yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

How Drones are Like Viruses (and Vice-Versa) | Big Think


3m read
·Nov 4, 2024

There's been an enormous amount of changing forces on warfare in the twenty-first century. And they range from new actors in war, like private contractors, the black waters of the world, to the growth of warlord and child soldier groups, to technologic shifts. The introduction of robotics to cyber.

And one of the interesting things that ties these together is how not only the who of war is being expanded but also the where and the when. So one of the things that links, for example, drones and robotics with cyber weapons is that you're seeing a shift in both the geographic location of the human role. Humans are still involved. We're not in the world of the Terminator. Humans are still involved, but there's been a geographic shift where the operation can be happening in Pakistan, but the person flying the plane might be back in Nevada, 7,000 miles away.

Or on the cyber side, where the software might be hitting Iranian nuclear research centrifuges, like what Stuxnet did, but the people who designed it and decided to send it are, again, thousands of miles away. And in that case, it was a combined U.S./Israeli operation. One of the next steps in this, both with the physical side of robotics and the software side of cyber, is a shift in that human role -- not just geographically but chronologically, where the humans are still making decisions, but they're sending the weapon out in the world to then make its own decisions as it plays out there.

In robotics, we think about this as autonomy. With Stuxnet, it was a weapon. It was a weapon like anything else in history, you know, a stone, a drone -- it caused physical damage. But it was sent out in the world on a mission in a way no previous weapon has done. Go out, find this one target, and cause harm to that target and nothing else. And so it plays out over a matter of, you know, Stuxnet plays out over a series of time.

It also is interesting because it's the first weapon that can be both here, there, everywhere, and nowhere. Unlike a stone. Unlike a drone. It's not a thing and so that software is hitting the target, those Iranian nuclear research facilities, but it also pops up in 25,000 other computers around the world. That's actually how we discover it, how we know about it.

The final thing that makes this interesting is it introduces a difficult ethical wrinkle. On one hand, we can say this may have been the first ethical weapons ever developed. Again, whether we're talking about the robots or Stuxnet, they can be programmed to do things that we would describe as potentially ethical. So Stuxnet could only cause harm to its intended target. Yet, it popped up in 25,000 computers around the world, but it could only harm the ones with this particular setup, this particular geographic location of doing nuclear research.

In fact, even if you had nuclear centrifuges in your basement, it still wouldn't harm them. It could only hit those Iranian ones. Wow, that's great, but as the person who discovered it, so to speak, put it, "It's like opening Pandora's box." And not everyone is going to program it that way with ethics in mind.

More Articles

View All
Emily Weiss on the Insights That Grew Glossier - With Amy Buechler at the Female Founders Conference
I am Aimee Beger from Y Combinator, and I have the distinct pleasure of introducing Emily Weiss here. Thank you so much for joining us. Emily: Thank you for having me! So, did you see everybody? So, Emily, you founded two brands that have a pretty beaut…
Weak acid equilibria | Acids and bases | AP Chemistry | Khan Academy
Before we get into the topic of weak acid equilibria, let’s look at a strong acid first. So let’s say that H A is a strong acid and reacts with water to produce the hydronium ion and A minus, the conjugate base. 2H A—technically, the reaction comes to an…
Electron configurations with the periodic table | Chemistry | Khan Academy
Let’s explore electronic configurations. It’s basically arranging electrons of different elements in various shells and subshells. Let me quickly show you some examples. Yes, this will look overwhelming, but for now, focus on these numbers: 1, 2, 3, 4, 5,…
Warren Buffett Interview - India
For the first time in India and exclusively in NDTV Studios, the man who is better than any other at making money and giving it away, Business School shooters, please welcome Warren Buffett. [Music] Well, there are times in your life when you are really…
15 Expensive Things That Are NOT Worth the Money
You dream about becoming rich so you can afford everything you ever wanted, only to find out that you hate having to take care of so many things. Most expensive things are just a clever way to separate rich people from their money. If last Sunday, we look…
HTTP and HTML | Internet 101 | Computer Science | Khan Academy
I’m Jasine Lawrence, and I’m a program manager on the Xbox One engineering team. One of our biggest features is called Xbox Live. It’s an online service that connects gamers from all around the world, and we rely on the internet to make that happen. This …