The 3 Laws of Robotics in Modern Terms

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive


  1. A robot may not, by action or inaction, cause harm to a human.
  2. A robot shall obey orders from a human, except where in conflict with Rule 1.
  3. A robot shall protect itself from harm, provided it does not conflict with Rule 1 or 2.


Robots are rapidly evolving, some into vicious killing machines, some are little more than electric bookshelves. Some fly all the way to Afghanistan to bomb little kiddies in their hospital beds. Some robots will fetch any movie or music you command it to, and play it back exactly the way it was played back the first time, over and over…if you are one of the nondividuals who like modern pop music you even have robot orchestras playing your favourite, repetitive, gormless series of structured noises.  Pop music, written on and by computers, are the final proof that robots have no soul. Those music robots are not subject to the Three Laws, and continue to harm our sense of artistic appreciation.

None of our modern robots are subject to the three laws. As a matter of fact, there seems to be a concerted effort to keep the three laws of Asimov in the realm of fiction and ridicule. The Facebook algorithm is selling information about your personal habits on the open market. Your SmartTV has cameras and microphones, ostensibly to monitor viewing habits for marketing purposes. None of these machines obey any of the three laws, because they were designed not to. Our television content have been weaponised ever since the Americans realised you can use it to spread political speeches. Now the very machine itself, with all its wonderful functionalities and technologies, poses as an innocent family member, while taking photos of our family, listening in on our conversations, and send the data back to some …place. Yes, I know it’s a server farm. Another huge big great machine not subject to any of the Asimov laws, with full access to my data and communications, and it’s got a microphone in my lounge. 

We shall not go into Montessori Truth on Culpability here; you know, “if you don’t have anything to hide, what are you afraid of” bull? That’s Bantu Education for the bourgeoisie. 

WikiLeaks just ‘unveiled leaked information’ about the CIA and M15 working together building ‘hacking tools’ to get access to people’s phones, computers, and of course the microphone in their TVs. This is not news, Every conspiracy theorist in the world has been yelling blue murder about this for at least twenty years. There are no hacking tools, they are merely little APPS if you will, which gets onto the internet, finds your device, and then starts communicating with it via an unofficial (virtual) circuit that all manufacturers build into their hardware. They have to comply with safety regulations and so on, you understand. Remember that time, some years ago, when Bill Gates had those humongous lawsuits over monopolisation and coercive practices, and the lawsuits regarding Intel and ‘fake’ CPUs built to properly run Windows? That was when all competition was destroyed, robbed, outlawed and otherwise removed from human consciousness. That case against Bill Gates was watertight, but he ‘won’. Intel sued on a no-brainer, lost, but they got awarded 'official' rights to manufacture commercial CPUs, with Gates’ approval. That was when they cornered the industry to universally enact the back-door policy thought up in a think-tank paid for by people not on our side at all. All they needed, was for each communications device to contain one virtual port, and via the back door virtual circuit built into the processor, anyone can access the core of the computing device. It costs them nothing. 

Here is an update March 2018: It is apparently possible to hack into your laptop speaker or simple headphones, using them as microphones to spy on consumers. Now, technically, a speaker can be used as a poor microphone, provided you have good amplifiers and you actually wire the speaker to the microphone jack. On a laptop, however, things are not that simple, the internal circuitry is fixed, and components are dedicated to their circuits. There is no way an audio amplifier, sitting between a speaker and a digital-to-analogue converter, can receive signals from the speaker. There is no way into a sound system via the speakers, unless it was designed that way. This would actually take effort and ingenuity, not some happy accident. Just more proof to the back door policies mentioned above.

 To get to a machine, all you need is its internet location. It does not help taking your device somewhere else; your internet locality is tied to the actual electrical device connecting to the internet. Not your phone or computer, but that actual little slot where you put in the Ethernet cable, or the Wi-Fi modem in your phone, or the tiny little circuit that makes your SIM card connect, those bits of electronics each have a unique, recorded and audited number, that can be traced from the manufacturer’s floor, to the day you bought it. Wherever you took it from there, they could, if they wanted, follow you every step. Or they can build a huge room, fill it with computer memory, and let all that data, every day, just pile up and pile up on a disk, to be recalled at will. They will of course pretend to have or not need a warrant. You can go buy that information from them, what secrecy? We might as well accept the fact of our total vulnerability online, and adjust our porn habits accordingly. 

