The Shift Capabilities Architecture Screenshots Validation For AI Teams GitHub
Epistemic Defense Infrastructure

SEE HOW INFORMATION ACTUALLY FLOWS

Point it at any document collection. See who's being ignored. See who's coordinating. See what's being suppressed.

Traditional information retrieval systems focus on finding relevant documents. Aegis Insight takes a fundamentally different approach: it extracts structured knowledge from unstructured text, builds a queryable graph of claims and entities, and provides analytical tools to examine the shape and structure of knowledge itself. It shows you who cites whom, who ignores whom, and where consensus may be manufactured versus earned. Runs locally on gaming-class hardware. No cloud. No middlemen. Validates against settled historical data sets for verifiable performance.

LOCAL Gaming PC Hardware
VALIDATED Against History
OPEN Inspect & Extend
SOVEREIGN No Cloud Required

THE SHIFT

Standard retrieval systems answer "what do sources say about X?" Epistemic topology mapping answers a different question entirely: "what's the structure of who says what, and who ignores whom?"

What You Ask Standard RAG Epistemic Topology
"What do sources say about X?" Retrieves relevant chunks Retrieves + shows citation topology
"Can I trust this?" Trust by recency or authority Trust by network position, credential-claim alignment
"What's the consensus?" Synthesizes apparent agreement Exposes whether consensus is earned or manufactured
"Why don't I see this elsewhere?" Cannot answer Detects citation voids, suppression patterns

CAPABILITIES

Knowledge Topology

See citation flow, not just content. Understand who references whom, who ignores whom, and where the information actually comes from.

Validated Method

Tested against settled history first. Butler, Paine, Twain — cases where we know what happened. Prove the instrument before applying it.

Local-First

Your hardware, your analysis. Runs on gaming-class GPUs. No cloud dependency, no data leaving your machine.

Two-Stage Pipeline

Semantic search finds relevant content, then epistemological analysis exposes the structure. Fast retrieval, deep understanding.

MCP Integration

Plug into any AI system via Model Context Protocol. Clean endpoints for suppression scores, coordination detection, multi-perspective synthesis.

Open Source

Inspect, extend, trust. No black boxes. See exactly how detection works. Modify for your domain. MIT licensed.

ARCHITECTURE

A two-stage pipeline: semantic retrieval finds relevant content, then epistemological analysis exposes the structure. Seven-dimensional extraction feeds a knowledge graph where detection algorithms identify patterns invisible to traditional search.

Eleutherios System Architecture

SEE IT IN ACTION

The knowledge graph visualization, pattern search, data management, calibration controls—tools designed for researchers who need to see the structure, not just the content.

Knowledge Graph Visualization

Knowledge Graph

Interactive visualization of entities, claims, and citation relationships. See the topology of your data set.

Pattern Search Interface

Pattern Search

Semantic search with detection overlays. Find content and see its epistemic context simultaneously.

Data Loading Wizard

Data Loading

Wizard-driven ingestion for PDFs, text, and structured data. OCR to processed claim, entity, and metadata. Progress tracking and validation built in.

Detection Calibration

Detection Calibration

Configure detection profiles for different domains, or create your own. Tune thresholds based on your data set characteristics.

Data Management

Data Management

Manage source data files, respective claims, entities, linkages, purging discrete documents, and custom claim exclusions.

Coordination Detection

Detection Profiles

Standard, Coordination, Suppression, and Anomaly detection profiles provide rich analysis of entities, claims, and multi-dimension information topology.

VALIDATED AGAINST HISTORY

The toolset is validated against settled history before you apply it to contemporary questions. These suppression scores come from a historical Americana demo dataset, cases where history has already rendered verdicts: Spanish American War, USS Maine, Thomas Paine, Smedley Butler, Prohibition, and more.

0.78
Smedley Butler
Two-time Medal of Honor recipient. Wrote "War is a Racket." Maximum credentials, spoke truth, systematically marginalized.
0.83
Thomas Paine
"Common Sense" made him a hero. "Age of Reason" made him a pariah. Same author, different institutional treatment.
0.82
Mark Twain
Anti-imperialist essays quietly buried. "King Leopold's Soliloquy" hard to find for decades. Selective visibility.

FOR AI TEAMS

Aegis Insight—the analytical engine powering Eleutherios—provides epistemological context for RAG systems via MCP endpoints. Make your AI systems more resilient against data poisoning attacks and suppressed data manipulation attempts.

Data Poisoning Defense

Detection algorithms identify coordinated manipulation attempts through temporal clustering, language similarity, and citation cartel analysis.

Suppression Awareness

Surface marginalized-but-credible sources alongside mainstream positions. Expose credential inversion and evidence avoidance patterns.

MCP Integration

Clean endpoints, Docker deployment, designed for your stack. Query suppression scores, coordination detection, and multi-perspective synthesis.

HOW IT WORKS

Step 1

Ingest Your Data Set

Load documents via the data wizard. PDFs, text, HTML—the system extracts and processes automatically. Ships with the Example American icon demo data set for immediate validation.

Step 2

Seven-Dimensional Extraction

Local LLMs extract claims, entities, temporal markers, geographic references, citations, emotional framing, and authority domains from every chunk.

Step 3

Build the Knowledge Graph

Neo4j stores the topology. Entities connect to claims. Sources connect to entities. Citation flows become visible. The structure emerges.

Step 4

Run Detection Algorithms

Suppression detection, coordination detection, anomaly detection—each with calibrated thresholds. Multiple weak signals combine into strong indicators.

GET STARTED

An individual with a gaming laptop can now perform the same structural epistemological analysis that would have required a well-funded research team five years ago. Docker deployment, pre-populated demo data set, immediate capability.