Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S

Total Page:16

File Type:pdf, Size:1020Kb

Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February 2018 Disclaimer: This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. LLNL-BOOK-746803 Strategic Latency: Red, White, and Blue: Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February 2018 Table of Contents Introduction Strategic Latency: Red, White, and Blue Zachary Davis and Michael Nacht _______________________________________________________________ 1 Section 1 The Red Side: S&T Threat Analysis for Strategic Warning 11 Chapter 1 Biotechnology, Commercial Veiling, and Implications for Strategic Latency: The Exemplar of Neuroscience and Neurotechnology Research and Development in China Celeste Chen, Jacob Andriola, and James Giordano ______________________________________________12 Chapter 2 “Sputnik-like” Events: Responding to Technological Surprise Ron Lehman _______________________________________________________________________________ 33 Chapter 3 Curious Incidents: Dogs That Haven’t Barked C. Wes Spain_______________________________________________________________________________ 52 Chapter 4 Emerging Trends in Big Data and Artificial Intelligence: Directions for the Intelligence Community James Canton _____________________________________________________________________________ 71 Chapter 5 3D Printing: Acknowledging the Dark Side and Why Speaking Openly About Technology Threat Vectors Is the Right Answer Jennifer J. Snow ___________________________________________________________________________ 88 Section 2 The White Side: Latent Technology Trends and Timelines 103 Chapter 6 New Technologies and International Order Paul Bracken ______________________________________________________________________________ 104 Chapter 7 New Is Not Always Better David S.C. Chu, with the assistance of Allison Fielding Taylor ____________________________________ 115 | III Chapter 8 What’s Old Is New Again: Nuclear Capabilities Still Matter—and Will for a Long Time to Come Joseph F. Pilat ____________________________________________________________________________ 130 Chapter 9 Backseat Driving: What Happens When Technology Outpaces Strategy? Leo J. Blanken and Jason J. Lepore __________________________________________________________ 146 Chapter 10 Terrorist Tech: How Will Emerging Technologies Be Used by Terrorists to Achieve Strategic Effects? Zachary Davis and Michael Nacht ____________________________________________________________ 160 Chapter 11 The Latent Potential of Privacy Technologies: How Our Future Will Be Shaped by Today’s Privacy Decisions William Welser IV, Rebecca Balebako, Cameron Colquhoun, Osonde Osoba _______________________ 171 Chapter 12 An Effects-Based Framework for Evaluating Latent Technology Daniel Tapia-Jimenez _______________________________________________________________________ 187 Section 3 The Blue Side: Technology Innovation and National Security Applications 201 Chapter 13 What Works? Public–private Partnerships for Development of National Security Technology Frank D. Gac, Timothy P. Grayson, and Joseph M. Keogh ________________________________________ 202 Chapter 14 Moving at the Speed of S&T: Calibrating the Role of National Laboratories to Support National Security Lisa Owens Davis _________________________________________________________________________ 233 Chapter 15 Picking Winners and Losers: How the Government Can Learn to Successfully Assess Technology Potential and Turn It into a Battlefield Advantage Toby Redshaw ____________________________________________________________________________ 250 IV | Chapter 16 Strategic Latency, Technology Convergence, and the Importance of the Weapons Mix Brian Holmes _____________________________________________________________________________ 262 Chapter 17 Predicting and Guiding Change in the New Economy of Strategic Latency Ben Forster _______________________________________________________________________________ 269 Chapter 18 Closing Thoughts: Humanity, Machines and Power Zachary Davis and Michael Nacht ____________________________________________________________ 287 Author Biographies | V Introduction Strategic Latency: Red, White, and Blue Zachary Davis and Michael Nacht Technology is nothing. What’s important is that you have a faith in people, that they’re basically good and smart, and if you give them tools, they’ll do wonderful things with them. —Steve Jobs Steve Jobs got it half right. People imagine, develop, and use technology to achieve “wonderful things,” but they also use technology to pursue harmful objectives. Insecurity, anger, jealousy, and greed are just as likely to motivate technological innovation as love, compassion, creativity, and altruism. Judgments about whether technological feats are wonderful or terrible are themselves highly subjective—one person’s big scientific breakthrough can just as easily turn out to be another person’s political, military, or economic disaster. Nuclear