We herewith acknowledge that digital technologies have great potential to significantly contribute to solutions of major global problems (including health- and sustainability related ones). They are also fueling innovation and new economic sectors. Many documents have covered this, and have described the business value and societal benefits.
This document, in contrast, will try to give an overview of threats and undesired side effects of digital technologies, highlight potential misuses, dual uses, systemic risks, and potential accidents. As it turns out, the damage may be large-scale and perhaps even bigger than the damage that classical weapons may cause. It is not clear whether our societies are well prepared to avoid or handle these risks. Many of the side effects (such as impacts on democracy and human rights) may be hard to quantify and become visible only with considerable delays.
Furthermore note that, to non-insiders, some of the following may read a bit like science fiction. However, considering that the digital revolution accelerates exponentially and that military technology in some countries is decades ahead of publicly known business applications, it must be assumed that most of the technological developments discussed below are not just future possibilities, but do already exist, which calls for proper governance.
It is well-known that the digital revolution is highly disruptive. It concerns not only business models, but transforms entire areas of society, which were formerly separated and managed according to different values, goals, and principles. Now, digital technologies are being used to re-invent more or less everything, and all sectors of society. They are pervasive and fuel disruptive innovations everywhere.
It must also be considered that data volumes and processing power have increased dramatically. Systems have also become much more connected, and are organized as networks of networks. While this implies many benefits, it also introduces new vulnerabilities, such as systemic failures due to cascading effects (e.g. blackouts).[1]
Let us now shortly address various challenges that are emerging or already around. Given the page limits of this case study, we will keep well-known issues short, while reflecting less well-known problems in greater detail.
Big Data and Data-Driven Society
By now it has become common to manage many systems in a “data-driven” way, using Big Data and real-time analytics. The quality of the resulting solutions, however, depends on the quality of the data and the ability to turn data into information, knowledge, and wisdom. This is often complicated by issues such as the following:[2]
● Exact measurements “are obstructed by “biases, randomness, turbulence, … chaos theory, … quantum mechanics, … undecidability …, and overfitting, to mention just some of the problems… Given the classification problem[s] of false positives, there are even cases where results deteriorate [when more measurements are made]”.[3]
● Classification errors (such as “false positive” and “false negatives”) are a widespread problem in statistical analyses, not just in case of data samples that are biased (i.e. non-representative). In case of predictive policing algorithms, for example, the “false positive” rate is often above 90%.
● Many patterns in the data are insignificant and meaningless. They show up only by coincidence. Therefore, the risk of “overfitting” is serious.
● Correlations do not necessarily mean causation, and even if causation is given, it is often difficult to determine whether A causes B, B causes A, or a third factor C causes A and B.
● Parameter fitting is only possible with a finite accuracy, but slightly different parameters may lead to largely different outcomes, as phenomena such as deterministic chaos, turbulence, and the related “butterfly effect” illustrate. In such cases, the “sensitivity” of the model can be a problem.
● A good fit to a dataset does not yet mean a validated model. This requires to test the model with different datasets without re-adjusting parameters. Only validated models, however, can be assumed to have meaningful implications for different settings or to predict future developments to some extent.
● Sensitive models are not very suitable to predict the future. They imply a high degree of uncertainty. (Still, they may reveal the instability of a system, which can be also important to know.)
● Complex, networked systems often imply “wicked problems” and unexpected behaviors. Moreover, large variations (including “black swans”) may occur more often than statistically expected based on a normal distribution.
Digital “Crystal Ball”
Despite the issues mentioned above, large IT companies are increasingly using Big Data to model real-world processes and systems. With massive surveillance, one even tries to produce something like a digital “Crystal Ball”. In fact, this is what Palantir, for example, is aiming to do.[4] However, there are also other companies, such as Recorded Future (apparently a spin-off of Google and the CIA).[5] It seems that the World Economic Forum (WEF) has similar infrastructures.[6] These may not only perform real-time analytics of what happens in almost any place in the world (“nowcasting”), but also try to predict the future (“forecasting”). The military has certainly built a “prediction machine” as well.[7]
Artificial Intelligence
While Big Data is often being called the “new oil of the digital age”, the “digital motor” running on it is Artificial Intelligence, which is based on machine learning algorithms.
Machine learning models today may aim to learn millions or even billions of parameters, or more. However, the interactions between the system elements are often poorly represented (even in times of the Internet of Things). Besides, (slow or lack of) convergence of the learning algorithms may be an issue, particularly in dynamically changing environments. This can produce a bad system representation or wrong forecasts.
Surprisingly, simpler models can often have more predictive power than complicated ones (as the above issue of “over-fitting” illustrates). Overall, one can say by now that Big Data has not made “the scientific method obsolete”, in contrast to what was famously assumed by Chris Anderson.[8] According to today’s knowledge, there are fundamental limits to the accuracy of modelling complex dynamical systems such as climate, life, behavior, or health.
A further frequent criticism of AI algorithms is that they are like “black boxes”.[9] In other words, it is often not understandable how they come to their conclusions. In fact, as recent studies on discrimination of minorities, women, and people of color[10] have shown, outcomes of AI systems need to be questioned. To counter these issues, huge efforts are now being made to work on trustable, explainable, and fair AI.
Surveillance Capitalism
All around the world, the collection of data has become a lucrative opportunity. Two kinds of systems are typically distinguished: (1) societies with state-based surveillance and control (such as China), (2) societies, where surveillance is assumed to be carried out mainly through corporations (as in the USA). While labels such as “technological totalitarianism” are often used for the former, the term “surveillance capitalism” represents mainly the latter.[11]
Surveillance capitalism is perhaps best characterized by the following quote of Eric Schmidt, the former Google CEO:[12]
“With your permission, you give us more information about you, about your friends, and we can improve the quality of our searches. We don't need you to type at all. We know where you are. We know where you've been. We can more or less know what you're thinking about.”
Both, surveillance capitalism and state-run digital societies, imply dangers for human rights and human dignity, in particular for privacy. However, it does not stop there. Typical additional features are profiling, scoring, and targeting, as will be discussed below. Overall, these developments are increasingly seen as potential threats to democracies. In particular, terms such as “data dictatorship” try to warn of the dangers of data-driven behavioral manipulation (see below).
War Room Approach
The management or control of systems, based on huge amounts of data, is typically done through a control room, also often called a “war room” (which may utilize the “crystal ball” approach mentioned above). This approach is used not only by secret services and the military, but increasingly also for the operation of modern companies, supply chains, and smart cities.
A data-driven, “technocratic” approach, however, has some limitations. For example, while production facilities may maximize a certain goal function, cities and societies have multiple competitive goals, which must all be addressed simultaneously to ensure a thriving social system. If one wanted to optimize the future of planet Earth with technical means, however, one would have to choose a goal function, even though there is no science to determine the right one. For example, should it be GDP per capita, sustainability, life expectancy, or quality of life? Whatever goal function is chosen, it will (have to) map the complexity of the system to a one-dimensional function, which will oversimplify the system and neglect secondary and tertiary goals. Therefore, sooner or later one would end up having new kinds of trouble. Hence, running a society based on the paradigm of a data-empowered “benevolent dictator” is expected to perform poorly.[13]
A “military-style”, centralized top-down control approach would also undermine democracy, which is based on principles such as diversity, participation and collective intelligence. Due to the plurality of goals, cities and societies should, in fact, neither be run like businesses nor machines. A co-evolutionary approach may outperform optimization, and a coordination approach may outcompete control.[14]
To illustrate the dangers of optimization, let us assume an AI system that would be tasked to make the world sustainable. What if it concluded that the easiest way to reach sustainability would be depopulation, even though a better future might exist for the people of the world? This could trigger a horrible scenario (see below). To avoid such problems, it has been demanded that “war rooms” be turned into “peace rooms”.[15]
It is also important to consider that “evidence-based” decision-making can mean two things: “fact-based” (determined via established scientific methods of verification and falsification) or “data-driven” (based on measurement or estimates, projections, or forecasts). The two are often not the same, but the former approach is increasingly replaced by the latter. This creates new risks: A data-driven approach may be vulnerable to misinterpretation and bias (see above), but also to manipulation or deception. For example, many political decisions in response to Covid-19 were based on data or even on predicted data (in fact, often on forecasts, which never materialized).[16]
This could have caused various counter-productive results. Furthermore, a data-driven approach is prone to hacking.
