dual-use technology

41 results back to index


pages: 571 words: 124,448

Building Habitats on the Moon: Engineering Approaches to Lunar Settlements by Haym Benaroya

3D printing, anti-fragile, Apollo 11, Apollo 13, biofilm, Black Swan, Brownian motion, Buckminster Fuller, carbon-based life, centre right, clean water, Colonization of Mars, Computer Numeric Control, conceptual framework, data acquisition, dual-use technology, Elon Musk, fault tolerance, Gene Kranz, gravity well, inventory management, Johannes Kepler, low earth orbit, Neil Armstrong, orbital mechanics / astrodynamics, performance metric, RAND corporation, restrictive zoning, risk tolerance, Ronald Reagan, stochastic process, tacit knowledge, telepresence, telerobotics, the scientific method, Two Sigma, urban planning, Virgin Galactic, X Prize, zero-sum game

The idea of public-private partnerships has also been suggested in the form of a Lunar Development Corporation that supports long-term efforts aimed at achieving lunar settlements by creating a hybrid finance model that integrates spinoffs strategically. ( 21 ) Tables 2.1, 2.2, and 2.3 provide a number of technologies that have both terrestrial and lunar markets. By spinning off technologies created for a trip to the Moon, a funding stream can be developed. This additional source of funds may need to be supplemented in some way.Table 2.1Partial list of dual-use technologies: Communications and Information Systems; In-Situ Resources Utilization; Surface Mobility – Suits Dual-Use Technologies: Communications/Information Systems Terrestrial Applications Technology Space/lunar/Mars applications Communications High-definition TV broadcast Business video conferencing Ka band or higher Telepresence: vision and video data Interferometers: raw data transmission Entertainment industry Commercial aviation Powerplant operations Manufacturing operations Machine-human interface Control stations System management Communications Archiving Computer operating systems Data-compression information processing Large-scale data management systems Interferometers: raw data transmission information processing System management expert data Archiving/neural nets Dual-Use Technologies: In-Situ Resource Utilization Terrestrial Applications Technology Space/lunar/Mars applications Mineral analysis, yield estimation – deep mine vein location and tracking Wall and cell integrity Advanced sensors Mineral analysis, yield estimation of surface mineral analysis and resource location Deep mine robotic operations for – mining – beneficiating – removal Advanced robot mining Surface mine robotic operations for – mining – beneficiating – removal Improved automated processing: increased efficiency Automated processing technology Remote, low-maintenance processing Reliable, low-pollution personal transmission Regenerable energy economies Small, decentralized power systems for remote third world applications Alternative, regenerable energy economies – methane/O2, H2/O2 ISRU-based engines Regenerable energies High-density energy storage Environmentally safe energy production Space-based energy generation and transmission Surface power generation and beaming Dual-Use Technologies: Surface Mobility – Suits Terrestrial Applications Technology Space/lunar/Mars applications Hazardous materials cleanup Fire fighting protection Underwater equipment Homes Aircraft Lightweight superinsulated materials Surface suits: thermal protection Surface facilities: thermal protection Robotic assisted systems Orthopedic devices for mobility of impaired persons Human power enhancement Robotics Mobility enhancement devices and manipulators Robotic assisted suit systems Human power enhancement Hazardous materials cleanup Fire fighting protection Underwater equipment Dust protection, seals, abrasive resistant materials Surface suits: outer garment Hazardous materials cleanup Underwater breathing gear Lightweight hi-reliability life support Portable life support for surface suits Backup life support systems Remote health monitoring Portable biomedical sensors and health evaluation systems Surface EVA crew member health monitoring Hypo-hyper thermal treatments Fire fighting protection and underwater equipment Arctic/Antarctic undergarments Small, efficient, portable cooling and heating systems Surface suits: thermal control systems Rovers : thermal control systems Table 2.2Partial list of dual-use technologies: Surface Mobility – Vehicles, Human Support, and Power.

This additional source of funds may need to be supplemented in some way.Table 2.1Partial list of dual-use technologies: Communications and Information Systems; In-Situ Resources Utilization; Surface Mobility – Suits Dual-Use Technologies: Communications/Information Systems Terrestrial Applications Technology Space/lunar/Mars applications Communications High-definition TV broadcast Business video conferencing Ka band or higher Telepresence: vision and video data Interferometers: raw data transmission Entertainment industry Commercial aviation Powerplant operations Manufacturing operations Machine-human interface Control stations System management Communications Archiving Computer operating systems Data-compression information processing Large-scale data management systems Interferometers: raw data transmission information processing System management expert data Archiving/neural nets Dual-Use Technologies: In-Situ Resource Utilization Terrestrial Applications Technology Space/lunar/Mars applications Mineral analysis, yield estimation – deep mine vein location and tracking Wall and cell integrity Advanced sensors Mineral analysis, yield estimation of surface mineral analysis and resource location Deep mine robotic operations for – mining – beneficiating – removal Advanced robot mining Surface mine robotic operations for – mining – beneficiating – removal Improved automated processing: increased efficiency Automated processing technology Remote, low-maintenance processing Reliable, low-pollution personal transmission Regenerable energy economies Small, decentralized power systems for remote third world applications Alternative, regenerable energy economies – methane/O2, H2/O2 ISRU-based engines Regenerable energies High-density energy storage Environmentally safe energy production Space-based energy generation and transmission Surface power generation and beaming Dual-Use Technologies: Surface Mobility – Suits Terrestrial Applications Technology Space/lunar/Mars applications Hazardous materials cleanup Fire fighting protection Underwater equipment Homes Aircraft Lightweight superinsulated materials Surface suits: thermal protection Surface facilities: thermal protection Robotic assisted systems Orthopedic devices for mobility of impaired persons Human power enhancement Robotics Mobility enhancement devices and manipulators Robotic assisted suit systems Human power enhancement Hazardous materials cleanup Fire fighting protection Underwater equipment Dust protection, seals, abrasive resistant materials Surface suits: outer garment Hazardous materials cleanup Underwater breathing gear Lightweight hi-reliability life support Portable life support for surface suits Backup life support systems Remote health monitoring Portable biomedical sensors and health evaluation systems Surface EVA crew member health monitoring Hypo-hyper thermal treatments Fire fighting protection and underwater equipment Arctic/Antarctic undergarments Small, efficient, portable cooling and heating systems Surface suits: thermal control systems Rovers : thermal control systems Table 2.2Partial list of dual-use technologies: Surface Mobility – Vehicles, Human Support, and Power. Dual-Use Technologies: Surface Mobility – Vehicles Terrestrial Applications Technology Space/lunar/Mars applications All-terrain vehicles for research (volcanoes), oil exploration Automobiles Mobility Surface transportation for humans, science equipment, maintenance and inspection Reactor servicing/hazardous applications Military Robotics and vision systems Teleoperated robotic systems Earth observation, weather, research Super-pressure balloons (110,000 ft. – Earth equivalent) Mars global explorations Efficient, long-term operations with low maintenance machines in Arctic/Antarctic environments Tribology Surface vehicles: drive mechanisms, robotic arms, mechanisms Helicopters, autos Variable speed transmissions Surface vehicles Automated, efficient construction equipment Military Multipurpose construction vehicle systems and mechanisms Robotic construction and set-up equipment Dual-Use Technologies: Human Support Terrestrial Applications Technology Space/lunar/Mars applications Stored food: US Army, NSF polar programs, isolated construction sites Long-life food systems with high nutrition and efficient packaging Efficient logistics for planetary bases, long spaceflights, space stations Improved health care Sports medicine – cardiovascular safety Osteoporosis – immune systems Isolated confined environments/polar operations Noninvasive health assessments Military Physiological understanding of the human chronobiology Understanding of psychological issues Instrumentation miniaturization Countermeasures for long-duration and/or micro-g space missions Health management and care Systems/structural monitoring and self-repair Health care Disaster response Military Long-term blood storage Health care for long-duration space missions Office buildings (“sick building” syndrome) Manufacturing plants Homes Environmental monitoring and management Environmental control for spacecraft cabins, planetary habitats, pressurized Rovers Contamination cleanup Waste processing Homes Waste processing Water purification Closed water cycles for spacecraft cabins, planetary habitats, pressurized Rovers Long-life clothes Work clothes in hazardous environments Military Advanced materials/fabrics Reduced logistics through long-life, easy-care clothes, etc.

Fire-proof/low-outgassing clothes Building material for inflatable structures Efficient food production Advanced understanding of food production/hydroponics Reduced logistics through local food production for spacecraft cabins, planetary habitats Dual-Use Technologies: Power Terrestrial Applications Technology Space/lunar/Mars applications Batteries for: autos – remote operations for DOD, NSF polar programs High-density energy storage Alternate energy storage (flywheels) Reduced logistics for planetary bases High reliability, low-maintenance power systems Spaceship power storage Clean energy from space Beamed power transmission Orbital power to surface base Surface power transmission to remote assets Remote operations for: DOD, NSF polar programs Small nuclear power systems Surface base power Pressurized surface Rover Interplanetary transfer vehicle Remote operations for: DOD, NSF polar programs High efficiency auto engines High efficiency, high reliability low-maintenance heat-to-electric conversion engines Energy conversion for planetary bases: low servicing hours – little or no logistics Table 2.3Partial list of dual-use technologies: Structures and Materials, Science and Science Equipment, and Operations and Maintenance Dual-Use Technologies: Structures and Materials Terrestrial Applications Technology Space/lunar/Mars applications Vehicles Fuel-efficient aircraft Modular construction, homes Composite materials: hard – soft Advanced alloys, high-temperature Cryogenic tanks Habitat enclosures Pressurized Rover enclosures Space transit vehicle structures Aircraft fuel tanks Home insulation Superinsulation Coatings Cryogenic tanks Habitable volumes Large structures, high-rise buildings, bridges Commercial aircraft: improved safety – lower maintenance Smart structures Imbedded sensors/actuators Space transit vehicle structures Planetary habitat enclosures Surface power systems Rover suspensions Dual-use Technologies: Science and Science Equipment Terrestrial Applications Technology Space/lunar/Mars applications Energy resource exploration Environmental monitoring, policing Spectroscopy: gamma ray – laser – other Geo-chem mapping Resource yield estimating Planetary mining operation planning Undersea exploration Hazardous environment assessments and remediation Telescience Remote planetary exploration Environmental monitoring Medicine Image processing: compression technique – storage – transmission – image enhancements Communication of science data Correlation of interferometer data Improved health care Sports medicine – cardiovascular Osteoporosis – immune systems Isolated confined environments/Polar operations Noninvasive health assessments Physiological understanding of humans Instrumentation miniaturization Countermeasures for long-duration and/or micro-g space missions Health management and care Dual-Use Technologies: Operations and Maintenance Terrestrial Applications Technology Space/lunar/Mars applications Military Systems and structures health monitoring Inventory management Task partitioning Reliability & quality assurance in long-term hazardous environments System health management and failure prevention through AI and expert systems, neural nets Systems and structures health monitoring Inventory management Self-repairing technologies Logistics improvement Crawford discussed what it would take to create and sustain a space development program that would last for centuries, eventually leading to interstellar spaceflight capability. ( 22 ) He pointed to the possibility of replacing war by space development as the adventure that humanity requires.


pages: 521 words: 118,183

The Wires of War: Technology and the Global Struggle for Power by Jacob Helberg

"World Economic Forum" Davos, 2021 United States Capitol attack, A Declaration of the Independence of Cyberspace, active measures, Affordable Care Act / Obamacare, air gap, Airbnb, algorithmic management, augmented reality, autonomous vehicles, Berlin Wall, Bernie Sanders, Big Tech, bike sharing, Black Lives Matter, blockchain, Boris Johnson, Brexit referendum, cable laying ship, call centre, Cambridge Analytica, Cass Sunstein, cloud computing, coronavirus, COVID-19, creative destruction, crisis actor, data is the new oil, data science, decentralized internet, deep learning, deepfake, deglobalization, deindustrialization, Deng Xiaoping, deplatforming, digital nomad, disinformation, don't be evil, Donald Trump, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, fail fast, fake news, Filter Bubble, Francis Fukuyama: the end of history, geopolitical risk, glass ceiling, global pandemic, global supply chain, Google bus, Google Chrome, GPT-3, green new deal, information security, Internet of things, Jeff Bezos, Jeffrey Epstein, John Markoff, John Perry Barlow, knowledge economy, Larry Ellison, lockdown, Loma Prieta earthquake, low earth orbit, low skilled workers, Lyft, manufacturing employment, Marc Andreessen, Mark Zuckerberg, Mary Meeker, Mikhail Gorbachev, military-industrial complex, Mohammed Bouazizi, move fast and break things, Nate Silver, natural language processing, Network effects, new economy, one-China policy, open economy, OpenAI, Parler "social media", Peter Thiel, QAnon, QR code, race to the bottom, Ralph Nader, RAND corporation, reshoring, ride hailing / ride sharing, Ronald Reagan, Russian election interference, Salesforce, Sam Altman, satellite internet, self-driving car, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley ideology, Silicon Valley startup, Skype, smart grid, SoftBank, Solyndra, South China Sea, SpaceX Starlink, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, Susan Wojcicki, tech worker, techlash, technoutopianism, TikTok, Tim Cook: Apple, trade route, TSMC, Twitter Arab Spring, uber lyft, undersea cable, Unsafe at Any Speed, Valery Gerasimov, vertical integration, Wargames Reagan, Westphalian system, white picket fence, WikiLeaks, Y Combinator, zero-sum game

But part of what makes this conflict unique—what makes it “gray”—is the extent to which its primary weapons are based on “dual-use” technology, commercial products that can be turned to military ends. The nature of dual-use systems is also what makes the growing rift between the Hill and the Valley so dangerous. It’s as if Raytheon were selling cutting-edge weapons to China and Russia—and the Pentagon had no idea. In fact, a bombshell 2017 Pentagon report revealed that Chinese companies had been involved in about 16 percent of all tech venture deals in 2015, part of an aggressive strategy of transferring dual-use technology to America’s competitors.82 Dual-use technology is not a new concept.

A nation armed with nothing but high-yield nuclear weapons would have no military means by which to impose its will upon another nation, aside from threatening it with total destruction.16 Conversely, commercial civilian dual-use technologies (artificial intelligence, or AI; 5G; drones) can be leveraged to carry out increasingly high-impact attacks against adversaries. When an aggressor uses dual-use technologies to carry out attacks against an adversary, they are often far harder to attribute than attacks carried out with more conventional weapons. The aggressor, therefore, often has the ability to deny its involvement in the attack and reduce the risks of a costly retaliation.

At the end of the day, China’s long-term aims are incompatible and irreconcilable with the United States’ vision of a rules-based liberal order. And as China exports its model of governance abroad, tensions with democracies will inevitably sharpen. In contrast to the primary arsenals of the U.S.-Soviet Cold War, this tech-fueled Gray War is primarily being fought with “dual-use” technologies developed by private companies and for civilian purposes. The reason has to do with the inverse relationship between the degree of destructiveness of technology and its rational usability. As Hans Morgenthau once observed: High-yield nuclear weapons are instruments of indiscriminate mass destruction and can therefore not be used for rational military purposes.


pages: 294 words: 81,292

Our Final Invention: Artificial Intelligence and the End of the Human Era by James Barrat

AI winter, air gap, AltaVista, Amazon Web Services, artificial general intelligence, Asilomar, Automated Insights, Bayesian statistics, Bernie Madoff, Bill Joy: nanobots, Bletchley Park, brain emulation, California energy crisis, cellular automata, Chuck Templeton: OpenTable:, cloud computing, cognitive bias, commoditize, computer vision, Computing Machinery and Intelligence, cuban missile crisis, Daniel Kahneman / Amos Tversky, Danny Hillis, data acquisition, don't be evil, drone strike, dual-use technology, Extropian, finite state, Flash crash, friendly AI, friendly fire, Google Glasses, Google X / Alphabet X, Hacker News, Hans Moravec, Isaac Newton, Jaron Lanier, Jeff Hawkins, John Markoff, John von Neumann, Kevin Kelly, Law of Accelerating Returns, life extension, Loebner Prize, lone genius, machine translation, mutually assured destruction, natural language processing, Neil Armstrong, Nicholas Carr, Nick Bostrom, optical character recognition, PageRank, PalmPilot, paperclip maximiser, pattern recognition, Peter Thiel, precautionary principle, prisoner's dilemma, Ray Kurzweil, Recombinant DNA, Rodney Brooks, rolling blackouts, Search for Extraterrestrial Intelligence, self-driving car, semantic web, Silicon Valley, Singularitarianism, Skype, smart grid, speech recognition, statistical model, stealth mode startup, stem cell, Stephen Hawking, Steve Jobs, Steve Jurvetson, Steve Wozniak, strong AI, Stuxnet, subprime mortgage crisis, superintelligent machines, technological singularity, The Coming Technological Singularity, Thomas Bayes, traveling salesman, Turing machine, Turing test, Vernor Vinge, Watson beat the top human players on Jeopardy!, zero day

Semiautonomous robotic drones already kill dozens of people each year. Fifty-six countries have or are developing battlefield robots. The race is on to make them autonomous and intelligent. For the most part, discussions of ethics in AI and technological advances take place in different worlds. As I’ll argue, AI is a dual-use technology like nuclear fission. Nuclear fission can illuminate cities or incinerate them. Its terrible power was unimaginable to most people before 1945. With advanced AI, we’re in the 1930s right now. We’re unlikely to survive an introduction as abrupt as nuclear fission’s. Chapter Two The Two-Minute Problem Our approach to existential risks cannot be one of trial-and-error.

Too few people know that we need to have an ongoing international conversation about AGI comparable to those we have about nuclear weapons. Too many people think the frontiers of AI are delineated by harmless search engines, smart phones, and now Watson. But AGI is much closer to nuclear weapons than to video games. AI is a “dual use” technology, a term used to describe technologies with both peaceful and military applications. For instance, nuclear fission can power cities or destroy cities (or in the cases of Chernobyl and Fukushima Daiichi, do both sequentially). Rockets developed during the space race increased the power and accuracy of intercontinental ballistic missiles.

