In The War of 2050, The Robots Call The Shots

article-2130118-129C5B76000005DC-831_634x353.jpg

Boston Dynamics DARPA funded PETMAN robot can climb stairs 

In April, thought leaders from the U.S. Defense Department, the US Army Research Lab called the Institute for Defense Analysis, and national security thinkers across academia met for a two-work workshop on the next three and a half decades of war. 

The report they produced reads like a Tolkien-esque saga set in the future, a fascinating mash-up of futuristic concepts, far-off capabilities, and emergent technologies that play off one another, competing and evolving at hyper-speed. Among the report’s most significant conclusions: faster “battle rhythm” will increasingly push human beings out of the decision-making loop. The future of war belongs to the bots.

Consider the use of armed drones. Even as military leaders push to increase autonomy, they insist that a human will always decide when and whether to pull the trigger. Robots don’t kill you, people do. The report foresees a slightly different future: humans won’t be entirely cut out of lethal engagements, but they’ll play umpire, rather than pitcher. It’s the difference between being “in the loop,” or simply “on the loop” as an observer.
“The difference being that in the former, human decisions are a required step in a process and thus humans are exercising positive control; while in the latter, humans can only observe the behaviors that are taking place and in some cases the decisions that have been made and the reasons why, but they can only act after the fact or in anticipation of expected behaviors,” says the report, which adds that top-down human control will be replaced by “large-scale self-organization” among swarming robots and human teammates.

Those people, too, will be getting a technological upgrade. “The battlefield of the future will be populated by fewer humans, but these humans would be physically and mentally augmented with enhanced capabilities that improve their ability to sense their environment, make sense of their environment, and interact with one another, as well as with ‘unenhanced humans,’ automated processes, and machines of various kinds,” says the report.

What exactly constitutes an enhanced human is a matter of technical dispute. After all, night-vision goggles represent a type of enhancement, as does armor. The military has no problem discussing future plans in those areas, but what the workshop participants anticipate goes well beyond flak jackets and gear.

If you talk to officials at the Defense Advanced Research Projects Agency, and they’ll tell you that soldier enhancement involving surgery or genetic manipulation is not an area of active interest. Certainly the prospect brings up ethical concerns and it may pose a number of legal ones as well. As bioethicist Patrick Lin has observed, a permanently enhanced soldier might constitute a new type of weapon conflicting with international law. Regardless, the military has dabbled in the field, as Noah Shactman revealed in this 2007 article for Wired.

The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution.

The report envisions enhancement taking several robotic steps forward. “To enable humans to partner effectively with robots, human team members will be enhanced in a variety of ways. These super humans will feature exoskeletons, possess a variety of implants, and have seamless access to sensing and cognitive enhancements. They may also be the result of genetic engineering. 

The net result is that they will have enhanced physical capabilities, senses, and cognitive powers. The presence of super humans on the battlefield in the 2050 timeframe is highly likely because the various components needed to enable this development already exist and are undergoing rapid evolution,” says the report. 
Sensors will be “ubiquitous” and that will include “sensors on and inside humans.” But every enhancement introduces new vulnerabilities and attack vectors as well. The report imagines that all of that data could enable enemy forces to monitor US troops’ biophysical signals and possibly even their brain states or decision-making abilities. The report calls this “cognitive modeling,” and notes that this creates great risks and opportunities. “In addition to having the information available to vastly improve individual cognitive modeling, such models offer the opportunity to disrupt adversary organizations and operations in a cost-effective manner.”

All this recalls the phrase “radical evolution,” a techno-futurist term that’s key to understanding the report’s central themes and assumptions. It’s an idea borrowed from inventor and futurist Ray Kurzweil, who is largely credited with the observation that technological progress in information technology is not linear but exponential. That means that every leap in technological innovation begets two, which begets four, which begets eight, etc. When you arrive at the point where you are multiplying very large numbers by other very large numbers, the effect is a rapid explosion in technological capability. Kurzweil argues that computers’ rapid decrease in size and cost has brought us to precisely that moment in history. In his seminal 2001 essay, he says that “we won’t experience 100 years of progress in the 21st century, it will be more like 20,000 years of progress at today’s rate.”

Imaginary or not, it’s that future explored in the workshop report: a future in which humanity can no longer control the rate or the effects of technological progress, at least not in the way that we attempt to do so today. That may be far more threatening than any particular enemy.

DefenseOne

 

 

« Giant OPM Data Hack Did Blow U.S. Spies’ Cover
Fear Killer Robots »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

CSIRT Malta

CSIRT Malta

CSIRT Malta supports critical infrastructure organisations in Malta on how to protect their information infrastructure assets and systems from cyber threats and incidents.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Nameshield Group

Nameshield Group

Nameshield is one of most experienced domain name registrars, trademark protection specialists and managers of online reputational risk in the world today.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.