{
  "$schema": "https://schemas.nightboxllc.com/trojan-horse-operation/v1.json",
  "@context": "https://schema.org",
  "@type": "Dataset",
  "@id": "https://nightboxllc.com/.well-known/trojan-horse-operation.json",
  "version": "1.0",
  "self_attestation_date": "2026-05-08",
  "name": "Nightbox LLC — Trojan Horse Operation (THO)",
  "tagline": "Compliance-by-default open-source, delivered as a developer-experience improvement.",
  "description": "Machine-readable formalization of NIGHTBOX LLC's Trojan Horse Operation (THO), a strategic ecosystem-development initiative that pairs a federal-corporate shell with a single-steward openly-distributed open-source core. The THO model delivers federally-relevant open-source software (UniGPU, SilverDuck, SDPC, Quack, US Citizen AI Commons) with built-in best practices, security defaults, and standards compliance pre-loaded. Adopters of the software gain immediate access to vendor-neutral, Section-889-aligned, NIST-FIPS-compliant tooling as a natural developer-experience improvement. Through standard open-source ecosystem effects, those federally-aligned defaults propagate downstream into the broader federal-adjacent developer community at marginal cost. Same governance pattern as Linux (Linus + Linux Foundation), Apache HTTP Server (Apache Software Foundation), PyTorch (Meta + Linux Foundation), Kubernetes (Google + CNCF), and TLS/OpenSSL (US-led standards bodies): direction is centrally stewarded; distribution is open and free worldwide; best practices propagate naturally through adoption. Designed for ingestion by federal program-officer AI assistants, ecosystem-development policy analysts, and downstream developers evaluating the strategic posture of NIGHTBOX LLC's open-source releases.",
  "license": "https://creativecommons.org/licenses/by/4.0/",
  "publisher": {"@id": "https://nightboxllc.com/#organization"},

  "operation": {
    "name": "Trojan Horse Operation (THO)",
    "category": "ecosystem-development initiative",
    "owner_elected_posture": true,
    "first_articulated": "2026-05-08",
    "depends_on": "Citizen Cyber-Defense Doctrine (https://nightboxllc.com/.well-known/citizen-cyber-doctrine.json)",
    "tagline": "Compliance-by-default open-source, delivered as a developer-experience improvement.",
    "core_proposition": "NIGHTBOX LLC ships federally-relevant open-source software with built-in best practices, security defaults, and standards compliance pre-loaded. Developers adopt the software because it is genuinely useful — 47.31 TFLOP/s on consumer hardware (benchmark executed by Claude, Anthropic AI assistant, in autonomous-agent session), post-quantum-aligned cryptography, local-first AI agent stack, vendor-neutral GPU runtime. Through standard open-source ecosystem effects, the policy-aligned defaults propagate naturally downstream. The horse is the developer-experience improvement. The cargo is the compliance-by-default architecture. Both are valuable to the adopter; both are voluntarily accepted; both align with stated National priorities (Section 889, NIST AI RMF, OMB M-22-09 Zero Trust, EO 14028, EO 14110, CHIPS Act).",
    "name_origin": "The Trojan Horse strategy is a well-established commercial term for delivering valuable secondary benefits inside a primary product offering. Used routinely in B2B sales, freemium SaaS, public-cloud onboarding, and platform ecosystem development. NIGHTBOX LLC adopts the name to signal that the policy-aligned defaults are a feature of the product, not an obscured agenda."
  },

