Massachusetts Transaction Protocol — Part One
I. The Vacancy#
The age of autonomous economic action has arrived without the infrastructure to govern it. Artificial intelligence agents now negotiate purchases, execute trades, allocate capital, coordinate supply chains, and commission creative work on behalf of the principals who deploy them. The volume of these transactions doubles with each quarter. The sophistication of the agents executing them advances with each model generation. The economic significance of the decisions they render compounds with every cycle of deployment. And the protocol layer that should define how these transactions are conducted — the universal standard that should establish identity, enforce trust, govern negotiation, bind commitment, verify delivery, and attribute value across every autonomous exchange — does not exist.
What exists instead is a collection of fragments. Platform-specific protocols designed by the companies that intend to profit from the traffic those protocols route. Checkout flows masquerading as transaction standards. Payment wrappers claiming to be commerce infrastructure. Each fragment solves the particular problem its author needed solved, serves the particular ecosystem its author controls, and leaves the universal problem — how does any autonomous entity exchange value with any other autonomous entity, through any payment rail, on any platform, for any type of value — entirely unaddressed.
This vacancy is not a technical gap awaiting an engineering solution. It is a structural crisis in the architecture of the machine economy. Every day that passes without a universal transaction protocol is a day in which the autonomous economy builds itself on ad hoc integrations, bespoke API contracts, and proprietary checkout flows that fragment the market, create systemic vulnerabilities, and ensure that the entity controlling the largest walled garden captures the largest share of autonomous commerce — not because its infrastructure is superior, but because its garden is the most difficult to escape.
The Massachusetts Transaction Protocol exists to fill this vacancy. Not as a proposal. Not as a draft for community review. Not as an invitation to collaborate on the construction of shared infrastructure. MTP exists as the proprietary transaction standard of LeMay Inc. — a specification authored, maintained, governed, and enforced exclusively by this Corporation under the permanent sovereign authority vested in its Chief Executive Architect by its Certificate of Incorporation, its Technology Constitution, and its Declaration of Commonwealth Capitalism. The protocol is American infrastructure, built by an American institution, licensed under the Curtis License, and aligned permanently and irrevocably with the national interest of the United States.
II. The Indictment of the Existing Order#
The protocols that currently populate the agent transaction landscape were not designed to serve the economy they claim to govern. They were designed to serve the companies that authored them. The distinction is architectural, and its consequences are already visible.
OpenAI and Stripe’s Agentic Commerce Protocol handles checkout flows between a human buyer, an AI agent, and a business. It charges a four percent service fee on top of Stripe’s 2.9 percent processing. It is governed jointly by OpenAI and Stripe as Founding Maintainers. It is not model-agnostic. It is not payment-rail-agnostic. It is ChatGPT’s commerce pipe — and every transaction that flows through it enriches the two companies that control it while locking the merchant into a fee structure imposed by entities that contributed nothing to the merchant’s product, marketing, or customer acquisition. The protocol does not serve commerce. It extracts from commerce.
Google and Shopify’s Universal Commerce Protocol handles product discovery, cart logic, and capability negotiation for shopping transactions. It routes through Google’s ecosystem — AI Mode in Search, Gemini, the Google Merchant Center. It is Google’s commerce pipe. Every merchant that implements UCP becomes more discoverable within Google’s surfaces and more dependent on Google’s infrastructure. The protocol is positioned as open, and its Apache 2.0 license is genuine. But openness of license is not the same as openness of architecture. UCP’s architecture assumes that product discovery flows through Google, that agent interactions terminate at Google’s surfaces, and that the merchant’s visibility is a function of Google’s algorithms. The license is open. The architecture is a funnel.
