Doctoring Devices

Total Page:16

File Type:pdf, Size:1020Kb

Doctoring Devices Biohackers get Safer and faster When missile to work flights defences fail TechnologyQuarterly September 6th 2014 Smartphones on wheels How the connected car goes driverless 20140906_TQ_SEPT.indd 1 26/08/2014 14:44 The Economist Technology Quarterly September 6th 2014 Monitor 1 Contents On the cover Smartphones and other mobile-communications technology are changing the way cars are made, bought and used. As vehicles begin to talk to each other and the road around them, a driverless future comes closer, page 12 Monitor Biohackers of the world, unite 1 Biohackers organise, medical-technology startups, heating people rather than buildings, the language of the internet of things, and suspended animation Difference engine The DIYbio movement: Following the example of maker communities 6 Where gadgets go to die worldwide, hobbyists keen on biology have started to get together A mountain of electronic waste T LOOKS like an experimental cooking beliefthat “biology is technology” (to needs responsible recycling Iclass as participants taste a green pow- quote the title ofa bookby Rob Carlson, a der, pull faces and then mix it into a con- DIYbio pioneer): that DNA is a form of Military technology coction offruit and milk. But the event software that can be manipulated to de- 7 The unsheltering sky organised by Open Wetlab in Amsterdam sign biological processes and devices. But Long-range ballistic-missile has a more serious goal than to come up some people worry that amateur labora- defences look doomed with new recipes forsmoothies: finding tories could create killer bugs or provide ways to make spirulina—an algae which is training forbio terrorists. For the moment, full ofproteins and vitamins, but tastes at least, such fears seem premature. The Demolition technology disgusting—more palatable. amateur labs are not yet very sophisticat- 10 Bringing the house down Welcome to the world ofbiohacking. ed, according to a recent survey of359 New ways to demolish old In its original sense, hacking involves members ofthe DIYbio movement by the buildings in crowded cities taking things apart and putting them back Woodrow Wilson International Centre for together again in new ways. Such tinkerers Scholars, a think-tank. Most activities helped to create the “maker movement”, involve extracting DNA, for instance from The connected car which has grown into a worldwide com- strawberries. Only13% ofthe biohackers 12 Smartphones on wheels munity ofpeople constructing things have synthesised a gene and just 3% have Mobile communications are ranging from 3D-printed jewellery to genetically engineered a mammalian cell. changing the way cars are used robots. Biohackers have also started to Since biohackers often have a PhD, they organise themselves, under the umbrella probably did this in a professional lab. Air-traffic control ofa movement called DIYbio. Nearly 50 cities, mostly in America and Art and science 15 Free flight Europe, are now home to groups ofbio- Not all the groups are focused on synthetic How pilots can fly direct routes, hackers or amateur laboratories where biology. In Europe, amateur biologists saving time and fuel they can meet and experiment. Besides often workwith artists and designers, says Open Wetlab, these include Biocurious in Markus Schmidt, co-author ofa paper on Brain Scan Sunnyvale, California, Genspace in New European DIYbio. A recent faircalled 17 Welcome to my genome Yorkand La Paillasse in Paris. The number “Synthetic Aesthetics” at the Victoria and A profile of George Church, a ofbiohackers around the world is any- Albert Museum in London included pro- pioneer of genetics body’s guess, but the movement’s main jects that use bacteria to colour tapestries, online-mailing list boasts nearly 4,000 grow bags and encode music in DNA. members and is growing rapidly. “Our goal is not only to advance biolo- What drives the movement is the gy, but democratise it,” explains Ellen 1 2 Monitor The Economist Technology Quarterly September 6th 2014 2 Jorgensen, president ofGenspace. Found- OpenPCR has now become a startup advice to new ventures.) ed in 2010, the community laboratory in business and is working on an improved As DIYbio grows calls fortighter regu- ¡ Brooklyn is the model forthe two dozen PCR machine. Amplino, a Dutch startup, lations will get louder et clamping down others that have since opened around the has built a low-cost device capable of would be counter-productive, argues Mr world. Genspace hosts all sorts ofevents, detecting malaria, which it hopes will be Carlson. Such rules would be hard to including “biohacker boot camps”, as well used in developing countries. enforce and drive biohackers under- as projects such as “barcoding” in Alaska, Other firms are working on products ground. It would hamper startups and an attempt to catalogue plants. that could make life much easier forbio- limit innovation. Much better, says Mr Technological movements often arise hackers. Autodesk, a big software com- Carlson, for governments to support com- when a critical mass ofenthusiasts get pany, has a scheme under way code- munity labs where everbody—biohackers, greater access to information and find named “Project Cyborg” which is devel- startups and anyone who is interested— tools that are both cheap and widely oping design tools for DNA. Opus can experiment openly and safely. 