sending_1

🌍 Planetary Bottlenecks: Benevolence & Security Intelligence

Mapping where Musk-company execution vectors and Trump-era federal policy share critical chokepoints β€” and where those chokepoints threaten or enable civilisational wellbeing and catastrophic-risk reduction.

Snapshot Date Scope Bottlenecks License Code License Content Tracking Harm


πŸ“‹ Table of Contents


πŸ”­ Executive Summary

As of February 25, 2026, Donald Trump is the sitting U.S. President. Federal executive actions after January 2025 are directly part of the β€œlatest available” policy surface, and many of those actions explicitly target the same industrial chokepoints that the Musk-linked company portfolio confronts: space launch cadence and licensing, satellite governance, AI compute buildout, energy infrastructure, and critical-mineral supply chains.

Using planetary benevolence as a wellbeing-within-planetary-boundaries objective and planetary security as a catastrophic-risk and human-security objective, the most consequential shared bottlenecks cluster into six patterns:

# Bottleneck Benevolence Security Coupling
1 Energy & Compute Constraint ⚑ Mixed ⚑ Mixed β˜…β˜…β˜…β˜…β˜…
2 Permitting Throughput πŸ”΄ Negative ⚑ Mixed β˜…β˜…β˜…β˜…β˜†
3 Orbital Debris & STM πŸ”΄ Negative 🟒 Positive β˜…β˜…β˜…β˜†β˜†
4 Critical Minerals Fragility ⚑ Mixed 🟒 Positive β˜…β˜…β˜…β˜…β˜†
5 Climate Policy Volatility πŸ”΄ Negative ⚑ Mixed β˜…β˜…β˜…β˜…β˜…
6 Trust & Polarisation πŸ”΄ Negative πŸ”΄ Negative β˜…β˜…β˜…β˜†β˜†

Mitigations that appear consistently high-leverage across bottlenecks include build-to-audit architectures, permit-to-standard governance, multi-stakeholder space commons coordination, and industrial resilience compacts.


πŸ“ Working Definitions

🌱 Planetary Benevolence πŸ›‘οΈ Planetary Security
The sustained improvement of human wellbeing and capability while maintaining Earth-system stability and minimising irreversible harms. Grounded in the **safe operating space for humanity** concept (planetary boundaries) and the **planetary health** framing that links civilisation's health to natural systems. **Operationally covers:** rapid decarbonisation, resilient infrastructure, broad connectivity access, reduced accident/injury burdens, improved health capabilities, and transparent rights-respecting governance. Reduction of the probability and severity of global catastrophic harms to human survival, freedom, and long-run potential β€” combining the **UNDP notion of human security** with **existential/global-catastrophic risk frameworks** concerned with civilisation-scale failure modes. **Operationally covers:** cyber/space infrastructure resilience, conflict escalation control, deterrence stability, biosecurity and public-health capability, and management of advanced-technology risks, notably AI.

πŸ”¬ Methodology

The analysis follows a two-sided bottleneck mapping procedure, applied across a source hierarchy (highest to lowest):

β‘  Capability vectors:  Extract each company's stated mission and major operational dependencies
β‘‘ Policy vectors:      Identify federal initiatives that directly shape those dependencies
β‘’ Bottleneck taxonomy: Classify into 7 domains (see below)
β‘£ Impact scoring:      Qualitative effect direction on (a) benevolence and (b) security
β‘€ Mitigation design:   Technical / Policy / Governance β€” with feasibility and reversibility notes

Source hierarchy: Primary government sources β†’ Primary company sources β†’ Original academic/synthesis research β†’ Policy think tanks & standards bodies β†’ Mainstream press (corroboration only)

Seven analytical domains:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ 1. Technological    β”‚ 2. Regulatory/Legal  β”‚ 3. Economic/Finance   β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 4. Supply Chain     β”‚ 5. Governance/Coord. β”‚ 6. Social/Ethical     β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ 7. Security/Risk                                                   β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ•ΈοΈ Entity Relationships

The diagram below shows how company capability vectors and federal policy vectors converge on shared bottlenecks. Node size represents coupling intensity; edge weight represents dependency strength.