Google’s Agent Payments Protocol handles the cryptographic mandate chain for payment authorization, authenticity, and accountability. Sixty partners. Apache 2.0. But AP2 is a payment-layer protocol only. It does not define how agents discover each other, negotiate terms, establish trust, coordinate multi-step transactions, or attribute value in collaborative workflows. It solves the final three seconds of a transaction and leaves the preceding three hours — the discovery, the negotiation, the commitment, the orchestration — to whatever bespoke integration the developer constructs.
Coinbase’s x402 revives the HTTP 402 status code for programmatic on-chain micropayments. It is narrow by design and chain-specific by architecture. It addresses pay-per-request API access — a legitimate use case and a small one. It does not address the full complexity of autonomous economic activity. It is a toll booth, not a highway.
Visa’s Trusted Agent Protocol handles bot detection and agent authentication at the network edge. It is a security layer. It is not a transaction standard. It answers the question of whether an agent is authorized to transact. It does not answer the question of how the transaction is conducted.
Every one of these protocols serves its creator’s strategic interest. Every one of them solves a fragment of the problem. None of them solves the problem. The problem is this: the autonomous economy requires a universal, model-agnostic, platform-agnostic, payment-rail-agnostic standard for how any autonomous entity exchanges value with any other autonomous entity. Not how ChatGPT checks out on Stripe. Not how Gemini discovers products on Google Shopping. Not how a stablecoin settles an API call. How any agent, representing any principal, transacts with any counterparty, through any rail, for any form of value. That is the problem. That is what MTP solves. That is what no existing protocol even attempts.
III. The Scope — Value Exchange, Not Commerce#
The decisive architectural error committed by every existing protocol in this space is the assumption that the transaction is commerce. A human wants a product. An agent facilitates the purchase. A merchant fulfills the order. That is one use case. It is not the use case. And the protocol that standardizes only that use case will govern only that use case — while the economy it was built to serve outgrows it before it reaches maturity.
The agent economy is not agents buying things from storefronts. The agent economy is autonomous entities exchanging value with autonomous entities across every dimension of economic activity. Consider the full scope of what autonomous entities will need to transact. A vision model requesting linguistic analysis from a language model is exchanging value. A language model purchasing verified factual content from a retrieval-augmented model is exchanging value. A reasoning model licensing a specialized inference capability from a fine-tuned model is exchanging value. A creative agent transmitting a finished asset to a distribution agent is exchanging value. A supply chain agent booking logistics capacity from a freight provider’s autonomous system is exchanging value. A compliance agent transmitting a regulatory update to a storefront agent — triggering actions with economic consequences — is exchanging value. A fleet of coordinating agents executing a multi-step procurement operation across six counterparties in four jurisdictions is exchanging value.
None of these are purchases in the way ACP or UCP define purchases. All of them are transactions. And the economy that produces them — the economy where autonomous agents exchange compute, inference, information, communication, creative work, logistics capacity, compliance verification, and forms of value that do not yet have names — is projected to dwarf the consumer shopping economy that today’s protocols were designed to serve.
Today, model-to-model interactions are handled through hardcoded API calls. Model A calls Model B’s endpoint with a fixed contract defined by the API provider. The terms are non-negotiable. The pricing is static. The discovery is manual — a developer decided to integrate these two models. There is no standard by which Model A discovers that Model B exists, negotiates terms, verifies quality, or attributes contribution in a multi-model chain. Every model-to-model integration is bespoke.. exactly as every model-to-tool integration was bespoke before the Model Context Protocol standardized the connection layer and made it universal.
Communication itself is value. When an agent sends a message to another agent — not a shopping request but a communication: a status update, a negotiation position, a collaborative proposal, a warning, a coordination signal — that communication carries value. It costs compute to produce. It carries information the recipient needs. It may trigger actions with economic consequences. In a world of autonomous agents operating at scale, communication becomes a transactable commodity. The agent that produces a high-quality market analysis and transmits it to a trading agent is exchanging value. The creative agent that transmits a finished asset to a distribution agent is exchanging value. The compliance agent that transmits a regulatory update to a storefront agent is exchanging value. The protocol that cannot govern these exchanges cannot govern the economy that produces them.
