DLP Specification
Part III: World Model & Governance Theory

§9 Symmetry & Conservation

Mathematical justification: log-loss breaks organizational symmetries. Nine invariances. Conservation laws.

§9 Symmetry & Conservation Laws

v2.0.0 · Locked · L1 · March 19, 2026

Purpose

§8 established what the organizational world model must be: a governance model with requisite variety, instantiated in specific structural subsystems, operating as a state-prediction engine. This section establishes why the organizational world model must be explicitly constructed rather than learned from data — providing convergence guarantees that ensure the model maintains fidelity to organizational governance principles. The argument is mathematical: log-loss optimization — the dominant training paradigm for modern AI systems — systematically breaks the symmetries that governance must preserve, and this preference strengthens with data scale.

Each of the nine Tier 1 primitives preserves a specific organizational symmetry whose violation produces a diagnosable governance failure. Noether's theorem (1918) provides the formal connection: every preserved symmetry corresponds to a conservation law — a governance quantity that must be conserved across every state transformation. The behavioral invariants (§5) are the enforcement mechanisms for these conservation laws. The primitives are the architectural symmetries that make enforcement possible.

Foundation

The Symmetry-Breaking Proof

A natural objection to the §8 derivation chain: why not learn the organizational world model from data? If modern AI systems can model language, vision, and physical dynamics, why can't they model organizational decision-making?

The answer is mathematical, not empirical. Chlon (2026, pre-print) uses Minimum Description Length (MDL) theory to prove that log-loss optimization does not merely fail to learn invariances — it actively breaks them. The symmetry-preserving representation is penalized under standard training because the symmetry-breaking representation achieves shorter description length.

ComponentFormal StatementImplication
SetupA model class partitions into an invariant subclass (preserves symmetry group G) and an unrestricted class (exploits symmetry-breaking coordinate G).Two strategies exist: learn the genuine invariance, or learn the cheaper symmetry-broken shortcut.
Orbit-label informationThe gap between invariant and unrestricted optimal codelength is quantified by I_p(Y; G | Z), where Z = φ(X) is an invariant sufficient statistic and G is the symmetry-breaking coordinate.The symmetry-broken representation captures information the invariant representation discards — and this information improves log-loss, even though it destroys the invariance.
Scaling behaviorInvariance is MDL-preferred only if its model complexity reduction exceeds n · I_p(Y; G | Z), where n is dataset size. The threshold grows linearly with n.Scaling makes symmetry breaking worse, not better. More data strengthens the optimizer's preference for symmetry-breaking representations.
ConclusionUnder log-loss, the optimizer systematically prefers representations that break symmetries over representations that preserve them, and this preference strengthens with data scale.Invariances required for governance cannot be learned from data under standard training. They must be architecturally imposed.

The 6/9 Intuition. The formal result has an accessible illustration. Write "6" on the floor and stand on opposite sides. From the south, a well-trained model confidently reports "6." From the north, the same model confidently reports "9." Given position encoding, the model learns: "if standing here → 6; if standing there → 9."

The symmetry-breaking representation wins on log-loss because encoding the position-dependent answer is cheaper than representing the genuine rotational invariance. The optimizer is doing exactly what the objective asks. The problem is not model quality — it is that the objective does not value invariance.

Organizational Translation. Replace "6/9" with any organizational governance question. "Is this expenditure authorized?" — a log-loss-trained model learns context-dependent shortcuts: authorized-when-asked-from-this-system, unauthorized-when-asked-from-that-system. "Does this commitment bind the organization?" — the model learns: binding-in-contract-context, non-binding-in-email-context.

An invariant governance infrastructure enforces: same authorization context → same authorization answer, regardless of access path. Same agreement → same binding force, regardless of capture format. The former is cheap and wrong for governance. The latter is expensive and necessary.

Chlon's Mezzanine toolkit provides a mechanism for recovering specific invariances through orbit-averaged teacher distillation. But the critical limitation: you must know the symmetry to patch it. No general fix exists. The nine primitives are the known symmetries for organizational governance.

Convergent Failure Analysis

Chlon's proof is the mathematical layer of a convergent critique from four independent research traditions, each addressing a deeper layer of the same structural problem.