graph TD
    %% ── Company nodes ──────────────────────────────────────────
    SpaceX["πŸš€ SpaceX\n(launch & exploration)"]
    Tesla["⚑ Tesla\n(EVs & grid storage)"]
    Starlink["πŸ›°οΈ Starlink\n(satellite internet)"]
    xAI["πŸ€– xAI\n(AI models & compute)"]
    Neuralink["🧠 Neuralink\n(neurotechnology)"]

    %% ── Policy vectors ─────────────────────────────────────────
    NEPA_EO["πŸ“‹ NEPA EO 14154\nCEQ Rescission"]
    AI_EO["πŸ“‹ AI Data Center EO\nPermitting Streamline"]
    GHG_EPA["πŸ“‹ EPA GHG Rescission\nApr 2026"]
    SPD3["πŸ“‹ SPD-3\nSpace Traffic Mgmt"]
    TARIFFS["πŸ“‹ Tariffs & Trade\nSection 232/IEEPA"]
    SPACE_SUP["πŸ“‹ Space Superiority EO\nMoon-by-2028"]

    %% ── Bottleneck nodes ────────────────────────────────────────
    BT1["⚑ BT-0001\nEnergy & Compute"]
    BT2["βš–οΈ BT-0002\nPermitting Throughput"]
    BT3["πŸ›Έ BT-0003\nOrbital Debris & STM"]
    BT4["⛏️ BT-0004\nCritical Minerals"]
    BT5["🌑️ BT-0005\nClimate Policy Volatility"]
    BT6["πŸ’¬ BT-0006\nTrust & Polarisation"]

    %% ── Company β†’ Bottleneck couplings ─────────────────────────
    SpaceX  -->|"launch cadence"| BT2
    SpaceX  -->|"mega-constellation"| BT3
    Tesla   -->|"mission exposure"| BT5
    Tesla   -->|"vertical integration"| BT4
    xAI     -->|"Colossus 200k GPU"| BT1
    Starlink -->|"STM externalities"| BT3
    Neuralink -->|"regulatory scrutiny"| BT2

    %% ── Policy β†’ Bottleneck couplings ──────────────────────────
    NEPA_EO   -->|"review rescission"| BT2
    AI_EO     -->|"data-centre demand"| BT1
    GHG_EPA   -->|"authority baseline"| BT5
    SPD3      -->|"STM rules"| BT3
    TARIFFS   -->|"input cost shock"| BT4
    SPACE_SUP -->|"cadence pressure"| BT2
    SPACE_SUP -->|"militarisation risk"| BT3

    %% ── Bottleneck cross-coupling ───────────────────────────────
    BT1 -.->|"grid strain"| BT2
    BT5 -.->|"policy erosion"| BT6
    BT3 -.->|"trust damage"| BT6
    BT4 -.->|"supply constraint"| BT1

    %% ── Styles ─────────────────────────────────────────────────
    classDef company  fill:#0e1528,stroke:#00d4b4,color:#00d4b4
    classDef policy   fill:#0e1528,stroke:#ff9d3a,color:#ff9d3a
    classDef bt       fill:#141c35,stroke:#b06fff,color:#c8d8f8
    classDef risk     fill:#141c35,stroke:#ff5f7e,color:#ff5f7e

    class SpaceX,Tesla,Starlink,xAI,Neuralink company
    class NEPA_EO,AI_EO,GHG_EPA,SPD3,TARIFFS,SPACE_SUP policy
    class BT1,BT2,BT3,BT4,BT5 bt
    class BT6 risk

πŸ“… Policy Timeline 2017–2026

timeline
    title Selected Milestones Shaping Shared Bottlenecks

    section 2017
        Jun 2017 : Paris Agreement Withdrawal Announced (First Term)
        Aug 2017 : EO 13807 – Infrastructure Permitting Streamlining

    section 2018
        May 2018 : Space Policy Directive-2 – Commercial Space Streamlining
        Jun 2018 : Space Policy Directive-3 – Space Traffic Management Policy

    section 2019
        Feb 2019 : EO 13859 – American AI Initiative

    section 2020
        Sep 2020 : Space Policy Directive-5 – Space Cybersecurity Principles
        Dec 2020 : National Space Policy Issued

    section 2022
        Mar 2022 : NASA Awards SpaceX Starship HLS Long-Term Contract

    section 2024
        2024 : IEA – Accelerating EV Adoption Globally
        2024 : Satellite Constellations – Astronomy Concerns Documented (Peer-Reviewed)

    section 2025
        Jan 2025 : EO 14154 – Unleashing American Energy; CEQ NEPA Rescission
        2025 : EO – Accelerating Federal Permitting of AI Data Center Infrastructure
        2025 : EO – Enabling Competition in Commercial Space
        2025 : EO – Genesis Mission for AI-Enabled Scientific Discovery
        Dec 2025 : EO – American Space Superiority & Moon-by-2028 Target

    section 2026
        Jan 2026 : Tesla Texas Lithium Refinery Commences Operations
        Feb 2026 : Snapshot Date – This Analysis
        Apr 2026 : EPA Final Rule Rescinds GHG Endangerment Finding (Effective)

