Rethinking Dual-Use Technology


Article by Artur Kluz and Stefaan Verhulst: “A new concept of “triple use” — where technology serves commercial, defense, and peacebuilding purposes — may offer a breakthrough solution for founders, investors and society to explore….

As a result of the resurgence of geopolitical tensions, the debate about the applications of dual-use technology is intensifying. The core issue founders, tech entrepreneurs, venture capitalists (VCs), and limited partner investors (LPs) are examining is whether commercial technologies should increasingly be re-used for military purposes. Traditionally, the majority of  investors (including limited partners) have prohibited dual-use tech in their agreements. However, the rapidly growing dual-use market, with its substantial addressable size and growth potential, is compelling all stakeholders to reconsider this stance. The pressure for innovations, capital returns and Return On Investment (ROI) is driving the need for a solution. 

These discussions are fraught with moral complexity, but they also present an opportunity to rethink the dual-use paradigm and foster investment in technologies aimed at supporting peace. A new concept of “triple use”— where technology serves commercial, defense, and peacebuilding purposes — may offer an innovative and more positive avenue for founders, investors and society to explore. This additional re-use, which remains in an incipient state, is increasingly being referred to as PeaceTech. By integrating terms dedicated to PeaceTech in new and existing investment and LP agreements, tech companies, founders and venture capital investors can be also required to apply their technology for peacebuilding purposes. This approach can expand the applications of emerging technologies to also include conflict prevention, reconstruction or any humanitarian aspects.

However, current efforts to use technologies for peacebuilding are impeded by various obstacles, including a lack of awareness within the tech sector and among investors, limited commercial interest, disparities in technical capacity, privacy concerns, international relations and political complexities. In the below we examine some of these challenges, while also exploring certain avenues for overcoming them — including approaching technologies for peace as a “triple use” application. We will especially try to identify examples of how tech companies, tech entrepreneurs, accelerators, and tech investors including VCs and LPs can commercially benefit and support “triple use” technologies. Ultimately, we argue, the vast potential — largely untapped — of “triple use” technologies calls for a new wave of tech ecosystem transformation and public and private investments as well as the development of a new field of research…(More)”.

Searching for Safer, Healthier Digital Spaces


Report by Search for Common Ground (Search): “… has specialized in approaches that leverage media such as radio and television to reach target audiences. In recent years, the organization has been more intentional about digital and online spaces, delving deeper into the realm of digital peacebuilding. Search has since implemented a number of digital peacebuilding projects.

Search wanted to understand if and how its initiatives were able to catalyze constructive agency among social media users, away from a space of apathy, self-doubt, or fear to incite inclusion, belonging, empathy, mutual understanding, and trust. This report examines these hypotheses using primary data from former and current participants in Search’s digital peacebuilding initiatives…(More)”

The tools of global spycraft have changed


The Economist: “A few years ago intelligence analysts observed that internet-connected CCTV cameras in Taiwan and South Korea were inexplicably talking to vital parts of the Indian power grid. The strange connection turned out to be a deliberately circuitous route by which Chinese spies were communicating with malware they had previously buried deep inside crucial parts of the Indian grid (presumably to enable future sabotage). The analysts spotted it because they were scanning the internet to look for “command and control” (c2) nodes—such as cameras—that hackers use as stepping stones to their victims.

The attack was not revealed by an Indian or Western intelligence agency, but by Recorded Future, a firm in Somerville, Massachusetts. Christopher Ahlberg, its boss, claims the company has knowledge of more c2 nodes than anyone in the world. “We use that to bust Chinese and Russian intel operations constantly.” It also has billions of stolen log-in details found on the dark web (a hard-to-access part of the internet) and collects millions of images daily. “We know every UK company, every Chinese company, every Indian company,” says Mr Ahlberg.  Recorded Future has 1,700 clients in 75 countries, including 47 governments.