Cyber Threats (Cyber Vulnerability)
This paragraph is kept short, as the subject of “cyber threats” has already received a lot of attention in recent years. New issues, however, arise, when adversaries use powerful AI for their attacks, for example, to discover security gaps that can be used for “zero day exploits”.
Due to the exponential (or even faster) increase in cyber risks and personalized propaganda, some people think the way the Internet is organized is now too vulnerable and outdated. According to them, the current Internet should be replaced by a satellite-based system,[17] probably combined with quantum-encryption. This might reduce possibilities to manipulate Internet contents and compromise data communication a lot. However, it would also imply a large degree of control over a big share of information, by very few people, who will not necessarily act in the best interest of all people. Also note that we may also see light-based communication (LiFi), soon, which has much higher data transmission rates.
Profiling and Digital Doubles
Both, companies and governments are collecting increasing amounts of data about individuals. This process is called “profiling”, i.e. the creation of personal profiles. These profiles are producing ever more detailed representations of people, objects, and planet Earth. As the degree of detail increases, one speaks of “avatars” (animated representations) or even “digital twins” (which assume that all relevant characteristics of the system of interest are being digitally reproduced).[18] Such digital twins are being envisaged, for example, for companies and cities, but also the entire planet, its inhabitants, their behaviors, health, bodies, and personalities. Clearly, this implies huge privacy issues, but not only. It makes everyone vulnerable to “hacking” (e.g. of emotions, thinking, behavior, and/or health; see below for more details).
World Simulation
The avatars and digital doubles would not only be data collections. Their behavior would also be simulated and animated. That is, they would have a virtual life, which would allow for digital “what … if” experiments, before a particular implementation is chosen. One such platform created for “world simulation” is called “Sentient World”.[19] It has been used to produce a “military second Earth”[20] and is perhaps the main reason for the mass surveillance revealed by Wikileaks (CIA Vault 7) and Edward Snowden (NSA).[21] The platform seems to go back to Fortune 500 companies, who are using it for their strategic planning.[22]
However, “Sentient World” is apparently also being used to plan war operations and perform psychological operations (PsyOps), potentially also in peace times. (The way politics and the public think and talk about Covid-19 might be an example.) The tool should further be seen in the context of the controversial Information Dominance strategy,[23] which seems to include the problematic concept of “Mind War”.
Attention Economy and Nudging
In an information-rich age, it has been claimed that the shortest resource may actually not be money, but attention. Who manages to catch our attention has the chance to influence our emotions, thinking and behavior. As only a small fraction of information is consciously processed, we may also be manipulated in a subliminal way, for example by “nudging”.[24]
While people are on the Internet or social media platforms, they are constantly being exposed to nudges and advertisements. In the system of “surveillance capitalism”, there is an auction-based market for such ads. In other words, everyone can bid to get the attention of Internet users. This does not only consume a lot of their time. It also absorbs a lot of intellectual capacity that would probably better be used to solve the world’s existential problems.
Censorship and Propaganda
Attention economics (specifically the approach to absorb a great share of the attention capacity) can also be used for new forms of censorship and propaganda. Most search engines, social media and Internet-based services are now personalized. This means that algorithms increasingly decide what offer someone receives and what information he or she sees. Algorithms also determine how many people see what kind of information, and who is to see what. In this way, it is possible to determine where and how far certain information spreads. This fact can be used to make some kinds of information (e.g. confidential or sensitive information) virtually invisible (even without deleting it), or to amplify other kinds of information.
Conformity and Distraction
In conclusion, the methods mentioned before can be used for distraction (which is why social media have also been called “weapons of mass distraction”). However, they can also be used to promote (forced) consensus (“Gleichschaltung”). Both ways of “social engineering” of communities (promoting cooperation and convergence or conflict and divergence) have been reported (namely in Edward Snowden’s JTRIG revelations[25]).
Note that the promotion of a single perspective can undermine diversity and pluralism, which are important preconditions for innovation, societal resilience, collective intelligence, and democracies.
Hate Speech
The promotion of hate speech has a toxic effect, as it undermines trust, solidarity, and the coherence of a community. Such a “divide et impera” strategy can undermine the basis of any society. One might even talk about sedition (“Zersetzung”). Hate speech tends to spread, because it tends to get more attention. It emotionalizes exchange on the Internet and thereby makes people spend more time on social media platforms, which is of commercial interest. Note that a lot of hate speech comes from troll farms. Social bots and language-generating AI systems such as GPT-3 may contribute to the problem.
Assuming always bad intent, however, gives an incomplete picture. Some digital visionaries seem to believe that it is right to decompose society into its “atoms”, the individuals”. This makes it easier to manipulate the behavior of people, using Artificial Intelligence. In perspective, society would become a system, in which Artificial Intelligence – superintelligent or not – would control the thinking, emotions, behaviors, and lives of individuals. For further details see, for example, the sections on “targeting” and “transhumanism”.
Fake News and Disinformation
Overall, the attention economy makes it difficult to determine facts and to focus on them. This undermines education, science, and dialogue, hence, the basis of modern democratic societies, which believe in learning, insight, truth, enlightenment and a responsible, self-determined life. It also creates new information asymmetries and, based on the principle of “knowledge is power”, advantages for a small new digital elite. If this problem is not addressed, soon, democracies may give way to a new kind of digitally based feudalism.
Targeting and Behavioral Manipulation
When nudging is combined with Big Data to personalize nudges, this is called “big nudging”.[26] The method is being used not only by military propaganda, but also for commercial “neuromarketing”.[27]
A major share of Artificial Intelligence capacity today is being used for behavioral manipulation. It might also be misused to manipulate democratic elections, which has been claimed for the Brexit vote and US elections 2016. As Cambridge Analytica insiders have revealed, this military-style propaganda method has apparently been used in about 65 countries.[28] Moreover, it appears these methods are being used to shape political systems not only during elections. They are probably being applied as well to “socially engineer” societies during peace times on an everyday basis.[29]
Citizen Scores and Behavioral Control
Besides profiling and targeting, the instruments of digital societies include also the use of citizen scores. Multiple scores are in use. They encompass, for example, the “customer lifetime value’ and the “social credit score” in China,[30] which bears similarities with the “Karma Police” program of the British GCHQ.[31]
The above scores are super-scores, which inappropriately condense the “value” or status of a person in a single number, which determines the access to resources and services, and the rights as well. Besides considering wealth or health, such scores may also be based on behavior, using surveillance. As a consequence, they are instruments of behavioral control. In this connection, the term “technological totalitarianism” is often being used.[32] In fact, recently, the “social credit score” has come under heavy criticism, particularly in connection with the treatment of Uyghurs.[33]
Digital Policing
A somewhat similar concept is digital policing. Many countries have tested or used predictive policing programs, which try to predict future crimes based on past recorded crime patterns. Somewhat similar to the movie “Minority Report”, the goal is to take interventions before crime happens. This might imply restrictions (such as “geofencing”) for people who have actually never committed a crime. Also, prison sentences may depend on algorithmic judgments.