technology, for example, makes possible life-saving medical treatments and clean energy that can help save the world from catastrophic climate change, yet also creates the means to wage nuclear war. Most technologies possess this Janus-faced potential, which we call strategic latency. The challenge for national-security policymakers is to harness the benefits of technology while preventing it from being used against us. This volume explores that dilemma. We live in an era preoccupied with technology. Much has been written about Moore’s Law and the pedal-to-the-metal acceleration of technological progress in recent years. What will the onslaught of ubiquitous technology mean for individuals, society, nations and the world? Technology optimists speculate about how technology will solve the world’s hardest | 1 problems and herald a new age of abundance.1 Utopians, technocrats, some futurists, and Silicon Valley icons embrace technology as the lead agent of human progress. Pervasive technologies such as genetic engineering, robotics, artificial intelligence (AI), and the Internet of Things will (or already do) touch every facet of human existence, thereby making life easier by liberating people from the struggle for survival, freeing them to pursue more creative, productive, and enlightened lives. With disease and poverty on the run, people around the globe will use universal access to information to satisfy the basic food, energy, and transportation needs of an enlightened populace. In a world of material abundance, there will be nothing left to fight over. Global commerce and consciousness will render nation-states obsolete and pave the road to permanent peace.2 Technology will leapfrog over politics to provide the missing link in a progressive evolution worthy of philosophical optimists in the tradition of Immanuel Kant and Jean-Jacques Rousseau. Other observers of technology futures warn of potential dangers, including existential threats associated with artificial intelligence, autonomous vehicles, and the unintended consequences of genetic engineering. Even high-tech luminaries such as Bill Gates, Elon Musk, Stephen Hawking, and Steve Wozniak openly express concern about the potential loss of human control over these otherwise beneficial developments.3 In open letters about unintended consequences, concerned scientists warned that massively powerful machines could misinterpret human intentions and turn on their masters, or give terrorists unprecedented destructive power. Military leaders promise to “keep humans in the loop” to preserve the role of ethical norms in warfare, but what happens when the machines determine that they know better than their flawed creators? From Frankenstein to HAL in 2001: A Space Odyssey to the Terminator, the risk that our creations could betray us is inherent in the notion of technological progress. Echoing Manhattan Project scientists’ admonitions about proliferation and the effects of atomic power on world politics,4 concerned scientists have called autonomous weapons “the Kalashnikovs of tomorrow,” poised to wreak havoc throughout the world, not necessarily as weapons of mass destruction, but as easily acquired commodities loaded with potential to upend global norms of war and politics.5 The specter of rogue drone swarms, genetic monsters, robot armies,
Recommended publications
  • WOLE SOYINKA's OGUN ABIBIMAN by Tanure Ojaide
    WOLE SOYINKA'S OGUN ABIBIMAN By Tanure Ojaide Thomas Mofolo's Chaka seems to have set a literary trail in Africa, and Shaka has been the subject of many plays and poems. Shaka, the Zulu king, "is seen primarily as a romantic figure in Francophone Africa, as a military figure in Southern Africa. ul Moreover, "the extensive Shaka literature in Africa illustrates the desire of African writers to seek in Africa's past a source that will be relevant to contemporary realities "2 Shaka was a great military leader who restored dignity to his people, the sort of leadership needed in the liberation struggle in Southern Africa. Chaka is political, and "can be considered an extended praise song singing the deeds of this heroic Zulu leader; it can be regarded as an African epic cele­ brating the founding of an empire. u3 It is ironic that Wole Soyinka' s Ogun Abibi.man appeared the same year, 1976, that Donald Burness published his book on Shaka in African literature, writing that "Although Shaka is alluded to, for instance, in Soyinka's A Dance of the Forest~ the Zulu king appears very seldom in Nigerian literature. " Soyinka's Ogun Abibiman relies on Mofolo's Chaka and its military tradition together with the 0gun myth in the exhorta­ tion of black people fighting for freedom and human rights in Southern Africa. Ogun is a war-god, and the bringing together of Ogun and Shaka is necessary to fuse the best in Africa's military experience. Though the two have records of wanton killings at one time in their military careers, they, neverthe­ less, are mythically and historically, perhaps, the greatest warlords in Africa.
