注释

第一章 大师:从中国禅宗到第七感

1.著名的云门大师:“云门日日是好日”,摘自Thomas Cleary,The Blue Cliff Record: Zen Comments by Hakuin and Tenkei)(Boston: Shambhala, 1997), 39。南怀瑾大师思想的集成,摘自Diamond Sutra Explained (n.p.: Primordia Media, 2007)和To Realize Enlightenment: Practice of the Cultivation Path (York Beach, ME: Samuel Weiser, 1994)。

2.人类需要具备“第六感”:尼采在其著作《善恶之彼岸》(Beyond Good and Evil)中这样描述第六感:“历史感(或迅速评估一个民族、社会或个体赖以生存的评价位阶的能力,对种种评价之间的相互连接、对评价权威与有效力量的权威之间的关系之‘天赋直觉’):通过阶级与种族的民主融合,欧洲突然陷入迷人却疯狂的半野蛮状态,由此获得了一种历史感,欧洲人将这种历史感作为自己的特性——直到19世纪才将这种感知视为第六感。由于这一融合,过去的一切生活形式与方式、曾经并行或重叠的种种文化,照射进我们的‘现代灵魂’。这一刻,我们感知会流向四面八方,我们自己成为一种混沌。最终,如前文所述,‘精神’发现这一结果对它是有利的。”摘自Friedrich Nietzsche, Beyond Good and Evil: Prelude to a Philosophy of the Future, ed. Rolf-Peter Horstmann and Judith Norman, trans. Judith Norman, Cambridge Texts in the History of Philosophy (Cambridge: Cambridge University Press, 2002), 114。

3.“真相越深奥”:Friedrich Nietzsche,Beyond Good and Evil, trans. Walter Kaufmann (New York: Random House, 1966), 79.

4.“人类的习惯比其直觉转变更快”:J. B. S. Haldane, “Food Control in Insect Societies,”inPossible Worlds (Brunswick, NJ: Traction Publishers, 2002), 64.

5.身处千变万化的世界:Francois Jullien,The Silent Transfor- mations(London: Seagull Books, 2011), 70, and David L. Hall and Roger T. Ames,Thinking from the Han: Self, Truth, and Transcendence in Chinese and Western Culture(Albany: State University of New York Press, 1998), 150.

6.“始臣之解牛之时”:本章巧妙地化解了《庄子》不可译的问题,英译文摘自Burton Watson,The Complete Works of Chuang Tzu(New York: Columbia University Press, 1968)。

7.连锁装置,给予敌人致命打击:David Chandler,The Campaigns ofNapoleon(New York: Macmillan, 1974), 464.对于这场不同年龄将领思想差异巨大、实力悬殊战斗的探讨,摘自戴旭,“从文化层面反思大国军事兴衰”,载《解放军报》,2015年6月8日。

8.拿破仑这种超凡的洞察力被对手称作:Carl von Clausewitz,On War, ed. and trans. Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1984), 103.

9.工业化战争的时代:更多相关信息,参见Lars-Erik Cederman, T. Camber Warren,and Didier Sornette, “Testing Clausewitz: Nationalism, Mass Mobilization,and the Severity of War,” International Organization 65, no. 4 (October2011): 605–38。

  1. “1793年”:von Clausewitz,On War, 591.

  2. “发现这些定理没什么逻辑可言”:Albert Einstein,Essays in Science(New York: Philosophical Library, 1934), 4.

第二章 网络力量时代

1.一方是:William J. Baumol, Richard R. Nelson, and Edward N. Wolff,eds.,Convergence of Productivity: Cross-NationalStudies and Historical Evidence(New York: Oxford University Press, 1994).

2.这一方熟练:Joel Mokyr, “The European Enlightenment, theIndustrial Revolution, and Modern Economic Growth,”Max WeberLecture,European University, Yvorne, Switzerland, March 28, 2007.

3.网络可由地理、语言、货币、数据协议等众多特性界定:Albert-LászlóBarabási, Linked:How Everything IsConnectedto Everything Else and What It Means for Business, Science, and EverydayLife(New York: Basic Books, 2014); M. E. J. Newman,Networks: AnIntroduction (Oxford: Oxford University Press, 2010); Remco van der Hofstad,Random Graphs and Complex Networks(Eindhoven, the Netherlands:Eindhoven University of Technology, 2015); Alexander R. Galloway andEugene Thacker,The Exploit: A Theory of Networks (Minneapolis: Universityof Minnesota Press, 2007); and S. Boccaletti, V. Latora, Y. Moreno, et al., “Complex Networks: Structure and Dynamics,” Physics Reports424, no.4–5(February 2006): 175–308.

4.巨大的渴求:Brandon Fuller and Paul Romer, “Urbanization as Opportunity”(New York: Marron Institute Working Paper no. 1, 2014).

5.不断扩展、密布的网络:Manuel Castells,Communication Power(Oxford: Oxford University Press, 2009), and “A Network Theory ofPower,” International Journal of Communication 5 (2011): 773–87.

6.级联效应、急速蔓延效应和交互作用:Dirk Helbing, “Globally Networked Risks and How to Respond,” Nature497 (2013): 51–59.

7.研究网络的科学家:D. Achlioptas, R. M. D’Souza, and J. Spencer,“Explosive Percolation in Random Networks,” Science323 (2009): 1453–55.

8.恐怖主义不仅攻击实体建筑,同样也冲击着人们的心理防线:Anthony Richards,Conceptualizing Terrorism (Oxford: Oxford University Press, 2015).

9.来看看法国哲学家保罗·维利里奥的理论:Paul Virilio,Politics of the Very Worst: An Interview with Philippe Petit, e d. Sylvère Lotringer, trans. Michael Cavaliere (Los Angeles: Semiotext(e), 1999).

  1. “协议”:Alexander Galloway and Eugene Thacker, “Protocol, Control, and Networks,” Grey Room 17 (Fall 2004): 9.

11.伯南克在一篇分析“大萧条”的重要文章中总结道:Ben Bernanke and Harold James, “The Gold Standard, Deflation, and Financial Crisis in the Great Depression: An International Comparison,”inFinancial Markets and Financial Crises, ed. R. Glenn Hubbard (Chicago: University of Chicago Press, 1991), 34.

  1. “通货膨胀是经常出现且随处可见的货币现象”:MiltonFriedman, “The Counter-Revolutionin Monetary Theory,”IEA Occasional Paper 33 (London: Institute of Economic Affairs, 1970), 11.

  2. “我觉得可以这么说,6年前”:Lawrence H. Summers, “U.S. Economic Prospects: Secular Stagnation, Hysteresis, and the Zero Lower Bound”(Keynote address at NABE Policy Conference, February 24,2014),Business Economics49, no. 2 (2014): 65.

  3. “总司令官”:Carl von Clausewitz,On War, ed. and trans. Michael Howard and Peter Paret (Princeton, NJ: Princeton University Press, 1984), 110.

15.“我们要知道计算的自然属性”: Ludwig Wittgenstein, On Certainty, ed. G. E. M. Anscombe and G. H. von Wright, trans. Denis Pauland G. E. M. Anscombe (Oxford: Blackwell Publishing, 1969).

  1. “对克劳斯比来说”:Virginia Woolf,The Years(New York: Harcourt, Brace & Company, 1937), 216.

  2. “学会程序设计”:Joseph Weizenbaum,Computer Power andHuman Reason: From Judgment to Calculation(San Francisco: W. H. Freeman, 1976), 276.

