Highlights
-
•
Individual vulnerability to technology failure can be quantified by considering the ‘exposure’ of relevant technological systems, and high technological exposure fields can be identified
-
•
Evaluation of technological vulnerability can be extended to populations of individuals, and population exposure is identified as high and increasing.
-
•
Working from a theoretical basis, approaches to reduced population technological exposure/vulnerability can be identified, and the value of decentralisation can be specifically identified.
-
•
The current and future significance of technological vulnerability/exposure, and the practicality of paradigm changed to lower exposure are identified.
Keywords: Technological vulnerability, Population exposure, Individual vulnerability, Threat, Decentralised production
Abstract
The nature and level of individuals' exposure to technological systems has been explored previously and is briefly restated here. This paper demonstrates how the concept of technological exposure can be extended to generic needs of individuals, and further to the needs of populations of individuals and even as far as “existential threats” to humanity. Technological categories that incur high levels of population exposure are explored, and categories are described. A theoretical basis for reducing population exposure is developed from the basic concepts of technological exposure. Technological developments that potentially enable less centralised societies having lower levels of population exposure, are considered for practicality and effectiveness as are the factors that could allow and cause transition to a less technologically centralised model. Some conclusions regarding practicality, triggers, and issues arising from a decentralised society are considered and include the key conclusion that a higher level of decentralisation and exposure reduction is both desirable and possible.
1. Introduction
1.1. Background
The fundamental impossibility of never-ending growth have been recognised for a long time (e.g. Daly, 1990; Henrique & Romeiro, 2013) and similarly authors (e.g. Rao, 1975) have recognised the danger of corporates of transnational size. This paper considers an associated but distinct issue, the growing technological vulnerability of populations. Increasingly, essential goods and services are only accessible via technological systems that are both sophisticated, and also centralized. In this situation, end-user technological vulnerability becomes significant, but quantifying the extent and nature of such vulnerabilities have been hindered by the complexity of the analysis (Haimes & Jiang, 2001) and almost equally by the inadequacy and imprecision of terminology in common use (Aven, 2011).
A previously-developed theory of exposure considered the technological systems supplying individuals and showed that the calculated ‘exposure’ was a valid measure of the level of vulnerability. This paper extends the application of an exposure analysis to consider the technological exposure of a population of individuals, assumed to live predominantly in an urban setting. The significance of the issue is developed, and then from the basic analysis of situation some quite generalised approaches to reduction of vulnerability are proposed and shown to be practical.
1.2. Prioritising the scope
The world’s population and particularly the proportion of the world's population living in cities has risen steadily. Combined with tendencies to centralisation of technological systems these have contributed to increases in the vulnerability of large populations. While the issue is well-appreciated intuitively, principles for quantifying levels of vulnerability and for assessing mitigations have been lacking.
A claim to evaluate the totality of human "populations" and consider the technological exposure characteristics of each would be bold, but useful analysis is possible within a scope that is reasonably constrained as follows:
-
•
The proportion of current population living in cities is large and increasing, and where large populations are concentrated the scope of any "harm" from a technological failure is almost certain to be greater than in a sparsely populated region. An emphasis on population concentrations is therefore reasonable.
-
•
For durable infrastructure (large buildings, roads) the timespan for replacement / renovation is long compared to the timespan in which resources may be recreated (time to construct a concrete batching plant is short compared to the lifespan of a building), and so it is reasonable to deprecate the significance of durable infrastructure for this study.
-
•
The "analysis of exposure" (Robertson, Munoz & Michael, 2017) can be applied to natural disasters (these generally contribute to "En" events, since the characteristic of a natural disaster is that it affects every component/node within a geographical region), however this issue is treated extensively elsewhere, e.g. International Journal of Disaster Risk Reduction (Elsevier) and International Journal of Disaster Risk Science (SpringerLink). If such an event has global effect, it would constitute an existential threat.
-
•
"Knowledge and know-how" are qualitatively different from consumable goods or services: knowledge is not diluted/decreased by replication and is not decreased by its application. While technological means of storing and accessing knowledge may be vulnerable, the knowledge per se may be treated differently.
-
•
Complete journals are devoted to the sociological effects of technology (J Technology in Society, IEEE Transactions on Technology and Society) and significant psycho/social issues (better communications with dispersed families but also include online abuse and personal loneliness) are linked to technological advances. These are acknowledged but have limited applicability to the scope of this paper.
This paper will therefore primarily consider the exposure of city-dwellers to technological systems delivering services or consumables.
2. THE CONCEPTS OF TECHNOLOGICAL EXPOSURE
2.1. Applied to the supply of specified goods/services
The supply of essential goods and services will involve heterogeneous systems (i.e. systems where goods/services are created by a progression of steps, rather than a system in which completed goods are simply transported/distributed), that involve an arbitrary number of linked operations each of which requires inputs, executes some transformation process, and produces an output that is received by a subsequent process.
Four essential principles have been proposed (Robertson et al., 2017) to allow and justify the development of a metric that evaluates the contribution of a heterogeneous technological system, to the vulnerability of an individual (Robertson, 2017). These principles are:
-
1)
The metric is applicable to an individual end-user: When an individual user is considered, not only is the performance of the supply system readily defined, but the relevant system description is clearer.
-
2)
The metric acknowledges that events external to a technology system only threaten the output of the technology system if the external events align with a weakness in the technology system. If a hazard does not align with a weakness then it has no significance. Conversely if a weakness exists within a technological system and has not been identified, then hazards that can align with the weakness are also unlikely to be recognised. If the configuration of a particular technology system is changed, weaknesses may be removed while other weaknesses may be added.
-
3)
The metric depends upon the observation that although some hazards occur randomly and can be assessed statistically, over a sufficiently long period the probability of these occurring approaches 1.0. The metric also depends upon the observation that intelligently (mis)guided hazards (i.e. arising when a person intentionally seeks a weakness in order to create a hazard) do not occur randomly. The effect of a guided hazard upon a risk assessment is qualitatively different from the effect of a random hazard. The guided hazard will occur every time the perpetrator elects to cause the hazard and therefore such a hazard has a probability of 1.0.
-
4)
The metric depends upon the observation that it is possible to not only describe goods or services that are delivered to the individual (end-user), but also to define a service level at which the specified goods or services either are or are-not delivered. This approach allows the output of a technological system to be expressed as a Boolean variable (True/False), and allows the effect of the configuration of a technological system to be measured against a single performance criterion.
Applying these principles, the arbitrary heterogeneous technological system supplying goods/services at a defined level to an individual, can be described by a configured system of notional AND/OR/NOT functions. Having represented a specific technological system using a Boolean algebraic expression, a 'truth table' can be constructed to display all permutations of process and stream availabilities as inputs, and technological system output as a single True or False value. From the truth table, a count of the cases in which a single input failure will cause output failure, and assign that total to the variable "E1". A count of the cases where two input failures (exclusive of inputs whose failure will alone cause output failure) cause output failure, and assign that total value to E2. A further count of the cases in which three input failures cause output failure (and where neither single nor double input failures within that triple combination would alone cause output failure) and assign that total value to the variable "E3" and similarly for further "E" values.
The exposure metric, {E1, E2, E3…}, for a defined system supplying specific goods/services, can be shown to measure the level of vulnerability of the individual to that technological system (Robertson et al., 2017).
2.2. Applied to generic goods/services and need-levels
For many practical cases a generic service could be considered - e.g. "basic food" rather than "fresh milk", and vulnerability assessed by nominating multiple specific services as alternative suppliers (an "OR" gate) of a nominated generic service.
The exposure of the individual to lack of secure access to the necessities of life, can thus be assessed using exactly the same approach used to assess exposure to non-availability of any specific need. Illustrative examples of generic services could include "All needs for Maslow's physiological level". Conceptually this would include ((Food_A OR Food_B OR Food_C…) AND warmth AND water AND shelter) or possibly "all needs to occupy apartment on month-by-month basis". (Sewage services AND water supply AND power supply).
2.3. Applied to populations
The concept of an individual's exposure may be yet further modified and extended to consider the quantification of a population's exposure, in regard to supply of either a particular, or a generic service. It is common for some "population" to need the same services/goods, and obtain these via an identical technological system.
The "technological system" that supplies such a population may not be identical to that which supplies an individual: Consider a case in which four individuals each rely on their cars to commute to work; for the output "arrive at work", each of their individually-owned cars contribute to the E1 exposure of each of the 4 individuals. If they reach a car-pooling agreement, the "car" then contributes to the E4 exposure for "arrive at work" of each individual, since any of the 4 cars can supply that functionality. A population exposure is developed by modifying an individual exposure evaluation (for a population using a functionally identical service) by considering each functional element used by more than one of the population, and whether each such functional element can be made accessible to more than one.