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Babushka Egg Concept Book #15 (Amended 1-1-2021)
    Babushka Egg Concept Book #15 (amended 1-1-2021) ***************************************. Babushka Egg Concept Book #15 www.apocalypse2008-2015.com Page 1 of 92 Babushka Egg Concept Book #15 (amended 1-1-2021) Basel Dome Window After September 2022 AD - Please read and print before the Web is gone - Pearl # Name Pages 889 Amended Conclusion of the Corona Virus 9 Part 1,2,3,4 Infection 300 The Resurrection Plan 23 Part 1,2,3 of Mankind Why, How & When is the End 270 st 49 of the 21 Century? 242 The Seven Mystery Thunders 62 126 The Population Curve 76 According to the Bible 285 Seven Abomination Changing Christianity 88-92 www.apocalypse2008-2015.com Page 2 of 92 Babushka Egg Concept Book #15 (amended 1-1-2021) To my Relatives and Friends Recently many politicized TV stations announced an increase of a deadly Corona-Virus. Perhaps one should study the history of Mankind connected to Prophecy of the Torah-Bible (Rev. 20:12) ending much Life in nature caused by an atheistic hi-tech culture of our civilization. Like the Gospel mentioned five (5) foolish virgins to hear a voice behind a locked door: Truly, I say to you, I do not know you (Matt. 25:1-13), depart from me. (Matt. 25:41) Therefore you might be interested to pass on this information to a friend or pastor since our 21st Century Civilization was predicted to perish. Thus, a few Pearls were amended to reveal the hidden Truth of the Torah- Bible now exposed in Babushka Egg Concept Book #15 with forbidden knowledge forgotten in many Christian churches, synagogues & universities.
    [Show full text]
  • JRC Horizon Scanning on Dual-Use Civil and Military Research
    JRC horizon scanning on dual-use civil and military research G. Bordin, M. Hristova and E. Luque-Perez 2020 EUR 30301 EN This publication is a Science for Policy report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service. It aims to provide evidence-based scientific support to the European policymaking process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use that might be made of this publication. For information on the methodology and quality underlying the data used in this publication for which the source is neither Eurostat nor other Commission services, users should contact the referenced source. The designations employed and the presentation of material on the maps do not imply the expression of any opinion whatsoever on the part of the European Union concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. Contact information Name: Guy Bordin, Mayya Hristova and Encarnación Luque-Perez Address: Rue du Champ de Mars 21, 1049 Brussels, Belgium Email: [email protected]; [email protected]; [email protected] EU Science Hub https://ec.europa.eu/jrc JRC120638 EUR 30301 EN PDF ISBN 978-92-76-20775-7 ISSN 1831-9424 doi:10.2760/47988 Luxembourg: Publications Office of the European Union, 2020 © European Union, 2020 The reuse policy of the European Commission is implemented by the Commission Decision 2011/833/EU of 12 December 2011 on the reuse of Commission documents (OJ L 330, 14.12.2011, p.
