Created 4th October 2013 – http://www.fraw.org.uk/mei/musings/
Contact Paul Mobbs:   email mei☮fraw.org.uk;   web http://www.fraw.org.uk/mei/


Composing on an evening ramble:

War machines, cyberwarfare and democracy – is resistance futile?

I have to compose some ideas for a speech I'm giving tomorrow at the USAF Croughton peace rally. I could do it sat in front of a computer, but as I know all the relevant material I decide to do it on an evening walk instead. Climbing out of the valley through Banbury, on reaching the southern flank of Crouch Hill1 I see, glancing over my shoulder, the object of my solitary dialogue shining in the low-angle sunlight.

You can also download a version of this 'musing' as a PDF file

'Croughton-scape' image

Thirty years ago I used to lead walks across USAF Croughton2 – an old World War Two airbase taken over by the American air force in the 1950s and developed into a major link in their global communications network. These were legal walksalthough we were still hassled by armed soldiers! There was an ancient right of way across the site, and by walking it we established its existence and it had to be officially recognised; at which point the Government diverted it around the southern side of the base3, after which the walks ceased. Now I'm going back tomorrow to talk about my ongoing interest in Croughton, but also my more recent research in to drones and "cybernetic warfare", or "cyberwar" – an area I believe will become a big issue for not just peace groups, but for civil society in general, because of the implications it has for everything from civil liberties to employment.

The changes to the operational layout of USAF Croughton – and the simultaneous decline of its nearby outstation, USAF Barford St. John4 – are testament to the changes that technology has brought to military planning and operations over the last thirty years. At the same time the site has become more noticeable within the local area. As I look south-east across the Cherwell valley, above the rooftops of Bodicote and spire of Kings Sutton, the masts and "golf balls" have become more visible over recent years. In fact, it's even more noticeable from the western aspect, particularly from Whichford Heath5 above Hook Norton. Curiously, in some ways this transformation also reflect changes in my own technical and professional interest in computers, communications and technology.

From "full spectrum dominance" to Edward Snowdon...

It was my interest in radio and short-wave that aroused my interest in these bases, well before I got into peace campaigning. From the late 1980s through the 1990s my interest shifted from radio towards computers and the Internet (I got on-line in 1989!). Around the same time USAF Croughton lost some of its radio masts and started building more radomes6 to support digital satellite-based communications. At the end of the 1990s I started working with activists around the world on campaigns based around Internet "hacktivism"7, using computers and computer networks as a tool for action8 and protest9 – just as the US defence establishment was shifting into satellite and network-based mass surveillance, in pursuit of what they called "next generation warfare"10.

During the 1990s, seeking to consolidate their advantage in the post-Cold War world, and moving on from the over-ambitious Reagan-era Strategic Defense Initiative11 (a.k.a. "Star Wars") programme, the US military instituted a new policy called "full spectrum dominance"12. This was an attempt to introduce new, practical technological capabilities13 to the military which sought to control not just land, sea and air, but also space, the radio spectrum and computer networks. This involved far more than just networking US military installations; the technology grew symbiotically with the development of the Internet itself. And as the use of digital and mobile communications has increased around the globe, so the use of ground- and space-based information gathering to monitor these networks has grown alongside them. And with these new capabilities, the agencies which use that information, such as the NSA14 and CIA15, swelled too (one curious note, the CIA's headquarters is based in Langley, Virginia, and the main road through USAF Croughton is called "Langley Avenue").

As the use of the Internet and social media services has grown, the govern-mental monitoring of these networks has grown to exploit the new mass surveillance capabilities that these systems create. From the recent revelations about the organised state surveillance of Western citizens by Edward Snowdon16, to the indiscriminate war-fighting techniques documented in the classified files disclosed by Chelsea Manning17, to the greater use of drones and computer technology to track, target and destroy "the enemies of freedom" – all these developments have evolved from the impetus for greater technological capabilities ushered in by the "full spectrum dominance" policy...

...and Croughton is an important way-station in maintaining the operation of those systems.

What does Croughton do?

