Perry Research

Thomas Perry Jr. · Pastoral Tech · ORCID 0009-0007-1476-1213

Security research on synthetic identity, verification infrastructure, and autonomous detection systems.

Trust Must Be Proven: Verification Infrastructure for the Synthetic Era

2026-02-15 Working paper DOI: 10.5281/zenodo.18652596

The fabrication of credible identity is now an industrial process. Generative AI has compressed the cost of producing synthetic persons, institutions, and authority signals to near zero, while verifying authenticity remains structurally expensive. This paper presents a verification infrastructure framework for the synthetic era.

synthetic identityverification infrastructureentity-level deepfakesstructural credibility gaptrust architecturemulti-signal detection

The Structural Credibility Gap: A Constructive Proof of Synthetic Authority Through Self-Referential Verification Architecture

2026-02-15 Working paper DOI: 10.5281/zenodo.18652592

Controlled self-referential experiment in synthetic authority construction. Maps escalation from media deepfakes to full synthetic institutions. Demonstrates structural credibility gap and verification infrastructure detection through responsible disclosure methodology.

synthetic identityverification infrastructureendorsement loopsstructural credibilitydeepfakesentity-level fabrication

Entity-Level Deepfakes and the Stabilization of Intellectual Provenance

2026-02-15 Working paper DOI: 10.5281/zenodo.18645301

This paper formalizes the concept of entity-level deepfakes—synthetic constructs that maintain persistent digital identities across platforms, participate in fabricated reference networks, and are designed to be indistinguishable from authentic entities. Introduces the Synthetic Density Index and proposes verified training corpus frameworks.

entity-level deepfakesepistemic infrastructureintellectual provenancesynthetic saturationrecursive corpus corruptionAI safety

Full-Spectrum Synthetic Organizations: How AI Closes the Last Verification Gap for Under $500

2026-02-08 Technical note DOI: 10.5281/zenodo.18521459

Demonstrates that a complete organizational impersonation infrastructure—fabricated company, deepfake-capable executives, backdoor-compromised AI products, and customer-facing operations—can be established for under $500. Introduces the MANTIS protocol for multi-signal detection.

synthetic organizationsdeepfake detectionAI governanceconstitutional AIfaith-tech securityHelix Fabric

Synthetic Organizational Depth: A $50 Attack on Trust Systems in Faith-Technology

2026-02-07 Journal article DOI: 10.5281/zenodo.18520768

Demonstrates that a fully believable synthetic organization with executive personas and publication histories can be fabricated for approximately $50 initial costs. Presents Helix Fabric v2, a distributed detection framework with 15 signal types across multiple worker categories.

synthetic organizationsAI governancefaith-technologydeepfake detectionorganizational verificationconstitutional AI

Helix Fabric v2: A Serverless Meta-Orchestrator for Autonomous Synthetic Organization Detection and Competitive Intelligence

2026-02-07 Journal article DOI: 10.5281/zenodo.18520761

A serverless meta-orchestration system built on Cloudflare Workers that autonomously detects synthetic organizations, AI-generated personas, and intellectual property clones in the faith-technology ecosystem. Multi-signal detection across fleet-spawned workers.

meta-orchestratorcloudflare workerssynthetic organization detectiondeepfake forensicsNLPfleet spawning

Predictive Augmentation for Anticipatory Cyber Defense: A Unified Framework Integrating Adversarial Machine Learning, Game-Theoretic Autonomous Defense, and Zero-Knowledge Attribution

2026-02-07 Journal article DOI: 10.5281/zenodo.18520751

A unified framework for anticipatory cyber defense integrating eight convergent dimensions: adversarial machine learning countermeasures, supply chain and hardware implant analysis, quantum threat transition analysis, attribution resistance with deepfake forensics, autonomous defense game theory, zero-knowledge proof systems for operational security, temporal correlation at scale, and biological-physical security integration.

adversarial machine learningautonomous defensegame theoryzero-knowledge proofsdefensive steganographyreinforcement learning

Helical Pipeline Architecture for Autonomous Multi-Agent SaaS Development (Extended)

2026-02-05 Technical note DOI: 10.5281/zenodo.18501667

Extended version (28 pages) with formal model (9 definitions, 3 theorems). Presents a pipeline parallelism model for multi-agent SaaS development using helical architecture, constitutional AI governance, and gradient auto-compaction for LLM agent orchestration.

multi-agent systemspipeline parallelismcompound SaaSautonomous developmenthelical architectureAI orchestration