In The War of 2050, The Robots Call The Shots

article-2130118-129C5B76000005DC-831_634x353.jpg

Boston Dynamics DARPA funded PETMAN robot can climb stairs 

In April, thought leaders from the U.S. Defense Department, the US Army Research Lab called the Institute for Defense Analysis, and national security thinkers across academia met for a two-work workshop on the next three and a half decades of war. 

The report they produced reads like a Tolkien-esque saga set in the future, a fascinating mash-up of futuristic concepts, far-off capabilities, and emergent technologies that play off one another, competing and evolving at hyper-speed. Among the report’s most significant conclusions: faster “battle rhythm” will increasingly push human beings out of the decision-making loop. The future of war belongs to the bots.

Consider the use of armed drones. Even as military leaders push to increase autonomy, they insist that a human will always decide when and whether to pull the trigger. Robots don’t kill you, people do. The report foresees a slightly different future: humans won’t be entirely cut out of lethal engagements, but they’ll play umpire, rather than pitcher. It’s the difference between being “in the loop,” or simply “on the loop” as an observer.
“The difference being that in the former, human decisions are a required step in a process and thus humans are exercising positive control; while in the latter, humans can only observe the behaviors that are taking place and in some cases the decisions that have been made and the reasons why, but they can only act after the fact or in anticipation of expected behaviors,” says the report, which adds that top-down human control will be replaced by “large-scale self-organization” among swarming robots and human teammates.

Those people, too, will be getting a technological upgrade. “The battlefield of the future will be populated by fewer humans, but these humans would be physically and mentally augmented with enhanced capabilities that improve their ability to sense their environment, make sense of their environment, and interact with one another, as well as with ‘unenhanced humans,’ automated processes, and machines of various kinds,” says the report.

What exactly constitutes an enhanced human is a matter of technical dispute. After all, night-vision goggles represent a type of enhancement, as does armor. The military has no problem discussing future plans in those areas, but what the workshop participants anticipate goes well beyond flak jackets and gear.

If you talk to officials at the Defense Advanced Research Projects Agency, and they’ll tell you that soldier enhancement involving surgery or genetic manipulation is not an area of active interest. Certainly the prospect brings up ethical concerns and it may pose a number of legal ones as well. As bioethicist Patrick Lin has observed, a permanently enhanced soldier might constitute a new type of weapon conflicting with international law. Regardless, the military has dabbled in the field, as Noah Shactman revealed in this 2007 article for Wired.

The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution.

The report envisions enhancement taking several robotic steps forward. “To enable humans to partner effectively with robots, human team members will be enhanced in a variety of ways. These super humans will feature exoskeletons, possess a variety of implants, and have seamless access to sensing and cognitive enhancements. They may also be the result of genetic engineering. 

The net result is that they will have enhanced physical capabilities, senses, and cognitive powers. The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution,” says the report. 
Sensors will be “ubiquitous” and that will include “sensors on and inside humans.” But every enhancement introduces new vulnerabilities and attack vectors as well. The report imagines that all of that data could enable enemy forces to monitor US troops’ biophysical signals and possibly even their brain states or decision-making abilities. The report calls this “cognitive modeling,” and notes that this creates great risks and opportunities. “In addition to having the information available to vastly improve individual cognitive modeling, such models offer the opportunity to disrupt adversary organizations and operations in a cost-effective manner.”

All this recalls the phrase “radical evolution,” a techno-futurist term that’s key to understanding the report’s central themes and assumptions. It’s an idea borrowed from inventor and futurist Ray Kurzweil, who is largely credited with the observation that technological progress in information technology is not linear but exponential. That means that every leap in technological innovation begets two, which begets four, which begets eight, etc. When you arrive at the point where you are multiplying very large numbers by other very large numbers, the effect is a rapid explosion in technological capability. Kurzweil argues that computers’ rapid decrease in size and cost has brought us to precisely that moment in history. In his seminal 2001 essay, he says that “we won’t experience 100 years of progress in the 21st century, it will be more like 20,000 years of progress at today’s rate.”

Imaginary or not, it’s that future explored in the workshop report: a future in which humanity can no longer control the rate or the effects of technological progress, at least not in the way that we attempt to do so today. That may be far more threatening than any particular enemy.

DefenseOne

 

 

« Giant OPM Data Hack Did Blow U.S. Spies’ Cover
Fear Killer Robots »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

SIS Certifications (SIS CERT)

SIS Certifications (SIS CERT)

SIS Certifications is an ISO certification body serving more than 10,000 clients in over 15 countries worldwide.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

ShieldHaus

ShieldHaus

Protect your business from evolving cyber threats with ShieldHaus. Our real-time, AI-powered security solutions block malicious IPs, phishing attempts, and harmful domains to safeguard your systems an

Device42

Device42

Device42 is a trusted, advanced, and complete full-stack agentless discovery and dependency mapping platform for Hybrid IT.