7 available. A similar thing is happening in Labworks, a startup, aims to build a fluid- medical technology, where there is a handling robot starting at $2,000. Even flourish ofinnovative startups making more ambitious, Cambrian Genomics is new devices (see next story). building a “3D printer forliving things”—a Many ofthe first makers were software device that can cheaply synthesise DNA. Doctoring developers wanting to reconnect with the But there are barriers that will limit real world by building physical things. DIYbio’s growth. Building a biological devices Enough people are now interested in device is a lot more complicated than biology and have knowledge to hackDNA, putting together a robot or designing a says Mr Carlson. DIYbio also has roots in new circuit board. And whereas regulators Medical technology: Easy access to iGEM, a successful annual synthetic- have largely ignored the maker move- technology and a lower cost of entry biology competition forundergraduates. ment, they are a lot more interested in the are creating a crowd of startups As in the case ofthe maker movement, workofamateur laboratories. websites such as YouTube and Instruc- IfEuropean biohackers are less focused making new gear tables allow tinkerers to share ideas. Simi- on synthetic biology, it is partly because OFTWARE helped startups flourish, larly, access to information about biotech- they need to askforpermission. Genetics Swith open-source programs and the nology has become much easier, says Mr laboratories require a licence and only a web providing easy collaboration and a Carlson. The Journal of Visualised Experi- few are even trying to get one. In America fast route to market. Tens ofthousands of ments, a peer-reviewed online-video biohackers used to riskgetting arrested, software developers will produce apps publication, is one source. but in recent years the FBI has opted fora worth more than $30 billion this year. The necessary laboratory equipment is more enlightened approach: local special Now cheap computing power and the no longer beyond the budget ofhobbyists. agents talkto community labs; the agency shrinking cost ofsmall-scale manufactur- Many devices are now forsale on eBay organises an annual DIYbio conference; it ing are spawning more hardware startups. and more specialised online market- is even a sponsor ofiGEM. “The people As examples from Europe show, a particu- places, not least because the recession has who practise DIYbio are best placed to larly thriving area is medical technology. forced a number ofcommercial laborato- know what is going on,” says Edward You, “Easy access to technology empowers ries to close. Such equipment can also be who pioneered the FBI’s effort. He also creative minds,” says Ulrich Weinberg of built more cheaply by using off-the-shelf thinks that the agency and the DIYbio the Hasso Plattner Institute in Potsdam, parts and open-source software. movement have a “shared responsibility Germany. Although Mr Weinberg often to protect science”. In other words, if works with big companies that make My own PCR machine things go wrong there will be tighter regu- medical devices, he has seen the costs of If3D printers are the tool ofchoice for lations—making life more difficult for both entry tumble. “Even groups ofstudents 1 makers, PCR machines are de rigueur in law enforcement and biohackers. amateur labs. Using a biochemical tech- Most DIYbio leaders welcome all this nology called polymerase chain reaction (although some joke that DIYbio would (hence PCR), the machines are used to not be where it is today without the FBI’s identify a specific segment ofDNA and support). “What you don’t want to do is make multiple copies ofit. “Youcan now surprise law enforcement and regulators build these in a garage,” says Josh Perfetto, with new technologies,” says Jason Bobe, who is one ofthe founders ofOpenPCR, a co-founder ofDIYbio.org, a charity that group which has developed a simple PCR supports the movement, who also works machine that costs only $600. with George Church, a pioneer ofgenetics DIYbio also benefits from the organisa- (see page 17). For now it seems to be able to tional infrastructure ofthe maker move- regulate itself. DIYbio.org has hired safety ment. Many laboratories start in hacker- experts formembers to consult. And spaces, which serve as clubhouses for leaders ofthe movement on both sides of makers. Amsterdam’s Open Wetlab, for the Atlantic have developed a code of instance, is part ofthe Waag Society, an ethics which frowns on releasing geneti- organisation which also runs a shop for cally modified organisms into the environ- makers.