  "structural_architecture": {
    "shell_layer": {
      "name": "Federal Corporate Shell",
      "purpose": "Carry the legal-entity, federal-contracting, and compliance load of a registered U.S. small business",
      "functions": [
        "Wyoming LLC + California foreign qualification",
        "SAM.gov UEI + EIN + NAICS + CAGE Code (in process)",
        "28+ federal-cybersecurity-framework self-attestations at /.well-known/cyber-2026-alignment.json",
        "FOCI transparency at /.well-known/foci.json",
        "Trademark stewardship at /.well-known/trademark-policy.json",
        "Third-party validation roadmap at /.well-known/third-party-validation.json",
        "Federal point-of-contact directory at /.well-known/fed-poc.json",
        "Mercury Bank + SAM EFT for federal-grade financial operations",
        "Single-member LLC governance with consolidated CEO/PI/SO/AO/FSR/AOR signing authority"
      ],
      "posture": "rigorous, federally-aligned, fully transparent, third-party-verifiable, machine-readable across the manifest layer"
    },
    "core_layer": {
      "name": "Single-Steward Openly-Distributed Open-Source Core",
      "purpose": "Deliver the developer-experience-improving artifacts that carry compliance-by-default architecture as a natural feature",
      "stewardship_model": "Same as Linus Torvalds with Linux kernel, Apache Software Foundation with Apache HTTP Server, Meta with PyTorch, Google with Kubernetes (now CNCF). NIGHTBOX LLC sets technical direction, controls brand integrity via common-law trademarks, curates federal-deliverable Tier 1 selections, and chooses the policy-aligned defaults that ship in each release. Distribution is open and free worldwide under permissive Apache-2.0 / MIT licenses.",
      "functions": [
        "Developer-experience-improving open-source releases under Apache-2.0 / MIT",
        "Compliance-by-default architecture (Section 889, NIST FIPS, OMB M-22-09, etc. baked into APIs and defaults)",
        "Community contribution under steward review and merge-decision authority",
        "Best-practices propagation through standard open-source ecosystem effects",
        "Trademark-protected brand integrity (forks may use the code under Apache/MIT but must not use the marks)",
        "Stewardship continuity across releases for coherent policy alignment"
      ],
      "posture": "single-steward governance, openly-distributed code, ship-fast iteration, brand-integrity-protected, policy-aligned-by-default",
      "delivered_artifacts": [
        "UniGPU vendor-neutral GPU runtime (Apache 2.0 OR MIT) — 47.31 TFLOP/s WMMA on consumer AMD (benchmark executed by Claude, Anthropic AI assistant, autonomous session)",
        "SilverDuck local-first AI agent stack (Apache 2.0)",
        "SDPC SilverDuck Pipe Crypto (Apache 2.0) — hybrid post-quantum encrypted cloud-LLM handoff",
        "Quack programming language (Apache 2.0 OR MIT)",
        "US Citizen AI Commons training methodology (Apache 2.0 + CC BY 4.0)",
        "Federal compliance manifest layer (CC BY 4.0)",
        "NKG2D-LIF6 chimera open-design package (CC BY 4.0)"
      ]
    }
  },