If an exposure level (metric) is then nominated, it is possible in principle to establish the largest population which is subject to this level of exposure. For example, we might identify the largest population using a functionally identical service or supply of goods, that has a non-zero E1 exposure (i.e. has at least on single point of failure): Should a city discover that the progressive centralisation of services had resulted in a situation where the whole population of the city had a non-zero E1 value for an essential service, some urgent action would be strongly suggested. Conversely, if the supply of generic service to even small suburbs had low exposure values, then a good level of robustness would have been demonstrated for that generic service, at the suburb level.
Extrapolating these principles, where a “population” is actually the totality of the homo-sapiens species, and the “service” is essential for every individual’s survival, then a definition of “existential threat” as proposed by Bostrom (2002), is approached.
3. POPULATION HAZARDS AND EXPOSURES
3.1. Population hazards
The analysis of exposure considers loci of failure and hence intentionally avoids consideration of specific hazards or their probabilities. Nevertheless, hazards that affect various populations certainly exist, and a short list will serve to illustrate the significance of evaluating population exposure levels. The following list makes no attempt to be comprehensive, but illustrates hazards relevant to large corporates, apartment-dwellers, members of isolated communities and users of electronic communications.
-
•
A large group could be criminally held to ransom by malicious encryption of essential data (Pathak, 2016).
-
•
A large group could be effectively excluded from access to a service because of conditions imposed by a (single, national) owner (Deibert, 2003; Sandywell, 2006; Tanczer, McConville, & Maynard, 2016).
-
•
An isolated group (on Antarctica, Moon or perhaps Mars) could cease to be viable if they cannot import supplies that cannot be generated locally (Pkalski & Sznajd-Weron, 2001).
-
•
The occupiers of an apartment block could encounter a situation in where there was minimal (financial or other) pressure on the provider of sewage removal services to restore service, but where the occupiers faced major consequences (need to de-camp) in the absence of this service. Similarly, (Robertson, 2017) has noted that a failure to provide financial transaction services to a small retailer may incur negligible financial cost to a bank, but may cause the retailer's business to fail. These are examples of asymmetric consequences.
-
•
The whole of humanity exists on the planet earth: a failure of the natural environment can doom either a regional or possibly a global population (Diamond, 2005), and can be certainly be considered to be an “existential threat”, as defined by Bostrom (2002).
-
•
Persons born early in the 20th century were very familiar with the possibility of highly unjust treatments (e.g. loss of employment), if private information became known - and they acted accordingly. For many born early in this century, such concerns seem remote. Personal information privacy issues have thus failed to gain a high visibility, and we have perhaps become blasé about the costs of lack of privacy. Nevertheless, the ubiquity of surveillance (Citron & Gray, 2013; Miller, 2014), the increasing frequency of major data breaches (Edwards, Hofmeyr, & Forrest, 2016), and the recent rise in algorithmic decision-making (Moses, 2018) on such matters as health insurance, credit worthiness, validity of job application and security targeting are bringing this issue to increased prominence.
-
•
The recent revelation of hardware vulnerabilities in general processors (Eckersley & Portnoy, 2017; Ermolov & Goryachy, 2017) demonstrated the significance of unappreciated weaknesses, even when overall operation of a system has been reliable.
3.2. High-exposure technology fields
Other publications (Robertson, 2010; Martin, 1996) have noted society's vulnerability to technological systems and considered the relationship between time-to-disaster and time-to-repair: that analysis was not an exposure analysis, but did consider the range of services corresponding to a broad category of human needs and effectively considered the significance of the exposure categories noted above. Later works (Author, 2017a) have analysed the individual exposure associated with a broad range of goods and services. Those works also noted that the analysed values for these specific examples could be reasonably extrapolated to many other similar goods and services. The general analyses of (Robertson, 2010) did attempt to cover the scope of individual needs and as such identified a range of services (or goods-supply needs) that were considered to incur high levels of vulnerability.
The more detailed exposure analyses of (Robertson, 2017) were indexed to the exposure of an individual, and although a limited number of examples were studied, these were considered to be representative of the high-exposure items relevant to individuals living in urbanised settings in the 21 st century. The assessment of the population exposure of those exemplar technological systems shows several distinctive changes from the analysis indexed to the individual. Primarily, the E1 items that arise close to the final point of use by the individual lose significance and for many cases cease to be significant at the E3 level (arbitrarily chosen as the cut-off point for consideration).
The components that remain significant are those that genuinely represent exposure values for the population under consideration. The analysis of population exposure of a broad spectrum of needs showed that it was possible to identify some high exposure technological fields, specifically complex components, complex artificial substances, finance, communications, energy and information, These are considered more fully as follows;
-
•
Complex components: Complex components may be distinguished from large components (such as a building, hydroelectric dam, or road-bridge), and qualitatively described as being beyond the capacity of a skilled individual craftsperson to fashion in reasonable time and to required tolerances. Under this category we might consider such items as a carburettor body for an internal combustion engine, food processing equipment and construction machinery (crane). For many consumer items within the "complex component" category, the population exposure is significantly lower than the individual exposure, since numerous examples of item exist (either owned by others, or stockpiled for sale). The level of centralisation may however be very high, with (for example) perhaps only one worldwide source of a carburettor body for a specific vehicle.
-
•
Complex artificial substances: Complex artificial substances includes advanced metallurgical alloys, advanced plastics and composites, drugs, and vaccines: These are distinguished by the complexity of composition, rather than complexity of form. In many cases the centralisation that causes high exposure levels for the production of complex substances, has resulted primarily from available economies of scale, and only secondarily from the substances' complexity. Some complex substances (notably pharmaceuticals) have patent protection, which creates centralisation at up to global level.
-
•
Finance: As the range of goods and services, and the geographical scope of supply of those goods and services has increased, so has the need for the facility to exchange value in return for goods and services: this has inevitably led to elaborate mechanisms for secure exchange of value. Recognising that the exchange of value can also facilitate illegal activities, state actors have also enacted significant surveillance and control of financial transactions. Technologies associated with the exchange of value have acquired high large levels of exposure (colloquially, many things that can go wrong) and high levels of centralisation, in the process of meetings these demands.
-
•
Communications: The ubiquity of the internet has become a remarkable feature of the last 20 years: although there are exceptions, most areas of the earth and a very large proportion of total population can communicate via internet. Although cell-phone use is common, it is evolving as a mobile access connection, with the internet carrying the data. Internet communications has been made possible by well-established protocols, however high level systems for routing continue to be centralised, and while problems are rare, nation-states have occasionally decided to discontinue connection to the internet, showing that high levels of centralisation exist (Howard, Agarwal, & Hussain, 2011). Although the feasibility of internet communications can be attributed to open source protocols, the practicality of current connectivity has been largely enabled by the very large data rates possible via fibre-optic cables, yet this capacity has also introduced a high level of exposure for both individuals and populations. Duplication of undersea fibre-optic cables has somewhat reduced the level of population exposure, yet the trend for dependence on high-data-rates has increased at similar pace (market forces have driven the need for additional cables), and communications via internet carry a high level of population exposure. Recent reports (Clark, 2016; Rose, 2017) have noted that the disruption of a very small number of fibre-optic cable would lead to unacceptable slowdowns, and trends to ownership of undersea cables by corporate entities further contributes to E1 values of exposure and high population exposure. The numbers of cables in service show that internet communications is centralised at a small-nation level.
-
•
Energy: Energy has been noted as key to civilisation (Smil, 2017). Coke allowed the smelting of iron, and oil enabled almost all current transportation. Coal, nuclear and geothermal heat and hydro storage allow electricity generation on-demand. National power transmission systems generally have high reliability and many have some level of design redundancy. Nevertheless, the generation and distribution of electric power incurs significant individual and population exposure: Large power stations are bespoke designs as are large transformers (Sobczak & Behr, 2015), and transmission networks may face significant “resilience” issues (Carvajal, Serrano, & Arango, 2013; Sidhu, 2010). Liquid fuels can be stockpiled at national level, and to a lesser extent locally, however the level of stockpiling is limited - and even the higher levels of stockpiling are likely to be small compared to the time to rebuild a major production plant (terminal, or refinery). At the consumer and industrial user-level, although solar PV and wind can produce power at $/kWh rates close to thermal generation, but currently no economically viable technology that allows storage of MegaWatt-hours of electricity from intermittent sources at small/medium-scale. Currently most users are still therefore reliant on significantly centralised power generation and depend on transmission systems that contribute significant population exposure. Exemplar cases such as the Tesla large-scale battery in South Australia have created much interest but are dependent on goodwill capex for installation and are actually used for frequency-correction rather than large-scale energy storage (Agnew & Dargusch, 2017). Recognition of possibilities of cascading failure (Dobson & Newman, 2017; Guo, Zheng, Ho-ChingIu, & Fernando, 2017) have led to some reductions in exposure incurred by major power transmission facilities.