Recommended publications
  • Winter 2020 Full Issue
    Naval War College Review Volume 73 Number 1 Winter 2020 Article 1 2020 Winter 2020 Full Issue The U.S. Naval War College Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Naval War College, The U.S. (2020) "Winter 2020 Full Issue," Naval War College Review: Vol. 73 : No. 1 , Article 1. Available at: https://digital-commons.usnwc.edu/nwc-review/vol73/iss1/1 This Full Issue is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Naval War College: Winter 2020 Full Issue Winter 2020 Volume 73, Number 1 Published by U.S. Naval War College Digital Commons, 2020 1 Naval War College Review, Vol. 73 [2020], No. 1, Art. 1 Cover Two modified Standard Missile 2 (SM-2) Block IV interceptors are launched from the guided-missile cruiser USS Lake Erie (CG 70) during a Missile Defense Agency (MDA) test to intercept a short-range ballistic-missile target, conducted on the Pacific Missile Range Facility, west of Hawaii, in 2008. The SM-2 forms part of the Aegis ballistic-missile defense (BMD) program. In “A Double-Edged Sword: Ballistic-Missile Defense and U.S. Alli- ances,” Robert C. Watts IV explores the impact of BMD on America’s relationship with NATO, Japan, and South Korea, finding that the forward-deployed BMD capability that the Navy’s Aegis destroyers provide has served as an important cement to these beneficial alliance relationships.
    [Show full text]
  • ISRAEL and the WMD THREAT: LESSONS for EUROPE by Cameron S
    ISRAEL AND THE WMD THREAT: LESSONS FOR EUROPE By Cameron S. Brown* Having faced a growing threat from the use of weapons of mass destruction (WMD) for the past several decades, Israel has been forced to make counter-proliferation a top national defense priority.(1) It has invested billions of dollars in developing a multi-layered national defense strategy that is arguably the most highly developed of any country on earth. As such, Israel's experience in this field can offer several important lessons (from its mistakes and successes) for European countries that are only now coming under the range of several rogue countries' long-range missile systems, not to mention the growing threat of WMD terrorism (This article was originally written for a project and conference on "Countering Threats in the Era of Mass Destruction: Accounts from the Middle East and Europe," co-sponsored by the GLORIA Center and The Military Centre for Strategic Studies (CeMiSS) of Italy.) THE ISRAELI THREAT Secondly, in any conflict, Israel is PERCEPTION heavily dependent on a system of calling up In order to understand what policies reserve solders to reinforce its small Israel has devised and employed in order to standing army. Should one of Israel's counter WMD proliferation, it is imperative adversaries use a WMD in the first few to consider the threats Israeli security hours of hostilities--and especially if it hit planners have taken into consideration near a mobilization center--it would when formulating these strategies.(2) unquestionably impede any efficient The gravity of the situation for Israel lies mobilization of the reserve forces.