Digital policing has been criticized for its involvement of secret service-like activities (surveillance) and the lack of separation from police action (i.e. executive function), but also for its lack of transparency and democratic oversight. A further concern is systematic discrimination against people of color and minorities. Moreover, the rate of false positives is huge, often above 90%. This implies – potentially – a lot of arbitrariness in the action taken. While lists of potential terrorists often contain millions of names, only 1 in 100.000 alarms seems to be related to a person who has actually committed an act of terror.[34]
Code Is Law
As processes in our economy, society and environment are increasingly monitored by the Internet of Things and algorithmically managed and controlled, we are faced with a situation that has been described as “code is law”.[35]
According to this, processes in our society, access to goods and services, and what is doable or not, are increasingly determined by algorithms (“code”). These add restrictions to the action space, almost as if they were “laws of nature”. Such restrictions interfere with freedom rights. While before, people could decide to violate laws at the risk of punishment, if they had good reasons for this, this possibility may not exist anymore in the future.
In the age of “industry 4.0”,[36] there is a danger that algorithmic approaches would be inappropriately transferred from objects to subjects, from robots to people, and from production to society. Such a data-driven approach misses out on many hardly measurable qualities of life that matter for humans, such as human dignity, freedom, creativity, culture, or love.
Despite this, society might increasingly be automated and run like a machine, which threatens to undermine diversity, innovation, societal resilience, and collective intelligence.[37]
Cashless Society and Digital Command Economy
One framework in which the principle of “code is law” may play out particularly harsh is a cashless society, which is being discussed as a possible element of the emerging “digital command economy”.[38] Such developments may – intentionally or not – be promoted by the Sustainability Development Goals of the Agenda 2030 and by the Planetary/Global Health Agendas. Here, the access to goods and services might be made dependent not only on available budgets or previous consumption patterns (“too much meat”, “too many flights”...). It could also be coupled across sectors (e.g. car rental may not be possible until the apartment rent is paid), or coupled to behavior, as in the social credit score discussed before. That is, criticizing the political system might impact access to critical resources.
A cashless society may also perform resource management based on the controversial principles of triage. Rather than offering everyone equal rights of access, there could then be privileged cases that would be prioritized, hopeless cases that would get no access to certain resources at all, and other cases that might get access to what is left. In such a context, total submission to what the system expects might become a precondition for survival. The current discussion on whether unvaccinated people shall still be treated in hospitals or triaged away demonstrates this trend quite clearly.
Electronic ID
One key element of security and control concepts is a unique, forgery-proof identity (even though it is known from complexity science that “control variables” typically do not relate to individual system components). In this connection, biometry has been a significant concept (despite previous failed attempts to characterize good and bad people by their genes and physiognomy). Fingerprints and face recognition are probably the most well-known features used, but have been questioned due to database leaks, forgery, and privacy concerns. Secret services use digital forensics (based on features of smart devices, software installed, usage patterns, and location tracking). This allows them to identify people with extremely high accuracy.
To enforce certain behavioral and consumption patterns, it seems that further kinds of electronic IDs have been considered and explored, such as body-based IDs, using nanoparticles. Project Jumpstart has apparently worked on such an e-ID.[39] Probably, the id2020 consortium has also been working on such solutions.[40] Furthermore, there are various relevant publications and patents pointing into similar directions.[41]
While such solutions may serve the purpose of making people manageable and controllable like things, they would simultaneously destroy the very essence of human dignity, which is the foundation of democracies around the world and a key value protected by the UN Human Rights Charter.
Internet of Bodies
The development of nanoparticle-based technologies obviously goes beyond the development of e-IDs. Nanoparticles and nanobots can be used in medicine for diagnostics (surveillance of body functions) and treatments (interference with body functions). They may also be used for gene editing, at least in perspective.[42]
Some of the related developments have been summarized under the label “Internet of Bodies”.[43] The World Economic Forum, one of the main promoters of Internet-of-Things-based Industry 4.0, has repeatedly pointed out “The Internet of Bodies is here”.[44]
Unfortunately, there are many issues with using (or misusing) such technologies, and many of them are unsolved. In fact, nanotechnology so far is largely unregulated.[45]
It seems that calls for urgent political control of the Internet of Bodies have not been effective so far.[46] This raises serious concerns, as nanoparticles can be absorbed by human bodies through food, water, air, drugs, and vaccines.[47] Unfortunately, it appears that often informed consent has not been given in advance. In fact, many people have been exposed to non-natural nanoparticles, and some of them are toxic.[48]
Neurotechnology: Reading and Controlling Minds
Recently, there has also been increasing news about the development of neurotechnologies. So far, most of this news was focused on brain chips, as engineered by “Neuralink” and other companies.
However, the technological development seems to be much further, particularly in relation to military applications. In the meantime, researchers and engineers are apparently working on human machine interfaces (HMIs), which are based on dispersing nanoparticles in the brain. The so-called “Obama Brain Project” has supported related kinds of research with several billion Dollars.[49]
Similar research is also performed in Europe, apparently based on substances such as graphene oxide.[50]
The pharma industry is certainly involved in these developments. Further relevant literature can be found under keywords such as “smart dust”[51] and “neural dust”.[52]
“The Matrix”
The above technological developments do not only threaten the freedom of thought (that nobody else would know of), but also the freedom of will. Even though this sounds like science fiction, there is a danger that it might become possible to manipulate people’s minds, emotions, and thoughts to an extent that would seriously endanger the autonomy of humans. In perspective, people may become part of (and controlled by) a giant hybrid computer system.
Concerns about this have, in particular, been raised by a number of tech billionaires, who have suggested that reality might be a computer simulation.[53] In societies based on the principle “code is law”, this is certainly so to an ever increasing extent. Inspired by the related movie series, such an augmented reality has often been framed as “The Matrix”. It should be stated, however, that even weaker forms of manipulation such as “big nudging” may produce effects reminiscent of what is called “The Matrix”, i.e. a digitally managed world one might hardly be able to escape from.
Neurocapitalism
Neurotechnologies offer attractive perspectives for corporations. While surveillance capitalism seems to be restricted to surveilling people and inferring their thoughts, emotions, and behaviors, the next stage of this data-driven system seems to be what some have called “neurocapitalism”.[54]
In this system, it would also be possible to steer the thoughts and emotions and decisions of people, and to shape their ideas, memories, and values through computer-based control. In fact, labs are already working on dream advertising, i.e. implanting dreams that would make people buy certain products.[55]
It is obvious that such an approach, which may be somewhat comparable to hypnosis, bears great potential for misuse, against which people may not be able to defend themselves. This includes deception that could be more realistic than deep fakes, and may go so far as to involve people in crimes or accidents against their will.
Technological Convergence and Transhumanism[56]
For those who argue for a technology-driven world and for doing everything that is doable, it is clear that we would see a great technological convergence. This means that basically all technologies, including electrical, computational, neuronal, cognitive, genetic, information- and nanotechnology-based would merge. This development would also bring about an eventual human-machine convergence. People would start upgrading themselves with technological implants, turning them into superior cyborgs. Eventually, humans and machines might even be hardly distinguishable. The proponents of this transhumanist idea often believe that humans would, in fact, be replaced by non-biological forms of life.