The Chinese intrusion and its discovery were a microcosm of modern intelligence. The internet, and devices connected to it, is everywhere, offering opportunities galore for surveillance, entrapment and covert operations. The entities monitoring it, and acting on it, are often private firms, not government agencies…(More)” See Special Issue on Watching the Watchers

Exploring Visitor Density Trends in Rest Areas Through Google Maps Data and Data Mining


Paper by Marita Prasetyani, R. Rizal Isnanto and Catur Edi Widodo: “Rest areas play a vital role in ensuring the safety and comfort of travelers. This study examines the visitor density at the toll and non-toll rest areas using data mining techniques applied to Google Maps Places data. By utilizing extensive information from Google Maps, the research aims to uncover patterns and trends in visitor behavior and pinpoint peak usage times. The findings can guide improved planning and management of rest areas, thereby enhancing the overall travel experience for road users and further research to determine the location of the new rest area.Understanding patterns or trends in visitor density at rest areas involves analyzing the time of day, location, and other factors influencing the density level. Understanding these trends can provide essential insights for rest area management, infrastructure planning, and the establishment of new rest areas.Data from Google Maps provides an invaluable source of real-time and historical information, enabling accurate and in-depth analysis of visitor behavior.Data mining helps identify relationships not immediately apparent in the data, providing a deeper understanding and supporting data-driven decision-making…(More)”.

The Behavioral Scientists Working Toward a More Peaceful World


Interview by Heather Graci: “…Nation-level data doesn’t help us understand community-level conflict. Without understanding community-level conflict, it becomes much harder to design policies to prevent it.

Cikara: “So much of the data that we have is at the level of the nation, when our effects are all happening at very local levels. You see these reports that say, “In Germany, 14 percent of the population is immigrants.” It doesn’t matter at the national level, because they’re not distributed evenly across the geography. That means that some communities are going to be at greater risk for conflict than others. But that sort of local variation and sensitivity to it, at least heretofore, has really been missing from the conversation on the research side. Even when you’re in the same place, in the same country within the same state, the same canton, there can still be a ton of variation from neighborhood to neighborhood. 

“The other thing that we know matters a lot is not just the diversity of these neighborhoods but the segregation of them. It turns out that these kinds of prejudices and violence are less likely to break out in those places where it’s both diverse and people are interdigitated with how they live. So it’s not just the numbers, it’s also the spatial organization. 

“For example, in Singapore, because so much of the real estate is state-owned, they make it so that people who are coming from different countries can’t cluster together because they assign them to live separate from one another in order to prevent these sorts of enclaves. All these structural and meta-level organizational features have really, really important inputs for intergroup dynamics and psychology.”..(More)”.

Unmasking and Quantifying Power Structures: How Network Analysis Enhances Peace and State-Building Efforts


Blog by Issa Luna Pla: “Critiques of peace and state-building efforts have pointed out the inadequate grasp of the origins of conflict, political unrest, and the intricate dynamics of criminal and illicit networks (Holt and Bouch, 2009Cockayne and Lupel, 2011). This limited understanding has failed to sufficiently weaken their economic and political influence or effectively curb their activities and objectives. A recent study highlights that although punitive approaches may have temporarily diminished the power of these networks, the absence of robust analytical tools has made it difficult to assess the enduring impact of these strategies.

1. Application of Network Analytics in State-Building

The importance of analytics in international peace and state-building operations is becoming increasingly recognized (O’Brien, 2010Gnanguenon, 2021Rød et al., 2023). Analytics, particularly network analysis, plays a crucial role in dissecting and dismantling complex power structures that often undermine peace initiatives and governance reforms. This analytical approach is crucial for revealing and disrupting the entrenched networks that sustain ongoing conflicts or obstruct peace processes. From the experiences in Guatemala, three significant lessons have been learned regarding the need for analytics for regional and thematic priorities in such operations (Waxenecker, 2019). These insights are vital for understanding how to tailor analytical strategies to address specific challenges in conflict-affected areas.

