In The War of 2050, The Robots Call The Shots

article-2130118-129C5B76000005DC-831_634x353.jpg

Boston Dynamics DARPA funded PETMAN robot can climb stairs 

In April, thought leaders from the U.S. Defense Department, the US Army Research Lab called the Institute for Defense Analysis, and national security thinkers across academia met for a two-work workshop on the next three and a half decades of war. 

The report they produced reads like a Tolkien-esque saga set in the future, a fascinating mash-up of futuristic concepts, far-off capabilities, and emergent technologies that play off one another, competing and evolving at hyper-speed. Among the report’s most significant conclusions: faster “battle rhythm” will increasingly push human beings out of the decision-making loop. The future of war belongs to the bots.

Consider the use of armed drones. Even as military leaders push to increase autonomy, they insist that a human will always decide when and whether to pull the trigger. Robots don’t kill you, people do. The report foresees a slightly different future: humans won’t be entirely cut out of lethal engagements, but they’ll play umpire, rather than pitcher. It’s the difference between being “in the loop,” or simply “on the loop” as an observer.
“The difference being that in the former, human decisions are a required step in a process and thus humans are exercising positive control; while in the latter, humans can only observe the behaviors that are taking place and in some cases the decisions that have been made and the reasons why, but they can only act after the fact or in anticipation of expected behaviors,” says the report, which adds that top-down human control will be replaced by “large-scale self-organization” among swarming robots and human teammates.

Those people, too, will be getting a technological upgrade. “The battlefield of the future will be populated by fewer humans, but these humans would be physically and mentally augmented with enhanced capabilities that improve their ability to sense their environment, make sense of their environment, and interact with one another, as well as with ‘unenhanced humans,’ automated processes, and machines of various kinds,” says the report.

What exactly constitutes an enhanced human is a matter of technical dispute. After all, night-vision goggles represent a type of enhancement, as does armor. The military has no problem discussing future plans in those areas, but what the workshop participants anticipate goes well beyond flak jackets and gear.

If you talk to officials at the Defense Advanced Research Projects Agency, and they’ll tell you that soldier enhancement involving surgery or genetic manipulation is not an area of active interest. Certainly the prospect brings up ethical concerns and it may pose a number of legal ones as well. As bioethicist Patrick Lin has observed, a permanently enhanced soldier might constitute a new type of weapon conflicting with international law. Regardless, the military has dabbled in the field, as Noah Shactman revealed in this 2007 article for Wired.

The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution.

The report envisions enhancement taking several robotic steps forward. “To enable humans to partner effectively with robots, human team members will be enhanced in a variety of ways. These super humans will feature exoskeletons, possess a variety of implants, and have seamless access to sensing and cognitive enhancements. They may also be the result of genetic engineering. 

The net result is that they will have enhanced physical capabilities, senses, and cognitive powers. The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution,” says the report. 
Sensors will be “ubiquitous” and that will include “sensors on and inside humans.” But every enhancement introduces new vulnerabilities and attack vectors as well. The report imagines that all of that data could enable enemy forces to monitor US troops’ biophysical signals and possibly even their brain states or decision-making abilities. The report calls this “cognitive modeling,” and notes that this creates great risks and opportunities. “In addition to having the information available to vastly improve individual cognitive modeling, such models offer the opportunity to disrupt adversary organizations and operations in a cost-effective manner.”

All this recalls the phrase “radical evolution,” a techno-futurist term that’s key to understanding the report’s central themes and assumptions. It’s an idea borrowed from inventor and futurist Ray Kurzweil, who is largely credited with the observation that technological progress in information technology is not linear but exponential. That means that every leap in technological innovation begets two, which begets four, which begets eight, etc. When you arrive at the point where you are multiplying very large numbers by other very large numbers, the effect is a rapid explosion in technological capability. Kurzweil argues that computers’ rapid decrease in size and cost has brought us to precisely that moment in history. In his seminal 2001 essay, he says that “we won’t experience 100 years of progress in the 21st century, it will be more like 20,000 years of progress at today’s rate.”

Imaginary or not, it’s that future explored in the workshop report: a future in which humanity can no longer control the rate or the effects of technological progress, at least not in the way that we attempt to do so today. That may be far more threatening than any particular enemy.

DefenseOne

 

 

« Giant OPM Data Hack Did Blow U.S. Spies’ Cover
Fear Killer Robots »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

Zeroday Ops

Zeroday Ops

At ZeroDay Ops, our vision is to democratize cybersecurity by making enterprise-grade vulnerability assessment accessible, continuous, and actionable for every organization in the digital world.

GRC Kompas

GRC Kompas

GRC Kompas is a Dutch cybersecurity consultancy specializing in NIS2 compliance for Managed Service Providers (MSPs) and IT service providers.