Croughton is one of a number of bases operated across Britain (including Menwith Hill18, Alconbury19 and Fairford20) by the United States Air Force's (USAF) 501st Combat Support Wing21 (501CSW). It's the headquarters for the 422ABG logo422nd Air Base Group22 (422ABG), as part of which it co-ordinates communications support operations for the US Department of Defence and "civilian agencies" (which includes other US government departments and agencies, such as the FBI or DEA, but also the NSA and CIA). According the 422ABG's own publicity information, Croughton handles a quarter to a third of of all the US military traffic between Europe and the continental USA, and supports over twenty different communication and defence systems. According to the US Department of Defense's guide to military installations23

Set up in the early 1950s, its function changing with the communications technology of the time, it has progressively grown over the years to its current layout. Originally, when the technology was based around wholly ground-based radio communications and intelligence gathering, Croughton was a station of two halves. Croughton was the receiver site. The difficulty is that transmitting can also interfere with reception if the antennas are too close together. For that reason USAF Barford St. John (six miles west) acted as the transmitter half of station. Barford St. John is still in operation, but equipment has been progressively removed over recent years, and it is a shadow of its former self25. However, the Ministry of Defence recently renewed the military bylaws26 for the base, and, in response to a Parliamentary question27, said that they were not aware of any changes to its future status. Therefore its existence must still serve some purpose to the US government.

Why changing technology has changed USAF Croughton (and Barford)

The end of the Cold War, and the shift in emphasis in foreign policy to the Middle East, has led to a change in the technology that the USA deploys in Britain. One task which the USAF specialise in is the provision of radio communications links – and as technology and foreign policy has changed, so the USAF's use of their bases has changed to reflect this.

'Croughton old-tech' image In the 1980s most military radio communications used the high- (HF) and very-high-frequency (VHF) wave bands. This was because radio signals could be bounced-off28 the Earth's ionosphere29 (similar to the way light is bent/reflected by water) in order to skip the signals for greater distances around the curvature of the planet. The problem was, just like everyday weather at ground level, the "weather" for radio propagation changes from day-to-day and season-to-season. That meant a lot of equipment had to be maintained to use different radio frequencies, and the amounts of information which could be reliably communicated varied all the time.

Croughton used to have one large microwave satellite dish, giving it direct communications to the USA. Microwaves pass straight through the atmosphere, usually unaffected by the weather, meaning that they can be relied upon at most times. This meant that the low bandwidth information gathered by Croughton and Barford – and other associated bases such as the USAF's intelligence detachment at Chicksands30 – could be bundled up and sent via satellite back to the US for analysis. Communications could also be sent from the US via satellite and then relayed at lower frequencies to diplomatic missions and military units around Europe and the Middle East.

Then the Cold War ended, and US foreign policy began to focus more on the Middle East and the geopolitics of oil. Sites such as Chicksands closed (it was no longer required to pinpoint the position of Warsaw Pact military units), and Croughton began to rebuild – reflecting the changing role of the USAF. And as the "full spectrum dominance" policy took hold, the emphasis shifted towards supporting information gathering and intelligence, and latterly to supporting new semi-autonomous weapons systems that enable the US to "project force" around the globe.

'Croughton new-tech' image The large arrays of radio antennas at Croughton and Barford were slowly taken down. In their place more radomes were built. These domes do not just protect the equipment from the weather – they prevent other agencies seeing which of the many communications and surveillance satellites the US now has in orbit are being used at any moment in time.

As computers have taken over more aspects of everyday life, so intelligence gathering has shifted towards capturing more of the digital information they generate. Unlike voice communications, which always required human operatives to listen to each transmission, computers can scan hundreds of digital communications to gather information about the time, location, duration and source/destination of the transmission. The satellites themselves have little computing power, and act merely as signal relays. It's the equipment at the satellite ground stations31 – such as Croughton – which direct and control the process of communications or surveillance. For the latest autonomous surveillance and weapons systems – such as the Reaper32 and Predator33 drones currently used in the Middle East – sites such as Croughton relay the command information34 which enables them to be operated from their control base at Creech Air Force Base35 in Nevada, USA.

The big difference with the latest weapons and surveillance systems is that they are not government-controlled technologies. They are in most cases designed and built by private contractors in the defence industry. However, many of these technologies are being manufactured using research grants from governments, and then these companies will ultimately sell these systems for civilian use at a large profit (as is happening now with drones36). Also, as these systems are manufactured by private companies, other governments are buying them and setting up their own surveillance and remote attack capabilities. For example, Britain has bought 500 drones37 and has established a control centre for them at RAF Waddington38.