    [Show full text]
  • Developments in 3D Printing a Sector by Sector Overview
    3D Printing Quarterly Report—Q42018 3D PRINTING–A FAST MOVING MARKET Developments in 3D Printing A Sector by Sector Overview Overview This report explores developments in 3D printing across several sectors and categories for the quarterly period of October 10, 2018 to January 10, 2019. For more information, Table of Contents please contact: Overview ................................... 1 Miscellaneous Partnerships ..... 11 Clothing & Wearables ............... 23 Mark E. Avsec (216) 363-4151 General ..................................... 2 Patents & Copyright ................ 12 Food ....................................... 24 [email protected] Materials .................................. 4 Auto & Transportation ............... 12 Education ................................ 26 Printing Techniques & Aviation & Aerospace .............. 15 Environmental Efforts ............... 27 Capabilities ............................. 8 Health & Life Sciences ............ 16 Arts & Entertainment ................ 28 www.beneschlaw.com M&A and Investments ............... 9 Manufacturing & Construction... 21 3D PRINTING–A FAST MOVING MARKET 3D Printing Quarterly Report—Q4 A Sector by Sector Overview General Mass manufacturing set to be next step in 3D printing, experts say There is a sense mass production is the next big thing in 3D printing and Christoph Schell, President 3D Printing & Digital Manufacturing at HP, lent credence to that when he said 2019 will be the year additive manufacturing moves from prototyping into full production in the automotive industry. HP aims to play a prominent role in this evolution with its Multi Jet Fusion and Metal Jet 3D printing technologies, both of which are designed for large batch production. Startups like Evolve Additive and Origin are using their own technologies for 3D printing large runs of plastic parts. Most companies working toward mass metal manufacturing, including HP, have developed binder jet platforms for mass printing parts. Boston-based Digital Alloys has a novel approach to fusing metal parts called Joule Printing.
    [Show full text]
  • Group Project
    Awareness & Prevention of Black Hat Hackers Mohamed Islam & Yves Francois IASP 470 History on Hacking • Was born in MIT’s Tech Model Railway Club in 1960 • Were considered computer wizards who had a passion for exploring electronic systems • Would examine electronic systems to familiarize themselves with the weaknesses of the system • Had strict ethical codes • As computers became more accessible hackers were replaced with more youthful that did not share the same ethical high ground. Types of Hackers • Script Kiddie: Uses existing computer scripts or code to hack into computers usually lacking the expertise to write their own. Common script kiddie attack is DoSing or DDoSing. • White Hat: person who hacks into a computer network to test or evaluate its security system. They are also known as ethical hackers usually with a college degree in IT security. • Black Hat: Person who hacks into a computer network with malicious or criminal intent. • Grey Hat: This person falls between white and black hat hackers. This is a security expert who may sometimes violate laws or typical ethical standards but does not have the malicious intent associated with a black hat hacker. • Green Hat: Person who is new to the hacking world but is passionate about the craft and works vigorously to excel at it to become a full-blown hacker • Red Hat: Security experts that have a similar agenda to white hat hackers which is stopping black hat hackers. Instead of reporting a malicious attack like a white hat hacker would do they would and believe that they can and will take down the perpretrator.
    [Show full text]
  • A Review of 3D Printing in Construction and Its Impact on the Labor Market
    sustainability Review A Review of 3D Printing in Construction and its Impact on the Labor Market Md. Aslam Hossain 1,* , Altynay Zhumabekova 1, Suvash Chandra Paul 2 and Jong Ryeol Kim 1,* 1 Department of Civil and Environmental Engineering, Nazarbayev University, Nur-Sultan 010000, Kazakhstan; [email protected] 2 Department of Civil Engineering, International University of Business Agriculture and Technology, Dhaka 1230, Bangladesh; [email protected] * Correspondence: [email protected] (M.A.H.); [email protected] (J.R.K.); Tel.: +7-7172-709123 (M.A.H.); +7-7172-70-9136 (J.R.K.) Received: 7 September 2020; Accepted: 25 September 2020; Published: 15 October 2020 Abstract: Construction industry is very labor-intensive and one of the major sources of employment in the world. The industry is experiencing low productivity with minimum technological innovations for decades. In recent times, various automation technologies including 3D printing have received increasing interests in construction. 3D printing in construction is found to be very promising to automate the construction processes and have the potential of saving laborious work, material waste, construction time, risky operation for humans, etc. There has been a comprehensive body of research conducted to understand the recent advances, future prospects and challenges of large-scale adoption of 3D printing in construction projects. Being one the labor-intensive industries, this study also investigates the possible impact on the labor market with increasing adoption of 3D printing in construction. It is found that 3D printing can reduce significant number of labors which can solve the labor shortage problem, especially for the countries where construction is heavily dependent on immigrant workers.
