Authoritarian Tools Diffusion Model
authoritarian-tools-diffusionanalysisPath: /knowledge-base/models/authoritarian-tools-diffusion/
E31Entity ID (EID)
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
"id": "authoritarian-tools-diffusion",
"numericId": null,
"path": "/knowledge-base/models/authoritarian-tools-diffusion/",
"filePath": "knowledge-base/models/authoritarian-tools-diffusion.mdx",
"title": "Authoritarian Tools Diffusion Model",
"quality": 62,
"readerImportance": 37.5,
"researchImportance": 75.5,
"tacticalValue": null,
"contentFormat": "article",
"tractability": null,
"neglectedness": null,
"uncertainty": null,
"causalLevel": null,
"lastUpdated": "2026-03-13",
"dateCreated": "2026-02-15",
"llmSummary": "This model analyzes how AI surveillance technologies diffuse to authoritarian regimes through commercial sales, development assistance, joint ventures, reverse engineering, and illicit acquisition. It identifies semiconductor supply chains as the highest-leverage intervention point (medium-high effectiveness, 3-7 year delay achievable) but estimates this advantage will erode in 5-10 years as China develops domestic chip manufacturing, with AI surveillance estimated to enhance authoritarian regime stability by 20-40% and reduce successful protests by similar margins.",
"description": "This model analyzes how AI surveillance spreads to authoritarian regimes. It finds semiconductor supply chains are the highest-leverage intervention point, but this advantage will erode within 5-10 years as domestic chip manufacturing develops.",
"ratings": {
"focus": 8.5,
"novelty": 5,
"rigor": 6.5,
"completeness": 7.5,
"concreteness": 7,
"actionability": 6
},
"category": "models",
"subcategory": "societal-models",
"clusters": [
"ai-safety",
"governance",
"cyber"
],
"metrics": {
"wordCount": 6976,
"tableCount": 9,
"diagramCount": 1,
"internalLinks": 4,
"externalLinks": 0,
"footnoteCount": 0,
"bulletRatio": 0.04,
"sectionCount": 40,
"hasOverview": true,
"structuralScore": 12
},
"suggestedQuality": 80,
"updateFrequency": 90,
"evergreen": true,
"wordCount": 6976,
"unconvertedLinks": [],
"unconvertedLinkCount": 0,
"convertedLinkCount": 0,
"backlinkCount": 0,
"hallucinationRisk": {
"level": "medium",
"score": 60,
"factors": [
"no-citations",
"few-external-sources"
]
},
"entityType": "analysis",
"redundancy": {
"maxSimilarity": 22,
"similarPages": [
{
"id": "whistleblower-dynamics",
"title": "Whistleblower Dynamics Model",
"path": "/knowledge-base/models/whistleblower-dynamics/",
"similarity": 22
},
{
"id": "export-controls",
"title": "AI Chip Export Controls",
"path": "/knowledge-base/responses/export-controls/",
"similarity": 22
},
{
"id": "surveillance",
"title": "Mass Surveillance",
"path": "/knowledge-base/risks/surveillance/",
"similarity": 22
},
{
"id": "autonomous-weapons-proliferation",
"title": "LAWS Proliferation Model",
"path": "/knowledge-base/models/autonomous-weapons-proliferation/",
"similarity": 21
},
{
"id": "international-regimes",
"title": "International Compute Regimes",
"path": "/knowledge-base/responses/international-regimes/",
"similarity": 21
}
]
},
"coverage": {
"passing": 4,
"total": 13,
"targets": {
"tables": 28,
"diagrams": 3,
"internalLinks": 56,
"externalLinks": 35,
"footnotes": 21,
"references": 21
},
"actuals": {
"tables": 9,
"diagrams": 1,
"internalLinks": 4,
"externalLinks": 0,
"footnotes": 0,
"references": 0,
"quotesWithQuotes": 0,
"quotesTotal": 0,
"accuracyChecked": 0,
"accuracyTotal": 0
},
"items": {
"llmSummary": "green",
"schedule": "green",
"entity": "green",
"editHistory": "red",
"overview": "green",
"tables": "amber",
"diagrams": "amber",
"internalLinks": "amber",
"externalLinks": "red",
"footnotes": "red",
"references": "red",
"quotes": "red",
"accuracy": "red"
},
"ratingsString": "N:5 R:6.5 A:6 C:7.5"
},
"readerRank": 394,
"researchRank": 114,
"recommendedScore": 164.61
}External Links
No external links
Backlinks (0)
No backlinks