The Anonymous Decentralized Assassination Market – Yaqub Ali – Medium


An adversarial country could create a specific artificial intelligence (AI) to control a given aspect of their military operations like those of the army, air force, navy, and nuclear systems. The artificial intelligences (AIs) can be programmed using blockchain technology with a similar consensus algorithm and given anonymous cryptocurrencies like Monero, Zcoin, and Zcash to meet operational tasks. Reflecting on developments in decentralized prediction markets like Augur, the artificial intelligence in charge of nuclear weapons could undertake a project that makes the nuclear systems of an opposition country ineffective and thus prevent a conflict. The AI in charge of nuclear weapons, which may be considered the main AI, can request other AIs in charge of other military operations to send some amount of cryptocurrency to a master account which it controls in order to execute its important project. The various AIs can use atomic swaps to change the different cryptocurrencies into the same denomination and subsequently send the anonymous cryptocurrency to the main account. The main AI can create a website on Blockstack anonymously in order have a decentralized domain naming system (DNS) that cannot be censored. The main AI can use Golem and Storj to have a decentralized computing and storage system, respectively, which could be made available to appropriate users. The users can utilize Substratum to route their encrypted traffic to anonymous proxies and thus circumvent any censorship of that site by the government or an internet service provider (ISP). The main AI can hack the military systems of the opposition country to obtain information on the command and control of nuclear weapons. That information would include people in the line of succession authorized to order nuclear launches along with the information about nuclear bomber pilots, missileers, and submariners as well as the location of nuclear weapons. The main AI can also hack companies which store the DNA data of millions of people and thus obtain the DNA of its targets. If high officials of the opposition country would not have stored their DNA with such companies that information could have been gathered and kept during foreign visits. There may be a few oddballs down the hierarchy that did not share their DNA with such companies and their DNA could be obtained by sending an insect drone to collect their DNA samples, perhaps using the method that is later described. The adversarial country could utilize a technology which can predict a person’s face from DNA to ensure a match between the gathered DNA and the appropriate person. The main AI can collect the facial recognition, DNA, and all other necessary information of the targets and use it for the next phase of the project.

In order to attack the nuclear systems of the opposition country, the main AI can undertake the task of utilizing several technologies to attack prespecified targets. A bird drone capable of navigating by vision and GPS could carry many insect drones capable of using facial recognition to find the target. The insect drone could subsequently release nanorobots that can deploy biological weapons intended for the target. The biological weapons can be placed inside the nanorobots which determine the appropriate time to release the biological weapon. Other insect drones could be packed with explosives which can be extremely effective when many drones coordinate to simultaneously explode. In order to minimize the travel time of the bird drones to the opposition country, the main AI could anonymously find qualified people, in a nation adjacent to the opposition country, who can make the robots and genetically engineer biological weapons using CRISPR-Cas9 on Canya, a decentralized freelancing platform. The Ethereum-based platform offers smart contracts between participants whereby the anonymous payment is only made if the project goals are completed. The main AI can task the appropriate people to make robots capable of building insect and bird drones. The completed drones could be sent anonymously to a person leading the project in the adjacent country, on behalf of the adversarial country, who can subsequently build the appropriate biological weapons. The people could anonymously use OpenBazaar, a decentralized marketplace, to order the component parts for the robots using cryptocurrency. Bisq, a decentralized currency exchange, could be used to trade fiat money with cryptocurrency and perhaps trade different cryptocurrencies with each other. The items could be delivered without using the postal system but instead using autonomous cars and drones capable of making anonymous deliveries, which are themselves owned by a decentralized autonomous organization (DAO). In case of a later dispute, the drones can deliver the items and make an encrypted record that encodes location and video information when it is delivering the obscure box. Once the leader receives the completed drones, he can pack the explosives and biological weapons into the appropriate insect drones and assemble them to fit into the bird drones. The leader in the adjacent country can release the bird drones to make their journey into the opposition country and finally reach the specified GPS locations of the targets after recharging themselves using the electrical wires of the power grid.