πŸ”© The Six Bottlenecks

How to read these entries: each bottleneck is evaluated through both planetary lenses simultaneously, because they frequently diverge β€” and that divergence is analytically critical. Mitigations are tagged [T] technical, [P] policy, or [G] governance.


BT-0001 Β· Energy & Compute as a Binding Constraint

Domain Benevolence Security Coupling

The chokepoint in one sentence: AI scaling and electrification are hitting a shared ceiling in grid capacity, permitting speed, and energy supply mix β€” and the policy response accelerates demand while the physical infrastructure lags.

Company-side evidence: xAI’s own materials describe rapid buildout of Colossus, scaled to 200,000 GPUs, while the IEA projects data-centre electricity consumption roughly doubling by 2030. Tesla’s electrification ecosystem depends on a reliable grid that this same AI boom is straining.

Policy-side evidence: The AI data-centre permitting EO explicitly eases regulatory burdens to build data centres and high-voltage transmission; reportage ties the AI boom to grid constraints and describes Trump pushing self-supply by tech firms β€” an acknowledgement that the grid cannot absorb demand as planned.

πŸ’‘ Impact analysis For **planetary benevolence**, the bottleneck is double-edged: AI-enabled discovery can accelerate beneficial outcomes (climate modelling, drug discovery, grid optimisation), but if incremental power comes from high-emissions sources under weakened environmental controls, it directly conflicts with planetary-boundary goals. The net direction is *mixed*, with the outcome contingent on the energy mix. For **planetary security**, grid scarcity and congestion produce strategic vulnerability when both civil infrastructure and defence-relevant compute depend on constrained nodes. A large-scale grid event at a compute-dense hub would be simultaneously an economic and national-security shock.
πŸ› οΈ Mitigations `[T]` Co-locate data centres with low-carbon firm generation; integrate demand response; pursue waste-heat reuse and hardware efficiency as first-class KPIs rather than afterthoughts. `[P]` Require grid-impact disclosures and mitigation plans for GW-scale data-centre projects before approvals; accelerate grid interconnection processes *without* eliminating environmental safeguards. `[G]` Treat compute-dense data centres as critical infrastructure subject to resilience standards β€” N-1 redundancy, cyber baselines, and independent operational audits.

BT-0002 Β· Permitting Throughput & Litigation Risk

Domain Benevolence Security Coupling

The chokepoint in one sentence: Federal efforts to speed up permitting by weakening review processes generate legitimacy deficits and litigation spirals that ultimately slow the very projects they target.

Company-side evidence: FAA tiered environmental assessments and mishap/return-to-flight determinations explicitly govern Starship launch cadence. Public comment cycles, environmental review timeframes, and mishap investigations are not bureaucratic friction β€” they are the operational gating mechanisms for the world’s largest launch programme.

Policy-side evidence: EO 14154 directs CEQ NEPA regulatory rescission and positions this as β€œunleashing energy.” A separate 2025 EO targets rapid AI data-centre permitting. Both moves have attracted litigation within months of implementation.

πŸ’‘ Impact analysis For **planetary benevolence**, weakened process reduces the legitimacy of resulting decisions, making durable deployment harder. Acceleration that bypasses public health and environmental review can generate harms that erode trust in the very technologies being deployed. For **planetary security**, faster deployment *can* strengthen defence and resilience β€” but poor process creates systemic hazards (launch accidents, debris cascades, data-centre grid shocks) that degrade strategic stability.
πŸ› οΈ Mitigations `[T]` Design-for-disposal satellites; robust launch safety analyses; debris containment from the engineering stage, not as regulatory add-on. `[P]` Predictable licensing SLAs *coupled* to enforceable sustainability constraints β€” deorbit metrics, debris liabilities, grid-impact bonds. Speed and accountability are not opposites. `[G]` Independent STM reporting and shared data infrastructure to reduce the informational asymmetry that makes process cuts feel justified.

