toysniom.blogg.se

The World: Armed Conflict dot hack
The World: Armed Conflict dot hack








The World: Armed Conflict dot hack

The gun that it creates is of high quality, and is a gun that is outside of the regulatory loop it is an untraceable “ghost gun.” And while Wilson is keeping tight control over the “technical data” in the. Yet this product still effectively digitizes a gun, which lowers barriers to access. Wilson’s product cannot be exported, and the computer file is sold only to United States citizens to keep this product from running afoul of ITAR.

The World: Armed Conflict dot hack

This desktop CNC mill will take a block of aluminum and mill a lower receiver for an AR-15. Wilson started a company called Defense Distributed, which now manufactures a product called the Ghost Gunner.

The World: Armed Conflict dot hack

Three years later Wilson’s file is still online and freely available through sources like the Pirate Bay. The file, since it was on the Internet was downloadable anywhere in the world, and Wilson removed the file from his website when confronted by the U.S. Wilson’s file was in a standard language that would allow anyone with an Internet connection to download it and use a 3D printer to manufacture a gun. ITAR also, significantly, prohibits the export of “technical data” on these items, which is data that would assist the manufacturing of the prohibited item. These regulations prohibit the export of “defense items” – in other words, weapons – found on the United States Munitions List (USML) without authorization from the government. Little did Wilson know that he was running afoul of the United States’ International Traffic in Arms Regulations (ITAR). It was downloaded more than 100,000 times before Wilson removed the file. Shortly thereafter he made the computer file, that is a set of instructions for a 3D printer to print what he called the Liberator, available online for download. In May of 2013, Cody Wilson printed a working gun with a 3D printer and fired it. This is an excerpt from Reprogramming the World: Cyberspace and the Geography of Global Order.










The World: Armed Conflict dot hack