AI-Driven Legal Evidence Crisis
legal-evidence-crisisriskPath: /knowledge-base/risks/legal-evidence-crisis/
E188Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "legal-evidence-crisis",
"numericId": null,
"path": "/knowledge-base/risks/legal-evidence-crisis/",
"filePath": "knowledge-base/risks/legal-evidence-crisis.mdx",
"title": "AI-Driven Legal Evidence Crisis",
"quality": 43,
"readerImportance": 69.5,
"researchImportance": 19.5,
"tacticalValue": null,
"contentFormat": "article",
"tractability": null,
"neglectedness": null,
"uncertainty": null,
"causalLevel": "outcome",
"lastUpdated": "2026-03-13",
"dateCreated": "2026-02-15",
"llmSummary": "Outlines how AI-generated synthetic media (video, audio, documents) could undermine legal systems by making digital evidence unverifiable, creating both wrongful convictions from fake evidence and wrongful acquittals via the 'liar's dividend' (real evidence dismissed as possibly fake). Reviews current authentication technologies (C2PA, cryptographic signing) but notes detection is failing due to generator-detector arms race.",
"description": "When courts can no longer trust digital evidence due to AI-generated fakes",
"ratings": {
"novelty": 3.5,
"rigor": 4,
"actionability": 3,
"completeness": 5.5
},
"category": "risks",
"subcategory": "epistemic",
"clusters": [
"ai-safety",
"epistemics"
],
"metrics": {
"wordCount": 1121,
"tableCount": 13,
"diagramCount": 0,
"internalLinks": 23,
"externalLinks": 0,
"footnoteCount": 0,
"bulletRatio": 0.24,
"sectionCount": 31,
"hasOverview": false,
"structuralScore": 10
},
"suggestedQuality": 67,
"updateFrequency": 45,
"evergreen": true,
"wordCount": 1121,
"unconvertedLinks": [],
"unconvertedLinkCount": 0,
"convertedLinkCount": 21,
"backlinkCount": 2,
"hallucinationRisk": {
"level": "medium",
"score": 60,
"factors": [
"no-citations",
"few-external-sources"
]
},
"entityType": "risk",
"redundancy": {
"maxSimilarity": 11,
"similarPages": [
{
"id": "authentication-collapse",
"title": "Authentication Collapse",
"path": "/knowledge-base/risks/authentication-collapse/",
"similarity": 11
}
]
},
"coverage": {
"passing": 6,
"total": 13,
"targets": {
"tables": 4,
"diagrams": 0,
"internalLinks": 9,
"externalLinks": 6,
"footnotes": 3,
"references": 3
},
"actuals": {
"tables": 13,
"diagrams": 0,
"internalLinks": 23,
"externalLinks": 0,
"footnotes": 0,
"references": 20,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"llmSummary": "green",
"schedule": "green",
"entity": "green",
"editHistory": "red",
"overview": "red",
"tables": "green",
"diagrams": "red",
"internalLinks": "green",
"externalLinks": "red",
"footnotes": "red",
"references": "green",
"quotes": "red",
"accuracy": "red"
},
"ratingsString": "N:3.5 R:4 A:3 C:5.5"
},
"readerRank": 171,
"researchRank": 496,
"recommendedScore": 142.16
}External Links
No external links
Backlinks (2)
| id | title | type | relationship |
|---|---|---|---|
| authentication-collapse-timeline | Authentication Collapse Timeline Model | analysis | leads-to |
| epistemic-overview | Epistemic Risks (Overview) | concept | — |