Toggle light / dark theme

A version of this piece appears on the Sociological Imagination website

Twenty years ago Theodore Kaczynski, a Harvard-trained maths prodigy obsessed with technology’s destruction of nature, was given eight consecutive life sentences for sending letter bombs in the US post which killed three people and injured 23 others. Generally known as the ‘Unabomber’, he remains in a supermax prison in Colorado to this day.

It is perhaps easy to forget the sway that the Unabomber held on American society in the mid-1990s. Kaczynski managed to get a 35,000 word manifesto called ‘Industrial Society and Its Future’ published in both The New York Times and The Washington Post. It is arguably the most famous and influential statement of neo-Luddite philosophy and politics to this day. Now he is back with a new book, Anti-Tech Revolution: Why and How.

The fairest thing that can be said about Kaczynski’s writings, both during his Unabomber period and his subsequent imprisonment, is that his comprehensive critique of modern technological society is recognizable to anyone who follows the more apocalyptic strand of ‘dark green’ philosophy and politics. It points to an almost inevitable self-destruction of the world as we know it through systemic abuses of nature, which no one currently in power is motivated to stop, let alone reverse. Instead of making a comfortable living as a radical academic, fiddling while Rome burns, Kaczynski took matters into his own hands, first with letter bombs and now – in this book – with a strategy for stopping the global system from collapsing.

Does Kaczynski advocate the violent overthrow of that system? No; he offers a subtler approach that draws on Trotskyite entryism and capitalizes on the opportunities afforded by disruptions that the system in its normal operation is bound to throw up over time.

Kaczynski believes that political do-gooders are pretty useless in themselves. But this is not due to the content of what they say and do – namely, an endless stream of critique and foreboding about a dystopic future. All of this helps to destabilize the system. The problem is that these people and organizations are themselves so heavily invested in the system that when the worst scenarios that they portray happen, they are in no position to capitalize on them. Their big mistake is to assume that the people in power will somehow listen to them before it is too late.

Nevertheless, people inspired by Kaczynski’s neo-Luddite politics are advised to infiltrate such organizations because they provide legal cover for their activities and offer privileged access to the information flows needed to judge when the opportunity is ripe for intervention. He is clear that such people need to wear two hats at once. They have got to gain the confidence of the organization through hard work, while at the same time be ready to strike at the appropriate moment.

Kaczynski’s model is Lenin’s staging of the October Revolution in Russia, which was less violent than both the Soviets and the West usually portrayed it, due to the high level of infiltration by Bolsheviks into key discretionary positions when the opportunity arose to overthrow the system. Kaczynski follows Lenin in thinking that when the moment strikes, ordinary people will simply try to save their skins and spontaneously gravitate toward those who seem to provide a safe haven, at which point any prior political loyalties will simply evaporate.

However, crucially lacking from Kaczynski’s vision is a clear sense of which positions should be infiltrated, aside from mainstream environmental movements. The fact that he has been in prison for virtually the entire history of the web and smartphones is evident from these pages, though he has kept up in his own way. Kaczynski cleverly counters transhumanist Ray Kurzweil by arguing that even if computational power accelerates indefinitely, that simply means it is more likely to spin out of control. Yet he fails to provide any specific discussion of computer hacking, which one might have expected to figure prominently in the skillset of a neo-Luddite revolutionary. This is perhaps in keeping with Kaczynski’s avowed aim to stay within the law.

My guess is that people reading this book who wish to follow in Kaczynski’s footsteps would try to get hired by either private or public organizations associated with the production, distribution or regulation of energy. The point here would not necessarily be to arrest the rise in energy demand and use. Rather, one would be prepared to spring into action on the occasion of a major disturbance to the flow of energy, however it arises. In any case, such ‘normal accidents’ are bound to happen over time. Since this book is just the latest – but most articulate – installment of Kaczynski’s strategy, such people may already exist.

(None of the above should be understood as condoning in any way the crimes that Kaczynski committed twenty years ago. It is only to say that a rational mind is on display in this book.)

logo-header

There’s really no sector in the United States (or much of the world) that has been untouched by the development of advanced manufacturing technologies – and no one seems to be underestimating the importance of the further development of those technologies in order to keep the country competitive. To that end, in 2014 the government established the National Network for Manufacturing Innovation (NNMI), more commonly known as Manufacturing USA.

The program brought together the industrial, academic, nonprofit and governmental sectors to establish a network of advanced manufacturing institutes for the purpose of accelerating new manufacturing technologies. President Obama proposed that the network grow to 45 institutes over the course of 10 years, and as of today, 12 have been established. The 12th, which was just announced by the Department of Defense, will be the Advanced Tissue Biofabrication (ATB) Manufacturing USA Institute, and will be led by the Advanced Regenerative Manufacturing Institute (ARMI), based in Manchester, New Hampshire.

“The investments we are making in advanced manufacturing, including today’s announcement, will ensure that the innovations needed to develop, manufacture and commercialize cutting-edge processes and materials will happen right here, in America,” said Defense Secretary Ash Carter. “They will provide important benefits to our war fighters and will help strengthen the economy that is the bedrock of our national security.”