    [Show full text]
  • UC Berkeley Previously Published Works
    UC Berkeley UC Berkeley Previously Published Works Title Building the Second Mind, 1961-1980: From the Ascendancy of ARPA-IPTO to the Advent of Commercial Expert Systems Permalink https://escholarship.org/uc/item/7ck3q4f0 ISBN 978-0-989453-4-6 Author Skinner, Rebecca Elizabeth Publication Date 2013-12-31 eScholarship.org Powered by the California Digital Library University of California Building the Second Mind, 1961-1980: From the Ascendancy of ARPA to the Advent of Commercial Expert Systems copyright 2013 Rebecca E. Skinner ISBN 978 09894543-4-6 Forward Part I. Introduction Preface Chapter 1. Introduction: The Status Quo of AI in 1961 Part II. Twin Bolts of Lightning Chapter 2. The Integrated Circuit Chapter 3. The Advanced Research Projects Agency and the Foundation of the IPTO Chapter 4. Hardware, Systems and Applications in the 1960s Part II. The Belle Epoque of the 1960s Chapter 5. MIT: Work in AI in the Early and Mid-1960s Chapter 6. CMU: From the General Problem Solver to the Physical Symbol System and Production Systems Chapter 7. Stanford University and SRI Part III. The Challenges of 1970 Chapter 8. The Mansfield Amendment, “The Heilmeier Era”, and the Crisis in Research Funding Chapter 9. The AI Culture Wars: the War Inside AI and Academia Chapter 10. The AI Culture Wars: Popular Culture Part IV. Big Ideas and Hardware Improvements in the 1970s invert these and put the hardware chapter first Chapter 11. AI at MIT in the 1970s: The Semantic Fallout of NLR and Vision Chapter 12. Hardware, Software, and Applications in the 1970s Chapter 13.
    [Show full text]
  • Retroactively Classified Documents, the First Amendment, and the Power to Make Secrets out of the Public Record
    ARTICLE DO YOU HAVE TO KEEP THE GOVERNMENT’S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD JONATHAN ABEL† INTRODUCTION ............................................................................ 1038 I. RETROACTIVE CLASSIFICATION IN PRACTICE AND THEORY ... 1042 A. Examples of Retroactive Classification .......................................... 1043 B. The History of Retroactive Classification ....................................... 1048 C. The Rules Governing Retroactive Classification ............................. 1052 1. Retroactive Reclassification ............................................... 1053 2. Retroactive “Original” Classification ................................. 1056 3. Retroactive Classification of Inadvertently Declassified Documents .................................................... 1058 II. CAN I BE PROSECUTED FOR DISOBEYING RETROACTIVE CLASSIFICATION? ............................................ 1059 A. Classified Documents ................................................................. 1059 1. Why an Espionage Act Prosecution Would Fail ................. 1061 2. Why an Espionage Act Prosecution Would Succeed ........... 1063 3. What to Make of the Debate ............................................. 1066 B. Retroactively Classified Documents ...............................................1067 1. Are the Threats of Prosecution Real? ................................. 1067 2. Source/Distributor Divide ...............................................
