Toggle light / dark theme

The University of Nebraska College of Law is joining forces with space and military law experts from Australia and the United Kingdom to take the lead on understanding how our Earth-bound laws will be applied in times of armed conflict in outer space.

Some of the best legal and policy minds at the University of Adelaide, UNSW Canberra, University of Exeter and Nebraska Law will draft the definitive document on military and security law as applied to space.

The Woomera Manual on the International Law of Military Space Operations is to be completed in 2020. It will draw on the knowledge of dozens of legal and space operations experts from around the world.

Read more

“Be very, very afraid. As this extraordinary book reveals, we are fast sailing into an era in which big life-and-death decisions in war will be made not by men…and women, but by artificial intelligence” — @stavridisj’s review of @paul_scharre upcoming book Pre-order yours now:


A Pentagon defense expert and former U.S. Army Ranger explores what it would mean to give machines authority over the ultimate decision of life or death.

What happens when a Predator drone has as much autonomy as a Google car? Or when a weapon that can hunt its own targets is hacked? Although it sounds like science fiction, the technology already exists to create weapons that can attack targets without human input. Paul Scharre, a leading expert in emerging weapons technologies, draws on deep research and firsthand experience to explore how these next-generation weapons are changing warfare.

Scharre’s far-ranging investigation examines the emergence of autonomous weapons, the movement to ban them, and the legal and ethical issues surrounding their use. He spotlights artificial intelligence in military technology, spanning decades of innovation from German noise-seeking Wren torpedoes in World War II―antecedents of today’s homing missiles―to autonomous cyber weapons, submarine-hunting robot ships, and robot tank armies. Through interviews with defense experts, ethicists, psychologists, and activists, Scharre surveys what challenges might face “centaur warfighters” on future battlefields, which will combine human and machine cognition. We’ve made tremendous technological progress in the past few decades, but we have also glimpsed the terrifying mishaps that can result from complex automated systems―such as when advanced F-22 fighter jets experienced a computer meltdown the first time they flew over the International Date Line.

Read more

Getting your head around cryptocurrencies was hard enough before governments got involved. But now that policy makers around the world are drawing up fresh regulations on everything from exchanges to initial coin offerings, keeping track of what’s legal has become just as daunting as figuring out which newfangled token might turn into the next Bitcoin.

The rules can vary wildly by country, given a lack of global coordination among authorities. And while that may change after finance chiefs discuss digital assets at the Group of 20 meeting in Buenos Aires this week, for the time being there’s a wide range of opinions on how best to regulate the space. Below is a rundown of what major countries are doing now.

Read more

Legacy Method of Inheriting Assets

Many Bitcoin owners choose to use a custodial account, in which the private keys to a wallet are generated and controlled by their exchange—or even a bank or stock broker. In this case, funds are passed to heirs in the usual way. It works like this…

An executor, probate attorney, or someone with a legal claim contacts the organization that controls the assets. They present a death certificate, medical proxy or power-of-attorney. Just as with your bank account or stocks and bonds, you have the option of listing next of kin and the proportion of your assets that should be distributed to each. These custodial services routinely ask you to list individuals younger than you and alternate heirs, along with their street addresses, in the event that someone you list has died before you.

Of course, Bitcoin purists and Libertarians point out that the legacy method contradicts the whole point of owning a cryptocurrency. Fair enough.

Multisig to the Rescue

Using multisig would be far easier, if wallet vendors would conform to standards for compatibility and embed technology into hardware and software products. Unfortunately, they have been slow to do so, and there are not yet widely recognized standards to assure users that an implementation is both effective and secure. But, there is some good news: It’s fairly easy to process your ordinary account passwords and even the security questions with a roll-your-own multisig process. I’ve done it using PGP and also using Veracrypt—two widely recognized, open source encryption platforms.

This short article is not intended as an implementation tutorial, but if the wallet vendors don’t jump up to home plate, I may release a commercial tool for users to more easily add multisig to their wallets. It really is safe, simple and effective. (If readers wish to partner with me on this? I estimate that it will take $260,000 and about six months).

What is Multisig and How Does it Protect your Wealth?

Multisig allows anyone with credentials to an account, wallet or even a locked safe to create their own set of rules concerning which combinations of friends and relatives can access their assets without the original owner. The owner sets conditions concerning who, when, how much and which accounts can be accessed — and the heirs simply offer passwords or proof of identity. If implemented properly, it doesn’t matter if some of the heirs have forgotten passwords or died before the original owner.

This can be illustrated in an example. I am intentionally describing a complex scenario, so that you consider a full-blown implementation. Although the ‘rules’ listed below appear to be complex, the process for creating the associated passwords is trivial.

The last 2 rules listed below do not use Multisig technology, but rather Smart Contracts. It enhances an owner’s ability to dictate terms. Here, then, is the scenario…

I want heirs to have access to my assets
at banks, brokers, exchanges or other ac–
counts–but only under certain conditions:

  • If any 4 of 11 trusted family and friends come together and combine their passwords (or an alternate proof-of-identity), they may access my wealth and transfer it to other accounts
    • But, if one is my husband, Fred, or my daughter, Sue, then only two trusted individuals are needed
    • —But not Fred and Sue together (At least one must be an outsider)
  • If any account has less than $2500, then it goes to my favorite charity, rather than the individuals I have listed
  • None of my accounts can be unlocked by my heirs, until I have not accessed them with my own password for 3 months. Prior to that, the Multisig will fail to gain access.

