There is an 鈥渋ncredible ability for people to network themselves,鈥 enabled by an information revolution that 鈥渋s so rapid that I think it鈥檚 even more frightening than we realize,鈥 Hicks says.
The use of Twitter in the Middle East, for example, has illustrated 鈥渉ow powerful 鈥 often for the good 鈥 the technology is,鈥 she adds. 鈥淲hat we don鈥檛 really know exactly yet is how it could be leveraged in ways that challenge us.鈥
Hicks recalls that she and her colleagues used to pass one another news stories about the different uses of unmanned aerial vehicles (UAVs), from a proprietor delivering burritos to a man in San Francisco proposing to his fianc茅e.
While the uses were innocent, it got them thinking about the militarization of technology.
It鈥檚 possible to imagine urban environments where US troops are sent into battle against adversaries able to tweet the location of US soldiers they see, or use unmanned systems to broadcast movements. Another scenario: loading small, cheap drones with munitions to use against the troops.
鈥淲e鈥檝e spent a tremendous amount of money developing [UAV] technology, and we鈥檝e done it in a way to make sure it鈥檚 secure and that it can鈥檛 be easily corrupted,鈥 Hicks says. But that could "put our forces at risk in a way we have assumed they wouldn鈥檛 be.鈥