yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

How Drones are Like Viruses (and Vice-Versa) | Big Think


3m read
·Nov 4, 2024

There's been an enormous amount of changing forces on warfare in the twenty-first century. And they range from new actors in war, like private contractors, the black waters of the world, to the growth of warlord and child soldier groups, to technologic shifts. The introduction of robotics to cyber.

And one of the interesting things that ties these together is how not only the who of war is being expanded but also the where and the when. So one of the things that links, for example, drones and robotics with cyber weapons is that you're seeing a shift in both the geographic location of the human role. Humans are still involved. We're not in the world of the Terminator. Humans are still involved, but there's been a geographic shift where the operation can be happening in Pakistan, but the person flying the plane might be back in Nevada, 7,000 miles away.

Or on the cyber side, where the software might be hitting Iranian nuclear research centrifuges, like what Stuxnet did, but the people who designed it and decided to send it are, again, thousands of miles away. And in that case, it was a combined U.S./Israeli operation. One of the next steps in this, both with the physical side of robotics and the software side of cyber, is a shift in that human role -- not just geographically but chronologically, where the humans are still making decisions, but they're sending the weapon out in the world to then make its own decisions as it plays out there.

In robotics, we think about this as autonomy. With Stuxnet, it was a weapon. It was a weapon like anything else in history, you know, a stone, a drone -- it caused physical damage. But it was sent out in the world on a mission in a way no previous weapon has done. Go out, find this one target, and cause harm to that target and nothing else. And so it plays out over a matter of, you know, Stuxnet plays out over a series of time.

It also is interesting because it's the first weapon that can be both here, there, everywhere, and nowhere. Unlike a stone. Unlike a drone. It's not a thing and so that software is hitting the target, those Iranian nuclear research facilities, but it also pops up in 25,000 other computers around the world. That's actually how we discover it, how we know about it.

The final thing that makes this interesting is it introduces a difficult ethical wrinkle. On one hand, we can say this may have been the first ethical weapons ever developed. Again, whether we're talking about the robots or Stuxnet, they can be programmed to do things that we would describe as potentially ethical. So Stuxnet could only cause harm to its intended target. Yet, it popped up in 25,000 computers around the world, but it could only harm the ones with this particular setup, this particular geographic location of doing nuclear research.

In fact, even if you had nuclear centrifuges in your basement, it still wouldn't harm them. It could only hit those Iranian ones. Wow, that's great, but as the person who discovered it, so to speak, put it, "It's like opening Pandora's box." And not everyone is going to program it that way with ethics in mind.

More Articles

View All
What Was Black Sunday? | The Long Road Home
We got the intel brief we got about 30 days before we left. Said that you’re going to the safest place in Iraq. In April 2004, one year after the fall of Saddam Hussein, Iraq was controlled by a US-led transitional government. This period marked a relati…
Introduction to price elasticity of supply | APⓇ Microeconomics | Khan Academy
We’ve done many videos on the price elasticity of demand. Now we’re going to focus on the price elasticity of supply, and it’s a very similar idea; it’s just being applied to supply. Now, it’s a measure of how sensitive our quantity supplied is to percen…
Free-Tailed Bats: On Location | Hostile Planet
Humans and animals are hardwired to endure, and that includes our “Hostile Planet” crew who had to go through so much to bring you this incredible footage. RENEE GODFREY: We were filming the bat sequence in New Mexico in the middle of the baking hot dese…
Why Warren Buffett Says Consumer Behavior Is Key to Investing | Berkshire 2024 (MUST WATCH)
Stefan WB: My name is Stefan WB. I am a shareholder from Hur Hur Germany. My question to Warren: your favorite holding period is forever holding American Express or Coca-Cola for decades. Berkshire recently went in and out of Marquel, and you, uh, I belie…
Adding two digit numbers on a number line
We’re told that Cara had a tower with 42 blocks. She added 12 red blocks, 14 more blue blocks, and 16 purple blocks. So, what we want to do in this video is think about how many total blocks Cara now has. To help us with that, we are going to set up a lit…
Camo Sharks: Breaching Test | SharkFest | National Geographic
RYAN JOHNSON: One of the most important tests that we’re going to do is the breaching test. GIBBS KUGURU: Breaching is sort of this ambush attack. They need speed, power, stealth. RYAN JOHNSON: This is when we’re going to be able to measure the color of…