications: (1) Status races cannot produce net welfare gains—they are pure redistribution of relative standing, not genuine value creation; (2) Status competition is structurally endless—there is no "enough" because the goal is relative rank, which has no natural satiation point; (3) Resources allocated to Status contests are largely wasted from a collective welfare perspective—they represent effort spent on relative positioning rather than on meeting needs or enabling intrinsic pursuits. AIM identifies zero-sum Status competition as the primary pathology of post-appetitive societies: once basic needs are met, surplus resources increasingly flow into positional races that generate no net well-being while intensifying inequality and mimetic tension. This is why Bounded M and visibility governance are essential: not to eliminate Status entirely (which is impossible—humans are social comparison machines), but to prevent Status competition from colonizing all domains and determining access to Appetitive floors and Intrinsic opportunities.
Easterlin Paradox The Easterlin Paradox is the empirical observation that beyond moderate income levels, further wealth increases produce little or no gain in life satisfaction, which AIM explains as economies shifting from Appetitive-dominant growth (genuinely improving A-sufficiency) to Mimetic-dominant growth (inflating positional goods and Status competition) without corresponding investment in Intrinsic infrastructure, causing wM to rise while wA stabilizes and wI stagnates, producing higher GDP without gains in Freedom or Well-Being. Explanation: Richard Easterlin's 1974 finding created a puzzle for economics: within countries, richer people are happier than poorer people, but across countries and over time, rising GDP does not correlate with rising happiness. AIM resolves the paradox: early economic development primarily expands A-sufficiency (more people have adequate food, shelter, healthcare), which genuinely improves well-being. But once Appetitive sufficiency is widespread, additional income increasingly chases positional goods—luxury markers, status symbols, speculative assets—which are zero-sum. The marginal dollar shifts from A-valuable (reducing deprivation) to M-intensive (funding Status races). Since Status competition produces no net well-being gains and constantly resets reference points (the hedonic treadmill effect), GDP rises but average life satisfaction plateaus. The solution from AIM's perspective is not degrowth but redirection: steer marginal resources toward Intrinsic infrastructure (education, research, creative capacity, community space) and away from M-intensive positional competition via M-taxation and visibility governance. This would allow GDP growth to resume improving well-being instead of merely escalating Status races.
Opt-Out Preservation Opt-Out Preservation is the institutional capacity for Individuals to refuse M-participation without forfeiting A-sufficiency or I-access—ensuring that people can walk away from conflicts, bubbles, polarised theatres, or toxic arenas without losing access to housing, jobs, or basic respect, and maintaining structural alternatives to M-intensive pathways at every level where M-escalation might otherwise lock Individuals into participation.
Explanation: The Opt-Out Paradox demonstrates that M-escalation becomes irreversible when refusal means A-deprivation. At advanced stages of M-escalation (Stage 5 of the Six-Stage Trajectory), access to A-sufficiency becomes contingent on M-participation: the buyer who won't pay €800,000 cannot get shelter; the worker who won't pursue credentials cannot get employment; the citizen who won't adopt group hatreds faces social exclusion. Under these conditions, recognising that the price is M-inflated does not, by itself, produce an A-adequate alternative—the recognition is correct but the exit path is blocked by institutional design. Opt-Out Preservation addresses this by ensuring: (1) multiple pathways to A-sufficiency (not all requiring market success at M-inflated prices); (2) low-Status alternatives that provide equivalent A-function; (3) exit rights from M-intensive institutions; and (4) recognition that choosing not to compete is legitimate. Opt-Out Preservation is the fourth dimension of M-Management alongside Observability Suppression, A-Sufficiency Universalisation, and I-Infrastructure Protection—failure on any single dimension allows M-escalation to proceed toward Stage 6. (Institutional Construct)
Visibility Governance Visibility Governance is the deliberate institutional management of what is seen, by whom, and with what consequences—treating observability as a design variable rather than an absolute virtue, calibrating visibility to support Appetitive security, Intrinsically Motivated agency, Fairness, choice quality, and genuine accountability while minimising gratuitous Mimetic pain (envy, humiliation, rivalry) that serves no functional purpose.
Explanation: Visibility Governance operationalises Humane Visibility and Bounded M through concrete institutional design. It asks, in each context, whether making an outcome or comparison public mainly helps people stay safe, learn, and hold power to account, or whether it mostly fuels Status competition and comparative suffering with no real gain. If a piece of information would, when publicised, merely turn an unavoidable frustration into a public defeat—a failed bid at a housing auction, a lost promotion, a child's small failure—Visibility Governance recommends keeping that information off-stage or restricting its audience. This leads to designs like: sealed bids instead of public auctions; anonymous peer review instead of named rankings; Low-Theatre court procedures instead of televised spectacle; outcome dashboards for regulators instead of personality-driven political shows; separating competence feedback (private, skill-focused) from rank feedback (not published). Visibility Governance reduces M-Harm by making it harder to weaponise visibility, protects I-domains by removing the pressure to perform for an audience, and slows the Confabulation Cascade by reducing the social evidence stream that updates others' Source Beliefs. (Institutional Construct / Normative Principle).
M-Tax (Mimetic Tax) M-Tax (Mimetic Tax) is a targeted levy on the Mimetic Premium (P_M)—the portion of a good's price or an asset's return that arises from Status competition, hype, and visibility rather than Appetitive function or Intrinsic productivity—used to compress mimetic rents in high-M sectors and redirect resources toward A and I.
Explanation: The idea is to measure how much extra people are paying just for Status or speculative buzz, and tax that slice more heavily while leaving the underlying functional or Intrinsically valuable component lightly taxed or untaxed. By shrinking the easy profits from mimetic arms races, an M-Tax makes maximum-observability sectors less attractive as Status casinos and nudges capital and talent back toward goods and projects that actually meet needs or support meaningful work. Implementation requires the capacity to identify M-led enterprise and estimate P_M—which preference-collapse economics cannot provide but AIM decomposition can. Current tax systems treat enterprise income as homogeneous; AIM suggests this conflates structurally different phenomena (income from I-led enterprise primarily enables continued Intrinsic engagement; income from M-led enterprise primarily funds Status competition and P_M extraction). M-taxation would be one component of a broader system of Visibility Governance and Bounded M, working alongside Blind Pricing, Observability Suppression, and A-Floor provision. (Proposed Intervention)[3]
Leadership Compression Theorem The Leadership Compression Theorem is the principle that concentrated political power compresses the temporal distance between individual mimetic shock and societal crisis, creating structural vulnerability that population-level interventions cannot adequately address, because an M-captured leader with command authority, information control, A-leverage, and appointment power can administratively impose crisis trajectories regardless of where the collective posterior sits.
Explanation: The standard Six-Stage Mimetic Crisis Trajectory operates through population-level dynamics—collective belief shifts, scapegoat convergence, violence escalation. But concentrated executive authority creates a bypass: a single M-shocked leader can impose crisis outcomes through administrative action without waiting for population consensus. Historical validation is striking: Hitler never achieved majority electoral support (peak 37.3%), yet completed institutional capture within eighteen months and imposed persecution and war through executive action. The theorem generates specific architectural requirements: multiple concurrent authorities for irreversible decisions, mandatory delay provisions, distributed cancellation authority, and selection mechanisms with anti-mimetic constraints. In the case of nuclear war, there is no conceivable situation where the initiating use of nuclear weapons can be justified to secure A and I needs for the leader’s population. Population-level Knowledge Patch distribution is necessary but insufficient—leadership architecture must be designed to prevent single-point M-capture from producing civilisational harm.
Epistemic Status: Framework-Specific Theorem
Emergent Parasitism Theorem The Emergent Parasitism Theorem is the principle that the Mimetic Premium (P_M) constitutes emergent parasitism in the technical rather than metaphorical sense, meeting four conditions: (1) Host Dependency—M cannot generate independent Objects; (2) Resource Extraction—P_M > 0 on all M-contaminated Objects; (3) Self-Amplification—compound interest, mimetic contagion, and reference-point escalation produce self-reinforcing growth; and (4) Host-Viability Constraint—extraction is bounded by host survival requirements, producing Parasitic Equilibrium → Parasitic Overshoot dynamics.
Explanation: This theorem establishes that the Mimetic Premium is not merely metaphorically parasitic but satisfies the formal conditions for emergent parasitism. Host Dependency: M-desire cannot exist independently—it requires A-objects or I-objects to amplify. Resource Extraction: P_M represents real resources flowing to status signalling beyond appetitive necessity or intrinsic quality. Self-Amplification: the Mimetic Flywheel compounds—each M-transaction generates further M-demand through observability and social proof. Host-Viability Constraint: extraction cannot exceed what hosts can provide, creating the characteristic boom-bust pattern as systems oscillate between Parasitic Equilibrium (extraction sustainable) and Parasitic Overshoot (extraction exceeds regeneration capacity). The theorem predicts that unmanaged M-dynamics will produce cyclic crisis rather than stable equilibrium.
Epistemic Status: Framework-Specific Theorem
2.5 Epistemological and Philosophical Concepts Apex M-Dysfunction Apex M-Dysfunction is the characteristic pathology of Individuals who have achieved maximum M-success (wealth, power, Status) yet remain locked in escalatory M-competition, unable to exit despite possessing the material resources that would permit opting out, exhibiting insatiable positional striving, inability to access I-domain engagement, and paradoxically elevated urgency despite objective security, demonstrating that M-capture is not resolved by M-success but intensified by it. Explanation: Apex M-Dysfunction explains exactly why and how “Absolute Power corrupts Absolutely” – because at the summit of the mimetic mountain all remaining comparisons are threats from below—and the only direction to go is down. It provides the clearest diagnostic evidence that Status pursuit operates independently of A-grounded need. Individuals at the apex—billionaires, autocrats, celebrities—continue M-competition with the same intensity as those struggling for basic sufficiency, despite having resources that could fund generations of A-security and unlimited I-opportunity. The dysfunction manifests as: (1) continued accumulation past any conceivable use value (multiple mega-yachts, competing private space programs); (2) extreme sensitivity to relative position (rage at being second-richest rather than richest); (3) inability to sustain I-domain engagement (perpetual distraction, restlessness, boredom); and (4) escalating visibility investment (ever-larger displays of wealth and power). Apex M-Dysfunction falsifies the assumption that M-pursuit is instrumental to A-security—if it were, success would produce satiation. Instead, success resets reference points and escalates desire, confirming that M operates through a distinct mechanism (relative comparison) that cannot be satisfied absolutely. At national scale, leaders suffering Apex M-Dysfunction endorse confabulated enemies because their own M-dynamics have reached structural unsatisfiability, and the scapegoat provides the only available explanation for why success has not produced satisfaction. (Framework-Specific Construct)
Source-Tagging Source-tagging is the hypothesized cognitive capacity to encode and retain metadata about the origin of motivational signals—whether a desire arose from Appetitive deficit, Intrinsic engagement, or Mimetic transmission—such that at the point of conscious awareness the Individual could in principle distinguish "I want this because I am hungry" from "I want this because others want it," enabling reflective evaluation of motivational source before acting.
Explanation: Source-tagging is the ideal state that Source Opacity violates. In principle, the brain could track motivational origin the same way episodic memory tracks contextual details ("I learned this fact in 3rd grade from Mrs. Johnson"). Different motivational systems initially activate in distinct brain regions—hypothalamus for A, dopaminergic midbrain for I, mirror neurons for M—so the information theoretically exists to tag sources at the moment of activation.
However, within the first ~0-300 milliseconds after a stimulus, these source-specific circuits feed their outputs into the common-currency integration system (ventromedial prefrontal cortex and ventral striatum). This integration collapses three unlike inputs into a single scalar value signal-a dimensionality reduction that necessarily discards source information. By the time conscious awareness comes online (typically around 300-500 milliseconds), the integration has already occurred. The Individual experiences unified wanting ("I want X") without access to source breakdown ("this wanting came from A/I/M").
This neural architecture makes automatic source-tagging after integration impossible through direct introspection. The output is "value = X," not "value = X because [A/I/M]." Manual source-tagging (via I-Override and the Two-Question Diagnostic) is a compensatory workaround that uses inference from available information-bodily states for A, audience-dependence for I, elimination for M-rather than a restoration of the original neural capacity. In practice, therefore, effective source-tagging at the level of lived decision-making is usually a reconstructive, post-integration process rather than direct access to preserved tags.
Code Drift Analogy The Code Drift Analogy is the conceptual equivalence between software exception handling and cognitive Confabulation, in which the brain creates agent-based explanations for felt deficits (analogous to exception handlers for apparent bugs) to permit cognitive closure and action, when the actual problem is distributed elsewhere in the system (institutional M-capture, preconscious mimetic transmission), producing accumulated technical debt (grievances, institutionalised exclusions, self-reinforcing prejudices) that makes future accurate diagnosis progressively more difficult.
Explanation: Just as software developers create exception handlers for apparent bugs to allow program execution to continue—sometimes without identifying the root cause, which may be code drift elsewhere in the codebase—the brain creates Confabulations that permit cognitive closure without addressing actual causes. These patches accumulate: each scapegoating cycle produces temporary relief but leaves the underlying M-drift unaddressed, while adding new grievances and institutional structures that further obscure the true dynamics. The analogy captures both the functional logic (patches allow the system to run) and the pathological accumulation (technical debt compounds until the system fails catastrophically). This explains why societies can scapegoat for generations without resolving the underlying instability/deficit—each "fix" adds complexity that makes the next accurate diagnosis increasingly difficult/intractable.
Epistemic Status: Framework-Specific Construct
Compensatory Pathway Analogy
The Compensatory Pathway Analogy is the canonical framing whereby the Knowledge Patch is understood to function analogously to neuroplastic reorganisation following brain damage-establishing a downstream compensatory circuit that achieves source discrimination through deliberative processing, conceptual categories, and inferential reasoning when the native preconscious source-tagging architecture cannot deliver this function, with the analogy holding on four dimensions: (1) neither restores original function, (2) both become more automatic with practice, (3) both achieve functionally equivalent outcomes, and (4) both operate within rather than eliminate architectural constraints.
Explanation. The analogy clarifies the Knowledge Patch's mechanism and necessity. Native source-tagging is architecturally impossible-Source Opacity results from dimensionality reduction during common-currency integration, and information structurally discarded cannot be recovered by any neuroplastic reorganisation. However, just as the visual cortex can reorganise after damage to support alternative processing pathways, the deliberative I-system can develop a compensatory procedure that achieves source discrimination through inference from available information (bodily states, audience-dependence, model-tracking) rather than through direct access to source-tags.
The analogy captures why the Knowledge Patch is necessary rather than merely helpful: the brain cannot develop a workaround for detecting M if the category "M" does not exist in the cognitive repertoire-just as compensatory neural reorganisation requires intact tissue to recruit.
Architectural Boundary. Preconscious M-detection cannot be restored. Mimetic transmission (100-300ms) precedes conscious awareness (300-500ms). The compensatory pathway can only achieve rapid post-hoc recognition, not interception of the acquisition event itself.
Epistemic Status: Framework-Specific Theoretical Construct.
Epistemic Suspension Epistemic Suspension is the cognitive capacity to tolerate "I don't know" (i.e. doubt) as a stable closure state when faced with Information Gaps, resisting the architectural pressure toward immediate Confabulation by accepting uncertainty as a viable response that satisfies the demand for cognitive closure while leaving the actual causal question open for investigation.
Explanation. The brain's demand for causal explanation is not inherently a demand for accurate explanation—it is a demand for any explanation that allows downstream processes to proceed. In ancestral environments, "I don't know" was unstable because it left the organism in an alarm state without actionable direction. In modern environments, "I don't know" can function as stable closure if the Individual: (1) accepts uncertainty as tolerable, recognising that not knowing the source of a desire does not prevent functional decision-making; (2) treats uncertainty as informative data—the absence of identifiable A or I explanations suggests possible M-origin; and (3) defers action pending investigation rather than rushing to narrative closure. Epistemic Suspension is the foundational skill required for I-Override to function correctly under Source Opacity conditions. Without it, the discomfort of uncertainty triggers Confabulation as the brain rushes to achieve closure. With it, the Individual can sustain interrogation long enough for diagnostic tests (the Two-Question Diagnostic, audience-removal thought experiments) to operate. Epistemic Suspension is not a default human capability—it must be trained—and contemporary environments systematically punish uncertainty, creating population-level disposition toward rapid Confabulation rather than sustained investigation. Epistemic Status: Framework-Specific Construct.
Epistemic Suspension Capacity
Epistemic Suspension Capacity is the acquired cognitive skill of tolerating uncertainty in any domain when true answers exceed available evidence or computational tractability, treating "I don't know" as sufficient closure for the time being rather than an emergency requiring immediate narrative generation, thereby preventing the installation of confabulated priors that would compound across domains and produce lock-in toward the Individual Fixed Point, while simultaneously preserving open questions as genuine frontiers for I-engagement through curiosity and mastery-seeking.
Explanation. Epistemic Suspension is the upstream mechanism that maintains Individual Subcriticality. By providing "I don't know" as a form of cognitive closure that does not require narrative generation, it interrupts the Confabulation Compounding process at each iteration. The closure is sufficient but not comfortable. Discomfort remains, but it is tolerable, and the question remains open for future revisitation when more tractable information may become available. The capacity is domain-general because confabulations compound across domains. A confabulated self-explanation can become a template for confabulated causal attribution, and vice versa. Beyond its defensive function, Epistemic Suspension serves I by preserving open questions as territory for genuine inquiry rather than closing them through pseudo-answers that terminate curiosity. The capacity can taught and consolidated through neuroplastic practice, making it distributable as a component of the Knowledge Patch.
