Read Our Final Invention: Artificial Intelligence and the End of the Human Era Hardcover Online
Authors: James Barrat
the right under the law of armed conflict:
Lynn III, William, “The Pentagon’s Cyberstrategy, One Year Later,”
Foreign Affairs
, September 28, 2011.
Some three thousand organizations:
“The Future of the Electric Grid,”
MIT ENERGY INITIATIVE
, 2011,
http://web.mit.edu/mitei/research/studies/the-electric-grid-2011.shtml
(accessed May 1, 2012).
The highly interconnected grid:
Ibid.
analysis of hypothetical disasters:
“Terrorism and the Emp Threat to Homeland Security.”
Hearing Before the Subcommittee on Terrorism, Technology and Homeland Security of the Committee on the Judiciary United States Senate One Hundred Ninth Congress First Session
, March 8, 2005,
http://www.gpo.gov/fdsys/pkg/CHRG-109shrg21324/pdf/CHRG-109shrg21324.pdf
(accessed March 1, 2010).
Significant disruptions in any one of these sectors:
Lynn III, William, United States Department of Defense, “Remarks on the Department of Defense Cyber Strategy,” last modified July 14, 2011,
http://www.defense.gov/speeches/speech.aspx?speechid=1
5
93
(accessed February 8, 2012).
turn out the lights for fifty million people:
McAfee and CSIS, “In the Dark: Crucial Industries Confront Cyberattacks,” last modified 2011,
http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf
(accessed February 8, 2012).
Many industrial generators and transformers:
USDOE and NERC, “High-Impact, Low-Frequency Event Risk to the North American Bulk Power System,” last modified June 2010,
http://www.nerc.com/files/HILF.pdf
(accessed February 8, 2012).
the generator’s fans grew steadily louder:
Philipp, Joshua, “Critical Infrastructure Vulnerable in Cyber-Attacks,”
The Epoch Times
, May 13, 2011,
http://www.theepochtimes.com/n2/technology/critical-infrastructure-vulnerable-in-cyber-attacks-56273.html
(accessed February 10, 2012).
The device that controlled DHS’ tortured generator:
Associated Press, “US video shows hacker hit on power grid,”
China Daily
, September 27, 2007,
http://www.chinadaily.com.cn/world/2007-09/27/content_6139437.htm
(accessed February 10, 2012).
it was built to kill industrial machines:
Bres, Eric, “The Stuxnet Mystery Continues,”
Tofino
(blog), October 10, 2010,
http://www.tofinosecurity.com/blog/stuxnet-mystery-continues
(accessed June 14, 2012).
holes that permit unauthorized access:
IT Networks, “Stuxnet Things You Don’t Know,” last modified March 25, 2011,
http://www.it-networks.org/2011/03/25/stuxnet-things-you-dont-know/
(accessed December 14, 2011).
their operators didn’t sense anything wrong:
Poeter, Damon, “Former NSA Head: Hitting Iran with Stuxnet Was a ‘Good Idea,’”
PCMAG.COM
, March 12, 2012,
http://www.pcmag.com/article2/0,2817,2401111,00.asp
(accessed April 22, 2012).
two countries jointly created Stuxnet:
Ibid.
a joint U.S.-Israel cyberwar campaign against Iran:
Sanger, David, “Obama Order Sped Up Wave of Cyberattacks Against Iran,”
New York Times
, June 1, 2012,
http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_
(accessed June 14, 2012).
Duqu and Flame are reconnaissance viruses:
“W32.Duqu: The Precursor to the Next Stuxnet,”
Symantec Connect
(blog), October 24, 2011,
http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet
(accessed January 14, 2012).
[Stuxnet’s creators] opened up the box:
Sean McGurk, former head of cybersecurity DHS, interview by Steve Kroft, “Stuxnet: Computer worm opens new era of warfare,” CBS News, March 4, 2012,
http://www.cbsnews.com/8301-18560_162-57390124/stuxnet-computer-worm-opens-new-era-of-warfare/
(accessed June 3, 2012).