Singularity and Superintelligence (“Digital God”)
According to Moore’s Law, processing power grows at an exponential, i.e. ever-accelerating rate. If this trend continues, it is expected that the processing power of supercomputers would eventually surpass the processing power of human brains. Shortly after that point, called “singularity”,[57] transhumanists believe that universal “superintelligence” would take over control of human affairs and the planet, and assume “God-like” power. In this system, humans might become something like “cells” of a digitally connected “meta-body”, the brain of which would be the previously mentioned superintelligent system. Humans might become an integral part of this “superintelligent” system, possibly mainly executing its commands.
“Apocalyptic AI”
According to transhumanists, the before-mentioned technological singularity would connect us with the entire world; it would come with a cognitive shift called “transcendence” and make us feel like Gods.[58]
Furthermore, some transhumanist identify this singular shift with apocalyptic elements of the Judaic and Christian theology. The following quote from Robert M. Geraci’s non-fiction book on “Apocalyptic AI” may give an impression:[59]
“Apocalyptic AI authors promise that intelligent machines – our “mind children,” according to Moravec – will create a paradise for humanity in the short term but, in the long term, human beings will need to upload their minds into machine bodies in order to remain a viable life-form. The world of the future will be a transcendent digital world; mere human beings will not fit in. In order to join our mind children in life everlasting, we will upload our conscious minds into robots and computers, which will provide us with the limitless computational power and effective immortality that Apocalyptic AI advocates believe make robot life better than human life.”
Death by Algorithm
As stated before, according to this transhumanist ideology, “mere humans will not fit in” the world after the singularity, and would not remain a “viable life-form”. They would not be supported by the digital world of the future. Artificial Intelligence would, therefore, perhaps be given the power to decide about the life and death of people.[60] With the increasing use of algorithms to make triage decisions, such a development seems to be already on the way.[61]
Furthermore, the discussion around not providing hospital treatment to unvaccinated people suggests that vaccination against Covid-19 might effectively turn into something like an “entry ticket” for the transhumanist age in the making, while there is little or no evidence that the envisaged transhumanist future would actually be a viable life form over an extended period of time (say, a thousand years). It must be warned that humanity may be engaging in an extremely risky, probably highly irresponsible experiment, here.
Autonomous Weapons
It cannot be excluded that the above described developments may end with the death of a lot of people. Depopulation as a result of the early deployment of technology, before proper testing could be done, seems to be a possibility. It is particularly concerning that effective precautions against the use of autonomous weapons do not seem to exist. Killer drones and killer robots are just two of many possible elements of future wars. It is conceivable that nanotechnology and perhaps even 5G, which is based on directed energy beams rather than diffusive radiation (in contrast to 4G), might be turned into weapons that could be used against the people of a country, also in a personalized way (e.g. based on scores). Perhaps more importantly, however, it seems that there are only very few studies about possible health impacts when nanoparticles in the human body interact with electromagnetic radiation. The possibility of adverse effects or even weaponization should certainly be considered, and suitable precautions taken.
Hence, ABC weapons are not the only weapons one needs to be concerned about. Even though there is little public information about this, digital and nanoparticle-based weapons might be more devastating than drone attacks, killer robots, or even nuclear blasts, while they could also be used by non-state actors.[62]
Scenario Horribilis
Obviously, it could happen that some of the above developments come together and reinforce each other in a dangerous way. For example, given that the world financial crisis of the fiat currency system is far from being solved, the possibility of a major financial crash and bankruptcy cascade is significant. The response to this situation and the resulting supply shortages might be the introduction of an Internet-of-Bodies-based e-ID, even though this would establish a totalitarian cashless society and eliminate human dignity. Due to the supply shortages, many people might die based on algorithm-based triage-decisions using sensitive personal data. Clearly, measures must be taken to avert such scenarios, in particularly as alternative solutions to sustainability challenges do exist.
Summary and Conclusions
Humanity is faced with a myriad of technological innovations, which are happening at an exponentially accelerating pace. As outlined above, the following trends are observed:
1. A New Economy: Big Data, AI, Surveillance Capitalism, Attention Economy (Profiling, Targeting, Digital Twins, e-IDs, Cashless Society)
2. A New Politics: Digital Censorship and Propaganda, Scoring, Behavioral Manipulation (Big Nudging)
3. A New Legal System: Code is Law, Digital Policing (PreCrime), Social Credit Score, Karma Police, Death by Algorithm
4. A New Human: Transhumanism, Mind Reading/Mind Control, Neurocapitalism
5. A New “God”: Singularity, Superintelligence, “The Matrix”, “Apocalyptic AI”
These developments can shatter the very foundations on which our society was built. Overall, they have not strengthened democratic institutions lately. On the contrary: there are unprecedented threats to freedom, democracy, dignity and human rights, peace, the right to life, and – in view of the emerging transhumanist trend – even the existence of humanity as we know it. Hence, these developments may dismantle our society and might be more dangerous to it than conventional war or terrorism. All traditional institutions of our society are under attack, or threatened by disruptive innovations. It is questionable, however, whether these revolutionary changes serve the interest of the great majority of people. At least there does not seem to be sufficient democratic or political legitimacy for them at the moment, while financial gains do not seem to be a good basis for the grave decisions involved.
It must be stressed that the above developments are not alternative-less. Digital technologies can also be used in different, humane, ways, without having to give up on environment- or health-related goals. However, this requires a different perspective, paradigm, and approach, and proper decisions need to be taken, soon. Even though better, self-determined human futures are conceivable (based, for example, on participatory resilience, socio-ecological finance, democratic capitalism, and digital democracy), politics and business seem rather late in implementing frameworks that would empower citizens and strengthen civil society, while supporting a symbiotic, sustainable relationship with nature. Most likely, however, it is not too late to change this.
[1] Helbing, D. (2013). Globally networked risks and how to respond. Nature, 497(7447), 51–59. https://doi.org/10.1038/nature12047. https://www.nature.com/articles/nature12047 (accessed on Nov. 11, 2021)
[2] Vasiliauskaite, V., Antulov-Fantulin, N. and Helbing, D. (May., 2021). Some Challenges in Monitoring Epidemics, in print. https://www.researchgate.net/publication/351619444 (accessed on Nov. 9, 2021)
[3] Quote from: Arcaute, E., Barthelemy, M., Batty, M., Caldarelli, G., Gershenson, C., Helbing, D., Moreno, Y., Ramasco, J. J., Rozenblat, C. and Sánchez, A. (Sep., 2021). Future Cities: Why Digital Twins Need to Take Complexity Science on Board, Preprint. https://www.researchgate.net/publication/354446988 (accessed on Nov. 9, 2021)
[4] Palantir Technologies. https://en.wikipedia.org/wiki/Palantir_Technologies (accessed on Nov. 9, 2021)
[5] Ashford, W. (Aug. 3, 2010) CIA and Google invest in high-tech crystal ball technology, https://www.computerweekly.com/news/1280093436/CIA-and-Google-invest-in-high-tech-crystal-ball-technology (accessed on Nov. 9, 2021)
[6] World Economic Forum, Centre for Cybersecurity, https://www.weforum.org/platforms/the-centre-for-cybersecurity (accessed on Nov. 9, 2021)
[7] Tucker, P. (Apr. 8, 2015) Can the military make a prediction machine?, https://www.defenseone.com/technology/2015/04/can-military-make-prediction-machine/109561/ (accessed on Nov. 9, 2021)
[8] Anderson, C. (Jun. 23, 2008) The End of Theory: The Data Deluge Makes the Scientific Methods Obsolete, https://www.wired.com/2008/06/pb-theory/ (accessed on Nov. 9, 2021)
[9] Pasquale, F. (2016) The Black Box Society (Harvard University, Harvard, MA).
