Our Final Invention: Artificial Intelligence and the End of the Human Era Hardcover (36 page)

the right under the law of armed conflict:
Lynn III, William, “The Pentagon’s Cyberstrategy, One Year Later,”
Foreign Affairs
, September 28, 2011.

Some three thousand organizations:
“The Future of the Electric Grid,”
MIT ENERGY INITIATIVE
, 2011,
http://web.mit.edu/mitei/research/studies/the-electric-grid-2011.shtml
(accessed May 1, 2012).

The highly interconnected grid:
Ibid.

analysis of hypothetical disasters:
“Terrorism and the Emp Threat to Homeland Security.”
Hearing Before the Subcommittee on Terrorism, Technology and Homeland Security of the Committee on the Judiciary United States Senate One Hundred Ninth Congress First Session
, March 8, 2005,
http://www.gpo.gov/fdsys/pkg/CHRG-109shrg21324/pdf/CHRG-109shrg21324.pdf
(accessed March 1, 2010).
Significant disruptions in any one of these sectors:
Lynn III, William, United States Department of Defense, “Remarks on the Department of Defense Cyber Strategy,” last modified July 14, 2011,
http://www.defense.gov/speeches/speech.aspx?speechid=1
5
93
(accessed February 8, 2012).

turn out the lights for fifty million people:
McAfee and CSIS, “In the Dark: Crucial Industries Confront Cyberattacks,” last modified 2011,
http://www.mcafee.com/us/resources/reports/rp-critical-infrastructure-protection.pdf
(accessed February 8, 2012).
Many industrial generators and transformers:
USDOE and NERC, “High-Impact, Low-Frequency Event Risk to the North American Bulk Power System,” last modified June 2010,
http://www.nerc.com/files/HILF.pdf
(accessed February 8, 2012).

the generator’s fans grew steadily louder:
Philipp, Joshua, “Critical Infrastructure Vulnerable in Cyber-Attacks,”
The Epoch Times
, May 13, 2011,
http://www.theepochtimes.com/n2/technology/critical-infrastructure-vulnerable-in-cyber-attacks-56273.html
(accessed February 10, 2012).
The device that controlled DHS’ tortured generator:
Associated Press, “US video shows hacker hit on power grid,”
China Daily
, September 27, 2007,
http://www.chinadaily.com.cn/world/2007-09/27/content_6139437.htm
(accessed February 10, 2012).

it was built to kill industrial machines:
Bres, Eric, “The Stuxnet Mystery Continues,”
Tofino
(blog), October 10, 2010,
http://www.tofinosecurity.com/blog/stuxnet-mystery-continues
(accessed June 14, 2012).
holes that permit unauthorized access:
IT Networks, “Stuxnet Things You Don’t Know,” last modified March 25, 2011,
http://www.it-networks.org/2011/03/25/stuxnet-things-you-dont-know/
(accessed December 14, 2011).

their operators didn’t sense anything wrong:
Poeter, Damon, “Former NSA Head: Hitting Iran with Stuxnet Was a ‘Good Idea,’”
PCMAG.COM
, March 12, 2012,
http://www.pcmag.com/article2/0,2817,2401111,00.asp
(accessed April 22, 2012).
two countries jointly created Stuxnet:
Ibid.
a joint U.S.-Israel cyberwar campaign against Iran:
Sanger, David, “Obama Order Sped Up Wave of Cyberattacks Against Iran,”
New York Times
, June 1, 2012,
http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_
(accessed June 14, 2012).

Duqu and Flame are reconnaissance viruses:
“W32.Duqu: The Precursor to the Next Stuxnet,”
Symantec Connect
(blog), October 24, 2011,
http://www.symantec.com/connect/w32_duqu_precursor_next_stuxnet
(accessed January 14, 2012).

[Stuxnet’s creators] opened up the box:
Sean McGurk, former head of cybersecurity DHS, interview by Steve Kroft, “Stuxnet: Computer worm opens new era of warfare,” CBS News, March 4, 2012,
http://www.cbsnews.com/8301-18560_162-57390124/stuxnet-computer-worm-opens-new-era-of-warfare/
(accessed June 3, 2012).