Epistemic Status: Framework-Specific Construct.
Template Template is a cognitively available category for social inference—a schema that an Individual can deploy when interpreting others' behaviour, beliefs, or motivations—which becomes available through self-model inversion (contrast categories) or, activation-priming (guilt, salience, recent use), or positive association (success, affiliation, trust), and which is deployed with varying thresholds depending on its current activation level. Templates can generate positive inferences (halo effect, in-group favorability, trust-based assumptions), negative inferences (contrast categories, guilt-primed attributions), or neutral functional categorizations.
Explanation. Templates are not neutral descriptive categories but inferential tools with varying accessibility that serve essential functions in social cognition by reducing cognitive load and enabling rapid social coordination. An Individual does not consider all possible explanations for others' behaviour and select the best fit; rather, they deploy available templates—those currently activated and cognitively cheap to apply. Templates can be positive (attributing competence to successful individuals, assuming good intentions from trusted friends, the halo effect where positive impressions in one area influence other areas), negative (contrast categories from self-model inversion, guilt-primed attributions), or neutral (role-based expectations, situational defaults). Template availability explains why the same behaviour may be interpreted differently by different observers: each observer deploys the templates that are most accessible to them, which depend on their self-model, recent experiences, and emotional state, and relationship to the target. Templates deployed with low evidential threshold—requiring minimal behavioural evidence before application—produce systematic attribution patterns that may not reflect the target's actual motivations. The template-availability account of Projection replaces Freudian repression-and-displacement mechanisms with architecturally simpler operations but often serve functional purposes in social coordination and relationship maintenance. The vernacular account of Projection focuses on negative template deployment: self-model inversion generates contrast categories automatically, and guilt-priming elevates activation of guilt-connected templates, making them deploy readily regardless of whether they accurately describe either self or other. But the same architectural mechanisms that produce negative Projection also produce positive attributions, in-group favoritism, and trust-based cooperation.
Epistemic Status: Framework-Specific Construct, integrating cognitive schema theory with AIM architecture.
Self-Model Inversion Self-Model Inversion is the automatic cognitive operation by which an Individual's self-model—their understanding of who they are and what they value—generates contrast categories that become available as templates for interpreting others, such that if the self-model includes trait X (e.g., "honest," "hardworking," "genuinely interested"), then not-X (e.g., "dishonest," "lazy," "status-seeking") becomes a cognitively available template deployable to explain others' behaviour.
Explanation. Self-Model Inversion explains why Individuals readily perceive in others the inverse of traits they attribute to themselves, even when the perception is inaccurate. The contrast category is cognitively cheap—it requires minimal inference because it is simply the inverse of a self-attributed trait. When the Individual observes behaviour that deviates from their self-model, the contrast template is immediately accessible as an explanation. Critically, these templates are available whether or not they accurately describe the Individual. If the Individual's self-model is confabulated—if they mistakenly believe they are Intrinsically motivated when in fact they are Mimetically driven—the contrast template ("Others are status-seeking") remains available and will be deployed to explain others' behaviour, even though the Individual themselves is status-seeking. Self-Model Inversion is one of two primary pathways through which templates become available for Projection; the other is Guilt-Priming.
Epistemic Status: Framework-Specific Construct.
Guilt-Priming Guilt-Priming is the elevation of template activation caused by guilt signals generated by the moral-monitoring systems, such that templates describing behaviours connected to the guilt become highly salient and deploy with low evidential threshold when interpreting others' behaviour, regardless of whether the Individual consciously recognises the source of their guilt or the connection between their own behaviour and the deployed template.
Explanation. Guilt is an aversive signal generated when behaviour deviates from internalised norms or threatens social bonds. Due to Source Opacity, guilt signals are not tagged with their source—the Individual experiences guilt but may not know why. The guilt signal has two effects: (1) Template Activation—the behaviour connected to the guilt becomes a highly salient cognitive category, sitting at the top of the inferential stack ready for deployment; and (2) Inference Bias—when the Individual observes others' behaviour, the primed template is applied with low threshold, and ambiguous behaviours are interpreted through the primed template. This mechanism explains why Projection often targets the very behaviours the projecting Individual is engaging in, creating the appearance of Freudian defence when the mechanism is simpler: the Individual's unrecognised behaviour generates guilt, the guilt primes the template, and the primed template deploys readily to explain others. The Individual cannot recognise this mechanism because each link in the chain—source of guilt, template activation, connection between self and template—is opaque due to Source Opacity and Confabulation.
Epistemic Status: Framework-Specific Construct, extending affect-cognition research within AIM architecture.
Vocabulary Gap (M-Specific) Vocabulary Gap is the absence in vernacular explanatory frameworks of conceptual categories adequate to identify Mimetic transmission as a motivational source, such that when an Individual attempts to explain an M-driven desire, the correct answer ("I want this because I preconsciously acquired this desire through observation of models") is not among the available response options, forcing Confabulation through available A or I categories regardless of I-Override effort. Explanation. Appetitive vocabulary is rich and inferentially transparent ("I'm hungry," "I'm tired," "I'm cold")—these map reliably to bodily states accessible to introspection. Intrinsic vocabulary is reasonably developed ("I'm curious," "I enjoy this," "It's meaningful")—these map to engagement states that persist in private. Mimetic vocabulary is effectively absent. The concept "I want this because observation of models inflated its value in my Decision Hub through preconscious mirror-neuron activation" does not exist in everyday discourse. "Envy" captures a narrow slice but carries moral stigma and does not describe the architectural mechanism. "Keeping up with the Joneses" acknowledges the phenomenon colloquially but provides no actionable category for Source-tagging. "Peer pressure" implies conscious awareness and volitional resistance—neither of which applies to preconscious M-transmission. The Vocabulary Gap is M-specific because A and I misattributions are inferentially correctable through ordinary experience (eating reveals hunger; audience-removal reveals Intrinsic persistence), whereas M-misattribution is inferentially opaque (acting on M-desires does not reveal their source because M-desires do not satiate and social context does not cleanly separate). The AIM taxonomy resolves the Vocabulary Gap by providing the third category required for accurate Source-tagging. Epistemic Status: Framework-Specific Construct.
Content-Channel Asymmetry Content-Channel Asymmetry is the principle that what spreads through mimetic channels can enable resistance to mimetic dominance if the content itself is I-enabling (providing stable conceptual vocabulary, diagnostic tools, and Source-tagging capacity) rather than M-amplifying (providing status signals, scarcity cues, or audience-dependent validation).
Explanation: Not all mimetically-transmitted content is equivalent. M-amplifying content—rage-bait, trending topics, status competitions, scarcity-driven urgency—intensifies the Mimetic Treadmill. I-enabling content—conceptual frameworks, diagnostic tests, structural analysis tools—provides the capacity to slow and eventually step off the Mimetic Treadmill. The AIM Framework is I-enabling content: once acquired, it permits the Individual to evaluate whether further engagement is I-led or M-captured. This asymmetry resolves the apparent paradox of using M-channels to spread M-resistance: the channel is mimetic, but the content is the antidote. The distinction matters for policy: not all viral content is equivalent in utility, and platforms can prioritise I-enabling over M-amplifying spread.
Epistemic Status: Framework-Specific Construct
Introspection Illusion The introspection illusion is the systematic error in which Individuals believe they have transparent conscious access to the causes of their own behaviour and motivations, when in fact conscious awareness is limited to post-integration outputs from the Decision Hub (the unified wanting signal) without access to the source decomposition, leading to confident but confabulated explanations that misattribute Mimetic sources to Appetitive necessity or Intrinsic values.
Explanation: The introspection illusion is why self-report data about motives is weak evidence in AIM. People genuinely believe they know why they want what they want. When asked, they provide confident, coherent explanations. But these explanations are generated by the conscious narrative system after the Decision Hub has already integrated A, I, and M signals, and that narrative system has no privileged access to source information—it sees only the unified output ("I strongly want X"). So it confabulates: it generates a plausible story about why X is appealing based on culturally available narratives (rationality, authenticity, values) rather than on the true motivational source. The introspection illusion is not lying or self-deception; it is an architectural limitation. Consciousness cannot inspect its own inputs; it can only observe its outputs and then construct explanatory narratives. This is why AIM insists on behavioural signatures and context analysis over verbal reports: the illusion ensures that people will sincerely misattribute M-driven behaviour to A or I, and no amount of honest introspection can correct this because the information simply isn't available to consciousness.
Projection
Projection is Confabulation applied to others—the generation of sincere but inaccurate explanations for other Individuals' motivational states, using cognitively available Templates drawn from the projecting Individual's self-model, cultural repertoire, and activated categories.
Explanation. Projection is not a separate mechanism from Confabulation—it is Confabulation, extended from self to other. The same Information Gap that prevents accurate self-attribution prevents accurate other-attribution: Source Opacity makes others' true motivational sources inaccessible, theProjection faces two compounding Information Gaps: (1) the projecting Individual cannot accurately identify their own motivational sources due to Source Opacity, limiting the templates available for inference; and (2) the projecting Individual cannot directly observe the other Individual's mental states or motivational sources-they have no privileged access to whether the other person's desire arose from Appetites, Intrinsic Motivation, or Mimetic Desire. The Vocabulary Gap further excludes M as an available explanatory category, and the brain's demand for cognitive closure forces completion with available templates drawn from the projecting Individual's self-model and cultural repertoire.
The valence of projection varies (positive, negative, or neutral), but the inaccuracy is structural. Whether the Individual projects "they're driven by genuine passion" (positive) or "they're evil" (negative), bon Cascadeatioth attributions are confabulated if the actual source was Mimetic—and the Mimetic attribution cannot occur because the template does not exist. This extends the invisibility of Mimetic dynamics from individual self-understanding to collective social understanding: an entire population confabulating each other's motivations using templates that systematically exclude the M-category.
Choice Blindness Choice blindness is the empirically demonstrated phenomenon where Individuals, when presented with choices they did not actually make (via experimental manipulation), fail to notice the switch and confidently generate justifications for the choice they did not select, revealing that the link between choice and justification is weak and post-hoc rather than causally tight and introspectively transparent. Explanation: In Johansson et al.'s (2005) experiments, subjects chose between options (e.g., photographs of faces), but through sleight of hand, experimenters swapped their choice for the non-chosen option and then asked them to explain their choice. Most subjects failed to notice the swap and immediately generated coherent justifications for the option they had rejected seconds earlier. This demonstrates that (1) people do not have reliable introspective access to the reasons for their choices, and (2) justifications are constructed on-demand after the fact from plausible-sounding narratives, not retrieved from memory of the actual decision process. Choice blindness is direct evidence for the confabulation mechanism: the narrative system will rationalize whatever choice is presented to it, regardless of what actually motivated the selection. For AIM, this validates the claim that conscious explanations of Source ("I wanted this because...") are unreliable and that behavioural signatures provide better evidence than introspection.
Problem of the Priors The problem of the priors is the foundational question in Bayesian epistemology—where do initial probability assignments P(H) come from before any evidence is observed?—which classical Bayesianism answered either through principles of indifference (assign equal probability to all hypotheses) or through subjective personalism (priors are rationally unconstrained inputs), with the washing-out theorem providing reassurance that initial priors don't matter because evidence eventually dominates—a reassurance AIM shows fails under Source Opacity. Explanation: Thomas Bayes' 1763 theorem shows how to update beliefs given evidence, but it requires starting with prior probabilities P(H) for each hypothesis. Where do these come from? If priors are arbitrary, how can Bayesian reasoning be objective? Classical responses: (1) Principle of indifference—assign equal probability when you have no reason to favor one hypothesis over another (Laplace). Problem: paradoxes arise from how you partition hypotheses. (2) Subjective priors—accept that priors are personal starting points, but insist that with enough evidence, posteriors will converge regardless of priors (Savage, Jeffreys, Lindley). This second response became dominant, and the washing-out theorem made it seem acceptable: "Priors don't matter much because evidence swamps them." But AIM identifies the failure mode: when evidence is endogenously generated through confabulation, priors shape evidence which updates priors which shapes evidence, creating self-reinforcing cycles that lock in false equilibria. The problem of the priors was never solved—it was deferred by assuming independent evidence, an assumption that fails under Source Opacity.
Six-Stage Mimetic Crisis Trajectory Six-Stage Mimetic Crisis Trajectory is the canonical pathway through which a system moves from stable coordination to catastrophic breakdown when Mimetic Desire dominates without corrective architecture, comprising: A/I-grounded baseline: Acquirable Objects track real needs; minimal stratification reflects genuine A/I variation M-amplification: Mimetic premiums inflate perceived value beyond A/I-justification; PM begins accumulating; early position-holders extract rents Common-currency hijack: Status panic experienced as literal survival threat; competition intensifies; middle strata squeezed Concealment infrastructure: Complexity and ideology hide PM; stratification locked in; structural unsatisfiability emerges Structural unsatisfiability: Every concession resets reference points; extreme stratification; opt-out becomes incredibly difficult Catastrophic reconfiguration: Violent destruction of PM through mass death, institutional collapse, or system-wide default; temporary equality reset to stage 1 through PM-destruction Explanation: The Six-Stage Trajectory explains how mimetic escalation unfolds at societal scale and why periods of reduced inequality following catastrophes (the Black Death, World Wars) are not exceptions to M-driven stratification but confirmations of it. Stage 6 is not system failure in the sense of deviation from normal operation—it is the completion of the M-escalation trajectory before the cycle renews, the only mechanism by which accumulated P_M can be destroyed when concealment infrastructure fails and the gap between M-inflated demands and A/I-reality becomes undeniable. Post-crisis equality is therefore a return to Stage 1, not an alternative equilibrium. The A/I-bases remain—houses still provide shelter, land still grows crops—but the P_M that had accumulated on top of these bases has been destroyed. The system has not achieved a new stable state; it has merely reset the cycle. (Framework-Specific Theorem) Unified Crisis Theorem Unified Crisis Theorem is the principle that mimetic crisis is the attractor state under unmanaged conditions—the mathematically entailed outcome when Bayesian updating operates on a system characterised by Source Opacity, Confabulation, and public expression of narratives—such that the crisis is not an empirical hypothesis requiring separate validation but a deductive corollary from established premises about human cognitive architecture. Explanation: The Unified Crisis Theorem follows as a mathematical derivation, not an additional empirical claim: If common-currency integration destroys source labels (Established Neuroscience) If confabulation fills the gap (Established Psychology) If confabulations are treated as evidence (cognitive science) If posteriors become priors (mathematical tautology) If people express their narratives publicly (observable) If others weight social evidence (Established Social Psychology) Then crisis is where the system goes unless actively deflected. The derivation reveals that crisis is the default trajectory—the place the mathematics tends toward unless something actively prevents it. The felt certainty that "my desires are mine" is not evidence of authenticity; it is the signature of a Confabulation Cascade nearing completion. Critically, the same mathematics that entails crisis also entails that subcriticality is maintainable—deflection requires injecting probability mass into H_M before Bayesian Lock-In completes. (Framework-Specific Theorem)
Mimetic Flywheel Mimetic Flywheel is the self-reinforcing cycle whereby M-success generates visibility, visibility attracts mimetic attention, mimetic attention inflates PM, inflated PM funds further visibility acquisition, and each rotation increases both the speed of the cycle and the entry barriers for those not already on the flywheel, producing runaway accumulation dynamics that appear as "natural" market success while actually reflecting M-capture of the observability gradient. Explanation: The Mimetic Flywheel explains why wealth and status tend to concentrate without apparent ceiling, even when the underlying A/I value does not justify the accumulation. A celebrity's endorsement raises product visibility → visibility triggers mimetic transmission → consumers develop M-inflated desire → sales generate revenue → revenue funds more celebrity endorsements → the cycle accelerates. At each rotation, the flywheel spins faster: more visibility, more mimetic transmission, more PM extraction, more resources to acquire visibility. Those already on the flywheel accumulate exponentially; those not on it face ever-higher barriers to entry. The flywheel dynamic explains the Easterlin Plateau at civilizational scale: beyond A-sufficiency, additional GDP primarily funds M-competition through visibility acquisition, not welfare improvement. Managing the flywheel’s speed requires interrupting the visibility-to-mimesis-to-revenue-to-visibility cycle through observability suppression, P_M taxation, or I-infrastructure that provides alternative pathways to wellbeing. (Framework-Specific Construct) Comfortable Confabulation Comfortable Confabulation is a confabulated explanation that achieves cognitive closure while avoiding implications that would threaten the Individual's self-concept, status, or group membership. The brain systematically selects these explanations over uncomfortable truths because cognitive closure is functionally required, social costs of uncomfortable truths are immediately experienced, while epistemic costs of confabulation are diffuse and delayed, and social proof from others sharing the same confabulation provides strong Bayesian evidence supporting the comfortable narrative. Explanation: Comfortable confabulations win not because Individuals are stupid or evil but because they satisfy all functional requirements while minimizing costs. When an Individual experiences felt deficit, the brain generates candidate explanations. "They are taking what I deserve" is comfortable because it: (1) preserves self-worth by locating the problem externally, (2) identifies an actionable target by providing someone to blame or punish, (3) receives social reinforcement when others with similar belief (likely also a confabulation) validate the narrative, and (4) achieves cognitive closure by providing a complete explanation that stops the search for an answer. The immediate social costs of questioning this narrative (being marked as deviant, losing group membership, facing sanctions) are experienced now, while the epistemic costs (being wrong, targeting innocents, missing true causes) are diffuse, delayed, and may never be experienced if the confabulation is socially shared. The Academic Confabulation Thesis extends this dynamic to scholarly inquiry: researchers systematically avoid research questions that would implicate themselves in uncomfortable roles (predator, perpetrator, complicit participant) and instead frame research to position themselves as neutral observers or sympathetic victims. (Framework-Specific Construct)
Uncomfortable Truth Uncomfortable Truth is an accurate explanation that would require revising cherished beliefs, acknowledging complicity in harmful systems, or accepting unflattering self-knowledge. These truths are systematically avoided not because evidence is unavailable but because accepting them imposes immediate social and psychological costs (loss of self-concept coherence, group membership threat, status reduction) while providing no actionable target and often requiring sustained discomfort without resolution. Explanation: Uncomfortable truths lose the competition against comfortable confabulations even when evidence supports them because they fail functional requirements. "My desires are mimetically acquired and cannot be satisfied" is uncomfortable because it: (1) threatens self-concept by undermining belief in autonomous selfhood, (2) provides no actionable target because it provides nothing to blame or punish that would resolve the deficit, (3) receives social sanction whereby others experiencing the same mimetic deficit will mark truth-tellers as deviant, and (4) requires sustained discomfort because accepting structural unsatisfiability means living with unresolvable tension. For example, the uncomfortable truth that humans are apex predators with sophisticated scapegoat-selection systems is rarely acknowledged or addressed across academic disciplines because accepting it would require researchers to examine themselves as potential perpetrators rather than neutral observers. The uncomfortable truth that much of what we experience as "authentic preference" is mimetically acquired, is avoided because it threatens the autonomous self-concept that modern Western culture treats as foundational. Uncomfortable truths about mimetic dynamics have been available throughout human history (Girard, Veblen, Smith) but remain marginal because they require accepting complicity in dynamics we would prefer to attribute to others. (Framework-Specific Construct)
The key distinction: Comfortable Confabulation explains why we systematically arrive at false but psychologically protective explanations, while Uncomfortable Truth explains why accurate but threatening explanations are systematically avoided even when evidence supports them.