Before, a Stuxnet-type attack:
Clayton, Mark, “From the man who discovered Stuxnet, dire warnings one year later,”
MinnPost,
September 23, 2011,
http://www.minnpost.com/christian-science-monitor/2011/09/man-who-discovered-stuxnet-dire-warnings-one-year-later
(accessed January 14, 2012).
the good luck did not last:
Sanger (2012).
Al Qaeda’s attacks of 9/11:
Carter, Shan, and Amanda Cox, “One 9/11 Tally: $3.3 Trillion,”
New York Times,
September 8, 2011,
http://www.nytimes.com/interactive/2011/09/08/us/sept-11-reckoning/cost-graphic.html
(accessed January 14, 2012).
The subprime mortgage scandal:
International Monetary Fund, “IMF Loss Estimates: Executive Summary,” last modified 2010,
http://www.imf.org/external/pubs/ft/weo/2009/01/pdf/exesum.pdf
(accessed October 13, 2011).
The Enron Scandal comes in at about $71 billion:
Laws.Com
, “Easy Guide to Understanding ENRON,” last modified December 6, 2011,
http://finance.laws.com/enron-scandal-summary
(accessed January 14, 2012).
while the Bernie Madoff fraud:
Graybow, Martha, “Madoff mysteries remain as he nears guilty plea,” Reuters, March 11, 2009,
http://www.reuters.com/article/2009/03/11/us-madoff-idUSTRE52A5JK20090311?pageNumber=2&virtualBrandChannel=0&sp=true
(accessed February 14, 2012).
Enron, the scandal-plagued Texas corporation:
Roberts, Joel, “Enron Traders Caught on Tape,”
CBSNEWS.COM
, December 5, 2007,
http://www.cbsnews.com/8301-18563_162-620626.html?tag=contentMain;contentBody
(accessed February 10, 2012)
Enron held rights to a vital electricity transmission line:
Leopold, Jason, “Enron Linked to California blackouts,”
Market Watch
, May 16, 2002,
http://www.marketwatch.com/Story/story/print?guid=4061B1B0-7DC7-4A4F-AE4A-3C119D69A93A
(accessed February 10, 2012).
But Enron made millions:
Roberts, Joel, “Enron Traders Caught on Tape,” December 5, 2007;
“Just cut ’em off”:
Enron and Ken Lay contributed heavily to George W. Bush’s two campaigns for governor and first campaign for president. Even after the California energy crisis, then-president George W. Bush vetoed measures to cap energy prices in California.
16: AGI 2.0
Authorizing a machine to make lethal combat decisions:
Finn, Peter, “A Future for Drones: Automated Killing,”
Washington Post
, September 19, 2011,
http://www.washingtonpost.com/national/national-security/a-future-for-drones-automated-killing/2011/09/15/gIQAVy9mgK_print.html
(accessed February 10, 2012).
a scary list of weaponized robots:
Arkin, Ronald, Mobile Robot Laboratory College of Computing Georgia Institute of Technology, “Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture*,” last modified 2011 (accessed February 10, 2012).
Index
The index that appeared in the print version of this title does not match the pages in your e-book. Please use the search function on your e-reading device to search for terms of interest. For your reference, the terms that appear in the print index are listed below.