Before, a Stuxnet-type attack:
Clayton, Mark, “From the man who discovered Stuxnet, dire warnings one year later,”
MinnPost,
September 23, 2011,
http://www.minnpost.com/christian-science-monitor/2011/09/man-who-discovered-stuxnet-dire-warnings-one-year-later
(accessed January 14, 2012).
the good luck did not last:
Sanger (2012).

Al Qaeda’s attacks of 9/11:
Carter, Shan, and Amanda Cox, “One 9/11 Tally: $3.3 Trillion,”
New York Times,
September 8, 2011,
http://www.nytimes.com/interactive/2011/09/08/us/sept-11-reckoning/cost-graphic.html
(accessed January 14, 2012).
The subprime mortgage scandal:
International Monetary Fund, “IMF Loss Estimates: Executive Summary,” last modified 2010,
http://www.imf.org/external/pubs/ft/weo/2009/01/pdf/exesum.pdf
(accessed October 13, 2011).
The Enron Scandal comes in at about $71 billion:
Laws.Com
, “Easy Guide to Understanding ENRON,” last modified December 6, 2011,
http://finance.laws.com/enron-scandal-summary
(accessed January 14, 2012).
while the Bernie Madoff fraud:
Graybow, Martha, “Madoff mysteries remain as he nears guilty plea,” Reuters, March 11, 2009,
http://www.reuters.com/article/2009/03/11/us-madoff-idUSTRE52A5JK20090311?pageNumber=2&virtualBrandChannel=0&sp=true
(accessed February 14, 2012).
Enron, the scandal-plagued Texas corporation:
Roberts, Joel, “Enron Traders Caught on Tape,”
CBSNEWS.COM
, December 5, 2007,
http://www.cbsnews.com/8301-18563_162-620626.html?tag=contentMain;contentBody
(accessed February 10, 2012)
Enron held rights to a vital electricity transmission line:
Leopold, Jason, “Enron Linked to California blackouts,”
Market Watch
, May 16, 2002,
http://www.marketwatch.com/Story/story/print?guid=4061B1B0-7DC7-4A4F-AE4A-3C119D69A93A
(accessed February 10, 2012).

But Enron made millions:
Roberts, Joel, “Enron Traders Caught on Tape,” December 5, 2007;
“Just cut ’em off”:
Enron and Ken Lay contributed heavily to George W. Bush’s two campaigns for governor and first campaign for president. Even after the California energy crisis, then-president George W. Bush vetoed measures to cap energy prices in California.

16: AGI 2.0

Authorizing a machine to make lethal combat decisions:
Finn, Peter, “A Future for Drones: Automated Killing,”
Washington Post
, September 19, 2011,
http://www.washingtonpost.com/national/national-security/a-future-for-drones-automated-killing/2011/09/15/gIQAVy9mgK_print.html
(accessed February 10, 2012).
a scary list of weaponized robots:
Arkin, Ronald, Mobile Robot Laboratory College of Computing Georgia Institute of Technology, “Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture*,” last modified 2011 (accessed February 10, 2012).

 

Index

The index that appeared in the print version of this title does not match the pages in your e-book. Please use the search function on your e-reading device to search for terms of interest. For your reference, the terms that appear in the print index are listed below.

Aboujaoude, Elias

accidents

AI and,
see
risks of artificial intelligence

nuclear power plant

Adaptive AI

affinity analysis

agent-based financial modeling

“Age of Robots, The” (Moravec)

Age of Spiritual Machines, The: When Computers Exceed Human Intelligence
(Kurzweil)

AGI,
see
artificial general intelligence

AI,
see
artificial intelligence

AI-Box Experiment

airplane disasters

Alexander, Hugh

Alexander, Keith

Allen, Paul

Allen, Robbie

Allen, Woody

AM (Automatic Mathematician)