2.6 Empirical and Neuroscientific Concepts Ventromedial Prefrontal Cortex (vmPFC) The ventromedial prefrontal cortex (vmPFC) is the region of the brain, located at the lower/medial aspect of the frontal lobe, that serves as the primary integration hub for common-currency valuation, receiving inputs from appetitive circuits (hypothalamus, insula), intrinsic reward systems (dopaminergic midbrain), and social-reward circuits (mirror neurons, ventral striatum), and producing a unified subjective value signal that predicts choice behaviour across diverse reward types, with the neuroimaging evidence showing that vmPFC activation magnitude scales with subjective value regardless of whether the reward is food, money, social approval, or intrinsic satisfaction. Explanation: The vmPFC is where the AIM integration equation is physically instantiated. Levy and Glimcher's (2012) meta-analysis across hundreds of studies shows that vmPFC consistently encodes subjective value: when people evaluate options—regardless of domain—vmPFC activity correlates with "how much do I want this?" and predicts subsequent choice. Critically, the response magnitude for equivalent subjective values is similar across reward types: $50 that feels "worth it" produces similar vmPFC activation to food that feels equally desired to social approval of similar subjective intensity. This is the neural signature of a common currency: unlike inputs (food, money, status) are converted to a unified metric (subjective value). The vmPFC's central role in integration is also why lesions to vmPFC produce trans-domain impairments: patients show disrupted decision-making across appetitive choices, gambling, and social interactions, suggesting vmPFC is a bottleneck through which all motivations pass to produce coherent action.
Ventral Striatum (VS) / Nucleus Accumbens The ventral striatum (VS), particularly the nucleus accumbens (NAcc), is the subcortical dopaminergic region that encodes reward prediction, incentive salience (wanting), and critically for AIM, social comparison and relative reward, with neuroimaging showing that VS activation tracks not absolute reward magnitude but relative standing compared to reference others, making it the neural substrate of Mimetic Desire and Status sensitivity. Explanation: While vmPFC integrates value, ventral striatum encodes reward prediction and relative comparisons. Fliessbach et al. (2007) demonstrated that VS activation is highest not when subjects earn the most absolute money, but when they earn more than a peer: earning €120 while a peer earns €30 produces higher VS activation than earning €120 alone or earning €60 when a peer earns €60. This is direct neural evidence that the brain encodes social comparison: the VS is computing relative standing, not just absolute payoff. For AIM, this makes VS a key component of the M-system: it receives inputs from social observation (mirror neurons detect what others are pursuing) and outputs reward signals based on where the Individual stands relative to others. The VS also mediates dopamine-driven wanting (Berridge's incentive salience), which explains why Status competition can feel as urgent as hunger: both activate VS, and under Source Opacity, the Decision Hub cannot distinguish the sources.
Readiness Potential (RP) The readiness potential (RP) is the slow negative shift in electrical potential measured over motor cortex (via EEG) that begins 350–800 milliseconds before conscious awareness of intention and 800–1500 milliseconds before the executed voluntary action, demonstrating that neural preparation for action precedes conscious decision, thereby creating a temporal window during which preconscious inputs (including Mimetic signals at 100–300 ms) shape choice architecture before consciousness can intervene.
Explanation: Benjamin Libet’s 1983 experiments recorded RP while subjects performed spontaneous voluntary actions (such as flexing a wrist) and reported when they consciously “decided” to act. The RP (neural preparation) began hundreds of milliseconds before conscious intention, which itself preceded the muscle movement. For AIM, the key point is architectural, not metaphysical: there is a measurable lag between when the brain starts preparing an action and when consciousness becomes aware of “deciding.” Preconscious Mimetic inputs arrive and are integrated during this lag. By the time the person can ask “do I really want this?” the Decision Hub has already combined A, I, and M into a single urgency signal. Conscious veto remains possible, but awareness is late and works on an already-shaped option set. RP thus underwrites the claim that Source Opacity is structural: it follows from timing constraints in motor preparation, not just from inattention or laziness.
Incentive Salience Incentive salience is Kent Berridge's term for the dopamine-mediated motivational "wanting" system that drives approach behaviour, effort expenditure, and craving toward Objects, functioning independently of opioid-mediated hedonic "liking" (pleasure, satisfaction), such that wanting can intensify without corresponding increases in liking, enabling Mimetic Desire to produce intense urgency for status targets that provide minimal or declining hedonic satisfaction.
Explanation: Incentive salience is the brain's "go get it" signal, the strength of pull toward an Object and the willingness to expend effort to obtain it. Berridge's work shows that this signal is mediated by dopamine in regions like nucleus accumbens and can be turned up or down without changing how pleasurable the outcome actually feels. Opioid systems, by contrast, mediate hedonic "liking", the enjoyment or satisfaction once the Object is obtained. Because these systems dissociate, a person can intensely "want" a status good, speculative asset, or social victory that they do not especially "like" once obtained. AIM relies on this dissociation to explain why Mimetic Desire is non-satiating: M heavily activates incentive salience but delivers weak and short-lived liking. Status races therefore feel urgent and addictive, yet victories quickly go flat, driving further pursuit rather than resolution.
Framing Principles Framing Principles are the normative communication requirements for describing AIM interventions and outcomes such that interventions are presented as:
achievable (partial measures produce measurable effects);
scalable (mass/social media distribution reaches relevant populations);
non-utopian (does not require fundamental transformation of human nature); and
sustainable (structural interventions compound over time);
while avoiding language that suggests elimination of: M (architecturally impossible); permanent resolution (ongoing maintenance will always be required); universal adoption (partial uptake that maintains subcriticality is sufficient); or perfection (comparative improvement over status quo is the standard).
Explanation: The Framing Principles exist because how you describe an intervention determines whether people can understand it, support it, and implement it without triggering the very mimetic dynamics you're trying to manage. If you frame AIM interventions as "we will eliminate Mimetic Desire and achieve permanent harmony," you create three problems: (1) you're lying because Source Opacity is structural and cannot be eliminated; (2) you trigger utopian mimetic competition where different groups compete over whose perfect vision should dominate; (3) you set up inevitable disappointment when perfection fails to materialize, discrediting the entire framework. The Framing Principles require honesty about what is achievable: we can maintain Authenticity Belief, P(H_authentic). The mathematics that produces catastrophe is also the mathematics that permits prevention, therefore ensuring that these countermeasures for avoiding catastrophe remain practical is key.
Core Theorems Stratification Inevitability Theorem The Stratification Inevitability Theorem is the principle that in high M systems, structural stratification is an inevitable outcome of mimetic escalation and Mimetic Premium (P_M) extraction, such that apparent reductions in inequality following catastrophic crises represent only temporary resets in a recurring cycle rather than stable departures from stratifying dynamics.
Explanation: The theorem resolves an apparent puzzle in economic history: periods of reduced inequality following catastrophes (the Black Death, World Wars) have been treated as exceptions to persistent stratification trends. AIM reframes these as confirmations—they represent Stage 6 of the Six-Stage Mimetic Crisis Trajectory, where catastrophic reconfiguration destroys P_M through violent means. Post-crisis equality is not a stable alternative equilibrium but a temporary reset to Stage 1. The theorem rests on five linked propositions: (1) M operates on A/I-objects and inflates their value beyond satisfiability; (2) M has no satiation mechanism because Status is comparative; (3) common-currency integration produces A-urgency for M-targets; (4) M-escalation produces structural stratification through P_M extraction; and (5) opt-out becomes structurally impossible at advanced stages. Historical evidence shows post-plague reconstitution took 100–150 years; post-WWII reconstitution took approximately 40 years—suggesting modern observability infrastructure accelerates the M-escalation cycle.
Self-Application Theorem Self-Application Theorem is the principle that the AIM Framework functions as debugging software for human motivation, providing the conceptual vocabulary required for I-Override to decompose integrated urgency signals and restore Source-tagging; this self-application is architecturally grounded in that AIM identifies the conditions for its own effectiveness (A-security, practice, social support, conceptual vocabulary) and the limitations of its reach (preconscious transmission cannot be prevented, only recognised post-hoc), enabling at the individual level recognition of confabulated causation and redirection of causal inference toward structural analysis.
Explanation: The AIM Framework is not merely explanatory but therapeutically self-applying. Once an Individual acquires AIM vocabulary, they possess the conceptual categories required to perform I-Override: they can ask “is this urgency Appetitive, Intrinsic, or Mimetic?” and use behavioural tests (satiation dynamics, audience-removal, model-tracking) to answer. Without these categories, the question cannot be formed, and Confabulation completes by default. AIM provides the debugging tools its own architecture identifies as necessary—making the framework a cognitive technology, not just a theoretical description. The debugging operations include: (1) stack trace—Source-tagging to identify which system generated the signal; (2) root cause analysis—tracing urgency to actual mimetic transmission or A-deficit; (3) refactoring—restructuring choices to address actual cause, not symptom; and (4) exception removal—withdrawing confabulated blame once true cause is identified. Dissemination Precedence Theorem Dissemination Precedence Theorem is the principle that institutional reform toward AIM-aligned flourishing requires prior or concurrent population-level acquisition of AIM conceptual vocabulary through existing mimetic channels (prestige-biased learning, platform visibility, social proof), with the use of M-transmission to spread I-enabling content being strategically necessary rather than paradoxical, and with reform proposals that outpace conceptual dissemination being predictably experienced as elite imposition triggering mimetic resistance; the sequence must be: conceptual seeding → vocabulary diffusion → reform articulation → structural implementation. Explanation: Institutional reform requires political will; political will requires public understanding of what is wrong and what would be better; public understanding requires conceptual vocabulary. Without the AIM taxonomy, populations cannot distinguish genuine A-deficits from M-amplified felt deficits, policy debates conflate all preferences as equivalent (the undifferentiated utility error), reformers lack the vocabulary to articulate what visibility governance or I-infrastructure would accomplish, and resistance to M-dominant institutions is experienced as deviance rather than as correction. The conceptual vocabulary is not merely explanatory—it is politically constitutive. Reform proposals that cannot be articulated cannot be demanded. AIM must therefore spread through existing mimetic channels—using the very dynamics it describes—to reach the threshold where reform becomes articulable and supportable. This is Positive Mimesis: the copied behaviour is acquiring the conceptual tools that permit M-management.
Information Gap Theorem Information Gap Theorem is the principle that Confabulation of agent-based causation for A/I deficits occurs not because deliberative cognition fails to engage, but because the true causes—preconscious mimetic transmission, diffuse institutional capture, Entanglement—exceed the computational tractability of available causal-inference systems; even I-led System 2 processing, when engaged, produces elaborated Confabulations rather than accurate diagnosis because it operates on incomplete data; the Confabulation serves the functional purpose of providing cognitive closure that allows downstream threat-response and social-coordination processes to operate.
Mimetic Bargain Theorem The Mimetic Bargain Theorem is the principle that human mimetic capacity-preconscious copying of goals, values, and desires from observed models—is the architectural foundation of cumulative cultural evolution, enabling knowledge transfer at scales no other species has achieved; however, this same architecture necessarily produces (1) Source Opacity, whereby M-amplified urgency is experienced phenomenologically as A-survival-threat, (2) Information Gap, whereby the true causes of M-captured deficit exceed the computational tractability of available causal-inference systems, and (3) Confabulation completing as agent-based causation, producing scapegoat-identification that enables lethal action experienced as necessary self-defence; because these features are intrinsic to the mimetic architecture rather than separable defects, they cannot be evolutionarily removed without destroying the cumulative-culture capacity they enable, and the only available intervention is a knowledge-based patch—conceptual vocabulary that permits I-Override to intercept confabulated causation before action—of which the AIM Framework is the first systematic instantiation.
Explanation: The Mimetic Bargain Theorem explains why humanity simultaneously possesses extraordinary cultural capacity and recurring catastrophic failure modes. Mimesis-the preconscious copying mechanism operating at 100-300ms-is what makes humans capable of cumulative culture. Unlike genetic evolution (slow, generational) or individual learning (limited by one lifetime), mimetic transmission allows knowledge, skills, and adaptations to spread horizontally across populations and accumulate vertically across generations. This is why humans dominate the planet despite being physically unremarkable. But the same architecture that enables this capacity necessarily produces systematic vulnerabilities. Source Opacity is not a separable bug-it is intrinsic to the speed advantage. Mimetic transmission must occur at 100-300ms to be useful (conscious deliberation at 300-500ms would be too slow for real-time social learning). But this preconscious speed means the acquisition occurs before conscious awareness, making source-tracking impossible. The Information Gap follows: when A/I deficits arise through complex mimetic dynamics (entanglement, positional competition, stratification), the true causes exceed what human causal cognition can tractably compute, and agent-based confabulation completes because brains require actionable explanations. Scapegoating is the output: an identified agent that can be targeted to resolve the deficit. This produces cycles of collective violence that reset mimetic escalation through catastrophic means. The theorem is a "bargain" because the benefits and costs are inseparable-you cannot have the cultural capacity without the vulnerability. Evolution cannot remove the vulnerability because doing so would require removing the preconscious speed that makes mimesis valuable. The only intervention point is post-acquisition: conceptual vocabulary (the AIM taxonomy) that enables I-Override to catch confabulated agent-attribution before it produces scapegoating. This is why the Knowledge Patch strategy targets vocabulary distribution-it is the only available intervention that does not require changing human neural architecture. (Framework-Specific Theorem)
Academic Confabulation Thesis The Academic Confabulation Thesis is the principle that scholarly frameworks exhibit the same confabulation dynamics they describe, producing systematic blind spots when accurate description would implicate researchers themselves in uncomfortable ways, confabulation completes with available comfortable explanations that achieve cognitive closure while systematically avoiding uncomfortable territory through morally-motivated selection of research questions, framing choices, and agent-type taxonomies.
Explanation: The Academic Confabulation Thesis predicts that academic frameworks will omit categories, questions, or computational systems that would reveal researchers as predators, perpetrators, or complicit participants rather than neutral observers or sympathetic victims. The thesis operates across disciplines: Economics assumes autonomous preferences (avoiding mimetic transmission and positional competition), psychology attributes behaviour to individual character (avoiding mimetic contagion and entanglement), moral philosophy treats moral vocabulary as independent ethical inquiry (avoiding its function as scapegoat justification), and agency-detection research (HADD literature) frames humans as vulnerable prey with defensive vigilance (avoiding the uncomfortable truth that humans are apex predators with sophisticated prey-detection and target-selection systems). In each case, researchers faced an uncomfortable truth and confabulated a comfortable completion that achieved cognitive closure, received social reinforcement, and systematically avoided examining the systems that would reveal mimetic architecture. The pattern is identical across domains: discomfort-avoidant framing produces systematic omissions that conceal mimetic dynamics. The Academic Confabulation Thesis explains why disciplinary priors-each field's foundational assumptions-form an interlocking concealment architecture: economists could not question preference exogeneity because psychologists assured them introspection was reliable; psychologists could not question introspection because philosophers assured them the autonomous self was real; philosophers could not question autonomy because religions framed covetousness as moral failure implying it was correctable. Questioning any single prior would require questioning all of them simultaneously. The same discomfort-avoidant confabulation that operates at individual scales (Source Opacity producing post-hoc narratives) and collective scales (scapegoating producing agent-based causation for systemic problems) operates at academic scales through morally-motivated selection of research questions that systematically avoid implicating observers in uncomfortable roles. This is not conspiracy but emergent structure-individual gatekeepers genuinely believe they are maintaining standards, and their resistance feels like principled methodological concern, but the aggregate effect is preservation of the architecture that conceals the three-source structure. (Framework-Specific Metatheoretical Claim)
Moral Vocabulary Displacement Theorem Moral Vocabulary Displacement Theorem is the principle that in scapegoat-attribution contexts, moral vocabulary ("responsibility," "justice," "accountability," "they deserve consequences") functions not as independent ethical reasoning but as permission-seeking infrastructure for targeting; a justification layer that converts prey-selected targets into legitimate objects of action while preserving the phenomenology of righteous response; moral framing deployed after diagnostic test-failure therefore cannot rebut the Presumption Against Scapegoating, because the framing is generated by the same confabulation architecture that produced the agent-attribution, not by independent ethical evaluation.