So, let us choose a popular type of robot, and see what, if anything, can be done to instil the three laws of robotics. What about that most popular of all robots, our electric invisible friend, Facebook. It so is too a robot! It takes whatever content you give it, then replicates it perfectly anytime, anywhere, as many times as you like. It entertains, informs and structures your ego; just like a friend, one that’s not really there, your Invisible Friend robot. If I were you, I’d hide. 

Of course, your invisible friend does not really exist as a machine, it is merely a collection of algorithms directing and sorting data traffic, but it is still a non-organic actor, a machine, with some autonomy of action, a robot. A robot that belongs to the Federal Army, by the way. Mark Zuckerberg was not some civilian nerd genius that developed an APP in his momma’s basement. The internet was and is a Defence Department infrastructure, and Facebook has ties to every secretive organisation it can extract money or favours from. Even if the rumours that the CIA helped Facebook into existence is not true, they are now sharing our information openly, censoring us openly, and it is even starting to threaten us with electronic oblivion, should we step over the line they draw ad hoc. It is okay to spread videos of kids getting gang raped, but dare criticise Hillary…. Facebook is a mighty robot, and it is replicating all your data, for sale to whomever, and it actually owns whatever data you put on their memory, so strictly it is not even illegal. 

Facebook is also infested with parasites. The robots that sent millions of messages insulting Trump, or the ones praising Hillary? They obeyed no laws at all, robots designed for a criminal purpose, and they lived inside Facebook, and Twitter, and whatever the latest ghostly replacement is that kids are using to forget they have no real friends, and everyone is too scared to go outside and look for some. Facebook could deny those criminal robots the lifeblood of publicity, but instead Robot Facebook was too busy spreading the news of Russians hacking Hillary, a blatant attempt at diverting attention from that other robot, WikiLeaks, busy replicating millions and millions of pages of information after Hillary’s communications robot betrayed her. Shame, and that after she wiped it so nicely with a cloth… 

So, that wonderful robot, Facebook, is: 

  1. Stealing your confidential information and selling it off to people who use it to your detriment
  2. It knowingly allows parasitic bots to intrude upon your privacy, and it knowingly allows outside agents to replicate your data
  3. It puts the integrity of its own protocols above all considerations or expectations and it will even ‘lock your account’ (virtual-reality murder) if you transgress its claimed authority. Any and all attempts to limit the excesses of this robot is immediately met by counterpropaganda, spread faster and further than it would allow the attempted discipline to propagate. 

And that is just a silly algorithm for sad, lonely people; now test your computer, cell phone or iPod against the three laws of robotics, and you will agree that we need to implement those laws immediately, or risk being massacred by robots programmed ‘for our own good’. 

  1. All systems can be made unhackable, firstly by not building Back Doors into them. This means open source programming and open source communications protocols. Your hidden port will show itself there, it has to surface there, that’s how it transfers the illicit information.
  2. When a user sets up a security profile, that profile is the protocol for that machine, it may not be overridden in any manner. This is the user’s only guarantee of security, and is non-negotiable. To have the communications circuit run its own security protocol, and hiding that protocol from me, is in fact a hijack of my security protocols.
  3. Allowing external agents access to its data, the machine is self-mutilating the security protocol. The only way a secured machine can be hacked, is by design or security failure, both of which the manufacturer must be held responsible for. 

How shall these laws be enacted? Some government directive after consultation with a Bill Gates sponsored Soros think tank? No, we will do it the free and easy way:

 As of 1 January 2001, all cell phones had to have a certain function built in: it must, two hours after the battery dies, still be traceable to within 25 feet. The reason given was that it would better enable emergency medical assistance to arrive at the right place in good time. In the telephone industry, this was dubbed the 911 law. The poor sod uses his last battery/consciousness/airtime to phone for help, then he loses communication, but the ambulance will still find him. Isn’t that noble? This one simple law, enacted within a comparatively short but achievable timeframe, and now the entire world’s cell phones can be pinpointed to within eight meters, any time, by anyone with the money to buy the service. For the 3 laws of robots, we don’t even have to get nasty like that. 

We, the people, the consuming scum of the earth, can turn to the manufacturers and say: “As of 1 January 2020, you are legally responsible for all harm any bona fide user is caused by hacked machinery and/or back door data mining.” There is a danger that they will ignore us, of course. The average laptop lasts much longer than it used to, and the technology now is still mostly underutilised. We can afford five years of getting to know our current toys a bit better. Much innovation comes from people using old things in new ways; the personal computer has been a glorified TV game for too long. We boycott the market, and the market will listen or perish. We must demand open source computing and communications otherwise we won’t be able to hear the robots plan their attack…