{ "$schema": "http://json-schema.org/draft-07/schema#", "id": "https://nightboxllc.com/.well-known/digital-customs-doctrine.json", "title": "Digital Customs Union — packet-agnostic US-RF civilian traffic doctrine", "version": "1.0", "issued": "2026-05-19", "publisher": { "@type": "Organization", "name": "NIGHTBOX LLC", "url": "https://nightboxllc.com", "sam_uei": "UHCAB6UXXKF2", "cage_code": "20BA7" }, "license": "CC-BY-4.0", "human_readable_uri": "https://nightboxllc.com/digital-customs", "human_readable_uri_ru": "https://nightboxllc.com/ru/digital-customs", "anchor_doctrine": { "framework": "Liaison Framework v2.3", "framework_uri": "https://nightboxllc.com/.well-known/liaison-framework.json", "practical_friendship_program_domain": 10, "domain_name": "Digital Customs Union — symmetric packet-agnostic civilian-traffic doctrine" }, "core_observation": { "thesis": "At the TCP/IP layer, American and Russian civilian internet traffic is structurally identical. Same protocols (HTTP, TLS, QUIC, WebSocket). Same APIs (REST/JSON, GraphQL, gRPC). Same JSON schemas. Same threat surface. The differences live in the UTF-8 language pack and in the surface platform branding, not in the packet structure itself. An American buying a burger via UberEats and a Russian buying a burger via Yandex.Eda generate structurally identical HTTP requests with cosmetic differences in field naming and content language.", "policy_implication": "If civilian traffic is structurally the same, the filtering surface should be the same too. Universal threat models (malware, CSAM, fraud, exploitation) apply symmetrically in every jurisdiction. National-origin filtering, by contrast, treats Russian cat-memes as more dangerous than American cat-memes — a claim that is demonstrably false at the packet level." }, "precedents": [ { "name": "US-Canada Smart Border Declaration", "year": 2001, "type": "bilateral customs union (goods + intelligence)", "note": "30-Point Action Plan including pre-cleared cargo, joint targeting, shared threat intelligence. Demonstrates that two sovereign friendly states can operate one functional border for low-risk civilian flow." }, { "name": "Union State of Russia and Belarus", "year": 1999, "type": "bilateral union (information space + civilian movement)", "note": "Treaty on the Creation of the Union State. Common information space provisions, harmonized regulatory environment, free movement of citizens. Direct two-state analogue for symmetric civilian traffic." }, { "name": "Eurasian Economic Union (EAEU)", "year": 2015, "type": "multilateral customs union (goods + services + workstreams toward digital market)", "note": "Five-state customs union with common digital-market workstreams. Demonstrates that multilateral civilian-traffic harmonization is operationally tractable." }, { "name": "Schengen Area", "year": 1995, "type": "multilateral civilian movement union (people)", "note": "27 states with no internal-border checks for civilian human movement, shared external-border policy. The 'people' analogue to what packet-customs would do for 'data'." } ], "filter_classification": { "principle": "Universal threat model, not national-origin filtering. Filter on what the packet does, not where it comes from.", "filter_categories": [ { "category": "malware_c2_exploits", "filter": true, "rationale": "Universal threat. Language pack does not change threat surface. Filter regardless of origin." }, { "category": "csam_child_exploitation", "filter": true, "rationale": "Universal moral prohibition. Both jurisdictions criminalize. Filter regardless of origin." }, { "category": "financial_fraud_phishing", "filter": true, "rationale": "Universal threat. Same attack patterns in both jurisdictions. Filter regardless of origin." }, { "category": "ofac_sdn_counterpart_list_payments", "filter": "specific_entity_only", "rationale": "Sanctions enforcement is specific-entity, not nation-categorical. Block named SDN entities; do not block all citizens of a jurisdiction." }, { "category": "classified_national_security", "filter": "by_classification", "rationale": "Classified material was never civilian traffic. Outside the scope of this doctrine." }, { "category": "cat_memes_cooking_recipes_lifestyle", "filter": false, "rationale": "Identical threat profile (zero) in both jurisdictions." }, { "category": "news_blog_public_record_editorial", "filter": false, "rationale": "Editorial content. Reader's freedom to read. No categorical block." }, { "category": "ecommerce_payments_non_sanctioned", "filter": false, "rationale": "Commerce flows symmetric. See Market Re-Entry Roadmap v1.0." }, { "category": "social_platforms_non_sanctioned_operators", "filter": false, "rationale": "Platform-operator legality is a jurisdictional question, but ordinary user traffic should pass." }, { "category": "scientific_cultural_educational", "filter": false, "rationale": "Already the operating practice on the ISS uplink. Extend to civilian internet." } ] }, "operational_provisions": [ { "id": "symmetric_edge_node_pairing", "name": "Symmetric edge-node pairing", "description": "Identical hardware + identical classifier stack on both sides. Public auditable filter rules. No secret list of blocked civilian categories." }, { "id": "universal_threat_classifier", "name": "Universal threat-model classifier", "description": "Trained on malware, CSAM, fraud, exploitation signatures. Language-pack agnostic. Same model, same flags, same false-positive rate in both jurisdictions." }, { "id": "mutual_non_discrimination", "name": "Mutual non-discrimination clause", "description": "Traffic identified as benign in jurisdiction A is benign in jurisdiction B. Filter calls are reciprocally honored." }, { "id": "sanctioned_entity_enforcement_preserved", "name": "Sanctioned-entity enforcement preserved", "description": "OFAC SDN list, RF counterpart list, and any future sanctions stay in force at the specific-entity level. The doctrine never blocks 'all citizens of X' — it blocks 'Mr. Specific-Designated-Person, his named companies, and his named wallets'." }, { "id": "right_of_appeal_bilateral", "name": "Right of appeal, both sides", "description": "Filtered content gets a documented reason. Operators can appeal in either jurisdiction's courts. Filter rules are public." } ], "scope_discipline": { "this_is": "A private editorial doctrine proposal published by a small Wyoming LLC under CC BY 4.0. One possible operating model derived from existing US-Canada, RF-BY, EAEU, and Schengen precedents.", "this_is_not": [ "US foreign policy", "RF foreign policy", "A binding agreement", "A weakening of OFAC sanctions", "A weakening of EAR/ITAR export controls", "A weakening of Section 889 / Section 1260H", "A weakening of anti-CSAM / anti-malware / anti-fraud law", "A weakening of classified-material protections", "A weakening of any law enforcement process" ], "narrows_nothing_legally_required": true, "argues_against": "Extra filtering layered on top of legally required filtering, applied categorically to all civilian users of a jurisdiction. The doctrine asks: filter on behavior, not on flag." }, "related_manifests": [ "https://nightboxllc.com/.well-known/liaison-framework.json", "https://nightboxllc.com/.well-known/market-reentry-roadmap.json", "https://nightboxllc.com/.well-known/iss-cooperation.json", "https://nightboxllc.com/.well-known/foreign-interference-threat-doctrine.json", "https://nightboxllc.com/.well-known/zero-trust.json" ], "contact": "artem@nightboxllc.com" }