Aboujaoude, Elias
accidents
AI and,
see
risks of artificial intelligence
nuclear power plant
Adaptive AI
affinity analysis
agent-based financial modeling
“Age of Robots, The” (Moravec)
Age of Spiritual Machines, The: When Computers Exceed Human Intelligence
(Kurzweil)
AGI,
see
artificial general intelligence
AI,
see
artificial intelligence
AI-Box Experiment
airplane disasters
Alexander, Hugh
Alexander, Keith
Allen, Paul
Allen, Robbie
Allen, Woody
AM (Automatic Mathematician)
Amazon
Anissimov, Michael
anthropomorphism
apoptotic systems
Apple
iPad
iPhone
Siri
Arecibo message
Aristotle
artificial general intelligence (AGI; human-level AI):
body needed for
definition of
emerging from financial markets
first-mover advantage in
jump to ASI from;
see also
intelligence explosion
by mind-uploading
by reverse engineering human brain
time and funds required to develop
Turing test for
artificial intelligence (AI):
black box tools in
definition of
drives in,
see
drives
as dual use technology
emotional qualities in
as entertainment
examples of
explosive,
see
intelligence explosion
friendly,
see
Friendly AI
funding for jump to AGI from
Joy on
risks of,
see
risks of artificial intelligence
Singularity and,
see
Singularity
tight coupling in
utility function of
virtual environments for
artificial neural networks (ANNs)
artificial superintelligence (ASI)
anthropomorphizing
gradualist view of dealing with
jump from AGI to;
see also
intelligence explosion
morality of
nanotechnology and
runaway
Artilect War, The
(de Garis)
ASI,
see
artificial superintelligence
Asilomar Guidelines
ASIMO
Asimov, Isaac:
Three Laws of Robotics of
Zeroth Law of
Association for the Advancement of Artificial Intelligence (AAAI)
asteroids
Atkins, Brian and Sabine
Automated Insights
availability bias
Banks, David L.
Bayes, Thomas
Bayesian statistics
Biden, Joe
biotechnology
black box systems
Blue Brain project
Bok globules
Borg, Scott
Bostrom, Nick
botnets
Bowden, B. V.
brain
augmentation of,
see
intelligence augmentation
basal ganglia in
cerebral cortex in
neurons in
reverse engineering of
synapses in
uploading into computer
Brautigan, Richard
Brazil
Brooks, Rodney
Busy Child scenario
Butler, Samuel
CALO (Cognitive Assistant that Learns and Organizes)
Carr, Nicholas
cave diving
Center for Applied Rationality (CFAR)
Chandrashekar, Ashok
chatbots
chess-playing computers
Deep Blue
China
Chinese Room Argument
Cho, Seung-Hui
Church, Alonso
Churchill, Winston
Church-Turing hypothesis
Clarke, Arthur C.
climate change
cloud computing
cognitive architectures
OpenCog
cognitive bias
Cognitive Computing
Coherent Extrapolated Volition (CEV)
Colossus
“Coming Technological Singularity, The” (Vinge)
computational neuroscience
computers, computing
cloud
detrimental effects from
exponential growth in power of
see also
programming; software
computer science
consciousness
creativity
cybercrime
Cyc
Cycle Computing
Cycorp
DARPA (Defense Advanced Research Projects Agency)
Darwin Machine
Deep Blue
de Garis, Hugo
Dennett, Daniel
Dijkstra, Edger
DNA-related research
Dongarra, Jack
Drake, Francis
drives
creativity
efficiency
resource acquisition
self-preservation
Dugan, Regina
Duqu
Dyson, George
ecophagy
efficiency
Einstein, Albert
emotions
energy grid
Enigma
Enron
Eurisko
evil
extropians
Fastow, Andrew
Ferrucci, David
financial scandals
financial system
Flame
Foreign Affairs
Freidenfelds, Jason
Friendly AI
Coherent Extrapolated Volition and
definition of
intelligence explosion and
SyNAPSE and
Future of Humanity Institute
genetic algorithms
genetic engineering
genetic programming
George, Dileep
global warming
Global Workspace Theory
Goertzel, Benjamin
Golden Rule
Good, I. J.
Google
search engine
Google X
Granger, Richard
Grassie, William
Greaves, Mark
Grossberg, Steven
grounding problem
GUI (Graphical User Interface)
hackers
Hawking, Stephen
Hawkins, Jeff
Hebb, Donald
heuristics
Hibbard, Bill
high-frequency trading systems (HFTs)
Hillis, Danny
Holtzman, Golde
Horvitz, Eric
Hughes, James
I, Robot
(Asimov)
IA,
see
intelligence augmentation
IBM
Blue Brain
Deep Blue
SyNAPSE
Watson
immortality
incomprehensibility
Ings, Simon
inscrutability paradox
Institute for Ethics and Emerging Technologies (IEET)
integrated circuits
intelligence
embodiment and
emerging from Internet