SlideShare a Scribd company logo
1 of 101
What can we learn from the
      Unabomber?
What can we learn from the
      Unabomber?

      Nothing.
But…
But…


This doesn’t mean our technological system is
benign.
and…
and…


This doesn’t mean radical measures aren’t called
for.
It means…
It means…


The Unabomber is not the go to guy for
answers.
The Plan
The Plan
1) Why the Unabomber Manifesto is Weak
The Plan
1) Why the Unabomber Manifesto is Weak
2) Why the Unabomber Manifesto is Wrong
The Plan
1) Why the Unabomber Manifesto is Weak
2) Why the Unabomber Manifesto is Wrong
3) What is a Better Critique?
The Plan
1)   Why the Unabomber Manifesto is Weak
2)   Why the Unabomber Manifesto is Wrong
3)   What is a Better Critique?
4)   Why are we *Really* Here?
1. Why the Unabomber Manifesto
            is Weak
1. Why the Unabomer Manifesto
               is Weak
1). The bulk of the argument is an ad hominem
attack
1. Why the Unabomer Manifesto
               is Weak
1). The bulk of the argument is ad hominem
attack

2). The argument relies on the genetic fallacy
1. Why the Unabomer Manifesto
               is Weak
1). The bulk of the argument is ad hominem
attack

2). The argument relies on the genetic fallacy

3). The argument from evolution is NOT SOUND
On the ad hominem and genetic
           fallacies
On the ad hominem and genetic
               fallacies
What role do they play in the manifesto?
On the ad hominem and genetic
               fallacies
What role do they play in the manifesto?

The Unabomber uses them to dismiss
arguments that we can use government or
activism to restrain technology.
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
Argument to the person
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
Argument to the person

The genetic fallacy:
On the ad hominem and genetic
               fallacies
The ad hominem fallacy:
Argument to the person.

The genetic fallacy:
Thinking that showing the source of a belief
falsifies the belief.
The Unabomber on “leftists”
7. When we speak of leftists in this article we
have in mind mainly socialists, collectivists,
"politically correct" types, feminists, gay and
disability activists, animal rights activists and the
like. But not everyone who is associated with
one of these movements is a leftist. What we
are trying to get at in discussing leftism is not so
much a movement or an ideology as a
psychological type.
9. The two psychological tendencies that
underlie modern leftism we call "feelings of
inferiority" and "oversocialization.”
10. By "feelings of inferiority" we mean not only
inferiority feelings in the strictest sense but a
whole spectrum of related traits: low self-
esteem, feelings of powerlessness, depressive
tendencies,defeatism, guilt, self-hatred, etc. We
argue that modern leftists tend to have such
feelings (possibly more or less repressed) and
that these feelings are decisive in determining
the direction of modern leftism.
14. Feminists are desperately anxious to prove
that women are as strong as capable as men.
Clearly they are nagged by a fear that women
may NOT be as strong and as capable as men.
15. Leftists tend to hate anything that has an
image of being strong, good and successful.
They hate America, they hate Western
civilization, they hate white males, they hate
rationality.
17. Art forms that appeal to modern leftist
intellectuals tend to focus on sordidness, defeat
and despair, or else they take an orgiastic
tone, throwing off rational control as if there
were no hope of accomplishing anything
through rational calculation and all that was left
was to immerse oneself in the sensations of the
moment.
18. Modern leftist philosophers tend to dismiss
reason, science, objective reality and to insist
that everything is culturally relative. …They are
deeply involved emotionally in their attack on
truth and reality. They attack these concepts
because of their own psychological needs.
20. Notice the masochistic tendency of leftist
tactics. Leftists protest by lying down in front of
vehicles, they intentionally provoke police or
racists to abuse them, etc. These tactics may
often be effective, but many leftists use them
not as a means to an end but because they
PREFER masochistic tactics. Self-hatred is a
leftist trait.
Masochist?
Masochists?
Masochists?
Masochists?
Reviewing so far…
Reviewing so far…
• These attacks are ad hominem
Reviewing so far…
• These attacks are ad hominem

• They play a role in the genetic fallacy
Reviewing so far…
• These attacks are ad hominem