-
•
Information: Information, whether medical reference information, contractual records or engineering design information, is not a coincidental by-product of a technological society, it is information that fundamentally allows the design and construction of technological systems and to the full operation of society (Dartnell, 2014; Shapiro, 2009; van den Heuvel, 2017). Yet while it has become possible to generate and transmit enormous quantities of information, the information storage remains a particularly high-exposure issue (Bergeron, 2001). Currently the ASCII codes largely standardise information representation, and protocols for transmission are also largely standardised but a gap in the standardisation of information storage (including writing and recovery) contributes to a high exposure for the final delivery of information to users. Hard-disk drives are still the most common storage technology, yet these have short lives, and use proprietary data storage formats plus proprietary approaches to the writing and recovery of data. This issue has been well-reported, authors such as (Cerf, 2015) have predicted a "digital dark age", i.e. a future society that cannot recover/read most of the information generated in the current era. This describes a situation of high individual and population exposure, and since there are few of manufacturers of HDD's, information storage can also be noted to illustrate centralisation at multi-nation level. Several technologies allowing long-term storage have been proposed (Kazansky et al., 2016, Longnow Foundation, 2017; Permanent Archival Solution, 2020, Nanoarchival™ technology) but these are currently expensive and lack the integration to allow them to truly offer changes to population exposure.
By contrast, some fields have generally low population exposure: basic building materials, foodstuffs, natural fabrics and clothing are commonly supplied via relatively simple technological systems in which technological design redundancies are commonly large, and for which population exposure is therefore low. Technologies such as creation of ceramics and glassblowing may require skill but are also not dependent on high technological sophistication and so contribute low technological exposure. Similarly, the collection and storage of rainwater is feasible with low technological exposure for even densely populated urban populations.
3.3. Exposure categories and types
In addition to identifying high exposure fields, it is also possible to identify categories of exposure contribution that commonly apply across a range of technological fields. These are proposed to include initial resource availability, complex unit operations, lack of buffering, single points of failure (SPOF), contributory systems, highly centralised processes and “practical unavailability”, and are described more fully as follows:
3.3.1. Initial resource availability
All technological systems producing goods and services for users, ultimately depend upon raw materials and viable environmental conditions. Where raw materials cease to be available, or environmental conditions change permanently, services to users will inevitably be affected. Raw material supplies and acceptable environmental conditions must therefore be identified (Diamond, 2005) as sources of exposure and hence vulnerability to users.
3.3.2. Complex unit operations
We use the descriptor "complex" as a characteristic of a process whose internal operation is practically unknowable to the user and cannot realistically be repaired by the user. Personal computers, routers and related equipment are examples. It is also possible to consider situations where a critical application has been compiled from an outdated programming language and runs on a computer for which no spare hardware is available (Hignett, 2018). Another example might consider critical information held on a very old storage medium (Teja, 1985). These examples illustrate three categories of complex processes: in the first case, while the inner workings of a PC may be exceedingly complex, the format of incoming data (TCP/IP packets) and protocols (WWW, email etc.) are in the public domain (Fall & Stevens, 2011) and so it is not only possible but practical for alternative machines to offer the same services. In the second case, assuming the functional specifications of the application processes are known, the application can be re-coded (and fully documented) using a language for which larger numbers of maintenance programmers exist, and on a more common platform. The third case of data encoded on old storage medium, illustrates a subcategory where the internal details of the storage are proprietary (not in public domain), alternative equipment is unavailable, and creation of replica equipment for reading the data is probably impractical, leading some authors e.g. (Cerf, 2015) to express fears of a "digital dark age".
3.3.3. Lack of buffering
For the supply of long-life products, it is both possible and practical to provide buffer stocks at various points in the process. By contrast, since AC power (for example) is not readily storable, all processes involving uses of AC power will fail immediately if the power supply fails.
3.3.4. Single points of failure (SPOF)
All single points-of-failure (SPOF) contribute to E1 values and so make a primary contribution to users’ vulnerability. Three subcategories of SPOF are noted: The first is where delivery of services to users involves some processes immediately adjacent to the user, known as "last mile" services in the telecommunications field. The second subcategory of SPOF is illustrated by considering a small rural town whose EFTPOS, landline phone service, cell-phone service and internet connection have all been progressively migrated to data services, carried by a single fibre-optic cable and thus have inadvertently created a SPOF. The third is where a particular failure will inevitably cause failure of other components that are not functionally connected - a cascading failure. Finally it is noted that Contributory systems are a common source of exposure: whenever a system is made dependent upon another, the contributory system's exposures are reflected in the total exposure to the user. A common example is where a simple user service is made dependent upon internet access; the mandatory internet access may add huge levels of exposure to a system that would otherwise incur low levels of vulnerability. Some specific technologies including artificial intelligence, nuclear weapons and asteroid strikes have been examined, and authors such as Baum (2018) have pondered their potential to incur existential threats by threatening multiple systems. Others including Baum and Tonn (2015) and Green Brian Patrick (2016) have considered approaches to limiting the scope of such hazards.
The above categories of exposure may apply to any technological process; there are additionally several categories that are specifically relevant to the study of “population exposure”, these include Highly centralised processes, for example, the evacuation and treatment of sewage requires a network of pipes and pumps to collect sewage and deliver it to the treatment station. This is an example of a centralised system that is large but technologically simple. Other examples of large centralised systems include financial transaction systems (O’Mahony, Peirce, & Te Wari, 1997), and the international data transmission systems of undersea fibre-optic cables (Clark, 2016). Such systems tend to be monopolies and are commonly controlled by entities that have little if any obligation to provide service or to negotiate terms acceptable to individual users. Authors such as Li et al. (2019) have shown that highly interconnected systems have similar characteristics to centralised systems, and it is well-recognised that the most “centralised” system is earth’s natural environment, because the natural environment (including air and water) are essential to all life.
3.3.5. Practical unavailability
Consider the hypothetical case where a user wishes to communicate sensitive information, but only has access to one data transmission facility that is known to be under surveillance. Although technically operational, the inevitable absence of privacy associated with that data transmission facility has made the facility practically unavailable. For technological systems that are highly centralised and near-monopoly, practical unavailability is a significant possibility.
4. A THEORETICAL BASIS FOR EXPOSURE REDUCTION
The En metric has been explained earlier in terms of its significance for measuring vulnerability, however a wider and more future-oriented applicability of the metric itself can also be demonstrated in several ways.
4.1. Population exposure insights from exposure metric
The assumption that there is an average cost of defending any vulnerability could be challenged but across a broad enough spread of examples, it is workable. Under that broad assumption, whereas the cost of defence for an E3 exposure-contributor is precisely the same as the cost of defence for a contributor to an E1 vulnerability (it is the cost of protecting one only vulnerability, since the E3 contributor requires successful attack of all three vulnerabilities), the cost of mounting a successful attack on a E3 vulnerability is 3 times greater than the cost of attacking a vulnerability contributing to the E1 value, since the attacker needs to identify and successfully attack all 3 E3-contributory nodes simultaneously. In addition to its value for measuring vulnerability, the exposure metric is therefore also broadly significant for planning the reduction in vulnerability of a system.
4.2. Population exposure insights from exposure analysis
Considering the generation of an exposure metric, the process itself provides valuable insights into options for reduction of the final values. The process of generating an exposure metric must be started from the delivery point, and follow a systematic redrawing and track-back process until a justifiable end-point is reached. The selection of a justifiable end-point has been addressed elsewhere, and could be associated with "no further contributors to an En level" criterion. The process of achieving a final representation of the system will very likely require a progressive redrawing of stream and process relationships; an example of a common re-drawing is presented in Fig. 1 .
Fig. 1.
System re-drawing.
In a practical process of building an exposure metric, subsystems (which may have been analysed separately) commonly contribute goods or services to "higher" systems. If the exposure metric of a subsystem is known then there is little value in recreating a truth table for a higher level super-system, that re-explores all of the inputs to every sub-system. The more-effective approach is to consider the point at which the subsystem output contributes to the input of a gate within the higher level system, and how the subsystem exposure metric is transmitted/accumulated by the upstream gate of the super-system. We may generalise this process by considering that each input to a gate (Boolean AND or OR operation) has an exposure vector, and developing the principles by which the gate output can be calculated from these inputs. This is illustrated in Fig. 2 .