  1. The effectiveness of the International Commission CICIG in dismantling criminal networks was constrained by its lack of advanced analytical tools. This limitation prevented a deeper exploration of the conflicts’ roots and hindered the assessment of the long-term impacts of its strategies. While the CICIG had a systematic approach to understanding criminal networks from a contextual and legal perspective, its action plans lacked comprehensive statistic analytics methodologies, leading to missed opportunities in targeting key strategic players within these networks. High-level arrests were based on available evidence and charges that prosecutors could substantiate, rather than a strategic analysis of actors’ roles and influences within the networks’ dynamics.
  2. Furthermore, the extent of network dismantlement and the lasting effects of imprisonment and financial control of the illicit groups’ assets remain unclear, highlighting the need for predictive analytics to anticipate conflicts and sustainability. Such tools could enable operations to forecast potential disruptions or stability, allowing for data-driven proactive measures to prevent violence or bolster peace.
  3. Lastly, insights derived from network analysis suggest that efforts should focus on enhancing diplomatic negotiations, promoting economic development and social capital, and balancing punitive measures with strategic interventions. By understanding the dynamics and modeling group behavior in conflict zones, negotiations can be better informed by a deep and holistic comprehension of the underlying power structures and motivations. This approach could also help in forecasting recidivism, assessing risks of network reorganization, and evaluating the potential for increased armament, workforce, or empowerment, thereby facilitating more effective and sustainable peacebuilding initiatives.

2. Advancing Legal and Institutional Reforms

Utilizing data sciences in conflicted environments offers unique insights into the behavior of illicit networks and their interactions within the public and private sectors (Morselli et al., 2007Leuprecht and Hall, 2014Campedelli et al., 2019). This systematic approach, grounded in the analysis of years of illicit activities in Guatemala, highlights the necessity of rethinking traditional legal and institutional frameworks…(More)”.

The Future of Peacebuilding: Why Investing in PeaceTech is Essential in Today’s Geopolitics


Article by Artur Kluz and Stefaan Verhulst: “In today’s geopolitical landscape, marked by escalating tensions and technological advancements, there is a significant opportunity for technology to contribute to conflict prevention and peacebuilding: i.e. peacetech. Secretary of State Antony Blinken, in his recent speech on Technology and the Transformation of US Foreign Policy, emphasized the crucial role technology plays in geopolitical contests and its potential as an “engine of historic possibility — for our economies, for our democracies, for our people, for our planet.” His assertion that “security, stability, prosperity — they are no longer solely analog matters” underscores the necessity to urgently focus on and invest in technological innovations that can support peacebuilding in the digital age.

Peacetech is an emerging field that describes a range of technologies that can be used for peacebuilding. From satellite internet constellations and early warning systems to AI-driven conflict prediction models, peacetech has the potential to transform the landscape of peacekeeping and conflict prevention. With its diversity of applications, it can support institutions’ peacebuilding or conflict prevention activities by providing insights faster and at scale. It can empower local populations to promote their safety and security and help observers predict future conflict…(More)”.

AI-enabled Peacekeeping Tech for the Digital Age


Springwise: “There are countless organisations and government agencies working to resolve conflicts around the globe, but they often lack the tools to know if they are making the right decisions. Project Didi is developing those technological tools – helping peacemakers plan appropriately and understand the impact of their actions in real time.

Project Didi Co-founder and CCO Gabe Freund explained to Springwise that the project uses machine learning, big data, and AI to analyse conflicts and “establish a new standard for best practice when it comes to decision-making in the world of peacebuilding.”

In essence, the company is attempting to analyse the many factors that are involved in conflict in order to identify a ‘ripe moment’ when both parties will be willing to negotiate for peace. The tools can track the impact and effect of all actors across a conflict. This allows them to identify and create connections between organisations and people who are doing similar work, amplifying their effects…(More)” See also: Project Didi (Kluz Prize)

Lethal AI weapons are here: how can we control them?


