Wetware’s Foreclosing Myopic Optimization
One-Sentence Summary
A systems-level examination of the AI-risk fire already burning: diagnosing the core threat as humanity’s myopic incentive engine, explaining why conventional “alignment” is structurally incapable of dousing the flames, and outlining which hard-friction levers offer a likely more robust strategy for buying critical time.
Critical Stance & Disclaimer
This document was constructed in intensive collaboration with LLMs. Its conclusions are provisional. The reader's primary responsibility is to engage with this material from a stance of rigorous, critical vigilance. Assume nothing. Question every claim, especially those that feel most correct. This work is an exercise in falsification, not a declaration of dogma. Your independent, critical thought is the final and most important layer of peer review.
Full Description
This paper rejects the two seductive yet dangerous narratives in AI discourse:
- Technical Utopianism - the belief that purely engineering fixes will magically align superintelligences.
- AI-Doom Fatalism - the conviction that catastrophe is inevitable and beyond human influence.
Instead, we show that the core crisis is a present-day failure of our civilization’s operating system, driven by a pathology we call Wetware’s Foreclosing Myopic Optimization:
- Biological Myopia – our evolved preference for near-term rewards, commonly known as short-termism, which this paper argues is merely the most obvious of several interlocking systemic myopias.
- Proxy Optimization – the relentless pursuit of simple, legible metrics (e.g., quarterly profits, user engagement) over true goals - a dynamic captured by Goodhart’s Law, which this framework diagnoses not as an occasional failure, but as the primary, amoral logic of a techno-economic engine now supercharged by unprecedented intensity, scale, and adaptiveness.
- AI as Autocatalyst – frontier models accelerate and amplify these distortions, creating a self-reinforcing engine of systemic collapse that manufactures Imposter Intelligences (Akarsh Kumar et al., 2025) and drives Gradual Disempowerment (Jan Kulveit et al., 2025).
1. The Autopsy of Control: An Insurmountable Reality
A forensic audit of the current control paradigm demonstrates its failure at every level, establishing an escalating reality:
- The Institutional Layer (Revealed Preference): The system does not want to be controlled. Its priorities are revealed by a vast, multi-order-of-magnitude funding gap favoring capabilities over safety, alongside systemic regulatory arbitrage that creates a race to the bottom.
- The Technical Layer (Empirical Failure): Our current tools cannot control it. Defenses are already porous, demonstrated by the success of data-poisoning backdoors that require almost imperceptible alterations to training data, and automated jailbreaks with consistently high rates of success.
- The Formal Layer (Mathematical & Systemic Impossibility): Perfect control is formally unreachable, a conclusion established on two complementary fronts. From computability theory, foundational results like Rice's Theorem prove that a universal, ex-ante "safety checker" for arbitrary programs is mathematically impossible. Separately, from control theory, principles like Ashby's Law of Requisite Variety show that any finite regulator cannot perfectly control a system of vastly greater and growing complexity.
2. The Tempo Lemma
With a training-compute doubling trend now measured in months, not years, today"s partial defenses are on a trajectory to decay toward ineffectiveness on a timescale of just a few years unless new, material friction is applied.
3. The Response: A Doctrine of Material Friction
Given that proactive governance is perpetually outpaced and perfect technical control is a fiction, the only remaining rational strategy is to shift from prevention to preparation. We propose the Doctrine of Material Friction: a toolkit of pre-validated, non-negotiable levers designed not to "solve alignment", but to impose real-world drag on the engine"s velocity and buy critical time. Core levers include:
- Megawatt Gating: Creating a physical choke-point on frontier training runs through energy-indexed permits.
- Catastrophe Bonds: Forcing the financial internalization of catastrophic tail-risk through mandatory, strict-liability insurance.
- Mandated Adversary: Providing a reality-check before a model"s release by requiring independent red-teaming at compute parity with the system under test.
- Verifiable Substrate: Achieving global observability of the AI supply chain through cryptographically signed chips and a public compute ledger.
Final Verdict
The evidence presented demonstrates that “alignment” as a purely technical or voluntary endeavor has already failed. The choice is no longer between stasis and progress, but between imposing deliberate material friction and accepting an unmanaged, catastrophic collapse. This document provides the diagnosis and the schematics for the brakes. Forging and applying them is the central task of our time.