    [Show full text]
  • USAF Counterproliferation Center CPC Outreach Journal
    Issue No. 991, 23 March 2012 Articles & Other Documents: Featured Article: Scrapping Trident Nuclear Missiles 'would Save £83.5bn' 1. ElBaradei Says Iran to Develop Atomic Weapons if Israel Attacks 2. Leader Warns of Iran's Crushing Response to US, Israeli Aggression 3. Iran Not to Pull Out of NPT, nor Halt Nuclear Energy Program 4. Barak: Iran Not Completing Nukes Out of Fear 5. China Vows to Promote International Cooperation on Nuclear Security 6. ‘N.K. Told U.S. about Satellite Plan Last Year’ 7. NK Brinksmanship Jolts 6-Way Talks 8. Pyongyang Threatens to View N.K. Statement at Seoul Nuke Summit as Declaration of War 9. Crash Fears over North Korean Satellite Trajectory 10. China Developing 2nd Stealth Fighter Jet 11. Seoul Presses Pyongyang to Cancel Rocket Launch 12. DPRK's Rocket Launch to Be Discussed on Sidelines of Nuclear Security Summit 13. Lee Says S. Korea, U.S. Expected to Reach Agreement on Extending Missile Range: Report 14. Kim Jong-un's Barbaric Purge of 'Unsound' Military Brass 15. Taliban Commander Wants Pakistan’s Nukes, Overthrow of Govt 16. Russia Considering Cyber-Security Command 17. Russia to Raise Awareness about Missile Defense 18. Russia Destroys over 60 Prc of Chemical Weapons 19. Deal between Russia, NATO on Missile Defense Still Possible: Medvedev 20. Ukraine Completely Removes Highly Enriched Uranium 21. Scrapping Trident Nuclear Missiles 'would Save £83.5bn' 22. Obama to Attend Nuclear Summit in South Korea 23. U.S. Denies Disclosing Missile Defense Data to Russia 24. Iran Diplomats Cased NYC Landmarks, Police Official Says 25.
    [Show full text]
  • The End of MAD? Keir A. Lieber and Daryl G. Press the Nuclear Dimension of U.S. Primacy
    The End of MAD? The End of MAD? Keir A. Lieber and Daryl G. Press The Nuclear Dimension of U.S. Primacy For nearly half a cen- tury, the world’s most powerful nuclear-armed countries have been locked in a military stalemate known as mutual assured destruction (MAD). By the early 1960s, the United States and the Soviet Union possessed such large, well- dispersed nuclear arsenals that neither state could entirely destroy the other’s nuclear forces in a ªrst strike. Whether the scenario was a preemptive strike during a crisis, or a bolt-from-the-blue surprise attack, the victim would al- ways be able to retaliate and destroy the aggressor. Nuclear war was therefore tantamount to mutual suicide. Many scholars believe that the nuclear stale- mate helped prevent conºict between the superpowers during the Cold War, and that it remains a powerful force for great power peace today.1 The age of MAD, however, is waning. Today the United States stands on the verge of attaining nuclear primacy vis-à-vis its plausible great power adversar- ies. For the ªrst time in decades, it could conceivably disarm the long-range Keir A. Lieber, author of War and the Engineers: The Primacy of Politics over Technology, is Assistant Professor of Political Science at the University of Notre Dame. Daryl G. Press, author of Calculating Cred- ibility: How Leaders Assess Military Threats, is Associate Professor of Political Science at the Univer- sity of Pennsylvania. The authors thank Richard Betts, Stephen Brooks, Matthew Bunn, Geoff Forden, Charles Glaser, David Kang, Christopher Layne, George Lewis, Jennifer Lind, Daniel Lindley, Michael Mastanduno, John Mearsheimer, Robert Pape, Theodore Postol, Gideon Rose, Stephen Rosen, Anne Sa’adah, Alan Stam, Benjamin Valentino, and William Wohlforth for helpful comments on previous drafts of this article.
    [Show full text]
  • Israel's Air and Missile Defense During the 2014 Gaza
    Israel’s Air and Missile Defense During the 2014 Gaza War Rubin Uzi Ramat Gan 5290002 Israel Mideast Security and Policy Studies No. 111 www.besacenter.org THE BEGIN-SADAT CENTER FOR STRATEGIC STUDIES BAR-ILAN UNIVERSITY Mideast Security and Policy Studies No. 111 Israel’s Air and Missile Defense During the 2014 Gaza War Uzi Rubin Israel’s Air and Missile Defense During the 2014 Gaza War Uzi Rubin © The Begin-Sadat Center for Strategic Studies Bar-Ilan University Ramat Gan 5290002 Israel Tel. 972-3-5318959 Fax. 972-3-5359195 [email protected] http://www.besacenter.org ISSN 1565-9895 February 2015 Cover picture: Flickr/Israel Defense Forces The Begin-Sadat (BESA) Center for Strategic Studies The Begin-Sadat Center for Strategic Studies advances a realist, conservative, and Zionist agenda in the search for security and peace for Israel. It was named in memory of Menachem Begin and Anwar Sadat, whose efforts in pursuing peace lay the cornerstone for conflict resolution in the Middle East. The center conducts policy-relevant research on strategic subjects, particularly as they relate to the national security and foreign policy of Israel and Middle East regional affairs. Mideast Security and Policy Studies serve as a forum for publication or re-publication of research conducted by BESA associates. Publication of a work by BESA signifies that it is deemed worthy of public consideration but does not imply endorsement of the author’s views or conclusions. Colloquia on Strategy and Diplomacy summarize the papers delivered at conferences and seminars held by the Center for the academic, military, official and general publics.