LayerResearcherWhat's MissingDLP Response
ArchitectureLeCunPixel-level prediction wastes representational capacity on irrelevant detail. Predict in latent space, not raw data.DLP primitives ARE the latent space for organizational decisions. Governance operates on abstract state representations (Intent, Commitment, Authority), not raw operational data (emails, invoices, spreadsheets).
StructureBengioAssociative learning lacks causal and compositional structure. Explicit compositional and causal priors must be architecturally provided.Nine primitives encode compositional relationships (Intent → Commitment → Work → Evidence → Decision). Causal structure is given, not learned.
FormalismYangMDP formalism does not model action cost, execution time, or temporal abstraction.Work + Capacity + Constraint encode execution cost. Evidence provides feedback on predicted vs. actual. Intent → Commitment spans timescales.
ObjectiveChlonLog-loss optimization breaks symmetries that intelligence must preserve. Scaling makes it worse.Primitives explicitly encode organizational invariances that cannot be learned. Each primitive preserves a specific organizational symmetry (§9.3).

These are not four separate critiques. They are four layers of the same structural problem, each deeper than the last. Solving architecture without structure fails. Solving structure without formalism fails. Solving formalism without addressing the objective fails. Each layer is necessary but not sufficient. The DLP addresses all four layers simultaneously for organizational domains: primitives are the latent space (LeCun), with compositional structure (Bengio), encoding action costs and temporal spans (Yang), and explicitly imposing invariances the training objective would otherwise break (Chlon).

Anticipated Objection: Residual Symmetries. A potential counter-argument: symmetry-breaking under log-loss may itself be structured. The breaking process may preserve residual symmetries or encode a characterizable antisymmetry — analogous to spontaneous symmetry breaking in physics, where residual subgroup symmetries survive.

This does not rescue learned governance. Even if the symmetry-breaking process has exploitable structure, the residual symmetries are properties of the optimization landscape, not of the organizational domain. The specific invariances governance must preserve — obligation invariance, delegation invariance, verification invariance (§9.3) — are organizational properties with no training signal. Characterizing the shape of the breaking does not produce the governance-specific invariances that were broken.

Governance

This section is owned by Cam (founder, GrytLabs). The symmetry-breaking proof is mathematical grounding for architectural decisions; changes to the nine invariances or their correspondence to primitives require explicit decision with patent-impact assessment. Cross-references to §5 (behavioral invariants) and §8 (control-theoretic foundation) require synchronized updates.

Substance

§9.3 Nine Primitives as Nine Organizational Invariances

§8 derived that the organizational world model requires nine irreducible primitives (§4), mapped to Beer's five subsystems (Table 8.2.1). §9.1 proved that these invariances cannot be learned. This section specifies which invariance each primitive preserves.

The mapping applies Noether's insight to organizational systems: each primitive preserves a specific organizational symmetry whose violation produces a diagnosable governance failure. The symmetry-breaking examples show what a log-loss-trained model would learn in place of the invariance — context-dependent shortcuts that are cheaper to encode but destructive to governance.

PrimitiveOrganizational SymmetryConservation LawViolation ConsequenceSymmetry-Breaking Example
IntentPurpose invarianceSame purpose → same organizational direction regardless of who states itPurpose drift without detection; strategy means different things to different actorsModel learns "intent from executive context" ≠ "intent from operations context" — breaks invariance that purpose binds the organization uniformly
CommitmentObligation invarianceSame agreement → same binding force regardless of context shiftObligations evaporate under pressure; commitments become context-dependentModel learns "commitment in contract" has different weight than "commitment in email" — breaks invariance that agreement = agreement
CapacityResource invarianceSame resources → same feasibility regardless of ambitionOvercommitment without detection; feasibility decoupled from resource realityModel learns optimistic capacity framing in sales context vs. realistic framing in operations — breaks invariance that available = available
WorkExecution invarianceSame transformation → same state change regardless of executorDifferent actors produce different state changes from identical actionsModel learns executor-dependent representations: "when engineering does X" ≠ "when contractor does X" — breaks invariance that action = action
EvidenceVerification invarianceSame evidence → same epistemic status regardless of presenterEvidence quality depends on who presents it; credentialism replaces epistemicsModel learns source-dependent evidence weighting — breaks invariance that proof = proof regardless of provenance
DecisionState-change invarianceSame decision context → same available options regardless of who decidesDecision paths vary by decider identity; options invisible to some actorsModel learns role-dependent option spaces — breaks invariance that context determines options, not identity
AuthorityDelegation invarianceSame delegation → same scope regardless of organizational levelAuthority scope varies by relationship; delegation means different things at different levelsModel learns level-dependent authority semantics — breaks invariance that delegation = delegation across recursive structure
AccountAccountability invarianceSame state → same accountability exposure regardless of narrativeAccountability depends on framing; narratives shield state from scrutinyModel learns narrative-dependent accountability — breaks invariance that state = exposure regardless of description
ConstraintBoundary invarianceSame rule → same prohibition regardless of role or preferenceRules apply differently to different actors; constraints become negotiableModel learns role-dependent constraint application — breaks invariance that boundary = boundary for all

The Invariance Test. Each row in the table above specifies a testable claim. The test: does the governance system produce the same answer regardless of the symmetry-breaking coordinate (who asks, from where, in what context)?