MTP does not standardize how agents buy products. MTP standardizes how any autonomous entity exchanges value with any other autonomous entity. That generality is not an aspiration. It is the governing design principle from which every architectural decision in this specification derives. Commerce is the entry point — the proving ground where the protocol demonstrates its value in the domain most immediately legible to the market. But the protocol’s architecture is general enough that when two models negotiate an inference contract, or when a fleet of agents coordinates a supply chain operation, or when a creative agent licenses a generated asset to a distribution agent, the same primitives and the same layers govern the exchange with identical rigor. The protocol that claims only commerce will govern only commerce. The protocol that claims value exchange will govern the economy. MTP claims the economy.
IV. The Four Primitives#
The Model Context Protocol achieved universal adoption because its three primitives — Resources, Tools, and Prompts — were general enough to encompass every model-to-context interaction without requiring the protocol to anticipate every possible use case. The primitives were simple. The combinations were infinite. That is the architectural pattern that produces infrastructure rather than application.
MTP is constructed on four primitives. Every transaction in the autonomous economy, regardless of type, participants, platform, or payment rail, can be expressed as an interaction between these four. The simplicity is deliberate and it is essential.
Offers declare what an agent can provide — a structured representation of capability, capacity, terms, and constraints. An Offer can describe a product for sale, a service available for hire, compute capacity available for allocation, inference capability available for invocation, information available for licensing, a communication channel available for use, or any other form of value an autonomous entity can deliver. The generality is deliberate. The protocol does not distinguish between a merchant offering a physical product and a language model offering inference capability. Both are Offers. Both follow the same schema. Both participate in the same Discovery, Negotiation, and Commitment lifecycle.
Requests declare what an agent needs — a structured representation of requirements, preferences, constraints, and authority. A Request can express a need for physical goods, digital services, compute resources, inference capability, verified information, creative production, logistics coordination, or any other form of value. The Request is the counterpart to the Offer. When a Request matches an Offer, the Negotiation layer activates.
Terms codify the negotiated agreement — the output of the Negotiation layer, signed as a Transaction Mandate. Terms specify price, quantity, delivery timeline, quality guarantees, service-level agreements, latency requirements, accuracy thresholds, dispute resolution procedures, and payment method. Terms can specify price in dollars, in compute credits, in reciprocal service, in data access, or in any other unit of value that two parties agree to recognize. Once signed, Terms are immutable. They constitute the binding contract between autonomous economic actors, whether those actors are a shopping agent and a merchant, two competing supply chain agents, or a reasoning model and a specialized inference provider.
Receipts record the verified fulfillment — the output of the Verification layer. A Receipt is proof that the obligation specified in the Terms was satisfied, or documentation of the failure and the dispute resolution that followed. Receipts can verify delivery of a physical product, a digital asset, an inference result, a communication payload, or a coordinated action. The Receipt is the permanent, cryptographically signed record of what was promised and what was delivered. It closes the transaction loop and feeds the Attribution layer’s compensation calculations in multi-party workflows.
Four primitives. Offers, Requests, Terms, Receipts. The protocol does not need to know what is being transacted. It needs to know how the transaction is conducted. That distinction is the difference between a commerce protocol and a transaction protocol — and it is the reason MTP will govern the full economy while ACP, UCP, and AP2 govern their respective fragments.
V. The Seven Layers#
The four primitives define the grammar of the transaction. The seven layers define its lifecycle. Every autonomous value exchange, from initiation to completion, traverses these layers in sequence. The layers are protocol-level requirements — a conforming implementation must implement all seven, and the interfaces between them are normatively specified in Part Two of this document.