    [Show full text]
  • BILLY GRAHAM the FREE MASON
    BILLY GRAHAM The FREE MASON This report also covers MANY other Well-Known TV Preachers who are Illuminists and FREE MASONS Compiled By Karen E. Connell EXTENDED LIFE Christian Training Ministry BILLY GRAHAM AND OTHER FREE MASONS Contents Billy Graham the Free Mason ............................................................................................................................ 6 Proof that Billy Graham is a Mason ................................................................................................................ 6 The Deception of Billy Graham—A mind Control Front ..................................................................... 7 A List of Known and Credible Witnesses ...................................................................................... 10 Clarifying What Is Looked For In Proof ................................................................................................. 11 The Motivation of the Co-Authors ...................................................................................................... 12 Clarifying what is Acceptable Testimony ........................................................................................... 12 The Policies of Deception by the Billy Graham Crusade Staff........................................................... 14 Billy Graham’s Active Role in Satanic Ritual Abuse ......................................................................... 16 Billy Graham is part of the people who implement the Monarch program .......................................
    [Show full text]
  • Speakers 4 July–30 July 2004
    2004 Summer Seminar Speakers 4 July–30 July 2004 About the Speakers Organizers Steve Koonin James Larrimore Kory Budlong-Sylvester Ron Lehman Robert Powell Steven A. Maaranen Susan Shirk Michael May Kathleen McInnis Speakers Patrick M. Morgan Michael Cornwall Michael Nacht Zachary Davis Per Peterson Richard Garwin Joseph Pilat Charles Glaser Scott Sagan Sigfried S. Hecker Lawrence Scheinman Corey Hinderstein John Scott Michael D. Intriligator Dean Wilkening Kent Johnson Herbert York Feroz Khan Kory Budlong-Sylvester is the IGCC Steering Committee representative from Los Alamos National Laboratory (LANL). Budlong-Sylvester is a technical staff member in the Nonproliferation and International Security Division at LANL. He works on a variety of nonproliferation and arms control topics. He is currently LANL's principal investigator for a multi-laboratory project that supports the International Atomic Energy Agency in the area of integrated safeguards. Budlong-Sylvester received his Ph.D. from the Nuclear Engineering Department at MIT in 1997. John M. Cornwall is a professor of physics at UCLA, where he has been since 1965. He came to UCLA from the Institute for Advanced Study in Princeton, New Jersey. He is also a professor of Science and Technology Policy at the RAND Graduate School in Santa Monica. His current physics interests are elementary particle theory (quantum chromodynamics; early universe). He is a member of the Jason group, as well as of various U.S. government advisory committees. He has consulted and published widely on ballistic missile defense, space-based radar, space physics, and many other subjects. He is a Fellow of the American Association for the Advancement of Science, and a former Alfred P.
    [Show full text]
  • Wolverine & the X-Men: Tommorow Never Leaves Volume 1 Free
    FREE WOLVERINE & THE X-MEN: TOMMOROW NEVER LEAVES VOLUME 1 PDF Jason LaTour,Mahmud A. Asrar | 144 pages | 18 Nov 2014 | Marvel Comics | 9780785189923 | English | New York, United States 9 Best X-Men images | x men, jim lee art, marvel comics covers Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge Wolverine & the X-Men: Tommorow Never Leaves Volume 1. Error rating book. Refresh and try again. Open Preview See a Problem? Details if other :. Thanks for telling us about the problem. Return to Book Page. Mahmud Asrar Illustrator. Welcome to the Jean Grey School of Higher Learning, where Wolverine, Storm, and a star-studded faculty educate the next generation of mutants! But with their own lives steeped in deadly enemies and personal crises, how can the X-Men guide and educate - let alone defend - the school? And what mysterious organization waits in the shadows to destroy Wolverine's mutant sanctua Welcome to the Jean Grey School of Higher Learning, where Wolverine, Storm, and a star-studded faculty educate the next generation of Wolverine & the X-Men: Tommorow Never Leaves Volume 1 And what mysterious organization waits in the shadows to destroy Wolverine's mutant sanctuary? The mysterious Phoenix Corporati on wants Quentin Quire, but why? And only Evan can save Fantomex from certain death - but dare he? Get A Copy. Paperbackpages. Published November 18th by Marvel first published November 1st More Details Original Title. Other Editions 3. Friend Reviews. To see what your friends thought of this book, please sign up.
    [Show full text]