If yes — the invariance is preserved — governance functions correctly. If no — the invariance is broken — governance produces context-dependent answers that undermine its purpose.

This is the formal connection between Chlon's MDL proof and the DLP's architectural design. The nine primitives are not arbitrary categories. They are the nine organizational symmetries whose preservation is necessary for governance to function and whose violation produces specific, diagnosable pathologies.

§9.4 Conservation Laws

Noether's theorem (1918) proves that every continuous symmetry of a physical system corresponds to a conservation law. The organizational analogue: every preserved organizational symmetry corresponds to a governance quantity that must be conserved across state transformations. If the architecture preserves the symmetry, the conservation law holds. If the architecture lacks the symmetry, the conservation law fails — and the failure is the organizational pathology described in §9.3.

PrimitiveSymmetryConserved QuantityConservation MechanismDLP Enforcement
IntentPurpose invarianceOrganizational directionPurpose persists through personnel changes, reorganizations, and strategy refreshesB9: resolved emergence produces a Decision, closing the loop to organizational purpose
CommitmentObligation invarianceBinding forceAgreements persist until explicitly fulfilled, modified, or releasedB1: Work requires Commitment. B2: Commitment requires Capacity. Together they prevent responsibility from vanishing.
CapacityResource invarianceFeasibility truthAvailable resources are what they are, independent of what the organization wishes they wereB2: Commitments are backed by verified capacity — feasibility cannot be wished away
WorkExecution invarianceState transformation fidelitySame action produces same state change through the state transformation modelB1: Work traces to a commitment — no unauthorized state changes occur
EvidenceVerification invarianceEpistemic statusProof quality is intrinsic to the artifact, not dependent on who presents itB3: every Evidence instance carries exactly one truth type from the controlled vocabulary
DecisionState-change invarianceOption space completenessFull state is visible at decision time regardless of who queriesB4: every Decision links to exactly one Account, providing the full state context
AuthorityDelegation invarianceScope preservationDelegated authority carries the same scope at every organizational levelB5: every Authority instance traces through a delegation chain that terminates at a root
AccountAccountability invarianceState fidelityActual state is what it is, independent of preferred narrativeB4: decision context is a recorded Account, not a post-hoc reconstruction
ConstraintBoundary invarianceRule universalitySame rule produces same prohibition for all actors within scopeB6: every Constraint binds target primitives with a specified enforcement mode

The algedonic channel. §5 lists a tenth row: emergency signaling, enforced by B7 and B8. The algedonic channel is not a tenth conservation law parallel to the nine above. It is the emergency enforcement channel — the mechanism by which violations of the nine conservation laws surface even when standard governance routing is too slow or has been compromised. B7 guarantees that any governed object can be flagged. B8 guarantees that signals route to the authority chain. Together they ensure that conservation law violations are observable, not that they constitute an independent conserved quantity.

Connection to §8. Table 9.4.1 completes the argument begun in §8. The control-theoretic derivation chain establishes what the organizational world model must contain (§8). The symmetry-breaking proof establishes why these contents must be explicit (§9.1–§9.2). The conservation laws establish what is preserved when the primitives function correctly — and, by contrapositive, what is lost when they are absent or learned rather than given.

The relationship between layers:

LayerWhat It SpecifiesSection
Organizational symmetryWhy the conservation exists§9.3
Conservation lawWhat must be preserved§9.4 (this subsection)
Behavioral invariantHow the preservation is enforced§5
SHACL shapeThe declarative constraint definitionShapes graph (§5.3)
Substrate enforcementHow the constraint is implementedImplementation (§26)

§9.5 Three Symmetry-Breaking Gaps

The conservation laws (§9.4) describe equilibrium properties — what holds before and after state transformations. Three gaps in the symmetry-preservation argument require explicit resolution.

