Dynamite to Drones: The Diffusion of Lethal Technology to Terrorists and Insurgents

April 08, 2022 00:48:29
Dynamite to Drones: The Diffusion of Lethal Technology to Terrorists and Insurgents
Irregular Warfare Podcast
Dynamite to Drones: The Diffusion of Lethal Technology to Terrorists and Insurgents

Apr 08 2022 | 00:48:29

/

Show Notes

From dynamite in the early twentieth century to drones, bioweapons, and private-sector satellite constellations today, lethal technologies are increasingly available to nonstate actors and individuals. At a time when states are focused on competition and potential conflict between great powers, the decentralization of today’s low-end technologies could equip nonstate actors, private companies, and terrorists with unprecedented irregular and asymmetric capabilities. In this episode, Professor Audrey Kurth Cronin and Major General Patrick B. Roberson join to discuss the history of technological innovation, examples of current and burgeoning technologies that will impact future warfare, and how governments can (and sometimes cannot) regulate the development and distribution of potentially dangerous technologies to malign actors.

Intro music: "Unsilenced" by Ketsa

Outro music: "Launch" by Ketsa

CC BY-NC-ND 4.0

Other Episodes

Episode

October 05, 2023 00:46:01
Episode Cover

The Prisoner's Dilemma: Hostage Diplomacy 101

Be sure to visit the Irregular Warfare Initiative website to see all of the new articles, podcast episodes, and other content the IWI team...

Listen

Episode

September 12, 2022 00:59:47
Episode Cover

Another Forgotten War: America’s Experience in Afghanistan

This episode contemplates lessons learned from America’s twenty years of war in Afghanistan. To do so, we're joined by Dr. Carter Malkasian, author of ...

Listen

Episode 0

December 03, 2021 00:40:52
Episode Cover

Learning from the Past, Anticipating the Future: Organizational Change in Irregular Warfare

hroughout history, IW organizations have undergone dramatic changes at all levels to meet the demands of new operating environments and threats. The book The...

Listen