Fig. 2.
Generic accumulation of exposure.
For the AND gate, the contributory exposure vectors are simply added. For the OR gate, the issue is more complex, but the higher levels of exposure are quickly avoided. The process of generating the metric will itself highlight sources of large exposure, and hence specific options for reduction.
4.3. Exposure reduction approaches
The detailed process for analysis of exposure has illustrated how the E values are accumulated and how specific exposure reduction options may be identified. Generalised approaches to the reduction of the exposure of a population can also be identified.
4.3.1. Ensure weaknesses and dependencies are not missed
The process of redrawing shows that even where alternative subsystems can supply higher systems, if there is a locus of weakness that is common to alternative subsystems, the exposure analysis will ensure that such facts are preserved and the E1 contribution will actually appear in the exposure value for the whole target consumer (group). If the "O" ring seal failure had been identified as a contributor to the E1 exposure of the Thiokol Solid Booster Rocket then the elimination of all E1 values for the parent system that was the Challenger space shuttle, could not have been achieved unless the "O" ring weakness were addressed. The use of an exposure metric therefore potentially addresses the colloquial saying "it's always the smallest things that get you". One of the learnings from the analysis of the “Challenger” tragedy was that even known subsystem weaknesses could become lost as analyses were progressively summarised.
4.3.2. Independent alternatives for lower exposure
When genuinely independent, alternative sources are available, their effect on the next-highest systems (process, consumer or group) is illustrated by the operation of an "OR" gate. If 4 genuinely independent/alternative subsystems that each have exposure vectors with non-zero values of E1, are combined via an "OR" gate, the higher system does not see any exposure at above the E4 level from that source. This principle might be qualitatively or intuitively perceived, but the effect upon an analysis of exposure provides a starkly quantitative analysis. It may also be observed that while reducing the exposure of each subsystem would require separately addressing each contributor to the subsystems E1, E2 and E3 values (potentially a major task), if 4 genuinely alternative subsystems exist then the combined "OR" exposure has no non-zero contributor more serious than E4 and may warrant no further action.
4.3.3. Re-purposable equipment
Whereas many 20th century devices were designed for a single purpose and high throughput (mass production), some recent trends have been to devices that can be re-purposed - and the pinnacle of flexibility is the human being! For any case where a piece of equipment contributes to the E1 value (is a single point-of-failure), if the capability of that equipment were able to be undertaken by multiple options (e.g. alternative human operators), the exposure contribution may be reduced to the En level, where n is the number of alternatives or persons capable of undertaking the equipment's function. An illustration may help to clarify this principle: if a sensor provides input that is required by an upstream function, that upstream function and all higher dependencies are exposed to the capability of the sensor to provide input: If ‘n’ humans are able to provide their best assessment of the sensor’s input, then the exposure of the higher system to that functionality is reduced to the En level.
4.4. Generalising the approaches to reduction of exposure
4.4.1. Generalised approaches for high-exposure technology fields
Considering the high-exposure technological fields that were identified earlier, generalised approaches to reducing the accrued actual exposure include standardisation of specifications that allow competitive supply of complex components and complex substances, avoiding the large exposure of some contributory systems, retention of genuine alternatives (e.g. cash/gold as well as electronic transactions).
4.4.2. Generalised approached to reduction of population exposure
There is an intuitive appreciation that it is undesirable to have high vulnerability levels for systems that affect large numbers of persons. Some may also intuitively appreciate that trends to centralisation, driven by economies of scale, increases the technological vulnerability of large population groups. The analysis of population exposure and the principles of exposure analysis therefore provide a quantitative approach that can be used not only to assess the level of exposure of current systems, but more importantly to show quite widely applicable principles for exposure reduction. Specifically the analysis shows that centralisation of production almost inevitably creates higher population exposure values, and provides a sound theoretical basis for promoting decentralisation of production as an approach for the reduction of population exposure.
5. THE PRACTICALITY OF POPULATION EXPOSURE REDUCTION
5.1. Practicality of exposure reduction for high-exposure fields
It is important to consider the practicality of population exposure reduction by decentralisation; this is reviewed within each of the fields previously identified as incurring high exposure:
-
a)Complex components. In order for this functionality to be genuinely available at a significantly decentralised level, we can consider the sub-systems that are required, and the current level of maturity of technology options within each of those subsystems. For a complex component, relevant subsystems include those associated with the supply of materials and the creation of complex shapes from basic material stocks. For many cases, assembly of components is likely to be straightforward but we must also consider cases where assembly itself requires specialised equipment. For the majority of cases, the composition of the complex component can be assumed to be uniform, however cases where composition is not uniform (e.g. multilayer circuit board) must also be acknowledged. Equipment for additive and subtractive manufacturing is available; specifically 3D printing equipment is readily available at small scale, and large scale implementations (Bassoli, Gatto, Iuliano, & Violante, 2007; Kraft, McMahan, & Henry, 2013) have been tested. A moderately standardised format for 3D printer design information exists as ISO 14649-1, 2003, and ISO 10303, 2014 (many sections), and instructions for operating additive and subtractive manufacturing equipment are such that high skill levels are un-necessary. A significant body of designs (Pinshape™, Thingiverse™, GrabCAD™, CGTrader™ etc.) for complex components are already available, and processes that create design information from a component template (Rengier et al., 2010) exist. Subtractive manufacturing using either 5D milling (Comak & Altintas, 2017), spark erosion (Gupta & Jain, 2017) or similar techniques is available and is entering commercial usage including the printing of obscure car parts, which is not mature but is entering the commercial-uptake phase). Considering the generalisability of the current options: 3D printing is currently somewhat limited in the material that can be printed, however this range is expanding and the powder-sintering and other approach promise access to a wide variety of sophisticated materials. Most printers/millers are currently designed to create small components, however there seems no fundamentally reason that a 5-axis milling head cannot be mounted on a mobile platform (Huang et al., 2005). It is reasonable to assume that some assembly of components by a human operator is possible. It is possible that manufacture of some components would require a multi- stage process. For simple cases this might involve 3D printing a component using a thermoplastic material, using this to create a sand mould, followed by metal casting. Current additive and subtractive manufacturing equipment has finite limits to the component tolerances that can be achieved, and to the raw materials that can be processed. Small-scale subtractive manufacturing equipment at current levels of maturity is however capable of actually creating specialised machinery with capabilities that the basic subtractive manufacturing equipment lacks. With minimal extrapolation, additive and subtractive manufacturing equipment is currently capable of re-creating all parts required for a duplicate additive and subtractive manufacturing equipment: this is a significant threshold (Freitas, 2004; Rosin, 2003) indicating that a sustainable level of decentralisation is possible.
-
a)
-
•
Complex substances. In order for complex substance synthesis to be genuinely available at a significantly decentralised level, we can consider the types of complex substances that are of interest, the sub-systems that are required for each, and the current level of maturity of technology options within each of those subsystems. Broadly, the complex substances could be categorised as: Complex alloys, complex inorganic liquids (oils, detergents, etc.), complex organic materials (pharmaceuticals, insecticides, herbicides), complex substances derived from living organisms - yeasts, vaccines, fermentation bacteria, and Polymers. For a complex molecular substance, it is currently common for a range of supply chains to bring raw materials to a synthesis plant. A sequence of synthesis steps (including unit operations of heating and cooling, separation, reaction, precipitation and dissolution) are carried out to generate a complex substance. For "organic" compounds, temperatures are generally limited to below 120 °C. For a complex metallic component, it is currently common for granulated pure metals or metal-compounds to be melted together, sometimes in vacuum or inert gas, and then a controlled set of cooling/holding/reheating steps are used to generate the final material. Considering whether these syntheses could be practically decentralised, Drexler's seminal paper (Drexler, 1981) considered the options and practicality issues associated with general-purpose synthesis of complex substances. Since 2010, the "Engineering and Physical Sciences Research Council" (EPSRC) have been funding a "dial-a-molecule" challenge which runs parallel to the work of others (Crow, 2017; Peplow, 2014), and commercial ventures such as "Mattersift™" (Manipulating matter at the molecular scale) have demonstrated the progress towards this goal. Even where general-purpose synthesis capabilities are not available, the availability of knowledge does in principle allow relatively complex syntheses e.g. Daraprim™, to be undertaken by small groups (Hunjan, 2016). For inorganic materials, progress has been made with solar pyrometallurgy (Neelameggham, 2008) and although much development is needed, there would seem to be no fundamental reason why the required temperatures and composition constraints could not be achieved on small scale and with limited equipment. Published proposals (Crow, 2017; Peplow, 2014) have proposed that it is possible to build a standardised facility capable of carrying out an arbitrary sequence of unit operations required to make any organic compound. While the technologically maturity of decentralised synthesis of complex materials is lower than the decentralised production of complex components, many of the processes are actually feasible at present, and others are rapidly maturing.