  3. “要描述现代社会”:Bruno Latour, “On Actor-Network Theory: A Few Clarifications Plus More Than a Few Complications,” Soziale Welt47 (1996): 369–81.

19.计算机和网络:参见See “The Zettabyte Era: Trends andAnalysis,”a Cisco Systems white paper (2015), athttp://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networkingindex-vni/VNI_Hyperconnectivity_WP.pdf.

20.现在它们出现部分重叠,并相互沟通:Richard Mortier, Hamed Haddadi, Tristan Henderson, et al., “Human-DataInteraction: The Human Face of the Data-Driven Society,” Social Science Research Network(October 1, 2014).

21.工程师们把这种想法称为:Melvin E. Conway, “How Do Committees Invent?”Datamation14, no. 4 (April 1968): 28–31.

22.在现今相互关联的时代:Barbara van Schewick, “Founda- tions,”inInternet Architecture and Innovation(Cambridge, MA: MIT Press, 2010), 19–36.

  1. “当你决定一个工程中该用什么基础设施”: Paul Graham, “Great Hackers”(July 2004), on paulgraham.com, http://www.paulgraham.com/gh.html.

  2. “不同于一贯的想法”:Karl A. Wittfogel,Oriental Despotism: A Comparative Study of Total Power(New Haven, CT: Yale University Press, 1957).

  3. “还有比这更惨的悲剧吗”:F. A. Hayek, The Road to Serfdom (London: Routledge Classics, 2001), 5.

26.丘吉尔的名言:语出温斯顿·丘吉尔(Winston Churchill)1947年11月11日对英国下议院发表的演讲,详见http://hansard.millbanksystems.com/commons/1947/nov/11/parliament-bill。

第三章 战争、和平与网络

  1. “为之准备的战争”:Victor H. Krulak, “A New Kind of War,”inFirstto Fight: An Inside View of the U.S. Marine Corps(Annapolis, MD: Naval Institute Press, 1984), 179.

2.对于简易爆炸装置带来的威胁:Andrew Smith, Improvised Explosive Devices in Iraq, 2003–09:A Case of Operational Surprise and Institutional Response, Letort Papers (Carlisle, PA: Strategic Studies Institute, Army War College, April 2011), 9.

3.他问道:语出唐纳德·拉姆斯菲尔德(Donald Rumsfeld)2003年10月16日的一份备忘录,详见http://www.globalsecurity.org/jhtml/jframe.html及http://www.globalsecurity.org/military/library/policy/dod/d20031016sdmemo.pdf。

  1. “难道我们现在的状况”:同上。

5.某天一个巴格达人:Anne Stenersen, “ ‘Bomb-Making for Beginners’: Inside an Al-Qaeda E-Learning Course,” Perspectives on Terrorism7, no. 1 (2013).

6.当然,“基地”组织没有理工学院一样的地方:Matthew Bolton, “From Minefields to Minespace: An Archeology of the Changing Architecture of Autonomous Killing in US Army Field Manuals on Landmines, Booby Traps and IEDs,” Political Geography46 (May 2015): 47.7.截止到2011年:Stenersen, “ ‘Bomb-Making for Beginners.’ ”8.国防部组织了:有关简易爆炸装置联合对抗组织(JIEDDO)的成立及其背景,可参考下列文献:US House of Representatives Committee on Armed Services’Subcommittee on Oversight and Investigations, The Joint Improvised Explosive Device Defeat Organization: DOD’s Fight Against IEDs Today and Tomorrow (Washington, DC: US House of Representatives, 2008); “IEDs: The Home-Made Bombs That Changed Modern War,”Strategic Comments 18, no. 5 (2012); Lieutenant Colonel Richard F. Ellis, USA, Major Richard D. Rogers, USAF, and Lieutenant Commander Bryan M. Cochran, USN, “Joint Improvised Explosive Device Defeat Organization (JIEDDO): Tactical Successes Mired in Organizational Chaos; Roadblock in the Counter-IED Fight”(research report, Joint Forces Staff College, March 2007).9.圣诞节前几天: Thomas Jefferson and James Madison,The Republic of Letters: The Correspondence Between Thomas Jefferson and James Madison, 1776–1826, ed. James Morton Smith (New York: W. W. Norton,1995), 1:457–59.10.杰斐逊当时44岁:Thomas Jefferson,Jefferson Abroad, ed. Douglas L. Wilson (New York: Modern Library, 1999), 131 (letter to Madamede Tesse of March 20, 1787).11. “自由喧嚣的海洋”:Thomas Jefferson,The Papers of Thomas Jefferson, vol. 29,1 March 1796 to 31 December 1797(Princeton, NJ:

Princeton University Press, 2002), 81–83.

12.最终,全世界:John Maynard Keynes, from “The Economic Consequences of the Peace,”inThe Essential Keynes, ed. Robert Skidelsky(London: Penguin Books, 2015).

13.清醒的理论家可能:Herman Kahn,On Thermonuclear War (Princeton, NJ: Princeton University Press, 1960).

14.他曾调侃:Jules Jusserand, quoted in George C. Herring,From Colony to Superpower: U.S. Foreign Relations Since 1776(New York: Oxford University Press, 2008), 6.

  1. “你不得不活着”:George Orwell, 1984 (New York: Signet Classics, 1961), 3.

16.埃德蒙·伯克:Edmund Burke,The Works of the Right Hon. Edmund Burke, with a Biographical and Critical Introduction (London: Holds worth and Ball,1834), 1:498.

  1. “大战略”一词:对大战略问题的概述,可参考下列经典之作:B. H. Liddell Hart,Strategy: The Indirect Approach (London: Faber & Faber, 1967); Paul Kennedy, ed.,Grand Strategiesin War and Peace(New Haven, CT: Yale University Press, 1991); Edward N. Luttwak,Strategy: The Logic of War and Peace (Cambridge, MA: The Belknap Press of Harvard University Press, 1987); Peter Paret with GordonA. Craig and Felix Gilbert, eds.,Makers of Modern Strategy: From Machiavellito the Nuclear Age(Princeton, NJ: Princeton University Press,1986); and Sun Tzu,The Art of War, trans. Victor Mair (New York: Columbia University Press, 2007)。

  2. “在5个小时内”:Douglas MacArthur, Reminiscences (Annapolis, MD: Naval Institute Press, 1964), 354.

  3. “网络服务的迅速流行”:Luiz André Barroso and Urs Hölzle,The Datacenteras a Computer: An Introduction to the Design of Warehouse-Scale Machines (San Rafael, CA: Morgan & Claypool, 2009).

20.如果可行:Hal Brands,The Promise and Pitfalls of Grand Strategy(Carlisle, PA: Strategic Studies Institute, Army War College, August 2012); Jennifer Mitzen, “Illusion or Intention? Talking Grand Strategy into Existence,”Security Studies24, no. 1 (2015): 61–94.

21.中国军事战略家:刘亚洲, 《大国策》,详见http://www.aisixiang.com/data/2884.html。

22.第一种提出了:Joseph S. Nye Jr., “Get Smart: Combining Hard and Soft Power,” Foreign Affairs(July/August 2009).

23.对这一概念进行了明晰的总结:Jeffrey Goldberg, “Hillary Clinton: ‘Failure’to Help Syrian Rebels Led to the Rise of ISIS,” The Atlantic, August 10, 2014

  1. “我现在其实并不需要”:David Remnick, “Going the Distance: On and Off the Road with Barack Obama,” The New Yorker, January 27, 2014.