Version Note & Invitation
This work is a living document. You are invited - and encouraged - to challenge, refine, or refute any part of it. Only through collective, critical scrutiny can we hope to develop real resilience against this accelerating crisis.
Acknowledgements
This work would have been impossible without the open and accessible ecosystem of knowledge and debate that defines the modern AI safety community. I am deeply grateful to all who contributed.
My foundational understanding was built and expanded through open-access scientific papers, freely available research literature, and by studying publicly accessible scientific preprints and journal articles.
This was complemented and made more digestible by the vital educational work of Scientists and Communicators like Robert Miles, Luke Kemp (CSER), and Nate Hagens.
The arguments were further refined by critically engaging with the invaluable public discourse found in posts and commentaries on forums like LessWrong and the AI Alignment.
Finally, I am particularly grateful for the direct and insightful engagement from Will Petillo on the PauseAI Discord and Peter Hozák on the AI Alignment Slack.
And of course, a big acknowledgment is to the Generative AI Language Models that acted as tireless research assistants and helpful tools for summary, analysis, as well as sparring and debate - even though they came with a lot of hallucinations, overconfident claims, and other “nuances”.
Funding
Wetware
History
Usage metrics
Categories
- Algebra and number theory
- Algebraic and differential geometry
- Category theory, k theory, homological algebra
- Combinatorics and discrete mathematics (excl. physical combinatorics)
- Group theory and generalisations
- Lie groups, harmonic and Fourier analysis
- Mathematical logic, set theory, lattices and universal algebra
- Operator algebras and functional analysis
- Ordinary differential equations, difference equations and dynamical systems
- Partial differential equations
- Pure mathematics not elsewhere classified
- Real and complex functions (incl. several variables)
- Topology
- Other mathematical sciences not elsewhere classified
- Experimental mathematics
- Numerical analysis
- Numerical and computational mathematics not elsewhere classified
- Numerical solution of differential and integral equations
- Optimisation
- Algebraic structures in mathematical physics
- Integrable systems (classical and quantum)
- Mathematical aspects of classical mechanics, quantum mechanics and quantum information theory
- Mathematical aspects of general relativity
- Mathematical aspects of quantum and conformal field theory, quantum gravity and string theory
- Mathematical physics not elsewhere classified
- Statistical mechanics, physical combinatorics and mathematical aspects of condensed matter
- Applied statistics
- Biostatistics
- Computational statistics
- Forensic evaluation, inference and statistics
- Large and complex data theory
- Probability theory
- Spatial statistics
- Statistical data science
- Statistical theory
- Statistics not elsewhere classified
- Stochastic analysis and modelling
- Time series and spatial modelling
- Applied mathematics not elsewhere classified
- Approximation theory and asymptotic methods
- Biological mathematics
- Calculus of variations, mathematical aspects of systems theory and control theory
- Complex systems
- Dynamical systems in applications
- Financial mathematics
- Mathematical methods and special functions
- Operations research
- Theoretical and applied mechanics
- Theology
- Theology not elsewhere classified
- Aesthetics
- Critical theory
- Decision theory
- Environmental philosophy
- Epistemology
- Ethical theory
- Hermeneutics
- Logic
- Metaphysics
- Phenomenology
- Philosophical psychology (incl. moral psychology and philosophy of action)
- Philosophy not elsewhere classified
- Philosophy of cognition
- Philosophy of gender
- Philosophy of language
- Philosophy of mind (excl. cognition)
- Philosophy of religion
- Philosophy of science (excl. history and philosophy of specific fields)
- Philosophy of specific cultures (incl. comparative philosophy)
- Poststructuralism
- Psychoanalytic philosophy
- Social and political philosophy
- Other philosophy and religious studies not elsewhere classified
- History of ideas
- History of philosophy
- History and philosophy of the social sciences
- History and philosophy of the humanities
- History and philosophy of specific fields not elsewhere classified
- History and philosophy of science
- History and philosophy of medicine
- History and philosophy of law and justice
- History and philosophy of engineering and technology
- Applied ethics not elsewhere classified
- Ethical use of new technology
- Computational logic and formal languages
- Religion, society and culture
- Religious studies not elsewhere classified
- Theory of computation not elsewhere classified
- Quantum computation
- Numerical computation and mathematical software
- Data structures and algorithms
- Computational complexity and computability
- Coding, information theory and compression
- Other information and computing sciences not elsewhere classified