-
•
Finance: Decentralised tokens of wealth (tokens of exchange) have existed for as long as societies have existed. In order for a token of exchange to continue to avoid the large exposure of current centralised financial systems, a token must retain the qualities of ubiquitous acceptance, transparent and irrevocable transactions; this is currently feasible. Blockchain technology (Swan, 2015) has recently offered another decentralised system for secure and irrevocable transfer of wealth, allowing broad acceptance and thus meets the criteria for acceptability. Blockchain-based currencies are however reliant on a communications system that is currently highly centralised, and so fall short of the security expected and exist in numbers of as-yet-incompatible forms. The difficulties with current blockchain technologies seem to be solvable, and this technology offers a promising approach to decentralised exchange of value. Current, high-security banknotes and bullion fulfil many of the requirements for a decentralised approach to transactions, and do not incur the exposure that is inherent with blockchain-based currencies, but do incur a high risk of theft and the exposure of a physical transmission system if the transaction is to span significant distance.
-
•
Communications: A communications system could be considered decentralised (within the population size envisaged) when it has no E1 value above zero, and is capable of communicating with any other (decentralised) population. Secure encryption is currently possible (Schneier, 2015), and despite some practical difficulties, mature approaches such as one-time-pads, seem to be proof against even projected (de Wolf, 2017) technologies. Radio transmission on shortwave bands (using ionospheric reflection) of encrypted material can be received globally. Assuming a 10 MHz "open" band, and a very narrow bandwidth (and very slow transmission rate), many channels would be available in principle. This is a low level of practicality, but is must be noted that completely decentralised communication is inherently feasible. Massively-redundant fibre-optic cable systems with decentralised routing systems are also technically feasible, and it is even feasible to consider significantly higher levels of design redundancy for undersea cables. While both feasible and practical for land-based systems, massive design redundancy appears to be feasible for undersea routes but not practical for the exposure level sought. Self-discovering radio-based mesh communications for land-based systems are (Robertson, 2007) feasible at present and are likely to be more practical and economical than massively redundant fibre-optic systems for land-based communications. Hybrid approaches, e.g. using self-discovering mesh for communications within a single land mass, and allowing access to a significant number of undersea cables, could meet the population levels and exposure levels to allow a claim of feasible decentralisation using current technology.
-
•
Energy. A number of forms of energy must be at least considered: Liquid fuel for vehicles, solid/liquid/gas fuels for heating, high voltage AC electricity for drives and low-voltage DC for electronics are all relevant. The analysis of energy need is also not trivial; if vehicles are powered by DC electricity in the future, the dependence upon high quality liquid fuel is changed markedly. Lighting and consumer electronic devices have rapidly transitioned from dependence on 230 VAC to low voltage DC sources. Decentralised generation of 230 V AC electricity has been the subject of numerous studies and at small-scale distributed generation is considered mature technology, but the context of research has generally been integration with a wider 230 V 50 Hz power network. Solar Photovoltaic power generation costs have decreased recently, and now shows unit costs close to those commonly paid for centrally-generated power - but supply is intermittent and seasonal. While technologies for storage of Watt-hour power levels exist, the large-scale (MWh) storage of electrical energy has been noted as one of the technological gaps in the options for decentralisation, and the level of R&D expended on battery research suggests that fundamental breakthroughs may not be likely. So-called "Ultra-capacitor" technology (De Rosa, Higashiya, Schulz, Rane-Fondacaro, & Haldar, 2017) may or may-not overtake battery storage for smaller power levels in the future. The decentralised production of biofuel using macro-algae (Chen, Zhou, Luo, Zhang, & Chen, 2017; Zeb, Park, Riaz, Ryu, & Kim, 2017) is also immature, but the capability to treat sewage and create storable hydrocarbon fuel with high energy-density is promising and is perhaps the decentralised heating-energy storage mode that is closest to technical maturity at present.
5.1.1. Information
The information storage requirements for a community could include significant medical information, all data required for manufacture of complex components and synthesis of complex substances in addition to contractual, financial, genealogical etc. data. Human-readable information storage (books, tablets) have very low exposure and high decentralisation currently. A decentralised and low-exposure approach for storage of machine readable information does however pose a non-trivial technological challenge. Existing computer hard-disk drive storage technology is mature, but this approach has a very high technological exposure since the format of storage and the recovery of data is via a complex and proprietary system, and the actual storage medium is not user-accessible. A criterion of E1<1 could in principle be achieved by massive redundancy, but in practice the use of identical operating systems and software make it likely that residual exposure will remain. Technologies such as the 5D glass storage approach (Kazansky et al., 2016) or proposals by the Longnow Foundation, 2017; or organisations such as “Nanoarchival™ technology” avoid the reliance upon proprietary data retrieval systems and provide very long life - but still lack a mature and decentralised data-writing approach, and a mature and decentralised approach for reading stored data back into a machine-readable form. The advances needed in order to achieve a durable, low-exposure storage medium are immature but are technologically achievable.
5.1.2. Other
It is useful to note many other fields in which significant capabilities can be achieved with simple components: while far short of laboratory quality, the principles of spectrography and chromatography (Ghobadian, Chaichi, Ganjali, Norouzi, & Khaleghzadeh-Ahangar, 2017; Lichtenegger et al., 2017) are actually accessible at a domestic level, and microscope (Prakash, Cybulski, & Clements, 2017) capabilities depend primarily on knowledge and not on sophisticated components. The current centralisation of processing of building materials, natural fabrics and food is driven only by economies of scale, and not be the necessity of complex equipment: decentralisation in these cases is technologically feasible. Many examples of highly standardised equipment and components (examples include shipping containers, roofing iron, nuts and bolts and steel extrusions) exist, and should be considered within the more general principle of layered standardization. The practicality of designing equipment for long operational life has been very well-demonstrated by such examples as the Voyager spacecraft (Jones, 1979) and Mars explorer spacecraft. Organisations such as the Longnow Corporation have considered the requirements for durable engineering, and plan items such as a "10,000 year clock". In the context of this paper and earlier studies (Robertson, 2010), we can consider that it is practical to design at least some classes of components and equipment for a usable timeframe that is demonstrably longer than the time required to re-develop a production facility to recreate them; this criterion is a valid test of low exposure practicality.
5.1.3. In summary
Low exposure and decentralised options for a range of technologies have been examined: Some are mature and some have a low level of technological maturity. It is likely that some could mature rapidly (e.g. additive/subtractive manufacturing, self-discovering communications networks, information storage), while others such as energy storage have absorbed enormous R&D effort already with limited progress. This does not mean that a trend to decentralisation cannot begin, simply that a decentralised society may have more sophisticated capabilities in some fields than others.
5.2. Practicality of connected decentralisation
The ability to form fixed-duration, ad-hoc associations to enable some large-scale development are not only possible for a society comprising decentralised groups, but are considered to be essential. This conclusion differs from the assertion by Jebari and Jebari (2015) that “…isolated, self-sufficient, and continuously manned underground refuges…” are appropriate, rather proposing intentionally independent population units who control their specific interactions with other units, achieving reduced vulnerability but without forfeiting the capability to aggregate selected resources for mutual gain. Smaller-scale concepts such a crowdsourcing approaches are already demonstrating somewhat similar options for shorter-duration, ad-hoc design advances. Situations such as ships travelling in convoy are common and perhaps form a close analogy, demonstrating both the independence of each and the possibility of cooperation.
5.3. Other practical considerations
This paper focussed on broad issues of technological vulnerability, but implementation details (resource usage efficiency, waste creation/treatment, gross greenhouse gas emissions and many other issues are also acknowledged.
Sociological/anthropological research (Dunbar, 2010) has indicated that quite small populations provide a sufficient sociological group size for most, and this conclusion seems to remain broadly valid even where high levels of electronic connection are possible (Mac Carron, Kaski, & Dunbar, 2016).
6. DISCUSSION AND SUMMARY
6.1. Is technological vulnerability significant?
The concept of a technological system's exposure provides both a tool and a metric, which can be applied to either individuals or to populations of individuals, and can supply useful data to the forecasting process.