Where's all this heading, and what can we do about it?

The eventual change brought about the the "full spectrum dominance" doctrine, and its focus on control over the "territory" of modern communications, is that the focus of US foreign and military policy has switched from organised states and armies towards individuals and small groups – or in the jargon of the The War Against Terror, from "enemy combatants" toward "insurgents". In the civilian sphere, often funded by the lobbying of the private contractors creating these technologies, we see this same shift taking place as the police and domestic security agencies shift from investigating organised crime towards a focus on alleged (but ill-defined) "domestic extremism"39.

The difficulty is that, whether it's within Pakistan or Britain, the blunt digital logic of the "security state"40 is incapable of telling the difference between what it ethereally defines as "extremism" and the everyday eccentricities of the general public – and so everyone in society is potentially being surveilled at any moment in time in order to catch the communications/actions of the people the state are interested in. Thus far the policy of successive governments has been that, "the innocent have nothing to hide"41 – and yet this statement has been regularly demonstrated to be a fallacy by many technical42, journalistic43 and academic44 reviews of recent leaks and security revelations.

'Croughton radome' image What ultimately drives these changes is the change in digital technology itself. For more than 40 years the rate of change in computing has been driven by a trend known as "Moore's Law"45every eighteen to twenty-four months the power of computer microprocessors doubles. This is of course an exponential trend; each successive doubling compounding the level of change. At the beginning of the 1970s the early microprocessors had around 2,500 transistors inside which carried out the logic functions of the chip. Forty years later common microprocessors have more than a billion times that amount.

Common representations of the Moore's Law trend use a logarithmic graph to show the trend – which results in a straight line. If we use a linear scale what we see instead is that, after forty years, we are only now reaching the steepest part of the curve and – assuming that there are another five or so doublings remaining before we hit the limits of miniaturisation46 – we might see a thirty- or forty-fold increase in computer power. If you think that the introduction of computers into manufacturing in the 1980s and 1990s caused significant unemployment and significance social change, that's nothing compared to what will happen over the next decade or so.

Peace campaigners tend to focus primarily on the Reaper and Predator drones, because these are causing significant human suffering right now47. However, there are considered to be around 500 different types of "drone" under development or production48 right now – and the list is growing. Whilst the military might provide the seed funding for this work, it's the commercial/civilian use of these technologies which promises the greatest rewards for the corporations involved. For that reason, if we look at the effect which these initially military-derived technologies will have on global society – in the same way as the technologies of the space race, or the Internet itself, has done before – then the greatest impacts on human well-being and human rights is yet to come.

For example, whilst we might focus on unmanned aerial vehicles49 ("drones"), an equally large effort is being made to develop autonomous land vehicles for the military. This research is now filtering through to the civilian world in the form of "driver-less vehicles"50. Driver-less vehicles are to be approved for testing on Britain's roads by the end of 201351; they are already testing autonomous vehicles in the Netherlands and USA, and Nissan predicts that driver-less vehicles will be on roads in 202052. However, if you look at the economics of this technology, what will fund its roll-out will not be expensive luxury cars fitted with an "electric chauffeur". It will be replacing everyday delivery vehicles where removing the driver creates a very large change in the economics of operation – and thus makes licensing the use of the self-guiding technology relatively affordable. In Britain, from distribution warehouses to taxi drivers, that could lead to tens of thousands of job losses. In fact, looking at the wider impacts of more power ICTs, the job losses in transport are nothing compared to the "middle class" job losses within services and administration – but that's another debate!

The simplest way to defeat the military use of these technologies would be to prevent their civilian adoption. That's because the private companies making these systems rely for their long-term profitability on selling products developed from government-funded military applications within the commercial/public sector. Likewise, if we uphold privacy and civil rights against the deployment of ever-greater layers of both government and commercial dataveillance53, then we obstruct the creation of a state where everyone can be profiled using data that is collected through their everyday activities.