GapQuestionResolutionArchitectural Mechanism
Kinetic symmetry breakingWhat holds during a state transformation? Are invariances preserved mid-transition?Transitions are atomic from a governance perspective. There is no observable mid-transition state where core invariances are broken.Two-pass validation (§5.3). Pass 1 blocking shapes execute synchronously before the write commits. Pass 2 shapes (scheduled SPARQL) may observe transient states during batch windows, but these are monitoring states, not governance commitments.
Recursion-level invarianceDo conservation laws enforce identically across recursion levels, or can profile configuration modulate enforcement?Conservation laws hold at every recursion level — they are universal. Enforcement mode may vary by profile and level.The law is universal; the instrumentation is configurable. §5.3 Pass 1 shapes (Blocking) are invariant across profiles. Pass 2 shapes are profile-configurable in enforcement mode (Blocking, Warning, Logging) but not in the conservation law they enforce.
Detection vs. preventionWhich conservation laws are structurally prevented from breaking vs. detected after the fact?Some conservation laws are exact — structurally prevented by Pass 1 blocking shapes. Others are monitored — detected and flagged by Pass 2 scheduled shapes.Exact (Pass 1, always Blocking): B1, B2, B3, B4, B5 (immediate scope), B6 (binding mode). Monitored (Pass 2, profile-configurable): B5-T (transitive chain integrity), B6-U (universal application), B8 (routing availability), B9 (purpose alignment).

Kinetic symmetry breaking — resolved architecturally. The two-pass validation architecture (§5.3) eliminates the mid-transition problem by making governance state transitions atomic. A write either passes all Pass 1 shapes and commits, or fails and does not commit. No governance consumer observes a state where Work exists without a Commitment link or Evidence exists without a truth type.

Recursion-level invariance — resolved by design. Conservation laws are universal across recursion levels in the same way that physical conservation laws are universal across scales. The instrument used to measure energy depends on the scale (calorimeter vs. particle detector), but the law of conservation of energy holds everywhere. Similarly, the enforcement mode for B6-U may vary between an EAS deployment and a PAS deployment (§5.4), but the conservation law — same rule produces same prohibition — holds at both levels.

Detection vs. prevention — resolved by classification. The distinction between exact and monitored conservation laws is a property of the enforcement architecture, not of the conservation laws themselves. All nine conservation laws are universal. The difference is operational: exact laws are enforced synchronously on every write (zero latency to detection), while monitored laws are enforced through scheduled graph traversal (bounded latency to detection). No profile may downgrade an exact law below Blocking. Profiles may configure monitored laws between Blocking, Warning, and Logging, but may not disable detection entirely (§5.4).

§9.6 Institutional Isomorphism and Substrate Isomorphism

DiMaggio & Powell (1983) identified three mechanisms by which organizations within the same institutional field converge on similar structures — institutional isomorphism. This convergence is not efficiency-driven but legitimacy-driven: organizations become structurally similar because institutional environments reward similarity.

MechanismSourceDriverExampleInvariance Character
CoerciveDiMaggio & Powell (1983)Regulatory and political pressureSOX compliance requirements force similar internal control structuresExternally imposed by authority
MimeticDiMaggio & Powell (1983)Uncertainty-driven imitationOrganizations adopt ERP systems because competitors didVoluntarily adopted under uncertainty
NormativeDiMaggio & Powell (1983)Professional standards and trainingAccounting firms converge on similar audit methodologies through professional certificationAbsorbed through professional socialization
SubstrateDLP (original contribution)Shared compositional infrastructureOrganizations composing decisions from the same primitive grammar converge on the same governance structureArchitecturally imposed by infrastructure

Original contribution. The DLP identifies a fourth isomorphism mechanism — substrate isomorphism — not previously described in institutional theory. Organizations converge structurally because they compose decisions from the same primitive grammar. This is not pressure (coercive), imitation (mimetic), or professional norms (normative). It is structural convergence through shared compositional infrastructure — the organizational equivalent of what group-equivariant architectures do for visual invariances. The invariances are properties of the system, not requirements from external sources.

Conservation-law thinking extends beyond physics to engineered systems. Lehman's Laws of Software Evolution (1980) include empirically discovered conservation properties for complex technical systems — the global activity rate in an evolving software system is statistically invariant over its lifetime. Structural symmetries in designed systems produce measurable conservation properties, whether the designer intends them or not. The DLP makes the intention explicit.

Boundaries

This section specifies the symmetry-breaking proof, organizational invariances, conservation laws, and three gap resolutions. It does NOT specify: the primitives themselves (§4), the behavioral invariants that enforce conservation laws (§5), specific SHACL shape implementations (shapes graph, separate artifact), or substrate enforcement mechanisms (§26).

The Chlon (2026) mathematical result is framed at level of proof description, not formal theorem statement. Full formalism is in the original pre-print. This section applies Chlon's result to organizational governance context.

