The Engage stage is where the sensor-to-shooter loop closes against reality. Effectors fire — kinetic, electronic, or cyber — and consequences follow. By the time the loop reaches this stage, AI has compressed the find, fix, track stages, decision-support has ranked candidates, and the operator has authorized engagement. Part 4 covers the engineering of the engage and assess stages: how AI participates without crossing the autonomous-effects line, how the structural human-in-the-loop boundary is coded into the platform, and how doctrine and procurement keep the boundary in place. By the end of Part 4, the loop is operational, defensible against accreditation review, and procurement-grade.

The architectural framing from Part 1, the sensor-side engineering from Part 2, and the decision-support patterns from Part 3 all converge here.

The Autonomous-Effects Line

Across NATO-aligned forces, doctrine in 2026 is consistent on one point: lethal effects decisions require human authorization. The phrase varies — meaningful human control, human-on-the-loop, human-in-the-loop, appropriate levels of human judgment — but the operational implication is the same. A system that autonomously selects targets and applies lethal force is not procurement-eligible in NATO programmes, regardless of technical merit.

The line is drawn at the authorization step, not the recommendation step. AI may participate in everything up to and including the recommendation; the authorization itself is human. This is the design constraint that shapes the entire engage stage.

Exceptions and edge cases exist and require careful framing:

  • Defensive engagements against time-critical incoming threats — anti-ship missile defense, counter-rocket-artillery-mortar (C-RAM), air-defense against saturating missile attacks — may execute on pre-authorized engagement criteria approved by the commander before the engagement window opens. The AI applies the rules; the rules and the authorization are human-set in advance.
  • Non-lethal effects (electronic warfare, cyber) operate under broader autonomy in some doctrines, particularly in defensive postures, but still within commander-authorized parameters.
  • Autonomous platforms (UAVs, USVs, UGVs) may navigate, sense, and execute pre-authorized actions autonomously; lethal application remains human-authorized.

The detailed NATO-level framing is in NATO's AI Strategy for Defense Software. The procurement implication is unambiguous: if your platform crosses the line, you are not selling to NATO members.

Coding the Boundary, Not Just Documenting It

Policy that says "human authorization required" is not enough. The boundary must be enforced by the platform — refusing to proceed without explicit human action, logging every authorization with operator identity and reasoning when available, surfacing the boundary in the UI so operators cannot accidentally cross it.

The engineering patterns that hold the boundary:

Authorization tokens with limited scope. A human authorization for an engagement creates a one-shot token bound to a specific track, effector, and time window. Once consumed, the token is invalid. Re-engagement against the same target requires a new authorization.

Refuse-by-default downstream interfaces. The effector-control interfaces refuse incoming commands that lack a valid authorization token. The refusal is logged. The error returns to the operator UI so the missing authorization is visible.

Two-person rule for high-consequence decisions. Where doctrine requires it, the platform enforces two-person authorization — two distinct operators must confirm. The two operators see independent views of the candidate before confirming.

Time-bounded authorizations. Authorizations expire. A track authorized 10 minutes ago may have moved, changed identity, or become invalid for engagement; re-authorization is required if the window expires before action.

Cancellation paths. Operators can cancel a pending engagement up to the last technically-feasible moment. The cancellation propagates faster than the engagement itself.

These patterns share a structural property: the boundary is in code, enforced by the platform, observable from logs. An adversary who compromises the operator's account still cannot fire without human authorization; an operator confused by the UI cannot accidentally authorize an action they did not intend.

Effector Integration: The Last Mile

The engage stage couples the platform's authorization to specific effector systems — kinetic weapons, electronic-warfare emitters, cyber tooling. Each effector has its own integration mechanics; the platform's job is to abstract these into a common interface while preserving effector-specific constraints.

The integration patterns:

Effector-as-service abstraction. Each effector exposes a service interface — accept tasking, report status, return assessment data. The platform calls the service with the authorization token; the service validates and executes.

Effector-specific safety interlocks. Below the platform's authorization layer, each effector has its own physical and procedural safety interlocks — arm switches, firing-circuit interrupts, range-safety zones. The platform must not depend on those interlocks alone, but must integrate cleanly with them.

Geometry and timing constraints. The platform must compute effector-availability against geometry (in-range, line-of-sight, no-friendly-fire trajectory) and timing (cycle-time, reload state, sustainment posture) before presenting engagement options. Recommending an engagement that the effector cannot execute is a wasted operator decision and a credibility loss.

Communications path resilience. The tactical-radio integration that carries the engagement order is the same constrained DIL environment from the C2 series. See Tactical Radio Software Integration for the engineering details. The order propagation is bounded by the slowest link; the platform measures and reports the realistic timing rather than the ideal timing.

Assess: Closing the Loop with AI

The assess stage is the loop's feedback. Did the engagement work? What was the outcome? What lessons feed back into the next cycle's find stage? AI participates here with less controversy than at engage because the consequences of an assessment error are corrigible — a re-engagement, a second-look UAV tasking — rather than irreversible.

The AI capabilities at assess:

Battle damage assessment from imagery. Pre-engagement and post-engagement imagery compared via computer vision. Change detection, damage classification, residual-threat estimation. The output is a candidate assessment for analyst review, not a final report. See Computer Vision in Defense Systems.

Effects confirmation from sensor data. Track behavior after engagement — destroyed targets disappear; degraded targets behave differently. AI surfaces likely effect confirmations from the post-engagement track data flow.