Read more

LONDON The attack on a Berlin Christmas market showed the devastation that can be wrought by the simple act of driving a truck into crowds, and the problems in preventing another massacre.

The attack in Germany on Monday, in which 11 people were killed by the truck in addition to the murder of the Polish driver, mirrored a militant raid in the French city of Nice in July that killed 86.

Hauliers increasingly track their vehicles in real time but security experts say the technology cannot be used to stop an attack if a lorry has been hijacked to be used as a weapon.

Read more

Your daily round-up of some of the other security stories in the news

Groupon grief – was it password reuse?

The Telegraph reports that crooks have hijacked a number of Groupon accounts and used them to purchase expensive items like games consoles, iPhones and holidays. Some victims have suffered thousands of pounds of losses.

Read more

RIP dear friend.


A giant in the worlds of both academia and policy, Drell died Wednesday, Dec. 21, at his home in Palo Alto. He was 90 years old.

“An accomplished physicist, his contributions to improve national and international security made our world a better place,” said Tom Gilligan, director of the Hoover Institution at Stanford in a statement. “We are especially grateful for Sid’s relentless dedication to eliminating the threat posed by nuclear weapons and know that his important work will continue to frame the issue.”

Dedicated to arms control.

Read more

More folks warning others that you better be planning for a QC transformation as it is coming and is going to be probably the largest scale transformation the we have seen in the history of technology.


Former communications minister, Stephen Conroy has warned that Australian government technology decision makers need to start preparing for the development of quantum computing.

The former senator made the warning during a panel session at the Australian Computer Society’s Reimagination conference late last week. While still in its nascent development stages, the former minister for broadband communications and the digital economy said that it could have major national security implications.

“There’s one other issue that I wanted to put out there that’s coming as a disruptor and that’s quantum computing and how that’s going to affect things like national security and industrial competitiveness,” Mr Conroy said.

Read more

DARPA sees a real possibility for spaced based conflict. So, it’s hoping to create breakthrough technology to dissuade U.S. adversaries who might consider attacking from space.

Defense Advanced Research Projects Agency assists national security with efforts in space. It focuses on making space a “real-time operational domain,” as DARPA Director Dr. Arati Prabhakar recently said.

“The questions we ask ourselves at DARPA about the space domain … is what would it take to make the space domain robust for everything that we need militarily and for intelligence, and what would it take to make space a real-time operational domain, which it’s not at all today,” the director said last week at the 4th annual Defense One Summit. Many nation-states now orbit the Earth. Conflict is a real possibility, believes Prabhakar.

Read more

In 5 years if you’re looking at QC in your future state roadmap; then welcome to the dinosaur age of technology.


BEIJING: China today launched a 712-km quantum communication line, stated to be the worlds longest secure telecommunications network, which boasts of ultra-high security making it impossible to wiretap, intercept or crack the information transmitted through them.

The new quantum communication line links Hefei, capital of Anhui province, to Shanghai, the countrys financial hub.

It is part of a 2,000-km quantum communication line connecting Beijing and Shanghai, according to Chen Yuao, professor at the University of Science and Technology of China (USTC) in Hefei and chief engineer of the Beijing-Shanghai quantum communication line.

Read more

Terahertz (THz) radiation is used today most prominently for security screening at the airport. It’s the machine you stand in with your hands up as it swings its scanning arms in front and behind you. In medicine, terahertz imaging has the potential to help diagnoze certain types of cancer and to monitor a variety of health parameters to aid in assessment of overall health. Because of the extremely short length of terahertz waves, this imaging modality has a lot of limitations, including shallow penetration into tissues, and that prevents it from being used more widely. Yet, since it’s non-ionising, it’s probably safe and may even replace dangerous X-rays for some applications.

Currently, terahertz imaging is very poor at scanning curved surfaces even though it can peer a few millimeters deep into some tissues. To overcome this, researchers at Tokyo Institute of Technology have developed a flexible and even wearable terahertz scanner that can image curved 3D surfaces such as our skin.

Made of 23 carbon nanotube detectors that work as a unified imaging array, their device can be wrapped around a finger, for example. Because carbon nanotubes are able to absorb a wide range of terahertz radiation, there’s no need for planar antennas.

Read more

No autonomous cars, planes, ships, weapons (not sure I would even still want these), and other robots for me until we have our Net and other infrastructure replaced with QC.


It seems that all of Silicon Valley is designing artificial intelligence for driverless cars. But before we hand over our driving to computers, Charlie Miller, a well-known computer security researcher, would like car companies to pay attention to security.

Miller, who is a security engineer at Uber’s advanced technology center, spent a few years looking into the security of automobiles. And what he found didn’t impress him. He and his friend Chris Valasek hacked a Jeep remotely in 2014, and, after a series of denials from the car company, Chrysler had to announce a recall of 1.4 million vehicles. Miller gave a scary and hilarious talk at the recent ARM TechCon event in Santa Clara, Calif.

“Hopefully, things are going to get better, but we are not in such great shape now,” said Miller. “I want [car makers] to be working on security, and I would love greater transparency. I would love to see white papers written by car makers on exactly how their systems are designed for security. Then I could spend a weekend reading their white paper rather than two years tearing apart their cars.”

Read more