• They play a role in the genetic fallacy

• In any case, the psychological claims are
  unsupported and very likely false.
The Core Argument
(1) Humans evolved under primitive, low-tech
    conditions, over the past 2 million years.
(2) Lived in small autonomous groups (25-
    50), amidst vast wilderness.
(3) Modern technological society is radically
    different than this, and imposes
    unprecedented stress on humanity and
    nature.
Core Argument (cont.)
(4) Technological stress will only continue to
     worsen:
      The environment will become simplified,
       manipulated, and contaminated.
      Humanity will become either enslaved, genetically-
       modified, or eliminated.
(5) Such a condition is undignified, abhorrent,
     and profoundly dehumanizing.
(6) It is impossible to fix or reform the system,
     so as to avoid these disastrous outcomes.
Core Argument (cont.)


    THEREFORE: The system must end.

In fact, we have a moral obligation to end it.
This argument is not sound.
The argument is not sound.


The fact that a situation is abhorrent does not
mean we have a moral obligation to
exterminate billions of people to end it.
The argument is not sound.

Furthermore, from the claim that people are
metaphorically “enslaved”, it does not follow
that the enslavement should end at any cost.
The argument is not sound.

Furthermore, from the claim that people are
metaphorically “enslaved”, it does not follow
that the enslavement should end at any cost.

From the fact that the species is at risk it doesn’t
follow that any action is justified.
For example

If we are going to starve if we don’t kill and eat
someone it doesn’t follow that we should kill
and eat someone.
For example

If we are going to starve if we don’t kill and eat
someone it doesn’t follow that we should kill
and eat someone.

It certainly doesn’t follow that we have a moral
obligation to kill and eat someone.
In addition…
There is also a missing premise in the step from this
premise:

“[if we don’t return to the conditions under which we evolved]
Humanity will become either enslaved, genetically-modified, or
eliminated.”

to the conclusion.

The system must end. In fact, we have a moral obligation to end it.
Two missing premises.
Two missing premises.

1) Evolution optimizes for freedom, dignity, genetic
   stability, and survival of the species.
Two missing premises.

1) Evolution optimizes for freedom, dignity, genetic
   stability, and survival of the species.

2) The only way to stay optimized is by being in the
   conditions in which we evolved.
missing premise 1


Evolution optimizes for freedom, dignity, genetic
stability, and survival of the species,

so if we return to the conditions under which we
evolved we optimize for all these.
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.

Evolution only cares about reproductive success.
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.

Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
But that premise is false:
Evolution doesn’t optimize for freedom, dignity,
genetic stability, and survival of the species.

Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
2) It doesn’t promise genetic stability
But that premise is false:
Evolution doesn’t optimize for
freedom, dignity, genetic stability, and survival
of the species.

Evolution only cares about reproductive success.
1) It doesn’t care about freedom and dignity
2) It doesn’t promise genetic stability
3) It doesn’t promise survival of the species
Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?
Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?

No, because that is what human factors
engineering is for. We engineer for people as
they are evolved.
Missing premise 2
Is returning to the original evolving conditions
the only way to optimize?

No, because that is what human factors
engineering is for. We engineer for people as
they are evolved.

And there are other ways…
KU’s Steve Illardi
How to reproduce hunter-gatherer psychology

1)   omega-3 fatty acids
2)   Exercise
3)   Light exposure
4)   Sleep
5)   Social connectedness
6)   Anti-ruminative behavior
Is the background assumption true?
Is the background assumption true?



Background assumption: human technology is
alien to us as human beings.
Perhaps we evolved to be technological
creatures.
bees
beavers
spiders
birds
humans
humans
3. What is a Better Critique?
3. What is a Better Critique?
An Anarchist critique:
3. What is a Better Critique?
An Anarchist critique:

Perhaps we are only alienated by technology
when those in power seize control of it.
3. What is a Better Critique?
An Anarchist critique:

Perhaps we are only alienated by technology
when those in power seize control of it.

We are not alienated by technology
We are alienated from technology
3. What is a Better Critique?

A hacktivist critique:
3. What is a Better Critique?

A hacktivist critique:

We become alienated when the ability is to be
technological is kept from us!
We become alienated from technology when we
aren’t allowed to see and understand how it
works
We become alienated from technology when we
aren’t allowed to see and understand how it
works

–that is, alienation occurs when the ability to
understand and hack technology is withheld
from us.
How do we fix the misuse of
      technology?
How do we fix the misuse of
            technology?