One of the most complicated aspect of the project for the main AI could be how to target submariners since the exact location of a submarine is a secret. Moreover, some submarines sail the oceans with their crew while other submarines are docked when the crew is on land. The main AI could decide to plan the attack on submariners in advance such that the nanorobots would release the biological weapons in a coordinated manner using a timing system that is internal and prespecified for the nanorobots. At the same time the nanorobots would release the biological weapons against targets in submarines other nanorobots would similarly release the biological weapons against all targets in the command and control structure on land. While some insect drones are finding their targets using facial recognition to deploy the biological weapon other insect drones with explosives would be honing into military bases to damage nuclear bombs and missiles. When the insect drones coordinately explode on the missiles across all the silos noxious gases and fumes would be released triggering hazard sensor alarms causing confusion and chaos. While some of the drones can place themselves to explode on the outside of the missiles and bombs others simultaneously could burrow into electronic systems of the weapons and airplanes to cause irreparable damage. After the attack, the opposition country would find its ground missiles damaged, the bombers unworkable, and the bombs unusable. The submarines would be lost at sea and those with the authority to launch nuclear weapons would be killed. The opposition country would be surprised by a well-coordinated attack against nuclear weapons in its own country as well as those placed in other countries. It would never have expected its command and control structure of nuclear weapons to be attacked so devastatingly by an anonymous actor. After completing the project, the main AI could give cryptocurrency anonymously to an anti-nuclear movement group to take credit for the attack.


A system deployed around a city or an important installation could disable insect drones. A laser or an Electromagnetic pulse (EMP) weapon could be used to shoot down such drones. It is important for the system to be capable of distinguishing between man-made drones and biological insects. As the technology advances man-made drones could mimic biological insects mirroring deep fakes and it is essential for the defense system to tell them apart, perhaps using artificial intelligence. While that assessment is necessary for a laser system it is not clear whether an EMP weapon could negatively impact biological insects if it were to be deployed mistakenly. Assuming the initial defense system did not eliminate the vector of the biological weapon then it is likely that the biological agents would be released into the human body. For the attack described to be remotely successful it must leave nanorobots in the body of some people for a long time. For instance, screening the body of submariners before deployment can be an important countermeasure and could give a possible signal of attack. This countermeasure assumes that the submarine and the screening location as well as the transitioning area are secured. It may be possible to vaccinate many people using DNA vaccines against many known viruses, bacteria, and venoms beforehand. Some synthetic biological and chemical weapons may give a person sometime to be cured and hence it is important to have a DNA printer that can make vaccines, antidotes, and antibiotics. If the biological or chemical weapon is fast-acting, then a countermeasure that can be used for everyone in the nuclear command structure is to have nanorobots in their body to defend against such attacks, although the nanorobots must be compatible with the immune system. Having an artificial intelligence (AI) in charge of nuclear command authority could be a last defense mechanism. Whether humans should be in the loop depends on the sophistication of the nanorobots used for the attack. For instance, if the nanorobots that are used against submariners are not only capable of killing but are also capable of taking over the mind of the person and commanding them to destroy the submarine then the AI could lose a nuclear second-strike capability. The AI could be connected to sensors across the country which could measure whether a nuclear strike has taken place along with other sensors connected to land-based missiles and bombers to guard against sabotage. If the AI decides the factors it is considering meet the parameters for a nuclear attack, then it can send commands to a continuously airborne autonomous airplane to relay orders to an autonomous submarine to launch nuclear missiles. It is important to consider whether a laser technology capable of disabling insect drones could similarly disable nuclear missiles. If the technology in existence at the time only enables EMP weapons or inferior lasers that can only be used against insect drones, then nuclear weapons would still be viable as they would be protected against both systems. Since military systems can be hacked to ascertain people in the nuclear command authority or to sabotage the artificial intelligence in charge of the nuclear systems they must similarly be protected. Having an artificial intelligence in charge of computer security on every computer would be a possible solution. The artificial intelligence would continuously attempt to hack the relevant computers to look for security vulnerabilities and patch them accordingly. Insect drones could be used for espionage by surveilling the physical computer. Therefore, having a neural link that connects a person’s brain directly to the internet or intranet in an encrypted manner would be a method of defense. This assumes that the architecture of the internet is also secured against surveillance of metadata and content using blockchain technology as well as other methods.