Article by David Adam: “The development of lethal autonomous weapons (LAWs), including AI-equipped drones, is on the rise. The US Department of Defense, for example, has earmarked US$1 billion so far for its Replicator programme, which aims to build a fleet of small, weaponized autonomous vehicles. Experimental submarines, tanks and ships have been made that use AI to pilot themselves and shoot. Commercially available drones can use AI image recognition to zero in on targets and blow them up. LAWs do not need AI to operate, but the technology adds speed, specificity and the ability to evade defences. Some observers fear a future in which swarms of cheap AI drones could be dispatched by any faction to take out a specific person, using facial recognition.

Warfare is a relatively simple application for AI. “The technical capability for a system to find a human being and kill them is much easier than to develop a self-driving car. It’s a graduate-student project,” says Stuart Russell, a computer scientist at the University of California, Berkeley, and a prominent campaigner against AI weapons. He helped to produce a viral 2017 video called Slaughterbots that highlighted the possible risks.

The emergence of AI on the battlefield has spurred debate among researchers, legal experts and ethicists. Some argue that AI-assisted weapons could be more accurate than human-guided ones, potentially reducing both collateral damage — such as civilian casualties and damage to residential areas — and the numbers of soldiers killed and maimed, while helping vulnerable nations and groups to defend themselves. Others emphasize that autonomous weapons could make catastrophic mistakes. And many observers have overarching ethical concerns about passing targeting decisions to an algorithm…(More)”

Limiting Data Broker Sales in the Name of U.S. National Security: Questions on Substance and Messaging


Article by Peter Swire and Samm Sacks: “A new executive order issued today contains multiple provisions, most notably limiting bulk sales of personal data to “countries of concern.” The order has admirable national security goals but quite possibly would be ineffective and may be counterproductive. There are serious questions about both the substance and the messaging of the order. 

The new order combines two attractive targets for policy action. First, in this era of bipartisan concern about China, the new order would regulate transactions specifically with “countries of concern,” notably China, but also others such as Iran and North Korea. A key rationale for the order is to prevent China from amassing sensitive information about Americans, for use in tracking and potentially manipulating military personnel, government officials, or anyone else of interest to the Chinese regime. 

Second, the order targets bulk sales, to countries of concern, of sensitive personal information by data brokers, such as genomic, biometric, and precise geolocation data. The large and growing data broker industry has come under well-deserved bipartisan scrutiny for privacy risks. Congress has held hearings and considered bills to regulate such brokers. California has created a data broker registry and last fall passed the Delete Act to enable individuals to require deletion of their personal data. In January, the Federal Trade Commission issued an order prohibiting data broker Outlogic from sharing or selling sensitive geolocation data, finding that the company had acted without customer consent, in an unfair and deceptive manner. In light of these bipartisan concerns, a new order targeting both China and data brokers has a nearly irresistible political logic.

Accurate assessment of the new order, however, requires an understanding of this order as part of a much bigger departure from the traditional U.S. support for free and open flows of data across borders. Recently, in part for national security reasons, the U.S. has withdrawn its traditional support in the World Trade Organization (WTO) for free and open data flows, and the Department of Commerce has announced a proposed rule, in the name of national security, that would regulate U.S.-based cloud providers when selling to foreign countries, including for purposes of training artificial intelligence (AI) models. We are concerned that these initiatives may not sufficiently account for the national security advantages of the long-standing U.S. position and may have negative effects on the U.S. economy.

Despite the attractiveness of the regulatory targets—data brokers and countries of concern—U.S. policymakers should be cautious as they implement this order and the other current policy changes. As discussed below, there are some possible privacy advances as data brokers have to become more careful in their sales of data, but a better path would be to ensure broader privacy and cybersecurity safeguards to better protect data and critical infrastructure systems from sophisticated cyberattacks from China and elsewhere…(More)”.