    [Show full text]
  • 1Sth00.Vp:Corelventura
    Science,Mitchell Technology,/ The TMD Footprint & Human Controversy Values Whose Shoe Fits Best? Dubious Physics and Power Politics in the TMD Footprint Controversy Gordon Mitchell University of Pittsburgh Apparent design breakthroughs in short-range missile defense systems such as Theater High-Altitude Air Defense (THAAD) have prompted questions about the legality of such systems under the 1972 Antiballistic Missile (ABM) Treaty. Prominent physicists have used computer “footprint” methodology to prove that if engineered to specifications, THAAD might exceed ABM Treaty performance limits banning highly effective missile defense systems. In response, missile defense officials commissioned Sparta, Inc. to con- duct secret research casting doubt on the validity of such findings. The substantial diplo- matic issues at stake and the interesting rhetorical dynamics involved in this dispute war- rant close scholarly analysis. Attention to the iterative relationship between the interpenetrating spheres of public argument and scientific practice in this case yields novel insight about the processes in which technical knowledge of defense systems is forged and raises fresh issues for the “closure project” in science and technology contro- versy studies. Soon after the Clinton-Gore administration began its aggressive pursuit of Theater High-Altitude Air Defense (THAAD) in the early 1990s, concerns were raised that the new ballistic missile defense system might be illegal. Critics argued that THAAD’s high-end design exceeded performance limita- tions set down in the 1972 Antiballistic Missile (ABM) Treaty. On the sur- face, such claims strained credulity, given that the ABM Treaty clearly does not cover theater missile defense (TMD) systems such as Patriot and THAAD (it only prohibits widespread testing and deployment of strategic missile defense systems designed to counter long-range rockets fired across whole continents).
    [Show full text]
  • Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress
    Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress Ronald O'Rourke Specialist in Naval Affairs Updated February 6, 2019 Congressional Research Service 7-.... www.crs.gov RL33745 Navy Aegis Ballistic Missile Defense (BMD) Program Summary The Aegis ballistic missile defense (BMD) program, which is carried out by the Missile Defense Agency (MDA) and the Navy, gives Navy Aegis cruisers and destroyers a capability for conducting BMD operations. The Department of Defense’s January 2019 missile defense review report states that the number of operational BMD-capable Aegis ships was 38 at the end of FY2018 and is planned to increase to 60 by the end of FY2023. The Aegis BMD program is funded mostly through MDA’s budget. The Navy’s budget provides additional funding for BMD-related efforts. MDA’s proposed FY2019 budget requests a total of $1,711.8 million in procurement and research and development funding for Aegis BMD efforts, including funding for two Aegis Ashore sites in Poland and Romania that are to be part of the European Phased Adaptive Approach (EPAA). MDA’s budget also includes operations and maintenance (O&M) and military construction (MilCon) funding for the Aegis BMD program. Under the EPAA for European BMD operations, BMD-capable Aegis ships are operating in European waters to defend Europe from potential ballistic missile attacks from countries such as Iran. BMD-capable Aegis ships also operate in the Western Pacific and the Persian Gulf to provide regional defense against potential ballistic missile attacks from countries such as North Korea and Iran.