23.或者,就像温斯顿·丘吉尔:摘自温斯顿·丘吉尔(Winston Churchill)1941年10月29日在哈罗公学(Harrow School)发表的演讲,详见http://www.winstonchurchill.org/resources/speeches/2341941-1945-war-leader/103-never-give-in。

24.海军上将海曼·里科夫:Admiral H. G. Rickover, “Thoughts on Man’s Purpose in Life”(Morgenthau Memorial Lecture, 1982), at https://www.carnegiecouncil.org/publications/archive/morgenthau/763.html/_res/id=sa_File1/763_2ndMML-H.G.Rickover.pdf

25.他们解释道:Stephen G. Brooks, G. John Ikenberry, and William C.Wohlforth, “Don’t Come Home, America: The Case Against Retrenchment,”International Security 37, no. 3 (Winter 2012/13): 10.

26.的确,美国:Daniel Drezner, “Military Primacy Doesn’t Pay (AtLeast Not As Much As You Think),” International Security 38, no. 1 (Summer2013): 52.

  1. “为生存而抗争”:John Darwin,The Empire Project: The Rise and Fall of the British World-System 1830–1970 (Cambridge: Cambridge University Press, 2009), 477.

28.大国: Henry Kissinger, “The New World Order,”inDiplomacy(NewYork: Simon & Schuster, 1995), 17–28; Paul Kennedy,The Rise and Fall ofthe Great Powers: Economic Change and Military Conflict from 1500 to 2000 (New York: Random House, 1987).

29.它的架构:有关传染理论的主要观点,可参考Tony D. Sampson,Virality: Contagion Theory in the Age of Networks(Minneapolis: University of Minnesota Press, 2012)。

  1. “谁能想到”:Robert Hutchings and Jeremi Suri, eds., Foreign Policy Breakthroughs: Cases in Successful Diplomacy (Oxford: Oxford University Press, 2015), 1.

  2. “当人们生活的世界里”:Thomas Hobbes,Leviathan(Cambridge: Cambridge University Press, 2002), 88.

32.生物监测:构建网络战思想基础的书籍,参见John Arquilla and David Ronfeldt, eds.,Networks and Netwars: The Future of Terror, Crime, and Militancy(Santa Monica, CA: RAND Corporation,2001)。有关生物学领域问题的探讨,参见Eugene Thacker, “Living Dead Networks,” The Fibreculture Journal 4 (2005)。

33.汉尼拔对罗马的大举进攻:A. T. Mahan,The Influence of Sea Power upon History, 1660–1783 (Boston: Little, Brown, 1890), iv.

34.一名黑客:David Raymond et al., “A Control Measure Frame- work to Limit Collateral Damage and Propagation of Cyber Weapons,”in Karlis Podins, Jan Stinissen, and Markus Maybaum, eds.,5th International Conference in Cyber Conflict: Proceedings 2013(Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence Publications, 2013).

35.即使是现实世界最强大的:Daniel Geer, “Heartbleed as Metaphor,” Lawfare, April 21, 2014, at https://www.lawfareblog.com/heartbleed-metaphor.

36.当美国国家安全战略:US National Security Strategy, 2015, available athttp://nssarchive.us/national-security-strategy-2015/.

  1. 20世纪著名的政治现实主义理论学家:Hans Morgenthau, “The State of Political Science,”inPolitics in the Twentieth Century, vol. 1,The Decline of Democratic Politics (Chicago: University of Chicago Press, 1962).

38.恒河边的藤蔓植物:Peter Turchin, “A Theory for the Formation of Large Agrarian Empires,” Journal of Global History4 (2009): 191–217; Jean-Paul Rodrigue, Claude Comtois, and Brian Slack,The Geography ofTransport Systems(New York: Routledge, 2006), 10–15.

39.连接线:John Arquilla and Ryan Nomura, “Three Wars of Ideas About the Idea of War,” Comparative Strategy34, no. 2 (2015): 186.

40.网络武器:Mary Kaldor, “In Defence of New Wars,” Stability2, no. 1(2013): 1–16.

41.奥威尔的名言:George Orwell, “You and the Atom Bomb,”in SoniaOrwell and Ian Angus, eds.,The Collected Essays, Journalism, and Letters of George Orwell, vol. 4,In Front of Your Nose: 1946–1950 (Godine/Nonpareil, 2000), 7.

42.短期看来:John F. Padgett and Walter W. Powell, “The Problem of Emergence,”inThe Emergence of Organizations and Markets(Princeton, NJ: Princeton University Press, 2012), 2.

第四章 连接之门:网络力量的对立统一

  1. “威斯纳一来”:William Colby,Honorable Men: My Life in the CIA(New York: Simon and Schuster, 1978), 73.

2.人群蔓延至首都突尼斯:Mohamed Zayani,Networked Publics and Digital Contention: The Politics of Everyday Life in Tunisia (Oxford:Oxford University Press, 2015).

  1. “网络社会”:Manuel Castells,The Rise of the Network Society, vol. 1, 2nd ed.With a new preface of The Information Age: Economy, Society, and Culture(Chichester, UK: Wiley-Blackwell,2010), 508.

  2. “我们正见证”:Manuel Castells, “The Space of Autonomy: Cyberspaceand Urban Space in Networked Social Movements”(lecture, Harvard GraduateSchool of Design, February 18, 2014), at http://www.gsd.harvard.edu/#/media/lecture-manuel-castells-thespace-of-autonomy-cyberspac-and.html.

5.无论如何:Raquel Alvarez, David Garcia, Yamir Moreno, and FrankSchweitzer, “Sentiment Cascades in the 15M Movement,” EPJ Data Science 4, no. 6 (2015).

6.人们素未谋面:W. Lance Bennett and Alexandra Segerberg, “The Logic of Connective Action: Digital Media and the Personalization of Contentious Politics,” Information, Communication & Society 15, no. 5 (2012): 739–68.

7.英国央行高管:Andrew Haldane, “On Microscopes and Teles- copes”(lecture, Lorentz Centre workshop on socioeconomic com- plexity, Leiden, March 27, 2015), 20. Available athttp://www.bank ofengland.co.uk/publications/Documents/speeches/2015/speech812.pdf.

8.甚至在那些以美国标准来看技术“落后”的国家:Edwin Grohe, “The Cyber Dimensions of the Syrian Civil War: Implications for Future Conflict,” Comparative Strategy 34, no. 2(2015): 133–48.

9.我们将:See Venkatesh Rao, “The Amazing, Shrinking Org Chart,”Ribbonfarm, May 28, 2015, at http://www.ribbonfarm.com/2015/05/28/the-amazing-shrinking-org-chart/.

10.凯恩斯曾说过一句有关埃及的名言:John Maynard Keynes, from “The Economic Consequencesof the Peace,”in The Essential Keynes, ed. Robert Skidelsky (London: Penguin Books, 2015), 16.

11.商场、民主:David Murakami Wood and Stephen Graham, “Permeable Boundaries in the Software-SortedSociety: Surveillance and Differentiations of Mobility,”chap. 10 in MobileTechnologies of the City, ed. Mimi Sheller and John Urry (New York: Routledge, 2006), 177–91.

  1. “当我看到”:Preserved Smith,The Life and Letters of Martin Luther (Boston: Houghton Mifflin, 1911), 15.