Population exposure is found to be high for many categories of current technological systems, and the current trend is to increased levels of population exposure. The categories that have been considered as typical, span and affect many goods and services that would be considered essential. Items as diverse as internet usage and financial transactions already have multi-national levels of population exposure (and hence high levels of centralisation) and although various authors (Diamond, 2005) does not use the term "exposure" nor precisely describe the concept, he explains that environmental damage actually has a global exposure level.
Population exposure is a topic that does generate intuitive awareness of vulnerability: it can be observed that awareness of technological vulnerability exists at both national level (see J Critical Infrastructure Protection, Pub Elsevier) and at individual level (Huddleston, 2017; Kabel & Chmidling, 2014; Martin, 1996; Riederer, 2018; Slovic, 2016).
Since a measure of exposure correlates closely with the effort required to protect a system, a continued trend to centralisation and increased population exposure is very likely to lead to progressively Herculean efforts to ensure that vulnerable loci are not attacked; such efforts are likely to include progressively wider surveillance to identify potential threats, and progressively stronger efforts to control and monitor access - each of which are themselves factors that can serve to make the service practically unavailable to individuals.
6.2. "Sophisticated decentralisation" as a forcastable option
If no value were attached to high and rising levels of population exposure, then highly centralised options are likely to continue to be preferred - but the consequences of the high and rising population exposure are demonstrated by reference to a metric of exposure, are also intuitively understood and are illustrated by the “continued centralisation” option in Fig. 3 . If there were indeed no technological options for reducing the level of population exposure without major reductions in the levels of technological sophistication available, then large populations are indeed exposed to the danger of losing access to services. That scenario would indeed result in a catastrophic situation where a major reduction in sophistication of services occurs, but the remnant exposure is also reduced. That scenario has been labelled as the "apocalyptic survivor" scenario in Fig. 3.
Fig. 3.
Alternative futures.
The third alternative shown in Fig. 3, is for progress towards a significantly decentralised society, with a comparatively low population exposure and a level of sophistication (in terms of technological services and goods available) that does not decrease and actually has the real possibility of advancing with time. In this paper, the description of "forecastable options" has been considered under each of the categories of high population exposure, and it has been noted that for each of them technological developments that enable significantly reduced population exposure exist. The current level of technological maturity of these options vary, but none are infeasible and complement the proposals advanced by a number of authors including Gillies (2015) and Blühdorn (2017).
6.3. Trajectory changes
In the course of considering decentralisation options, this paper has identified a small number of technological capabilities that would facilitate a more decentralised option, but which are currently at a low level of technological maturity. These include:
-
•
Further advances on general purpose chemical synthesis
-
•
A durable, open-source machine-accessible information storage system that can be created and read in a decentralised context (requiring only minor development)
-
•
An self-discovering network using an open-source approach to allow information transmission (requiring some development)
-
•
A large-capacity, durable and economically accessible energy storage technology (requiring significant development)
-
•
Further development of trustworthy and decentralised financial transaction systems (requiring some development).
-
•
A non-technological system to allow ad-hoc cooperation between decentralised groups, allowing resource aggregation without long-term centralisation (requiring significant development).
Despite the inevitable variations in technological maturity across a broad range of technologies, the analyses have concluded firstly that centralisation and high population exposure result in severe and increasing vulnerabilities for large numbers of persons, and secondly that the combination of maturing decentralised technological capabilities and the storage of knowledge allows a transition to a "sophisticated decentralisation" model to be considered as a serious option.
While not the primary topic of this paper, it is noted that even in the presence of technological options, change may not occur until some triggering event occurs; events that could trigger a more rapid transition to a "Sophisticated decentralisation" could include a truly major and long-term disruption of some highly centralised technology such as undersea cables or an irremediable malfunction of international financial systems, or a pandemic requiring high levels of population isolation1 .
6.4. Summary
The analysis of technological exposure and reduced exposure options have concluded that practical options for substantial decentralisation exist, or could be reasonably forecast as possible.
It has also been proposed that there are substantive and immediate reasons to consider a qualitatively distinct "fork" from the high population exposure of current centralised society to a more decentralised model.
Any selection of a decentralised technological model might be triggered by some event which crystallised the exposure of a highly centralised model: The drivers that had produced the centralised model will still remain however, and will arguably tend to cause a re-centralisation without ongoing efforts. This issue is outside the scope of this paper, but is noted as a topic requiring further research.
The capability for decentralised and machine-accessible storage of knowledge and the creation of complex components and substances has recently, or will soon, create a cusp at which local equipment is capable of reproducing itself. Sufficient computation facilities at local scale are already able to make genuine advances, and combined with equipment capable of replication, is sufficient to allow fully sustainable, sophisticated and decentralised communities to diverge from current trends.
Declarations of interest
None.
Footnotes
This paper was submitted a few weeks before the emergence of the COVID-19 pandemic. National responses to the pandemic have indeed imposed localized isolations of populations in some cases, and although neither the pandemic nor its technological effects have yet run to conclusion, the situation does suggest the significance of the topic.
References
- Agnew S., Dargusch P. Consumer preferences for household-level battery energy storage. Renewable and Sustainable Energy Reviews. 2017;75 August 2017, Pages 609-617. https://doi.org/10.1016/j.rser.2016.11.030 https://www.sciencedirect.com/science/article/pii/S1364032116307559. [Google Scholar]
- Aven T. On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience. Risk Analysis. 2011;31(4):515–522. doi: 10.1111/j.1539-6924.2010.01528.x. [DOI] [PubMed] [Google Scholar]
- Bassoli E., Gatto A., Iuliano L., Violante M.G. 3D printing technique applied to rapid casting. Rapid Prototyping Journal. 2007;13(3):148–155. doi: 10.1108/13552540710750898. [DOI] [Google Scholar]
- Confronting future catastrophic threats to humanity [special issue] Baum S.D., Tonn B.E., editors. Futures. 2015;vol. 72(September):1–96. <https://www.infona.pl/resource/bwmeta1.element.elsevier-3e592044-85f8-3c5b-bf8a-0e6b38c91f63>. [Google Scholar]
- Bergeron D.P. Prentice Hall PTR; Upper Saddle River, NJ: 2001. Dark Ages II: When the Digital Data Die. [Google Scholar]
- Blühdorn I. Post-capitalism, post-growth, post-consumerism? Eco-political hopes beyond sustainability. Global Discourse: An Interdisciplinary Journal of Current Affairs and Applied Contemporary Thought. 2017;7 doi: 10.1080/23269995.2017.1300415. https://www.tandfonline.com/doi/full/10.1080/23269995.2017.1300415 2017 - 1: After Sustainability - What? Pages 42-61 | Published online: 13 Apr 2017. [DOI] [Google Scholar]