In the context of how we are told we must live our lives today, this entails some difficult choices:

'Croughton Peace Rally' image Once, harking back to the warnings of Eisenhower's last speech as US President, we talked of the "military–industrial complex"54; nowadays it would be more accurate to talk of the "military–industrial–entertainment complex". Not only has military-inspired computer entertainment fed back into military systems through digital training environments and drone control pads based on video game consoles; today the use of everyday media and communications technologies also provides the raw material for the surveillance of the population by both the military and commercial agencies. It doesn't have to be this way – there are alternatives. The difficulty is that no-one will press these options within the current political debate because no group, even many mainstream environmental campaign groups, wishes to be seen to be "against technology", or be seen to advocate "having less".

As we approach to the "limits to growth"55, where finally the excesses of the human global system are not only destabilising the planet56 but also the operation of the economic system57, shifting towards less intense, lower consumption, and lower technology means of providing our everyday needs will become essential. Supporting the global command and control processes of the technological "security" state are incompatible with the changes required to adapt to these challenges.

Countering this process begins with choosing what kind of life you wish to lead...

I believe that the debate about technology and the military misses three important critical points related to the relationship between humans and their "intelligent" devices:

Firstly, there are the issues of technological scope and complexity. Whilst it might vary from person to person, we all have a finite limit to the amount we can practically "know" (let's call that factor X). In contrast, the intrinsic nature and complexity of information systems grows exponentially (call that factor Y). Therefore, within our personal relationship to technology, when X > Y we all reach the point where we are physically unable of understanding every aspect of the soft/hardware systems we rely upon in our everyday lives. For everyone there will come a point where they simply cannot understand what their gadgets are doing, or how they are achieving it. Now, if you're running the till of a supermarket that's not too much of a problem for the people around you; but if you're in charge of a missile defence post, that can have highly deleterious implications58 for the world around you.

This is not an abstract issue – it's a real practical conundrum within the everyday use of computers. I was stood in a huddle of "techies" at a conference recently discussing precisely this point – and the concern expressed around the group was that if we "geeks" find it difficult to understand every aspect of computers and their varied operating systems these days, what hope do the public have?

Secondly, the way society has dealt with the growing complexity of human technology, from when we made our first clay pots and spears 50,000 years ago, has been to develop economic specialisation59 – and it's arguably from this division of technical skill, and thus power and control, that many human conflicts have arisen. The difficulty is that as technological complexity grows exponentially, but our brains do not, as we approach the limits of human intellectual capabilities "to understand" the systems we rely upon, we fail to understand the relationship of each small part to the greater whole – and where the sum of decisions to maintain that system/economy are taking us.

The problem with hi-tech military technology as a solution to the greater insecurity of our technological society is that it is a self-serving argument60: We must have military technology to defend the vital interests of our highly advanced industrial society; the key vital interests of our industrial society are access to energy and the highly specialised and rare minerals and processes required to manufacture advanced electronics and cybernetic machinery; therefore we increase our insecurity through a greater reliance on technology which require resources which require the projection of force and security in order to obtain them; and ultimately all these systems are vulnerable, both to external disruption by groups or states, and also our failure to fully understand these highly complex systems.

Finally, as more states/agencies adopt these technologies we will inevitably have to let the technologies take over control of their functions – becoming fully autonomous. Not only are humans incapable of working at the same cognitive speed of our "thinking-machines", but because we cannot physically understand their complexity we have to let the machines take control. If "the opposition" deploys these technologies against us, then the only hope of mounting a defence is to let our technologies respond on our behalf. We are almost at this state today with military technology – and with some semi-autonomous military technologies there have already been a number of incidents61.

If we want an example of what this final step entails then we need only look at one institution where the fully autonomous has already taken over – the global stock and commodity exchanges. In automated financial trading62 reaction time is everything (e.g., I have a friend who lost a job in the City because he couldn't shave ten milliseconds off the time it took to get a number from the exchange to the trading floor). Banks and large institutions have to have these automated trading technologies because "everybody else" has them, and they are all in a perpetual battle to "win" in the technological arms race which surrounds automated market trading. The problem, from the evidence of a decade or so of this practice (e.g. see this63, this64, this65, this66 and this67), is that these systems are inherently unstable in practice and prone to sudden, unexpected and aberrant behaviour. Basically, we let the machines loose and unsurprisingly they don't behave like people!