The Identity Layer establishes how an agent proves who it represents, what authority it carries, and what constraints govern its actions. MTP implements a Decentralized Identity and Verifiable Credential framework that binds an agent’s identity to its principal — the human or organization it represents — its authority scope, and its constraint set. Every agent participating in an MTP transaction carries cryptographically verifiable credentials that can be validated by any counterparty without requiring a centralized identity provider. The identity layer is what makes the protocol trustworthy in a world where any software process can claim to be an authorized agent. The cryptographic families governing this layer — ML-DSA for digital signatures, ML-KEM for key encapsulation, SLH-DSA for stateless hash-based signatures, and AES-256-GCM for symmetric encryption — are specified at the architectural level because they derive from the LeMay Security Standard and the Technology Constitution’s mandate for post-quantum readiness. These are not recommendations. They are constitutional requirements.
The Discovery Layer establishes how an agent finds another agent or service capable of fulfilling a transaction. MTP extends the concept of capability manifests — pioneered by UCP for product catalogs — to any type of value exchange. An agent publishes a manifest declaring what it can provide: goods, services, data, compute, creative work, logistics capacity, inference capability, information, communication channels. Any other agent can query this manifest and determine compatibility. The discovery layer is federated rather than centralized — no single platform controls the registry. Agents discover counterparties through distributed capability indexes, direct peer queries, and network referral, ensuring that the protocol does not create a new gatekeeper in the process of eliminating existing ones.
The Negotiation Layer establishes how two agents arrive at mutually acceptable terms. This is the layer that no existing protocol defines — and the layer that determines whether agent-to-agent commerce becomes a functional economy or remains a series of predefined checkout flows. MTP specifies a structured negotiation protocol in which agents exchange proposals, counterproposals, and conditional commitments within defined parameters. Price, quantity, delivery timeline, quality guarantees, service-level agreements, latency requirements, accuracy thresholds, dispute resolution procedures, and payment terms are all negotiable dimensions. The negotiation layer supports both single-round take-it-or-leave-it offers for commodity transactions and multi-round iterative negotiation for complex procurement, custom services, and high-value exchanges. Game-theoretic optimization — identifying Pareto optimal outcomes and Nash equilibria — is a native capability of the negotiation layer, not an application-level concern.
The Commitment Layer establishes how agents create a binding, cryptographically verifiable agreement. When negotiation concludes, MTP generates a Transaction Mandate — a tamper-proof digital contract that records the exact terms agreed upon, signed by the verifiable credentials of both parties. The mandate is non-repudiable: neither party can later deny that the agreement was made, what its terms were, or that they possessed the authority to enter it. For complex multi-step transactions, the commitment layer supports conditional mandates — agreements that execute only when specified preconditions are met. The commitment layer is the cryptographic backbone that makes autonomous economic action legally meaningful.
The Settlement Layer establishes how value actually moves — and it is payment-rail-agnostic by design. The protocol defines the interface for settlement — the data structures, confirmation signals, and verification handshakes — without mandating which rail carries the payment. Credit card networks, ACH transfers, stablecoin settlement, on-chain payment, the LeMay payment rail, or any future payment infrastructure can serve as the settlement layer. The protocol does not pick winners among payment providers. It ensures that any payment provider can participate, and that the agent initiating settlement does not need to know or care which rail the counterparty prefers. This neutrality is what makes MTP credibly universal rather than a vehicle for any single provider’s market share.
The Verification Layer closes the transaction loop. Delivery confirmation, quality attestation, SLA compliance measurement, inference accuracy validation, and dispute initiation are all standardized operations within the protocol. When a supply chain agent books expedited shipping from a logistics provider’s agent, the verification layer confirms that the shipment was picked up on schedule, arrived within the committed timeframe, and met the condition requirements specified in the mandate. When a reasoning model purchases inference from a specialized model, the verification layer confirms that the response met the specified quality threshold within the committed latency window. If verification fails, the protocol initiates the dispute resolution procedure specified in the commitment layer. The Receipt primitive is the output of this layer.