Again, the decedent’s wishes are complex, but executing and enforcing these rules is trivial. In my presentations, I describe the method on two simple PowerPoint slides. Even that short description is sufficient to show anyone who has used common cryptography apps to weave their own multisig add-on.

Of course, each individual will need to locate their own secret password, but a biometric or other conforming proof-of-identity can be substituted. Even if several survivors cannot recall their credentials, the multisig method allows other combinations of individuals to access the assets across all accounts.

This article may leave you wondering about the legal process—and this is where I agree with the Libertarian viewpoint: Sure! The courts have a process and heirs should document their access and decisions for tax purposes and to assure each other of fair play. But a key benefit of cryptocurrency and the disintermediation offered by the blockchain is the personal empowerment of access with impunity and without waiting for any legal process.

Let the courts to what they do, while you honor the wishes of your dearly departed.

If this article generates sufficient interest, I may prepare a short tutorial on how to split off your own Multisig passwords, regardless of which wallet or hosted services you use. It will work with any vendor, app or gadget —or— Perhaps, I will refine my homespun solution and offer it as an add-on app that can be used with any wallet, bank account or exchange. Simple, ubiquitous and effective multisig should have been available to even traditional banking customers years ago!


Philip Raymond co-chairs CRYPSA, hosts the New York Bitcoin Event and presents at
Crypto Conferences around the world. Book a presentation or consulting engagement.

Another milestone in the race to artificial superintelligence:

A study conducted by legal AI platform LawGeex in consultation with law professors from Stanford University, Duke University School of Law, and University of Southern California, pitted twenty experienced lawyers against an AI trained to evaluate legal contracts. Their 40 page report details how AI has overtaken top lawyers for the first time in accurately spotting risks in everyday business contracts.

Competitors were given four hours to review five non-disclosure agreements (NDAs) and identify 30 legal issues, including arbitration, confidentiality of relationship, and indemnification. They were scored by how accurately they identified each issue.

Read more

Meow-Ludo Disco Gamma Meow-Meow couldn’t just toss away his New South Wales transit pass even after he found out that it got deactivated while he was on a trip to the USee, Meow-Meow (yes, that is his legal name) cut the chip out of the travel card, encased it in biocompatible plastic and had it implanted under the skin on his left hand. The biohacker now plans to file a lawsuit against New South Wales’ transport authorities, not just to fight the decision, but also to help create laws around body-hacking tech. In addition to the transit pass chip, Meow-Meow has two other implanted elect…

Read more

These campaigns could erode the base of the Legal Open Access movement: scientists’ awareness of their options for sharing research. Elbakyan, on the other hand, would be left unaffected. The legal campaigns against Sci-Hub have — through the Streisand effect — made the site more well-known than most mainstay repositories, and Elbakyan more famous than legal Open Access champions like Suber.

The threat posed by ACS’s injunction against Sci-Hub has increased support for the site from web activists organizations such as the EFF, which considesr the site “a symptom of a serious problem: people who can’t afford expensive journal subscriptions, and who don’t have institutional access to academic databases, are unable to use cutting-edge scientific research.”


In cramped quarters at Russia’s Higher School of Economics, shared by four students and a cat, sat a server with 13 hard drives. The server hosted Sci-Hub, a website with over 64 million academic papers available for free to anybody in the world. It was the reason that, one day in June 2015, Alexandra Elbakyan, the student and programmer with a futurist streak and a love for neuroscience blogs, opened her email to a message from the world’s largest publisher: “YOU HAVE BEEN SUED.”

It wasn’t long before an administrator at Library Genesis, another pirate repository named in the lawsuit, emailed her about the announcement. “I remember when the administrator at LibGen sent me this news and said something like ‘Well, that’s… that’s a real problem.’ There’s no literal translation,” Elbakyan tells me in Russian. “It’s basically ‘That’s an ass.’ But it doesn’t translate perfectly into English. It’s more like ‘That’s fucked up. We’re fucked.’”.

Read more

WASHINGTON (Reuters) — Auto manufacturers, technology companies, road safety advocates and policy makers will attend a March 1 conference over potential government actions that could speed the rollout of autonomous cars, the U.S. Transportation Department said on Friday.

Last month, Transportation Secretary Elaine Chao said the Trump administration plans to unveil revised self-driving car guidelines this summer as the government sets out to rewrite regulations that pose legal barriers to robot vehicles.

Next month’s “summit” is to help “identify priority federal and non-federal activities that can accelerate the safe rollout” of autonomous vehicles, the department said. It will also be open to the public.

Read more

Tesla has managed to ship several high-end electric vehicles to consumers, but commercial trucking is the company’s next big move. After showing off its design for an electric semi truck, the company has been working on an aggressive release schedule. However, the vehicle hasn’t been spotted in real life until now. A video uploaded to YouTube shows Tesla’s sleek electric semi cruising down a road in California.

There are few details to glean from this short clip (below). The original prototype trucks Tesla unveiled several months back did not have side mirrors, leading some to suspect Tesla had some fancy alternative in mind. The truck just spotted in the wild does have mirrors, though. That’s necessary for it to be street-legal, so Tesla probably just omitted the mirrors for the announcement to make the truck look cooler.

As you can see in the video, the front of the semi is narrower than standard diesel trucks. It doesn’t need a giant engine, and the cab is slightly smaller with a centered driver’s seat. It’s vastly quieter than a regular semi as well. The truck doesn’t even drown out other road noise as it passes the camera. There’s someone behind the wheel of the truck, but Tesla is touting the autopilot features of the vehicle. Although, many have pointed out Tesla’s self-driving tech is far behind the curve.

Read more