    [Show full text]
  • Physicist Claims Gagging Over Missile Defence System
    news Hopes of biotech Physicist claims gagging interest spur Latvian population genetics over missile defence system Alison Abbott, Munich Latvia has become the latest small European country to seek to gather AP/SEVANS genetic information on its population, in an attempt to entice the interest of international researchers and biotechnology firms. A law being considered there would set guidelines for collecting medical and genomic information from the population, as well as data on its lifestyle. The guidelines are based on those used in neighbouring Estonia, where a similar programme is under way. Iceland has already developed a more ambitious and controversial project (Nature 396, 395; 1998), giving one company, deCODE, rights to its genetic data. Latvia, with a population of 2.4 million, has a very small human-genetics research programme. The new initiative would allow this to be extended, as well as Indefensible: Postol, seen here with a model of a mobile missile launcher, says the system is ineffective. developing gene associations that might interest drug companies, says Elmars Jonathan Knight office at MIT. “I told them my policy is if Grens, a molecular biologist at the A physicist and expert on national security anybody asks me for the report I give it to University of Latvia in Riga, who helped says that the Pentagon is trying to silence them,” Postol says of the meeting. Earlier this to instigate it. his criticism of the US missile-defence year he provided it to the General Account- Grens is also co-founder of a start-up programme. ing Office, an investigative branch of the US company called GENDP, which he hopes Theodore Postol, Professor of Science, Congress.
    [Show full text]
  • The Effectiveness of Rocket Attacks and Defenses in Israel
    19 Sep 2017 Rocket Attacks on Israel Michael J. Armstrong The Effectiveness of Rocket Attacks and Defenses in Israel Michael J. Armstrong Associate professor of operations research Goodman School of Business, Brock University [email protected] This is a pre-copyedited, author-produced version of an article accepted for publication in the Journal of Global Security Studies following peer review. The version of record [Michael J. Armstrong; The effectiveness of rocket attacks and defenses in Israel, Journal of Global Security Studies, Volume 3, Issue 2, 11 April 2018, pages 113-132] is available online at [https://doi.org/10.1093/jogss/ogx028]. Abstract This empirical paper studies rocket attacks and defenses in Israel during operations Protective Edge, Pillar of Defense, and Cast Lead, plus the Second Lebanon War. It analyzes publicly available counts of rockets, fatalities, casualties, and property damage. The estimates suggest that interceptor deployment and civil defense improvements both reduced Israel’s losses slightly during Pillar of Defense and substantially during Protective Edge. They also imply that interceptor performance during Pillar of Defense may have been overstated. Ground offensives were the most expensive way to prevent rocket casualties. Interceptors were at least as cost- effective as military offensives, and improved over time. Without its countermeasures, Israel’s rocket casualties could have been over fifty times higher during Protective Edge. These results imply that Israel’s rocket concerns were more justified than critics admit, but its military operations were less worthwhile than intended. Keywords: Arab-Israeli conflict; counterterrorism; missile defense; Gaza Introduction From 2005 to 2014, militants such as Hamas in the Gaza Strip and Hezbollah in Lebanon fired over 16,510 rockets carrying roughly 260 metric tons of warheads into Israel, causing 2,605 wounded or dead and over $160 million in property damage.
    [Show full text]
  • FIRST STRIKE China’S Missile Threat to U.S
    JUNE 2017 FIRST STRIKE China’s Missile Threat to U.S. Bases in Asia Thomas Shugart and Javier Gonzalez About the Authors COMMANDER THOMAS SHUGART, U.S. Navy, is a Navy Federal Executive Fellow at the Center for New American Security (CNAS). He is a submarine warfare officer, and most recently commanded the USS Olympia (SSN-717), a fast attack submarine homeported in Pearl Harbor, Hawaii. He is a graduate of the University of Texas at Austin and the Naval War College, where he was a member of the Halsey Alfa wargaming group. COMMANDER JAVIER GONZALEZ, U.S. Navy, is a Navy Federal Executive Fellow at the Johns Hopkins University Applied Physics Laboratory. He is a surface warfare officer, and most recently commanded the USS Momsen (DDG-92), a guided missile destroyer homeported in Everett, Washington. He is a graduate of Jacksonville University and the Naval War College, as well as the Maritime Advanced Warfighting School. Commanders Shugart and Gonzalez both deployed to the Western Pacific while in command. Acknowledgements The authors are indebted to Shawn Brimley; Dr. Patrick Cronin; Captain James Fanell, U.S. Navy (Ret.); Dr. Mira Rapp-Hooper; and Dr. Toshi Yoshihara for their critical feedback. Maura McCarthy and Melody Cook provided excellent assistance in editing and graphic design. The opinions expressed here are the authors’ alone and do not represent the position of the U.S. Navy, Department of Defense, or the U.S. government. Cover Photo Getty (adapted by CNAS) @CNASDC Introduction ou may have heard that China’s military has the forward bases that underpin U.S.