BT-0003 Β· Orbital Debris & Space Traffic Management

Domain Benevolence Security Coupling

The chokepoint in one sentence: Mega-constellations scale the externalities of orbital congestion faster than governance frameworks can adapt β€” and this is simultaneously a science/commons problem and a national-security dependency.

Company-side evidence: Starlink’s constellation expansion raises congestion and debris stakes at a rate that is structurally new. Peer-reviewed research documents that large satellite constellations contaminate space-telescope images β€” demonstrating that the space commons is already experiencing irreversible-adjacent harm.

Policy-side evidence: FCC orbital-debris rules now embed a five-year post-mission disposal expectation for many LEO systems. SPD-3 sets STM priorities but operational coordination remains multi-actor and fragmented. International coordination proceeds through ITU registration processes β€” a system designed for a pre-mega-constellation era.

πŸ’‘ Impact analysis The divergence between lenses is sharp here. For **planetary benevolence**, degraded space commons harms Earth observation, climate monitoring, and astronomy science β€” all of which serve long-term civilisational wellbeing. For **planetary security**, space infrastructure has become a strategic military asset, and its congestion increases vulnerability of national-security assets while raising collision and misattribution complexity in a crisis.
πŸ› οΈ Mitigations `[G]` Create interoperable STM data standards; mandate conjunction reporting as a baseline condition of orbital operations; align domestic rules with ITU processes. `[T]` Brightness mitigation and lower-reflectivity satellite design (acknowledging this remains contested and evolving). Transparency requirements for autonomous manoeuvring. `[G]` Confidence-building measures and explicit norms prohibiting debris-creating tests; strengthen STM as "risk-reduction infrastructure" in the same way nuclear safety infrastructure is treated.

BT-0004 Β· Critical Minerals & Industrial Base Fragility

Domain Benevolence Security Coupling

The chokepoint in one sentence: Lithium, cobalt, nickel, rare earths, and advanced semiconductors are simultaneously a clean-energy-transition bottleneck and a national-security bottleneck β€” and attempts to solve one can worsen the other.

Company-side evidence: Tesla’s SEC filings emphasise supply-chain de-risking and vertical integration; the Texas lithium refinery commencing operations in January 2026 is the most concrete recent signal of corporate strategy responding to this bottleneck directly. xAI’s compute build and the broader AI boom represent enormous semiconductor demand that is simultaneously a civilian and defence-relevant resource.

Policy-side evidence: EO 13817 frames critical minerals as a strategic vulnerability. Second-term initiatives described in reporting include Pentagon-developed AI tools to create reference prices for critical minerals β€” an extraordinary step that indicates policy interest in reshaping market structure itself.

πŸ’‘ Impact analysis For **planetary benevolence**, mineral bottlenecks slow electrification and energy transition, directly undermining emissions reduction pathways. For **planetary security**, concentrated supply chains can be leveraged coercively, but attempts to counter-concentrate via tariffs or state intervention can intensify economic confrontation and raise escalation risk.
πŸ› οΈ Mitigations `[T]` Design for lower-criticality chemistries; expand secondary supply and materials substitution; invest in end-of-life recycling at scale. `[P]` Diversify supply via allied sourcing with transparent environmental and social standards β€” avoid "security fixes" that increase local harm in producing nations. `[G]` Critical minerals provenance metadata requirements for federal procurement and defence supply chains; multi-nation industrial resilience compacts.

BT-0005 Β· Climate Policy Volatility & Authority Baseline

Domain Benevolence Security Coupling

The chokepoint in one sentence: The EPA’s rescission of the 2009 GHG endangerment finding removes the federal regulatory authority baseline for emissions standards β€” fragmenting policy signals and dramatically increasing long-run climate risk.

Policy-side evidence: EPA states that rescinding the endangerment finding removes the Clean Air Act Section 202(a) basis for prescribing vehicle GHG standards. The Federal Register final action explicitly rescinds the finding and repeals vehicle GHG standards for multiple classes, effective April 20, 2026. Litigation was filed immediately.