  2. “启蒙运动”:Immanuel Kant, “An Answer to the Question: What Is Enlightenment?”inKant: Political Writings, ed. H. S. Reiss, trans. H. B. Nisbet, Cambridge Texts in the History of Political Thought (Cambridge: Cambridge University Press, 1991), 54.

  3. “知识”:Francis Bacon,The New Organoned. Lisa Jardine and Michael Silverthorne, Cambridge Texts in the History of Philosophy (Cambridge: Cambridge University Press, 2000), 33.

15.在“商业社会”:Adam Smith,The Wealth of Nationsed. Kathryn Sutherland, Oxford World’s Classics (Oxford: Oxford University Press, 2008), 31。

  1. “人类搭建的支撑结构”:Douglass C. North,Understanding the Process of Economic Change (Princeton, NJ: Princeton University Press, 2010), 48.

17.博物馆里总是挤满首次来参观的人;科学会议: Joel Mokyr,“The Intellectual Origins of Modern Economic Growth,”Journal of Economic History 65, no. 2 (June 2005): 290.

  1. “所有确定不变的关系”:Karl Marx, Frederick Engels,Economic and Philosophic Manuscripts of 1844 and the Communist Manifestotrans. Martin Milligan (Amherst, NY: Prometheus Books, 1988), 212.

19.“希特勒的命数已定”:Winston Churchill,The Second World War, vol 3.The Grand Alliance (New York: Houghton Mifflin, 1950), 539.

20.或者,我们逆向思考一下:Roberta Wohlstetter,Pearl Harbor: Warning and Decision (Stanford, CA: Stanford University Press, 1962), 350.

  1. “社会结构”:John F. Padgett, Walter W. Powell, “The Problem of Emergence,”inThe Emergence of Organizations and Markets (Princeton, NJ: Princeton University Press, 2012), 8.

22.这样一来,我父亲的诊断:I. Akyildiz, M. Pierobon, S. Balasubramaniam, Yevgeni Koucheryavy, “The Internet of Bio-Nano Things,”IEEE Communications Magazine 53, no. 3 (March 2015): 32–40.

23.计算机科学的开拓者:David Bawden, Lyn Robinson, “Waiting for Carnot: Information and Complexity,”Journal of the Association for Information Science and Technology 66, no. 11 (November 2015): 2177–86; Norbert Wiener,Cybernetics; or, Control and Communication in the Animal and the Machine (New York: John Wiley and Sons, 1948); Warren Weaver, “Science and Complexity,”American Scientist 36, no.4 (October 1948): 536–44.

24.井然有序:Carlos Gershenson、Péter Csermely、Péter Érdi, “The Past, Present and Future of Cybernetics and Systems Research,”arXiv:1308.6317v3,2013年9月23日。

第五章 渔网:连接的复杂性

  1. “军事机构的首要目的”:Bernard Brodie, “The Weapon: War in the Atomic Age and Implications for Military Policy,”in Bernard Brodie, ed.,The Absolute Weapon: Atomic Power and World Order (New York: Harcourt, Brace & Company, 1946), 76.

  2. “当时”:对于互联网设计是否旨在生存、其他的系统需求(例如,将研究机构连接起来)是否导致了分布式架构的出现,这类问题讨论众多,可参见Barry M. Leiner, Vinton G. Cerf et.al, “A Brief History of the Internet,”ACM SIGCOMM Computer Communication Review 39, no. 5 (October 2009): 22–31。但原始资料清晰地展现了巴兰思想的演进,为巴兰及兰德公司众多人员意欲解决的问题之起源提供了文献证据。其他人完成了分组交换模式,但巴兰的设计明显源于他一直在考虑的安全问题,相关信息参见“Oral History: Paul Baran,”an interview conducted by David Hochfelder for the Institute of Electrical and Electronics Engineers History Center, October 24,1999, at http://ethw.org/Oral-History:Paul_Baran; Paul Baran, “On Distributed Communications: I; Introduction to Distributed Communications Networks”和“On Distributed Communi- cations: XI; Summary Overview,”United States Air Force Project RAND (August 1964).

3.而现在:Richard Harper, Tom Rodden, Yvonne Rogers, Abigail Sellen, eds.,Being Human: Human-Computer Interaction in the Year 2020 (Cambridge: Microsoft Research, Ltd., 2008).

4.这个现在司空见惯的魔法:Chris Mack, “The Multiple Lives of Moore’s Law: Why Gordon Moore’s Grand Prediction Has Endured for 50 Years,”IEEE Spectrum(March 30, 2015), http://spectrum.ieee.org/semiconductors/processors/the-multiple-lives-of-moores-law.

5.“人类关键的利益系统”:John Holland, “Complex Adaptive Systems,”Daedalus 121, no. 1 (Winter 1992): 17.

6.雨林也是: Simon A. Levin,Fragile Dominion: Complexity and the Commons (Reading, MA: Perseus Books, 1999).

  1. “complex(复杂)”这个词: Carlos Gershenson, “The Implica- tions of Interactions for Science and Philosoph,”Foundations of Science18, no.4 (2013): 781–90.

  2. “宏观模型”:Jean-ClaudeTrichet, “Reflections on the Nature of Monetary Policy Non-Standard Measures and Finance Theory”(speech, European Central Bank Central Banking Conference, Frankfurt, November 18, 2010), at https://www.ecb.europa.eu/press/key/date/2010/html/sp101118 .en.html.

9.这种被抛弃的感觉:Michele Catanzaro and Mark Buchanan, “Network Opportunity,” Nature Physics 9 (March 2013): 121–22,或者Cesar A. Hidalgo, “Disconnected! The Parallel Streams of Network Literature inthe Natural and Social Sciences,”arXiv:1511.03981, November 12, 2015.

10.很久以前:S. Barry Cooper, Jan van Leeuwen,eds.,Alan Turing: His Work and Impact (Waltham, MA: Elsevier, 2013).

11.因为一切最终都被简化为:参见谷歌总裁埃里克·施密特(Eric Schmidt)与丹尼·沙利文(Danny Sullivan)2006年8月9日在搜索引擎战略会议上的对话,详见http://www.google.com/press/ podium/ses2006.html。

12.具有简易可编程性:Gershenson, The Implications of Interactions for Science and Philosophy, 4.

13.连接到一个不断进化的系统中:Paul Dourish,Where the Action Is: The Foundations of Embodied Interaction (Cambridge, MA: MIT Press, 2001), 4.

14.这不是求平均值的游戏:Natalie Wolchover, “Treading Softly in a Connected World,”Quanta Magazine, March 18, 2013.

15.复杂系统的破坏力:Sergey V. Buldyrev, Roni Parshani, Gerald Paul, etal.,“Catastrophic Cascade of Failures in Interdependent Networks,”Nature 464 (April 15, 2010): 1025–28.

16.实际上: Paul Phister, “Cyberspace: The Ultimate Complex Adaptive System,”The International C2 Journal4, no. 2 (2010–2011).

17.复杂性和不可预测性:兰迪·舒普(Randy Shoup)2015年7月14日在伦敦发表的演讲“规模化服务架构:谷歌和eBay的经验”,详见http://www.infoq.com/presentations/service-arch-scalegoogle-ebay。

18.这种力量是势不可挡的:Caitríona H. Heinl,“Artificial (Intelligent) Agents and Active Cyber Defence: Policy Implications,”Pascal Brangetto、Markus Maybaum、Jan Stinissen,eds,6th International Conference on Cyber Conflict: Proceedings 2014 (Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence Publications, 2014), 60.

