Drone Operators’ Jobs Are Safe From Robots…For Now

 

A typical drone combat air patrol, or CAP, is a lot more manpower-intensive than the term “unmanned aerial vehicle” would suggest. In fact, as many as 150 people—from repairmen to image analysts—play some sort of role in every drone flight that takes place over Iraq and Syria. It’s a problem created by technology. Unfortunately, it’s not a problem that technology is going to solve any time soon, according to Steven K. Rogers, the senior scientist for automatic target recognition and sensor fusion at the Air Force Research Laboratory.

Rogers is leading efforts to reduce the amount of manpower needed to fly those combat air patrols by moving the state of technology forward. “To give you an idea of the state of the art in this space,” he told a group at the GEOINT Symposium on Monday in downtown Washington, D.C., “I have young airmen, analysts— they are ordered, ‘You stare at that screen. You call out anything you see, if you need to turn your eyes for any reason, you need to sneeze, you need to ask permission, because someone else has to come put their eyes on that screen.’ The point I’m driving home to you is that the state of the art in our business is people… The diversity of these tasks means that quite often, we throw together ad hoc combinations of sensors and people and resources to find information we need.”

The Pentagon is putting a huge emphasis on autonomy for tasks like intelligence, surveillance and reconnaissance. When former Defense Secretary Chuck Hagel announced the Defense Innovation Initiative last November, he named robotics and autonomous systems as keys to military innovation. The initiative is part of the so-called “offset strategy,” a bid to develop new silver-bullet technologies to secure military dominance for decades to come.
Says Rogers: “Every place through those documents you see autonomy, autonomy, autonomy.”
His message to the brass is this: manage your expectations. Extra computational power and “slight improvements in algorithms won’t solve the autonomy problems,” he says.
What’s so hard about autonomy? It’s not that machines can’t see and it’s not that they can’t think. What they lack is imagination; that ability is central even to tasks like target recognition, which would seem not to require it.
“Imagined representation is key to autonomy,” says Rogers.
In essence, that refers to the ability to fill in gaps in data and rapidly construct new mental models of external situations. It requires a very high level of mental adaptability, even when there seems to be more than enough data at hand.
“To do autonomy, I have to be able to handle when I don’t have all the information that I need, or I don’t have the right mental model. That’s what we have to push on to achieve autonomy. “ he says.  “Figuring out what’s going to happen next, it’s not sensor data populated, it’s an imagined representation.”
Artificial intelligence agents can “figure out what’s going to happen next” only in extremely limited domains, ones they’ve experienced or learned about by structured data that they’ve been fed. You can program a machine to anticipate every possible chess move but not to understand how a human will feel about losing at chess to a machine.

Humans are constantly constructing new models of the world, recognizing patterns, on the basis of lived experience. In fact, everything you think will happen is a projection based in part on something that’s already happened to you. PalmPilot creator Jeff Hawkins dubs this the “memory prediction framework.”
“The brain uses vast amounts of memory to create a model of the world. Everything you know and have learned is stored in this model. The brain uses this memory-based model to make continuous predictions of future events. It is the ability to make predictions about the future that is the crux of intelligence,” Hawkins writes in On Intelligence: How a New Understanding of the Brain will Lead to the Creation of Truly Intelligent Machines, his seminal book on the automation of human thinking

Intelligence, thus, is the ability to collect data and know what the data is even at the moment it is being collected, so that the intelligent agent can change the way that data is used, it is knowing through anticipating. Within the human brain, that processing happens immediately and constantly thanks, in part, to the neocortex, the new brain that our pre-mammalian ancestors evolved more than 50 million years ago. It’s the neocortex that allows humans to fill in holes in sensed data with stuff from memory in order to make an imagined representation of a future event, to complete a pattern, to predict. This is the precisely the challenge that autonomy for intelligence collection represents.

Without some sort of major technological breakthrough, full autonomy for intelligence collection – for example, replacing human eyes on that drone feed — will be impossible, says Rogers. Science is scoring scattered victories. “Tracking? We’re here and there, depending on the environment.  That’s going to keep improving.  But target recognition? I have job security. We’ve thrown billions of dollars at that and we don’t have it yet.”
DefenseOne: http://bit.ly/1GChRPf

 

« Hackers target Polish airline carrier LOT
5 Facts that Explain Cyber Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

SANS Institute

SANS Institute

SANS is the most trusted and by far the largest source for information security training and security certification in the world.

AhnLab

AhnLab

AhnLab provides a range of information security solutions including network security, endpoint security, antivirus and consulting services.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

White Knight Labs

White Knight Labs

White Knight Labs is a cyber security consultancy that specializes in cybersecurity training.