Put control of technology back in the hands of
everyone (not just those in power).
How do we fix the misuse of
            technology?


Put control of technology back in the hands of
everyone (not just those the powerful).

Information wants to be free. Liberate it!
4. So, Why are We *Really* Here?
4. So, Why are We *Really* Here?
The toll…
The toll…
• 16 bombs
The toll…
• 16 bombs
• 3 killed
The toll…
• 16 bombs
• 3 killed
• 13 maimed
one victim
Thomas J. Mosser
                        •   Advertising exec
                        •   North Caldwell, NJ
                        •   Age 50
                        •   Wife, Susan
                        •   Daughter, age 13
                        •   Daughter, 15 months
From the NYT
Some neighbors said yesterday that it was only
luck that others were not injured by the bomb.
Mr. McKay said that he held a party for the
neighborhood on Friday night and that several
children wandered from the party to the
Mossers' house.
From the NYT
"They had half a dozen kids there with the bomb
sitting on the table," Mr. McKay said. "His wife
signed for the package on Friday and left it on
the table."
From the NYT
Robin xxx, 13, stayed over for the night and was
in the house with the Mossers and their
daughters when the explosion occurred. She
said she took the Mossers' daughter Kelly next
door after the blast.
Robert Kusmirowski, Unacabine, 2008
Unabomber Cabin at the Newseum
Newseum
• “Probe the Unabomber Cabin:
  Explore a mad hermit’s life with
  videos and an interactive [sic].”
Jeffrey Dahmer’s Spoon

More Related Content

What's hot

What's hot (10)

Mcqs psychology
Mcqs psychology Mcqs psychology
Mcqs psychology
 
Attitudes
Attitudes Attitudes
Attitudes
 
Anger The Human Suicide Bomb
Anger The Human Suicide BombAnger The Human Suicide Bomb
Anger The Human Suicide Bomb
 
Intelligence
IntelligenceIntelligence
Intelligence
 
Personality
PersonalityPersonality
Personality
 
EGO
EGOEGO
EGO
 
Building Emotional Competence
Building Emotional CompetenceBuilding Emotional Competence
Building Emotional Competence
 
Freud's developmental theory
Freud's developmental theoryFreud's developmental theory
Freud's developmental theory
 
Introduction to Behavioral Science
Introduction to Behavioral ScienceIntroduction to Behavioral Science
Introduction to Behavioral Science
 
Social Psychology 7th Edition Aronson Test Bank
Social Psychology 7th Edition Aronson Test BankSocial Psychology 7th Edition Aronson Test Bank
Social Psychology 7th Edition Aronson Test Bank
 

Similar to What Can We Learn from the Unabomber?: Nothing.

Concise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions ManualConcise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions ManualClemonser
 
Artificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdfArtificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdfvenetianlanguage
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentationsJenny Jeon
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentationsJenny Jeon
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentationsJenny Jeon
 
Artificial intelligence: the challange
Artificial intelligence: the challangeArtificial intelligence: the challange
Artificial intelligence: the challangevenetianlanguage
 
Answer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docxAnswer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docxYASHU40
 
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...Staci Sprout, LICSW, CSAT
 
CAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotesCAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotescapesociology
 
Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...Pozzolini
 
Propaganda 2009
Propaganda 2009Propaganda 2009
Propaganda 2009dansutton
 
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)Werner Sattmann-Frese
 
Living with Exponential Growth
Living with Exponential GrowthLiving with Exponential Growth
Living with Exponential Growthneeraj0808
 
4. Human Perception
4. Human Perception4. Human Perception
4. Human PerceptionJoe Gamore
 
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docxAshford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docxwildmandelorse
 

Similar to What Can We Learn from the Unabomber?: Nothing. (20)

Concise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions ManualConcise Introduction to Logic 11th Edition Hurley Solutions Manual
Concise Introduction to Logic 11th Edition Hurley Solutions Manual
 
Artificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdfArtificial Intelligence: The challenge.pdf
Artificial Intelligence: The challenge.pdf
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentations
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentations
 
Humanity presentations
Humanity presentationsHumanity presentations
Humanity presentations
 