Explanation: The theorem explains why moral arguments feel compelling yet fail to resolve conflicts or address actual causes. When the Information Gap produces agent-based confabulation, the brain requires justification for the remedial action it is preparing. Moral vocabulary provides this justification by transforming "I want to target them" into "they deserve to be targeted." The moral reasoning is sincere, the person genuinely believes in the ethical framework they are applying, but it is generated downstream of the confabulation, not independently of it. The key diagnostic: if moral vocabulary is deployed only after the three-test battery has failed (Immediacy Test, Mechanism Test, Authorship Test), it is functioning as permission-seeking rather than genuine ethical evaluation. The practical redirect ("what would actually solve the problem?") is not amoral pragmatism displacing ethics, it is what ethics requires once we understand that moral vocabulary in scapegoat contexts functions as targeting permission.
Confabulation of Agent-based Causation Confabulation that an Agent caused the A/I deficit. This occurs not because deliberative cognition fails to engage, but because the true causes-preconscious mimetic transmission, diffuse institutional capture, Entanglement-exceed the computational tractability of available causal-inference systems; even I-Override (I-led System 2 processing), when engaged, produces elaborated Confabulations rather than accurate diagnosis because it operates on incomplete data; the Confabulation serves the functional purpose of providing cognitive closure that allows downstream threat-response and social-coordination processes to operate.
Explanation: Human causal cognition evolved primarily to detect and model agents; Predators, Prey, Rivals, Collaborators. The brain's threat-detection systems, social reasoning circuits, and theory-of-mind architecture all converge on agent-based causation as the default mode of explanation. When the question "why do I lack X?" requires an answer: agent-based answers ("someone is blocking me from getting it") activate well-developed neural machinery, while systemic answers (diffuse institutional processes, preconscious mimetic transmission, complex feedback loops) require abstract reasoning that these circuits cannot naturally perform. The brain cannot backward-trace through five layers of institutional mediation any more than it can mentally factor large prime numbers. The Confabulation system does not choose to produce agent-based answers, it can only produce what the underlying cognitive architecture supports. Scapegoating emerges because agentive causation is what human brains compute.
Culture Culture, in AIM terms, is the emergent population-level distribution of heuristic AIM weight profiles—particularly wM weights and their associated Object-valuations—transmitted and stabilised over time via Entanglement dynamics, comprising (1) which Objects carry Mimetic Premium within the population, (2) which comparison-sets structure felt adequacy, (3) which models transmit prestige-biased content, and (4) which institutional structures crystallise these distributions into durable forms; cultural universals derive from shared neural architecture, while cultural particulars derive from divergent entanglement histories and environmental constraints.
Explanation: Culture, in AIM terms, is what happens when millions of Individuals, each with the same three-source motivational architecture, copy each other's desires over time through Entanglement. Because Entanglement means everyone is simultaneously model and imitator, the patterns of what people want, what they compare themselves against, and what they treat as high-Status eventually stabilise into recognisable regularities: this society values martial honour; that one values scholarly achievement; another values conspicuous wealth. These regularities are population-level weight distributions—rough averages inferred from behaviour across many Action Episodes—not precise measurements, because actual AIM weights remain latent variables that shift with context. What makes cultures different is not different neural wiring (the A-I-M architecture is universal), but different entanglement histories: which models became prestigious, which Objects acquired Mimetic Premium, which visibility structures amplified certain pursuits. A culture where academic prestige dominates has high wM oriented toward scholarly Objects; a culture where warrior honour dominates has high wM oriented toward martial Objects—the underlying mimetic mechanism is identical. Institutions function as crystallised Entanglement: they are formal structures (rituals, laws, visibility architectures, prestige hierarchies) that stabilise particular weight distributions by controlling who is visible, what is comparable, and which models acquire transmission power. Cultural change operates through Mimetic Drift at population scale: when high-status models within an entangled system adopt different weight-profiles, prestige-biased transmission ensures population-level shift over generations. Cultural crisis represents transition from Bounded M to supercritical entanglement states—when stabilising structures fail and mimetic escalation runs unchecked through the Six-Stage Mimetic Crisis Trajectory toward catastrophic reconfiguration.
Prey Prey is the agent-type category in human causal cognition characterising agents who occupy a structural position of vulnerability (reduced capacity to retaliate), visibility (observable and identifiable), and reciprocity-exemption (outside the exchange network that would make targeting costly)—triggering cognitive systems that evolved to identify opportunities for low-cost resource extraction, and constituting the fourth exhaustive agent-category alongside predators, collaborators, and rivals
Explanation: Human survival required not only detecting threats (predators), cooperation opportunities (collaborators), and resource competition (rivals), but also identifying agents from whom resources could be extracted without triggering costly retaliation. The cognitive systems performing this function operate through inverse criteria to predator-detection—tracking weakness rather than strength, isolation rather than alliance, out-group membership rather than in-group solidarity. Prey-detection explains why scapegoat targets are drawn from vulnerable populations: the selection mechanism operates through prey-identification even when the framing mechanism operates through predator-attribution. This produces the Dual-Role Confabulation signature: targets are selected because they are vulnerable (prey-characteristics) but framed as if they are threatening (predator-characteristics). The logical incoherence—"they are so powerful they threaten us, yet we can safely target them"—is the diagnostic marker of confabulated scapegoating. Genuine predator-identification exhibits selection-framing coincidence: the agent is targeted because they are threatening, not despite being vulnerable. (Framework-Specific Agent-Type)
Predator Predator is an agent-type category in human causal cognition characterising entities that exhibit capability and hostile intent indicators—triggering threat-avoidance systems that evolved to detect dangers requiring defensive response, including environmental hazards, aggressors, competitors, and any agent whose approach behaviour, size, weapons, or posture signals immediate danger to the observer's survival or well-being.
Explanation: Predator-detection operates through intrinsic threat cues rather than relational positioning—a tiger is dangerous regardless of the observer's social network or reciprocity status. The cognitive systems implementing predator-detection compute objective features: capability (size, strength, weapons), hostile intent (approach behaviour, aggressive posture), and urgency (proximity, speed of approach). These are non-relational properties—they describe the predator's features, not the observer's position relative to it. Predator-detection systems exhibit asymmetric error costs: false positives (detecting non-existent threats) are metabolically cheaper than false negatives (missing actual threats), producing the hyperactive agency detection pattern that cognitive science documents extensively. In genuine threat scenarios, selection criteria and framing criteria coincide—the agent is targeted because they are threatening, with predator-characteristics triggering predator-detection systems that produce defensive responses calibrated to the actual danger level. (Framework-Specific Construct, drawing on HADD literature)
Collaborator Collaborator is an agent-type category in human causal cognition characterising entities that present reciprocity opportunities—agents with whom mutually beneficial exchange, alliance formation, or cooperative action is possible, triggering detection systems that assess reliability indicators, potential for mutual benefit, and trustworthiness to determine whether reciprocal engagement would yield positive-sum outcomes for both parties.
Explanation: Collaborator-detection evolved to identify agents with whom cooperation yields better outcomes than competition or avoidance—allies, trading partners, coalition members, and reciprocal exchange relationships that enhance survival and resource acquisition through coordination rather than conflict. The cognitive systems implementing collaborator-detection compute trust signals (consistent behaviour, reputation, in-group markers), reciprocity capacity (ability to provide value in exchange), and alignment indicators (shared goals, compatible incentives). Unlike predator-detection (which focuses on threat) or prey-detection (which focuses on vulnerability), collaborator-detection assesses mutual benefit potential—whether the agent can and will reciprocate cooperative overtures. Successful collaborator-identification enables the complex social networks, division of labour, and reciprocal altruism that characterise human societies, providing adaptive advantages through coordination that neither party could achieve alone. (Framework-Specific Construct, drawing on evolutionary psychology and cooperation research)
Rival Rival is an agent-type category in human causal cognition characterising entities pursuing the same scarce resources or positional goods—agents whose goal-directed behaviour targets objects, status positions, or opportunities that cannot be simultaneously possessed by multiple parties, triggering detection systems that assess relative position, competitive capability, and likelihood of zero-sum conflict over the contested target.
Explanation: Rival-detection evolved to identify same-target pursuit—situations where another agent's success directly reduces the observer's probability of acquisition, requiring competitive strategies rather than cooperative or defensive ones. The cognitive systems implementing rival-detection compute relational variables: relative capability (can they outcompete me?), goal overlap (are we pursuing the same target?), and positional dynamics (who is ahead in the competition?). Rival-detection differs from predator-detection (which signals danger requiring avoidance) and prey-detection (which signals extraction opportunity)—rivals are neither threats to survival nor vulnerable targets, but competitive equals or near-equals contesting scarce resources or status positions. In modern environments, rival-detection interfaces extensively with mimetic desire systems because mimetic transmission produces same-target convergence—when multiple agents acquire desires by observing the same models, they become rivals by definition, competing for positionally scarce goods (prestige, status, recognition) even when material resources are abundant. (Framework-Specific Construct, drawing on evolutionary game theory and rivalry research)
Dual-Role Confabulation Dual-Role Confabulation is the characteristic signature of scapegoat-attribution in which the target is simultaneously selected through prey-detection criteria (vulnerability, visibility, reciprocity-exemption) and framed through predator-attribution (threatening, taking, blocking)—producing a logically incoherent but psychologically functional narrative that permits targeting of vulnerable agents while experiencing the targeting as defensive response to threat.
Explanation: The dual-role structure is architecturally required for scapegoating because: (1) selection must follow prey-criteria because targeting actual predators is dangerous; while (2) framing must follow predator-criteria because targeting prey without threat-framing would be experienced as unjustified aggression rather than defence. The dual-role signature is diagnostic of confabulation because genuine predator-identification exhibits selection-framing coincidence—the agent is identified as threatening and framed as threatening – because they are. When prey-selection combines with predator-framing, the attribution is confabulated with near-certainty. The Selection-Framing Coincidence Test operationalises this: "If they are as powerful as described, why can we target them without expecting overwhelming retaliation?" reveals the incoherence. Historical scapegoats—Jews in medieval Europe, Tutsis in Rwanda, Rohingya in Myanmar, Armenians in Turkey —consistently exhibit the dual-role signature: selected because vulnerable (minority, identifiable, lacking powerful allies) but framed as threatening (controlling finance, planning genocide, threatening the nation). The signature provides a reliable diagnostic for distinguishing accurate attribution from confabulation.
(Framework-Specific Diagnostic).
Dual-Role Confabulation Signature Dual-Role Confabulation Signature is the diagnostic marker of confabulated scapegoating in which the target is simultaneously selected through prey-detection criteria (vulnerability, visibility, reciprocity-exemption—the target can be persecuted without triggering costly retaliation) and framed through predator-attribution (threatening, taking, blocking—the target is described as dangerous and causally responsible for deficits), producing a logically incoherent but psychologically functional narrative that permits targeting of vulnerable agents while experiencing the targeting as defensive response to threat. Explanation. The dual-role structure is architecturally required for the Scapegoat Mechanism to function: (1) Selection must follow prey-criteria because targeting actual predators is dangerous—the cognitive systems that evolved for survival do not recommend attacking genuinely threatening agents without overwhelming force; (2) Framing must follow predator-criteria because targeting prey without threat-framing feels like aggression—the brain's moral-licensing systems require perceived threat to authorise violence. The signature is diagnostic because genuine predator-identification exhibits selection-framing coincidence: the agent is targeted because they are threatening (predator-selection matches predator-framing). When prey-selection combines with predator-framing, the attribution is confabulated with near-certainty. The Selection-Framing Coincidence Test operationalises this: "If they are as powerful and threatening as described, why can we target them without expecting overwhelming retaliation?" Historical scapegoats (Jews in medieval-20th century Europe, Tutsis in Rwanda, Rohingya in Myanmar, Armenians in Turkey) consistently exhibit the dual-role signature: selected because vulnerable (minority, identifiable, lacking powerful allies) but framed as threatening (controlling finance, planning genocide, threatening the nation). Epistemic Status: Framework-Specific Diagnostic, derived from Four-Type Agent Taxonomy (Chapter 8) and Scapegoat Mechanism.
Selection-Framing Coincidence Test Selection-Framing Coincidence Test is the diagnostic procedure for distinguishing accurate agent-attribution from confabulated scapegoating, operationalised through the question: "If they are as powerful and threatening as described, why can we target them without expecting overwhelming retaliation?"—with coincidence between selection criteria and framing criteria indicating potential accuracy, and non-coincidence (prey-selection combined with predator-framing) indicating confabulation with near-certainty. Explanation. Genuine predators cannot be safely targeted by groups lacking superior force. If a target can be persecuted, expelled, sanctioned, or attacked by those claiming to be threatened by it, then the target was selected through prey-detection (vulnerability, reciprocity-exemption), not predator-detection (capability, hostile intent)—regardless of how the targeting is framed. In genuine threat scenarios, the agent exhibits predator-characteristics, these characteristics trigger predator-detection systems, selection occurs because of the predator-characteristics, and framing matches selection—the threat is real. In confabulated scapegoating, the agent exhibits prey-characteristics, these characteristics trigger prey-detection systems for target selection, but the Confabulation requires predator-framing for justification—framing contradicts selection, and the threat is constructed. The test therefore reveals the logical incoherence that marks confabulation: the target cannot simultaneously be so powerful as to constitute existential threat and so weak as to be safely targetable. Epistemic Status: Framework-Specific Diagnostic.
Non-Malice Corollary Non-Malice Corollary is the principle that if Confabulation is routine, universal, and sincere (generated by ordinary cognitive architecture operating under Source Opacity, not by deceptive intent), then most conflict involves two (or more) sincere confabulators rather than one truth-teller confronting one deceiver—each party experiences their position as obviously correct, experiences the other's resistance as evidence of bad faith, and cannot recognise that both positions may be confabulated explanations for Mimetically-generated urgency.
Explanation. The Non-Malice Corollary reframes the phenomenology of disagreement. The standard experience—"I am obviously right, and their resistance proves bad faith"—is revealed as the signature of Confabulation collision, not as evidence about the other party's intentions. When both parties feel maximally certain, both parties' Confabulation cascades have likely converged. The intensity of disagreement is not proportional to how wrong one party is; it is proportional to how complete both parties' cascades have become and how thoroughly the relevant structural explanations have been excluded from both parties' hypothesis spaces. This explains the paradox of intractable disputes: the more certain each party feels, the less likely resolution becomes—not because one party is more malicious, but because both parties' self-models have locked in and neither possesses the conceptual vocabulary that would allow them to step outside their confabulated frame. The Corollary does not claim malice never exists (it does), but that assuming malice as explanation for disagreement is itself a confabulation-compatible move that prevents recognition of the structural dynamics generating the conflict. Epistemic Status: Framework-Specific Corollary, derived from Confabulation architecture and Source Opacity.
Moral Vocabulary Displacement Theorem Moral Vocabulary Displacement Theorem states that in the context of agent-based causal attribution for felt deficits, moral vocabulary ("they are responsible," "they have obligations," "justice requires accountability") functions not as legitimate ethical inquiry but as the justification layer of confabulated scapegoating, providing permission for targeting by transforming aggression into righteousness—such that engagement with moral framing on its own terms strengthens the Scapegoat Mechanism, and redirection to practical effectiveness ("Would targeting them restore your access?") is the only response that does not provide scapegoat justification.
Explanation. The theorem establishes three claims: (1) Moral vocabulary is not parallel to scapegoating—it is constitutive of scapegoating. The moral question is not a separate inquiry that happens to accompany scapegoat narratives; it is the mechanism by which scapegoat narratives achieve permission. Historically, religious vocabulary served this function ("sacrifice," "purification," "cosmic duty"); in secular contexts, moral vocabulary has inherited the function entirely ("accountability," "justice," "responsibility"). (2) Engaging moral questions on their own terms strengthens the mechanism. When someone asks "But don't they have a moral responsibility?" and receives the response "Perhaps, but...," the "perhaps" concedes the frame. The Scapegoat Mechanism has received partial permission. (3) AIM's practical focus is not strategically preferable but theoretically mandatory. If moral vocabulary is scapegoat infrastructure, then the only non-scapegoating frame is practical: "Would targeting them restore your access?" The practical redirect is not amoral pragmatism displacing ethics—it is what ethics requires once we understand that moral vocabulary in scapegoat contexts functions as targeting permission rather than independent inquiry. Epistemic Status: Framework-Specific Theorem.
Propagation Pathways (Collective Confabulation) Propagation Pathways are the transmission mechanisms through which individually-generated Confabulations achieve collective uptake and population-level convergence: (1) Prestige-biased learning—preferential copying of beliefs expressed by high-status models, transmitting Confabulations regardless of accuracy because the source is prestigious; (2) Social proof—using the distribution of beliefs across the population as evidence for validity, amplifying Confabulations once they achieve initial uptake because observers cannot distinguish independent convergence from dependent copying; and (3) Mimetic template transmission—propagation of generalizable narrative patterns (not just specific claims) that others deploy to explain their own desires, making Confabulation recursive as templates are copied, deployed, expressed, observed, and copied again.