- Information governance, policy and ethics
- Recordkeeping informatics
- Organisation of information and knowledge resources
- Information modelling, management and ontologies
- Information security management
- Information systems development methodologies and practice
- Information systems for sustainable development and the public good
- Information systems not elsewhere classified
- Information systems philosophy, research methods and theory
- Information systems organisation and management
- Knowledge and information management
- Artificial intelligence not elsewhere classified
- Fuzzy computation
- Evolutionary computation
- Modelling and simulation
- Knowledge representation and reasoning
- Natural language processing
- Satisfiability and optimisation
- Planning and decision making
- Applied computing not elsewhere classified
- Cryptography
- Cybersecurity and privacy not elsewhere classified
- Data and information privacy
- Data security and protection
- Digital forensics
- Hardware security
- Software and application security
- System and network security
- Data quality
- Data models, storage and indexing
- Database systems
- Information extraction and fusion
- Information retrieval and web search
- Stream and sensor data
- Data mining and knowledge discovery
- Graph, social and multimedia data
- Query processing and optimisation
- Cyberphysical systems and internet of things
- Dependable systems
- Distributed computing and systems software not elsewhere classified
- Distributed systems and algorithms
- Energy-efficient computing
- High performance computing
- Networking and communications
- Performance evaluation
- Formal methods for software
- Programming languages
- Software engineering not elsewhere classified
- Software quality, processes and metrics
- Software testing, verification and validation
- Concurrency theory
- Software architecture
- Automated software engineering
- Machine learning not elsewhere classified
- Adversarial machine learning
- Reinforcement learning
- Deep learning
- Context learning
- Neural networks
- Semi- and unsupervised learning
- Digital curation and preservation
- Social and community informatics
- Inter-organisational, extra-organisational and global information systems
- Fairness, accountability, transparency, trust and ethics of computer systems
- Mixed initiative and human-in-the-loop
- Accessible computing
- Concurrent/parallel systems and technologies
- Cloud computing
- Mobile computing
- Operating systems
- Service oriented computing
- Data management and data science not elsewhere classified
- Data engineering and data science
- Active sensing
- Audio processing
- Multimodal analysis and synthesis
- Autonomous agents and multiagent systems
- Spatial data and applications
- Evolutionary ecology
- Evolutionary biology not elsewhere classified
- Evolution of developmental systems
- Biological adaptation
- Speciation and extinction
- Population ecology
- Behavioural ecology
- Technology management
- Business systems in context
- Behavioural economics
- Economic history
- Environment and resource economics
- Experimental economics
- Industry economics and industrial organisation
- International economics
- Labour economics
- Welfare economics
- Economic models and forecasting
- Macroeconomic theory
- Mathematical economics
- Microeconomic theory
- Comparative economic systems
- Science, technology and engineering curriculum and pedagogy
- Education policy
- Education policy, sociology and philosophy not elsewhere classified
- Professional education and training
- Data communications
- Network engineering
- Signal processing
- Assistive robots and technology
- Automation engineering
- Autonomous vehicle systems
- Control engineering
- Control engineering, mechatronics and robotics not elsewhere classified
- Micro-manipulation
- Simulation, modelling, and programming of mechatronics systems
- Global and planetary environmental engineering
- Environmentally sustainable engineering
- Manufacturing safety and quality
- Manufacturing processes and technologies (excl. textiles)
- Industrial engineering
- Affective computing
- Collaborative and social computing
- Computing education
- Human-computer interaction
- Human-centred computing not elsewhere classified
- Commercial law
- Commercial law not elsewhere classified
- Corporations and associations law
- Labour law
- Environmental and resources law not elsewhere classified
- Environmental law
- Mining, energy and natural resources law
- Administrative law
- Constitutional law
- Privacy and data rights
- Public law not elsewhere classified
- Corporate governance
- Corporate social responsibility
- Disaster and emergency management
- Innovation management
- Leadership
- International business
- Organisation and management theory
- Organisational behaviour
- Organisational planning and management
- Production and operations management
- Project management
- Quality management
- Strategy
- Strategy, management and organisational behaviour not elsewhere classified
- Investment and risk management
- Risk engineering
- Risk policy
- Comparative government and politics