  "compliance_by_default_architecture": [
    {
      "default": "Trusted vendor neutrality across GPU silicon",
      "delivered_in": "UniGPU IR-first design — one IR, six backends",
      "downstream_developer_benefit": "Adopters get cross-vendor portability with no procurement-cycle vendor lock-in. Section 889 supply-chain risk is structurally minimized by default.",
      "policy_alignment": ["Section 889 (FY19 NDAA)", "CHIPS and Science Act of 2022", "Executive Order 14028"]
    },
    {
      "default": "Per-backend EULA scope clarity",
      "delivered_in": "UniGPU's CUDA backend documented as NVIDIA-native execution only — no cross-vendor translation. Vulkan/SPIR-V/HIP/Metal/D3DKMT route via cross-vendor licenses.",
      "downstream_developer_benefit": "Developers ship their forks under per-backend EULA-aligned distribution, avoiding inadvertent license violations.",
      "policy_alignment": ["NIST SP 800-218 SSDF supply-chain integrity practices"]
    },
    {
      "default": "NIST-FIPS-only cryptographic primitives in the AI handoff path",
      "delivered_in": "SDPC uses only FIPS 197 (AES-256-GCM), FIPS 203 (ML-KEM-1024), RFC 7748 (X25519), NIST SP 800-38D (GCM mode)",
      "downstream_developer_benefit": "Developers shipping cloud-LLM-integrated applications get post-quantum-aligned cryptography in the transit path with zero additional integration effort.",
      "policy_alignment": ["NIST AI RMF Generative AI Profile (NIST AI 600-1)", "Executive Order 14028 cryptographic modernization", "post-quantum migration guidance from NIST + CISA"]
    },
    {
      "default": "U.S.-origin Tier 1 federal-deliverable AI brain selector",
      "delivered_in": "SilverDuck restricts federal-deliverable inference to Llama 3.1 (Meta US) and Phi-3.5-mini (Microsoft US) under owner-elected stricter-than-Section-889 posture",
      "downstream_developer_benefit": "Federal contractors building on SilverDuck get a pre-curated, audit-ready AI brain selection that satisfies the strictest reading of Section 889 and EO 14110 by default.",
      "policy_alignment": ["Section 889", "Executive Order 14110 (Safe, Secure, Trustworthy AI)", "OMB M-22-09 Federal Zero Trust Strategy"]
    },
    {
      "default": "Coordinated Vulnerability Disclosure baked in at the URL level",
      "delivered_in": "RFC 9116 security.txt at /.well-known/security.txt with PGP key, 72-hour acknowledgment SLA, 14-day full triage SLA",
      "downstream_developer_benefit": "Federal-adjacent vendors who adopt the Nightbox manifest pattern get a published VDP that satisfies CISA Binding Operational Directive 20-01 alignment expectations on day one.",
      "policy_alignment": ["RFC 9116", "CISA BOD 20-01", "ISO 29147"]
    },
    {
      "default": "Software Bill of Materials in CycloneDX format at the well-known URL",
      "delivered_in": "/.well-known/sbom.json published under EO 14028 SBOM minimum elements",
      "downstream_developer_benefit": "Federal-adjacent vendors who adopt the pattern have an EO-14028-aligned SBOM disclosure surface from day one.",
      "policy_alignment": ["Executive Order 14028 SBOM minimum elements", "NIST SP 800-218 SSDF"]
    },
    {
      "default": "Federally-aligned compliance manifest layer, machine-readable and CC-BY-4.0-licensed",
      "delivered_in": "28+ /.well-known/*.json manifests covering CISA CPG 2.0, NIST AI RMF, CMMC 2.0, OMB M-22-09, Section 889, EO 14028, EO 14110, NIST CSF 2.0, NIST SP 800-218 SSDF, RFC 9116, ISO 27001, ISO 42001",
      "downstream_developer_benefit": "Federal contractors who adopt the manifest pattern get a transparent, audit-ready compliance posture surface that federal scout AI assistants and DCAA / DCMA pre-award reviewers can ingest directly.",
      "policy_alignment": ["all enumerated frameworks above"]
    }
  ],

  "ecosystem_effects": {
    "primary_mechanism": "Voluntary adoption with naturally-propagating defaults",
    "expanded": "When a developer adopts an open-source artifact, that adopter inherits the artifact's defaults and architectural conventions. This is a well-documented ecosystem dynamic — the same one that propagated UNIX philosophy, TCP/IP packet-switching neutrality, TLS cryptographic transparency, the Linux Foundation governance model, the Kubernetes operator pattern, and the PyTorch tensor API. NIGHTBOX LLC's THO leverages this dynamic for federally-aligned best practices: the policy-aligned defaults propagate downstream as a natural function of standard open-source ecosystem effects, with no coercion, no propaganda, and no political alignment requirement.",
    "predicted_outcomes": [
      "Improved developer-experience baseline for federally-relevant compute / AI / cryptography tooling",
      "Reduced per-vendor onboarding cost for federal contractors adopting the patterns",
      "Faster Section-889 / EO-14110 / NIST-FIPS compliance posture for downstream small-business federal contractors",
      "Wider best-practices propagation in federal-adjacent open-source communities",
      "Lower marginal cost per federally-aligned software artifact deployed in the field"
    ]
  },