Explanation. The critical insight is that Confabulations propagate through the same channels as accurate information—there is no inherent feature marking a narrative as confabulated vs. veridical when expressed. Both appear as "Individual A says X" to observers. Both are incorporated through the same learning mechanisms. The propagation system does not filter for accuracy; it filters for transmissibility—cognitive closure achieved, social coordination enabled, emotional resonance generated. Propagation rates depend on network topology: high-connectivity nodes (influencers, media) broadcast Confabulations to many receivers simultaneously; clustered networks (in-groups, professional communities) produce local convergence and "confabulation dialects"; bridge individuals (connected to multiple clusters) transmit across group boundaries, enabling system-wide convergence. The result: Confabulations can achieve population-level saturation faster than accurate information because they satisfy functional demands immediately, whereas accurate information may require costly verification, complex reasoning, or uncomfortable implications that slow uptake. Epistemic Status: Framework-Specific Construct, integrating cultural evolution research with AIM architecture.
Code Drift Analogy Code Drift Analogy is the conceptual parallel between genetic mutations propagating through biological populations and Confabulations propagating through social networks—with selection operating in both cases not on accuracy but on transmission success, such that Confabulations spread and compound when they achieve cognitive closure and enable social coordination regardless of whether they correctly identify causal mechanisms, producing population-level convergence toward shared false narratives through ordinary transmission dynamics rather than coordinated deception. Explanation. In biological evolution, genetic mutations propagate when they increase reproductive fitness, not when they reflect some external truth. Harmful mutations can spread through drift (random fluctuation in small populations), hitchhiking (linkage to beneficial mutations), or meiotic drive (biased transmission). Similarly, Confabulations propagate when they achieve transmission success—cognitive closure, social coordination, emotional resonance—not when they accurately identify causal mechanisms. A Confabulation that is false but socially compelling (identifying an agent-based cause that enables coordinated response) can outcompete accurate but complex explanations (identifying systemic causes that require distributed intervention). The analogy illuminates why collective Confabulation does not require conspiracy or coordinated deception: just as species can evolve maladaptive traits through ordinary evolutionary processes, populations can converge on false narratives through ordinary transmission processes. Selection at the level of transmissibility, not accuracy, is sufficient to explain the phenomenon. Epistemic Status: Framework-Specific Analogy.
Emergent Systemic Dynamics Emergent Systemic Dynamics refers to population-level outcomes—resource distributions, status hierarchies, access patterns, felt deficits—that arise from the aggregated operation of many Individuals' A-I-M motivated actions interacting through institutional structures, without any Individual or identifiable group having designed, intended, or controlled the aggregate outcome, and which therefore cannot be accurately attributed to agent-based causation despite the brain's architectural default toward such attribution. Explanation. The term replaces "institutional capture" (which implies a single institution being captured by identifiable agents) and "diffuse institutional capture" (which retains the capture framing). Emergent Systemic Dynamics correctly identifies that many of the causes producing collective felt deficit—housing unaffordability, credential inflation, positional arms races, economic inequality—are not designed by anyone. They emerge from distributed Mimetic dynamics (aggregated M-driven purchasing decisions producing price spirals), institutional path-dependencies (rules created for different contexts producing unintended consequences), and feedback loops (success breeding success, visibility breeding visibility) that no Individual or group controls. The Information Gap Theorem establishes that these causes exceed the computational tractability of available causal-inference systems, which is why the brain defaults to agent-based attribution even when the actual causes are emergent and systemic. Accurate diagnosis requires the conceptual vocabulary to recognise emergence—without it, the brain completes the Information Gap with confabulated agent-based explanations, producing scapegoating rather than systemic intervention.
Epistemic Status: Framework-Specific Construct.
Selection-Framing Coincidence Test The Selection-Framing Coincidence Test is the diagnostic procedure for distinguishing accurate agent-attribution from confabulated scapegoating, operationalised through the question: If they are as powerful and threatening as described, why can we target them without expecting overwhelming retaliation? The test examines whether the features that led to target selection (prey-characteristics versus predator-characteristics) coincide with the features invoked in the justificatory framing (threat versus vulnerability), with coincidence indicating potential accuracy and non-coincidence indicating confabulation.
Explanation: Genuine predators cannot be safely targeted by groups lacking superior force; if a target can be persecuted by those claiming to be threatened by it, the selection occurred through prey-detection regardless of how the targeting is framed. In genuine threat scenarios, the agent exhibits predator-characteristics (capability, hostile intent), these characteristics trigger predator-detection systems, selection occurs because of the predator-characteristics, and framing matches selection—the threat is real. In confabulated scapegoating, the agent exhibits prey-characteristics (vulnerability, reciprocity-exemption), these characteristics trigger prey-detection systems for target selection, but the Confabulation requires predator-framing for justification—framing contradicts selection, and the threat is constructed. Historical scapegoats—Jews in medieval to 20th century Europe, Tutsis in Rwanda, Rohingya in Myanmar, Armenians in Turkey—consistently exhibit this signature: selected because vulnerable (minority, identifiable, lacking powerful allies) but framed as threatening (controlling finance, planning genocide, threatening the nation). The test therefore provides a reliable diagnostic: when prey-selection combines with predator-framing, the attribution is confabulated with near-certainty.
(Framework-Specific Diagnostic)
2.7 Terms Section Introduction [DIAGRAM PLACEHOLDER: Bayesian Confabulation Loop] Visual showing cyclical process: E_n (phenomenological evidence) → Bayesian Update → Posterior Belief → becomes Prior for next iteration → shapes interpretation of E_{n+1}. With branch: Posterior expressed publicly → becomes Evidence for Others' updates (Coupled Oscillator dynamics).
The describes how Source Belief evolves over time through iterative updating—and why this evolution systematically drifts toward false certainty that desires are authentic. This section provides the micro-foundation for the Unified Crisis Theorem: it shows not merely that mimetic crisis occurs, but why crisis is the mathematically entailed attractor state given ordinary human cognitive architecture. Understanding the Bayesian mechanism is essential because it reveals crisis to be the default trajectory of minds that tell themselves stories about why they want what they want, then believe those stories, then build on them. The mechanism does not require malice, stupidity, or irrationality. It requires only: a brain that integrates unlike motivational signals into common currency; a narrative system that fills gaps in introspection; treating one's own stories as evidence; and talking to other people. Each step is what humans naturally do. The also reveals the intervention point. The same mathematics that permits crisis permits prevention. Subcriticality is maintainable—but maintaining it requires seeing the mechanism clearly, which is what this section enables. Notation: Throughout this chapter, P with subscript (e.g., P_M) denotes price. P with parentheses (e.g., P(H), P(H|E)) denotes probability or belief.
Content-Agnosticism Canonical Definition Content-Agnosticism is the property of Bayesian belief updating whereby the mechanism that combines priors with evidence into posteriors operates identically across all subject matters, containing no internal variable for the truth, moral value, or crisis-potential of the beliefs being updated. Explanation Content-Agnosticism means the belief-updating process cares only about structure—how confident the Individual already is, and how strongly new information should shift that confidence—not about what the belief is about. The same updating logic applies whether the proposition is “this medicine works,” “this group is dangerous,” or “this desire is authentically mine.” This neutrality is what makes Bayesian updating powerful as a general model of learning, but it also means that if the inputs are systematically distorted—by Source Opacity and Confabulation—those distortions are not corrected by the updating process itself, they are amplified and stabilised.
Content-Trajectory Independence Canonical Definition Content-Trajectory Independence is the principle that, given Bayesian Belief Dynamics, the trajectory of belief change—prior accumulation, pre-filtering, and convergence toward fixed points—is determined by the structure of the updating process and the pattern of inputs, not by the specific content of the beliefs, such that crises can recur with different surface content while following the same underlying path. Explanation Content-Trajectory Independence says that once the updating mechanism and input pattern are fixed, the system’s path is structurally constrained, regardless of which particular story fills in the blanks. Confabulated explanations about career choice, ethnic threat, or moral purity can all ride the same updating machinery to convergence and Lock-In, so historical crises can look completely different on the surface while sharing the same underlying belief trajectory from open priors through compounding Confabulation to self-sealing consensus.
Prior Belief Prior Belief, denoted P(H), is the probability assigned to a hypothesis before observing new evidence, representing the Individual's starting assumption about which motivational source generated a particular want before further examination or reflection. Explanation. Prior Belief is where you start before you look more closely. When you notice yourself wanting something, you implicitly assign probabilities across the three sources—perhaps 50% Appetitive, 30% Intrinsic, 20% Mimetic—based on context, past experience, and your existing self-model. These starting assumptions matter because they shape how you interpret whatever you observe next. If your Prior Belief strongly favours "my desires are authentic," you will interpret ambiguous evidence as confirming authenticity. Prior Beliefs are rarely conscious or numerically precise; they operate as background assumptions that bias subsequent processing. Critically, Prior Beliefs are not fixed—they are the Posterior Beliefs from previous updates, which is why Confabulation at one moment shapes Source Belief at the next.
Evidence Probability Evidence Probability, denoted P(E), is the overall probability of observing a particular piece of evidence regardless of which Source Hypothesis is true, representing how likely the Individual would be to experience a particular want under any circumstances—whether it arose from Appetites, Intrinsic Motivation, or Mimetic Desire. Explanation. Evidence Probability captures how common or surprising a particular experience of wanting is. If you find yourself wanting coffee every morning, that evidence is highly probable regardless of source—it could be Appetitive (caffeine dependence), Intrinsic (enjoyment of the ritual), or Mimetic (workplace norm). High Evidence Probability means the want is unsurprising and therefore less informative about its source. Low Evidence Probability—an unusual or unexpected want—provides stronger signal about which source is likely operating. In Bayes' theorem, Evidence Probability functions as a normalising factor that ensures updated beliefs remain valid probabilities.
Likelihood Likelihood, denoted P(E|H), is the probability of observing the evidence if a particular Source Hypothesis is true, representing how well a given source would explain the experienced want. Explanation. Likelihood answers the question: "If this desire really were Mimetic, how likely is it I would experience it this way?" or "If this desire were Appetitive, how likely is it I would feel this level of urgency?" Different sources predict different experiential signatures. Appetitive wants typically correlate with bodily states (hunger intensifies before meals, diminishes after eating). Intrinsic wants typically persist in private and deepen with engagement. Mimetic wants typically track observability and model behaviour. A compelling Confabulation works by assigning high Likelihood to whichever source the Individual believes is operating—"Of course I feel urgent about this house, shelter is a survival need" (high P(E|H_A))—even when the actual source is Mimetic. Source Opacity means Individuals cannot directly observe which source generated their want, so Likelihood assignments are inferences vulnerable to systematic error. This vulnerability is where Confabulation gains its epistemic purchase: the narrative supplies a Likelihood estimate that feels accurate because it is coherent, not because it is true.
Posterior Belief Posterior Belief, denoted P(H|E), is the updated probability assigned to a Source Hypothesis after observing new evidence, calculated via Bayes' theorem, representing the Individual's revised Source Belief after accounting for a new want or experience. Explanation. Posterior Belief is where you end up after updating on evidence. Bayes' theorem combines your Prior Belief with the Likelihood of the evidence under each hypothesis, normalised by Evidence Probability, to produce a revised probability distribution across A, I, and M. If you started with moderate confidence that your wants are authentic (Prior Belief: 70% A+I, 30% M), and you observe evidence that seems consistent with authentic origin (high Likelihood under H_A or H_I), your Posterior Belief shifts further toward authenticity. Crucially, this Posterior becomes the Prior for interpreting the next want—this is the hinge on which the entire Confabulation Cascade turns. Each update that increases Authenticity Belief makes subsequent Mimetic wants even more likely to be misattributed to A or I, because the Prior now assigns lower probability to H_M before any evidence is even considered.
Source Hypotheses Source Hypotheses, denoted H_A, H_I, and H_M, are the three mutually exclusive and collectively exhaustive hypotheses about which motivational source generated a particular want: H_A: "This want arose from Appetitive need" H_I: "This want arose from Intrinsic Motivation" H_M: "This want arose from Mimetic Desire" Explanation. Source Hypotheses partition the space of possible origins for any experienced want. For any desire, exactly one hypothesis is true at the level of primary causation—the want was predominantly generated by bodily deficit, by self-endorsed engagement value, or by social transmission from models. The Individual's task in Source-tagging is to correctly identify which hypothesis applies. Because the three hypotheses are exhaustive, the probabilities must sum to one: P(H_A) + P(H_I) + P(H_M) = 1. Source Opacity means this identification is difficult; Common-Currency Integration means the phenomenology of wanting does not distinguish sources; Confabulation means the narratives generated to explain wants are systematically biased toward H_A and H_I even when H_M is true.
Source Belief Source Belief is the probability distribution an Individual assigns—consciously or unconsciously—across the three Source Hypotheses for a particular want, represented as the triple P(H_A), P(H_I), P(H_M). Explanation. Source Belief is your best guess about where a want came from. When you feel an urge, you implicitly distribute probability: "This is probably hunger" (high P(H_A)), "This is probably genuine interest" (high P(H_I)), or "I probably want this because others do" (high P(H_M)). Due to Source Opacity, these assignments are often inaccurate. Mimetic desires are routinely misattributed to Appetitive need (the status-driven house purchase experienced as survival necessity) or Intrinsic value (the prestige credential experienced as love of learning). Occasionally Appetitive or Intrinsic signals are themselves mimetically triggered—the contagious yawn feels like fatigue though it was socially cued; the hunger pangs arrive because others started eating. Accurate Source Belief is the precondition for effective I-Override; systematically distorted Source Belief—compounding over time through the Confabulation Cascade—is the precondition for mimetic crisis.
Authenticity Belief Authenticity Belief is the confidence an Individual assigns to their Confabulated causal narrative about a want — the certainty that 'I want this for the reasons I believe I want it.' This is not experienced as P(H_A) + P(H_I) vs. P(H_M), because Individuals typically lack the mimetic hypothesis; rather, it is experienced as certainty that the self-generated explanation is correct. High Authenticity Belief means the Individual does not doubt their causal narrative; low Authenticity Belief means residual uncertainty remains around their causal narrative('maybe my explanation is incomplete'). Explanation. Authenticity Belief collapses the three-source distribution into a binary: authentic (A or I) versus copied (M). This simplification is useful because the critical diagnostic question for I-Override is often not "Is this Appetitive or Intrinsic?" but "Is this mine or borrowed?" When Authenticity Belief approaches 1, the Individual is near-certain their desires arise from bodily need or self-endorsed value. When Authenticity Belief approaches 0, the Individual recognises substantial Mimetic influence. The Bayesian Confabulation Mechanism tends to push Authenticity Belief toward 1 over time regardless of actual source composition—each self-justifying narrative becomes the Prior for interpreting the next want, compounding confidence in authenticity even when wants are predominantly Mimetic. This directional drift toward false certainty is not a bug in human cognition; it is the mathematically inevitable result of Bayesian updating when confabulated narratives are treated as evidence.
Mimetic Recognition (P(H_M)) Mimetic Recognition or P(H_M) is the probability an Individual assigns to the hypothesis that their causal narrative about a want might be incomplete or structurally generated rather than reflecting the want’s true origin—functionally equivalent to residual doubt about Confabulated explanations, and complementary to narrative certainty. In practice, Mimetic Recognition rarely takes the explicit form 'this want is mimetic' because most Individuals lack the conceptual vocabulary; instead, it manifests as residual uncertainty about self-narratives ('maybe my explanation for why I want this is wrong'). Explanation. Mimetic Recognition raises to awareness that a want may have been copied rather than self-generated. Low Mimetic Recognition means the Individual does not suspect social transmission and has little doubt their beliefs are correct; high Mimetic Recognition means active consideration that the desire reflects what models want rather than what the Individual independently needs or values. The Knowledge Patch intervention works by injecting doubt into Confabulated narratives — not necessarily as 'maybe I copied this' (which requires conceptual vocabulary most lack), but as 'maybe my explanation for why I want this is incomplete or wrong.' The Two-Question Diagnostic achieves this through logical elimination: answering 'no' to both questions forces recognition that the self-generated causal story cannot be correct, regardless of whether the Individual conceptualises the residual as 'mimetic.'Mimetic Recognition is the entry point for I-Override: without at least some probability assigned to “This want arose from social contagion”, there is nothing to override, and the Mimetic signal passes through the Decision Hub as if it were Appetitive necessity or Intrinsic value. Once the Confabulation Cascade has driven Mimetic Recognition toward zero, this entry point closes and self-correction becomes structurally impossible.