Artificial intelligence: the challange
Artificial intelligence: the challangeArtificial intelligence: the challange
Artificial intelligence: the challange
 
Answer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docxAnswer all questions.Define strain theory Why is it a structu.docx
Answer all questions.Define strain theory Why is it a structu.docx
 
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
Extreme Abuse 101: Expanding Our Therapeutic Container to Better Serve Our Cl...
 
lecture 2ppt.pdf
lecture 2ppt.pdflecture 2ppt.pdf
lecture 2ppt.pdf
 
CAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotesCAPE SOCIOLOGY UNIT 2 Deviance teachernotes
CAPE SOCIOLOGY UNIT 2 Deviance teachernotes
 
2014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.62014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.6
 
Hero Training
Hero TrainingHero Training
Hero Training
 
Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...Is It True That (Presentation Intercultural Management Course 2011) Version 1...
Is It True That (Presentation Intercultural Management Course 2011) Version 1...
 
What is Cultural Psych
What is Cultural PsychWhat is Cultural Psych
What is Cultural Psych
 
Propaganda 2009
Propaganda 2009Propaganda 2009
Propaganda 2009
 
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
Werner Sattmann-Frese - Psychological Perspectives of Ecological Crises (IPK)
 
Defeating aging
Defeating agingDefeating aging
Defeating aging
 
Living with Exponential Growth
Living with Exponential GrowthLiving with Exponential Growth
Living with Exponential Growth
 
4. Human Perception
4. Human Perception4. Human Perception
4. Human Perception
 
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docxAshford 3  - Week 2 - QuizQuestion 1. 1. What does Tom .docx
Ashford 3 - Week 2 - QuizQuestion 1. 1. What does Tom .docx
 

More from Peter Ludlow

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Peter Ludlow
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative GuidancePeter Ludlow
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and ConspiracyPeter Ludlow
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Peter Ludlow
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismPeter Ludlow
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfarePeter Ludlow
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Peter Ludlow
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in troublePeter Ludlow
 

More from Peter Ludlow (10)

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative Guidance
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and Conspiracy
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivism
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfare
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018
 
Truth in fanfic
Truth in fanficTruth in fanfic
Truth in fanfic
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in trouble
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

What Can We Learn from the Unabomber?: Nothing.