Researchers resumed work, adhering to the guidelines, and consequently tests for inherited diseases and gene therapy treatment are today routine. In 2010, 10 percent of the world’s cropland was planted with genetically modified crops. The Asilomar Conference is seen as a victory for the scientific community, and for an open dialogue with a concerned public. And so it’s cited as a model for how to proceed with other dual use technologies (milking the symbolic connection with this important conference, the Association for the Advancement of Artificial Intelligence [AAAI], the leading scholarly organization for AI, held their 2009 meeting at Asilomar). Frankenstein pathogens escaping labs recalls chapter 1’s Busy Child scenario.


pages: 444 words: 117,770

The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma by Mustafa Suleyman

"World Economic Forum" Davos, 23andMe, 3D printing, active measures, Ada Lovelace, additive manufacturing, agricultural Revolution, AI winter, air gap, Airbnb, Alan Greenspan, algorithmic bias, Alignment Problem, AlphaGo, Alvin Toffler, Amazon Web Services, Anthropocene, artificial general intelligence, Asilomar, Asilomar Conference on Recombinant DNA, ASML, autonomous vehicles, backpropagation, barriers to entry, basic income, benefit corporation, Big Tech, biodiversity loss, bioinformatics, Bletchley Park, Blitzscaling, Boston Dynamics, business process, business process outsourcing, call centre, Capital in the Twenty-First Century by Thomas Piketty, ChatGPT, choice architecture, circular economy, classic study, clean tech, cloud computing, commoditize, computer vision, coronavirus, corporate governance, correlation does not imply causation, COVID-19, creative destruction, CRISPR, critical race theory, crowdsourcing, cryptocurrency, cuban missile crisis, data science, decarbonisation, deep learning, deepfake, DeepMind, deindustrialization, dematerialisation, Demis Hassabis, disinformation, drone strike, drop ship, dual-use technology, Easter island, Edward Snowden, effective altruism, energy transition, epigenetics, Erik Brynjolfsson, Ernest Rutherford, Extinction Rebellion, facts on the ground, failed state, Fairchild Semiconductor, fear of failure, flying shuttle, Ford Model T, future of work, general purpose technology, Geoffrey Hinton, global pandemic, GPT-3, GPT-4, hallucination problem, hive mind, hype cycle, Intergovernmental Panel on Climate Change (IPCC), Internet Archive, Internet of things, invention of the wheel, job automation, John Maynard Keynes: technological unemployment, John von Neumann, Joi Ito, Joseph Schumpeter, Kickstarter, lab leak, large language model, Law of Accelerating Returns, Lewis Mumford, license plate recognition, lockdown, machine readable, Marc Andreessen, meta-analysis, microcredit, move 37, Mustafa Suleyman, mutually assured destruction, new economy, Nick Bostrom, Nikolai Kondratiev, off grid, OpenAI, paperclip maximiser, personalized medicine, Peter Thiel, planetary scale, plutocrats, precautionary principle, profit motive, prompt engineering, QAnon, quantum entanglement, ransomware, Ray Kurzweil, Recombinant DNA, Richard Feynman, Robert Gordon, Ronald Reagan, Sam Altman, Sand Hill Road, satellite internet, Silicon Valley, smart cities, South China Sea, space junk, SpaceX Starlink, stealth mode startup, stem cell, Stephen Fry, Steven Levy, strong AI, synthetic biology, tacit knowledge, tail risk, techlash, techno-determinism, technoutopianism, Ted Kaczynski, the long tail, The Rise and Fall of American Growth, Thomas Malthus, TikTok, TSMC, Turing test, Tyler Cowen, Tyler Cowen: Great Stagnation, universal basic income, uranium enrichment, warehouse robotics, William MacAskill, working-age population, world market for maybe five computers, zero day

In six hours it identified more than forty thousand molecules with toxicity comparable to the most dangerous chemical weapons, like Novichok. It turns out that in drug discovery, one of the areas where AI will undoubtedly make the clearest possible difference, the opportunities are very much “dual use.” Dual-use technologies are those with both civilian and military applications. In World War I, the process of synthesizing ammonia was seen as a way of feeding the world. But it also allowed for the creation of explosives, and helped pave the way for chemical weapons. Complex electronics systems for passenger aircraft can be repurposed for precision missiles.

Conversely, the Global Positioning System was originally a military system, but now has countless everyday consumer uses. At launch, the PlayStation 2 was regarded by the U.S. Department of Defense as so powerful that it could potentially help hostile militaries usually denied access to such hardware. Dual-use technologies are both helpful and potentially destructive, tools and weapons. What the concept captures is how technologies tend toward the general, and a certain class of technologies come with a heightened risk because of this. They can be put toward many ends—good, bad, everywhere in between—often with difficult-to-predict consequences.

See technology cost decreases COVID-19 pandemic disinformation/misinformation and, 172 gain-of-function (GOF) research and, 176 organizational limitations and, 228 surveillance and, 194, 195, 215 Craspase, 82 Crick, Francis, 80 CRISPR gene editing, 81–82, 86, 129–30 critic AIs, 244 Critical Assessment for Structure Prediction (CASP), 89, 90 Cronin, Audrey Kurth, 106, 127 crossbow, 39, 40 cryptography, 98, 244, 248, 266 Cuban missile crisis, 44 Cugnot, Nicolas-Joseph, 23 cults, 212–13 culture, 267–70 cyberattacks, 160–63, 166–67 D Daimler, Gottlieb, 24 data, proliferation of, 33 decentralization, 198–99 Deep Blue, 53 deepfakes, 169–71, 172 deep learning autonomy and, 113 computer vision and, 58–60 limitations of, 73 potential of, 61–62 protein structure and, 89–90 supervised, 65 synthetic biology and, 90–91 See also machine learning DeepMind AGI as goal of, 8, 51 arms race rhetoric and, 124 choke points and, 251 containment and, 254, 255–56 DQN algorithm, 51–52, 113 efficiency and, 68 founding of, 8, 9 Google purchase of, 60, 255–57 openness imperative and, 128 practical applications and, 61 protein structure and, 89–90 See also AlphaGo Deere, John, 93 Delta, 104 demand, 25, 30, 31, 40, 41, 132–33 dematerialization, 55–56, 189–90, 233 demographic crisis, 219–20 diffusion, 30–31 dilemma, the, defined, vii Diplomacy, 167 disinformation/misinformation, 167, 169–73, 208 DJI, 106 DNA profiling, 81 DNA Script, 83 DNA synthesizers, 12–13 Doudna, Jennifer, 81 DQN (Deep Q-Network), 51–52, 113 drones, 103–4, 105, 106, 166, 207 dual-use technology. See omni-use technology dystopia, 215–17 E East Germany, 192 eBay, 188–89 economic inequality, 153–54 Edison, Thomas, 35 ego, 140–41 electricity, 30–31 EleutherAI, 68–69 Elizabeth I (queen of England), 39, 40 Endy, Drew, 84 energy, 99–101, 198 engines, 23–25 ENIAC, 32 enzymatic synthesis, 83, 109 Epic of Gilgamesh, 5 Esvelt, Kevin, 273 EternalBlue, 161–62 ethnic cleansing, 195 ETH Zurich, 84 European Union, 125, 229, 260 evolution, 26–27, 79, 84 explanation, 243 explosives, 35, 110 Exscientia, 110 F Facebook, 150, 172, 258 facial recognition software, 194, 207 Fakhrizadeh, Mohsen, 165 feudalism, 184 Feynman, Richard, 259 fire, 26–27 flood myths, 5 flying shuttle, 39 Ford, Henry, 24 Ford Motor Company, 98 four features, defined, vii fragility amplifiers.


pages: 245 words: 71,886

Spike: The Virus vs The People - The Inside Story by Jeremy Farrar, Anjana Ahuja

"World Economic Forum" Davos, bioinformatics, Black Monday: stock market crash in 1987, Boris Johnson, Brexit referendum, contact tracing, coronavirus, COVID-19, crowdsourcing, dark matter, data science, DeepMind, Demis Hassabis, disinformation, Dominic Cummings, Donald Trump, double helix, dual-use technology, Future Shock, game design, global pandemic, Kickstarter, lab leak, lockdown, machine translation, nudge unit, open economy, pattern recognition, precautionary principle, side project, social distancing, the scientific method, Tim Cook: Apple, zoonotic diseases

The counterpart of the lone gunman could be a hobbyist genetically modifying viruses in her garage. Maintaining a scientific presence in the security world also achieves another end: making sure that decisions on dual-use technology, such as the gain of function research that scientists like Ron Fouchier practise, are not monopolised or controlled by the security community. Dual-use technology, like the techniques to make viruses more contagious or deadly, can seem very scary. But shutting them down would mean critical science, needed for threat surveillance and safety, not being done or being carried out under the radar.


pages: 413 words: 119,587

Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots by John Markoff

A Declaration of the Independence of Cyberspace, AI winter, airport security, Andy Rubin, Apollo 11, Apple II, artificial general intelligence, Asilomar, augmented reality, autonomous vehicles, backpropagation, basic income, Baxter: Rethink Robotics, Bill Atkinson, Bill Duvall, bioinformatics, Boston Dynamics, Brewster Kahle, Burning Man, call centre, cellular automata, Charles Babbage, Chris Urmson, Claude Shannon: information theory, Clayton Christensen, clean water, cloud computing, cognitive load, collective bargaining, computer age, Computer Lib, computer vision, crowdsourcing, Danny Hillis, DARPA: Urban Challenge, data acquisition, Dean Kamen, deep learning, DeepMind, deskilling, Do you want to sell sugared water for the rest of your life?, don't be evil, Douglas Engelbart, Douglas Engelbart, Douglas Hofstadter, Dr. Strangelove, driverless car, dual-use technology, Dynabook, Edward Snowden, Elon Musk, Erik Brynjolfsson, Evgeny Morozov, factory automation, Fairchild Semiconductor, Fillmore Auditorium, San Francisco, From Mathematics to the Technologies of Life and Death, future of work, Galaxy Zoo, General Magic , Geoffrey Hinton, Google Glasses, Google X / Alphabet X, Grace Hopper, Gunnar Myrdal, Gödel, Escher, Bach, Hacker Ethic, Hans Moravec, haute couture, Herbert Marcuse, hive mind, hype cycle, hypertext link, indoor plumbing, industrial robot, information retrieval, Internet Archive, Internet of things, invention of the wheel, Ivan Sutherland, Jacques de Vaucanson, Jaron Lanier, Jeff Bezos, Jeff Hawkins, job automation, John Conway, John Markoff, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Perry Barlow, John von Neumann, Kaizen: continuous improvement, Kevin Kelly, Kiva Systems, knowledge worker, Kodak vs Instagram, labor-force participation, loose coupling, Marc Andreessen, Mark Zuckerberg, Marshall McLuhan, medical residency, Menlo Park, military-industrial complex, Mitch Kapor, Mother of all demos, natural language processing, Neil Armstrong, new economy, Norbert Wiener, PageRank, PalmPilot, pattern recognition, Philippa Foot, pre–internet, RAND corporation, Ray Kurzweil, reality distortion field, Recombinant DNA, Richard Stallman, Robert Gordon, Robert Solow, Rodney Brooks, Sand Hill Road, Second Machine Age, self-driving car, semantic web, Seymour Hersh, shareholder value, side project, Silicon Valley, Silicon Valley startup, Singularitarianism, skunkworks, Skype, social software, speech recognition, stealth mode startup, Stephen Hawking, Steve Ballmer, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Strategic Defense Initiative, strong AI, superintelligent machines, tech worker, technological singularity, Ted Nelson, TED Talk, telemarketer, telepresence, telepresence robot, Tenerife airport disaster, The Coming Technological Singularity, the medium is the message, Thorstein Veblen, Tony Fadell, trolley problem, Turing test, Vannevar Bush, Vernor Vinge, warehouse automation, warehouse robotics, Watson beat the top human players on Jeopardy!, We are as Gods, Whole Earth Catalog, William Shockley: the traitorous eight, zero-sum game

Instead, he acknowledged that robots are a “dual-use” technology. “It’s very easy to pick on robots that are funded by the Defense Department,” he said. “It’s very easy to pick on a robot that looks like the Terminator, but in fact with dual-use being everywhere, it really doesn’t matter. If you’re designing a robot for health care, for instance, the autonomy it needs is actually in excess of what you would need for a disaster response robot.”8 Advanced technologies have long posed questions about dual-use. Now, artificial intelligence and machine autonomy have reframed the problem. Until now, dual-use technologies have explicitly required that humans make ethical decisions about their use.

“I’m being facetious,” he said, “but I’m just trying to tell you that these kinds of technologies you are developing may have uses in places you may not have fully envisioned.” In the world of weapons design, the potential for unexpected consequences has long been true for what are described as “dual-use” technologies, like nuclear power, which can be used to produce both electric power and weapons. Now it is also increasingly true of robotics and artificial intelligence technologies. These technologies are dual-use not just as weapons, but also in terms of their potential to either augment or replace humans.


A Crack in Creation: Gene Editing and the Unthinkable Power to Control Evolution by Jennifer A. Doudna, Samuel H. Sternberg

"World Economic Forum" Davos, 3D printing, Anthropocene, Asilomar, Asilomar Conference on Recombinant DNA, carbon footprint, Chuck Templeton: OpenTable:, CRISPR, double helix, Drosophila, dual-use technology, Higgs boson, Mark Zuckerberg, microbiome, mouse model, phenotype, Ralph Waldo Emerson, Recombinant DNA, Richard Feynman, Silicon Valley, Skype, stem cell, Steven Pinker, zoonotic diseases

Without explaining exactly how genome editing could be weaponized, the report noted that “research in genome editing conducted by countries with different regulatory or ethical standards than those of Western countries probably increases the risk of the creation of potentially harmful biological agents or products. Given the broad distribution, low cost, and accelerated pace of development of this dual-use technology, its deliberate or unintentional misuse might lead to far-reaching economic and national security implications.” Lest there be any doubt about the immediate source of their concern, the authors pointedly mentioned that “advances in genome editing in 2015 have compelled groups of high-profile US and European biologists to question unregulated editing of the human germline”—an obvious reference to Huang’s article and our perspective.

See Cas9 as classroom guest, 101–2 CRISPR, introduction to, 39–45 CRISPR article (Science), 85 Double Helix, The (Watson), 10–11 dream of, xi–xii education, 21, 25, 27 on ethics of germline editing, 225–30, 234–35 father’s death, 37 gene editing, xix introduction, xii lab retreat, 35–36 papaya fungus research, 60–61 “A Prudent Path Forward for Genomic Engineering and Germline Gene Modification,” 211–12 publication and ramifications of work, xvi–xviii Sullenger and, 21–22 TV interview, 38–39, 155 Yale, faculty member, 20 See also CRISPR (clustered regularly interspaced short palindromic repeats); Sternberg, Sam Drubin, David, 93 drugs, from transgenic animals, 139–40 dual-use technology, 217 Duchenne muscular dystrophy (DMD), 169–70 DuPont Pioneer, 128 dysentery, 45–46 dystrophin protein, 169 E East-Seletsky, Alexandra, 95 Ebert, Benjamin, 173 Editas Medicine, 89, 177 embryos, human editing with CRISPR, 208 experiments on, 213–19 genetic testing of, 194–95 germline editing in, 185–86, 186 regulation of research on, 236–37 stances on gene editing of, 216–17, 218–19 triploid, 215–16 end joining, 93, 105, 107, 108, 110 endocytosis, 93 endonucleases, 29 Engineering the Human Germline (conference), 192–93 environment de-extinction and, 147 gene drives and, 151, 153 Environmental Protection Agency (EPA), 127 Enviropig, 129 EPOR gene, 230 erythropoietin, 230 Escherichia coli, 53, 63, 66, 68, 202 Esvelt, Kevin, 148, 149 ETC Group, 152 ethics concerns about misuse of CRISPR, 199–201 de-extinction and, 146 gene splicing, 201–4 germline editing, 160, 209, 218–19, 220–21, 226–34 germline modification, 189–90, 193–94 human embryo experiments, 216 preimplantation genetic diagnosis, 195 prenatal testing, 194 three-parent IVF, 196–97 See also controversies; risks eugenics, 193, 221, 233–34, 236 Evans, Barbara, 221 Evans, Martin, 25 ex vivo gene editing, 161–66, 162, 175 exonucleases, 29 extinction, forcible, 119 F farmaceutical production, 139–40 FDA (Food and Drug Administration), 127, 196, 235, 237 Fenner, Marsha, 207 Feynman, Richard, 241 Fire, Andrew, 40 Fleming, Alexander, 245 Food and Drug Administration (FDA), U.S., 127, 196, 235, 237 food production, 32, 122–28 GMOs, 123–25, 126 livestock, 128–37 potential of CRISPR and, 128 Foster, Bill, 221 Francis Crick Institute, 219 Frankenfish, 128–29, 130 Franklin, Rosalind, 10 G Gantz, Valentino, 149 Garneau, Josiane, 69, 75 Gates Foundation, 65 gel electrophoresis, 79 gene bombs, 152 gene corrections, 121 gene deletion, 107, 121 gene drives, 148–52, 150 gene editing, 24–25, 26, 122–28, 178–81 in any organism, 98–99 computers and, 112 correcting single-letter DNA mistakes, 104 delivery strategies, 161–66 development of, 22–26, 32 DNA repair, 104–8 expanding limits of, 100 impact of, 117–19 intentional, 7 multiplexed, 173–74 natural, 5–9 need for discussion about, 205 promise of, 120–21 risks of, 119, 148–52 scarless, 126, 126 tactics for, 100 of unborn humans, 213–19 via homologous recombination, 25 gene editing, ex vivo, 161–66, 162, 175–77 gene editing, in vivo, 161, 167–71, 167 gene editing, therapeutic cells targeted in, 158–60 ex vivo gene editing, 161–66, 162, 175–77 possibilities of, 155–58 in vivo gene editing, 161, 167–71, 167 See also diseases; medicine; therapeutics gene expression, 102–3 gene insertions, 121 gene inversion, 107 gene knock-in, 149 gene knockout, 103–5, 103, 121, 131, 134–35 gene splicing, 201–4, 205 gene targeting, 24, 26 See also gene editing gene therapy in 1980s, 19–20 advances in, 20 early attempts at, 16–19 harm done by, 20–21 ineffectiveness of, 21 gene-editing kits, 113, 199 gene-expression control, 109–10 genetic diseases.


pages: 382 words: 92,138

The Entrepreneurial State: Debunking Public vs. Private Sector Myths by Mariana Mazzucato

Apple II, banking crisis, barriers to entry, Bretton Woods, business cycle, California gold rush, call centre, carbon footprint, carbon tax, Carmen Reinhart, circular economy, clean tech, computer age, creative destruction, credit crunch, David Ricardo: comparative advantage, demand response, deskilling, dual-use technology, endogenous growth, energy security, energy transition, eurozone crisis, everywhere but in the productivity statistics, Fairchild Semiconductor, Financial Instability Hypothesis, full employment, G4S, general purpose technology, green transition, Growth in a Time of Debt, Hyman Minsky, incomplete markets, information retrieval, intangible asset, invisible hand, Joseph Schumpeter, Kenneth Rogoff, Kickstarter, knowledge economy, knowledge worker, linear model of innovation, natural language processing, new economy, offshore financial centre, Philip Mirowski, popular electronics, Post-Keynesian economics, profit maximization, Ralph Nader, renewable energy credits, rent-seeking, ride hailing / ride sharing, risk tolerance, Robert Solow, shareholder value, Silicon Valley, Silicon Valley ideology, smart grid, Solyndra, Steve Jobs, Steve Wozniak, The Wealth of Nations by Adam Smith, Tim Cook: Apple, Tony Fadell, too big to fail, total factor productivity, trickle-down economics, vertical integration, Washington Consensus, William Shockley: the traitorous eight

In his 2009 study, McCray details how DARPA’s wartime missions to create and sustain an innovation ecosystem for producing superior defence technologies was transformed during peace time by the new mission of transforming those prior investments into technologies supporting economic competitiveness. McCray (2009) documents that the Department of Defense (DoD) initiated the Technology Reinvestment Program (TRP) and allocated $800 million to upgrade the nation’s existing technological capabilities following the Cold War. Through TRP, DARPA targeted dual-use technologies that would benefit the military as well as produce commercially viable technologies such as SPINTRONICS.5 McCray (2009) especially documents the increase in scientific research efforts and publications taking place during DARPA’s support for SPINTRONIC during 1990s. McCray (2009, 74) also argues that the role DARPA played in the advancement of this technology was not ‘insignificant’, simply because the programme was initiated during the time when Japanese competition in computer electronics was pushing computer giants such as IBM and Bell Labs to downsize spending on basic research.