Fundamentally though, there's an anti-democratic core to this whole process which threatens society at large – just as the world of algorithmic financial trading it makes a few large companies rich whilst transferring the risks of failure to society as a whole. Traditional war has been something that society as a whole had to engage in. As war entailed the mobilisation of the population, and the productive capacity of the state, so there had to be a consensus that war was right otherwise the people wouldn't go along with it. That's not the case with cyberwarfare – particularly involving the types of autonomous drones now being developed. Drones do exactly as they're told; machines are incapable of refusing an order – and it's hardly credible that we would see drones in battle acting-out the plot of All Quiet on the Western Front! Fifty years ago Martin Luther King may have said, "Evil only succeeds when good people do nothing", but what excesses will be prevented by "good character" when there are no people involved? – can a collection of logic circuits show compassion or empathy?

By removing humans from war it ceases to be, certainly from the American government's interpretation, "war". In Pakistan drone strikes have proceeded without democratic accountability, and in many cases without the direct involvement of the military (they're carried out by the CIA) because there has been no formal declaration of hostilities. And as we see the greater use of drones by civilian agencies, initially for surveillance (but then perhaps who knows what!), and possibly with the same disregard for democratic accountability we've seen recently in relation to surveillance by the American NSA and Britain's GCHQ, what will that do for the standard of our democracy generally?

'Walk sunset' image As I'd hoped, this evening's walk has helped me work these ideas through. Slowly, step-by-pace, I unwind and weave patterns of thought into stanzas of meaning to describe what I know to an audience in the 15 minutes I have to speak. By sunset, I think I've worked the idea around enough now to know what I'm going to say. I begin to think less of the problem at hand, and more about the simple, lo-tech pleasures of the environment I am immersed within. By Newington Grounds my work is done and so I plod home restfully, enjoying the light show all around me – gradations of pinks and blues fading into dark slate greys; the cooling air and rising dew quenching the newly forged thoughts into tempered patterns for later transcription.




Recommended reading:

Recommended video:

Web sites:

References:

I'd also recommend that you click the embedded links in this report – they're there to help you learn more!
  1. Streetmap: 'Crouch Hill'http://www.streetmap.co.uk/map.srf?X=444015&Y=239207&A=Y&Z=115
  2. Wikipedia: 'RAF Croughton'http://en.wikipedia.org/wiki/Raf_croughton
  3. Streetmap: 'USAF Croughton'http://www.streetmap.co.uk/map.srf?X=455985&Y=232657&A=Y&Z=120
  4. Wikipedia: 'RAF Barford St. John'http://en.wikipedia.org/wiki/RAF_Barford_St_John
  5. Streetmap: 'Whichford Hill'http://www.streetmap.co.uk/map.srf?X=433365&Y=233062&A=Y&Z=120
  6. Wikipedia: 'Radome'http://en.wikipedia.org/wiki/Radome
  7. Wikipedia: 'Hacktivism'http://en.wikipedia.org/wiki/Hacktivism
  8. Excerpt from Infowar: The Hacktivists, Hilton Cordell Productions (Australia), 2001 – http://www.fraw.org.uk/mei/electrohippies/videos/the_hacktivists.mpg
  9. Anti-TWAT, the electrohippie collective, November 2001 – http://www.fraw.org.uk/mei/electrohippies/videos/anti-twat.avi
  10. Wikipedia: 'Fourth Generation Warfare'http://en.wikipedia.org/wiki/Fourth-generation_warfare
  11. Wikipedia: 'Strategic Defense Initiative'http://en.wikipedia.org/wiki/Strategic_Defense_Initiative
  12. Wikipedia: 'Full spectrum dominance'http://en.wikipedia.org/wiki/Full_spectrum_dominance
  13. A Policy of Full Spectrum Dominance, workshop with Bruce Gagnon, Global War and Empire Convergence in Syracuse, NY., 27th April 2013 (note very informative, and worth 27 minutes of your time!)http://blip.tv/indy-tv/workshop-with-bruce-gagnon-titled-a-policy-of-full-spectrum-dominance-6583764
  14. Wikipedia: 'National Security Agency'http://en.wikipedia.org/wiki/National_Security_Agency
  15. Wikipedia: 'Central Intelligence Agency'http://en.wikipedia.org/wiki/Central_Intelligence_Agency
  16. Guardian On-line: 'Edward Snowdon'http://www.theguardian.com/world/edward-snowden
  17. Guardian On-line: 'Chelsea Manning (formerly Bradley Manning)'http://www.theguardian.com/world/chelsea-manning
  18. Wikipedia: 'RAF Menwith Hill'http://en.wikipedia.org/wiki/RAF_Menwith_Hill
  19. Wikipedia: 'RAF Alconbury'http://en.wikipedia.org/wiki/RAF_Alconbury
  20. Wikipedia: 'RAF Fairford'http://en.wikipedia.org/wiki/RAF_Fairford
  21. 501st Combat Support Wing web sitehttp://www.501csw.usafe.af.mil/
  22. 422nd Air Base Group web sitehttp://www.501csw.usafe.af.mil/units/croughton/
  23. US Department of Defense, Military Installations: RAF Croughton/RAF Fairford, United Kingdom – http://www.militaryinstallations.dod.mil/pls/psgprod/f?p=132:CONTENT:0::NO::P4_INST_ID,P4_INST_TYPE:8,INSTALLATION
  24. Wikipedia: 'Contiguous United States'http://en.wikipedia.org/wiki/Contiguous_United_States
  25. Base's special place in aviation history, Oxford Mail, 20th September 2011 – http://www.oxfordmail.co.uk/news/9259692.Base_s_special_place_in_aviation_history/
  26. Ministry of Defence: 'Byelaws review'https://www.gov.uk/ministry-of-defence-byelaws
  27. Written Answers to Questions – Defence: Air Force, Military Bases, Hansard, Tuesday 9th July 2013 – http://www.publications.parliament.uk/pa/cm201314/cmhansrd/cm130709/text/130709w0001.htm#13070993000044
  28. Wikipedia: 'Radio propagation'http://en.wikipedia.org/wiki/Radio_propagation
  29. Wikipedia: 'Ionosphere'http://en.wikipedia.org/wiki/Ionosphere
  30. Wikipedia: 'RAF Chicksands'http://en.wikipedia.org/wiki/RAF_Chicksands
  31. Wikipedia: 'Ground station'http://en.wikipedia.org/wiki/Ground_station
  32. Wikipedia: 'General Atomics MQ-9 Reaper'http://en.wikipedia.org/wiki/General_Atomics_MQ-9_Reaper
  33. Wikipedia: 'General Atomics MQ-1 Predator'http://en.wikipedia.org/wiki/MQ-1_Predator
  34. How Stuff Works: 'How the MQ-9 Reaper Works'http://science.howstuffworks.com/reaper.htm
  35. Wikipedia: 'Creech Air Force Base'http://en.wikipedia.org/wiki/Creech_Air_Force_Base
  36. Civilian drones to fill the skies after law shake-up, New Scientist, 6th February 2012 – http://www.newscientist.com/article/mg21328506.200-civilian-drones-to-fill-the-skies-after-law-shakeup.html
  37. British military has 500 drones, Guardian On-line, 6th May 2013 – http://www.theguardian.com/uk/2013/may/06/british-military-500-drones
  38. RAF Reaper drone squadron stood up at RAF Waddington, BBC News On-line, 23rd October 2012 – http://www.bbc.co.uk/news/uk-england-20039085