  • 1. What can we learn from the Unabomber?
  • 2. What can we learn from the Unabomber? Nothing.
  • 4. But… This doesn’t mean our technological system is benign.
  • 6. and… This doesn’t mean radical measures aren’t called for.
  • 8. It means… The Unabomber is not the go to guy for answers.
  • 10. The Plan 1) Why the Unabomber Manifesto is Weak
  • 11. The Plan 1) Why the Unabomber Manifesto is Weak 2) Why the Unabomber Manifesto is Wrong
  • 12. The Plan 1) Why the Unabomber Manifesto is Weak 2) Why the Unabomber Manifesto is Wrong 3) What is a Better Critique?
  • 13. The Plan 1) Why the Unabomber Manifesto is Weak 2) Why the Unabomber Manifesto is Wrong 3) What is a Better Critique? 4) Why are we *Really* Here?
  • 14. 1. Why the Unabomber Manifesto is Weak
  • 15. 1. Why the Unabomer Manifesto is Weak 1). The bulk of the argument is an ad hominem attack
  • 16. 1. Why the Unabomer Manifesto is Weak 1). The bulk of the argument is ad hominem attack 2). The argument relies on the genetic fallacy
  • 17. 1. Why the Unabomer Manifesto is Weak 1). The bulk of the argument is ad hominem attack 2). The argument relies on the genetic fallacy 3). The argument from evolution is NOT SOUND
  • 18. On the ad hominem and genetic fallacies
  • 19. On the ad hominem and genetic fallacies What role do they play in the manifesto?
  • 20. On the ad hominem and genetic fallacies What role do they play in the manifesto? The Unabomber uses them to dismiss arguments that we can use government or activism to restrain technology.
  • 21. On the ad hominem and genetic fallacies The ad hominem fallacy:
  • 22. On the ad hominem and genetic fallacies The ad hominem fallacy: Argument to the person
  • 23. On the ad hominem and genetic fallacies The ad hominem fallacy: Argument to the person The genetic fallacy:
  • 24. On the ad hominem and genetic fallacies The ad hominem fallacy: Argument to the person. The genetic fallacy: Thinking that showing the source of a belief falsifies the belief.
  • 25. The Unabomber on “leftists” 7. When we speak of leftists in this article we have in mind mainly socialists, collectivists, "politically correct" types, feminists, gay and disability activists, animal rights activists and the like. But not everyone who is associated with one of these movements is a leftist. What we are trying to get at in discussing leftism is not so much a movement or an ideology as a psychological type.
  • 26. 9. The two psychological tendencies that underlie modern leftism we call "feelings of inferiority" and "oversocialization.”
  • 27. 10. By "feelings of inferiority" we mean not only inferiority feelings in the strictest sense but a whole spectrum of related traits: low self- esteem, feelings of powerlessness, depressive tendencies,defeatism, guilt, self-hatred, etc. We argue that modern leftists tend to have such feelings (possibly more or less repressed) and that these feelings are decisive in determining the direction of modern leftism.
  • 28. 14. Feminists are desperately anxious to prove that women are as strong as capable as men. Clearly they are nagged by a fear that women may NOT be as strong and as capable as men.
  • 29. 15. Leftists tend to hate anything that has an image of being strong, good and successful. They hate America, they hate Western civilization, they hate white males, they hate rationality.
  • 30. 17. Art forms that appeal to modern leftist intellectuals tend to focus on sordidness, defeat and despair, or else they take an orgiastic tone, throwing off rational control as if there were no hope of accomplishing anything through rational calculation and all that was left was to immerse oneself in the sensations of the moment.
  • 31. 18. Modern leftist philosophers tend to dismiss reason, science, objective reality and to insist that everything is culturally relative. …They are deeply involved emotionally in their attack on truth and reality. They attack these concepts because of their own psychological needs.
  • 32. 20. Notice the masochistic tendency of leftist tactics. Leftists protest by lying down in front of vehicles, they intentionally provoke police or racists to abuse them, etc. These tactics may often be effective, but many leftists use them not as a means to an end but because they PREFER masochistic tactics. Self-hatred is a leftist trait.
  • 38. Reviewing so far… • These attacks are ad hominem
  • 39. Reviewing so far… • These attacks are ad hominem • They play a role in the genetic fallacy
  • 40. Reviewing so far… • These attacks are ad hominem • They play a role in the genetic fallacy • In any case, the psychological claims are unsupported and very likely false.
  • 41. The Core Argument (1) Humans evolved under primitive, low-tech conditions, over the past 2 million years. (2) Lived in small autonomous groups (25- 50), amidst vast wilderness. (3) Modern technological society is radically different than this, and imposes unprecedented stress on humanity and nature.
  • 42. Core Argument (cont.) (4) Technological stress will only continue to worsen:  The environment will become simplified, manipulated, and contaminated.  Humanity will become either enslaved, genetically- modified, or eliminated. (5) Such a condition is undignified, abhorrent, and profoundly dehumanizing. (6) It is impossible to fix or reform the system, so as to avoid these disastrous outcomes.
  • 43. Core Argument (cont.) THEREFORE: The system must end. In fact, we have a moral obligation to end it.
  • 44. This argument is not sound.
  • 45. The argument is not sound. The fact that a situation is abhorrent does not mean we have a moral obligation to exterminate billions of people to end it.