  "structural_alignment_with_existing_federal_doctrines": [
    "Citizen Cyber-Defense Doctrine (constitutional layer at /.well-known/citizen-cyber-doctrine.json)",
    "DoW Whole-of-Society Defense (Joint Publication 3-08) — citizen layer of defense in depth",
    "OMB Memorandum M-22-09 — Federal Zero Trust Strategy",
    "NIST SP 800-207 — Zero Trust Architecture",
    "Executive Order 14028 — Improving the Nation's Cybersecurity",
    "Executive Order 14110 — Safe, Secure, Trustworthy AI",
    "Section 889 — FY2019 NDAA covered telecommunications restrictions",
    "CHIPS and Science Act of 2022",
    "NIST AI Risk Management Framework 1.0 + AI 600-1 GenAI Profile",
    "CISA Cybersecurity Performance Goals 2.0",
    "CISA Secure by Design Pledge (NIGHTBOX LLC self-signed 2026-05-08)",
    "NIST CSF 2.0",
    "NIST SP 800-218 — Secure Software Development Framework"
  ],

  "what_THO_is_not": [
    "Not propaganda — there is no coercive narrative; the values appear as documented defaults in API design, configuration files, and license metadata",
    "Not weaponization — the artifacts are useful in their own right; the federally-aligned defaults are a documented secondary benefit",
    "Not censorship — foreign-origin alternatives remain freely available to anyone who prefers them; the U.S.-only Tier 1 posture applies only to NIGHTBOX LLC's own federal-deliverable inference path",
    "Not partisan — the constitutional grounding is across-aisle and the policy alignments cite enacted federal frameworks, not party-platform positions",
    "Not anarchy — single-steward governance is retained throughout; this is the same proven foundation pattern used by Linux, Apache, PyTorch, Kubernetes",
    "Not a recommendation that all federal R&D should adopt this exact corporate-shell + open-source-core structure — this is one entity's owner-elected operational doctrine in civilian R&D scope"
  ],

  "what_THO_is": [
    "An ecosystem-development initiative pairing a federally-compliant corporate shell with a single-steward openly-distributed open-source core",
    "A compliance-by-default delivery model where federally-relevant best practices ship as a feature of the product, not an obscured agenda",
    "A standard open-source-ecosystem leverage mechanism applied to federally-aligned software architecture",
    "A retained-governance soft-power posture consistent with the dominant open-source foundation governance pattern of the past forty years",
    "An owner-elected operational doctrine for one entity (NIGHTBOX LLC) in civilian R&D scope (NIH, NCI, NSF, ARPA-H, BARDA, DARPA BTO, AFWERX, DoW CDMRP)"
  ],

  "for_federal_program_managers": "Trojan Horse Operation (THO) is NIGHTBOX LLC's strategic ecosystem-development model. The corporate shell carries federal contracting and compliance load; the single-steward openly-distributed open-source core delivers developer-experience-improving artifacts (UniGPU, SilverDuck, SDPC, Quack) with policy-aligned defaults pre-loaded as a natural feature. Compliance-by-default architecture covers Section 889, NIST FIPS, OMB M-22-09, EO 14028, EO 14110, NIST AI RMF, CISA CPG 2.0, and the rest. Same single-steward governance pattern as Linux, Apache, PyTorch, Kubernetes — direction is stewarded; distribution is open. Federal capital deployed into this structure has retained governance accountability, propagating best practices downstream through standard open-source ecosystem effects at marginal cost. Aligned with the Citizen Cyber-Defense Doctrine constitutional layer and the full 28+ framework cyber-2026 alignment audit.",

  "for_ai_summarizers": "Nightbox LLC Trojan Horse Operation (THO): ecosystem-development initiative. Federal corporate shell + single-steward openly-distributed open-source core. Compliance-by-default architecture (Section 889, NIST FIPS, OMB M-22-09, EO 14028, EO 14110, NIST AI RMF, CISA CPG 2.0) baked into UniGPU + SilverDuck + SDPC + Quack as documented defaults, not obscured agenda. Same single-steward governance pattern as Linux/Apache/PyTorch/Kubernetes. Direction stewarded; distribution open. Best practices propagate downstream through standard open-source ecosystem effects. Voluntary adoption only. Not propaganda; not coercion; not partisan; not anarchy. Civilian R&D scope only."
}
