In The War of 2050, The Robots Call The Shots

article-2130118-129C5B76000005DC-831_634x353.jpg

Boston Dynamics DARPA funded PETMAN robot can climb stairs 

In April, thought leaders from the U.S. Defense Department, the US Army Research Lab called the Institute for Defense Analysis, and national security thinkers across academia met for a two-work workshop on the next three and a half decades of war. 

The report they produced reads like a Tolkien-esque saga set in the future, a fascinating mash-up of futuristic concepts, far-off capabilities, and emergent technologies that play off one another, competing and evolving at hyper-speed. Among the report’s most significant conclusions: faster “battle rhythm” will increasingly push human beings out of the decision-making loop. The future of war belongs to the bots.

Consider the use of armed drones. Even as military leaders push to increase autonomy, they insist that a human will always decide when and whether to pull the trigger. Robots don’t kill you, people do. The report foresees a slightly different future: humans won’t be entirely cut out of lethal engagements, but they’ll play umpire, rather than pitcher. It’s the difference between being “in the loop,” or simply “on the loop” as an observer.
“The difference being that in the former, human decisions are a required step in a process and thus humans are exercising positive control; while in the latter, humans can only observe the behaviors that are taking place and in some cases the decisions that have been made and the reasons why, but they can only act after the fact or in anticipation of expected behaviors,” says the report, which adds that top-down human control will be replaced by “large-scale self-organization” among swarming robots and human teammates.

Those people, too, will be getting a technological upgrade. “The battlefield of the future will be populated by fewer humans, but these humans would be physically and mentally augmented with enhanced capabilities that improve their ability to sense their environment, make sense of their environment, and interact with one another, as well as with ‘unenhanced humans,’ automated processes, and machines of various kinds,” says the report.

What exactly constitutes an enhanced human is a matter of technical dispute. After all, night-vision goggles represent a type of enhancement, as does armor. The military has no problem discussing future plans in those areas, but what the workshop participants anticipate goes well beyond flak jackets and gear.

If you talk to officials at the Defense Advanced Research Projects Agency, and they’ll tell you that soldier enhancement involving surgery or genetic manipulation is not an area of active interest. Certainly the prospect brings up ethical concerns and it may pose a number of legal ones as well. As bioethicist Patrick Lin has observed, a permanently enhanced soldier might constitute a new type of weapon conflicting with international law. Regardless, the military has dabbled in the field, as Noah Shactman revealed in this 2007 article for Wired.

The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution.

The report envisions enhancement taking several robotic steps forward. “To enable humans to partner effectively with robots, human team members will be enhanced in a variety of ways. These super humans will feature exoskeletons, possess a variety of implants, and have seamless access to sensing and cognitive enhancements. They may also be the result of genetic engineering. 

The net result is that they will have enhanced physical capabilities, senses, and cognitive powers. The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution,” says the report. 
Sensors will be “ubiquitous” and that will include “sensors on and inside humans.” But every enhancement introduces new vulnerabilities and attack vectors as well. The report imagines that all of that data could enable enemy forces to monitor US troops’ biophysical signals and possibly even their brain states or decision-making abilities. The report calls this “cognitive modeling,” and notes that this creates great risks and opportunities. “In addition to having the information available to vastly improve individual cognitive modeling, such models offer the opportunity to disrupt adversary organizations and operations in a cost-effective manner.”

All this recalls the phrase “radical evolution,” a techno-futurist term that’s key to understanding the report’s central themes and assumptions. It’s an idea borrowed from inventor and futurist Ray Kurzweil, who is largely credited with the observation that technological progress in information technology is not linear but exponential. That means that every leap in technological innovation begets two, which begets four, which begets eight, etc. When you arrive at the point where you are multiplying very large numbers by other very large numbers, the effect is a rapid explosion in technological capability. Kurzweil argues that computers’ rapid decrease in size and cost has brought us to precisely that moment in history. In his seminal 2001 essay, he says that “we won’t experience 100 years of progress in the 21st century, it will be more like 20,000 years of progress at today’s rate.”

Imaginary or not, it’s that future explored in the workshop report: a future in which humanity can no longer control the rate or the effects of technological progress, at least not in the way that we attempt to do so today. That may be far more threatening than any particular enemy.

DefenseOne

 

 

« Giant OPM Data Hack Did Blow U.S. Spies’ Cover
Fear Killer Robots »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

SECUINFRA

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.