Longterm Wiki

AI-Enabled Authoritarian Takeover

authoritarian-takeoverriskPath: /knowledge-base/risks/authoritarian-takeover/
E29Entity ID (EID)
← Back to page6 backlinksQuality: 61Updated: 2026-03-13
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
  "id": "authoritarian-takeover",
  "numericId": null,
  "path": "/knowledge-base/risks/authoritarian-takeover/",
  "filePath": "knowledge-base/risks/authoritarian-takeover.mdx",
  "title": "AI-Enabled Authoritarian Takeover",
  "quality": 61,
  "readerImportance": 77.5,
  "researchImportance": 24,
  "tacticalValue": 60,
  "contentFormat": "article",
  "tractability": null,
  "neglectedness": null,
  "uncertainty": null,
  "causalLevel": "outcome",
  "lastUpdated": "2026-03-13",
  "dateCreated": "2026-02-15",
  "llmSummary": "Comprehensive analysis documenting how 72% of global population (5.7 billion) now lives under autocracy with AI surveillance deployed in 80+ countries, showing 15 consecutive years of declining internet freedom. Evidence suggests AI fundamentally changes authoritarian stability by closing traditional pathways to regime change (revolutions, coups, uprisings) through comprehensive surveillance, predictive policing, and automated enforcement.",
  "description": "AI-enabled authoritarianism represents one of the most severe structural AI risks. Current evidence shows 72% of the global population living under autocracy (highest since 1978), with AI surveillance exported to 80+ countries and 15 consecutive years of declining internet freedom globally.",
  "ratings": {
    "novelty": 4.5,
    "rigor": 6.8,
    "actionability": 5.2,
    "completeness": 7.5
  },
  "category": "risks",
  "subcategory": "structural",
  "clusters": [
    "ai-safety",
    "governance"
  ],
  "metrics": {
    "wordCount": 4026,
    "tableCount": 21,
    "diagramCount": 1,
    "internalLinks": 39,
    "externalLinks": 23,
    "footnoteCount": 0,
    "bulletRatio": 0.2,
    "sectionCount": 40,
    "hasOverview": true,
    "structuralScore": 15
  },
  "suggestedQuality": 100,
  "updateFrequency": 45,
  "evergreen": true,
  "wordCount": 4026,
  "unconvertedLinks": [
    {
      "text": "Freedom House",
      "url": "https://freedomhouse.org/report/freedom-net/2025/uncertain-future-global-internet",
      "resourceId": "ca43bd687b47f6d3",
      "resourceTitle": "Freedom House"
    },
    {
      "text": "Freedom House FOTN 2025",
      "url": "https://freedomhouse.org/report/freedom-net/2025/uncertain-future-global-internet",
      "resourceId": "ca43bd687b47f6d3",
      "resourceTitle": "Freedom House"
    },
    {
      "text": "Atlantic Council",
      "url": "https://www.atlanticcouncil.org/blogs/geotech-cues/the-west-china-and-ai-surveillance/",
      "resourceId": "02c731a9def3c3e1",
      "resourceTitle": "Atlantic Council"
    },
    {
      "text": "Freedom House FOTN 2025",
      "url": "https://freedomhouse.org/report/freedom-net/2025/uncertain-future-global-internet",
      "resourceId": "ca43bd687b47f6d3",
      "resourceTitle": "Freedom House"
    },
    {
      "text": "ASPI China AI Report",
      "url": "https://www.cnn.com/2025/12/04/china/china-ai-censorship-surveillance-report-intl-hnk",
      "resourceId": "d01dcea0fc975a9e",
      "resourceTitle": "Australian Strategic Policy Institute (ASPI)"
    },
    {
      "text": "ASPI report (December 2025)",
      "url": "https://www.cnn.com/2025/12/04/china/china-ai-censorship-surveillance-report-intl-hnk",
      "resourceId": "d01dcea0fc975a9e",
      "resourceTitle": "Australian Strategic Policy Institute (ASPI)"
    },
    {
      "text": "Freedom House Freedom on the Net 2025",
      "url": "https://freedomhouse.org/report/freedom-net/2025/uncertain-future-global-internet",