Subcriticality Threshold Subcriticality Threshold (P_c) is the critical value of certainty in Confabulated causal narratives above which mimetic crisis becomes self-sustaining-meaning Confabulation Cascades lock in faster than corrective mechanisms can arrest them. The threshold operates at all scales: individual (self-narrative certainty forecloses self-revision), small-group (shared narratives become immune to external challenge), organizational (institutional beliefs resist disconfirming evidence), population (collective convergence enables coordinated scapegoating), and leadership (concentrated-authority positions can impose crisis outcomes unilaterally). The mathematics is scale-invariant: Bayesian updating on confabulated narratives produces lock-in whether the system contains one individual, a dozen collaborators, a thousand-person organization, or a million-person population. At each scale, crossing P_c means corrective mechanisms become structurally insufficient, alternative interpretations have been excluded from the hypothesis space, and the system cannot self-correct through ordinary evidence processing. Leadership-level P_c creates unique vulnerability because individuals in concentrated-authority positions (executive command, nuclear authorization, irreversible-decision roles) can administratively impose crisis trajectories that bypass corrective mechanisms operating at all other scales, requiring architectural constraints (distributed authority, mandatory delays, concurrent authorization) specifically designed to prevent single-point M-capture from producing civilizational harm. Explanation. The Subcriticality Threshold defines the boundary between recoverable and runaway mimetic dynamics at every scale of human organization. The same mathematical structure-Bayesian updating on endogenously-generated evidence-operates identically whether the system is an individual forming beliefs about their own desires, a family developing shared narratives about their situation, an organization converging on institutional orthodoxy, or a population achieving consensus on scapegoat attribution. At every scale, below the threshold, corrective mechanisms remain available: individuals can perform I-Override, groups can tolerate dissenting views, organizations can update institutional beliefs when evidence contradicts them, populations retain sufficient doubt that alternative explanations remain viable. Above the threshold at any scale, the system crosses into supercriticality: confabulations compound faster than correction occurs, alternatives become unthinkable rather than merely unlikely, and disconfirming evidence is reinterpreted through the locked-in framework rather than updating it. The intervention requirements are therefore scale-specific but structurally parallel: at individual scale, maintain Epistemic Suspension Capacity to prevent personal fixed-point convergence; at small-group scale, preserve space for dissent and alternative framings; at organizational scale, build feedback mechanisms that can challenge institutional orthodoxy; at population scale, distribute Knowledge Patch vocabulary and maintain institutional buffering; at leadership scale, implement architectural constraints that prevent unilateral action by M-captured individuals in concentrated-authority positions. Leadership-level Subcriticality Threshold deserves special emphasis because it creates asymmetric vulnerability: a single individual crossing their personal threshold can impose crisis outcomes (war declaration, nuclear authorization, emergency powers) that bypass corrective mechanisms operating at all other scales, executing orders through command structures regardless of whether subordinate individuals, organizations, or populations have converged on the underlying narrative. This is why leadership architecture must include distributed decision-making, mandatory delays, concurrent authorization requirements, and continuous monitoring for M-capture indicators-population-level subcriticality is necessary but insufficient when institutional design permits single-point bypass. The exact value of the threshold varies by scale and context, depending on factors including cognitive load, stress levels, institutional architecture, observability infrastructure, conceptual vocabulary availability, and the strength of architectural constraints, but the threshold concept itself is universal: it marks the point where the system loses capacity for endogenous correction and requires external intervention to prevent or escape lock-in. The Subcriticality Threshold is maintainable at all scales precisely because the same Bayesian mathematics that permits crisis also permits prevention-injecting probability mass into alternative hypotheses before lock-in completes can deflect the trajectory at any scale, but the intervention must be calibrated to the scale's specific dynamics and the available corrective mechanisms.
Confabulation (Bayesian Context) Confabulation → See Section 2.1 for comprehensive definition including Bayesian dynamics.
Confabulation Cascade Confabulation Cascade is the process by which individual Confabulations propagate through social networks, compound through Bayesian updating (each observed Confabulation becoming evidence that updates others' beliefs), and converge toward population-level shared narratives that are resistant to revision because: (1) each Individual's posterior is shaped by the Collective Prior; (2) expressing doubt produces social sanction; and (3) the converged narrative has excluded from hypothesis space the structural explanations that would reveal its confabulated nature.
Explanation. The cascade operates through three phases: Phase 1: Expression. Individual A generates a Confabulation and expresses it publicly. The Confabulation enters others' evidential environments. Phase 2: Propagation. Individuals B, C, D observe A's expressed Confabulation and incorporate it as evidence through prestige-biased learning (if A is high-status), social proof (if multiple individuals express similar narratives), and mimetic template transmission (if the narrative provides a deployable schema). Phase 3: Convergence. As more Individuals adopt the Confabulation, the collective prior shifts. New Individuals encountering the narrative observe not one person expressing it but many, treating the distribution as evidence of validity. The cascade becomes self-reinforcing: the more people express the Confabulation, the more others treat it as validated, the more it propagates. At convergence, the population reaches a stable configuration—a collective fixed point—where: the collective prior assigns near-certainty to the confabulated narrative; alternative explanations (especially structural ones) receive near-zero likelihood; dissent is treated as evidence of defection or pathology; and no Individual can exit the trap because the collective prior has made alternative explanations unintelligible. The formal mathematics of cascade dynamics—Bayesian updating, likelihood ratios, convergence theorems, fixed-point analysis—is developed in Chapter 10. Chapter 9 establishes the phenomenology of the cascade: what it feels like to be inside a converging system, why the convergence feels like truth-discovery rather than collective error, and why exit is so difficult. Epistemic Status: Framework-Specific Construct, with formal development in Chapter 10.
Evidence at Iteration Evidence at Iteration n ($E_n$) is the phenomenological experience of wanting-as interpreted by the narrative system, not the external Object-entering the Bayesian update process to revise Source Belief, where each Posterior becomes the Prior for interpreting the next iteration. Explanation: The iteration structure captures how Source Belief evolves over time and why the Confabulation Cascade has the directionality it does. You do not assess each want in isolation; you assess it against the backdrop of all previous assessments, as filtered through the self-model they have collectively shaped. The compounding dynamic occurs because each Posterior Belief $P(H|E_1, E_2, ... E_n)$ becomes the Prior Belief for interpreting $E_{n+1}$. If $E_1$ through $E_{10}$ have all been interpreted as authentic (high Posterior $P(H_A) + P(H_I)$ after each), then $E_{11}$ arrives into a Prior already strongly biased toward authenticity. Even if $E_{11}$ is paradigmatically Mimetic—you want something precisely because a high-status model just acquired it—the Prior makes this interpretation unlikely, and Confabulation generates an A or I narrative that preserves the existing self-model. Over iterations, the hypothesis space narrows toward a coherent but potentially false equilibrium: "I am someone whose desires reflect genuine needs and values." This is Bayesian Lock-In—the mathematical terminus of the Confabulation Cascade at the individual level.
The distinction is critical: when an Individual sees a luxury car (external stimulus), $E_n$ is not 'the car exists' but rather 'I feel urgent wanting toward that car.' The external Object is exogenous, but the Evidence processed by the Bayesian mechanism is the internal, already-interpreted signal-which is shaped by prior Confabulations and therefore endogenous to the belief system. This is why the Bayesian loop can converge toward false equilibrium: the Evidence itself is contaminated by the hypothesis being tested.
Collective Prior Collective Prior, denoted P(H)_collective,prior, is the population-level probability distribution across hypotheses that emerges when many Individuals' Prior Beliefs converge through social transmission of Confabulations, creating a shared background assumption that shapes how new Individuals interpret evidence before they have formed independent judgments-functioning as the epistemic environment into which Individuals are socialized and against which dissenting interpretations must contend. Explanation: The Collective Prior is the "water" in which Individuals swim-the ambient distribution of beliefs that is treated as starting assumption rather than conclusion requiring justification. When a child asks "why do we want X?", the Collective Prior supplies the default answer before any individual reasoning occurs. When an adult encounters a new phenomenon, they interpret it through frameworks that the Collective Prior has made cognitively available. The Collective Prior differs from Collective Source Belief in temporal and functional terms: Collective Source Belief is the current posterior (where the population has updated to), while Collective Prior is the starting assumption (what the next round of updating begins from). In stable cascades, yesterday's Collective Source Belief becomes today's Collective Prior-this is the compounding mechanism that produces Bayesian Lock-In at population scale. The Collective Prior shapes individual cognition through three mechanisms: Hypothesis availability: Hypotheses absent from the Collective Prior are literally unthinkable for most Individuals-they lack the conceptual vocabulary to formulate them. Before AIM vocabulary dissemination, "Mimetic Desire" was absent from the Collective Prior, making M-attribution structurally impossible regardless of evidence. Prior probability distribution: Even when alternative hypotheses are cognitively available, the Collective Prior assigns them initial probabilities. A hypothesis the Collective Prior treats as fringe requires extraordinary evidence to achieve uptake; a hypothesis the Collective Prior treats as obvious requires minimal evidence. Social cost asymmetry: Expressing beliefs aligned with the Collective Prior incurs minimal social cost; expressing beliefs that contradict it incurs substantial cost (sanctions, exclusion, reputational damage). This creates pressure toward conformity independent of evidence quality. At the Collective Fixed Point preceding mimetic crisis, the Collective Prior assigns near-certainty to Confabulated agent-based explanations and near-zero probability to structural alternatives. This makes the scapegoat narrative feel like obvious truth rather than constructed explanation-the Collective Prior has shaped the evidential landscape such that alternative interpretations require not merely evidence but epistemic revolution. The Knowledge Patch intervention targets the Collective Prior directly: by disseminating AIM vocabulary through mimetic channels (prestige-biased learning, social proof), it injects probability mass into hypotheses (especially H_M) that were previously absent from the Collective Prior, enabling Individuals to form Source Beliefs that include Mimetic Recognition as a live possibility rather than an unintelligible category. Epistemic Status: Framework-Specific Construct, integrating Bayesian epistemology with cultural evolution and AIM architecture.
Collective Source Belief Collective Source Belief, denoted $P(H)_{collective}$, is the population-level distribution of Source Beliefs that emerges when Individual Bayesian updating on similar Confabulated inputs produces convergence across many Individuals, creating a socially reinforced fixed point through coupled updating, where each Individual's publicly expressed Confabulation functions as social proof that updates other Individuals' Prior Beliefs, producing synchronised convergence rather than independent averaging. [Axiom 8: Bayesian Belief Dynamics] Explanation: Collective Source Belief emerges when individual Confabulation Cascades become publicly observable. When Person A expresses their locked-in narrative (e.g. "Immigrants are stealing our jobs"), Person B observes this as social evidence and updates their own Source Belief accordingly (e.g. "If A, whom I respect, believes that immigrants are stealing our jobs, then this is probably true"). This produces coupled Bayesian dynamics: each Individual's Posterior becomes evidence for others' updates. The coupling means the Confabulation Cascade scales from intrapersonal to interpersonal to population-level. At the collective fixed point preceding mimetic crisis, doubt about shared Confabulated narratives approaches zero — the population converges toward shared certainty in agent-based explanations for mounting tension. This is not experienced as “I likely adopted this belief via social influence” P(H_M) → 0 (which would require the population to have some understanding of the mimetic concept); it is experienced as collective certainty that 'we know why we're in conflict' and 'we know who is responsible.' The absence of structural doubt is what permits the scapegoat narrative to achieve functional consensus. This collective false certainty is the epistemic precondition for the scapegoat mechanism: when everyone believes the crisis reflects genuine grievance rather than Mimetic escalation, identifying and eliminating a target appears rational within the shared framework.
The coupling mechanism is essential: Collective Source Belief is not a statistical aggregate of independent beliefs but a dynamically coupled system where Person A's Posterior becomes Person B's Evidence. This is the mathematical definition of a coupled oscillator, which explains why mimetic systems exhibit phase transitions (sudden collective shifts) rather than gradual drift. When coupling strength exceeds a threshold, the system 'snaps' into synchronised false belief, the collective fixed point that constitutes mimetic crisis.
Bayesian Lock-In Bayesian Lock-In is the stable false equilibrium reached when the Confabulation Cascade has sufficiently narrowed an Individual's hypothesis space that Mimetic Recognition approaches zero and all new evidence is interpreted through a self-model that attributes desires to authentic sources regardless of actual origin. The mathematical terminus of the individual-level Confabulation Cascade where P(H_authentic | all evidence) → 1, following necessarily from repeated application of Bayesian Belief Dynamics [Axiom 8] to Source-opaque inputs. Explanation. Bayesian Lock-In is the terminus of the Confabulation Cascade at the individual level. At this point, certainty in the Confabulated narrative is so high that even contradictory evidence cannot shift it — the Individual does not consider 'maybe this is mimetic' because the conceptual category is unavailable. Instead, any disconfirming evidence is reinterpreted through the existing self-model, generating elaborated Confabulations rather than doubt. This is not irrationality; each update was locally valid. The pathology arises because the evidence itself — the agent's own narrative — was structurally corrupted at source. Bayesian Lock-In explains why self-correction through reflection alone cannot escape mimetic entrapment: the reflection process uses the same corrupted self-model that generated the problem. Escape requires external intervention, the Knowledge Patch, the Two-Question Diagnostic, or environmental restructuring that changes the evidence stream, to inject Mimetic Recognition and/or change the Individual’s social context before the cascade completes. Bayesian Lock-In explains why self-correction through reflection alone cannot escape mimetic entrapment: the mathematics of rational updating itself produces the lock-in. (Framework-Specific Theorem).
I-Override Information Architecture I-Override Information Architecture refers to the specific informational constraints under which I-Override operates: Source Opacity destroys only the source-tags identifying which motivational channel (A, I, or M) generated each input to the Decision Hub, while all other information processed prior to integration-contextual cues, temporal sequence, behavioural history, environmental conditions, bodily states, and the content of the desire itself-remains accessible to conscious awareness. M-inputs face an additional constraint: because mimetic transmission occurs preconsciously (100–300ms), the acquisition event was never consciously registered, rendering M structurally undetectable through direct introspection even when other information remains available. Explanation: This definition clarifies what I-Override can and cannot work with. Source Opacity is specific: it destroys the "A," "I," or "M" tag on each input, not all information about the input. An Individual performing I-Override still has access to context (where am I, who is watching?), history (have I wanted this before, under what conditions?), bodily states (am I hungry, tired, in pain?), and the desire's content (what specifically do I want?). This information enables the Two-Question Diagnostic: Question 1 checks bodily states (A-test); Question 2 checks audience-dependence (I-test). M-signals face additional opacity because they arrive preconsciously—the Individual never consciously witnessed acquiring the desire from a model, so they cannot remember a moment of transmission. A-signals and I-signals, by contrast, often have conscious correlates (feeling hungry, enjoying an activity) that provide diagnostic information even after integration. So, once A-signals and I-signals have been eliminated as the reason for the wanting, the M-signal is all that logically remains. Epistemic Status: Framework-Specific Construct Collective Fixed Point Collective Fixed Point is the stable configuration toward which a Confabulation Cascade converges—a state characterised by: (1) near-universal adoption of a shared confabulated narrative; (2) near-zero probability mass on alternative (especially structural) explanations; (3) treatment of dissent as defection or pathology rather than legitimate inquiry; and (4) maximal confabulation stability combined with maximal underlying tension, such that the fixed point is equilibrium in the sense of resistance to change rather than equilibrium in the sense of resolution.
Explanation. The Collective Fixed Point is not resolution—it is lock-in. At the fixed point: Universal M-convergence: All Individuals have updated toward the same M-targets because confabulations are contagious and social proof amplifies shared desires. Universal authenticity attribution: All Individuals experience their M-amplified desires as genuinely their own because the cascade has assigned near-zero likelihood to the Mimetic hypothesis. Invisible rivalry: Because no one perceives that their desires are Mimetically acquired, competition is experienced as legitimate conflict over genuinely scarce goods, not as arbitrary convergence on the same targets. No endogenous exit: Individuals cannot escape a trap they cannot perceive. The collective prior has made the Mimetic explanation unintelligible. The Collective Fixed Point corresponds to the pre-crisis state in the Six-Stage Mimetic Crisis Trajectory (Chapter 11): maximum tension, maximum confabulation stability, minimum available vocabulary for structural explanation. The Scapegoat Mechanism emerges as the system's attempt to achieve resolution without exiting the fixed point—localising blame on agent-based targets rather than revising the confabulated self-model. Epistemic Status: Framework-Specific Construct, with formal derivation in Chapter 10.
Cognitive Closure Cognitive Closure is the state in which a causal-inference demand has been satisfied—an explanation has been generated and accepted, downstream processes can proceed, and the interrogation terminates—achieved regardless of whether the explanation is accurate or false, such that the brain's demand for closure is a demand for any explanation that allows processing to continue rather than a demand for accurate explanation specifically.
Explanation. Cognitive closure is the functional goal that Confabulation serves. When an Individual faces the question "Why do I want this?" or "Why did this happen?", downstream processes—action planning, resource allocation, social justification, threat response—require a causal model to proceed. The brain cannot efficiently operate in sustained uncertainty about causal structure. Cognitive closure can be achieved through: Accurate explanation: The true causal structure is identified and represented. Confabulated explanation: A plausible but inaccurate narrative is generated and accepted. Epistemic Suspension: "I don't know" is accepted as a stable response that satisfies the demand for closure while leaving the causal question open. Options 1 and 3 are epistemically preferable but cognitively costly. Option 2 is epistemically inferior but cognitively cheap. Under time pressure, stress, cognitive load, or A-deficit, the brain defaults to Option 2—generating closure through Confabulation rather than sustaining the costly state of uncertainty required for Options 1 or 3. The Scapegoat Mechanism exploits cognitive closure demands: when collective tension requires explanation and structural causes exceed tractability, the agent-based scapegoat narrative achieves closure immediately (identifying a cause, enabling coordinated response, providing actionable target), while accurate structural explanation requires sustained uncertainty, complex reasoning, and distributed intervention that provides no immediate closure.
Epistemic Status: Framework-Specific Construct, integrating need-for-closure research with AIM architecture.