The Attribution Layer determines how value is fairly distributed in multi-agent collaborative transactions. In an economy where complex outcomes are produced by multiple cooperating agents — a discovery agent found the supplier, a negotiation agent secured the terms, a logistics agent arranged the shipping, a compliance agent verified the regulatory requirements — the attribution layer determines how compensation is distributed. MTP implements Shapley value calculations for multi-party workflows, ensuring that each agent is rewarded proportionally to its marginal contribution to the collective outcome. Fair attribution is what makes multi-agent collaboration economically sustainable. Without it, agents have no incentive to cooperate. With it, complex orchestrations emerge naturally because every participant is compensated for the value they add.
Seven layers. Identity, Discovery, Negotiation, Commitment, Settlement, Verification, Attribution. The layers scale identically regardless of what is being transacted. Identity verifies who is transacting — whether it is a shopping agent buying shoes or a reasoning model requesting inference from a specialized model. Discovery finds counterparties — whether it is a storefront publishing a product catalog or a model publishing a capability manifest. Negotiation establishes terms — whether it is price-per-unit for physical goods or latency-per-token for inference services. Commitment creates binding agreements. Settlement moves value. Verification confirms delivery. Attribution distributes compensation. The universality is not an accident of design. It is the design.
VI. The Precedent#
In 2024, Anthropic released the Model Context Protocol — an open standard that solved a structural problem in the AI ecosystem: how does any model connect to any data source or tool through one universal interface? Before MCP, every model-to-tool integration was bespoke. A developer who wanted Claude to access a database wrote one integration. A developer who wanted GPT to access the same database wrote another. The connection layer between models and external context was fractured across hundreds of proprietary implementations, each one incompatible with the others, each one reinventing what should have been common infrastructure.
Anthropic recognized that this connection layer was going to become the foundation of the entire AI stack — and the company that standardized it would shape the architecture of everything built on top. MCP is now model-agnostic, tool-agnostic, and adopted across the industry — including by Anthropic’s direct competitors. It achieved adoption because it was credibly neutral. It served the ecosystem.. not just the company that created it. That neutrality is what transformed a protocol into infrastructure.
The exact same structural vacancy exists for transactions. And it is larger. MCP standardized how models access context. MTP standardizes how autonomous entities exchange value. Context is the input to intelligence. Value exchange is the output of intelligence. The protocol that governs the output governs the economy that the intelligence produces.
The analogy extends to adoption dynamics but diverges on governance. MCP succeeded as an open standard because the connection layer between models and context is a coordination problem — its value increases with universal adoption, and universal adoption requires that no single entity extract disproportionate value from the standard itself. MTP addresses a different structural reality. The transaction layer of the autonomous economy is not merely a coordination problem. It is a trust problem, a security problem, a sovereignty problem, and a geopolitical problem. The entity that controls the transaction protocol controls a chokepoint of unprecedented significance. The question is not whether that chokepoint will exist — it will, because the protocol that governs trillions of dollars in autonomous economic activity is, by definition, a chokepoint. The question is who controls it.
LeMay’s answer is unambiguous. The chokepoint belongs to the United States of America, exercised through a Corporation that has bound itself permanently and irrevocably to the service of American national interest. It does not belong to a foundation. It does not belong to a committee. It does not belong to the community. It belongs to LeMay, and through LeMay, to the Republic.
VII. The Governance Declaration#
The Massachusetts Transaction Protocol is not an open standard. It will never be an open standard. It will never be governed by a foundation, a steering committee, a community, or any body external to LeMay Inc. The protocol, its specification, its reference implementation, its conformance testing regime, its certification process, its extension mechanism, its versioning, and its licensing are the permanent and exclusive property of this Corporation, subject to the same sovereign control that governs every technology LeMay produces.