Amazon

Anissimov, Michael

anthropomorphism

apoptotic systems

Apple

iPad

iPhone

Siri

Arecibo message

Aristotle

artificial general intelligence (AGI; human-level AI):

body needed for

definition of

emerging from financial markets

first-mover advantage in

jump to ASI from;
see also
intelligence explosion

by mind-uploading

by reverse engineering human brain

time and funds required to develop

Turing test for

artificial intelligence (AI):

black box tools in

definition of

drives in,
see
drives

as dual use technology

emotional qualities in

as entertainment

examples of

explosive,
see
intelligence explosion

friendly,
see
Friendly AI

funding for jump to AGI from

Joy on

risks of,
see
risks of artificial intelligence

Singularity and,
see
Singularity

tight coupling in

utility function of

virtual environments for

artificial neural networks (ANNs)

artificial superintelligence (ASI)

anthropomorphizing

gradualist view of dealing with

jump from AGI to;
see also
intelligence explosion

morality of

nanotechnology and

runaway

Artilect War, The
(de Garis)

ASI,
see
artificial superintelligence

Asilomar Guidelines

ASIMO

Asimov, Isaac:

Three Laws of Robotics of

Zeroth Law of

Association for the Advancement of Artificial Intelligence (AAAI)

asteroids

Atkins, Brian and Sabine

Automated Insights

availability bias

Banks, David L.

Bayes, Thomas

Bayesian statistics

Biden, Joe

biotechnology

black box systems

Blue Brain project

Bok globules

Borg, Scott

Bostrom, Nick

botnets

Bowden, B. V.

brain

augmentation of,
see
intelligence augmentation

basal ganglia in

cerebral cortex in

neurons in

reverse engineering of

synapses in

uploading into computer

Brautigan, Richard

Brazil

Brooks, Rodney

Busy Child scenario

Butler, Samuel

CALO (Cognitive Assistant that Learns and Organizes)

Carr, Nicholas

cave diving

Center for Applied Rationality (CFAR)

Chandrashekar, Ashok

chatbots

chess-playing computers

Deep Blue

China

Chinese Room Argument

Cho, Seung-Hui

Church, Alonso

Churchill, Winston

Church-Turing hypothesis

Clarke, Arthur C.

climate change

cloud computing

cognitive architectures

OpenCog

cognitive bias

Cognitive Computing

Coherent Extrapolated Volition (CEV)

Colossus

“Coming Technological Singularity, The” (Vinge)

computational neuroscience

computers, computing

cloud

detrimental effects from

exponential growth in power of

see also
programming; software

computer science

consciousness

creativity

cybercrime

Cyc

Cycle Computing

Cycorp

DARPA (Defense Advanced Research Projects Agency)

Darwin Machine

Deep Blue

de Garis, Hugo

Dennett, Daniel

Dijkstra, Edger

DNA-related research

Dongarra, Jack

Drake, Francis

drives

creativity

efficiency

resource acquisition

self-preservation

Dugan, Regina

Duqu

Dyson, George

ecophagy

efficiency

Einstein, Albert

emotions

energy grid

Enigma

Enron

Eurisko

evil

extropians

Fastow, Andrew

Ferrucci, David

financial scandals

financial system

Flame

Foreign Affairs

Freidenfelds, Jason

Friendly AI

Coherent Extrapolated Volition and

definition of

intelligence explosion and

SyNAPSE and

Future of Humanity Institute

genetic algorithms

genetic engineering

genetic programming

George, Dileep

global warming

Global Workspace Theory

Goertzel, Benjamin

Golden Rule

Good, I. J.

Google

search engine

Google X

Granger, Richard

Grassie, William

Greaves, Mark

Grossberg, Steven

grounding problem

GUI (Graphical User Interface)

hackers

Hawking, Stephen

Hawkins, Jeff

Hebb, Donald

heuristics

Hibbard, Bill

high-frequency trading systems (HFTs)

Hillis, Danny

Holtzman, Golde

Horvitz, Eric

Hughes, James

I, Robot
(Asimov)

IA,
see
intelligence augmentation

IBM

Blue Brain

Deep Blue

SyNAPSE

Watson

immortality

incomprehensibility

Ings, Simon

inscrutability paradox

Institute for Ethics and Emerging Technologies (IEET)

integrated circuits

intelligence

embodiment and

emerging from Internet

Other books

The Chain Garden by Jane Jackson
Disappearance by Wiley, Ryan
Cecily Von Ziegesar by Cum Laude (v5)
The Wheel Of Time by Carlos Castaneda
Sabin, A Seven Novel by A.M. Hargrove
Death Line by Maureen Carter


readsbookonline.com Copyright 2016 - 2024