  1. “许多生物学和社会学理论”:Carlos Gershenson, Péter Csermely, Péter Érdi, Helena Knyazeva, Alexander Laszlo, “The Past, Present and Future of Cybernetics and Systems Research,”arXiv:1308.6317v3, September 23, 2013, 2–4.

第六章 黑客帝国:连接产生的危机

  1. “电话公司”:Ron Rosenbaum, “Secrets of the Little Blue Box,”Esquire, October 1971,120.

  2. “稳健做事”:Jon Postel,DOD Standard Transmission Control Protocol (Marina del Rey, CA: Information Sciences Institute, University of Southern California, 1980).

  3. “开发工程师”:Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, etal., “ ‘Weird Machine’Patterns,”chap. 13 in Cyberpat- terns: Unifying Design Patterns with Security and Attack Patterns, ed. Clive Blackwell and HongZhu (Cham, Switzerland: Springer International Publishing, 2014), 13.

4.再打开:有关米开朗琪罗程序的讨论,参见Encyclopedia of Computer Science, 4th ed., Anthony Ralston, Edwin D. Reilly, and David Hemmendinger (Chichester,UK: John Wiley and Sons, Ltd., 2003), 1839–41。

5.三条计算机安全的黄金法则:这三条法则或许更多地只是一种传言,但普遍认为出自莫里斯。可参见Li Gong, Gary Ellison, and MaryDageforde,Inside Java 2 Platform Security: Architecture,API Design, and Implementation, 2nd ed. (Boston: Addison-Wesley Professional, 2003), 1。

6.情报组织:Felix “FX”Lindner and Sandro Gaycken, “Back to Basics: Beyond Network Hygiene,”in Best Practices in Computer Network Defense:Incident Detection and Response, ed. Melissa E. Hathaway (Amsterdam, the Netherlands: IOS Press, 2014), 54.

7.包括潜入机器内部:Julian Bangert, Sergey Bratus, Rebecca Shapiro, and Sean W. Smith, “The Page-Fault Weird Machine: Lessons in Instruction-less Computation,”presented at the 7th USENIX Workshop on Offensive Technologies (Washington, DC, August 13, 2013), athttps://www.usenix.org/conference/woot13/workshop-program/presentation/bangert.

8.正如美国国家安全局数字情报部门负责人罗伯特·乔伊斯:“Disrupting Nation State Hackers,”speech delivered January 27, 2016, at https://www.usenix.org/conference/enigma2016/conference-program/presentation/joyce.

  1. “你不能完全了解”:摘自丽贝卡·夏皮罗、谢尔盖·布拉图斯、肖恩·史密斯于2013年8月13日在美国华盛顿特区第七届USENIX攻击技术研讨会上的陈述“ ‘Weird Machines’in ELF: A Spotlight on the Underappreciated Metadata”,详见https://www.usenix.org/conference/woot13/workshop-program/presentation/shapiro。

10.这种即时、高级别、完全受信任的准入权:Sergey Bratus, Julian Bangert, Alexandar Gabrovsky, et al., “Composition Patterns of Hacking,”Cyberpatterns 2012: Proceedings of the First International Workshop on Cyberpatterns; Unifying Design Patterns with Security, Attack and Forensic Patterns), at http://tech.brookes.ac.uk/CyberPatterns2012/Cyberpatterns2012Proceedings.pdf。

11.就算是最好的程序员:有关计算机代码如何转为自我攻击的实例,参见Sergey Bratus, Michael E. Locasto, Meredith L. Patterson, et al., “Exploit Programming: From Buffer Overflows to ‘Weird Machines’and Theory of Computation,”login: 36, no. 6 (December 2011): 13–21。此文为纪念语言安全(LangSec)的主要思想者朗·萨斯曼(Len Sassman),他于2011年去世,网络上有许多他的讲话,从哲学与技术角度对现代计算机系统进行思考,反映出他将哲学融入技术的非凡创见。此外,也可参见Shapiro, Bratus, Smith, “ ‘Weird Machines’in ELF”, at http://0b4af6cdc2f0c5998459c0245c5c937c5dedcca3f1764ecc9b2f.r43.cf2.rackcdn.com/12059woot13-shapiro.pdf。

12.发布后的两天内:Leyla Bilge, Dumitras, “Before We Knew It: An Empirical Study of Zero-Day Attacks in the Real World,”CCS’12: Proceedings of the 2012 ACM Conference on Computer and Communica- tions Security)(October 2012): 833–44。

  1. 2014年:Mark Seaborn, Thomas Dullien, “Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges,”Project Zero (Google blog), March 9, 2015.http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html.

  2. “紧急缺陷和攻击的基础”:Nathaniel W. Husted, “Analysis Techniques for Exploring Emergent Vulnerabilities and Attacks on Mobile Devices”(PhDthesis, Indiana University, 2013), at http://www.cs.indiana.edu/~nhusted/docs/proposal.pdf.

15.在这一破解过程的录像中:有关破解过程的描述,参见Mordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici, “BitWhisper: Covert Signaling Channel Between Air-Gapped Computers Using Thermal Manipulations”,arXiv:1503.07919 [cs.CR], March 26, 2015.

16.李政勋:Lucian Constantin, “Chrome, Firefox, Explorer, Safari Were All Hacked at Pwn 2 Own Contest,”PC World, March 20, 2015.

17.这也是意料之外的风险和“突现不良行为”的机会: Jeffrey C. Mogul, “Emergent (Mis)behavior vs. Complex Software Systems,”ACM SIGOPS Operating Systems Review—Proceedings of the 2006 EuroSys Conference)40, no. 4 (October 2006): 295.

  1. “我们不是军事历史、教义或哲学方面的专家”:Stephen Cobb and Andrew Lee, “Malware Is Called Malicious for a Reason: The Risks of Weaponizing Code,”in 6th International Conference on Cyber Conflict: Proceedings 2014, ed. Pascal Brangetto, Markus Maybaum, and Jan Stinissen (Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence Publications, 2014), 71–82. And“Stuxnet: Tsunami of Stupid or Evil Genius?” (June 1, 2012) by Ali-Reza Anghaie at http://infosecisland.com/blogview/21507-Stuxnet-Tsunami-of-Stupid-or-EvilGenius.html.

19.是什么成就了一座城市:Colin McFarlane, “The Geographies of Urban Density: Topology, Politics, and the City,”Progress in Human Geography (October 7, 2015): 2.

20.这些可能性:Lindner, Gaycken, “Back to Basics: Beyond Network Hygiene”, 58.

21.“反复阅读”:Napoleon I, “The Military Maxims of Napoleon,” inRoots of Strategy: The 5 Greatest Military Classics of All Time, ed. Brigadier General Thomas R. Phillips (Mechanicsburg, PA: Stackpole Books, 1985), 432.

  1. “依赖性越大”:The Critical Engineering Working Group (Bengt Sjölén, Julian Oliver, and Danya Vasiliev), “The Critical Engineering Manifesto,” at https://criticalengineering.org/.

23.我们在考量:“Interview with Adrian Mackenzie andTheo Vurdubakis on Code and Crisis,” supplement, Theory, Culture & Society 28, no. 6 (November 2011), January 24, 2012.