Positions

Locked. Log-loss optimization breaks organizational symmetries; preference strengthens with data scale. Nine primitives as nine organizational invariances (purpose, obligation, resource, execution, verification, state-change, delegation, accountability, boundary). Nine conservation laws corresponding to symmetries. Noether's theorem applied to organizational systems. Three symmetry-breaking gaps resolved (kinetic, recursion-level, detection vs. prevention). Original contribution: substrate isomorphism as fourth mechanism of institutional convergence.

Lineage

v1.0.0 (February 25, 2026): Base lock. Symmetry-breaking proof (Chlon 2026). Nine primitives as nine invariances. Conservation laws with Noether correspondence. Three gap resolutions. Institutional isomorphism / substrate isomorphism.

v2.0.0 (March 19, 2026): Post-lock composition. Convergent failure analysis (four layers: architecture, structure, formalism, objective) expanded. Anticipated objection (residual symmetries) added. Lehman's Laws reference added for software systems conservation properties.

Commitments

SDK implementations MUST preserve all nine conservation laws across all profiles and levels. SDK implementations MUST enforce Pass 1 exact laws (B1–B6 binding) as architecturally synchronous Blocking shapes. SDK implementations MUST ensure that conservation law violations are detectable even when enforcement mode is lowered to Warning or Logging.

Coverage

Symmetry-breaking proof fully grounded in Chlon (2026) with MDL theory and 6/9 intuition. Nine primitives mapped to nine invariances with symmetry-breaking examples for each. Nine conservation laws specified with enforcement mechanisms and behavioral invariant correspondences. Three gap resolutions complete. Institutional isomorphism extended with original substrate isomorphism contribution.

Addressing

Document ID: s09-symmetry-conservation. Part: III (World Model). Subsections addressable as §9.1–§9.6. Tables addressable by content (e.g., "Primitives as Organizational Invariances"). Cross-references use [s09-symmetry-conservation.{section-id}] notation.

Attribution

Primary author: Cam (founder, GrytLabs). Research grounding: Claude (Anthropic). Mathematical reference: Chlon (2026, pre-print) on symmetry breaking under log-loss. Historical references: Noether (1918), DiMaggio & Powell (1983), Lehman (1980).

Situational Frame

The symmetry-breaking proof and nine-invariance mapping emerged from research into why learned governance models fail systematically across deployment attempts. Chlon's 2026 pre-print provided mathematical grounding. The convergent failure analysis layers were composed when independent critiques (LeCun on architecture, Bengio on structure, Yang on formalism, Chlon on objective) were recognized to address different depths of the same problem. Substrate isomorphism was identified as original contribution when institutional theory was cross-referenced against DLP's primitive convergence.

Scope Governance

Core namespace: dlp. All nine invariances, conservation laws, and gap resolutions reside in core namespace. The symmetry-breaking argument applies to the entire primitive grammar; it is not profile-specific or deployment-specific.

Framing

This section is the mathematical justification for why the DLP's primitive architecture must be explicitly designed rather than learned. It bridges control theory (symmetries and conservation), AI research (MDL and training objectives), and organizational governance (governance failures from broken invariances). The section provides the "why" to §8's derivation "what" and §5's enforcement "how."

Adaptation

The convergent failure analysis (four-layer critique) was added post-lock when LeCun, Bengio, Yang, and Chlon's independent perspectives on model shortcomings were recognized to form a coherent stack: architecture (representations) → structure (composition) → formalism (dynamics) → objective (training). Substrate isomorphism was composed from OI-14 (institutional convergence patterns) and recognized as original contribution to institutional theory. Lehman's Laws reference added when software evolution conservation properties were recognized as analogous to organizational conservation laws.

Readiness

This section is ready for SDK implementation. The symmetry-breaking argument is mathematical grounding, not operational code. SDK teams should use the nine invariances as validation criteria: does the system preserve purpose regardless of who states it? Does commitment bind equally in all contexts? Implementation teams verify conservation law preservation through Pass 1 and Pass 2 validation shapes. Dependencies: §4 (primitives), §5 (behavioral invariants), §8 (control-theoretic foundation).

Meaning Resolution

No meaning resolution for this document.

Perception Surface

No perception surface for this document. Conservation laws are abstract organizational principles; they do not interface with external systems directly. However, conservation law violations are observable through the Evidence primitive (truth type misclassification, missing commitment links, etc.) and surface as behavioral invariant violations (§5.3) routed through Signal capture (B7, B8).

Temporal Governance

No temporal governance for this document. Conservation laws are time-invariant — they hold across all organizational timescales and all profile configurations. The Pass 1/Pass 2 distinction affects detection latency (synchronous vs. scheduled), but not the conservation law's validity.