Dynamite to Drones: The Diffusion of Lethal Technology to Terrorists and Insurgents

April 08, 2022 00:48:29
Dynamite to Drones: The Diffusion of Lethal Technology to Terrorists and Insurgents
Irregular Warfare Podcast
Dynamite to Drones: The Diffusion of Lethal Technology to Terrorists and Insurgents

Apr 08 2022 | 00:48:29

/

Show Notes

From dynamite in the early twentieth century to drones, bioweapons, and private-sector satellite constellations today, lethal technologies are increasingly available to nonstate actors and individuals. At a time when states are focused on competition and potential conflict between great powers, the decentralization of today’s low-end technologies could equip nonstate actors, private companies, and terrorists with unprecedented irregular and asymmetric capabilities. In this episode, Professor Audrey Kurth Cronin and Major General Patrick B. Roberson join to discuss the history of technological innovation, examples of current and burgeoning technologies that will impact future warfare, and how governments can (and sometimes cannot) regulate the development and distribution of potentially dangerous technologies to malign actors.

Intro music: "Unsilenced" by Ketsa

Outro music: "Launch" by Ketsa

CC BY-NC-ND 4.0

Other Episodes

Episode

April 22, 2022 00:44:56
Episode Cover

Digital Terrorists: Policy and Practice in the Online Counterterrorism Fight

In this episode, we consider how extremists of all types have exploited maneuver space online, and what this means for efforts to counter violent...

Listen

Episode

July 14, 2023 00:52:45
Episode Cover

Treating or Feeding the Disease? Elite Capture of the Security Sector

Be sure to visit the Irregular Warfare Initiative website to see all of the new articles, podcast episodes, and other content the IWI team...

Listen

Episode

February 10, 2023 00:49:08
Episode Cover

Seizing the Digital Initiative: Zero Trust and Persistence in the Cyber Domain

Subscribe to the IWI monthly newsletter by going to www.irregularwarfare.org! This episode explores the concepts of zero trust and persistence theory within the cyber...

Listen