  1. “就像每一场纵酒狂欢”:Halvar Flake [Thomas Dullien], “Why Johnny Can’t Tell If He Is Compromised” (speech, Area 41 security conference, Zurich, June 2, 2014).

25.而这并不仅仅是单身的青少年黑客:Wael Khalifa, Kenneth Revett, and Abdel-Badeeh Salem, “In the Hacker’s Eye: The Neuro- physiology of a ComputerHacker,” in Global Security, Safety and Sustainability & e-Democracy, Lecture Notes of the Institute for Computer Sciences, Social Informaticsand Telecommunications Engineering (Berlin: Springer Verlag, 2012),112–19.

  1. “惊讶地意识到这一点”:摘自托马斯·杜林于2014年4月8日在挪威奥斯陆国际信息系统审计协会北欧会议上发表的演讲“攻击与上瘾:为何攻击难以抑制”(Offensive Work and Addiction: Why Offense Is Hard to Contain)。

  2. “我记得互联网”:摘自2014年劳拉·珀特阿斯导演的电影《第四公民》(Citizenfour)中对斯诺登(Snowden)的采访。

28.他们将了解、设计:Nikos Virvilis, Dimitris Gritzalis, Theodoros Apostolopoulos, “Trusted Computing vs. Advanced Persistent Threats: Can a Defender Win This Game?”,Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing)(Washington, DC: IEEE Computer Society, 2013), 396–403.

29.历史上最强大的朝代:Peter Turchin, “A Theory for the Form- ation of Large Agrarian Empires,”Journal of Global History4 (2009): 3.

第七章 “新阶层”:拥有第七感的群体诞生

  1. 1965年: Joseph Weizenbaum,Computer Power and Human Reason: From Judgment to Calculation (San Francisco: W. H. Freeman, 1976), 7.

2.回顾了欧洲:David Priestland,Merchant, Soldier, Sage: A History of the World in Three Castes (New York: Penguin Press, 2013).

3.施乐帕克研究中心:梅振家于2012年8月1日在《福布斯领导力博客》(Forbes Leadership Blog)上发表的文章“市场领导者所忽略的施乐帕克中心启示”(The Lesson That Market Leaders Are Failing to Learn from Xerox PARC),详见http://www.forbes.com/sites/ chunkamui/2012/08/01/the-lesson-that-market-leaders-are-failing-tolearn-from-xerox-parc/。

4.任何时候,当你看到一个网络系统:摘自“关键工程学工作小组”,其成员包括Bengt Sjölén、Julian Oliver、Danya Vasiliev,“关键工程学宣言”(The Critical Engineering Manifesto),详见https://criticalengineering.org/。有关编码与现实世界的关系,参见布雷特·维特2012年1月20日在加拿大魁北克省蒙特利尔举办的加拿大大学软件工程大会上的演讲“依据原则进行创造”(Inventing on Principle),演讲视频见https://www.youtube.com/watch ?v=PUv66718DII。

  1. “早期的跨洲际旅行家”:Peter Sloterdijk,In the World Interior of Capital: Towards a Philosophical Theory of Globalization, trans. Wieland Hoban (Cambridge: Polity Press, 2013), 77.

  2. “在构建机器学习系统”:摘自吴恩达于2015年3月19日在加利福尼亚州圣何塞举办的图形处理器技术大会上的演讲“深度学习的未来”(Deep Learning: What’s Next)。

7.法国哲学家布鲁诺·拉图尔:Bruno Latour, “On Technical Mediation—Philosophy, Sociology, Genealogy,”Common Knowledge3, no. 2 (Fall 1994): 37.

8.蕴含着巨大的可能性:Ryan Gallagher, “Profiled: From Radio to Porn,British Spies Track Web Users’Online Identities,”The Intercept, September 25, 2015; GCHQ documents,“PullThrough Steering Group Meeting#16,”at https://theintercept.com/document/2015/09/25/pullsteering-group-minutes/.

  1. “我们并没有意识到”:John Maynard Keynes, “My Early Beliefs,”Two Memoirs by J. M. Keynes: “Dr. Melchior, a Defeated Enemy,” and “My Early Beliefs” (New York: A. M. Kelley, 1949), 99.

第八章 空前的强度:空间与时间的压缩

  1. “人类文明正在”:Stewart Brand,The Clock of the Long Now: Time and Responsibility (New York: Basic Books, 1999), 2.

2.“‘夏日’‘午后’”:Edith Wharton,A Backward Glance)(New York: D. Appleton-Century, 1934),第八章中讲述了她与亨利·詹姆斯(Henry James)共度一个午后的故事。

  1. “城市街道纵横交错”:Georg Simmel, The Metropolis and Mental Life (1903),The Sociology of Georg Simmeltrans., ed., and intro by Kurt H. Wolff (New York: The Free Press, 1950), 410, 413.

  2. “城市,就像人一样,能够通过步伐辨认”:Robert Musil,The Man Without Qualities trans. Sophie Wilkins and Burton Pike (New York: Vintage, 1996), 1:3.

5.观察到的完全不同:西澳洲佛学会阿姜布拉姆(Ajahn Brahm)法师在其开示中,讲过这样一个精彩的故事:一天,他决定不像往常一样乘车去往位于澳大利亚珀斯的禅院,改为步行前往。一路上,大自然的美妙感觉环绕在他周围,这是坐在车里所无法感受到的。他指出,要改变自己的视角,一个办法就是改变生活中前行的速度。有关阿姜布拉姆法师开示的目录,参见西澳洲佛学会网站。

  1. “语言”:George Boole,An Investigation of the Laws of Thought: On Which Are Founded the Mathematical Theories of Logic and Probabilities, (1854; repr., New York: Dover Publications, 1951).

7.“不仅仅是一个表达思想的媒介”:Paul Virilio,The Information Bomb, trans. Chris Turner (London: Verso Books, 2000), 141。

  1. “在将来的某一天,也许”:William Daniel Hillis, “The Connection Machine”(PhD diss., MIT, 1985), 2.

9.还加上了这么一句:同上,19。

10.开的是:波·布朗森(Po Bronson)于1998年5月1日在科技新闻网站Wired发表的文章“长今:与丹尼·希利斯的时间之旅”(The Long Now: Time-Traveling with Danny Hillis)。

  1. 65岁的费曼:W. Daniel Hillis, “Richard Feynman and the Connection Machine,”Physics Today)42, no. 2 (February 1989): 78.

  2. “有时候”:Michael J. Black,review of The Connection Machine, by W. Daniel Hillis,AI Magazine7, no. 3 (1986): 169.

13.解决问题:摘自亚当·比贝格(Adam Beberg)于2008年4月30日在斯坦福大学计算机系统学术报告会上的讲座“分布式系统:与100万个朋友同时计算”(Distributed Systems: Computation with a Million Friends),watch?v=7zafB2GkMBk。讲座视频见https://www.youtube.com/

  1. “美国边疆”:Frederick Jackson Turner, “The Significance of the Frontier in American History,”The Annual Report of the American Historical Association)(1894): 119–227.

15.有一种专门的说法:贾内尔将这一过程定义为“时空收敛”(space-time convergence),后地理学家大卫·哈维将其改名为“时空压缩”(space-time compression),现今普遍采用“时空压缩”这一说法。Space-Time Constructs for Linking Information and Communication Technologies with Issues in Sustainable Transportation,Transport Reviews)24, no. 6 (December 2004): 665–77.