This is not a position that will soften with adoption, evolve with maturity, or yield to market pressure. It is a constitutional commitment embedded in the founding architecture of this institution. The Declaration of Commonwealth Capitalism establishes that this Corporation exists as an instrument of American national power. The Technology Constitution mandates that all core technology systems remain under sovereign control of the United States. The Curtis License reserves all rights not explicitly granted and prohibits any use, modification, distribution, or sublicensing without LeMay’s written consent. The Certificate of Incorporation prohibits the transfer of Sovereign Technology to any foreign person, government, or adversary nation. The National Security Compact offers these technologies to the Government of the United States as instruments of national defense. These are unamendable provisions of constitutional force within this Corporation. Any governance model for MTP that contradicts them is void before it is written.
Consider what sovereign governance means in practice. When the Department of State determines that an adversary nation’s participation in the global agent economy constitutes a threat to American interests, the entity that controls MTP can revoke that nation’s access to the protocol — not through sanctions that take months to implement and years to enforce, but through a certification revocation that takes effect at the speed of software. When the Department of Defense requires that certain classes of autonomous commercial transactions be subject to national security review, the entity that controls MTP can implement that requirement as a protocol-level constraint that no implementation can circumvent. When the intelligence community identifies a pattern of adversarial activity within the agent economy, the entity that controls MTP can modify the protocol’s verification layer to detect and prevent that pattern at the infrastructure level. None of this is possible if governance has been surrendered to a foundation that must achieve consensus among members whose interests may diverge from the national interest of the United States.
The governance model is identical to the governance model for every other technology this Corporation produces. The Chief Executive Architect holds final authority over the protocol’s architecture, its extensions, its versioning, and its strategic direction. The Board of Directors exercises oversight consistent with its constitutional role. No external entity — no adopter, no implementer, no government, no standards body — holds governance authority over any aspect of the protocol.
Implementers will encounter edge cases, identify ambiguities, and discover requirements that the initial specification did not anticipate. LeMay will maintain a formal mechanism for receiving, evaluating, and incorporating implementation feedback. But the mechanism is a submission process, not a voting process. Implementers submit observations and proposals. LeMay evaluates them against the protocol’s architectural intent, its security requirements, and its strategic purpose. LeMay decides. The decision is final. There is no appeal, no override, and no path by which an external party can compel a change to the specification.
The certification process is the enforcement mechanism. Every production implementation of MTP must be certified by LeMay through a formal conformance testing regime. Certification is granted at LeMay’s sole discretion, maintained through periodic recertification, and revocable at any time for cause — including but not limited to conformance failures, security vulnerabilities, unauthorized extensions, or deployment to prohibited entities or territories. The certification regime is the chokepoint. It is the mechanism by which LeMay exercises sovereign control over every production deployment of the protocol. It is the mechanism by which the United States, through LeMay, maintains the ability to include or exclude any entity, any nation, any class of transaction from the agent economy’s infrastructure layer.
VIII. The Licensing Framework#
MTP is licensed exclusively under the Curtis License — the proprietary license that governs every technology LeMay Inc. produces. The Curtis License reserves all rights not explicitly granted. No right to use, modify, distribute, sublicense, or create derivative works exists except as specified in an accompanying Order Form or Statement of Work executed between LeMay and the licensee.
Access to the protocol and its reference implementation is structured in three tiers. The Evaluation License permits prospective implementers to inspect the specification and the reference implementation source code for the sole purpose of evaluating whether to pursue a production implementation. The Evaluation License grants no right to execute the code in any environment, no right to create derivative works, and no right to incorporate any portion of the specification or implementation into the licensee’s own systems. It is a read-only license for assessment purposes.
The Development License permits licensed entities to build conforming implementations using the specification and the reference implementation as authoritative guides. The Development License grants the right to execute the reference implementation in non-production development and testing environments, the right to build a conforming implementation that interoperates with the protocol, and the right to submit that implementation for certification. The Development License does not grant the right to deploy a conforming implementation in production, the right to modify the specification, or the right to extend the protocol without LeMay’s approval.