W. 85 Bush, George W. 110–11 Bush, Vannevar 75 ‘business angels’ 47, 48 Buxton, Bill 102n10 Cailliau, Robert 105 California: Apple’s avoidance of capital gains tax in 173; Apple’s R&D base in 172; competitive climate of 165, 176; ‘Internet California Gold Rush’ 95; R&D tax packages of 109–10, 111n13; wind industry participation 145, 147, 156 Cameron, David 15 Canada 61 capacitive sensing technology 100–101, 100n9, 103 capitalism: Adam Smith’s view of 30; dysfunctional modern 12; financial fragility of 32n3; image of market as engine of 167; innovative labour in 13; Keynes on 30–32; State risks in framework of 193; State’s role in 195 Capital Moves (Cowie) 172 cellular technology 109, 109 Chang, Ha-Joon 9n3, 38n5, 40 China: clean technology investment by 120, 124n6, 125, 137; Evergreen Solar lured to 152; ‘green’ 5 year plan 122–4; green revolution in 11, 115n2, 116, 120; investment banks in 2, 4, 5; Kyoto Protocol signed by 123n5; new investment in renewable energy 120, 121; policy support for wind industry 153; as solar power competitor 129–31, 130n11, 144, 150; targeted industrialization in 40; ‘trade wars’ of 122, 131; wind capacity of 143; from ‘Wind Rush’ to rise of wind power sector 144–50 China Development Bank (CDB) 5, 122, 153, 189–90 Citizens for Tax Justice 174n5 classical economists 186–7 clean technology: in China 122–4; in crisis 158–9; electric cars/vehicles 108, 123, 124, 133; Ernst & Young report on 124; historical overview of 118, 118n3; investment (by country) 120–21; investment by venture capital 161; public vs. private investment in 26, 143; R&D investment in 119; sources 117–18; US calling to end support to 157; see also green revolution; wind and solar power climate change 117, 123, 135; see also green industrial revolution Climate Works 123 Clinton administration 84–5 Coad, Alex 44 ‘Cognitive Assistant that Learns and Organizes’ (CALO) project 106 Compaq 107 competition, generating 77 computer field: DARPA’s role in 75–8; hard disk drives (HDD) 96–7; personal computers 78, 89, 94–5; research support to 99; sources of key technologies used in 94–5; in wind technology 147–8 Concorde 194; see also ‘picking winners’ Cook, Tim 171 countercyclical lending 4, 140, 190 ‘creative destruction’ 10, 10n4, 58, 165; see also Schumpeter, Joseph ‘crowd funding’ 127 ‘crowding in’ 5–6, 8 ‘crowding out’ 8, 23–4 DARPA: see Defense Advanced Research Projects Agency ‘Death Valley’ stage of innovation 47, 48, 122 DEC 107 decentralization 78, 85, 104 defence contractors 76–7, 98 Defense Advanced Research Projects Agency (DARPA): ARPA-E modeled after 133; brokering role of 77, 79; clean energy funding 132n13; communications network project of 104, 104n11; creation of 76; dual-use technologies targeted by 97; funding by 76–7; model characteristics 78; organizational attributes of 133–4; role of behind SIRI 105–6; support for SPINTRONICS 97; technological contributions of 133; top talent attracted by 4 Defense Logistics Agency 132n13 demand-side policies 83, 113–15, 159 Demirel, Pelin 44 DEMOS 2 Denmark 115n2, 120n4, 121, 143, 144–5 Department of Commerce (US) 47 Department of Defense (DoD) (US): ARPANET project as Internet origin 63; energy innovation impacted by 132n13; GPS and SIRI development by 105–7; GPS costs to 105n12; solar opportunities created by 150; TRP initiated by 97 Department of Energy (DoE) (US): ARPA-E agency of 4; attracting top talent 18; clean energy research 132–3; First Solar’s link to research of 151; funding Solyndra 154; funding support of lithium-ion battery 108; loan guarantees administered by 129; SunPower’s patents link to 152; wind research funded by 147–8 Department of Energy and Climate Change (UK) 124 ‘de-risking’ of private sector 5–6, 9, 198 de-skilling perspective 186 ‘Developmental State’ 10, 37–8, 37–8n5, 40, 68; see also State development banks: see State development banks digital signal processing (DSP) 109 ‘directionality’ 2, 4–5, 32n2 ‘discursive’ battle, Judt’s 9, 58, 198 distribution and innovation 186 Domar, Evsey David 33 domestic content rules 149 Dosi, Giovanni 53 Drucker, Peter 58 drugs: classifications of new 64, 64; Gleevec 81; MRC research on 67; orphan drugs 81–3; percentages of new by types 66, 66; radical vs.


pages: 339 words: 92,785

I, Warbot: The Dawn of Artificially Intelligent Conflict by Kenneth Payne

Abraham Maslow, AI winter, Alan Turing: On Computable Numbers, with an Application to the Entscheidungsproblem, AlphaGo, anti-communist, Any sufficiently advanced technology is indistinguishable from magic, artificial general intelligence, Asperger Syndrome, augmented reality, Automated Insights, autonomous vehicles, backpropagation, Black Lives Matter, Bletchley Park, Boston Dynamics, classic study, combinatorial explosion, computer age, computer vision, Computing Machinery and Intelligence, coronavirus, COVID-19, CRISPR, cuban missile crisis, data science, deep learning, deepfake, DeepMind, delayed gratification, Demis Hassabis, disinformation, driverless car, drone strike, dual-use technology, Elon Musk, functional programming, Geoffrey Hinton, Google X / Alphabet X, Internet of things, job automation, John Nash: game theory, John von Neumann, Kickstarter, language acquisition, loss aversion, machine translation, military-industrial complex, move 37, mutually assured destruction, Nash equilibrium, natural language processing, Nick Bostrom, Norbert Wiener, nuclear taboo, nuclear winter, OpenAI, paperclip maximiser, pattern recognition, RAND corporation, ransomware, risk tolerance, Ronald Reagan, self-driving car, semantic web, side project, Silicon Valley, South China Sea, speech recognition, Stanislav Petrov, stem cell, Stephen Hawking, Steve Jobs, strong AI, Stuxnet, technological determinism, TED Talk, theory of mind, TikTok, Turing machine, Turing test, uranium enrichment, urban sprawl, V2 rocket, Von Neumann architecture, Wall-E, zero-sum game

It’s an artful get-out that allows the development and deployment of highly capable AI weapon systems that will soon force humans well away from the loop. And reassuring noises aside, advanced states haven’t banned them. It’s hard to see them ever doing so. In the United States, the Congressional National Security Commission on AI neatly summarised the challenge. AI, the Commissioners noted, was the quintessential ‘dual use’ technology; it would transform all aspects of military activity; large scale proliferation was to be expected; and defending against AI capable adversaries without employing AI yourself would be an ‘invitation to disaster’. Their conclusion: the US should lead a coalition of democracies to develop military-salient AI.20 With a touch of hyperbole, we saw Russia’s Vladimir Putin declare that the country that masters military AI will control the world.

A-10 Warthog abacuses Abbottabad, Pakistan Able Archer (1983) acoustic decoys acoustic torpedoes Adams, Douglas Aegis combat system Aerostatic Corps affective empathy Affecto Afghanistan agency aircraft see also dogfighting; drones aircraft carriers algorithms algorithm creation Alpha biases choreography deep fakes DeepMind, see DeepMind emotion recognition F-117 Nighthawk facial recognition genetic selection imagery analysis meta-learning natural language processing object recognition predictive policing alien hand syndrome Aliens (1986 film) Alpha AlphaGo Altered Carbon (television series) Amazon Amnesty International amygdala Andropov, Yuri Anduril Ghost anti-personnel mines ants Apple Aristotle armour arms races Army Research Lab Army Signal Corps Arnalds, Ólafur ARPA Art of War, The (Sun Tzu) art Artificial Intelligence agency and architecture autonomy and as ‘brittle’ connectionism definition of decision-making technology expert systems and feedback loops fuzzy logic innateness intelligence analysis meta-learning as ‘narrow’ needle-in-a-haystack problems neural networks reinforcement learning ‘strong AI’ symbolic logic and unsupervised learning ‘winters’ artificial neural networks Ashby, William Ross Asimov, Isaac Asperger syndrome Astute class boats Atari Breakout (1976) Montezuma’s Revenge (1984) Space Invaders (1978) Athens ATLAS robots augmented intelligence Austin Powers (1997 film) Australia authoritarianism autonomous vehicles see also drones autonomy B-21 Raider B-52 Stratofortress B2 Spirit Baby X BAE Systems Baghdad, Iraq Baidu balloons ban, campaigns for Banks, Iain Battle of Britain (1940) Battle of Fleurus (1794) Battle of Midway (1942) Battle of Sedan (1940) batwing design BBN Beautiful Mind, A (2001 film) beetles Bell Laboratories Bengio, Yoshua Berlin Crisis (1961) biases big data Bin Laden, Osama binary code biological weapons biotechnology bipolarity bits Black Lives Matter Black Mirror (television series) Blade Runner (1982 film) Blade Runner 2049 (2017 film) Bletchley Park, Buckinghamshire blindness Blunt, Emily board games, see under games boats Boden, Margaret bodies Boeing MQ-25 Stingray Orca submarines Boolean logic Boston Dynamics Bostrom, Nick Boyd, John brain amygdala bodies and chunking dopamine emotion and genetic engineering and language and mind merge and morality and plasticity prediction and subroutines umwelts and Breakout (1976 game) breathing control brittleness brute force Buck Rogers (television series) Campaign against Killer Robots Carlsen, Magnus Carnegie Mellon University Casino Royale (2006 film) Castro, Fidel cat detector centaur combination Central Intelligence Agency (CIA) centre of gravity chaff Challenger Space Shuttle disaster (1986) Chauvet cave, France chemical weapons Chernobyl nuclear disaster (1986) chess centaur teams combinatorial explosion and creativity in Deep Blue game theory and MuZero as toy universe chicken (game) chimeras chimpanzees China aircraft carriers Baidu COVID-19 pandemic (2019–21) D-21 in genetic engineering in GJ-11 Sharp Sword nuclear weapons surveillance in Thucydides trap and US Navy drone seizure (2016) China Lake, California Chomsky, Noam choreography chunking Cicero civilians Clarke, Arthur Charles von Clausewitz, Carl on character on culmination on defence on genius on grammar of war on materiel on nature on poker on willpower on wrestling codebreaking cognitive empathy Cold War (1947–9) arms race Berlin Crisis (1961) Cuban Missile Crisis (1962) F-117 Nighthawk Iran-Iraq War (1980–88) joint action Korean War (1950–53) nuclear weapons research and SR-71 Blackbird U2 incident (1960) Vienna Summit (1961) Vietnam War (1955–75) VRYAN Cole, August combinatorial creativity combinatorial explosion combined arms common sense computers creativity cyber security games graphics processing unit (GPU) mice Moore’s Law symbolic logic viruses VRYAN confirmation bias connectionism consequentialism conservatism Convention on Conventional Weapons ConvNets copying Cormorant cortical interfaces cost-benefit analysis counterfactual regret minimization counterinsurgency doctrine courageous restraint COVID-19 pandemic (2019–21) creativity combinatorial exploratory genetic engineering and mental disorders and transformational criminal law CRISPR, crows Cruise, Thomas Cuban Missile Crisis (1962) culmination Culture novels (Banks) cyber security cybernetics cyborgs Cyc cystic fibrosis D-21 drones Damasio, Antonio dance DARPA autonomous vehicle research battlespace manager codebreaking research cortical interface research cyborg beetle Deep Green expert system programme funding game theory research LongShot programme Mayhem Ng’s helicopter Shakey understanding and reason research unmanned aerial combat research Dartmouth workshop (1956) Dassault data DDoS (distributed denial-of-service) dead hand system decision-making technology Deep Blue deep fakes Deep Green DeepMind AlphaGo Atari playing meta-learning research MuZero object recognition research Quake III competition (2019) deep networks defence industrial complex Defence Innovation Unit Defence Science and Technology Laboratory defence delayed gratification demons deontological approach depth charges Dionysus DNA (deoxyribonucleic acid) dodos dogfighting Alpha domains dot-matrix tongue Dota II (2013 game) double effect drones Cormorant D-21 GJ-11 Sharp Sword Global Hawk Gorgon Stare kamikaze loitering munitions nEUROn operators Predator Reaper reconnaissance RQ-170 Sentinel S-70 Okhotnik surveillance swarms Taranis wingman role X-37 X-47b dual use technology Eagleman, David early warning systems Echelon economics Edge of Tomorrow (2014 film) Eisenhower, Dwight Ellsberg, Daniel embodied cognition emotion empathy encryption entropy environmental niches epilepsy epistemic community escalation ethics Asimov’s rules brain and consequentialism deep brain stimulation and deontological approach facial recognition and genetic engineering and golden rule honour hunter-gatherer bands and identity just war post-conflict reciprocity regulation surveillance and European Union (EU) Ex Machina (2014 film) expert systems exploratory creativity extra limbs Eye in the Sky (2015 film) F-105 Thunderchief F-117 Nighthawk F-16 Fighting Falcon F-22 Raptor F-35 Lightning F/A-18 Hornet Facebook facial recognition feedback loops fighting power fire and forget firmware 5G cellular networks flow fog of war Ford forever wars FOXP2 gene Frahm, Nils frame problem France Fukushima nuclear disaster (2011) Future of Life Institute fuzzy logic gait recognition game theory games Breakout (1976) chess, see chess chicken Dota II (2013) Go, see Go Montezuma’s Revenge (1984) poker Quake III (1999) Space Invaders (1978) StarCraft II (2010) toy universes zero sum games gannets ‘garbage in, garbage out’ Garland, Alexander Gates, William ‘Bill’ Gattaca (1997 film) Gavotti, Giulio Geertz, Clifford generalised intelligence measure Generative Adversarial Networks genetic engineering genetic selection algorithms genetically modified crops genius Germany Berlin Crisis (1961) Nuremburg Trials (1945–6) Russian hacking operation (2015) World War I (1914–18) World War II (1939–45) Ghost in the Shell (comic book) GJ-11 Sharp Sword Gladwell, Malcolm Global Hawk drone global positioning system (GPS) global workspace Go (game) AlphaGo Gödel, Kurt von Goethe, Johann golden rule golf Good Judgment Project Google BERT Brain codebreaking research DeepMind, see DeepMind Project Maven (2017–) Gordievsky, Oleg Gorgon Stare GPT series grammar of war Grand Challenge aerial combat autonomous vehicles codebreaking graphics processing unit (GPU) Greece, ancient grooming standard Groundhog Day (1993 film) groupthink guerilla warfare Gulf War First (1990–91) Second (2003–11) hacking hallucinogenic drugs handwriting recognition haptic vest hardware Harpy Hawke, Ethan Hawking, Stephen heat-seeking missiles Hebrew Testament helicopters Hellfire missiles Her (2013 film) Hero-30 loitering munitions Heron Systems Hinton, Geoffrey Hitchhiker’s Guide to the Galaxy, The (Adams) HIV (human immunodeficiency viruses) Hoffman, Frank ‘Holeshot’ (Cole) Hollywood homeostasis Homer homosexuality Hongdu GJ-11 Sharp Sword honour Hughes human in the loop human resources human-machine teaming art cyborgs emotion games King Midas problem prediction strategy hunter-gatherer bands Huntingdon’s disease Hurricane fighter aircraft hydraulics hypersonic engines I Robot (Asimov) IARPA IBM identity Iliad (Homer) image analysis image recognition cat detector imagination Improbotics nformation dominance information warfare innateness intelligence analysts International Atomic Energy Agency International Criminal Court international humanitarian law internet of things Internet IQ (intelligence quotient) Iran Aegis attack (1988) Iraq War (1980–88) nuclear weapons Stuxnet attack (2010) Iraq Gulf War I (1990–91) Gulf War II (2003–11) Iran War (1980–88) Iron Dome Israel Italo-Turkish War (1911–12) Jaguar Land Rover Japan jazz JDAM (joint directed attack munition) Jeopardy Jobs, Steven Johansson, Scarlett Johnson, Lyndon Joint Artificial Intelligence Center (JAIC) de Jomini, Antoine jus ad bellum jus in bello jus post bellum just war Kalibr cruise missiles kamikaze drones Kasparov, Garry Kellogg Briand Pact (1928) Kennedy, John Fitzgerald KGB (Komitet Gosudarstvennoy Bezopasnosti) Khrushchev, Nikita kill chain King Midas problem Kissinger, Henry Kittyhawk Knight Rider (television series) know your enemy know yourself Korean War (1950–53) Kratos XQ-58 Valkyrie Kubrick, Stanley Kumar, Vijay Kuwait language connectionism and genetic engineering and natural language processing pattern recognition and semantic webs translation universal grammar Law, Jude LeCun, Yann Lenat, Douglas Les, Jason Libratus lip reading Litvinenko, Alexander locked-in patients Lockheed dogfighting trials F-117 Nighthawk F-22 Raptor F-35 Lightning SR-71 Blackbird logic loitering munitions LongShot programme Lord of the Rings (2001–3 film trilogy) LSD (lysergic acid diethylamide) Luftwaffe madman theory Main Battle Tanks malum in se Manhattan Project (1942–6) Marcus, Gary Maslow, Abraham Massachusetts Institute of Technology (MIT) Matrix, The (1999 film) Mayhem McCulloch, Warren McGregor, Wayne McNamara, Robert McNaughton, John Me109 fighter aircraft medical field memory Merkel, Angela Microsoft military industrial complex Mill, John Stuart Milrem mimicry mind merge mind-shifting minimax regret strategy Minority Report (2002 film) Minsky, Marvin Miramar air base, San Diego missiles Aegis combat system agency and anti-missile gunnery heat-seeking Hellfire missiles intercontinental Kalibr cruise missiles nuclear warheads Patriot missile interceptor Pershing II missiles Scud missiles Tomahawk cruise missiles V1 rockets V2 rockets mission command mixed strategy Montezuma’s Revenge (1984 game) Moore’s Law mosaic warfare Mueller inquiry (2017–19) music Musk, Elon Mutually Assured Destruction (MAD) MuZero Nagel, Thomas Napoleon I, Emperor of the French Napoleonic France (1804–15) narrowness Nash equilibrium Nash, John National Aeronautics and Space Administration (NASA) National Security Agency (NSA) National War College natural language processing natural selection Nature navigation computers Nazi Germany (1933–45) needle-in-a-haystack problems Netflix network enabled warfare von Neumann, John neural networks neurodiversity nEUROn drone neuroplasticity Ng, Andrew Nixon, Richard normal accident theory North Atlantic Treaty Organization (NATO) North Korea nuclear weapons Cuban Missile Crisis (1962) dead hand system early warning systems F-105 Thunderchief and game theory and Hiroshima and Nagasaki bombings (1945) Manhattan Project (1942–6) missiles Mutually Assured Destruction (MAD) second strike capability submarines and VRYAN and in WarGames (1983 film) Nuremburg Trials (1945–6) Obama, Barack object recognition Observe Orient Decide and Act (OODA) offence-defence balance Office for Naval Research Olympic Games On War (Clausewitz), see Clausewitz, Carl OpenAI optogenetics Orca submarines Ottoman Empire (1299–1922) pain Pakistan Palantir Palmer, Arnold Pandemonium Panoramic Research Papert, Seymour Parkinson’s disease Patriot missile interceptors pattern recognition Pearl Harbor attack (1941) Peloponnesian War (431–404 BCE) Pentagon autonomous vehicle research codebreaking research computer mouse development Deep Green Defence Innovation Unit Ellsberg leaks (1971) expert system programme funding ‘garbage in, garbage out’ story intelligence analysts Project Maven (2017–) Shakey unmanned aerial combat research Vietnam War (1955–75) perceptrons Perdix Pershing II missiles Petrov, Stanislav Phalanx system phrenology pilot’s associate Pitts, Walter platform neutrality Pluribus poker policing polygeneity Portsmouth, Hampshire Portuguese Man o’ War post-traumatic stress disorder (PTSD) Predator drones prediction centaur teams ‘garbage in, garbage out’ story policing toy universes VRYAN Prescience principles of war prisoners Project Improbable Project Maven (2017–) prosthetic arms proximity fuses Prussia (1701–1918) psychology psychopathy punishment Putin, Vladimir Pyeongchang Olympics (2018) Qinetiq Quake III (1999 game) radar Rafael RAND Corporation rational actor model Rawls, John Re:member (Arnalds) Ready Player One (Cline) Reagan, Ronald Reaper drones reciprocal punishment reciprocity reconnaissance regulation ban, campaigns for defection self-regulation reinforcement learning remotely piloted air vehicles (RPAVs) revenge porn revolution in military affairs Rid, Thomas Robinson, William Heath Robocop (1987 film) Robotics Challenge robots Asimov’s rules ATLAS Boston Dynamics homeostatic Shakey symbolic logic and Rome Air Defense Center Rome, ancient Rosenblatt, Frank Royal Air Force (RAF) Royal Navy RQ-170 Sentinel Russell, Stuart Russian Federation German hacking operation (2015) Litvinenko murder (2006) S-70 Okhotnik Skripal poisoning (2018) Ukraine War (2014–) US election interference (2016) S-70 Okhotnik SAGE Said and Done’ (Frahm) satellite navigation satellites Saudi Arabia Schelling, Thomas schizophrenia Schwartz, Jack Sea Hunter security dilemma Sedol, Lee self-actualisation self-awareness self-driving cars Selfridge, Oliver semantic webs Shakey Shanahan, Murray Shannon, Claude Shogi Silicon Valley Simon, Herbert Single Integrated Operations Plan (SIOP) singularity Siri situational awareness situationalist intelligence Skripal, Sergei and Yulia Slaughterbots (2017 video) Slovic, Paul smartphones Smith, Willard social environments software Sophia Sorcerer’s Apprentice, The (Goethe) South China Sea Soviet Union (1922–91) aircraft Berlin Crisis (1961) Chernobyl nuclear disaster (1986) Cold War (1947–9), see Cold War collapse (1991) Cuban Missile Crisis (1962) early warning systems Iran-Iraq War (1980–88) Korean War (1950–53) nuclear weapons radar technology U2 incident (1960) Vienna Summit (1961) Vietnam War (1955–75) VRYAN World War II (1939–45) Space Invaders (1978 game) SpaceX Sparta Spike Firefly loitering munitions Spitfire fighter aircraft Spotify Stanford University Stanley Star Trek (television series) StarCraft II (2010 game) stealth strategic bombing strategic computing programme strategic culture Strategy Robot strategy Strava Stuxnet sub-units submarines acoustic decoys nuclear Orca South China Sea incident (2016) subroutines Sukhoi Sun Tzu superforecasting surveillance swarms symbolic logic synaesthesia synthetic operation environment Syria Taliban tanks Taranis drone technological determinism Tempest Terminator franchise Tesla Tetlock, Philip theory of mind Threshold Logic Unit Thucydides TikTok Tomahawk cruise missiles tongue Top Gun (1986 film) Top Gun: Maverick (2021 film) torpedoes toy universes trade-offs transformational creativity translation Trivers, Robert Trump, Donald tumours Turing, Alan Twitter 2001: A Space Odyssey (1968 film) Type-X Robotic Combat Vehicle U2 incident (1960) Uber Uexküll, Jacob Ukraine ultraviolet light spectrum umwelts uncanny valley unidentified flying objects (UFOs) United Kingdom AI weapons policy armed force, size of Battle of Britain (1940) Bletchley Park codebreaking Blitz (1940–41) Cold War (1947–9) COVID-19 pandemic (2019–21) DeepMind, see DeepMind F-35 programme fighting power human rights legislation in Litvinenko murder (2006) nuclear weapons principles of war Project Improbable Qinetiq radar technology Royal Air Force Royal Navy Skripal poisoning (2018) swarm research wingman concept World War I (1914–18) United Nations United States Afghanistan War (2001–14) Air Force Army Research Lab Army Signal Corps Battle of Midway (1942) Berlin Crisis (1961) Bin Laden assassination (2011) Black Lives Matter protests (2020) centaur team research Central Intelligence Agency (CIA) Challenger Space Shuttle disaster (1986) Cold War (1947–9), see Cold War COVID-19 pandemic (2019–21) Cuban Missile Crisis (1962) culture cyber security DARPA, see DARPA Defense Department drones early warning systems F-35 programme Gulf War I (1990–91) Gulf War II (2003–11) IARPA Iran Air shoot-down (1988) Korean War (1950–53) Manhattan Project (1942–6) Marines Mueller inquiry (2017–19) National Security Agency National War College Navy nuclear weapons Office for Naval Research Patriot missile interceptor Pearl Harbor attack (1941) Pentagon, see Pentagon Project Maven (2017–) Rome Air Defense Center Silicon Valley strategic computing programme U2 incident (1960) Vienna Summit (1961) Vietnam War (1955–75) universal grammar Universal Schelling Machine (USM) unmanned aerial vehicles (UAVs), see drones unsupervised learning utilitarianism UVision V1 rockets V2 rockets Vacanti mouse Valkyries Van Gogh, Vincent Vietnam War (1955–75) Vigen, Tyler Vincennes, USS voice assistants VRYAN Wall-e (2008 film) WannaCry ransomware War College, see National War College WarGames (1983 film) warrior ethos Watson weapon systems WhatsApp Wiener, Norbert Wikipedia wingman role Wittgenstein, Ludwig World War I (1914–18) World War II (1939–45) Battle of Britain (1940) Battle of Midway (1942) Battle of Sedan (1940) Bletchley Park codebreaking Blitz (1940–41) Hiroshima and Nagasaki bombings (1945) Pearl Harbor attack (1941) radar technology V1 rockets V2 rockets VRYAN and Wrangham, Richard Wright brothers WS-43 loitering munitions Wuhan, China X-37 drone X-drone X-rays YouTube zero sum games


