Drone Operators’ Jobs Are Safe From Robots…For Now

 

A typical drone combat air patrol, or CAP, is a lot more manpower-intensive than the term “unmanned aerial vehicle” would suggest. In fact, as many as 150 people—from repairmen to image analysts—play some sort of role in every drone flight that takes place over Iraq and Syria. It’s a problem created by technology. Unfortunately, it’s not a problem that technology is going to solve any time soon, according to Steven K. Rogers, the senior scientist for automatic target recognition and sensor fusion at the Air Force Research Laboratory.

Rogers is leading efforts to reduce the amount of manpower needed to fly those combat air patrols by moving the state of technology forward. “To give you an idea of the state of the art in this space,” he told a group at the GEOINT Symposium on Monday in downtown Washington, D.C., “I have young airmen, analysts— they are ordered, ‘You stare at that screen. You call out anything you see, if you need to turn your eyes for any reason, you need to sneeze, you need to ask permission, because someone else has to come put their eyes on that screen.’ The point I’m driving home to you is that the state of the art in our business is people… The diversity of these tasks means that quite often, we throw together ad hoc combinations of sensors and people and resources to find information we need.”

The Pentagon is putting a huge emphasis on autonomy for tasks like intelligence, surveillance and reconnaissance. When former Defense Secretary Chuck Hagel announced the Defense Innovation Initiative last November, he named robotics and autonomous systems as keys to military innovation. The initiative is part of the so-called “offset strategy,” a bid to develop new silver-bullet technologies to secure military dominance for decades to come.
Says Rogers: “Every place through those documents you see autonomy, autonomy, autonomy.”
His message to the brass is this: manage your expectations. Extra computational power and “slight improvements in algorithms won’t solve the autonomy problems,” he says.
What’s so hard about autonomy? It’s not that machines can’t see and it’s not that they can’t think. What they lack is imagination; that ability is central even to tasks like target recognition, which would seem not to require it.
“Imagined representation is key to autonomy,” says Rogers.
In essence, that refers to the ability to fill in gaps in data and rapidly construct new mental models of external situations. It requires a very high level of mental adaptability, even when there seems to be more than enough data at hand.
“To do autonomy, I have to be able to handle when I don’t have all the information that I need, or I don’t have the right mental model. That’s what we have to push on to achieve autonomy. “ he says.  “Figuring out what’s going to happen next, it’s not sensor data populated, it’s an imagined representation.”
Artificial intelligence agents can “figure out what’s going to happen next” only in extremely limited domains, ones they’ve experienced or learned about by structured data that they’ve been fed. You can program a machine to anticipate every possible chess move but not to understand how a human will feel about losing at chess to a machine.

Humans are constantly constructing new models of the world, recognizing patterns, on the basis of lived experience. In fact, everything you think will happen is a projection based in part on something that’s already happened to you. PalmPilot creator Jeff Hawkins dubs this the “memory prediction framework.”
“The brain uses vast amounts of memory to create a model of the world. Everything you know and have learned is stored in this model. The brain uses this memory-based model to make continuous predictions of future events. It is the ability to make predictions about the future that is the crux of intelligence,” Hawkins writes in On Intelligence: How a New Understanding of the Brain will Lead to the Creation of Truly Intelligent Machines, his seminal book on the automation of human thinking

Intelligence, thus, is the ability to collect data and know what the data is even at the moment it is being collected, so that the intelligent agent can change the way that data is used, it is knowing through anticipating. Within the human brain, that processing happens immediately and constantly thanks, in part, to the neocortex, the new brain that our pre-mammalian ancestors evolved more than 50 million years ago. It’s the neocortex that allows humans to fill in holes in sensed data with stuff from memory in order to make an imagined representation of a future event, to complete a pattern, to predict. This is the precisely the challenge that autonomy for intelligence collection represents.

Without some sort of major technological breakthrough, full autonomy for intelligence collection – for example, replacing human eyes on that drone feed — will be impossible, says Rogers. Science is scoring scattered victories. “Tracking? We’re here and there, depending on the environment.  That’s going to keep improving.  But target recognition? I have job security. We’ve thrown billions of dollars at that and we don’t have it yet.”
DefenseOne: http://bit.ly/1GChRPf

 

« Hackers target Polish airline carrier LOT
5 Facts that Explain Cyber Warfare »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Safetica

Safetica

Safetica Technologies is a Czech software company that delivers data protection solutions for businesses of all types and sizes.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

3DOT Solutions

3DOT Solutions

3DOT Solutions is an established UK cybersecurity consultancy focused on delivering end-to-end cyber security solutions for private and public sector customers.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

Blind Insight

Blind Insight

Field-level searchable encryption plus fine-grained programmable access controls. All wrapped neatly in developer-friendly APIs and SDKs. Data protection perfection.