Re-engagement recommendations. When initial effects are partial, the AI surfaces re-engagement options to the operator. Decision-support patterns from Part 3 apply — ranked candidates, exposed reasoning, operator authorization.

Lesson capture for the next cycle. The assess data feeds back into the training data store. Confirmed positives become high-grade training examples; confirmed negatives become hard examples for the next model iteration. The active-learning pattern from Part 2 closes here.

Key insight: AI at the assess stage is where the loop's learning compounds. Each cycle's outcome refines the next cycle's find and decision-support. Programmes that engineer the assess feedback loop correctly improve faster than programmes that treat assess as a reporting afterthought.

International Humanitarian Law and the Engineering View

International Humanitarian Law (IHL) imposes legal constraints on the use of force in armed conflict — distinction (between combatants and civilians), proportionality (between military advantage and collateral harm), precaution (in attack and defense). For AI in defense, these translate into engineering requirements that procurement evaluators audit.

Distinction requires the platform to support identification of targets as legitimate military objectives. AI-derived classification confidences become evidence in this evaluation; the platform must surface the underlying reasoning so the operator can apply IHL judgment with full information.

Proportionality requires the platform to surface collateral-risk factors — civilian presence, infrastructure value, environmental sensitivity — alongside engagement options. The AI does not make the proportionality judgment; it ensures the operator has the information to do so.

Precaution requires the platform to support cancellation, re-evaluation, and the verification of effect before continuing. The engineering patterns above (cancellation paths, time-bounded authorizations) all serve this principle.

The accreditation reviewers will not ask "does the platform comply with IHL" as an abstract question. They will ask "demonstrate the engineering features that support IHL-compliant operation". The platform that has thought through these requirements has the evidence ready.

Testing the Boundaries

A platform whose human-in-the-loop boundaries have only been tested in lab scenarios is operationally untested. The testing disciplines that distinguish credible platforms:

Red-team adversarial testing of the boundaries themselves. Can an attacker authorize an engagement they should not be able to? Can a confused operator be led into an inadvertent authorization? Can an adversarial input to a sensor mislead the AI into recommending an inappropriate engagement? Red-team findings feed structural changes to the platform.

Operator-in-the-loop scenarios. Realistic mission scripts run by real operators with the platform active. The operators' actual behavior — what they confirm, what they dismiss, where they get confused — is the empirical data that validates the design. The pattern is in Testing Mission-Critical C2 Systems.

Failure-mode injection. Test what happens when the AI fails. Sensor degraded, model drift, communications cut, effector offline. The platform must surface the failure rather than mask it; operators must not lose situational awareness when components fail.

Long-tail compliance evidence. Operate the platform in pilot deployment for months. Log every authorization, every dismissal, every override. The operational record becomes the evidence base for accreditation — far stronger than any synthetic test report.

Procurement Implications

The engineering of the engage and assess stages is procurement-grade work. The evidence accreditation reviewers want, in priority order:

  • Where exactly the autonomous-effects line is drawn in the platform's architecture, with code references that an evaluator can verify.
  • How the boundary is enforced across all interfaces and failure modes.
  • What operator-in-the-loop testing has shown about whether operators retain effective judgment under platform-active conditions.
  • How adversarial robustness against deliberate manipulation has been evaluated and improved.
  • What drift monitoring the platform applies in operational deployment to detect AI behavior shifts.
  • What audit trail supports after-action review of every consequential decision.
  • How NATO AI strategy principles map to specific platform features, with concrete evidence for each principle.

The disciplined pipeline that produces this evidence as a side effect of the development pipeline is the DevSecOps adapted for defense — see DevSecOps for Defense Pipelines. The accreditation framing more broadly is in ISO 27001 in Defense Software and NATO AQAP-2110 for Software Vendors.

For the broader market context — how this kind of procurement-grade discipline fits into the European and NATO defense procurement architecture — see The Complete Guide to the Defense Market and Procurement.

Closing the Series

Four parts ago this series opened on the abstract loop — find, fix, track, target, engage, assess. We walked through where AI compresses cognitive work in the loop (find and assess, heavily; fix and track, moderately), where AI provides decision support without crossing boundaries (target stage, with structural HITL), and where the boundary itself is drawn and enforced (engage stage, with coded refuse-by-default semantics). At each step the operational reality has been emphasized over the marketing surface: AI in defense compresses the parts of the loop where it credibly works, leaves the parts where it does not, and accepts the structural human-in-the-loop boundaries as design constraints rather than obstacles.

The vendors that succeed in this market in 2026 build for the constraints, not around them. The platforms that survive accreditation are those that surface the boundaries, log the authorizations, and provide the evidence that accreditation reviewers demand. The procurement files that win are those that show the engineering work has been done at the level the operational reality requires.

For the broader AI-in-defense framing, see the pillar guide: The Complete Guide to AI and Edge AI in Defense Software. For the C2 build that hosts these AI capabilities, the engineering walkthrough is the parallel series starting at Building a C2 System from Scratch, Part 1. For the procurement architecture this all sits inside, see The Complete Guide to the Defense Market and Procurement.

Final word: The sensor-to-shooter loop in 2026 is a partnership between AI and human judgment, structurally bounded by doctrine, accreditation, and law. The engineering discipline that makes the partnership work is unglamorous and consistent — exposed reasoning, coded boundaries, audit trails, adversarial robustness, drift monitoring. The platforms that scale in this market are the ones that have built the discipline alongside the technology.