Prestige-Biased Learning Prestige-Biased Learning is the adaptive heuristic by which Individuals preferentially copy the beliefs, preferences, and behaviours of high-prestige models—those who are successful, respected, or socially central—enabling efficient cultural learning (copying successful strategies reduces trial-and-error costs) but also enabling Confabulation propagation (Confabulations expressed by prestigious sources achieve elevated transmission regardless of accuracy because the heuristic is content-indifferent).
Explanation. Prestige-biased learning is well-documented in cultural evolution research (Henrich & Gil-White, 2001). The heuristic is adaptive in many domains: copying the practices of successful individuals increases one's own success probability without bearing the cost of independent experimentation. The implicit reasoning is: "If someone successful does/believes X, then X is probably effective/true; and even if I'm uncertain, adopting X reduces my risk of deviating from successful strategies." The heuristic is content-indifferent: it transmits whatever the prestigious Individual expresses, regardless of whether that content is accurate, confabulated, or entirely fabricated. A Confabulation expressed by a celebrity, public intellectual, political leader, or community elder receives far more uptake than the same Confabulation expressed by a low-status Individual. This is not irrational—the heuristic works well on average—but it creates systematic vulnerability to Confabulation cascades when prestigious individuals express confabulated narratives (which, given Source Opacity, they routinely do). In the context of the Scapegoat Mechanism, prestige-biased learning explains why scapegoat narratives can achieve rapid population-level uptake when endorsed by high-status sources—the endorsement provides Bayesian evidence of validity regardless of the narrative's accuracy. Epistemic Status: Established Finding (Cultural Evolution), integrated with AIM architecture.
Social Proof Social Proof is the heuristic by which Individuals use the distribution of beliefs across the population as evidence for those beliefs' validity—treating widespread belief as Bayesian evidence of truth (if many people believe X, X is probably true)—which functions adaptively in domains where accuracy and popularity correlate but produces Confabulation amplification when applied to narratives that achieved initial uptake through prestige-bias or emotional resonance rather than accuracy, because observers cannot distinguish independent convergence from dependent copying.
Explanation. Social proof is adaptive in many domains: widespread beliefs about fire burning, water being wet, or predators being dangerous correlate with truth because these beliefs were tested against reality across many individuals. The implicit reasoning is: "If many people independently arrived at conclusion X, then X is probably correct—the probability that all of them are wrong is low." The heuristic fails under Confabulation cascades because the independence assumption is violated. If Confabulation C propagates from Individual A to Individuals B, C, and D via prestige-bias, then Individual E observes not one person expressing C but four. Individual E updates: "Multiple people believe this, so it's probably correct." But B, C, and D did not independently arrive at C—they copied it from A. Individual E has no access to this dependency structure; they observe only the distribution. Social proof therefore amplifies Confabulations once they achieve initial uptake: the more people express a Confabulation, the more others treat it as validated, the more it propagates, the more social proof accumulates. The cascade is self-reinforcing, and the amplification operates regardless of accuracy. In the context of the Scapegoat Mechanism, social proof explains why scapegoat narratives can achieve functional consensus rapidly: once a critical mass expresses the narrative, each additional observer treats the distribution as evidence of validity, producing convergence toward collective targeting even when no Individual has independently verified the narrative's accuracy.
Epistemic Status: Established Finding (Social Psychology), integrated with AIM architecture.
Unified Crisis Theorem Derivation Unified Crisis Theorem Derivation is the demonstration that the Unified Crisis Theorem—the claim that mimetic crisis is the attractor state under unmanaged conditions—follows as a mathematical corollary from the Bayesian architecture of human motivation, rather than being an additional empirical hypothesis requiring separate validation. Explanation. The Unified Crisis Theorem is not an empirical hypothesis but a mathematical derivation from established premises: If common-currency integration destroys source labels, and If confabulation fills the gap, and If confabulations are treated as evidence, and If posteriors become priors, and If people express their narratives publicly, and If others weight social evidence... Then crisis is where the system goes unless actively deflected. Each premise is independently established: common-currency integration (established neuroscience), source opacity (cognitive science), confabulation (established psychology), Bayesian updating (mathematical tautology given its axioms), posteriors becoming priors (definitional—that is what iterative updating means), public expression of narratives (observable), social evidence weighting (established social psychology). The conclusion follows deductively. The theorem is therefore a corollary of the Bayesian architecture, not an additional claim requiring separate validation. The derivation reveals that crisis is the default trajectory—the place the mathematics tends toward unless something actively prevents it. The felt certainty that "my desires are mine" is not evidence of authenticity; it is the signature of a Confabulation Cascade nearing completion. Intervention implication: The same mathematics that entails crisis also entails that subcriticality is maintainable. Deflection requires injecting probability mass into H_M before Bayesian Lock-In completes—which is what the Knowledge Patch and Two-Question Diagnostic accomplish. The intervention target is clear: keep Authenticity Belief below P_c across the population through distributed diagnostic tools that restore Mimetic Recognition before the cascade forecloses it. Individual Subcriticality Individual Subcriticality is the maintenance of sufficient uncertainty about one's own self-narrative, causal models, expertise claims, and predictions to prevent lock-in to a fixed point where alternative interpretations become unthinkable-the personal-scale analogue to collective Subcriticality, which maintains sufficient doubt about scapegoat narratives across a population to prevent functional consensus on targeting. Explanation. Just as populations can converge toward certainty that produces coordinated violence, Individuals can converge toward certainty about themselves and causation that forecloses revisability. Individual Subcriticality is the state of maintained openness-confidence in self-understanding and causal models that remains below the threshold at which alternatives become unavailable as hypotheses. An Individual maintaining subcriticality can genuinely entertain "I might be wrong about this" rather than experiencing doubt as threat. The same mathematical structure-preventing convergence to a fixed point-operates at both collective and individual scales. Epistemic Status: Framework-Specific Construct. Individual Fixed Point Individual Fixed Point is the stable configuration of accumulated confabulations-about self, causation, expertise, and prediction-where the Individual's confidence has converged toward certainty, alternative interpretations have become unthinkable, and the structure has become immune to disconfirming evidence through mechanisms including filtering, reinterpretation, and defensive hostility toward challenges. Explanation. The Individual Fixed Point is the personal-scale analogue to the Collective Fixed Point. It represents the attractor state toward which human cognition naturally converges when confabulations are permitted to accumulate without interruption. The fixed point feels like achieved self-knowledge and accurate understanding precisely because every observation has been filtered through priors that the observations themselves constructed. At the fixed point, the I-process stagnates because all questions have been pseudo-answered-there are no genuine frontiers for curiosity to explore. An Individual at the fixed point exhibits: universal authenticity attribution (all desires experienced as genuinely self-originated); certainty exceeding evidence; disconfirmation immunity; revision experienced as threat; and intellectual stagnation despite apparent expertise. Escape from the fixed point is extremely difficult because the structure is self-reinforcing and challenges feel like identity threat. Epistemic Status: Framework-Specific Construct. Confabulation Compounding Confabulation Compounding is the process by which confabulated narratives-about self, causation, expertise, and prediction-accumulate across time and domains, with each Confabulation becoming a prior that shapes subsequent interpretation, producing progressive convergence toward the Individual Fixed Point where accumulated certainty vastly exceeds evidential warrant, alternative interpretations have become unavailable, and the frontiers that would enable I-engagement have been closed off by pseudo-answers. Explanation. Confabulation Compounding explains how Individuals who begin with open hypothesis spaces end at fixed points. The process is automatic-no failure of intelligence or character is required. Each confabulated narrative is locally reasonable given available information, but the accumulation produces global lock-in. Compounding operates across domains because a confabulated self-model influences causal attribution, confabulated causal templates influence self-interpretation, and so forth. As compounding proceeds, the Individual's intellectual world contracts-questions that were once open become closed, and the I-process has progressively less territory to operate on. Only domain-general Epistemic Suspension can interrupt the cross-domain compounding and preserve the open questions that sustain intellectual vitality. Epistemic Status: Framework-Specific Construct. Individual Subcriticality Theorem Individual Subcriticality Theorem is the principle that just as collective subcriticality requires maintaining sufficient doubt about scapegoat narratives across a population to prevent functional consensus on targeting, individual subcriticality requires maintaining sufficient doubt about one's own self-narrative, causal models, expertise claims, and predictions to prevent lock-in, with an Individual maintaining subcriticality when their confidence in these structures remains below the threshold at which alternative interpretations become unthinkable, and with Epistemic Suspension Capacity being the cognitive operation that maintains individual subcriticality by preventing confabulated self-explanations from installing as priors, thereby preserving the revisability of the self-model and the Individual's capacity to update beliefs when better explanatory frameworks become available. Explanation. The theorem establishes that: (1) the same mathematical structure-preventing convergence to a fixed point-operates at both collective and individual scales; (2) the intervention target is the same at both scales: maintaining probability mass on alternative interpretations rather than allowing convergence toward certainty; (3) the mechanism of lock-in is the same at both scales: confabulations compound through social transmission (collective) or temporal accumulation (individual) until alternatives become unintelligible; (4) the consequence of lock-in is the same at both scales: the system loses capacity for self-correction and becomes immune to disconfirming evidence. An Individual who has reached self-narrative lock-in cannot acquire AIM vocabulary in a way that updates their self-understanding, because the AIM Framework contradicts priors that have been locked in-they may learn AIM intellectually while remaining unable to apply it to themselves. Epistemic Status: Framework-Specific Theorem. Knowledge Patch Necessity Knowledge Patch Necessity is the principle that I-Override cannot operate effectively on M-driven desires without prior acquisition of the M-concept, because confabulation draws on available conceptual categories and will generate A-sounding or I-sounding narratives for any desire that lacks an available attribution category—rendering the explanation "I want this because another person want it" structurally unavailable to Individuals who lack the concept of Mimetic Desire, regardless of their sincerity or introspective effort. Explanation: When an Individual attempts to understand why they want something, their brain generates a narrative explanation. This confabulation process is not dishonest—it is how human cognition handles the gap between experienced wanting and absent source-information. But confabulation can only draw on concepts the Individual already possesses. Consider an Individual who has never encountered the AIM Framework. They experience intense desire for a luxury watch. They apply introspective effort: "Is this bodily need?" No-they are not cold, hungry, or in danger. A-attribution rejected. "Would I want this if no one ever saw it?" They imagine wearing it alone... the desire feels diminished, but they cannot articulate why. At this point, without the M-concept, their confabulation system generates available narratives: "I appreciate the fine craftsmanship" (I-attribution), "It's a good investment" (A-attribution via financial security), "I deserve to treat myself" (hybrid). These feel subjectively true. The Individual believes them. I-Override fails-not from lack of effort but from vocabulary deprivation. Now consider the same Individual after acquiring the AIM vocabulary: "Is this bodily need?" No. A ruled out "Would I want this if no one ever saw it?" The desire diminishes significantly. I ruled out. "If not A and not I, then by elimination: M." The M-concept provides the category that makes the eliminative inference actionable. The Individual can now recognise: "This desire is mimetically transmitted. I want it because I've observed someone else wanting it, and that observation inflated its value in my Decision Hub before I was consciously aware." This is why the Knowledge Patch-population-level dissemination of the AIM taxonomy-is architecturally necessary for I-Override to function at scale. It is not merely education about an interesting theory; it is provision of the cognitive category without which M-detection is structurally impossible regardless of introspective sincerity. The architectural necessity of the Knowledge Patch can be understood through the Compensatory Pathway Analogy: just as compensatory neural reorganisation requires some intact tissue to recruit, I-Override requires conceptual categories from which to construct the compensatory inference procedure. The AIM taxonomy (A, I, M) provides the cognitive substrate without which the compensatory circuit cannot form. Before vocabulary acquisition, there is literally nothing for the deliberative system to compute with-the mimetic hypothesis is not merely improbable but absent from the hypothesis space entirely. Consider an Individual who has never encountered the AIM Framework. They experience intense desire for a luxury watch. They applRey introspective effort: "Is this bodily need?" No—they are not cold, hungry, or in danger. A-attribution rejected. "Would I want this if no one ever saw it?" They imagine wearing it alone... the desire feels diminished, but they cannot articulate why. At this point, without the M-concept, their confabulation system generates available narratives: "I appreciate fine craftsmanship" (I-attribution), "It's a good investment" (A-attribution via financial security), "I deserve to treat myself" (hybrid). These feel subjectively true. The Individual believes them. I-Override fails—not from lack of effort but from vocabulary deprivation. Now consider the same Individual after acquiring the AIM vocabulary: "Is this bodily need?" No. A ruled out. "Would I want this if no one ever saw it?" The desire diminishes significantly. I ruled out. "If not A and not I, then by elimination: M." The M-concept provides the category that makes the eliminative inference actionable. The Individual can now recognise: "This desire is mimetically transmitted—I want it because I've observed others wanting it, and that observation inflated its value in my Decision Hub before I was consciously aware." This is why the Knowledge Patch—population-level dissemination of the AIM taxonomy—is architecturally necessary for I-Override to function at scale. It is not merely education about an interesting theory; it is provision of the cognitive category without which M-detection is structurally impossible regardless of introspective sincerity. Epistemic Status: Framework-Specific Theorem.