[10] Raji, I.D., Gebru, T., Mitchell, M., Buolamwini, J., Lee, J. and Denton, E. (2020) Saving face: Investigating the ethical concerns of face recognition auditing. AIES’20, Feb. 7-8, 2020, New York, NY, USA.
[11] Zuboff, S. (2020) The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (PublicAffairs, New York).
[12] Saint, N. (Oct. 4, 2010) Google CEO: “We Know Where You Are. We Know Where You’ve Been. We Can More Or Less Know What You Are Thinking About.”, https://www.businessinsider.com/eric-schmidt-we-know-where-you-are-we-know-where-youve-been-we-can-more-or-less-know-what-youre-thinking-about-2010-10 (accessed on Nov. 9, 2021)
[13] Helbing, D. and Pournaras, E. (2015) Society: Build digital democracy, Nature 527: 33-34,
https://www.nature.com/articles/527033a (accessed on Nov. 9, 2021)
[14] Helbing D., Frey, B. S., Gigerenzer, G., Hafen, E., Hagner, M., Hofstetter, Y., van den Hoven, J., Zicari, R. V. and Zwitter A. (Feb. 25, 2017) Will Democracy Survive Big Data and Artificial Intelligence?,
https://www.scientificamerican.com/article/will-democracy-survive-big-data-and-artificial-intelligence/ (accessed on Nov. 9, 2021)
[15] Helbing, D. and Seele, P. (2017) Turn war rooms into peace rooms. Nature 549: 458, https://www.nature.com/articles/549458c (accessed on Nov. 9, 2021)
[16] John Hopkins University and Medicine, Covid-19 Dashboard, https://coronavirus.jhu.edu/map.html (accessed on Nov. 9, 2021)
[17] Dawkins, D. (Aug. 27, 2021). Jeff Bezos And Elon Musk Are Now Butting Heads Over The Small Satellite Internet Business. Forbes. https://www.forbes.com/sites/daviddawkins/2021/08/27/jeff-bezos-and-elon-musk-are-now-butting-heads-over-the-small-satellite-internet-business/ (accessed on Nov. 11, 2021)
[18] Arcaute, E., Barthelemy, M., Batty, M., Caldarelli, G., Gershenson, C., Helbing, D., Moreno, Y., Ramasco, J. J., Rozenblat, C. and Sánchez, A. (Sep., 2021). Future Cities: Why Digital Twins Need to Take Complexity Science on Board. [Preprint.] https://www.researchgate.net/publication/354446988 (accessed on Nov. 9, 2021)
[19] Baard, M. (Jun. 23, 2007) Sentient world: war games on the grandest scale, https://www.theregister.com/2007/06/23/sentient_worlds/ (accessed on Nov. 9, 2021)
[20] Sterling, B. (Jun. 25, 2007) A Military Second Earth, https://www.wired.com/2007/06/a-military-seco/ (accessed on Nov. 9, 2021)
[21] Faggella, D. (May 19, 2019) Sentient World Simulation and NSA Surveillance – Exploiting Privacy to Predict the Future, https://emerj.com/ai-future-outlook/nsa-surveillance-and-sentient-world-simulation-exploiting-privacy-to-predict-the-future/ (accessed on Nov. 9, 2021)
[22] Synthetic Environment for Analysis and Simulations, https://en.wikipedia.org/wiki/Synthetic_Environment_for_Analysis_and_Simulations
[23] Endsley, M., Jones, W. M. and LOGICON TECHNICAL SERVICES INC DAYTON OH (1997) Situation Awareness Information Dominance & Information Warfare, https://apps.dtic.mil/sti/citations/ADA347166 (accessed on Nov. 9, 2021);
Miller, D. (2004) Information dominance: The philosophy of total propaganda control, https://www.academia.edu/2928698/Information_dominance_The_philosophy_of_total_propaganda_control (accessed on Nov. 9, 2021)
[24] Thaler, R. H. (2009) Nudge: Improving Decisions About Health, Wealth and, Happiness. Revised&Expanded edition. New York: Penguin Books.
[25] Greenwald, G. (Feb. 25, 2014) How Covert Agents Infiltrate The Internet To Manipulate, Deceive, And Destroy Reputations, https://theintercept.com/2014/02/24/jtrig-manipulation/ (accessed on Nov. 9, 2021);
(Feb. 25, 2014) The Art of Deception: Training for a New Generation of Online Covert Operations, https://theintercept.com/document/2014/02/24/art-deception-training-new-generation-online-covert-operations/ (accessed on Nov. 9, 2021);
Bell, V. (Aug. 16, 2015) Britain’s ‘Twitter Troops’ have ways of making you think…, https://www.theguardian.com/science/2015/aug/16/britains-twitter-troops-ways-making-you-think-joint-threat-research-intelligence-group (accessed on Nov. 9, 2021)
[26] Helbing D., Frey, B. S., Gigerenzer, G., Hafen, E., Hagner, M., Hofstetter, Y., van den Hoven, J., Zicari, R. V. and Zwitter A. (Feb. 25, 2017) Will Democracy Survive Big Data and Artificial Intelligence?,
https://www.scientificamerican.com/article/will-democracy-survive-big-data-and-artificial-intelligence/ (accessed on Nov. 9, 2021)
[27] Dooely, R. (Nov. 22, 2011), Brainfluence: 100 Ways to Persuade and Convince Consumers Neuromarketing, https://www.amazon.com/Brainfluence-Persuade-Convince-Consumers-Neuromarketing/dp/1118113365/ (accessed on Nov. 9, 2021)
[28] Kaiser, B. (2019). Targeted: The Cambridge Analytica Whistleblower’s Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again (Illustrated edition). Harper.