  • 46. The argument is not sound. Furthermore, from the claim that people are metaphorically “enslaved”, it does not follow that the enslavement should end at any cost.
  • 47. The argument is not sound. Furthermore, from the claim that people are metaphorically “enslaved”, it does not follow that the enslavement should end at any cost. From the fact that the species is at risk it doesn’t follow that any action is justified.
  • 48. For example If we are going to starve if we don’t kill and eat someone it doesn’t follow that we should kill and eat someone.
  • 49. For example If we are going to starve if we don’t kill and eat someone it doesn’t follow that we should kill and eat someone. It certainly doesn’t follow that we have a moral obligation to kill and eat someone.
  • 50. In addition… There is also a missing premise in the step from this premise: “[if we don’t return to the conditions under which we evolved] Humanity will become either enslaved, genetically-modified, or eliminated.” to the conclusion. The system must end. In fact, we have a moral obligation to end it.
  • 52. Two missing premises. 1) Evolution optimizes for freedom, dignity, genetic stability, and survival of the species.
  • 53. Two missing premises. 1) Evolution optimizes for freedom, dignity, genetic stability, and survival of the species. 2) The only way to stay optimized is by being in the conditions in which we evolved.
  • 54. missing premise 1 Evolution optimizes for freedom, dignity, genetic stability, and survival of the species, so if we return to the conditions under which we evolved we optimize for all these.
  • 55. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species.
  • 56. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success.
  • 57. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success. 1) It doesn’t care about freedom and dignity
  • 58. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success. 1) It doesn’t care about freedom and dignity 2) It doesn’t promise genetic stability
  • 59. But that premise is false: Evolution doesn’t optimize for freedom, dignity, genetic stability, and survival of the species. Evolution only cares about reproductive success. 1) It doesn’t care about freedom and dignity 2) It doesn’t promise genetic stability 3) It doesn’t promise survival of the species
  • 60. Missing premise 2 Is returning to the original evolving conditions the only way to optimize?
  • 61. Missing premise 2 Is returning to the original evolving conditions the only way to optimize? No, because that is what human factors engineering is for. We engineer for people as they are evolved.
  • 62. Missing premise 2 Is returning to the original evolving conditions the only way to optimize? No, because that is what human factors engineering is for. We engineer for people as they are evolved. And there are other ways…
  • 63. KU’s Steve Illardi How to reproduce hunter-gatherer psychology 1) omega-3 fatty acids 2) Exercise 3) Light exposure 4) Sleep 5) Social connectedness 6) Anti-ruminative behavior
  • 64. Is the background assumption true?
  • 65. Is the background assumption true? Background assumption: human technology is alien to us as human beings.
  • 66. Perhaps we evolved to be technological creatures.
  • 67. bees
  • 70. birds
  • 73. 3. What is a Better Critique?
  • 74. 3. What is a Better Critique? An Anarchist critique:
  • 75. 3. What is a Better Critique? An Anarchist critique: Perhaps we are only alienated by technology when those in power seize control of it.
  • 76. 3. What is a Better Critique? An Anarchist critique: Perhaps we are only alienated by technology when those in power seize control of it. We are not alienated by technology We are alienated from technology
  • 77. 3. What is a Better Critique? A hacktivist critique:
  • 78. 3. What is a Better Critique? A hacktivist critique: We become alienated when the ability is to be technological is kept from us!
  • 79. We become alienated from technology when we aren’t allowed to see and understand how it works
  • 80. We become alienated from technology when we aren’t allowed to see and understand how it works –that is, alienation occurs when the ability to understand and hack technology is withheld from us.
  • 81. How do we fix the misuse of technology?
  • 82. How do we fix the misuse of technology? Put control of technology back in the hands of everyone (not just those in power).
  • 83. How do we fix the misuse of technology? Put control of technology back in the hands of everyone (not just those the powerful). Information wants to be free. Liberate it!
  • 84. 4. So, Why are We *Really* Here?
  • 85. 4. So, Why are We *Really* Here?
  • 86.
  • 87.
  • 88.
  • 91. The toll… • 16 bombs • 3 killed
  • 92. The toll… • 16 bombs • 3 killed • 13 maimed
  • 93. one victim Thomas J. Mosser • Advertising exec • North Caldwell, NJ • Age 50 • Wife, Susan • Daughter, age 13 • Daughter, 15 months
  • 94. From the NYT Some neighbors said yesterday that it was only luck that others were not injured by the bomb. Mr. McKay said that he held a party for the neighborhood on Friday night and that several children wandered from the party to the Mossers' house.
  • 95. From the NYT "They had half a dozen kids there with the bomb sitting on the table," Mr. McKay said. "His wife signed for the package on Friday and left it on the table."
  • 96. From the NYT Robin xxx, 13, stayed over for the night and was in the house with the Mossers and their daughters when the explosion occurred. She said she took the Mossers' daughter Kelly next door after the blast.
  • 98. Unabomber Cabin at the Newseum
  • 99. Newseum • “Probe the Unabomber Cabin: Explore a mad hermit’s life with videos and an interactive [sic].”
  • 100.