16.十足的速度:John Armitage, ed., The Virilio Dictionary (Edinburgh: Edinburgh University Press, 2013).

17.从某种程度上说,位置:Jon May and Nigel Thrift, “Introduction,”inTime space: Geographies of Temporality, eds. Jon May and Nigel Thrift, Critical Geographies (London: Routledge, 2001), 2.

18.网络世界的地图:Vice Admiral Thomas Rowden, Rear Admiral Peter Gumataotao, Rear Admiral Peter Fanta,“‘Distributed Lethality’”Proceedings141, no. 1 (January 2015): 343.

  1. “被黑客攻击”:Halvar Flake [Thomas Dullien], “Why Johnny Can’t Tell If He Is Compromised”(2014).

20.遇到传统的冲突:Derek Gregory, “The Everywhere War,” TheGeographical Journal177, no. 3 (September 2011): 238–50.

21.他称之为:Donald G. Janelle, Spatial Reorganization: A Model and Concept,Annals of the Association of American Geographers59, no. 2 (1969): 348–64.

22.亚当·斯密:Adam Smith,The Theory of Moral Sentimentsed. Knud Haakonssen (Cambridge: Cambridge University Press, 2002), 198.

  1. “时间就像一部车”:Stewart Brand,The Clock of the Long Now,67.

24.德国哲学家:Monika Codourey, “Mobile Identities and the Socio-Spatial Relations of Air Travel,”Surveillance & Society)5, no. 2 (2008): 188–202.

  1. “只有强大的国家”:Nicholas John Spykman, “Frontiers, Security, and International Organization,”Geographical Review32, no. 3 (July 1942): 439.

26.“没有司法平等”:Giambattista Vico,The New Science of Giambattista Vico: Translated from the Third Edition (1744) by Thomas Goddard Bergin and Max Harold Fisch(Ithaca, NY: Cornell University Press, 1948).

  1. “与找不到”:Marina Keegan, “The Opposite of Loneliness,”YaleDaily News, May 27, 2012, at http://yaledailynews.com/blog/2012/05/27/keegan-the-opposite-of-loneliness/.

28.还根本没人听说过:Edwin Grohe, “The Cyber Dimensions of the Syrian Civil War: Implications for Future Conflict,”Comparative Strategy 34, no.2 (2015): 133–48.

29.一旦持续几个小时:David Moore, Colleen Shannon, and claffy, “Code-Red: A Case Study on the Spread and Victims of an Internet Worm,”Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (2002): 273–84.

30.在1988年11月2日和3日:Ted Eisenberg, David Gries, Juris Hartmanis, et al., “The Cornell Commission: On Morris and the Worm,” Communications of the ACM 32, no. 6 (June 1989): 706.

31.莫里斯蠕虫真实地演绎了:Alfred W. Crosby,America’s Forgotten Pandemic: The Influenza of 1918, 2nd ed. (Cambridge: Cambridge University Press, 2003), xiii.

32.该病毒被隔离起来差不多一年后:Frederick B. Cohen,A Short Course on Computer Viruses (Pittsburgh, PA: ASP Press, 1990).

  1. “计算机病毒严重威胁计算机完整性的特性”:Fred Cohen, “Friendly Contagion: Harnessing the Subtle Power of Computer Viruses,”The Sciences31, no. 5 (September–October 1991): 23。

34.尤金·斯帕福德:Eugene H. Spafford, “Three Letters on Computer Securityand Society”(Department of Computer Science Technical Reports, Purdue University, 1991).

第九章 门里门外:新时代的权力分布

1.“我们已经失去了美洲”:David Johnson,Imagining the Cape Colony: History, Literature, and the South African Nation (Edinburgh: Edinburgh University Press, 2012), 67.

2.“鉴于地球面积有限”:Vindex (F. Verschoyle),Cecil Rhodes: His Political Life and Speeches, 1881–1900 (London: Chapman and Hall, 1900), 7.

  1. “您的意思已经全部传达给了首领”:Copies and Extracts of Further Correspondence Relating to Affairs in Mashonaland, Matabeleland, and the Bechuanaland Protectorate (London: Her Majesty’s Stationery Office, November 1893);参见助理专员帕拉佩(Assistant Commissioner Palapye)发给高级专员的电报,开普敦,13。

  2. “一旦英国人”:Vindex,Cecil Rhodes, 191–92。

  3. “女王陛下”:Copies and Extracts of Further Correspondence Relating to Affairs in Mashonaland, Matabeleland, and the Bechuanal and Protectorate,76.

  4. “设使别国有人贩至英国”:Ssu-yu Teng, John K. Fairbank,China’s Response to the West: A Documentary Survey, 1839–1923 (Cambridge MA: Harvard University Press, 1979), 26.

  5. “无论发生什么”:Hilaire Belloc, Basil Temple Blackwood,The Modern Traveller (London: Edward Arnold, 1898), 41.

8.“第一次世界大战爆发前的数十年里”:Stephen Van Evera, “The Cult of the Offensive and the Origins of the First World War,”International Security)9, no. 1 (Summer 1984): 58.

  1. “你们一脸坦然”:Siegfried Sassoon, “Suicide in the Trenches,”War Poems of Siegfried Sassoon(Mineola, NY: Dover Publications, 2004), 64.

10.“把化学”:John Ellis,The Social History of the Machine Gun (New York: Pantheon, 1975), 33.

11.而米洛斯人:Thucydides,The Peloponnesian War, trans. Steven Lattimore (Indianapolis: Hackett Publishing, 1998),第五章;另参见英国广播公司(BBC)制作的节目“没有尽头的战争”(The War That Never Ends),其中包含与修昔底德相关的一些元素,节目视频详见https://www.youtube.com/watch?v=SNcJ79qPIg8。

12.马克斯·韦伯:Max Weber, The Essential Weber: A Reader, ed. Sam Whimster (London: Routledge, 2004), 355.

  1. “传统文学”:Karine Barzilai-Nahon, “Fuzziness of Inclusion/Exclusion in Networks,”International Journal of Communication5 (2011): 757–58; “Toward a Theory of Network Gatekeeping: A Framework for Exploring Information Control,”Journal of the American Society for Information Science and Technology 59, no. 9 (July 2008): 1493–1512.

  2. “我们对市场和商业如何运转的认识”:W. Brian Arthur, Increasing Returns and the New World of Business,Harvard Business Review, July–August 1996.

15.赢者通吃:Remco van der Hofstad, Random Graphs and Complex Networks(Eindhoven, the Netherlands: Eindhoven University of Technology, 2015), at http://www.win.tue.nl/~rhofstad/NotesRGCN .pdf, 24.

16.“10天内7个朋友”:Chamath Palihapitiya, “How We Put Facebookon the Path to 1 Billion Users”(lecture for the Udemy course “Growth Hacking: An Introduction,”published January 9, 2013, and available at https://www.youtube.com/watch?v=raIUQP71SBU).

17.不出多久:Eman Yasser Daraghmi, Shyan-Ming Yuan, “We Are So Close, Less Than 4 Degrees Separating You and Me!”,Computers in Human Behavior 30 (January 2014), 273–85.

18.数据科学家们:Laurent Hébert-Dufresne et al. “Complex Networks as anEmerging Property of Hierarchical Preferential Attachment,” Physical Review92, 062809 (2015).

19.但其中还蕴含另一个奥秘:Albert-László Barabási, “Network Science,”Philosophical Transactions of the Royal Society A: Mathema- tical, Physical, and Engineering Sciences 371, no. 1987 (March 2013).