Company-side evidence: Tesla’s business and mission are explicitly tied to accelerating sustainable energy. In a world where federal emissions standards are removed, policy-driven demand signals become more state-driven and globally fragmented, increasing business-model uncertainty for the company most aligned with the benevolence objective.

πŸ’‘ Impact analysis For **planetary benevolence**, climate mitigation is a central planetary-boundary stabiliser. IPCC emphasises steep emissions reductions for 1.5Β°C-consistent pathways; reductions in regulatory capacity raise long-run benevolence risk in a way that compounds with every year of delay. For **planetary security**, climate change is treated in catastrophic-risk assessments as a global catastrophe *contributor* β€” through resource stress, disaster cascades, and displacement. Weakening mitigation can increase long-range destabilisation channels.
πŸ› οΈ Mitigations `[P]` Replace unstable authority fights with durable, technology-neutral performance standards enacted through legislation rather than administrative rulemaking where feasible. `[G]` Build state–federal compacts and multi-level governance mechanisms to reduce regulatory oscillation risk; explicitly track reversal risk in investment and planning decisions. `[P]` Maintain transparent cost–benefit and health-impact accounting as a public record, regardless of whether rule-making proceeds β€” this provides the evidence base for reversal when political conditions change.

BT-0006 Β· Trust, Polarisation & Epistemic Bottlenecks

Domain Benevolence Security Coupling

The chokepoint in one sentence: Misinformation, societal polarisation, and eroded institutional trust behave like hard technical bottlenecks for goals that require durable cooperation β€” which is to say, almost all planetary-scale goals.

Evidence: WEF consistently ranks misinformation/disinformation and societal polarisation among top near-term risks. Local opposition delays data centres due to perceived harms around energy costs, water use, and noise β€” demonstrating that social consent is already an operational constraint, not a soft externality. AI policy debates framing safety concerns as β€œbias” further fragment the epistemic commons.

πŸ’‘ Impact analysis For **planetary benevolence**, decarbonisation and public-health resilience require broad, durable buy-in across administrations and electoral cycles. Polarisation raises reversal odds and slows deployment of beneficial infrastructure by making every project a political battleground. For **planetary security**, polarisation increases vulnerability to information operations and complicates crisis decision-making at exactly the moments when coherent, rapid response is most critical.
πŸ› οΈ Mitigations `[G]` Radical transparency on externalities β€” grid impacts, emissions, debris risk, water use β€” published as open, third-party-validated data rather than managed corporate communications. `[G]` Participatory planning processes for high-impact infrastructure; communities have more tolerance for projects they helped shape. `[T]` Open public dashboards; third-party measurement standards; incident reporting requirements that make system performance legible to non-expert audiences.

πŸ“Š Impact Matrix

Full comparative view across all six bottlenecks and seven analytical domains.

Bottleneck Tech Reg/Legal Econ Supply Gov Social Security B-Impact S-Impact Confidence
Energy & Compute ●●● ●●○ ●●● ●●○ ●●○ ●○○ ●●● ⚑ Mixed ⚑ Mixed Medium
Permitting & Litigation ●○○ ●●● ●●○ β—‹β—‹β—‹ ●●● ●●○ ●●○ πŸ”΄ Neg ⚑ Mixed High
Orbital Debris & STM ●●● ●●○ ●○○ β—‹β—‹β—‹ ●●● ●●○ ●●● πŸ”΄ Neg 🟒 Pos Medium
Critical Minerals ●●○ ●○○ ●●● ●●● ●●○ ●○○ ●●● ⚑ Mixed 🟒 Pos High
Climate Policy Volatility β—‹β—‹β—‹ ●●● ●●● ●○○ ●●● ●●○ ●●○ πŸ”΄ Neg ⚑ Mixed High
Trust & Polarisation ●○○ ●○○ ●●○ β—‹β—‹β—‹ ●●● ●●● ●●○ πŸ”΄ Neg πŸ”΄ Neg Medium

Domain intensity: ●●● highly coupled Β· ●●○ moderate Β· ●○○ tangential Β· β—‹β—‹β—‹ not applicable


πŸ› οΈ Mitigation Playbook

Four intervention archetypes appear consistently high-leverage across multiple bottlenecks simultaneously.

βš™οΈ Build-to-Audit Architecture [Technical]

Verifiable safety cases with measurable hazard analyses; open telemetry feeds and transparent incident reporting for critical services; third-party red-teaming as a standard operational requirement rather than a one-time event. Applies directly to: BT-0001, BT-0002, BT-0003, BT-0006.