      "resourceId": "ca43bd687b47f6d3",
      "resourceTitle": "Freedom House"
    },
    {
      "text": "2025 academic study",
      "url": "https://www.tandfonline.com/doi/full/10.1080/13510347.2025.2576527",
      "resourceId": "0d8c66696f4f5d65",
      "resourceTitle": "From Predicting Dissent to Programming Power: AI-Driven Authoritarian Governance"
    },
    {
      "text": "Taylor & Francis Democratization Journal 2025",
      "url": "https://www.tandfonline.com/doi/full/10.1080/13510347.2025.2576527",
      "resourceId": "0d8c66696f4f5d65",
      "resourceTitle": "From Predicting Dissent to Programming Power: AI-Driven Authoritarian Governance"
    },
    {
      "text": "Oxford University",
      "url": "https://aigi.ox.ac.uk/wp-content/uploads/2025/05/Toward_Resisting_AI_Enabled_Authoritarianism_-4.pdf",
      "resourceId": "bccbaf6dd292d58a",
      "resourceTitle": "Toward Resisting AI-Enabled Authoritarianism"
    }
  ],
  "unconvertedLinkCount": 10,
  "convertedLinkCount": 30,
  "backlinkCount": 6,
  "hallucinationRisk": {
    "level": "medium",
    "score": 55,
    "factors": [
      "no-citations"
    ]
  },
  "entityType": "risk",
  "redundancy": {
    "maxSimilarity": 18,
    "similarPages": [
      {
        "id": "authoritarian-tools",
        "title": "Authoritarian Tools",
        "path": "/knowledge-base/risks/authoritarian-tools/",
        "similarity": 18
      },
      {
        "id": "surveillance-authoritarian-stability",
        "title": "AI Surveillance and Regime Durability Model",
        "path": "/knowledge-base/models/surveillance-authoritarian-stability/",
        "similarity": 17
      },
      {
        "id": "surveillance",
        "title": "Mass Surveillance",
        "path": "/knowledge-base/risks/surveillance/",
        "similarity": 16
      },
      {
        "id": "authoritarian-tools-diffusion",
        "title": "Authoritarian Tools Diffusion Model",
        "path": "/knowledge-base/models/authoritarian-tools-diffusion/",
        "similarity": 15
      },
      {
        "id": "lock-in",
        "title": "AI Value Lock-in",
        "path": "/knowledge-base/risks/lock-in/",
        "similarity": 15
      }
    ]
  },
  "coverage": {
    "passing": 8,
    "total": 13,
    "targets": {
      "tables": 16,
      "diagrams": 2,
      "internalLinks": 32,
      "externalLinks": 20,
      "footnotes": 12,
      "references": 12
    },
    "actuals": {
      "tables": 21,
      "diagrams": 1,
      "internalLinks": 39,
      "externalLinks": 23,
      "footnotes": 0,
      "references": 18,
      "quotesWithQuotes": 0,
      "quotesTotal": 0,
      "accuracyChecked": 0,
      "accuracyTotal": 0
    },
    "items": {
      "llmSummary": "green",
      "schedule": "green",
      "entity": "green",
      "editHistory": "red",
      "overview": "green",
      "tables": "green",
      "diagrams": "amber",
      "internalLinks": "green",
      "externalLinks": "green",
      "footnotes": "red",
      "references": "green",
      "quotes": "red",
      "accuracy": "red"
    },
    "ratingsString": "N:4.5 R:6.8 A:5.2 C:7.5"
  },
  "readerRank": 107,
  "researchRank": 462,
  "recommendedScore": 182.61
}
External Links
{
  "eightyK": "https://80000hours.org/problem-profiles/extreme-power-concentration/"
}
Backlinks (6)
idtitletyperelationship
concentration-of-power-modelConcentration of Power Systems Modelanalysisscenario
lock-in-modelLock-in Irreversibility Modelanalysisscenario
us-ai-surveillance-democratic-erosionAI Surveillance and US Democratic Erosionrisk
risk-interaction-networkRisk Interaction Networkanalysis
near-term-risksKey Near-Term AI Risksrisk
structural-overviewStructural Risks (Overview)concept
Longterm Wiki