20.网络科学家:Rahul Tongia, Ernest J. Wilson III, “The Flip Side of Metcalfe’s Law: Multiple and Growing Costs of Network Exclusion,”International Journal of Communication 5 (2011): 665–81.

21.共有51处国家间围墙:Ron E. Hassner, Jason Wittenberg, “Barriers to Entry: Who Builds Fortified Boundaries and Why,”International Security 40, no. 1 (Summer 2015): 157–90.

  1. “未来20年的某一时间,很可能会”:Bill Gates, “The Next Epidemic—Lessons from Ebola,”New England Journal of Medicine)372 (April 9, 2015): 1381–84.

23.基本调节机制:摘自本·伯南克于2004年3月2日在弗吉尼亚州列克星敦华盛顿与李大学“亨利·帕克·威利斯经济政策讲座”上发表的演讲“货币、黄金与大萧条”(Money, Gold, and the Great Depression)。

  1. “任何事物都可以成为门”:Felix “FX”Lindner and Sandro Gaycken, “Back to Basics:Beyond Network Hygiene,”in Best Practices in Computer Network Defense: Incident Detection and Response, ed. Melissa E. Hathaway (Amsterdam, the Netherlands: IOS Press, 2014), 55–56.

第十章 严守门户:破旧立新的未来时代

  1. “当今的美国,没有生存威胁”:James Dobbins et al., Choices for America in a Turbulent World (Santa Monica, CA: RAND Corporation,2015), xiv. For a discussion of the nature of security and values, see Arnold Wolfers,“‘National Security’as an Ambiguous Symbol,” Political Science Quarterly67, no. 4 (December 1952): 485.

  2. “每一个新的时代”:Carl Schmitt,Nomos of the Earth in the International Law of the Just Publicum Europaeum (New York: Telos Press, 2006), 45.

  3. “那些门户”:引言摘自Robert Jervis, “Cooperation Under the Security Dilemma,” World Politics30, no. 2 (January 1978): 169。

4.严守门户,呼应了:有关大战略何以具有实际作用的探讨,摘自Hal Brands,The Promise and Pitfalls of Grand Strategy(Carlisle, PA: Strategic Studies Institute, Army War College, August 2012);Edward Luttwak,The Grand Strategy of the Roman Empire: From the First Century A.D. to the Third(Baltimore: The Johns Hopkins University Press, 1976)。

5.事实上,它们特定的设计:István A. Kovács, Albert-László Ba ra bá si, “Ne t wo r k S cien ce: De s t ru c tion P er fe c te d,”Na tu re 524 (August 6, 2015): 38–39;Manlio De Domenico, Albert Solé-Ribalta, Elisa Omodei, et al., “Ranking in Interconnected Multilayer Networks Reveals Versatile Nodes,”Nature Communications 6 (April 23, 2015).

6.美国对今天的军备控制太自鸣得意了:Stephen J. Cimballa, Roger N. McDermott, “A New Cold War? Missile Defenses, Nuclear Arms Reductions and Cyber War,” Comparative Strategy34, no. 1 (2015): 95–111.

7.劳埃德·乔治那样的帝国精神:Margaret MacMillan,Paris 1919: Six Months That Changed the World (New York: Random House, 2002), 381.

8.科学家:John Maynard Smith, Eörs Szathmáry,The Major Transitions in Evolution (Oxford: Oxford University Press, 1995).

  1. “共同进化”:Matjaz Perc, Attila Szolnoki, “Coevolutionary Games—A Mini Review,”BioSystems 99 (2010): 109–25.

10.促成各种进化的基本特征:Nathalie Mezza-Garcia, Tom Froe se, Nelson Fernández, “Reflections on the Complexity of Ancient Social Heterarchies: Toward New Models of Social Self-Organization in Pre-Hispanic Colombia,”Journal of Sociocy bernetics 12 (2014): 3–17。

第十一章 公民:唤醒第七感!

  1. “机器会思考吗”:A. M. Turing, “Computing Machinery and Intelligence,”Mind 59, no. 236 (October 1950): 433.

2.人工智能系统设计者:罗杰·格罗斯)于2013年2月4日在哈佛名为“构建智能随机系统”(Building Intelligent Probabilistic Systems)的博客上发表的文章《预测学习与表征学习》。

3.这样难道不好么:安德烈·卡帕西(Andrej Karpathy)于2015年5月21日在名为“神经网络黑客入门”(The Hacker’s Guide to Neural Networks)的博客上发表的文章《循环神经网络不可思议的有效性》(The Unreasonable Effectiveness of Recurrent Neural Networks)。John Supko, “How I Taught My Computer to Write Its Own Music,”Nautilus21 (February 12, 2015);丹尼尔·约翰逊(Daniel Johnson)2015年8月3日在Hexahedria博客上发表的文章《利用循环神经网络作曲》(Composing Music with Recurrent Neural Networks)。

  1. “人类无需为人工智能编程”:菲利普·格林斯彭(Philip Greenspun)于2015年11月21日在其个人博客上发表的文章《大数据与机器学习》(Big Data and Machine Learning)。

  2. 1993年春:1993年3月30-31日在美国俄亥俄州西湖市召开、由美国国家航空与航天局刘易斯研究中心与俄亥俄航空航天研究所共同主办的专题研讨会论文集《21世纪图景:网络空间时代的跨学科科学与工程》。

  3. “30年内”:同上,12。

7.想象一台超级智能机器:Nick Bostrom, “Ethical Issues in AdvancedArtificial Intelligence,”inCognitive, Emotive and Ethical Aspects of Decision Making in Humans and in AI, vol. 2, ed. Iva Smit et al. (Windsor, ON: International Institute for Advanced Studies in Systems Research and Cybernetics, 2003), 12–17, and Nick Bostrom, “The Super intelligent Will: Motivation and Instrumental Rationality in Advanced Artificial Agents,”Minds and Machines, 22, no. 2 (2012): 71–85.

8.这个问题大概是:塞思·格里姆斯(Seth Grimes)于2015年10月8日在《突破分析》(Breakthrough Analysis)博客上发表的文章《语言使用、客户个性与客户体验流程》(Language Use, Customer Personality, and the Customer Journey)(施乐Xerox全球创新领导者Scott Nowson访谈录)。

  1. “让我出去吧!”:Stuart Armstrong, Anders Sandberg, Nick Bostrom, “Thinking Inside the Box: Controlling and Using an Oracle AI,”Minds and Machines 22, no. 4 (November 2012): 299–324.

  2. “人类提出”:Michael Vassar, “Re: AI Boxing (dogs and helicopters),”SL4.org, August 2, 2005, at http://sl4.org/archive/0508/ 11817.html.

11.因此,我们需要问自己:Kaj Sotala, Roman V. Yampolskiy, “Responses to Catastrophic AGI Risk: A Survey,”Physica Scripta)90 (2015).

  1. “我反复思考”:Plato, Epistle VII, inThe Platonic Epistles, trans. J. Harward (1932; repr., Cambridge: Cambridge University Press, 2014).

13.等着我们:Caitríona H. Heinl, “Artificial (Intelligent) Agents and Active Cyber Defence: Policy Implications,”in6th International Conference on Cyber Conflict:Proceedings 2014, ed. Pascal Brangetto, Markus Maybaum, and Jan Stinissen (Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence Publications, 2014), 53.