πŸ“‹ Permit-to-Standard Governance [Policy]

Predictable licensing timelines tied to measurable environmental and safety performance metrics. Speed and accountability are not opposites β€” the key insight is that regulatory predictability is itself an accelerant, because it removes the litigation risk that unpredictable or weakened processes introduce. Applies directly to: BT-0002, BT-0005.

πŸ›Έ Space Commons Coordination [Governance]

Interoperable STM, debris, and spectrum data-sharing compacts. Multi-stakeholder norms for conjunction reporting. Explicit prohibition norms for debris-creating tests. Treat space traffic management as risk-reduction infrastructure in the same way nuclear safety protocols are treated β€” not as competitive advantage. Applies directly to: BT-0003.

🀝 Industrial Resilience Compacts [Policy + Governance]

Critical-mineral provenance standards; end-of-life recycling mandates; diversified allied sourcing with transparent environmental and social standards; alliance-based procurement for defence-relevant materials. The goal is supply resilience without the geopolitical confrontation that purely nationalist reshoring tends to generate. Applies directly to: BT-0004, BT-0001.


πŸ“¦ Data Schema

Each bottleneck page is generated from a structured JSON record in docs/data/bottlenecks/. Adding a new bottleneck means adding a single file that conforms to the schema below β€” the build script handles cross-linking, card generation, and timeline integration automatically.

{
  "id": "BT-0001",
  "title": "Energy and compute as a binding constraint",
  "domains": ["technological", "economic/finance", "security/risk"],
  "summary": "AI-scale and electrification are constrained by grid capacity...",

  "company_examples": [
    {
      "company": "xAI",
      "program": "Colossus",
      "claim": "Scaled to 200k GPUs in <1 year (per xAI).",
      "sources": [
        {
          "type": "primary",
          "title": "xAI Colossus page",
          "url": "https://x.ai/colossus",
          "date": "2026-02-25"
        }
      ]
    }
  ],

  "policy_examples": [
    {
      "policy": "Accelerating Federal Permitting of AI Data Center Infrastructure",
      "jurisdiction": "US federal",
      "mechanism": "Executive Order",
      "date": "2025-07-23",
      "sources": [
        {
          "type": "primary",
          "title": "White House EO",
          "url": "https://www.whitehouse.gov/presidential-actions/..."
        }
      ]
    }
  ],

  "impact_assessment": {
    "planetary_benevolence": {
      "direction": "mixed",
      "mechanisms": ["innovation acceleration", "emissions risk via power mix", "water/land impacts"]
    },
    "planetary_security": {
      "direction": "mixed",
      "mechanisms": ["strategic capability", "grid fragility", "critical infrastructure risk"]
    }
  },

  "mitigations": [
    { "type": "technical",   "action": "Adopt compute-efficiency KPIs and demand-response integration." },
    { "type": "policy",      "action": "Require grid-impact disclosure + mitigation plans for GW-scale data centers." },
    { "type": "governance",  "action": "Independent audits for critical infrastructure AI deployments." }
  ],

  "stakeholders": ["SH-0001", "SH-0002"],
  "last_updated": "2026-02-25",
  "confidence": "medium"
}