pages: 616 words: 189,609

The Dream Machine: The Untold History of the Notorious V-22 Osprey by Richard Whittle

Ayatollah Khomeini, bank run, Boeing 747, Charles Lindbergh, digital map, Donald Trump, dual-use technology, helicopter parent, military-industrial complex, profit motive, Ronald Reagan, Rubik’s Cube, The Soul of a New Machine, VTOL

* * * As the Court of Inquiry was taking testimony that summer and fall, Democrat Bill Clinton and his presidential running mate, Tennessee senator Al Gore, were using the Osprey as an issue against Bush and Quayle. Clinton and Gore said they would build the Osprey if elected because the tiltrotor was an example of “dual-use technology”—items that could be made for the military but converted to civilian use. Clinton endorsed the Osprey in an August speech in San Antonio. In September, Gore visited Bell Helicopter’s Plant 6 and said the tiltrotor could “revolutionize the air transport infrastructure for this country.” Clinton endorsed the Osprey again in a televised debate with Bush on October 11.

., 89–90, 91, 97 deLeon, Rudy, 302, 318 Delta Force (Beckwith), 62 Delta Force commandos, 60, 61, 64, 67 disk loading, 114, 166, 195, 327–28, 352–53, 356 Dodge, Kevin, 216–17, 226, 228, 231 Dolan, Beverly, 148–49 Dorsey, Frank, 16–18 downwash, 166, 242, 265, 281–82, 326, 329, 334, 337–38, 342, 352–53, 364 dual-sling option, 192–93 dual-use technology, 237 Dubberly, Mike, 130–31 ducted fans, 33 Dugan, Dan, 73, 82, 83 Dunford, Philip, 159, 164, 165–67, 282 Dunn, Harry P., 326–30, 331–32, 333–34, 342, 347–48, 351–52, 359–60, 366, 375, 376, 378 Dunnivan, Richard, 291–93, 344, 345, 346, 348, 362–63 dynamic instability (air resonance), 37 dynamics, 109 Eagle Claw, Operation, 59–65, 67, 366 Eisenhower, Dwight D., 14–15, 27 EMD (Engineering and Manufacturing Development), 237–38, 245–47, 248, 249–50 Engine Air Particle Separators (EAPS), 215, 385 engines, 11, 22, 32, 33, 34, 74, 336 JVX, 114, 118, 132, 133, 135, 150–152, 206, 215, 246 Navair’s design competition for, 150–52 specific fuel consumption (SFC) of, 151 environmental chambers, 119–20 environmental control systems, 196–197, 206 Erhart, Ron, 73, 79–80, 82–83, 96, 124, 157–59, 188–89, 200–202 FADEC engine regulators, 243 Faibisoff, Sara, 379, 381, 386 Fairchild VZ-5 “deflected slipstream” aircraft, 33–34 Farnborough International Airshow, 46–47, 377 Federal Aviation Administration (FAA), 159–60, 188, 257, 338, 366 First Convertible Aircraft Congress (1949), 25, 31 First to Fight (Krulak), 53 Fitch, William F., 102–3, 138–40, 142 flight control system, 58, 201–2, 235, 236, 262, 294–97, 311, 322–24, 325, 341 inadequate testing of, 322, 323–24 of JVX design, 105, 113, 118, 132–133, 148, 166, 195, 206 see also Thrust Control Lever flight envelope, 247, 250, 261, 282–83, 288, 354, 357 flight testing, 147, 161, 193, 194–99, 200–202, 257–85, 329, 334–36, 342, 352–60 autorotation in, 335–36 at Bell Helicopter, 27, 28, 36–38, 41, 42, 395 compressed schedule of, 248–249, 250–51, 261, 282–83 in computerized flight simulators, 355 developmental, 216–17, 226, 248–51, 261, 283, 288, 335–36 of downwash effects, 364 of flight envelope, 250, 282–83, 288 HROD tests in, 353, 355–59, 369 mock missions in, 2–3, 244, 251–252, 262–74, 366–67, 372 operational, 216–17, 226, 248, 249–52; see also OPEVAL test cards in, 354–55 vortex ring state in, 325, 339, 340, 343, 350, 351, 353, 355–59, 360 Focke-Wulf 61 (Fw 61), 18, 19, 23, 30–31 FOD (foreign object debris), 197, 201–2, 292 Franklin Institute, 18–21 Freisner, Lynn, 196–99, 200–202 FRP (Full Rate Production), 244, 248, 250, 251, 252, 257, 258, 277, 278, 280, 285, 286, 287, 288, 289–90, 300, 304–5, 307, 313, 314, 330, 364–65, 369 FSD (Full Scale Development), 146–50, 154, 157, 164–65, 177, 183, 184, 192, 193–94, 204, 208, 237–38, 247, 333 Fulton Pickup System, 39–41, 142 fuselage, 117, 118, 119, 125, 126, 129, 130, 131, 161–62, 164, 206 frames and formers of, 132, 245–46 Gaffey, Troy, 29, 48, 109–10, 124–25 Gaffney, Frank, 315 Gaillard, Lee, 375–76 Gallagher, Paul, 304, 309 Gard, Gerald, 104 Geiger, Roy S., 54 General Electric engine design, 150–52 General Motors-Allison engine design, 150–52 Geren, Preston M., Jr., 185, 187, 190, 203, 204, 231–32 Ghormley, Timothy, 310 Glenn, John, 54, 63, 176 Glosson, Buster, 179–80 Goldwater, Barry, 85–86, 94 XV-15 piloted by, 95–96, 327 Gore, Al, 237 Gorenstein, Nathan, 236 Gray, Alfred M., Jr., 163–64, 178–79, 190, 193, 196, 203–4, 205 Great Britain, 1–3, 33, 34, 59, 142–43, 182, 253–54, 377 Farnborough International Airshow of, 46–47, 377 Harrier jet fighter of, 34, 59, 89, 153, 156 Griffith, Thomas W., 118, 127, 130 Grina, Kenneth, 124–25, 128–29, 130–31, 206 Grohsmeyer, Steve, 353–54, 356–58 Gruber, Brooks S.

., 49, 80–81 Thompson, Mark, 371, 377–79, 383 thrust, 10–11, 31, 33–34, 114 Thrust Control Lever (TCL), 157–59, 200–202, 246–47, 384 “collective dyslexia” caused by, 200–201, 247 tiltrotors, 7–8, 14, 17, 19, 20, 29–31, 35, 72, 73, 76, 77–106, 108–12, 134–35, 301, 302, 317, 318, 326, 347, 376, 388–89 airspeed of, 97, 98, 192 altitude capability of, 98, 112 in civilian aviation, 95, 100, 101, 111, 144, 145–46, 159–60, 173, 179, 182, 186, 188, 189, 203, 209–10, 232, 253–57, 334, 389, 395–94 configuration of, 117–18, 396 conversion modes of, 250 as dual-use technology, 237 hovering by, 112 Japanese interest in, 187, 253, 254 in joint armed services program, see JVX Lehman’s advocacy of, 85, 88, 91, 94, 99, 103, 137, 204–5, 377 Platt-Lepage, 31 vortex ring state vulnerability of, 325, 329, 334, 336–39, 340, 342, 350, 351, 352–53, 356–59, 394 XV-3 convertiplane, 36–38 see also Bell XV-15 tiltrotors, marketing of, 38, 59, 65–68, 72, 78–86, 87, 95–97, 100, 110–112, 142–46 civilian aircraft in, 253–57, 395–94 as “national asset,” 145–46, 157, 159–60, 171–72, 209–10 prospective foreign sales of, 182, 253–54, 255, 256–57 see also Bell XV-15, as marketing tool; Spivey, Richard F.


pages: 158 words: 46,353

Future War: Preparing for the New Global Battlefield by Robert H. Latiff

Asilomar, Asilomar Conference on Recombinant DNA, autonomous vehicles, Berlin Wall, Boeing 747, CRISPR, cyber-physical system, Danny Hillis, defense in depth, drone strike, dual-use technology, Elon Musk, failed state, friendly fire, Howard Zinn, Internet of things, low earth orbit, military-industrial complex, Nicholas Carr, orbital mechanics / astrodynamics, post-truth, precautionary principle, Recombinant DNA, self-driving car, Seymour Hersh, South China Sea, Stephen Hawking, Stewart Brand, Strategic Defense Initiative, Stuxnet, synthetic biology, VTOL, Wall-E

I continue to believe the tragedy occurred because the operators of the system were ill-trained by the providers. Governments have engaged in important debates about nuclear arms reduction treaties, conventions banning weapons of mass destruction, and weapons that result in unnecessary and superfluous suffering, such as land mines. Dual-use technologies like artificial intelligence or synthetic biology present a different dilemma in that they have the potential to be used in both good and evil ways. While the technologies themselves are not the subject of treaties and conventions, we are now faced with controlling the proliferation of weapons employing these technologies.


pages: 403 words: 132,736

In Spite of the Gods: The Rise of Modern India by Edward Luce

affirmative action, Albert Einstein, Alvin Toffler, Bretton Woods, call centre, centre right, clean water, colonial rule, company town, crony capitalism, cuban missile crisis, demographic dividend, digital divide, dual-use technology, energy security, financial independence, friendly fire, Future Shock, Gini coefficient, Great Leap Forward, Haight Ashbury, informal economy, job-hopping, Kickstarter, land reform, Mahatma Gandhi, Martin Wolf, megacity, new economy, plutocrats, profit motive, purchasing power parity, Silicon Valley, trade liberalization, upwardly mobile, uranium enrichment, urban planning, women in the workforce, working-age population, Y2K

Blackwill, who had been a senior arms negotiator during the cold war, instantly chose India. Bush said to Blackwill: “A billion people and it’s a democracy. Ain’t that something?”19 Second, in spite of India’s nuclear tests, which had triggered U.S. sanctions on the export of sensitive, or “dual-use,” technology to India, the Bush administration was impressed by India’s “responsible stewardship” of its nuclear arsenal. In contrast to Pakistan, which had been passing on the technology to anyone who had the cash, India was considered to have a good system of export controls. Third, the almost two million people of Indian origin based in the United States had become a strong new voice in U.S. politics.