- Bostrom N. Existential risks: analyzing human extinction scenarios and related hazards. Journal of Evolution and Technology. 2002;9 http://jetpress.org/volume9/risks.html Available at. [Google Scholar]
- Mac Carron P., Kaski K., Dunbar R. Calling Dunbar’s numbers. Social Networks. 2016;Volume 47(October):151–155. doi: 10.1016/j.socnet.2016.06.003. https://www.sciencedirect.com/science/article/pii/S0378873316301095 2016. [DOI] [Google Scholar]
- Carvajal S.X., Serrano J., Arango S. Colombian ancillary services and international connections: Current weaknesses and policy challenges. Energy Policy. 2013;Volume 52(January):770–778. doi: 10.1016/j.enpol.2012.10.041. https://www.sciencedirect.com/science/article/pii/S0301421512009226 2013. [DOI] [Google Scholar]
- Cerf V. 2015. "Digital Vellum", Presentation to 2015 AAAS Annual Meeting, February, 12th-16th, 2015.https://aaas.confex.com/aaas/2015/webprogram/Paper14064.html Accessed Sept 2017. [Google Scholar]
- Chen H., Zhou D., Luo G., Zhang S., Chen J. Macroalgae for biofuels production: Progress and perspectives. Renewable and Sustainable Energy Reviews. 2017;Volume 47(July):427–437. 2015. [Google Scholar]
- Clark B. Undersea cables and the future of submarine competition. Bulletin of the Atomic Scientists. 2016;72:234–237. 2016 4: Security at sea, and under it. [Google Scholar]
- Citron D.K., Gray D. Addressing the Harm of Total Surveillance: A Reply to Professor Neil Richards. 126 Harv. L. Rev. F. 2013;262 2012-2013. [Google Scholar]
- Comak A., Altintas Y. Mechanics of turn-milling operations. International Journal of Machine Tools and Manufacture. 2017;121(October):2–9. doi: 10.1016/j.ijmachtools.2017.03.007. https://www.sciencedirect.com/science/article/pii/S0890695516304552 2017. [DOI] [Google Scholar]
- Crow J.M. 2017. "The anything factory" New Scientist No 3139; pp. 38–41. 19 Aug 2017. [Google Scholar]
- Daly H. Sustainable Growth-an impossibility theorem. Development. 1990;3(4):45–47. [Google Scholar]
- Dartnell L. Penguin; London: 2014. The Knowledge: How to Rebuild Civilization in the Aftermath of a Cataclysm. [Google Scholar]
- Deibert R.J. Black Code: Censorship, Surveillance, and the Militarisation of Cyberspace. Millenium: Journal of international studies. 2003 doi: 10.1177/03058298030320030801. First Published December 1, 2003. [DOI] [Google Scholar]
- De Rosa D., Higashiya S., Schulz A., Rane-Fondacaro M., Haldar P. High performance spiro ammonium electrolyte for Electric Double Layer Capacitors. Journal of Power Sources. 2017;V360:41–47. doi: 10.1016/j.jpowsour.2017.05.096. 31 August 2017. [DOI] [Google Scholar]
- Diamond J. Penguin Books; New York: 2005. Collapse: How Societies Choose to Fail or Succeed. ISBN 0-14-303655-303656. [Google Scholar]
- Dobson I., Newman D.E. Cascading blackout overall structure and some implications for sampling and mitigation. International Journal of Electrical Power & Energy Systems. 2017;86(March):29–32. doi: 10.1016/j.ijepes.2016.09.006. 2017. [DOI] [Google Scholar]
- Drexler K.E. Molecular engineering: An approach to the development of general capabilities for molecular manipulation. Proceedings of the National Academy of Sciences. 1981;78(9):5275–5278. doi: 10.1073/pnas.78.9.5275. ISSN 0027-8424. PMC 348724? Freely accessible. PMID 16593078. Retrieved 6 September 2016. [DOI] [PMC free article] [PubMed] [Google Scholar]
- Dunbar R. Faber & Faber; London: 2010. How Many Friends Does One Person Need?: Dunbar’s number and Other Evolutionary Quirks. [Google Scholar]
- Eckersley P., Portnoy E. Electronic Frontier Foundation; 2017. Intel’s management engine is a security hazard, and users need a way to disable it. [Google Scholar]
- Edwards B., Hofmeyr S., Forrest S. Hype and heavy tails: A closer look at data breaches. J Cybersecurity. 2016;2(1):3–14. https://academic.oup.com/cybersecurity/.article/2/1/3/2736315 [Google Scholar]
- Ermolov M., Goryachy M. 2017. How to Hack a Turned Off Computer, or Running Unsigned Code in Intel Management Engine. Blackhat Europe 2017. Dec 4-7, 2017. Excel/London/UK. [Google Scholar]
- Fall K.R., Stevens W.R. Vol. 1. Addison-Wesley; 2011. TCP/IP Illustrated. (The Protocols). 8/11/2011. [Google Scholar]
- Freitas R.A. 2004. Kinematic Self-Replicating Machines. First Published 18 October 2004. Imprint CRC Press. Pub. location Boca Raton. eBook ISBN 9781498713115. [Google Scholar]
- Ghobadian R., Chaichi M.J., Ganjali M.R., Norouzi P., Khaleghzadeh-Ahangar H. An Innovative Homemade Instrument for the Determination of Doxylamine Succinate Based on the Electrochemiluminescence of Ru(bpy)2+ 3. Sensor Letters. 2017;15(February 2) doi: 10.1166/sl.2017.3803. 2017, pp. 162-166 (5). Pub American Scientific Publishers. [DOI] [Google Scholar]
- Gillies D. (December 11), "Paul Mason’s PostCapitalism". Real-World Economics Review. 2015;73:110–119. http://www.paecon.net/PAEReview/issue73/Gillies73.pdf C65:C70. [Google Scholar]
- Green Brian Patrick Emerging technologies, catastrophic risks, and ethics: three strategies for reducing risk. 2016 IEEE International Symposium on Ethics in Engineering, Science and Technology (ETHICS) 2016 https://ieeexplore.ieee.org/abstract/document/7560046 [Google Scholar]
- Guo H., Zheng C., Ho-ChingIu H., Fernando T. A critical review of cascading failure analysis and modelling of power system. Renewable and Sustainable Energy Reviews. 2017;80(December):9–22. doi: 10.1016/j.rser.2017.05.206. 2017. [DOI] [Google Scholar]
- Gupta K., Jain N.K. Near-Net Shape Manufacturing of Miniature Spur Gears by Wire Spark Erosion Machining. Materials Forming, Machining and Tribology. Springer; Singapore: 2017. Overview of Wire Spark Erosion Machining (WSEM) [Google Scholar]
- Haimes Y.Y., Jiang P. Leontief based model of risk in complex interconnected infrastructures. ASCEJ. Infrastructure Syst. 2001;7:1–12. [Google Scholar]
- Henrique N.E., Romeiro A.R. 2013. The Entropy Law and the impossibility of perpetual economic growth. Papers 1309.2274, arXiv.org. [Google Scholar]
- van den Heuvel C. Building Society, Constructing Knowledge, Weaving the Web: Otlet’s Visualizations of a Global Information Society and His Concept of a Universal Civilization. In: Boyd Rayward W., editor. Chapter 7 European Modernism and the Information Society. Informing the Present, Understanding the Past. 1st Edition. 2017. First Published 27 January 1991. Pub. location London. Imprint Routledge. [Google Scholar]
- Hignett K. NASA IMAGE. Observer. NASA Satellite Lost for 13 Years Recovered by Amateur Astronomer. 2018. Long-Lost Satellite Tech Is So Old NASA Can’t Read It. Tech & Science. By John Bonazzo 01/31/18 2:09 pm. [Google Scholar]
- Howard P.N., Agarwal S.D., Hussain M.M. When Do States Disconnect Their Digital Networks? Regime Responses to the Political Uses of Social Media. The Communication Review. 2011;14(3):216–232. doi: 10.1080/10714421.2011.597254. 2011. [DOI] [Google Scholar]
- Huang T., Li M., Zhao X.M., Mei J.P., Chetwynd D.G., Hu S.J. Conceptual design and dimensional synthesis for a 3-DOF module of the TriVariant-a novel 5-DOF reconfigurable hybrid robot. IEEE Transactions on Robotics. 2005;Volume: 21(Issue: 3):449–456. doi: 10.1109/TRO.2004.840908. https://ieeexplore.ieee.org/abstract/document/1435489/ [DOI] [Google Scholar]
- Huddleston C. Vol. 9. Pub: ROUTLEDGE in association with GSE Research; 2017. "Prepper" as Resilient Citizen; pp. 239–247. (Responses to Disasters and Climate Change). [DOI] [Google Scholar]
- Hunjan R. 2016. (Daraprim) drug’s key ingredient recreated by high school students in Sydney for just $20.http://www.abc.net.au/news/2016-11-30/daraprim-nsw-students-create-drug-martin-shkreli-sold/8078892 [Google Scholar]
- ISO 14649-1 . 2003. Industrial automation systems and integration -- Physical device control -- Data model for computerized numerical controllers -- Part 1: Overview and fundamental principles. [Google Scholar]
- ISO 10303 . It is known informally as "STEP", which stands for "Standard for the Exchange of Product model data". 2014. Automation systems and integration — Product data representation and exchange. [Google Scholar]
- Jebari K., Jebari K. Existential Risks: Exploring a Robust Risk Reduction Strategy. Science and Engineering Ethics. 2015;21(3):541–554. doi: 10.1007/s11948-014-9559-3. https://link.springer.com/article/10.1007/s11948-014-9559-3 June 2015. [DOI] [PubMed] [Google Scholar]
- Jones, C. P (1979) Automatic Fault Protection in the Voyager Spacecraft. Document ID: 19990042152 (Acquired June 11, 1999) Report/Patent Number: AIAA Paper 79-1919 https://ntrs.nasa.gov/search.jsp?R=19990042152.