πŸ—‚οΈ Repository Blueprint

planetary-benevolence-security-bottlenecks/
β”‚
β”œβ”€β”€ README.md                          ← This file
β”œβ”€β”€ LICENSE-CODE                       ← MIT
β”œβ”€β”€ LICENSE-CONTENT                    ← CC BY 4.0
β”œβ”€β”€ CODE_OF_CONDUCT.md
β”œβ”€β”€ CONTRIBUTING.md
β”œβ”€β”€ SECURITY.md
β”œβ”€β”€ CITATION_POLICY.md
β”‚
β”œβ”€β”€ docs/
β”‚   β”œβ”€β”€ index.html
β”‚   β”œβ”€β”€ assets/ (css/ js/ img/)
β”‚   └── data/
β”‚       β”œβ”€β”€ bottlenecks/
β”‚       β”‚   β”œβ”€β”€ BT-0001-energy-compute.json
β”‚       β”‚   β”œβ”€β”€ BT-0002-permitting-throughput.json
β”‚       β”‚   └── ...
β”‚       β”œβ”€β”€ stakeholders/
β”‚       β”‚   β”œβ”€β”€ SH-0001-federal-agencies.json
β”‚       β”‚   └── SH-0002-industry.json
β”‚       β”œβ”€β”€ sources/
β”‚       β”‚   β”œβ”€β”€ 2017-2021/
β”‚       β”‚   └── 2025-2026/
β”‚       └── diagrams/
β”‚           β”œβ”€β”€ entity-relationships.mmd
β”‚           └── timeline.mmd
β”‚
β”œβ”€β”€ research/
β”‚   β”œβ”€β”€ methods/
β”‚   β”‚   β”œβ”€β”€ methodology.md
β”‚   β”‚   └── scoring-rubric.md
β”‚   └── memos/
β”‚       └── 2026-02-25-snapshot.md
β”‚
└── .github/
    β”œβ”€β”€ ISSUE_TEMPLATE/
    β”‚   β”œβ”€β”€ new-bottleneck.yml
    β”‚   β”œβ”€β”€ add-evidence.yml
    β”‚   └── policy-update.yml
    β”œβ”€β”€ PULL_REQUEST_TEMPLATE.md
    └── workflows/
        β”œβ”€β”€ validate-json.yml
        β”œβ”€β”€ build-docs.yml
        └── link-check.yml

🀝 Contribution Guide

Core Principles

Every non-trivial claim must cite a primary source or a reputable synthesis (IPCC / IEA / NIST / RAND). Keep direct quotes short and prefer paraphrase with citation. Describe policy and corporate actions in neutral language, separating facts from interpretation. Do not include instructions that could enable wrongdoing of any kind.

Required for Every PR

  1. Add or update a bottleneck JSON in docs/data/bottlenecks/
  2. Add sources in docs/data/sources/ with URL + date accessed
  3. Update docs/diagrams/ if entity relationships change
  4. Run tools/scripts/validate.js (CI enforces this automatically)

Repeatable Contributor Prompt Chains

These meta-prompt chains are designed for low-ambiguity, repeatable expansion of the knowledge base:

Chain A β€” Add a policy-to-bottleneck record:

β€œFind the primary text for [policy name] and extract: date, authority, key operative sections, and implementation agencies. Output as JSON.” β†’ β€œMap which bottleneck IDs it touches and why.” β†’ β€œCheck: (a) primary source link present, (b) no uncited claims, (c) neutral language.”

Chain B β€” Add a company constraint record:

β€œFrom the latest annual report for [company], extract explicit constraints (permits, materials, compute, regulators) with citations.” β†’ β€œConvert each constraint into a bottleneck linkage with short rationale.” β†’ β€œPropose one technical mitigation and one governance mitigation; label as speculative unless sourced.”

Chain C β€” Maintain the timeline:

β€œFor [date range], list all new EOs/final rules relevant to AI, space, NEPA, critical minerals, or climate.” β†’ β€œUpdate timeline.mmd with only items that change a bottleneck pressure.” β†’ β€œAdd citations and link each node to a source record.”


πŸ“š Licence & Attribution

Asset Licence
All code (scripts, schemas, build tools) MIT Licence
All content (research narrative, diagrams, analysis) Creative Commons Attribution 4.0 (CC BY 4.0)

When citing this work, please include the snapshot date (Feb 25, 2026) alongside your citation, as the policy landscape evolves rapidly and provenance matters.


πŸ›‘οΈ Zero Harm & Anti-Coercion

This repository is designed and maintained to serve public understanding and constructive policy analysis. It contains no tracking, no hidden telemetry, no surveillance features, and no manipulative design patterns. No personal data is collected or stored.

Any content or functionality that could be repurposed for coercion, targeted harassment, surveillance, or manipulation has been deliberately excluded. All sources are publicly cited. All analysis is reversible and contestable.

When in doubt, this project chooses safety, clarity, and human wellbeing over power or complexity.


*Planetary Restoration Archive Β· Open Research, Open Source* ![Built with care](https://img.shields.io/badge/built%20with-care%20%26%20rigour-00d4b4?style=flat-square) ![Zero tracking](https://img.shields.io/badge/zero-tracking-brightgreen?style=flat-square) ![Regenerative intent](https://img.shields.io/badge/intent-regenerative-b06fff?style=flat-square)