The United States offered to accept India’s nuclear weapons status, reinstate the export of nuclear fuel for India’s civil nuclear program, and lift all remaining restrictions on the export of sensitive technologies to India. In return, India would tighten export controls to prevent the sale of “dual-use” technology to other countries, accept international monitoring of its civil nuclear plants, and erect more credible walls between its civilian and military sectors—particularly in the space program, where India is believed to have transferred satellite launch technology to its ballistic missile scientists.


pages: 452 words: 134,502

Hacking Politics: How Geeks, Progressives, the Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet by David Moon, Patrick Ruffini, David Segal, Aaron Swartz, Lawrence Lessig, Cory Doctorow, Zoe Lofgren, Jamie Laurie, Ron Paul, Mike Masnick, Kim Dotcom, Tiffiniy Cheng, Alexis Ohanian, Nicole Powers, Josh Levy

4chan, Aaron Swartz, Adam Curtis, Affordable Care Act / Obamacare, Airbnb, Bernie Sanders, Big Tech, Burning Man, call centre, Cass Sunstein, Chelsea Manning, collective bargaining, creative destruction, crony capitalism, crowdsourcing, digital rights, disinformation, don't be evil, dual-use technology, facts on the ground, Firefox, Free Software Foundation, Hacker News, hive mind, hockey-stick growth, immigration reform, informal economy, jimmy wales, John Perry Barlow, Julian Assange, Kickstarter, liquidity trap, lolcat, machine readable, Mark Zuckerberg, obamacare, Occupy movement, offshore financial centre, Overton Window, peer-to-peer, plutocrats, power law, prisoner's dilemma, radical decentralization, rent-seeking, Silicon Valley, Skype, Streisand effect, technoutopianism, The future is already here, WikiLeaks, Y Combinator, Yochai Benkler

Kim Dotcom (founder of Megaupload) My main disagreement with the current state of the copyright debate is that the political balance is tilted too much in favor of content owners to the detriment of Internet innovation. Hollywood and the United States seem to be picking and choosing who they like and don’t like and that does not provide for the fairness, due process, and predictability that dual use technology companies like Megaupload need to grow and thrive. I believe it would be better for society to allow breathing room for Internet innovation. This case is at its core not about a criminal issue but rather an economics and political debate that is better suited to be dealt with in Congress. Aaron Swartz There are a lot of powerful people who want to clamp down on the Internet.

KIM DOTCOM: My main disagreement with the current state of the copyright debate is that the political balance is tilted too much in favor of content owners to the detriment of Internet innovation. Hollywood and the United States seem to be picking and choosing who they like and don’t like and that does not provide for the fairness, due process, and predictability that dual use technology companies like Megaupload need to grow and thrive. I believe it would be better for society to allow breathing room for Internet innovation. This case is at its core not about a criminal issue but rather an economics and political debate that is better suited to be dealt with in Congress. I believe in a system that promotes creativity and protects creative works and at the same time doesn’t unduly burden the growth of Internet service providers like cloud storage companies.


pages: 173 words: 14,313

Peers, Pirates, and Persuasion: Rhetoric in the Peer-To-Peer Debates by John Logie

1960s counterculture, Berlin Wall, book scanning, cuban missile crisis, dual-use technology, Fall of the Berlin Wall, Free Software Foundation, Hacker Ethic, Isaac Newton, Marshall McLuhan, moral panic, mutually assured destruction, peer-to-peer, plutocrats, pre–internet, publication bias, Richard Stallman, Search for Extraterrestrial Intelligence, search inside the book, SETI@home, Silicon Valley, slashdot, Steve Jobs, Steven Levy, Stewart Brand, Whole Earth Catalog

Breyer also questions where the threshold for “non-infringing use” ought to lie, pointing to the “9% or so of authorized time-shifting uses of the VCR” on which the Betamax verdict apparently rested. Breyer’s opinion opens with the statement “I agree with the Court that the distributor of a dual-use technology may be liable for the infringing activities of third parties where he or she actively seeks to advance the infringement,” but elsewhere in his decision Breyer suggests that the 9th Circuit did not err in awarding summary judgment in this case. The heart of Breyer’s opinion is an elegiac testament to the Betamax standard, which he endorses on four grounds: 1) Sony’s rule is clear; 2) Sony’s rule is strongly technology protecting; 3) Sony’s rule Pa r l orPr e s s wwwww. p a r l or p r e s s . c om Conclusion: The Cat Came Back 139 is forward looking; and 4) Sony’s rule is mindful of the limitations facing judges where matters of technology are concerned.


pages: 249 words: 66,492

The Rare Metals War by Guillaume Pitron

Albert Einstein, Berlin Wall, carbon footprint, circular economy, clean tech, cloud computing, collapse of Lehman Brothers, commodity super cycle, connected car, David Attenborough, decarbonisation, degrowth, deindustrialization, dematerialisation, Deng Xiaoping, Donald Trump, driverless car, dual-use technology, Elon Musk, energy transition, Fairphone, full employment, green new deal, green transition, industrial robot, Internet of things, invisible hand, Jeff Bezos, Kickstarter, knowledge economy, Lyft, mittelstand, offshore financial centre, oil shale / tar sands, planetary scale, planned obsolescence, Silicon Valley, smart cities, smart grid, smart meter, South China Sea, spinning jenny, Tesla Model S, Yom Kippur War

We went to our superiors within the defense department, we argued ad infinitum, and eventually we were ignored.’ The apathy of the Democratic administration is even more surprising given that China was in the process of executing its ‘Sixteen-Character Policy’, which it had outlined as early as 1978.16 Enacted by Deng Xiaoping, the strategy included a program to acquire ‘dual-use’ technologies to ultimately strengthen China’s army. Magnequench was an ideal choice, as its magnets were used for the vehicles of General Motors and for the US Army. The premise of the Sixteen-Character Policy was pragmatic: given the difficulty in procuring war technologies due to the US arms embargo, China would buy foreign companies whose know-how in civil applications could be repurposed for more hostile ends.


pages: 285 words: 78,180

Life at the Speed of Light: From the Double Helix to the Dawn of Digital Life by J. Craig Venter

Albert Einstein, Alfred Russel Wallace, Apollo 11, Asilomar, Barry Marshall: ulcers, bioinformatics, borderless world, Brownian motion, clean water, Computing Machinery and Intelligence, discovery of DNA, double helix, dual-use technology, epigenetics, experimental subject, global pandemic, Gregor Mendel, Helicobacter pylori, Isaac Newton, Islamic Golden Age, John von Neumann, Louis Pasteur, Mars Rover, Mikhail Gorbachev, phenotype, precautionary principle, Recombinant DNA, Richard Feynman, stem cell, Stuart Kauffman, synthetic biology, the scientific method, Thomas Kuhn: the structure of scientific revolutions, Turing machine

A robot may not harm humanity, or, by inaction, allow humanity to come to harm.” One can apply these principles equally to our efforts to alter the basic machinery of life by substituting “synthetic life form” for “robot.” Emerging technologies, whether in robotics or in synthetic biology, can be a double-edged sword. Today there is much debate about “dual-use” technologies—as, for instance, in a study published in 2012 by the American Association for the Advancement of Science, a group of American universities, and the FBI.31 Their investigation was prompted by research undertaken by teams in America and the Netherlands that had identified the elements of the H5N1 influenza virus that enabled its rapid spread.


Chomsky on Mis-Education by Noam Chomsky

Alan Greenspan, American ideology, classic study, deindustrialization, deskilling, disinformation, dual-use technology, Howard Zinn, invisible hand, Korean Air Lines Flight 007, means of production, military-industrial complex, public intellectual, Ronald Reagan, strikebreaker, union organizing, W. E. B. Du Bois, Washington Consensus

Or to the Heritage Foundation, which crafts the budget proposals for the congressional “conservatives” and therefore called for (and obtained) an increase in Pentagon spending beyond Clinton’s increase to ensure that the “defense industrial base” remains solid, protected by state power, and offering dual-use technology to its beneficiaries to enable them to dominate commercial markets and enrich themselves at public expense. All understand very well that free enterprise means that the public pays the costs and bears the risks if things go wrong—for example, bank and corporate bailouts that have cost the public hundreds of billions of dollars in recent years.


pages: 293 words: 74,709

Bomb Scare by Joseph Cirincione

"World Economic Forum" Davos, Albert Einstein, cuban missile crisis, Dissolution of the Soviet Union, Dr. Strangelove, dual-use technology, energy security, Ernest Rutherford, Mahatma Gandhi, Mikhail Gorbachev, Nelson Mandela, nuclear taboo, Ronald Reagan, Strategic Defense Initiative, technological determinism, uranium enrichment, Yogi Berra

This is an everything-we-can-do strategy.26 The report analyzed how to end the threat of nuclear terrorism by implementing comprehensive efforts to secure and eliminate nuclear materials worldwide and to stop the illegal transfer of nuclear technology. The strategy would prevent new nuclear weapon states by increasing penalties for withdrawal from the NPT, enforcing compliance with strengthened treaties, and radically reforming the nuclear fuel cycle to prevent states from acquiring dual-use technologies for uranium enrichment or plutonium reprocessing. The threat from existing arsenals would be reduced by shrinking global stockpiles, curtailing research on new nuclear weapons, and taking weapons off hair-trigger alert status. Finally, greater efforts would be devoted to resolving the regional conflicts that fuel proliferation and to bringing the three nuclear weapon states outside the NPT (India, Pakistan, and Israel) into conformance with an expanded set of global nonproliferation norms.


pages: 241 words: 75,417

The Last President of Europe: Emmanuel Macron's Race to Revive France and Save the World by William Drozdiak

Berlin Wall, bilateral investment treaty, Boeing 737 MAX, Boris Johnson, carbon tax, centre right, cloud computing, disinformation, Donald Trump, dual-use technology, failed state, fake news, Fall of the Berlin Wall, green new deal, Greta Thunberg, high-speed rail, hiring and firing, illegal immigration, immigration reform, income inequality, New Urbanism, offshore financial centre, reserve currency, Silicon Valley, Socratic dialogue, South China Sea, Steve Bannon, UNCLOS, working poor

He laid out a proposal for a foreign investment screening process that would help oversee future investments and foreign acquisitions for the twenty-eight EU nations that involve matters of strategic security. The European Parliament adopted legislation to create an alert mechanism for future foreign investments involving dual-use technologies, but the final decision on whether to approve or veto such investments will be left in the hands of national governments. The strategic challenge facing Western democracies in their dealings with China will not soon go away: it is already emerging as a top priority on the transatlantic agenda as the United States and Europe both struggle to contain China’s growing power.


pages: 745 words: 207,187

Accessory to War: The Unspoken Alliance Between Astrophysics and the Military by Neil Degrasse Tyson, Avis Lang

active measures, Admiral Zheng, airport security, anti-communist, Apollo 11, Arthur Eddington, Benoit Mandelbrot, Berlin Wall, British Empire, Buckminster Fuller, Carrington event, Charles Lindbergh, collapse of Lehman Brothers, Colonization of Mars, commoditize, corporate governance, cosmic microwave background, credit crunch, cuban missile crisis, dark matter, Dava Sobel, disinformation, Donald Trump, Doomsday Clock, Dr. Strangelove, dual-use technology, Eddington experiment, Edward Snowden, energy security, Eratosthenes, European colonialism, fake news, Fellow of the Royal Society, Ford Model T, global value chain, Google Earth, GPS: selective availability, Great Leap Forward, Herman Kahn, Higgs boson, invention of movable type, invention of the printing press, invention of the telescope, Isaac Newton, James Webb Space Telescope, Johannes Kepler, John Harrison: Longitude, Karl Jansky, Kuiper Belt, Large Hadron Collider, Late Heavy Bombardment, Laura Poitras, Lewis Mumford, lone genius, low earth orbit, mandelbrot fractal, Maui Hawaii, Mercator projection, Mikhail Gorbachev, military-industrial complex, mutually assured destruction, Neil Armstrong, New Journalism, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, operation paperclip, pattern recognition, Pierre-Simon Laplace, precision agriculture, prediction markets, profit motive, Project Plowshare, purchasing power parity, quantum entanglement, RAND corporation, Ronald Reagan, Search for Extraterrestrial Intelligence, skunkworks, South China Sea, space junk, Stephen Hawking, Strategic Defense Initiative, subprime mortgage crisis, the long tail, time dilation, trade route, War on Poverty, wikimedia commons, zero-sum game

In 2012 it was $27.5 billion—half again as much as NASA’s budget; in 2015 it was $23.6 billion—a third more. Far and away the world’s most lavish military spender overall, the United States is also the most lavish spender on military space. In 2008 America shelled out almost ten times as much as the rest of the world combined. And that doesn’t include spending on dual-use technology, which includes anything that can, with equal aplomb, carry out a nonmilitary task today and a military task tomorrow.7 By 2016, America’s military-space spending had fallen to twice that of all other countries combined. American spending dominance may level off further as other countries establish a stronger space presence, a recalibration likely to reverberate through international politics and investment.

Its approach had the flavor of 1950s-style McCarthyism. Johnson-Freese calls the Cox Committee’s efforts “melodramatic,” “sensational,” “technically challenged and politically trumped-up.” “Seemingly overnight,” she writes, communication satellites “were described as threats to U.S. national security,” and “as dual-use technology, [they] became subject to the same government controls as military satellites, tanks, or guns, for purposes of sale overseas.” No longer was civilian space technology impressive, multipurpose engineering. Now it was potential armaments, subject to AECA, the Arms Export Control Act; USML, the US Munitions List, and its definitions of sensitive US technology; COCOM, the Coordinating Committee on Multilateral Export Controls; the Wassenaar Arrangement on Export Controls for Conventional Weapons and Dual-Use Goods and Technologies; and especially to ITAR, the International Traffic in Arms Regulations, which, when broadly implemented, thwarted the free exchange of scientific and technological ideas in the name of national security.


pages: 342 words: 101,370

Test Gods: Virgin Galactic and the Making of a Modern Astronaut by Nicholas Schmidle

Apollo 11, bitcoin, Boeing 737 MAX, Charles Lindbergh, Colonization of Mars, crew resource management, crewed spaceflight, D. B. Cooper, Dennis Tito, Donald Trump, dual-use technology, El Camino Real, Elon Musk, game design, Jeff Bezos, low earth orbit, Neil Armstrong, no-fly zone, Norman Mailer, Oklahoma City bombing, overview effect, private spaceflight, Ralph Waldo Emerson, risk tolerance, Ronald Reagan, Scaled Composites, Silicon Valley, SpaceShipOne, Stephen Hawking, Tacoma Narrows Bridge, time dilation, trade route, twin studies, vertical integration, Virgin Galactic, X Prize

“The flow of sophisticated weapons into areas of possible conflict, without tighter provisions for scrutiny and oversight by Congress, has had the effect of piling up tinder for future conflagrations,” said one senator. “Weapons sales are too important to be left in the hands of salesmen.” The International Traffic in Arms Regulations legislation, known by its initials, ITAR, prohibited the transfer of “dual-use” technologies, like rockets, to foreigners—or even sharing information with them. Most of Virgin’s employees were not US citizens. “That set the tone between us and Virgin,” said Brian Binnie, the SpaceShipOne pilot. Binnie had stayed on at Scaled. He was deeply involved with the early days of the SpaceShipTwo program.


Reset by Ronald J. Deibert

23andMe, active measures, air gap, Airbnb, Amazon Web Services, Anthropocene, augmented reality, availability heuristic, behavioural economics, Bellingcat, Big Tech, bitcoin, blockchain, blood diamond, Brexit referendum, Buckminster Fuller, business intelligence, Cal Newport, call centre, Cambridge Analytica, carbon footprint, cashless society, Citizen Lab, clean water, cloud computing, computer vision, confounding variable, contact tracing, contact tracing app, content marketing, coronavirus, corporate social responsibility, COVID-19, crowdsourcing, data acquisition, data is the new oil, decarbonisation, deep learning, deepfake, Deng Xiaoping, disinformation, Donald Trump, Doomsday Clock, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, Evgeny Morozov, failed state, fake news, Future Shock, game design, gig economy, global pandemic, global supply chain, global village, Google Hangouts, Great Leap Forward, high-speed rail, income inequality, information retrieval, information security, Internet of things, Jaron Lanier, Jeff Bezos, John Markoff, Lewis Mumford, liberal capitalism, license plate recognition, lockdown, longitudinal study, Mark Zuckerberg, Marshall McLuhan, mass immigration, megastructure, meta-analysis, military-industrial complex, move fast and break things, Naomi Klein, natural language processing, New Journalism, NSO Group, off-the-grid, Peter Thiel, planetary scale, planned obsolescence, post-truth, proprietary trading, QAnon, ransomware, Robert Mercer, Sheryl Sandberg, Shoshana Zuboff, Silicon Valley, single source of truth, Skype, Snapchat, social distancing, sorting algorithm, source of truth, sovereign wealth fund, sparse data, speech recognition, Steve Bannon, Steve Jobs, Stuxnet, surveillance capitalism, techlash, technological solutionism, the long tail, the medium is the message, The Structural Transformation of the Public Sphere, TikTok, TSMC, undersea cable, unit 8200, Vannevar Bush, WikiLeaks, zero day, zero-sum game

Surveillance and human rights: Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression. Retrieved from https://digitallibrary.un.org/record/3814512; See also Penney, J., McKune, S., Gill, L., & Deibert, R. J. (2018). Advancing Human-Rights-by-Design in the Dual-Use Technology Industry. Journal of International Affairs, 71(2), 103-110. States purchasing spyware are at liberty to abuse it: Anstis, S., Deibert, R. J., & Scott-Railton, J. (2019, July 19). A proposed response to the commercial surveillance emergency. Retrieved from https://www.lawfareblog.com/proposed-response-commercial-surveillance-emergency Government military, intelligence, and law enforcement agencies have … stockpiled knowledge of software bugs: Deibert, R. (2014, November 25).