[29] Van der Boor, R. A. E., van Daalen, A. F. and Duistermaat, M. (Oct. 25, 2017) Behavioural change as the core of warfighting: So now what?, https://www.militairespectator.nl/thema/operaties/artikel/behavioural-change-core-warfighting (accessed on Nov. 9, 2021)
[30] The Economist (Dec. 17, 2016) China invents the digital totalitarian state, https://www.economist.com/briefing/2016/12/17/china-invents-the-digital-totalitarian-state (accessed on Nov. 9, 2021)
[31] Gallagher, R. (Sep. 25, 2015) Profiled: From Radio to Porn, British Spies Track Web Users’ Online Identities, https://theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/ (accessed on Nov. 9, 2021)
[32] Schirrmacher, F. (2015) Technologischer Totalitarismus. Suhrkamp, https://www.suhrkamp.de/buch/technologischer-totalitarismus-t-9783518074343 (accessed on Nov. 9, 2021)
[33] Lederer, E. M. (Oct. 21, 2021) 43 countries criticize China at UN for repression of Uyghurs, https://apnews.com/article/religion-china-race-and-ethnicity-united-nations-c5dfb489b566260f8c50ff6124d0e175 (accessed on Nov. 9, 2021)
[34] Munk, T. B. (2017) 100,000 false positives for every real terrorist: Why anti-terror algorithms don’t work. First Monday, 22(9), https://firstmonday.org/ojs/index.php/fm/article/view/7126 (accessed on Nov. 9, 2021)
[35] Lessig, L. (2006) Code: And Other Laws of Cyberspace, Version 2.0. 2. ed., https://www.amazon.com/Code-Other-Laws-Cyberspace-Version/dp/0465039146/ (accessed on Nov. 9, 2021)
[36] Schwab, K. The Fourth Industrial Revolution. World Economic Forum, https://www.weforum.org/about/the-fourth-industrial-revolution-by-klaus-schwab (accessed on Nov. 9, 2021);
Schwab, K. (Jan. 3, 2017) The Fourth Industrial Revolution, https://www.amazon.com/Fourth-Industrial-Revolution-Klaus-Schwab/dp/1524758868/ (accessed on Nov. 9, 2021)
[37] Helbing, D. (Oct. 30, 2015) The Automation of Society is Next: How to Survive the Digital Revolution, https://www.amazon.com/Automation-Society-Next-Survive-Revolution/dp/1518835414/ (accessed on Nov. 9, 2021)
[38] Fuster, T (Nov. 18, 2017) Digitale Planwirtschaft führt zu einem orwellschen Schreckensszenario, https://www.nzz.ch/meinung/big-data-kann-den-kommunismus-nicht-retten-ld.1329778 (accessed on Nov. 9, 2021)
[39] Andrews, M. (May 12, 2020) DOD Awards $138 Million Contract Enabling Prefilled Syringes for Future Covid-19 Vaccine, https://www.defense.gov/News/Releases/Release/Article/2184808/dod-awards-138-million-contract-enabling-prefilled-syringes-for-future-covid-19/ (accessed on Nov. 9, 2021)
[40] Burt, C. (Sep. 20, 2019) ID2020 and partners launch program to provide digital ID with vaccines, https://www.biometricupdate.com/201909/id2020-and-partners-launch-program-to-provide-digital-id-with-vaccines (accessed on Nov. 9, 2021)
[41] Römer K. (2004) Tracking Real-World Phenomena with Smart Dust. Berlin, Heidelberg: Springer, In: Karl H., Wolisz A., Willig A. (eds) Wireless Sensor Networks. EWSN 2004. Lecture Notes in Computer Science, vol 2920, https://www.vs.inf.ethz.ch/publ/papers/tracking.pdf (accessed on Nov. 9, 2021);
Ehrlich, G., Fenster, M. (2021) Methods and systems of prioritizing treatments, vaccination, testing and/or activities while protecting the privacy of individuals. U.S. Patent No. 11,107,588 B2, https://patentimages.storage.googleapis.com/68/80/73/6a17a66e9ec8c5/US11107588.pdf (accessed on Nov. 9, 2021)
[42] Bhokisham, N. and van Arsdale, E. (Jun. 23, 2020) Internet of Bodies (IoB)- Using CRISPR to electrically connect with and control the genome, https://bioengineeringcommunity.nature.com/posts/internet-of-bodies-iob-using-crispr-to-electrically-connect-with-and-control-the-genome (accessed on Nov. 9, 2021)
[43] The Internet of Bodies Will Change Everything, for Better or Worse (Oct. 29, 2020), https://www.rand.org/blog/articles/2020/10/the-internet-of-bodies-will-change-everything-for-better-or-worse.html (accessed on Nov. 9, 2021);
Mary, L., Boudreaux, B., Chaturvedi, R., Romanosky, S. and Downing, B. (2020) The Internet of Bodies: Opportunities, Risks, and Governance. Santa Monica, CA: RAND Corporation, https://www.rand.org/multimedia/video/2020/10/29/what-is-the-internet-of-bodies.html (accessed on Nov. 9, 2021);
Mary, L., Boudreaux, B., Chaturvedi, R., Romanosky, S. and Downing, B. (2020) The Internet of Bodies: Opportunities, Risks, and Governance, https://www.rand.org/content/dam/rand/pubs/research_reports/RR3200/RR3226/RAND_RR3226.pdf (accessed on Nov. 9, 2021);
Maxwell, A. (Oct. 10, 2020) A Living, Breathing Internet of Things All Around You, https://now.northropgrumman.com/a-living-breathing-internet-of-bodies-all-around-you/ (accessed on Nov. 9, 2021);
Celik, A., Salama, K. N. and Eltawil, A. (2020) The Internet of Bodies: A Systematic Survey on Propagation Characterization and Channel Modeling. TechRxiv. [Preprint.], https://www.techrxiv.org/articles/preprint/The_Internet_of_Bodies_A_Systematic_Survey_on_Propagation_Characterization_and_Channel_Modeling/12912752 (accessed on Nov. 9, 2021);
Celik, A., Salama, K. N. and Eltawil, A. (2020) The Internet of Bodies: A Systematic Survey on Propagation Characterization and Channel Modeling. IEEE Communications Surveys and Tutorials. [Preprint.], https://repository.kaust.edu.sa/bitstream/handle/10754/664925.1/BAN_Survey.pdf (accessed on Nov. 9, 2021);
Gao, F., Chen, D-L., Wenig, M-H., Yang, R-Y. (2021) Revealing Development Trends in Blockchain-Based 5G Network Technologies through Patent Analysis. Sustainability. 2021; 13(5):2548, https://www.mdpi.com/2071-1050/13/5/2548/htm (accessed on Nov. 9, 2021)
[44] Xiao, L., (Jan. 4, 2020) Tracking How Our Bodies Work Could Change Our Lives,
https://www.weforum.org/agenda/2020/06/internet-of-bodies-covid19-recovery-governance-health-data/ (accessed on Nov. 10, 2021);
(Aug. 6, 2020) The Internet of Bodies Is Here: Tackling New Challenges of Technology Governance,
https://www.weforum.org/reports/the-internet-of-bodies-is-here-tackling-new-challenges-of-technology-governance (accessed on Nov. 10, 2021);
Ly, J. U. (July 2020) Shaping the Future of the Internet of Bodies: New Challenges of Technology Governance. n.d., pp. 28.
http://www3.weforum.org/docs/WEF_IoB_briefing_paper_2020.pdf (accessed on Nov. 10, 2021)
[45] Regulation of Nanotechnology, https://en.wikipedia.org/wiki/Regulation_of_nanotechnology (accessed on Nov. 10, 2021)
[46] Chauvet, Z. (Aug. 13, 2020, updated on Aug. 17, 2020) Last Call to Control the Internet of Bodies,
https://genevasolutions.news/science-tech/last-call-to-control-the-internet-of-bodies (accessed on Nov. 10, 2021)
[47] 崔大祥, 高昂, 梁辉, 田静, 李雪玲, and 沈琦 (filed Sep. 27, 2020, and issued Jan. 15, 2021) Nano coronavirus recombinant vaccine taking graphene oxide as carrier. China CN112220919A,
https://patents.google.com/patent/CN112220919A/en (accessed on Nov. 10, 2021);
Chen, Y.-C., Cheng H-F., Yang Y.-C. and Yeh M.-K (2016) Nanotechnologies Applied in Biomedical Vaccines. Micro and Nanotechnologies for Biotechnology. IntechOpen, https://www.intechopen.com/chapters/51101 (accessed on Nov. 10, 2021);
Von Andrian, U. H., Farokhzad, O. C., Langer, R. S., Junt, T., Moseman, E. A., Zhang, L., Basto, P., Iannacone, M., and Alexis, F. (filed Mar. 15, 2013, and issued Jan. 10, 2017) Vaccine nanotechnology. United States US9539210B2, https://patents.google.com/patent/US9539210 (accessed on Nov. 10, 2021)
[48] Main, D. (Sep. 5, 2016) Potentially Toxic Magnetic Nanoparticle Pollution Has Been Found in Human Brains
https://www.newsweek.com/potentially-toxic-magnetic-nanoparticle-pollution-human-brains-495950 (accessed on Nov. 10, 2021);
Maher, B. A., Ahmed, I. A. M., Karloukovski, V., MacLaren, D. A., Foulds, P. G., Allsop, D., Mann, D. M. A., Torres-Jardón, R. and Calderon-Garciduenas, L. (2016) Magnetite Pollution Nanoparticles in the Human Brain. Proceedings of the National Academy of Sciences 113, no. 39: 10797–801.