    [Show full text]
  • Security Studies Program 1996 - 997
    M A S S A C H U S E T T S INS T I T U T E OF T E C H N O L O G Y :· r'i" · · .- ;'· Iflibi \·"·.·:-; z : ·, t i. :· · .· i k." IC1 5 -; ::: i. .·, .';.. ·* c ,\ · i ::·: i" r. *-"1·I'rT6: *:-;ia: ·ri· r· .· · ;*"II;ireh?·-:--i.·· :·.:· ,'-:·?-".· it .i.:t h: "";TI-:Y j: C : I· "r"--··-i'-···.r,-8 iBii . .;; ·.· ·---g-t·· "· irnt:: Zlllli;a:\'· · i ?'; c': t i i"i /i i, i d' ' 1 --··- 1..·· i " :iJli i-",. i1 tA. Ca A, ,/:, i :,1l li"I'A', I , 'of ,,"· -s ANNUAL REPORT Security Studies Program 1996 - 997 CONTENTS 2 REPORT OF THE DIRECTOR 8 FACULTY 12 WORKING GROUPS I4 SEMINARS I9 CONFERENCES AND SYMPOSIA 23 FIELD TRIPS 24 SELECTED PUBLICATIONS 25 PROGRAM PUBLICATIONS 26 TEACHING 29 DEGREE RECIPIENTS 29 GRADUATE STUDENTS 31 VISITORS AND AFFILIATES SECURITY STUDIES PROGRAM Massachusetts Institute of Technology 292 Main Street (E38-603) Cambridge, Massachusetts 02139 TE L (6I7) 253-8075 FAX (61I7) Z58-7858 Cover: USS Constitution under sail offMarblehead and escorted by The Blue Angels. Photo: Boston Globe SECURITY STUDIES PROGRAM he Security Studies Program (SSP) is a graduate-level, research and educational program based at the MIT Center for International Studies. It traces its origins to two initiatives. One is the teaching on international security topics, and most particularly on defense budgeting, that Professor William Kaufmann began in the I96os in the MIT Political Science Department. The other is the MIT-wide seminars on nuclear weapons and arms control policy that Professor Jack Ruina and Professor George Rathjens created in the mid I970s.
    [Show full text]
  • The Art of Doublespeak, Bellingcat and Mind Control by Edward Curtin
    The Art of Doublespeak, Bellingcat and Mind Control By Edward Curtin, LewRockwell.com, 13 December 2019 In the 1920s, the influential American intellectual Walter Lippman argued that the average person was incapable of seeing or understanding the world clearly and needed to be guided by experts behind the social curtain. In a number of books he laid out the theoretical foundations for the practical work of Edward Bernays, who developed “public relations” (aka propaganda) to carry out this task for the ruling elites. Bernays had honed his skills while working as a propagandist for the United States during World War I, and after the war he set himself up as a public relations counsellor in New York City. There is a fascinating exchange at the beginning of Adam Curtis’s documentary, The Century of Self, where Bernays, then nearly 100 years old but still very sharp, reveals his manipulative mindset and that of so many of those who have followed in his wake. He says the reason he couldn’t call his new business “propaganda” was because the Germans had given propaganda a “bad name,” and so he came up with the euphemism “public relations.” He then adds that “if you could use it [i.e. propaganda] for war, you certainly could use it for peace.” Of course, he never used PR for peace but just to manipulate public opinion (he helped engineer the CIA coup against the democratically elected Arbenz government in Guatemala in 1954 with fake news broadcasts). He says “the Germans gave propaganda a bad name,” not Bernays and the United States with their vast campaign of lies, mainly aimed at the American people to get their support for going to a war they opposed (think weapons of mass destruction).
    [Show full text]