CRISPR People by Henry T. Greely

Albert Einstein, Asilomar, Asilomar Conference on Recombinant DNA, autism spectrum disorder, bitcoin, clean water, CRISPR, Deng Xiaoping, discovery of DNA, double helix, dual-use technology, en.wikipedia.org, epigenetics, Gregor Mendel, Ian Bogost, Isaac Newton, Mark Zuckerberg, meta-analysis, mouse model, New Journalism, phenotype, precautionary principle, Recombinant DNA, special economic zone, stem cell, synthetic biology, traumatic brain injury, Xiaogang Anhui farmers

It is not even new in discussions of the He affair: an editorial in Science magazine by the presidents of three national academies called for “an international mechanism that would enable scientists to raise concerns about cases of research that are not conforming to the accepted principles or standards.”7 This question has arisen before in the biosciences with respect to socalled dual-use technologies, those that could be used for good purposes or for evil ones, such as biological warfare. It also comes up in more routine situations where someone is aware of wrongdoing and we as a society want to encourage or protect their whistleblowing. Qui tam statutes, giving whistleblowers some of the proceeds of suits against wrongdoers, date at least as far back as the Civil War.


pages: 1,042 words: 273,092

The Silk Roads: A New History of the World by Peter Frankopan

access to a mobile phone, Admiral Zheng, anti-communist, Ayatollah Khomeini, banking crisis, Bartolomé de las Casas, Berlin Wall, bread and circuses, British Empire, clean water, Columbian Exchange, credit crunch, cuban missile crisis, Deng Xiaoping, discovery of the americas, disinformation, drone strike, dual-use technology, energy security, European colonialism, failed state, financial innovation, Isaac Newton, land reform, Mahatma Gandhi, Malacca Straits, mass immigration, Mikhail Gorbachev, Murano, Venice glass, New Urbanism, no-fly zone, Ronald Reagan, sexual politics, South China Sea, spice trade, statistical model, Stuxnet, Suez crisis 1956, the built environment, the market place, The Wealth of Nations by Adam Smith, too big to fail, trade route, transcontinental railway, uranium enrichment, wealth creators, WikiLeaks, yield management, Yom Kippur War

Helping Saddam was a way of remaining engaged, as well as countering the advance of both Iran and the Soviet Union. Support took several forms. After removing Iraq from the list of state sponsors of terrorism, the US acted to help prop up the economy, extending financial credit to support the agricultural sector and allowing Saddam to buy first non-military equipment and then ‘dual-use’ technology, such as heavy trucks that could be used to transport equipment to the front lines. Western governments in Europe were encouraged to sell weapons to Baghdad, while US diplomats worked flat out to convince other regional powers, such as Kuwait and Saudi Arabia, to help finance Iraq’s military expenditure.

It was a shame, one intelligence document written in the spring of 1985 stated, that given ‘Iran’s historic, geostrategic importance’ relations between Washington and Teheran were so poor.117 Indeed, a year earlier, Iran had been officially designated a ‘State Sponsor of Terrorism’, which meant that there was a blanket ban on arms-related exports and sales, strict controls of dual-use technology and equipment, and a raft of financial and economic restrictions. It was unfortunate indeed, noted another report written around the same time, that the US had ‘no cards to play’ in its dealings with Iran; perhaps it was worth considering a ‘bolder – and perhaps riskier policy’, suggested the author.118 There was much to gain – for both sides.


System Error by Rob Reich

"Friedman doctrine" OR "shareholder theory", "World Economic Forum" Davos, 2021 United States Capitol attack, A Declaration of the Independence of Cyberspace, Aaron Swartz, AI winter, Airbnb, airport security, Alan Greenspan, Albert Einstein, algorithmic bias, AlphaGo, AltaVista, artificial general intelligence, Automated Insights, autonomous vehicles, basic income, Ben Horowitz, Berlin Wall, Bernie Madoff, Big Tech, bitcoin, Blitzscaling, Cambridge Analytica, Cass Sunstein, clean water, cloud computing, computer vision, contact tracing, contact tracing app, coronavirus, corporate governance, COVID-19, creative destruction, CRISPR, crowdsourcing, data is the new oil, data science, decentralized internet, deep learning, deepfake, DeepMind, deplatforming, digital rights, disinformation, disruptive innovation, Donald Knuth, Donald Trump, driverless car, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, Fairchild Semiconductor, fake news, Fall of the Berlin Wall, Filter Bubble, financial engineering, financial innovation, fulfillment center, future of work, gentrification, Geoffrey Hinton, George Floyd, gig economy, Goodhart's law, GPT-3, Hacker News, hockey-stick growth, income inequality, independent contractor, informal economy, information security, Jaron Lanier, Jeff Bezos, Jim Simons, jimmy wales, job automation, John Maynard Keynes: Economic Possibilities for our Grandchildren, John Maynard Keynes: technological unemployment, John Perry Barlow, Lean Startup, linear programming, Lyft, Marc Andreessen, Mark Zuckerberg, meta-analysis, minimum wage unemployment, Monkeys Reject Unequal Pay, move fast and break things, Myron Scholes, Network effects, Nick Bostrom, Northpointe / Correctional Offender Management Profiling for Alternative Sanctions, NP-complete, Oculus Rift, OpenAI, Panopticon Jeremy Bentham, Parler "social media", pattern recognition, personalized medicine, Peter Thiel, Philippa Foot, premature optimization, profit motive, quantitative hedge fund, race to the bottom, randomized controlled trial, recommendation engine, Renaissance Technologies, Richard Thaler, ride hailing / ride sharing, Ronald Reagan, Sam Altman, Sand Hill Road, scientific management, self-driving car, shareholder value, Sheryl Sandberg, Shoshana Zuboff, side project, Silicon Valley, Snapchat, social distancing, Social Responsibility of Business Is to Increase Its Profits, software is eating the world, spectrum auction, speech recognition, stem cell, Steve Jobs, Steven Levy, strong AI, superintelligent machines, surveillance capitalism, Susan Wojcicki, tech billionaire, tech worker, techlash, technoutopianism, Telecommunications Act of 1996, telemarketer, The Future of Employment, TikTok, Tim Cook: Apple, traveling salesman, Triangle Shirtwaist Factory, trolley problem, Turing test, two-sided market, Uber and Lyft, uber lyft, ultimatum game, union organizing, universal basic income, washing machines reduced drudgery, Watson beat the top human players on Jeopardy!, When a measure becomes a target, winner-take-all economy, Y Combinator, you are the product

., 66–68 in Taiwan, 242–43 and tech companies’ market and political power, 63 See also winner-take-all, disruption vs. democracy differential privacy, 130–33 Digital Equipment Corporation, 35 Digital Millennium Copyright Act, 225 digital panopticon, 113–14, 121–26 digital trustmediary, 149 dignity, 13, 190–1, 198–202, 208, 209 DiResta, Renee, 218 disinformation, xii, xiii, xxviii, 40, 188, 190, 195, 199, 200, 203, 205–7, 214, 222, 225–6, 237. See also misinformation disruption and innovation, xiv. See also winner-take-all, disruption vs. democracy Doerr, John, 26–27, 31–33, 41 DoNotPay, xix–xx Dorsey, Jack, 39–40, 187, 254. See also Twitter dot-com crash, 27 dual-use technology, 16 DuckDuckGo, 135–36 due process for algorithmic decisions, 106–7 Dwork, Cynthia, 130–31 dystopian social control, 121–23 economists, increasing power of, 10 efficiency, deficiency of, 15–17. See also optimization mindset Einstein, Albert, 77 election fraud alleged in 2020 presidential election, xi Electronic Frontier Foundation (EFF), 119–20 Electronic Privacy Information Center (EPIC), 150 Emanuel, Ezekiel J., 243 encryption, xv, 13, 72, 116, 127–29, 134 Encyclopaedia Britannica, 195 “End of Food, The,” Soylent reported to be, 9 engineers, 6, 10–15, 28–30, 31–33 environment vs. factory farms, 20–21 epistocracy, democracy vs., 66–68 ethics and AI, 165–66 ethics and politics of technological change, xvi–xvii, xx–xxi, xxiii European Commission, 136 European Data Protection Authorities, 145 European model of capitalism, 181 European Union antitrust actions against Google, 228–29 GDPR data protection, 142–45, 147, 238, 241 social safety nets, 185–86 Vestager’s roadblocks to big tech, 252–53, 255 Everyday Sexism Project, 220 expert rulers’ incentive to maintain their status, 68 externalities, xxvi, 48, 73, 200, 260 extremists right to use hate speech in the US, 189–90 FAccT/ML (Fairness, Accountability, and Transparency in Machine Learning), 89 Facebook acquisition of Instagram, 229 business model, xxvii, 18–19 Cambridge Analytica scandal, 37, 128, 146–47, 254 Christchurch, New Zealand, terrorist attack livestreamed, viral, removed, 189 data mining, 118–19 DeepFace system, 161, 162 deleting derogatory statements about men, 188 as digital civic square, 21 and end-to-end encryption, 127–28 FTC complaints against, 150, 253 global audience for truth or lies, 192–93 lawsuit for using facial recognition tech, 46–47 market dominance of, 227 Oversight Board of Facebook, 213–16 plan to comply with GDPR, 145 population of users nearly double that of China, 188–89 #StopProfitForHate campaign vs., 224–25 study of privacy settings, 137 Terms of Service excerpt, 118–19 Zuckerberg appears before House committee, 64–65 See also big tech platforms facial recognition aerial surveillance systems, 112 deep learning, 161–62 downstream applications, 17 Facebook sued for using, 46–47 human supervision requirement, 85 loss of liberties in a democratic society, 125 modern revival of physiognomy, 249 paradox, 113–15 prioritizing optimization vs., 15, 17 protecting celebrities from stalkers, 111–12 women and dark-skinned people, 113 factory farming as a success disaster, 20–21 Factory Investigating Commission, New York, 55 fairness, xxxiii, 20, 73, 88–94, 97, 99, 101, 103, 104, 106–8, 166, 237 Family Educational Rights and Privacy Act (FERPA), 140 famines as man-made political disasters, 74 Federal Bureau of Investigation (FBI), 128–29, 134–35 Federal Communications Commission (FCC), 58, 228 Federal Constitutional Court of Germany, 143 Federal Trade Commission (FTC), 118, 150–51, 228, 253 financial sector, 163–64, 254–55 First Amendment of the Constitution of the United States, 189, 191–92, 214, 216, 217 Flexner, Abraham, 244–45 Floyd, George, murder of, 69 Foot, Philippa, 155 Ford Pinto’s design flaw, 36–37 Foster, Bill, 52 Foucault, Michel, 122–23 free speech and the internet, 187–230 overview, 187–91 beyond self-regulation, 216–21 Christchurch, New Zealand, terrorist attack livestreamed, 189 collision of free speech with democracy and dignity, 198–202 creating a more competitive marketplace, 227–30 exceptions to free speech, 217 foreign interests with election-related advertising as an exception, 225 the future of platform immunity, 221–26 hate speech, 187–91, 200–201, 218 online efforts to regulate speech, 219–21 speech and its consequences, 191–97 Twitter’s suspension of Trump, xi-xii, 187–88 See also creating an alternative future freedom of expression, 198–99 Furman, Jason, 184 Galetti, Beth, 79–80, 99 Gates, Bill, 183 Gebru, Timnit, 112–13, 250 gender bias in recruiting system, 81–82, 83, 100–1 General Data Protection Regulation (GDPR), 142–45, 147, 149, 238, 241, 255 Germany, 143, 217–18 Gibbons, Jack, 258 gig economy workers, 47–49 Gillibrand, Kirsten, 151 Gingrich, Newt, 259 Glickman, Aaron, 243 Go, AI playing, 157 goals, of algorithmic models, 15–16, 18–21, 34–37 “Goals Gone Wild” (Ordóñez), 34–37 Gonzalez, Lorena, 48, 95 Goodhart’s Law, 19 Goodrow, Cristos, 33–34 Google AI ethics board dissolved, 166 data mining, 117 differential privacy technology used by, 131–32 employees protest sale of AI tech, 17 engineers actively unionizing, 180 European Commission lawsuit against, 136 Founders’ Award, 28 Gebru, firing of, 250 Google Buzz launch, 120 management by OKRs, 32–33 market dominance of, 227, 228 OpenSocial specification, 256 partnership with Apple, 113, 141 Pichai appears before House committee, 64–65 state attorneys general filing suit against, 253 Google Buzz, 120 Gore, Al, 59–60 governance, 66–68, 69–72, 105–7, 263–64 government AI-related taxes on businesses, 182–84 Clipper Chip technology, 115–16 companies helping to manage consequences of AI, 184 creating an agency responsible for citizen privacy rights, 150–51 data collection by public institutions, 140–42, 151 developing a new relationship with tech sector, 241 legitimacy of, 68 reasons for involvement in free speech on the internet, 221–26 tax-related subsidies for businesses, 179 See also regulations GPT-2 and GPT-3, OpenAI’s language models, 233–37 greedy algorithms, 12–13 Greenspan, Alan, 61 gross domestic product (GDP), 173 Group Insurance Commission (GIC) of Massachusetts, 130 Grove, Andy, 51 “Guerrilla Open Access Manifesto,” xxii–xxiii Hacker News website, 8 hackers computer scientists as, 21–22 Hacker News, 8 influencing political arena, 46 iPhones’ back door as a challenge to, 135 life hacking website, 14 marriage of capitalists and, 28, 52, 68 Hall, Margeret, 250 happiness in life, importance of, 167, 168 Harvard University Data Privacy Lab, 130–31 Hashemi, Madhi, 250 Hastings, Reed, 5–6 hate speech, 187–91, 200–201, 218, 224–25 Hawley, Josh, 223 Health Insurance Portability and Accountability Act of 1996 (HIPAA), 129, 140, 246 hedge funds using AI, 163–64 Hertzberg, Robert, 95 High Bar for Talent, Amazon’s, 79–80 High Performance Computing and Communications Act (1991), 59–60 Hinton, Geoff, 164 Hoffman, Reid, xxviii, 39, 51–52 Holmes, Elizabeth, xxx Holt, Rush, 52 Hong Kong protests in 2019, 125 Hooked on Phonics, 150 Horowitz, Ben, 42 Houghton, Amo, 259 Human Development Index (HDI), 173 human intelligence compared to machine intelligence, 158–59.


pages: 1,118 words: 309,029

The Wars of Afghanistan by Peter Tomsen

airport security, Ayatollah Khomeini, Berlin Wall, Boeing 747, British Empire, disinformation, drone strike, dual-use technology, facts on the ground, failed state, friendly fire, glass ceiling, hiring and firing, Internet Archive, Khyber Pass, land reform, Mikhail Gorbachev, military-industrial complex, plutocrats, RAND corporation, Ronald Reagan, trade route, union organizing, uranium enrichment, women in the workforce, zero-sum game

Days after the invasion, his naïveté inadvertently surfaced in an unusual acknowledgment to the press that would return to haunt him on the campaign trail: “My opinion of the Russians has changed most dramatically in the last week, more than even in the previous two and a half years before that.”21 Presidential candidate Reagan’s declaration in a New York speech, “I don’t agree that our nation must resign itself to inevitable decline, yielding its proud position to other hands,”22 suggested to voters that he would be more resolute in standing up to the Soviets. Carter levied twenty-six sanctions against the Soviet Union. They included an Olympics boycott, a grain embargo, withdrawal of the SALT II treaty from the Senate, cessation of dual-use technology sales, fishing restrictions in American waters, and closure of the Soviet consulate in New York and the American consulate in Kiev. The administration’s new “Carter Doctrine” warned the Soviet Union that any attempt to control the Persian Gulf would be repelled “by any means necessary, including military force.”23 Carter’s harder line did not affect Soviet behavior.

Bradsher, Afghan Communism and Soviet Intervention (Karachi: Oxford University Press, 2000), 104. In order to maintain balance with India, the Reagan administration permitted New Delhi to manufacture the GE-404 aircraft engine used in American F-14 combat fighters. An Indo-American technology agreement was signed, opening the way for India to acquire a range of previously denied dual-use technology items. 27 “Andropov Gromyko Ustinov Ponomarev Report on Events in Afghanistan on 27—28 December 1979,” Central Committee, Communist Party of the Soviet Union, top secret, online at Cold War International History Project, Virtual Archive, www.wilsoncenter.org. 28 Ibid. 29 Ibid. 30 Bruce J.