Information Gap Theorem The Information Gap Theorem is the principle that when Individuals experience A/I deficits whose true causes (preconscious mimetic transmission, diffuse institutional capture, Entanglement, lack of true causal information) exceed the computational tractability of available causal-inference systems, Confabulation defaults to agent-based causation ("and identifiable ‘someone’ is responsible") rather than systemic explanation, because human causal cognition is architecturally optimized for detecting agents (Predators, Prey, Rival, Collaborators) and cannot tractably compute the distributed, preconscious, entangled processes or other lack of information that actually produce M-driven deficits; even I-led System 2 processing, when engaged, produces elaborated agent-based Confabulations rather than accurate structural diagnosis because the cognitive machinery required for systemic causal inference is unavailable, with the agent-based Confabulation serving the functional purpose of providing cognitive closure and actionable targets that allow downstream threat-response and social-coordination processes to operate. Explanation: The Information Gap Theorem explains why scapegoating consistently emerges when Individuals experience felt deficit under conditions of Mimetic capture. The human brain is architecturally designed for agent-based causal inference (detecting Predators, Prey, Rivals, and Collaborators) and cannot compute the distributed, preconscious, entangled causes or otherwise lack the information that actually produce M-driven deficits. When faced with the question "why do I lack sufficiency?", the causal-inference systems produce the only kind of answer they can compute: someone (an agent) is responsible. This is not strategic selection of simple over complex explanations; it is architectural limitation. The scapegoat explanation emerges because it is the only explanation the cognitive machinery can generate. The theorem establishes that Confabulation is not failure of intelligence or effort—it is the brain's best available response to computationally intractable causation. Epistemic Status: Framework-Specific Theorem Self-Application Theorem The Self-Application Theorem is the principle that the AIM Framework functions as debugging software for human motivation, providing the conceptual vocabulary required for I-Override to decompose integrated urgency signals and restore Source-tagging, with this self-application being architecturally grounded in that AIM identifies the conditions for its own effectiveness (A-security, practice, social support, conceptual vocabulary) and the limitations of its reach (preconscious transmission cannot be prevented, only recognised post-hoc), enabling at the individual level recognition of confabulated causation and redirection of causal inference toward structural analysis. Explanation: The AIM Framework is not merely explanatory but therapeutically self-applying. Once an Individual acquires AIM vocabulary, they possess the conceptual categories required to perform I-Override: they can ask "is this urgency Appetitive, Intrinsic, or Mimetic?" and use behavioural tests (2 Question Diagnostic, Presumptions Against Scapegoating, satiation dynamics, audience-removal, model-tracking) to answer. Without these categories, the question cannot be formed, and Confabulation completes by default. AIM provides the debugging tools its own architecture identifies as necessary—making the framework a cognitive technology, not just a theoretical description. The theorem identifies why the Knowledge Patch works: it installs the conceptual categories that transform vague dissatisfaction into diagnosable, addressable patterns. Epistemic Status: Framework-Specific Theorem
Dissemination Precedence Theorem The Dissemination Precedence Theorem is the principle that institutional reform toward AIM-aligned flourishing requires prior or concurrent population-level acquisition of AIM conceptual vocabulary through existing mimetic channels—prestige-biased learning, platform visibility, social proof—with the use of M-transmission to spread I-enabling content being strategically necessary rather than paradoxical, and with reform proposals that outpace conceptual dissemination being predictably experienced as elite imposition triggering mimetic resistance. Explanation: The Dissemination Precedence Theorem addresses the sequencing problem for AIM-aligned reform. Institutional change requires political will; political will requires public understanding; public understanding requires conceptual vocabulary. Without the AIM taxonomy, populations cannot distinguish genuine A-deficits from M-amplified felt deficits, and reformers cannot articulate what visibility governance or I-infrastructure would accomplish. AIM must therefore spread through existing mimetic channels—using the very dynamics it describes—to reach the threshold where reform becomes articulable and supportable. This is Positive Mimesis: the copied behaviour is acquiring the conceptual tools that permit M-management. The sequence must be: conceptual seeding → vocabulary diffusion → reform articulation → structural implementation. Epistemic Status: Framework-Specific Theorem
Apex Futility Theorem The Apex Futility Theorem is the principle that Mimetic status pursuit cannot produce stable satisfaction at any point in the pursuit trajectory because: (1) all intermediate positions are experienced as insufficient due to continuous reference-point reset, and (2) the apex position produces dysfunction rather than satisfaction due to model depletion and alarm without resolution, thereby establishing that M-dominant pursuit is structurally irrational—it cannot deliver what it promises under any achievable conditions. Explanation: The theorem demonstrates that status pursuit fails architecturally, not merely practically. At intermediate positions, achieving the current target immediately resets the reference point, recreating the felt deficit—Property 2 (Reference Point Reset) ensures no intermediate position can produce stable satisfaction. At the apex position, the mimetic system loses calibration: with no higher-status models to observe, the system cannot generate positive valuation (model depletion), cannot compute relative position (reference point collapse), and remains at maximum alarm amplitude with no possible resolution (alarm without termination). The output is pathological: paranoid threat-detection, erratic escalation, violence toward potential rivals. The historical record—Roman emperors, absolute monarchs, modern dictators, contemporary billionaires—confirms this prediction with striking regularity: there is no documented case of an apex figure achieving stable contentment through status maximisation. Epistemic Status: Framework-Specific Theorem Apex Predator Paradox Theorem The Apex Predator Paradox Theorem is the principle that a nation-state possessing overwhelming military superiority relative to a designated adversary cannot coherently classify that adversary as an existential threat, because existential threat requires capacity to destroy while the claim of superiority requires the adversary lacks such capacity-these conditions are mutually exclusive—such that when militarily superior powers claim existential threat from adversaries they vastly outmatch, the claim is either (a) false, or (b) self-refuting. The paradox is strongest and most obvious at the global apex (where no peer threats exist), but the logical structure applies at any scale where relative military dominance is claimed alongside existential-threat rhetoric directed at the inferior party. Explanation: The theorem applies AIM's status-hierarchy analysis to international relations at multiple scales. A nation possessing overwhelming military superiority over a specific adversary-whether as the global apex power or as a regional/relative dominant-cannot logically face existential threat from that specific adversary. If the inferior power truly had capacity to destroy the superior power, the superiority claim would be false. The paradox is clearest at the global apex (possessing the largest nuclear arsenal, most advanced conventional forces, greatest economic resources), where literally no peer-level threats exist, but the same logical incompatibility applies whenever Nation A claims both overwhelming superiority over Nation B and existential threat from Nation B. When superior powers deploy existential-threat rhetoric against clearly inferior adversaries, the rhetoric reveals M-dynamics: the alarm is generated by status threat (potential loss of relative position, regional dominance, or global apex standing) being processed through the same neural channels as survival threat (M-to-A hijacking). The theorem predicts that militarily superior powers will systematically overstate threats from inferior adversaries due to this architectural confusion, with the distortion most extreme at the global apex where the gap between actual threat capacity and claimed threat is largest. Epistemic Status: Framework-Specific Theorem Mimetic Bargain Theorem The Mimetic Bargain Theorem is the principle that human mimetic capacity—the preconscious copying of goals, values, and desires from observed models—is the architectural foundation of cumulative cultural evolution, such that this same architecture necessarily produces Source Opacity, Information Gap, and Confabulation completing as agent-based causation; these features are intrinsic to the mimetic architecture and cannot be evolutionarily removed without destroying the cumulative-culture capacity they enable. Explanation: The Mimetic Bargain Theorem explains why the problematic features of human motivation—Source Opacity, Confabulation, scapegoating vulnerability—cannot simply be "fixed" through evolution or education. These features are not bugs but consequences of the architecture that enables cumulative culture. Humans learn language, acquire skills, absorb values, and coordinate complex societies through preconscious mimetic transmission. This transmission must operate below conscious awareness to be fast enough for real-time social coordination. But this speed comes at a cost: the transmission mechanism is invisible to the receiver, producing Source Opacity. The brain then confabulates explanations for desires whose source it cannot access. The Bargain is: cumulative culture requires preconscious mimesis; preconscious mimesis produces Source Opacity; Source Opacity produces Confabulation. We cannot have the benefits without the risks—we can only manage the risks through institutional design and conceptual tools like AIM. Epistemic Status: Framework-Specific Theorem
2.8 Alphabetical Index Scaffold (for Phase‑4 Audit) This section is an index scaffold rather than a complete back‑of‑the‑book index. It lists the main defined terms in approximate alphabetical order, with their primary section numbers, so that (i) readers can quickly locate canonical definitions, and (ii) Phase‑4 forward‑reference audits can check that each term is used downstream in ways consistent with its definition. This section is an index scaffold rather than a complete back-of-the-book index. It lists the main defined terms in approximate alphabetical order, with their primary section numbers (2.1 through 2.8), so that (i) readers can quickly locate canonical definitions, and (ii) Phase 4 forward-reference audits can check that each term is used downstream in ways consistent with its definition.
Do not expect full definitions here-only Term + Section Reference for navigation purposes. A
Academic Camouflage - 2.7 Academic Confabulation Thesis - 2.7 Action Episode - 2.1 AI Confabulation - 2.6 AIM Framework - 2.1 AIM Integration Equation - 2.2 AIM Profile - 2.2 AIM Weights (wA, wI, wM) - 2.2 AIM-Defined Equality - 2.3 AIM-Defined Fairness - 2.3 AIM-Defined Justice - 2.3 A-Floors (Appetitive Floors) - 2.4 A-Harm - 2.3 A-Rights / A-Duties - 2.3 Appetites (A) - 2.1 Authenticity Belief - 2.8 Audience Independence Coefficient (AIC) - 2.6 A
Action Episode — 2.1 AIM Framework — 2.1 AIM Integration Equation — 2.2 AIM Profile — 2.2 AIM Weights ($w_A$, $w_I$, $w_M$) — 2.2 AIM‑Defined Equality — 2.3 AIM‑Defined Fairness — 2.3 AIM‑Defined Justice — 2.3 A‑Floors (Appetitive Floors) — 2.4 A‑Harm — 2.3 A‑Rights / A‑Duties — 2.3 Appetites (A) - 2.1 Authenticity Belief - 2.8 Audience Independence Coefficient (AIC) - 2.6 I‑Override Capacity — 2.1 C
Cascading Consequences - 2.4 Cascading Structure of Rights and Duties - 2.3 Cascading Support - 2.4 Choice Blindness - 2.5 Coercion - 2.3 Collective Source Belief - 2.8 Completion Pressure - 2.6 Complexity as Concealment - 2.4 Confabulation - 2.1 Confabulation (Bayesian Context) - 2.8 Confabulation Cascade - 2.8 Confabulation Inheritance - 2.6 Confabulation of Agent-based Causation - 2.7 Consent - 2.3 Constraint Satiation Ratio (CSR) - 2.6 Culture - 2.5 Cascading Consequences — 2.3 Cascading Structure of Rights and Duties — 2.3 Cascading Support — 2.3 Choice Blindness — 2.5 Coercion — 2.3 Complexity as Concealment — 2.3 Confabulation — 2.1 Confabulation Cascade — 2.3 Culture — 2.5 E D
Decision Hub - 2.1 Decision Hub Integration - 2.1 Dignity - 2.3 Dissemination Precedence Theorem - 2.7
E
Easterlin Plateau - 2.4 Endogenous Feedback - 2.8 Entanglement - 2.1 Evidence at Iteration - 2.8 Evidence Probability - 2.8 Exploitation - 2.3
F
Four Dimensions of M-Management - 2.3 Framing Principles - 2.6 Freedom (in AIM Terms) - 2.3 Easterlin Plateau — 2.3 Endogenous Feedback — 2.3 Exploitation — 2.3 F G
GDPA, GDPI, GDPM - 2.2 Goal Persistence Score (GPS) - 2.6 Good-Level AIM Index - 2.2
H
Harm / A-Harm / I-Harm / M-Harm - 2.3 Hedonic Treadmill - 2.4 High-Observability Goods - 2.1 High-Observability Sectors - 2.1 High-Theatre / Low-Theatre - 2.4 Humane Visibility — 2.4 Freedom (in AIM Terms) — 2.3 Framing Principles — 2.7 H Harm / A‑Harm / I‑Harm / M‑Harm — 2.3 Hedonic Treadmill / Easterlin Paradox — 2.4 High‑Observability Goods — 2.1 High‑Observability Sectors — 2.1 High‑Theatre / Low‑Theatre — 2.3 I I‑Domains (Intrinsic Domains) — 2.4 I‑Duties / I‑Rights — 2.3 I-Harm - 2.3 I-Override - 2.1 I-Override Capacity - 2.1 Incentive Salience — 2.6 Individual — 2.1 Information Gap Theorem - 2.7 Institutional Buffering - 2.4 Intrinsic Infrastructure - 2.4 Intrinsic Motivation (I) - 2.1 Introspection Illusion - 2.5
K
Knowledge Patch - 2.4
L
Lead-Tag-Last Heuristic - 2.2 Libet Window - 2.1 Likelihood — 2.8 K Knowledge Patch — 2.3 M M
Manipulation - 2.3 M-Duties / M-Rights - 2.3 M-Harm - 2.3 M-Tax (Mimetic Tax) - 2.4 Mimesis - 2.1 Mimetic Attraction / Mimetic Repulsion - 2.1 Mimetic Bargain Theorem - 2.7 Mimetic Crisis and Crisis Trajectory - 2.4 Mimetic Desire (M) - 2.1 Mimetic Drift - 2.2 Mimetic Flywheel - 2.4 Mimetic Premium (PM) - 2.2 Mimetic Recognition - 2.8 Mimetic Sensitivity Index (MSI) - 2.6 Mimetic Treadmill - 2.4 Mirror Neuron System - 2.1 Moral Vocabulary Displacement Theorem - 2.7
N
Negative Mimesis - 2.1 Non-derogable Essentials - 2.4
O
Object - 2.1 Object Parasitism - 2.1 Observability Gradient - 2.4 Opt-Out Paradox - 2.4 M
Manipulation — 2.3 M‑Duties / M‑Rights — 2.3 M‑Harm — 2.3 M‑Tax (Mimetic Tax) — 2.4 Mimesis — 2.1 Mimetic Attraction / Mimetic Repulsion — 2.1 Mimetic Bargain Theorem — 2.7 Mimetic Crisis and Crisis Trajectory — 2.4 Mimetic Desire (M) — 2.1 Mimetic Drift — 2.2 Mimetic Flywheel — 2.4 Mimetic Premium ($P_M$) — 2.2 Mimetic Recognition - 2.8 Mimetic Sensitivity Index (MSI) — 2.6 Mimetic Treadmill — 2.4 Mirror Neuron System — 2.1 Moral Vocabulary Displacement Theorem - 2.7 P N
Negative Mimesis - 2.1 Non-derogable Essentials - 2.4
O
Object - 2.1 Observability Gradient - 2.4 Opt-Out Paradox - 2.4
P
Positional Goods (AIM Integration) - 2.4 Positive Mimesis - 2.1 Post-Appetitive Society - 2.4 Posterior Belief - 2.8 Practical Redirect - 2.4 Preconscious Transmission - 2.1 Presumption Against Scapegoating - 2.4 Primacy of the Present (normative principle) - 2.3 Primacy of the present (justice architecture) - 2.4 Prior Belief - 2.8 Problem of the Priors - 2.5 Proxy - 2.1 Positional Goods (AIM Integration) — 2.4 Post‑Appetitive Society — 2.3 Preconscious Transmission — 2.1 Primacy of the Present (thin normative core) — 2.3 Primacy of the present (justice architecture) — 2.3 Proxy — 2.1 T
Three-Question Diagnostic - 2.2 Triple Camouflage - 2.1 Two-Question Diagnostic - 2.2
U
Undifferentiated Desire Fallacy - 2.4 Unified Crisis Theorem - 2.4 Unified Crisis Theorem Derivation - 2.8
V
Ventral Striatum (VS) / Nucleus Accumbens - 2.6 Ventromedial Prefrontal Cortex (vmPFC) - 2.6 Violence-Enabling Goods and Channels - 2.4
W
Wanting-Liking Dissociation - 2.1 Washing-Out Theorem (Classical) - 2.5 Well-Being - 2.3
Z
Zero-Sum Status Competition - 2.4 Source Opacity — 2.1 Source‑tagging — 2.1 Source‑Tagging (Neural) — 2.5 Status — 2.1 Stratification Inevitability Theorem — 2.7 Structural Restlessness — 2.1 Subcriticality Threshold (P_c) — 2.3 T R
Readiness Potential (RP) - 2.6 Romantic Lie - 2.1
S
Self-Application Theorem - 2.7 Six-Stage Mimetic Crisis Trajectory - 2.4 Source Belief - 2.8 Source Hypotheses - 2.8 Source Opacity - 2.1 Source-tagging - 2.1 Source-Tagging (Neural) - 2.5 Status - 2.1 Stratification Inevitability Theorem - 2.7 Structural Restlessness - 2.1 Subcriticality Threshold ($P_c$) - 2.8
T
Three‑Question Diagnostic — 2.2 Two‑Question Diagnostic — 2.2
U
Undifferentiated Desire Fallacy - 2.4 Unified Crisis Theorem - 2.4 Unified Crisis Theorem Derivation - 2.8
V
Ventral Striatum (VS) / Nucleus Accumbens - 2.6 Ventromedial Prefrontal Cortex (vmPFC) - 2.6 Violence-Enabling Goods and Channels - 2.4
W
Wanting-Liking Dissociation - 2.1 Washing-Out Theorem (Classical) - 2.5 Well-Being - 2.3
Z
Zero-Sum Status Competition - 2.4 U Unified Crisis Theorem — 2.3 V Ventral Striatum (VS) / Nucleus Accumbens — 2.6 Ventromedial Prefrontal Cortex (vmPFC) — 2.6 Violence‑Enabling Goods and Channels — 2.3 W Washing‑Out Theorem (Classical) — 2.3 Well‑Being — 2.3 Wanting–Liking Dissociation — 2.1 2.9 Methodological Note: Audit Protocols This section documents the internal consistency checks applied to Chapter 2 definitions. It is provided for transparency and to enable readers to verify that defined terms are used consistently throughout subsequent chapters.
This section provides a lightweight scaffold for auditing how Chapter 2 definitions are actually used in later chapters. The purpose is the same as in legal drafting: to ensure that (i) every capitalised term that appears in the body of the work either has a clear Chapter 2 definition, and (ii) later usage does not materially drift from the meaning given here without deliberate amendment. 2.9.1 Forward‑Reference Checklist For each defined term you rely on in a later chapter: (1) Locate its canonical definition and Explanation in Chapter 2 (using section 2.8 above). (2) Check that each later use of the capitalised term is consistent with the Chapter 2 definition (in particular, that no later passage silently adds or removes elements that would, in contract terms, be a definition amendment). (3) Note whether later passages treat the term as (a) a high‑confidence empirical regularity, (b) a theoretical integration, or (c) a speculative/metatheoretical construct, and verify that this treatment matches (or explicitly revises) the epistemic‑status guidance given in Chapter 2. (4) Flag any capitalised term used in later chapters that does not appear in Chapter 2, so that you can either (i) add a new definition here, or (ii) de‑capitalise it in the body text and rely on ordinary language. (5) Confirm that cross‑references from later chapters back to Chapter 2 (for example, references to the Unified Crisis Theorem, Knowledge Patch, or Mimetic Tax) point to the correct section numbers and that the summaries in those later chapters do not materially mis‑state the Chapter 2 content. Summarise concrete edits to be made (e.g. "Add cross-reference to Source-tagging (2.1) in section 7.3; de-capitalise 'Scapegoat Mechanism' in section 8.2; amend Chapter 2 definition of 'Bounded M' to include new example from Chapter 9."). You can treat this scaffold as optional infrastructure: ordinary readers can ignore it, but anyone using this book as a technical reference (or revising it over time) can use these tools to keep the defined vocabulary and its applications in sync, in the same way that well-maintained contracts are periodically audited for definition drift. 2.9.2 Audit‑Report Template For each major part or chapter of the book (e.g. “Markets”, “Justice”, “AI Safety”), you can complete a short audit report using the following template: [e.g. “Chapter 7 – Markets”] [YYYY‑MM‑DD] [Name or role] List all capitalised AIM terms that appear in this chapter (e.g. AIM Framework; Mimetic Premium (P); Knowledge Patch; A‑Floors; Bounded M). For each term in (1), record its primary Chapter 2 section number and confirm that the reference in the body text either (a) directly cites that section, or (b) could do so without contradiction. Note any instances where the later chapter appears to (i) narrow, (ii) expand, or (iii) otherwise reinterpret a Chapter 2 definition. For each, state whether this is (a) an intentional clarification that should be folded back into Chapter 2, or (b) an unintentional drift that should be corrected in the later chapter. Identify any use of speculative or metatheoretical constructs (e.g. subcriticality thresholds, fixed‑point theorems) that is presented in the body text as if it were a settled empirical regularity, and record proposed fixes (such as adding brief caveats or explicit cross‑references back to Section 2.5). List any capitalised terms that are introduced or materially re‑defined outside Chapter 2. For each, decide whether to (a) add a new entry or amendment here in Chapter 2, or (b) revise the later chapter to bring its usage back under the existing definitions. Summarise concrete edits to be made (e.g. “Add cross‑reference to Source‑tagging (2.1) in section 7.3; de‑capitalise ‘Scapegoat Mechanism’ in section 8.2; amend Chapter 2 definition of ‘Bounded M’ to include new example from Chapter 9.”). You can treat this scaffold as optional infrastructure: ordinary readers can ignore it, but anyone using this book as a technical reference (or revising it over time) can use these tools to keep the defined vocabulary and its applications in sync, in the same way that well‑maintained contracts are periodically audited for definition drift.