https://www.pnas.org/content/pnas/113/39/10797.full.pdf (accessed on Nov. 10, 2021);
Flores, D. S. (2018) The Secret Program of US. Mind Control Weapons: Is It Developing in Latin America?” International Physical Medicine & Rehabilitation Journal Volume 3, no. Issue 2. https://medcraveonline.com/IPMRJ/the-secret-program-of-us-mind-control-weapons-is-it-developing-in-latin-america.html (accessed on Nov. 10, 2021);
Flores, D. S. (2021) The secret program of US. mind control weapons: is it developing in Latin America?. Int Phys Med Rehab J. 2018;3(2):145 –146. https://medcraveonline.com/IPMRJ/the-nanomafia-nanotechnology39s-global-network-of-organized-crime.html (accessed on Nov. 10, 2021)
Further links:
Abramson, D., Fu, D. and Johnson, J. E. (issued Mar. 26, 2020) Cryptocurrency System Using Body Activity Data. United States US20200097951, https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2020060606 (accessed on Nov. 10, 2021);
Bhokisham, N., VanArsdale, E., Stephens, K. T., Hauk, P., Payne, G. F. and Bentley, W. E. (2020) A Redox-Based Electrogenetic CRISPR System to Connect with and Control Biological Information Networks. Nature Communications 11, no. 1: 2427. https://www.nature.com/articles/s41467-020-16249-x (accessed on Nov. 10, 2021);
Mahdi, M. N., Ahmad, A. R., Qassim, O. S., Natiq, H., Subhi, M. A. and Mahmoud, M. (2021) From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A Survey. Applied Sciences 11, no. 17: 8117. https://www.mdpi.com/2076-3417/11/17/8117 (accessed on Nov. 10, 2021);
European Technology Platform NetWorld2020 (2020) Smart Networks in the context of NGI, https://bscw.5g-ppp.eu/pub/bscw.cgi/d367342/Networld2020%20SRIA%202020%20Final%20Version%202.2%20.pdf (accessed on Nov. 10, 2021);
Pathak, B. A. and Keller III., W. J. (filed Mar. 13, 2014, and issued Jul. 5, 2016) DNA/nanoparticle complex enhanced radio frequency transponder: structure of mark for detecting hybridization state and authenticating and tracking articles, method of preparing the same, and method of the same. United States US9382579B2. https://patents.google.com/patent/US9382579 (DNA link) (accessed on Nov. 10, 2021);
Van Lune, H. and Bruggeman, J. J. (filed May 18, 2005, and issued Nov. 22, 2006) Luciferase assay system. European Union EP1724359A1. https://patents.google.com/patent/EP1724359A1/en (Luciferase) (accessed on Nov. 10, 2021)
[49] Regalado A. (Sep. 30, 2014) Obama’s Brain Project Backs Neurotechnology. MIT Technology Review. https://www.technologyreview.com/2014/09/30/171099/obamas-brain-project-backs-neurotechnology/ (accessed on Nov. 10, 2021);
Alivisatos, A. P., Andrews, A. M., Boyden, E. S., Chun, M., Church, G. M., Deisseroth, K., Donoghue, J. P. et al. (March 26, 2013) Nanotools for Neuroscience and Brain Activity Mapping. ACS Nano 7, no. 3: 1850–66. https://pubs.acs.org/doi/pdf/10.1021/nn4012847 (accessed on Nov. 10, 2021);
Makin, S. (Aug. 8, 2016) ‘Neural Dust’ Could Enable a Fitbit for the Nervous System. Scientific American. https://www.scientificamerican.com/article/neural-dust-could-enable-a-fitbit-for-the-nervous-system/ (accessed on Nov. 10, 2021);
Costandi, M. (Mar. 24, 2016) Genetically Engineered ‘Magneto’ Protein Remotely Controls Brain and Behaviour. The Guardian. https://www.theguardian.com/science/neurophilosophy/2016/mar/24/magneto-remotely-controls-brain-and-behaviour (accessed on Nov. 10, 2021);
Wheeler, M. A., Smith, C. J., Ottolini, M., Barker, B. S., Purohit, A. M., Grippo, R. M., Gaykema, R. P. et al. (2016) Genetically Targeted Magnetic Control of the Nervous System. Nature Neuroscience 19, no. 5: 756–61. https://www.nature.com/articles/nn.4265.pdf (accessed on Nov. 10, 2021);
Schilling, D. R. (April 19, 2013) Knowledge Doubling Every 12 Months, Soon to Be Every 12 Hours. Industry Tap (blog). https://www.industrytap.com/knowledge-doubling-every-12-months-soon-to-be-every-12-hours/3950 (accessed on Nov. 10, 2021);
Services from IBM, http://www-935.ibm.com/services/no/cio/leverage/levinfo_wp_gts_thetoxic.pdf (accessed on Nov. 10, 2021);
IBM Global Technology Services (Jul., 2006) The toxic terabyte: How data-dumping threatens business efficiency, https://web.archive.org/web/20130722124236/http://www-935.ibm.com/services/no/cio/leverage/levinfo_wp_gts_thetoxic.pdf (accessed on Nov. 10, 2021)
[50] Smith, T. (Jul. 1, 2021) Elon Musk’s Neuralink Is Being Outperformed by This Spanish Graphene Startup, https://sifted.eu/articles/neuralink-competitor-inbrain/ (accessed on Nov. 10, 2021);
INBRAIN Neuroelectronics Secures $17 Million in Series A Funding for First AI-Powered Graphene-Brain Interface (Mar. 30, 2021), https://www.businesswire.com/news/home/20210330005388/en/INBRAIN-Neuroelectronics-Secures-17-Million-in-Series-A-Funding-for-First-AI-Powered-Graphene-Brain-Interface (accessed on Nov. 10, 2021);
Billing, M. (Oct. 26, 2020) The European Startups Hacking Your Brain Better than Elon Musk’s Neuralink, https://sifted.eu/articles/neuralink-competitors-europe/ (accessed on Nov. 10, 2021);
Bramini, M., Alberini, G., Colombo, E., Chiacchiaretta, M., DiFrancesco, M. L., Maya-Vetencourt, J. F., Maragliano, L., Benfenati, F. and Cesca, F. (2018) Interfacing Graphene-Based Materials With Neural Cells. Frontiers in Systems Neuroscience 12: 12. https://www.frontiersin.org/articles/10.3389/fnsys.2018.00012/full (accessed on Nov. 10, 2021);
Lee, H. -J (2021) Recent Progress in Radio-Frequency Sensing Platforms with Graphene/Graphene Oxide for Wireless Health Care System. Applied Sciences 11, no. 5: 2291. https://www.mdpi.com/2076-3417/11/5/2291 (accessed on Nov. 10, 2021);
[51] Marr, B. (Sep. 16, 2018) Smart Dust Is Coming. Are You Ready? Forbes. https://www.forbes.com/sites/bernardmarr/2018/09/16/smart-dust-is-coming-are-you-ready/ (accessed on Nov. 10, 2021);
Sutter, J. D. (May 3,2010) ‘Smart Dust’ Aims to Monitor Everything, http://edition.cnn.com/2010/TECH/05/03/smart.dust.sensors/index.html (accessed on Nov. 10, 2021);