- Kabel A., Chmidling C. Disaster Prepper: Health, Identity, and American Survivalist Culture. Human Organization: Fall. 2014;73(No. 3):258–266. doi: 10.17730/humo.73.3.l34252tg03428527. 2014. [DOI] [Google Scholar]
- Kazansky P., Cerkauskaite A., Beresna M., Drevinskas R., Patel A., Zhang J. SPIE Newsroom. 2016. Eternal 5D data storage via ultrafast-laser writing in glass. 11 March 2016. Viewed January 2017. [DOI] [Google Scholar]
- Kraft R., McMahan T., Henry K. 2013. NASA Tests Limits of 3-D Printing with Powerful Rocket Engine Check. NASA engineers prepare to hot-fire test a 3-D printed rocket part on Test Stand 115 at the Marshall Center. Credits: NASA/MSFC/Emmett Given. Viewed at <https://www.nasa.gov/exploration/systems/sls/3d-printed-rocket-injector.html> 1 May 2018. [Google Scholar]
- Li J., Wang Y., Huang S., Xie J., Shekhtman L., Hu Y. Recent progress on cascading failures and recovery in interdependent networks. International Journal of Disaster Risk Reduction. 2019;40(November) doi: 10.1016/j.ijdrr.2019.101266. https://www.sciencedirect.com/science/article/pii/S2212420919307241?via%3Dihub 2019. [DOI] [Google Scholar]
- Lichtenegger A., Harper D.J., Augustin M., Eugui P., Fialová S., Woehrer A. Visible light spectral domain optical coherence microscopy system for ex vivo imaging. Proc. SPIE 10051, Neural Imaging and Sensing. 2017 doi: 10.1117/12.2250158. 1005103 (8 February 2017) [DOI] [Google Scholar]
- Longnow Foundation . 2017. "Rosetta disk" accessed 19 Sept.http://rosettaproject.org/disk/concept/ [Google Scholar]
- Martin B. Technological vulnerability. Technology in Society. 1996;18(4):511–528. [Google Scholar]
- Miller K. Total Surveillance, Big Data, and Predictive Crime Technology: Privacy’s Perfect Storm. J. Tech. L. & Pol’y. 2014;105 2014. [Google Scholar]
- Moses L.B. Is Your Algorithm Dangerous? IEEE Technology and Society Magazine. 2018;37(3):20–21. [Google Scholar]
- Neelameggham N.R. Solar pyrometallurgy—An historic review. JOM. 2008;60(February (2)):48–50. https://link.springer.com/article/10.1007/s11837-008-0018-y 2008. [Google Scholar]
- O’Mahony D., Peirce M., Te Wari H. Artech House; Boston: 1997. Electronic Payment Systems. [Google Scholar]
- Peplow M. Vol. 512. 2014. Organic synthesis: The robo-chemist.https://www.nature.com/news/organic-synthesis-the-robo-chemist-1.15661 (The race is on to build a machine that can synthesize any organic compound. It could transform chemistry. Nature | News Feature). 7512. [Google Scholar]
- Permanent Archival Solution . 2020. NanoArchival provides ultra-long term archival solutions to enterprise customers, based on its proprietary, patented nickel Nanofiche™ technology breakthrough.https://nanoarchival.com/ [Google Scholar]
- Pathak P.B. A Dangerous Trend of Cybercrime: Ransomware Growing Challenge. International Journal of Advanced Research in Computer Engineering & Technology. (IJARCET) 2016;Volume 5(February 2) 2016. ISSN: 2278. [Google Scholar]
- Pkalski A., Sznajd-Weron K. Population dynamics with and without selection. Phys. Rev. E. 2001;63 doi: 10.1103/PhysRevE.63.031903. 031903 – Published 20 February 2001. [DOI] [PubMed] [Google Scholar]
- Prakash M., Cybulski S.J., Clements J.C. 2017. (Inventors)” Optical microscope”.https://patents.google.com/patent/US9696535B2/en [Google Scholar]
- Rao G.V. Transnational Monopolies. Social Scientist. 1975;3(10):55–68. doi: 10.2307/3516161. https://www.jstor.org/stable/3516161 May, 1975. [DOI] [Google Scholar]
- Rengier F., Mehndiratta A., von Tengg-Kobligk H., Zechmann C.M., Unterhinninghofen R., Kauczor H.-U. 3D printing based on imaging data: review of medical applications. International Journal of Computer Assisted Radiology and Surgery. July 2010. 2010;5(4):335–341. doi: 10.1007/s11548-010-0476-x. https://link.springer.com/article/10.1007/s11548-010-0476-x First Online: 15 May 2010. [DOI] [PubMed] [Google Scholar]
- Riederer R. Doomsday Goes Mainstream. Dissent. 2018;65(2):14–18. University of Pennsylvania Press. [Google Scholar]
- Robertson L.J. Network/Data Layer Messaging Protocol for Stand-Alone, Free-Field Communications Systems. QEX. 2007;242:33–38. [Google Scholar]
- Robertson L.J. From societal fragility to sustainable robustness: some tentative technology trajectories. Technology in Society. 2010;32(2010):342–351. doi: 10.1016/j.techsoc.2010.10.012. [DOI] [Google Scholar]
- Robertson L.J. dentifying and reducing technological contributions to end-user vulnerability. Thesis presented by L J Robertson, in fulfilment of the requirements for the award of the Degree of Doctor of Philosophy at the University of Wollongong; NSW, Australia; 2017. Thesis. [Google Scholar]
- Robertson L.J., Munoz A., Michael K. A Theory of Exposure: Measuring Technology System End User Vulnerabilities. Cunningham P., Cunningham M., editors. 2017 IEEE International Symposium on Technology in Society (ISTAS) Proceedings. 2017 ISBN: 978-1-5386-0487-8. [Google Scholar]
- Rose F. Emerging Threats: Outer Space, Cyberspace, and Undersea Cables. Arms Control Today; Washington. 2017;Vol. 47(Iss. 1):52. Jan/Feb 2017. [Google Scholar]
- Rosin R.F. Encyclopedia of Computer Science. 4th. John Wiley and Sons Ltd; Chichester, UK: 2003. Von Neumann machine; pp. 1841–1842. table of contents ISBN:0-470-86412-86415. [Google Scholar]
- Sandywell B. Monsters in cyberspace cyberphobia and cultural panic in the information age. Information, Communication & Society. 2006;9(1):39–61. doi: 10.1080/13691180500519407. 2006. [DOI] [Google Scholar]
- Schneier B. Protocols, Algorthms, and Source Code in C. Second Edition. 2015. Applied Cryptography. [DOI] [Google Scholar]
- Shapiro R. A new rationale for returning to the Moon? Protecting civilization with a sanctuary. Space Policy. 2009;25:1–5. doi: 10.1016/j.spacepol.2008.12.002. 2009. [DOI] [Google Scholar]
- Sidhu R.K. A thesis submitted to Faculty of Graduate Studies and Research, McGill University in partial fulfilment of the requirements of the degree of Master of Engineering Department of Electrical Engineering. July, 2010. McGill University; Montreal, Canada: 2010. Impacts of Geomagnetic storms on Trans-Canadian Grids. Thesis. http://digitool.library.mcgill.ca/webclient/StreamGate?folder_id=0&dvs=1568354262246∼25. [Google Scholar]
- Slovic R. 2016. The Perception of Risk. Routledge, 6/10/2016. [Google Scholar]
- Smil V. MIT Press; 2017. Energy and Civilization; A History. [Google Scholar]
- Sobczak B., Behr P. 2015. Hulking transformers prove a challenge for vulnerable grid. E&E 2015-11-24 and see Energy News Digest for November 30, 2015 <https://energynewsdigest.blogspot.com/2015/11/ Seen at <https://www.eenews.net/stories/1060028436> 15 Sept 2019. [Google Scholar]
- Swan M. O’Reilly Media, Inc.; 2015. Blockchain: Blueprint for a New Economy. [Google Scholar]
- Tanczer L.M., McConville R., Maynard P. Censorship and Surveillance in the Digital Age: The Technological Challenges for Academics. Journal of Global Security Studies. 2016;1(November 4):346–355. doi: 10.1093/jogss/ogw016. 2016. [DOI] [Google Scholar]
- Teja E.R. The Designer’s Guide to Disk Drives. Reston, Virginia USA. 1985 [Google Scholar]
- de Wolf R. The potential impact of quantum computers on society. Ethics and Information Technology. 2017;19(4):271–276. December 2017. [Google Scholar]
- Zeb H., Park J., Riaz A., Ryu C., Kim J. High-yield bio-oil production from macroalgae (Saccharina japonica) in supercritical ethanol and its combustion behaviour. Chemical Engineering Journal. 2017;327(November 1):79–90. doi: 10.1016/j.cej.2017.06.078. 2017. [DOI] [Google Scholar]