One Bullet Away: The Making of a Marine Officer by Fick, Nathaniel C.(October 3, 2005) Hardcover by Nathaniel C. Fick

clean water, defense in depth, double helix, dual-use technology, friendly fire, John Nash: game theory, Khyber Pass, no-fly zone, Silicon Valley

Most of the writing was in Cyrillic. They thought we’d struck a jackpot until they began opening the cabinets and drawers. Baking trays, mixing bowls, and measuring spoons fell out. Our mobile weapons lab was a field kitchen for the Iraqi army. We laughed about it, but there was an underlying lesson. The illusions of “dual-use” technology are deceptive, and sometimes a satellite is no substitute for a team of Marines with bolt cutters. Just before sunset, Charlie Company roared past, waving the captured standard of the Republican Guard armored brigade from the window of their lead Humvee. We cheered as if the whole day of combat had been a game of capture the flag.


pages: 474 words: 130,575

Surveillance Valley: The Rise of the Military-Digital Complex by Yasha Levine

23andMe, activist fund / activist shareholder / activist investor, Adam Curtis, Airbnb, AltaVista, Amazon Web Services, Anne Wojcicki, anti-communist, AOL-Time Warner, Apple's 1984 Super Bowl advert, bitcoin, Black Lives Matter, borderless world, Boston Dynamics, British Empire, Californian Ideology, call centre, Charles Babbage, Chelsea Manning, cloud computing, collaborative editing, colonial rule, company town, computer age, computerized markets, corporate governance, crowdsourcing, cryptocurrency, data science, digital map, disinformation, don't be evil, Donald Trump, Douglas Engelbart, Douglas Engelbart, Dr. Strangelove, drone strike, dual-use technology, Edward Snowden, El Camino Real, Electric Kool-Aid Acid Test, Elon Musk, end-to-end encryption, fake news, fault tolerance, gentrification, George Gilder, ghettoisation, global village, Google Chrome, Google Earth, Google Hangouts, Greyball, Hacker Conference 1984, Howard Zinn, hypertext link, IBM and the Holocaust, index card, Jacob Appelbaum, Jeff Bezos, jimmy wales, John Gilmore, John Markoff, John Perry Barlow, John von Neumann, Julian Assange, Kevin Kelly, Kickstarter, Laura Poitras, life extension, Lyft, machine readable, Mark Zuckerberg, market bubble, Menlo Park, military-industrial complex, Mitch Kapor, natural language processing, Neal Stephenson, Network effects, new economy, Norbert Wiener, off-the-grid, One Laptop per Child (OLPC), packet switching, PageRank, Paul Buchheit, peer-to-peer, Peter Thiel, Philip Mirowski, plutocrats, private military company, RAND corporation, Ronald Reagan, Ross Ulbricht, Satoshi Nakamoto, self-driving car, sentiment analysis, shareholder value, Sheryl Sandberg, side project, Silicon Valley, Silicon Valley startup, Skype, slashdot, Snapchat, Snow Crash, SoftBank, speech recognition, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, Telecommunications Act of 1996, telepresence, telepresence robot, The Bell Curve by Richard Herrnstein and Charles Murray, The Hackers Conference, Tony Fadell, uber lyft, vertical integration, Whole Earth Catalog, Whole Earth Review, WikiLeaks

See databases data collection and mining AOL search logs revealing personal identity, 156–157 ARPA’s Southeast Asia programs, 52–53 Brin’s interest in, 148 Cambridge Project, 68–69 early tabulation technology, 55–56 Google and Gmail, 157–159 Google as government contractor, 173–178 Google search engine algorithm, 149–150 Google’s expansion into multiple markets, 171–173 Google’s penetration into civil society, 179–181 NSA PRISM program, 192–193 predictive modeling using search engine data, 160–161 search engine development, 151–152 secrecy over user search data, 153–156 US Army database, 79–80 data sharing: Oakland’s Domain Awareness Center, 2 databases American Airlines SABRE, 82 congressional hearings on domestic surveillance, 84–87, 90–93 digitizing data, 80–84 death threats, 211–212, 216 Deep Web (documentary), 209 Defense Communication Agency, 93 defoliants, 13–15 democracy promotion, 251 Democratic National Convention, 265 Department of Homeland Security (DHS): Silk Road, 261–262 Dingledine, Roger, 202, 214, 225–227, 229–230, 236–241, 245–247, 251, 253, 258, 263 Diplomatic Security, 182 Doctorow, Cory, 258 Domain Awareness Center (DAC), 1–5 domestic surveillance and counterinsurgency bringing military technology to, 75–80 Ford Rowan’s exposé, 73–75, 87–90 growth of corporate and government databases, 82–84 Sam Ervin’s congressional hearings, 84–87 Tunney’s congressional investigation of ARPA, 90–93 Dow Chemical, 69 Dread Pirate Roberts, 201–204, 260–262 Silk Road, 205 The Dream Machine (Waldrop), 51 drones, 52 drug use: Vietnam War, 31–32 dual use technology, 57–59 Dugan, Regina, 180–181 Duo app, 258 “dynamations,” 47–48 early warning systems, 37–38, 67, 189–190 Earth Day festival, 78 eBay, 169–170, 180 economics: importance of cybernetics, 45 eco-technics, 110 Ecuador, 221 education “dynamations,” 47–48 Google penetration into public schools, 179 Edwards, Douglas, 141–142, 153–154 EGOTISTICAL GIRAFFE, 265 Egypt: Arab Spring, 248 Eisenhower, Dwight, 16–17 elections: data-driven campaigning, 65 Electric Word magazine, 129 electronic fence technology, 27 Electronic Frontier Foundation (EFF) Signal, 258 Tor, Assange, and WikiLeaks, 245 Tor Project funding, 212–213, 227–228 Wired magazine connection, 136 Electronic Privacy Information Center, 162 Ellsberg, Daniel, 209 email, 157–164 encryption: Moxie Marlinspike and Signal, 257 Engelbart, Douglas C., 50, 112, 145 ENIAC computer, 39–41, 117 Erskine, Graves, 19–20 Ervin, Sam, 84–88 Ethical Tor Research guide, 263–264 face recognition: Oakland’s Domain Awareness Center, 1–2 Facebook, 170, 180–181, 194–195, 209, 258 Falun Gong, 235 The Family, 110–111 Federal Bureau of Investigation (FBI) building a database, 80–81 exposé on domestic surveillance, 89 NSA PRISM program, 192–193 Silk Road, 203, 261–262 Federal Communications Commission (FCC), 135 Ferguson, Richard, 89–90 Fight for the Future, 258 Figueroa, Liz, 162–164 First Lighting, 37–38 foreign policy, US BBG’s Russian Deployment Plan, 237–238 fighting Internet censorship, 234–236 The Fountainhead (Rand), 239–240 Fowler, Donnie, 167–168 France: US clandestine ops in Vietnam, 19–20 fraud, Project Agile as, 32–33 Freedom of Information Act, 223 Gaddafi, Muammar, 248 Gellman, Barton, 199 Geneva Conventions, 15 gentrification: San Francisco and Oakland, 2–4 GeoEye-I satellite, 181 Gibson, Randall, 110, 115 Gilder, George, 102, 135 Gingrich, Newt, 135 Gmail, 157–164, 179–180 Godel, William, 13–15, 18–22, 27–33, 51–53, 145 Golumbia, David, 45 Google as government contractor, 173–178 buying companies and start-ups, 169–173 civilian, military and intelligence penetration, 178–182 early users, 143 equating with government, 182–184 Gmail, 157–164 JigSaw, 181–183 Keyhole Incorporated takeover, 175 Lockheed Martin partnership, 176–177 National Geospatial-Intelligence Agency partnership, 177–179 NSA PRISM program, 194–195 Oakland’s Domain Awareness Center and, 4–5 predictive policing, 167–168 predictive system, 161 public stock offering, 164–165 search engine, 149–150 search engine development, 151–152 secrecy over user search data, 153–155, 157 September 11, 2001, 139–141 Signal encryption, 258, 265 Snowden and, 208–209 tailoring searching through profiling, 150 targeted advertising system, 5 Google Earth, 173–176 Google Federal, 176, 178–179 Gore, Al, 102, 164 Great Firewall of China, 235, 256 Great Intergalactic Network, 59–61 Greenberg, Andy, 245, 258 guerrilla activity: US clandestine ops in Vietnam, 19–20 hacker community defense origins of the Tor Project, 225–226 hacking Tor, 263–265 Jacob Appelbaum’s history, 239–242 Tor Project, 220–222 working for the government, 225–226 Hackers’ Conference, 115–116 Hafner, Katie, 60 Halliday, John T., 26 Hamburg, Germany, 219–222 Hanke, John, 174 Hard Landing (Petzinger), 82 Harrison, Sarah, 220 Harvard University, 62–64 HavenCo, 220 Hayden, Michael, 199–200 Heidinger, Willy, 56–57 Herzfeld, Charles, 47 Hess, Karl III, 128–129 Hitler, Adolf, 43, 56–57, 272 Hollerith, Herman, 54–56 Honduras, 129–130 Hoofnagle, Chris, 161, 164–165 Hoover, J.


pages: 496 words: 131,938

The Future Is Asian by Parag Khanna

3D printing, Admiral Zheng, affirmative action, Airbnb, Amazon Web Services, anti-communist, Asian financial crisis, asset-backed security, augmented reality, autonomous vehicles, Ayatollah Khomeini, barriers to entry, Basel III, bike sharing, birth tourism , blockchain, Boycotts of Israel, Branko Milanovic, British Empire, call centre, capital controls, carbon footprint, cashless society, clean tech, clean water, cloud computing, colonial rule, commodity super cycle, computer vision, connected car, corporate governance, CRISPR, crony capitalism, cross-border payments, currency peg, death from overwork, deindustrialization, Deng Xiaoping, Didi Chuxing, Dissolution of the Soviet Union, Donald Trump, driverless car, dual-use technology, energy security, European colonialism, factory automation, failed state, fake news, falling living standards, family office, financial engineering, fixed income, flex fuel, gig economy, global reserve currency, global supply chain, Great Leap Forward, green transition, haute couture, haute cuisine, illegal immigration, impact investing, income inequality, industrial robot, informal economy, initial coin offering, Internet of things, karōshi / gwarosa / guolaosi, Kevin Kelly, Kickstarter, knowledge worker, light touch regulation, low cost airline, low skilled workers, Lyft, machine translation, Malacca Straits, Marc Benioff, Mark Zuckerberg, Masayoshi Son, megacity, megaproject, middle-income trap, Mikhail Gorbachev, money market fund, Monroe Doctrine, mortgage debt, natural language processing, Netflix Prize, new economy, off grid, oil shale / tar sands, open economy, Parag Khanna, payday loans, Pearl River Delta, prediction markets, purchasing power parity, race to the bottom, RAND corporation, rent-seeking, reserve currency, ride hailing / ride sharing, Ronald Reagan, Salesforce, Scramble for Africa, self-driving car, Shenzhen special economic zone , Silicon Valley, smart cities, SoftBank, South China Sea, sovereign wealth fund, special economic zone, stem cell, Steve Jobs, Steven Pinker, supply-chain management, sustainable-tourism, synthetic biology, systems thinking, tech billionaire, tech worker, trade liberalization, trade route, transaction costs, Travis Kalanick, uber lyft, upwardly mobile, urban planning, Vision Fund, warehouse robotics, Washington Consensus, working-age population, Yom Kippur War

In 2017, Narendra Modi became the first Indian prime minister to visit Israel, a public recognition of Israel being India’s third largest arms supplier, with cooperation deepening across critical areas such as cybersecurity and missile defense, as well as crucial economic priorities such as agrotechnology and water recycling, both areas in which Israel excels.4 Israel is home to nearly 90,000 Jews of Indian origin, and the country’s new talent visa, meant to fast-track foreign engineers into the tech sector, is targeting a new generation of Indians. In 2017, Netanyahu traveled to India for six days, bringing a delegation of 130 officials and business leaders. Israel has also set its sights on increasing its exports to China, even at the risk of providing sensitive dual-use technologies codeveloped with the United States. Not only has this arrangement caused friction with the US Department of Defense, but China may be passing such technologies onward to Iran, which may use them against Israel. Such a feedback loop is a telltale sign that countries coexist in a common regional security complex—even if they don’t appreciate it.


pages: 537 words: 158,544

Second World: Empires and Influence in the New Global Order by Parag Khanna

Abraham Maslow, Admiral Zheng, affirmative action, anti-communist, Asian financial crisis, Bartolomé de las Casas, Branko Milanovic, British Empire, call centre, capital controls, central bank independence, cognitive dissonance, colonial rule, complexity theory, continuation of politics by other means, crony capitalism, death from overwork, Deng Xiaoping, different worldview, Dissolution of the Soviet Union, Donald Trump, dual-use technology, Edward Glaeser, energy security, European colonialism, export processing zone, facts on the ground, failed state, flex fuel, Francis Fukuyama: the end of history, friendly fire, gentrification, Gini coefficient, global reserve currency, global supply chain, Great Leap Forward, guns versus butter model, haute couture, Hernando de Soto, illegal immigration, income inequality, informal economy, invisible hand, Islamic Golden Age, karōshi / gwarosa / guolaosi, Khyber Pass, Kickstarter, knowledge economy, land reform, Londongrad, low cost airline, low skilled workers, mass immigration, means of production, megacity, meritocracy, military-industrial complex, Monroe Doctrine, Nelson Mandela, no-fly zone, oil shale / tar sands, oil shock, oil-for-food scandal, open borders, open economy, Parag Khanna, Pax Mongolica, Pearl River Delta, pirate software, Plutonomy: Buying Luxury, Explaining Global Imbalances, Potemkin village, price stability, race to the bottom, RAND corporation, reserve currency, restrictive zoning, rising living standards, Robert Solow, Ronald Reagan, Silicon Valley, Skype, South China Sea, special economic zone, stem cell, Stephen Hawking, Suez crisis 1956, Thomas L Friedman, trade route, trickle-down economics, uranium enrichment, urban renewal, Washington Consensus, women in the workforce

Each country has actively sought ways to add value to the other’s products, for example smoothing Brazilian companies’ purchase of textile factories in China in order to share profits. Among such key second-world players, technical exchange is also flourishing outside of Western corporate ownership demands and political concerns over dual-use technologies, with Brazil, for example, sourcing equipment for natural gas extraction from Russia. If Venezuela is forging a second-world energy axis, then Brazil is captain of a second-world trade axis. Brazilian culture is what happens when both mind and body are in a good mood. Unlike in third-world countries where waterfront real estate is often privately owned, there is a sacred equality to beach access along the entire coast, where Brazilians indulge in natural sports of the body such as soccer and volleyball—in contrast to the U.S. preference for sports of body armor like football and NASCAR.


Active Measures by Thomas Rid

1960s counterculture, 4chan, active measures, anti-communist, back-to-the-land, Berlin Wall, Bernie Sanders, bitcoin, Black Lives Matter, call centre, Charlie Hebdo massacre, Chelsea Manning, continuation of politics by other means, cryptocurrency, cuban missile crisis, disinformation, Donald Trump, dual-use technology, East Village, Edward Snowden, en.wikipedia.org, end-to-end encryption, facts on the ground, fake news, Fall of the Berlin Wall, false flag, guest worker program, information security, Internet Archive, Jacob Appelbaum, John Markoff, Julian Assange, kremlinology, Mikhail Gorbachev, military-industrial complex, Norman Mailer, nuclear winter, operational security, peer-to-peer, Prenzlauer Berg, public intellectual, Ronald Reagan, Russian election interference, Silicon Valley, Stewart Brand, technoutopianism, We are Anonymous. We are Legion, Whole Earth Catalog, WikiLeaks, zero day

Online sharing services, especially those with built-in anonymity, were tailor-made for at-scale deception. Dirty tricksters could now reach their target audiences directly. Cryptome, a radical transparency site and in effect the world’s first leak portal, was created in 1996 by the married couple John Young and Deborah Natsios to call attention to dual-use technology. Young had been active on the cypherpunk list, a loose group of technology utopians with an antigovernment, anarchist bent. From West Texas, son of an oil worker, he became an architect in Manhattan and lived on the Upper West Side. Yet for decades, Young operated Cryptome on the tiny budget of less than $2,000 per year.1 His vision was rather romantic: “Cryptome, aspiring to be a free public library, accepts that libraries are chock full of contaminated material, hoaxes, forgeries, propaganda,”2 Young told one interviewer in 2013.


Spies, Lies, and Algorithms by Amy B. Zegart

2021 United States Capitol attack, 4chan, active measures, air gap, airport security, Apollo 13, Bellingcat, Bernie Sanders, Bletchley Park, Chelsea Manning, classic study, cloud computing, cognitive bias, commoditize, coronavirus, correlation does not imply causation, COVID-19, crowdsourcing, cryptocurrency, cuban missile crisis, Daniel Kahneman / Amos Tversky, deep learning, deepfake, DeepMind, disinformation, Donald Trump, drone strike, dual-use technology, Edward Snowden, Elon Musk, en.wikipedia.org, end-to-end encryption, failed state, feminist movement, framing effect, fundamental attribution error, Gene Kranz, global pandemic, global supply chain, Google Earth, index card, information asymmetry, information security, Internet of things, job automation, John Markoff, lockdown, Lyft, Mark Zuckerberg, Nate Silver, Network effects, off-the-grid, openstreetmap, operational security, Parler "social media", post-truth, power law, principal–agent problem, QAnon, RAND corporation, Richard Feynman, risk tolerance, Robert Hanssen: Double agent, Ronald Reagan, Rubik’s Cube, Russian election interference, Saturday Night Live, selection bias, seminal paper, Seymour Hersh, Silicon Valley, Steve Jobs, Stuxnet, synthetic biology, uber lyft, unit 8200, uranium enrichment, WikiLeaks, zero day, zero-sum game

In the twentieth century, economics and security politics were separate spheres because the Soviet-bloc command economies were never part of the global trading order. In the twenty-first century, economics and security politics have become tightly intertwined because of global supply chains and dramatic advances in dual-use technologies like AI that offer game-changing commercial and military applications. Until now, intelligence agencies focused on understanding foreign governments and terrorist groups. Today they also have to understand American tech giants and startups—and how malign actors can use our own inventions against us.


pages: 407

Disrupt and Deny: Spies, Special Forces, and the Secret Pursuit of British Foreign Policy by Rory Cormac

anti-communist, Berlin Wall, British Empire, colonial rule, currency manipulation / currency intervention, disinformation, drone strike, dual-use technology, Edward Snowden, Etonian, fake news, false flag, illegal immigration, land reform, Malacca Straits, Mikhail Gorbachev, operational security, precautionary principle, private military company, Ronald Reagan, Seymour Hersh, Stuxnet, Suez crisis 1956, trade route, union organizing, WikiLeaks, Yom Kippur War

There was less need given that British arms exporters were already closely associated with the establishment.52 SIS operations classically involved allowing authentic private businessmen to enter into relationships with ­hostile countries, before penetrating their networks to gain intelligence.53 At the same time as facilitating arms sales to Tehran, Britain covertly helped arm Iran’s opponent in its war with Iraq. SIS, with the blessing of policymakers, encouraged the export of dual-use technologies to Baghdad (i.e. items that individually were harmless but could become lethal when linked with o ­ thers), despite likely knowing their ultimate military 54 The aim was to keep open channels of information on Iraqi arms purpose. requirements ­provided by an SIS source inside the firm supplying the technology, Matrix Churchill.55 This may have been the tip of a deep and murky iceberg bringing together arms exporters, government, and intelligence.


pages: 568 words: 164,014

Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat by John P. Carlin, Garrett M. Graff