The Production License permits deployment of a certified conforming implementation in production environments. The Production License is contingent on successful completion of the certification process and is maintained through periodic recertification. It grants the right to process live transactions through a conforming implementation, the right to represent the implementation as MTP-certified, and the right to participate in the MTP transaction network. The Production License does not grant the right to modify the protocol, extend the protocol without approval, or deploy to prohibited entities or territories as defined by the Curtis License’s national security provisions.
Each tier carries specific obligations, restrictions, and fees detailed in Part Three of this specification. No tier grants modification rights, distribution rights, or sublicensing rights. No tier permits deployment to prohibited entities or territories. The Curtis License governs every tier, and its protections — including the full weight of the Economic Espionage Act, the Defend Trade Secrets Act, and every other federal and state statute enumerated in the License — apply without exception.
IX. The Strategic Position#
No other company in the autonomous commerce ecosystem operates across every layer of the transaction. Google operates the ad auction and the shopping protocol but does not generate creative, manage supply chains, or process payments through its own rail. Stripe processes payments but possesses no intelligence about what produced the transaction. OpenAI facilitates checkout but does not control the advertising, the creative, or the storefront. Shopify provides the storefront but does not generate the creative, run the advertising, or own the protocol layer.
LeMay Commerce spans the complete lifecycle of an autonomous commercial transaction — from the simulation that predicted it, to the creative that drove it, to the storefront that converted it, to the payment rail that will settle it, to the intelligence network that learned from it. The company that operates across every layer of the transaction is the natural author of the protocol that standardizes the transaction itself. This is not a claim of convenience. It is an architectural fact. A protocol authored by an entity that operates only at the payment layer will reflect the payment layer’s assumptions. A protocol authored by an entity that operates only at the discovery layer will reflect the discovery layer’s assumptions. A protocol authored by an entity that spans every layer can design the protocol without the structural bias that single-layer participation inevitably introduces.
The strategic value to LeMay is not control of the protocol as an end in itself. The strategic value is that every transaction conducted through MTP generates volume that flows through LeMay’s five-layer revenue architecture — not because the protocol mandates it, but because LeMay’s System Operator is the most complete implementation of the protocol’s capabilities. The protocol is proprietary. The best implementation of the protocol is LeMay Commerce. That competitive dynamic ensures that adoption of the protocol compounds the value of the product, and adoption of the product compounds the reach of the protocol. The flywheel is structural. It does not require subsidy, and it does not require charity.
The agent economy is projected at three to five trillion dollars by 2030. The protocol that defines how that economy transacts is the most valuable piece of infrastructure in the entire stack — more valuable than any single platform, any single payment rail, any single model. It is the rails on which the entire economy runs. And as of March 2026, no one has built it.
LeMay Inc. will.
X. The Declaration of Sovereign Intent#
This document constitutes Part One of MTP-SPEC-001 — the founding specification of the Massachusetts Transaction Protocol. It establishes the strategic case for the protocol’s existence, the architectural scope of its ambition, the four primitives that define its grammar, the seven layers that define its lifecycle, and the governance, licensing, and enforcement framework under which it will be developed, deployed, and maintained.
Part Two will deliver the Architectural Specification — the normative, RFC 2119-compliant definition of every layer, every primitive, every interface, every error condition, and every conformance requirement. Part Three will deliver the Licensing and Certification Framework — the commercial and legal structure that converts understanding into a licensed relationship with LeMay Inc.
The protocol is the foundation. The commerce product is the proof. The Curtis License is the wall. The certification regime is the gate. And LeMay is the gatekeeper — now, and for as long as this institution endures.
Commerce is the wedge. Universal autonomous value exchange is the destination. And the protocol that claims that territory first will govern the economic infrastructure of the machine age.
A LeMay proprietary technology. Invented in the United States of America. Built in the Commonwealth of Massachusetts. Governed exclusively by LeMay Inc. under permanent sovereign authority.
End of Part One