  39. ACPO: 'National Co-ordinator Domestic Extremism'http://www.acpo.police.uk/NationalPolicing/NCDENationalCoordinatorDomesticExtremism/Default.aspx
  40. The Snowden files: Why the British public should be worried about GCHQ, John Lanchester, Guardian On-line, 3rd October 2013 – http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchester
  41. Wikipedia: 'Nothing to hide argument'http://en.wikipedia.org/wiki/Nothing_to_hide_argument
  42. Debunking a myth: If you have nothing to hide, you have nothing to fear, Toby Stevens, Computer Weekly, 25th February 2009 – http://www.computerweekly.com/blogs/the-data-trust-blog/2009/02/debunking-a-myth-if-you-have-n.html
  43. The NSA's Prism: Why we should care, Cory Doctorow, Guardian On-line, 14th June 2013http://www.theguardian.com/technology/blog/2013/jun/14/nsa-prism
  44. Nothing to Hide: The False Trade-off Between Privacy and Security, Daniel J. Solove, Yale University Press, 2013. ISBN 9780 3001 7233 1. £12.99. See also, Why Privacy Matters Even if You Have 'Nothing to Hide', Daniel J. Solove, Chronicle of Higher Education, 15th May 2011 – http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/
  45. Wikipedia: 'Moore's Law'http://en.wikipedia.org/wiki/Moore%27s_law
  46. The end of Moore's Law is on the horizon, says AMD, Ian Paul, PC World, 3rd April 2013 – http://www.pcworld.com/article/2032913/the-end-of-moores-law-is-on-the-horizon-says-amd.html
  47. Wikipedia: 'Drone attacks on Pakistan'http://en.wikipedia.org/wiki/Drone_attacks_in_Pakistan
  48. Wired for War: The Robotics Revolution and Conflict in the 21st Century, P.W. Singer, Penguin, 2011. ISBN 9780 1431 1684 4. £9.99.
  49. Wikipedia: 'Unmanned aerial vehicle'http://en.wikipedia.org/wiki/Unmanned_aerial_vehicle
  50. Wikipedia: 'Autonomous car'http://en.wikipedia.org/wiki/Autonomous_car
  51. Driverless cars to be tested on UK roads by end of 2013, BBC News On-line, 16th July 2013 – http://www.bbc.co.uk/news/technology-23330681
  52. Nissan: We'll have a self-driving car on roads in 2020, CNN, 28th August 2013 – http://edition.cnn.com/2013/08/27/tech/innovation/nissan-driverless-car/index.html53
  53. Wikipedia: 'Surveillance, Data mining and profiling'http://en.wikipedia.org/wiki/Surveillance#Data_mining_and_profiling
  54. Wikipedia: 'Eisenhower's farewell address'http://en.wikipedia.org/wiki/Eisenhower%27s_farewell_address
  55. Wikipedia: 'The Limits to Growth'http://en.wikipedia.org/wiki/The_Limits_To_Growth
  56. Smithsonian Institute/MIT YouTube Channel: 'Perspectives in Limits to Growth 2012', March 2012 – http://www.youtube.com/playlist?list=PL2817969CA87E5B47
  57. The Need for a New, Biophysical-Based Paradigm in Economics for the Second Half of the Age of Oil, Charles A.S. Hall, Kent A. Klitgaard, International Journal of Transdisciplinary Research, vol.1 no.1 pp.4-22, 2006 – http://www.fraw.org.uk/files/peakoil/hall_klitgaard_2006.pdf
  58. Wikipedia: 'Iranian Air Flight 655'http://en.wikipedia.org/wiki/Iran_Air_Flight_655
  59. Wikipedia: 'Division of labour'http://en.wikipedia.org/wiki/Division_of_labour
  60. See The Trigger Effect (series 1, episode 1), James Burke's Connections, BBC, 1978 – http://www.youtube.com/watch?v=WgOp-nz3lHg
  61. For example, see Wikipedia: 'Phalanx CIWS, Incidents'http://en.wikipedia.org/wiki/Phalanx_CIWS#Incidents
  62. Wikipedia: 'Algorithmic trading'http://en.wikipedia.org/wiki/Algorithmic_trading
  63. Black box traders are on the march, Telegraph On-line, 27th August 2006 – http://www.telegraph.co.uk/finance/2946240/Black-box-traders-are-on-the-march.html
  64. Knight Capital Says Trading Glitch Cost It $440 Million, Dealbook, New York Times, 2nd August 2012 – http://dealbook.nytimes.com/2012/08/02/knight-capital-says-trading-mishap-cost-it-440-million/
  65. Stock plunge raises alarm on algo trading, Reuters, 6th May 2010http://www.reuters.com/article/2010/05/06/us-market-selloff-idUSTRE6455ZG20100506
  66. Hoax Shows Growth in Algorithmic Trading, Wall Street Journal, 6th May 2013 – http://blogs.wsj.com/moneybeat/2013/05/06/the-twitter-hoax-shows-growth-in-algorithmic-trading/
  67. Too Fast to Fail: Is High-Speed Trading the Next Wall Street Disaster?, Nick Baumann, Mother Jones, January/February 2013 – http://www.motherjones.com/politics/2013/02/high-frequency-trading-danger-risk-wall-street