Hoffman, T. (Mar 24, 2003) Smart Dust, https://www.computerworld.com/article/2581821/smart-dust.html (accessed on Nov. 10, 2021)
[52] MIT Technology Review (Jul. 16, 2013) How Smart Dust Could Spy On Your Brain,
https://www.technologyreview.com/2013/07/16/177343/how-smart-dust-could-spy-on-your-brain/ (accessed on Nov. 10, 2021);
Dongjin, S., Carmena, J. M., Rabaey, J. M., Alon, E. and Maharbiz, M. M. (2013) Neural Dust: An Ultrasonic, Low Power Solution for Chronic Brain-Machine Interfaces, https://web.archive.org/web/20210605054917/https://arxiv.org/pdf/1307.2196.pdf (accessed on Nov. 10, 2021);
Sharma, P., Moudgil, B. M., Walter G. A., Grobmyer, S. R, Santra, S., Jiang, H., Brown, S. C., Scott, E. W., Zhang, Q. and Bengtsson, N. (filed Aug. 28, 2008, and issued Jan. 29, 2013) Multimodal nanoparticles for non-invasive bio-imaging. United States US8361437B2. https://patents.google.com/patent/US8361437 (accessed on Nov. 10, 2021);
Fuerst, O. and Rosenberg, Z. (filed Apr. 11, 2003, and issued Jan. 19, 2005) System for collecting storing presenting and analyzing immunization data having remote stations in communication with a vaccine and disease database over a network. European Union EP1497780A2. https://patents.google.com/patent/EP1497780A2/en (accessed on Nov. 10, 2021);
Hogan, T. (filed Apr. 23, 2002, and issued Dec. 12, 2002) System and method for automatically recording animal temperature and vaccination information. United States US20020188470A1. https://www.google.ch/patents/US20020188470 (accessed on Nov. 10, 2021)
[53] Burns, J. (Oct. 13, 2016) Elon Musk And Friends Are Spending Millions To Break Out Of The Matrix. Forbes. https://www.forbes.com/sites/janetwburns/2016/10/13/elon-musk-and-friends-are-spending-millions-to-break-out-of-the-matrix/ (accessed on Nov. 10, 2021);
Hartmans, A. (Oct. 3, 2016) Tech Billionaires Are Asking Scientists for Help Breaking Humans out of the Computer Simulation They Think They Might Be Trapped In. Business Insider. https://www.businessinsider.com/tech-billionaires-want-to-break-humans-out-of-a-computer-simulation-2016-10 (accessed on Nov. 10, 2021)
[54] Lesaja, S. and Palmer, X.-L (2020) Brain-Computer Interfaces and the Dangers of Neurocapitalism, https://arxiv.org/ftp/arxiv/papers/2009/2009.07951.pdf (accessed on Nov. 10, 2021);
Pykett, J. (2013) Neurocapitalism and the New Neuros: Using Neuroeconomics, Behavioural Economics and Picoeconomics for Public Policy. Journal of Economic Geography 13, no. 5: 845–69. https://academic.oup.com/joeg/article-abstract/13/5/845/918547 (accessed on Nov. 10, 2021);
Griziotti, G. (2020) Neurocapitalism Technological Mediation and Vanishing Lines. Minor Compositions;
Meckel, M. (2018) Mein Kopf Gehört Mir. Eine Reise Durch Die Schöne Neue Welt Des Brainhacking. Piper Verlag GmbH.
[55] Stickgold, R., Zadra, A. and Haar, A. J. H. (Jun. 8, 2021) Advertising in Dreams Is Coming: Now What?, https://dxe.pubpub.org/pub/dreamadvertising/release/1 (accessed on Nov. 10, 2021)
[56] McIntosh, A. and Siepmann, K. (Apr. 12, 2015) The Age of Transhumanist Politics Has Begun, https://www.heise.de/tp/features/The-Age-of-Transhumanist-Politics-Has-Begun-3371228.html?seite=all (accessed on Nov. 10, 2021)
[57] The Singularity is Near, https://en.wikipedia.org/wiki/The_Singularity_Is_Near (accessed on Nov. 10, 2021);
Kurzweil, R. (2006) The Singularity Is Near: When Humans Transcend Biology. New York: Penguin Books;
Kurzweil, R. (2000) The Age of Spiritual Machines: When Computers Exceed Human Intelligence. First Thus edition. New York, NY: Penguin Books, 2000
[58] Kurzweil, R. (Oct. 1, 2015) Tiny Robots In Our Brains Will Make Us ‘Godlike’. HuffPost. https://www.huffpost.com/entry/ray-kurzweil-nanobots-brain-godlike_n_560555a0e4b0af3706dbe1e2 (accessed on Nov. 10, 2021)
[59] Geraci, R. M. (2012) Apocalyptic AI: Visions of Heaven in Robotics, Artificial Intelligence, and Virtual Reality. Reprint edition. Oxford: Oxford University Press.
[60] Piper, K. (Jun. 21, 2019) Death by Algorithm: The Age of Killer Robots Is Closer than You Think. Vox. https://www.vox.com/2019/6/21/18691459/killer-robots-lethal-autonomous-weapons-ai-war (accessed on Nov. 10, 2021);
Simanowski, R. (2018) The Death Algorithm and Other Digital Dilemmas. Translated by Jefferson Chase. Untimely Meditations. Cambridge, MA, USA: MIT Press. https://mitpress.mit.edu/books/death-algorithm-and-other-digital-dilemmas (accessed on Nov. 10, 2021);
Helbing, D. and Seele, P. (Nov. 26, 2020) Death by Algorithm? Project Syndicate. https://www.project-syndicate.org/commentary/artificial-intelligence-resilience-covid19-climate-change-by-dirk-helbing-and-peter-seele-2020-11 (accessed on Nov. 10, 2021);
Helbing, D, Beschorner, T., Frey, B., Diekmann, A., Seele, P., Spiekermann-Hoff, S., Zwitter, A., van den Hoven, J. and Hagendorff, T. (2021) Triage 4.0: On Death Algorithms and Technological Selection. Is Today’s Data-Driven Medical System Still Compatible with the Constitution?, https://www.researchgate.net/publication/354293560 (accessed on Nov. 10, 2021)
[61] Hao, K. (Apr. 23, 2020) Doctors Are Using AI to Triage Covid-19 Patients. The Tools May Be Here to Stay. MIT Technology Review. https://www.technologyreview.com/2020/04/23/1000410/ai-triage-covid-19-patients-health-care/ (accessed on Nov. 10, 2021)
https://ict4peace.org/wp-content/uploads/2018/02/ICT4Peace-2018-AI-AT-LAWS-Peace-Time-Threats.pdf (accessed on Nov. 10, 2021);
Surber, R. (Feb. 2, 2018) Autonome Intelligenz ist nicht nur in Kriegsrobotern riskant. NZZ. https://www.nzz.ch/meinung/autonome-intelligenz-ist-nicht-nur-in-kriegsrobotern-riskant-ld.1351011 (accessed on Nov. 10, 2021);
https://web.archive.org/web/20120428062851/http://www.thenanoage.com/military.htm (accessed on Nov. 10, 2021);
Nanotechnology: Dangers of Molecular Manufacturing. Center for Responsible Nanotechnology (CRN). http://crnano.org/dangers.htm#products (accessed on Nov. 10, 2021)
No comments:
Post a Comment
Note: only a member of this blog may post a comment.