1960s counterculture, A Declaration of the Independence of Cyberspace, Aaron Swartz, air gap, Andy Carvin, Apple II, Bay Area Rapid Transit, bitcoin, Brian Krebs, business climate, cloud computing, cotton gin, cryptocurrency, data acquisition, Deng Xiaoping, disinformation, driverless car, drone strike, dual-use technology, eat what you kill, Edward Snowden, fake news, false flag, Francis Fukuyama: the end of history, Hacker Ethic, information security, Internet of things, James Dyson, Jeff Bezos, John Gilmore, John Markoff, John Perry Barlow, Ken Thompson, Kevin Roose, Laura Poitras, Mark Zuckerberg, Menlo Park, millennium bug, Minecraft, Mitch Kapor, moral hazard, Morris worm, multilevel marketing, Network effects, new economy, Oklahoma City bombing, out of africa, packet switching, peer-to-peer, peer-to-peer model, performance metric, RAND corporation, ransomware, Reflections on Trusting Trust, Richard Stallman, Robert Metcalfe, Ronald Reagan, Saturday Night Live, self-driving car, shareholder value, side project, Silicon Valley, Silicon Valley startup, Skype, Snapchat, South China Sea, Steve Crocker, Steve Jobs, Steve Wozniak, Steven Levy, Stewart Brand, Stuxnet, The Hackers Conference, Tim Cook: Apple, trickle-down economics, Wargames Reagan, Whole Earth Catalog, Whole Earth Review, WikiLeaks, Y2K, zero day, zero-sum game

One of the biggest counterproliferation cases we worked was the years-long pursuit of a merchant named Hsien Tai Tsai, or Alex Tsai, and his Taiwanese companies, Trans Merits and Global Interface. It was a multigenerational family scheme, which also included his wife and his son, Gary Tsai, that saw them attempt to export key dual-use technologies from the United States to Taiwan, falsely declaring that the final user would be Trans Merits when they really intended to move the technology on to North Korea. Alex Tsai had been involved in such export schemes since the 1990s and had been indicted in Taiwan in 2008 for “illegally forging invoices and shipping restricted materials to North Korea.”


pages: 602 words: 177,874

Thank You for Being Late: An Optimist's Guide to Thriving in the Age of Accelerations by Thomas L. Friedman

3D printing, additive manufacturing, affirmative action, Airbnb, AltaVista, Amazon Web Services, Anthropocene, Apple Newton, autonomous vehicles, Ayatollah Khomeini, barriers to entry, Berlin Wall, Bernie Sanders, Big Tech, biodiversity loss, bitcoin, blockchain, Bob Noyce, business cycle, business process, call centre, carbon tax, centre right, Chris Wanstrath, Clayton Christensen, clean tech, clean water, cloud computing, cognitive load, corporate social responsibility, creative destruction, CRISPR, crowdsourcing, data science, David Brooks, deep learning, demand response, demographic dividend, demographic transition, Deng Xiaoping, digital divide, disinformation, Donald Trump, dual-use technology, end-to-end encryption, Erik Brynjolfsson, fail fast, failed state, Fairchild Semiconductor, Fall of the Berlin Wall, Ferguson, Missouri, first square of the chessboard / second half of the chessboard, Flash crash, fulfillment center, game design, gig economy, global pandemic, global supply chain, Great Leap Forward, illegal immigration, immigration reform, income inequality, indoor plumbing, intangible asset, Intergovernmental Panel on Climate Change (IPCC), Internet of things, invention of the steam engine, inventory management, Irwin Jacobs: Qualcomm, Jeff Bezos, job automation, John Markoff, John von Neumann, Khan Academy, Kickstarter, knowledge economy, knowledge worker, land tenure, linear programming, Live Aid, low interest rates, low skilled workers, Lyft, Marc Andreessen, Mark Zuckerberg, mass immigration, Maui Hawaii, Menlo Park, Mikhail Gorbachev, mutually assured destruction, Neil Armstrong, Nelson Mandela, ocean acidification, PalmPilot, pattern recognition, planetary scale, power law, pull request, Ralph Waldo Emerson, ransomware, Ray Kurzweil, Richard Florida, ride hailing / ride sharing, Robert Gordon, Ronald Reagan, Salesforce, Second Machine Age, self-driving car, shareholder value, sharing economy, Silicon Valley, Skype, smart cities, Solyndra, South China Sea, Steve Jobs, subscription business, supercomputer in your pocket, synthetic biology, systems thinking, TaskRabbit, tech worker, TED Talk, The Rise and Fall of American Growth, Thomas L Friedman, Tony Fadell, transaction costs, Transnistria, uber lyft, undersea cable, urban decay, urban planning, Watson beat the top human players on Jeopardy!, WikiLeaks, women in the workforce, Y2K, Yogi Berra, zero-sum game

The most popular method, CRISPR, has been revolutionizing scientific research, leading to novel animals and crops, and is likely to power a new generation of gene treatments for serious diseases. It is gene editing’s relative ease of use that worries the U.S. intelligence community, according to the assessment.” Clapper’s report said: “Given the broad distribution, low cost, and accelerated pace of development of this dual-use technology, its deliberate or unintentional misuse might lead to far-reaching economic and national security implications.” No Known Home Address It is not just the fact that individual breakers can now do more damage more cheaply and more easily that is so unnerving. It’s that they no longer need a traditional organization to arm or direct them—an organization that can be tracked and destroyed by police or armies.


pages: 611 words: 188,732

Valley of Genius: The Uncensored History of Silicon Valley (As Told by the Hackers, Founders, and Freaks Who Made It Boom) by Adam Fisher

adjacent possible, Airbnb, Albert Einstein, AltaVista, An Inconvenient Truth, Andy Rubin, AOL-Time Warner, Apple II, Apple Newton, Apple's 1984 Super Bowl advert, augmented reality, autonomous vehicles, Bill Atkinson, Bob Noyce, Brownian motion, Buckminster Fuller, Burning Man, Byte Shop, circular economy, cognitive dissonance, Colossal Cave Adventure, Computer Lib, disintermediation, Do you want to sell sugared water for the rest of your life?, don't be evil, Donald Trump, Douglas Engelbart, driverless car, dual-use technology, Dynabook, Elon Musk, Fairchild Semiconductor, fake it until you make it, fake news, frictionless, General Magic , glass ceiling, Hacker Conference 1984, Hacker Ethic, Henry Singleton, Howard Rheingold, HyperCard, hypertext link, index card, informal economy, information retrieval, Ivan Sutherland, Jaron Lanier, Jeff Bezos, Jeff Rulifson, John Markoff, John Perry Barlow, Jony Ive, Kevin Kelly, Kickstarter, knowledge worker, Larry Ellison, life extension, Marc Andreessen, Marc Benioff, Mark Zuckerberg, Marshall McLuhan, Maui Hawaii, Menlo Park, Metcalfe’s law, Mondo 2000, Mother of all demos, move fast and break things, Neal Stephenson, Network effects, new economy, nuclear winter, off-the-grid, PageRank, Paul Buchheit, paypal mafia, peer-to-peer, Peter Thiel, pets.com, pez dispenser, popular electronics, quantum entanglement, random walk, reality distortion field, risk tolerance, Robert Metcalfe, rolodex, Salesforce, self-driving car, side project, Silicon Valley, Silicon Valley startup, skeuomorphism, skunkworks, Skype, Snow Crash, social graph, social web, South of Market, San Francisco, Startup school, Steve Jobs, Steve Jurvetson, Steve Wozniak, Steven Levy, Stewart Brand, Susan Wojcicki, synthetic biology, Ted Nelson, telerobotics, The future is already here, The Hackers Conference, the long tail, the new new thing, Tim Cook: Apple, Tony Fadell, tulip mania, V2 rocket, We are as Gods, Whole Earth Catalog, Whole Earth Review, Y Combinator

The thought was that if people could make recordings of television programs in their home, then “Oh my gosh, that’s it, we’re done!” And so the studios sued Sony, and it took seven years actually, but it went up to the Supreme Court. The decision there was, “Yes, this particular technology can be used to infringe copyright, there’s no question about it. It also has a lot of beneficial uses, and when we’re facing these dual-use technologies, we’re going to err on the side of protecting the new technology.” In the Betamax case they found that Sony was not liable for contributory infringement by manufacturing VCRs that had Record buttons on them. That was really the fundamental theory of why Napster was not liable for contributory infringement.


pages: 651 words: 186,130

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth

4chan, active measures, activist lawyer, air gap, Airbnb, Albert Einstein, Apollo 11, barriers to entry, Benchmark Capital, Bernie Sanders, Big Tech, bitcoin, Black Lives Matter, blood diamond, Boeing 737 MAX, Brexit referendum, Brian Krebs, Citizen Lab, cloud computing, commoditize, company town, coronavirus, COVID-19, crony capitalism, crowdsourcing, cryptocurrency, dark matter, David Vincenzetti, defense in depth, digital rights, disinformation, don't be evil, Donald Trump, driverless car, drone strike, dual-use technology, Edward Snowden, end-to-end encryption, failed state, fake news, false flag, Ferguson, Missouri, Firefox, gender pay gap, George Floyd, global pandemic, global supply chain, Hacker News, index card, information security, Internet of things, invisible hand, Jacob Appelbaum, Jeff Bezos, John Markoff, Ken Thompson, Kevin Roose, Laura Poitras, lockdown, Marc Andreessen, Mark Zuckerberg, mass immigration, Menlo Park, MITM: man-in-the-middle, moral hazard, Morris worm, move fast and break things, mutually assured destruction, natural language processing, NSO Group, off-the-grid, offshore financial centre, open borders, operational security, Parler "social media", pirate software, purchasing power parity, race to the bottom, RAND corporation, ransomware, Reflections on Trusting Trust, rolodex, Rubik’s Cube, Russian election interference, Sand Hill Road, Seymour Hersh, Sheryl Sandberg, side project, Silicon Valley, Skype, smart cities, smart grid, South China Sea, Steve Ballmer, Steve Bannon, Steve Jobs, Steven Levy, Stuxnet, supply-chain attack, TED Talk, the long tail, the scientific method, TikTok, Tim Cook: Apple, undersea cable, unit 8200, uranium enrichment, web application, WikiLeaks, zero day, Zimmermann PGP

Named for the Dutch town where the arrangement was originally signed in 1996, the Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies was designed to replace the previous set of Cold War norms used by Western states to keep weapons and military technology from making their way to Russia, China, and their communist satellites. Wassenaar’s goal was to control the sale of conventional weapons systems and dual-use technologies—sophisticated computers, centrifuges, drones—from reaching despots in Iran, Iraq, Libya, and North Korea. Its original signatories included the United States and forty-one other countries, including most of Europe, Argentina, Australia, Canada, India, Japan, Mexico, New Zealand, Russia, South Africa, South Korea, Switzerland, Turkey, Ukraine, and the United Kingdom, and though the arrangement is nonbinding, member-states agree to establish and enforce their own domestic laws to control the sale of items on Wassenaar’s control list, which they update every December.


pages: 743 words: 201,651

Free Speech: Ten Principles for a Connected World by Timothy Garton Ash

"World Economic Forum" Davos, A Declaration of the Independence of Cyberspace, Aaron Swartz, activist lawyer, Affordable Care Act / Obamacare, Andrew Keen, Apple II, Ayatollah Khomeini, battle of ideas, Berlin Wall, bitcoin, British Empire, Cass Sunstein, Chelsea Manning, citizen journalism, Citizen Lab, Clapham omnibus, colonial rule, critical race theory, crowdsourcing, data science, David Attenborough, digital divide, digital rights, don't be evil, Donald Davies, Douglas Engelbart, dual-use technology, Edward Snowden, Etonian, European colonialism, eurozone crisis, Evgeny Morozov, failed state, Fall of the Berlin Wall, Ferguson, Missouri, Filter Bubble, financial independence, Firefox, Galaxy Zoo, George Santayana, global village, Great Leap Forward, index card, Internet Archive, invention of movable type, invention of writing, Jaron Lanier, jimmy wales, John Markoff, John Perry Barlow, Julian Assange, Laura Poitras, machine readable, machine translation, Mark Zuckerberg, Marshall McLuhan, Mary Meeker, mass immigration, megacity, mutually assured destruction, national security letter, Nelson Mandela, Netflix Prize, Nicholas Carr, obamacare, Open Library, Parler "social media", Peace of Westphalia, Peter Thiel, power law, pre–internet, profit motive, public intellectual, RAND corporation, Ray Kurzweil, Ronald Reagan, semantic web, Sheryl Sandberg, Silicon Valley, Simon Singh, Snapchat, social graph, Stephen Fry, Stephen Hawking, Steve Jobs, Steve Wozniak, Streisand effect, technological determinism, TED Talk, The Death and Life of Great American Cities, The Wisdom of Crowds, Tipper Gore, trolley problem, Turing test, We are Anonymous. We are Legion, WikiLeaks, World Values Survey, Yochai Benkler, Yom Kippur War, yottabyte

All these companies have legal and PR departments which will send you long emails or letters (as SiemensNokia did to me on one occasion) explaining how the story was not exactly as reported and the products are no different from those they supply to Western networks.43 But while these often are ‘dual use’ technologies, deployed for less oppressive purposes in democracies, the companies know perfectly well the kind of regimes they are dealing with. Selling a sharp knife to a fisherman is not the same as selling a sharp knife to a murderer. After the first popular rising of the Arab Spring took place in Tunisia, the head of the country’s Internet Agency revealed that, under the ancien régime of Zine el Abidine Ben Ali, several Western companies had used the agency as a testing ground for internet censorship technologies which they might then sell to other friendly dictators.44 When the Arab Spring came to Egypt, protesters found documents showing how the British-based Gamma Group had offered to sell a spyware programme called FinFisher to the military security state of Hosni Mubarak.


Four Battlegrounds by Paul Scharre

2021 United States Capitol attack, 3D printing, active measures, activist lawyer, AI winter, AlphaGo, amateurs talk tactics, professionals talk logistics, artificial general intelligence, ASML, augmented reality, Automated Insights, autonomous vehicles, barriers to entry, Berlin Wall, Big Tech, bitcoin, Black Lives Matter, Boeing 737 MAX, Boris Johnson, Brexit referendum, business continuity plan, business process, carbon footprint, chief data officer, Citizen Lab, clean water, cloud computing, commoditize, computer vision, coronavirus, COVID-19, crisis actor, crowdsourcing, DALL-E, data is not the new oil, data is the new oil, data science, deep learning, deepfake, DeepMind, Demis Hassabis, Deng Xiaoping, digital map, digital rights, disinformation, Donald Trump, drone strike, dual-use technology, Elon Musk, en.wikipedia.org, endowment effect, fake news, Francis Fukuyama: the end of history, future of journalism, future of work, game design, general purpose technology, Geoffrey Hinton, geopolitical risk, George Floyd, global supply chain, GPT-3, Great Leap Forward, hive mind, hustle culture, ImageNet competition, immigration reform, income per capita, interchangeable parts, Internet Archive, Internet of things, iterative process, Jeff Bezos, job automation, Kevin Kelly, Kevin Roose, large language model, lockdown, Mark Zuckerberg, military-industrial complex, move fast and break things, Nate Silver, natural language processing, new economy, Nick Bostrom, one-China policy, Open Library, OpenAI, PalmPilot, Parler "social media", pattern recognition, phenotype, post-truth, purchasing power parity, QAnon, QR code, race to the bottom, RAND corporation, recommendation engine, reshoring, ride hailing / ride sharing, robotic process automation, Rodney Brooks, Rubik’s Cube, self-driving car, Shoshana Zuboff, side project, Silicon Valley, slashdot, smart cities, smart meter, Snapchat, social software, sorting algorithm, South China Sea, sparse data, speech recognition, Steve Bannon, Steven Levy, Stuxnet, supply-chain attack, surveillance capitalism, systems thinking, tech worker, techlash, telemarketer, The Brussels Effect, The Signal and the Noise by Nate Silver, TikTok, trade route, TSMC

And the U.S. government is taking action to ensure that when U.S.-China tech cooperation occurs, it does so on a level playing field, not one where China engages in rampant espionage and intellectual property theft. In 2018, the Commerce Department Bureau of Industry and Security requested public comment on possible export controls for a range of dual-use technologies, including AI and machine learning. In 2020, the Commerce Department tightened export controls around businesses linked to the Chinese military, and the Defense Department began publishing a list of PLA-affiliated companies. These efforts were an attempt to drive a wedge between military-civil fusion, or at least ensure U.S. businesses aren’t actively facilitating it.


pages: 795 words: 212,447

Dead or Alive by Tom Clancy, Grant (CON) Blackwood

active measures, affirmative action, air freight, airport security, Bay Area Rapid Transit, Benoit Mandelbrot, defense in depth, dual-use technology, failed state, false flag, friendly fire, Google Earth, Panamax, post-Panamax, Skype, uranium enrichment, urban sprawl

Like the tent itself, which had been manufactured in Malaysia based on specifications stolen from the online curriculum for Fort Leonard Wood’s Operational Radiation Safety (OPRAD) course, the component parts had been laser-milled and lathed in Morocco-based Ukrainian schematics. The beauty of simplicity, Musa thought. Each of the device’s components was born either from benign dual-use technology or from plans that had long ago been discontinued, considered obsolete according to modern standards. The component he and his team had recovered existed only because of what most environmental groups considered Russia’s lax attitude toward nuclear material, but Musa knew that was only part of the equation, the others being the Russian government’s love affair with innovative nuclear-power programs and its tendency toward circumspection when it came to telling the world about those programs.


pages: 1,800 words: 596,972

The Great War for Civilisation: The Conquest of the Middle East by Robert Fisk

Albert Einstein, Ayatollah Khomeini, Berlin Wall, Boycotts of Israel, bread and circuses, British Empire, call centre, clean water, colonial rule, cuban missile crisis, disinformation, dual-use technology, Farzad Bazoft, friendly fire, Howard Zinn, IFF: identification friend or foe, invisible hand, Islamic Golden Age, Khartoum Gordon, Khyber Pass, land reform, Mahatma Gandhi, Mikhail Gorbachev, music of the spheres, no-fly zone, Oklahoma City bombing, Ronald Reagan, Seymour Hersh, Suez canal 1869, Suez crisis 1956, the market place, Thomas L Friedman, Timothy McVeigh, Transnistria, unemployed young men, uranium enrichment, Yom Kippur War

Now we were being told—if Blair was telling us the truth—that the price was not worth it. The purchase bought with the lives of hundreds of thousands of children wasn’t worth a dime. For the Blair “dossier” was telling us that, despite sanctions, Saddam was able to go on building weapons of mass destruction. All that nonsense about dual-use technology, the ban on children’s pencils—graphite could have a military use—and our refusal to allow Iraq to import equipment to restore the water-treatment plants that we bombed in the Gulf War, was a sham. This grievous conclusion was the only moral one to be drawn from the sixteen pages that supposedly detailed the chemical, biological and nuclear horrors that the Beast of Baghdad had in store for us.