86. Alternet: What Happens When the Internet is No Longer Trusted?

[Editor’s Note: Mad Scientist Laboratory is pleased to present a post by Mad Scientist and guest blogger Lt Col Jennifer “JJ” Snow, addressing the emergence of a post-internet world.]

The Internet of the 1990s was about choosing your own adventure. The Internet of right now, over the last 10 years, is about somebody else choosing your adventure for you.” – Cindy Cohn, Executive Director of the Electronic Frontier Foundation

The internet was designed in its earliest iteration to provide a new form of communication, a way for people to connect, to share information in real-time, to provide a positive tool for collaboration and learning. Looking back at those early ideas, many of the founding fathers of the internet express disappointment in what it has become: a place where privacy and people are abused, information is wielded like a weapon, nations and corporations alike battle each other and other nefarious actors in the digital shadows, and fake news dominates the taglines in hopes of grabbing the most dollars per click. In light of what technologists, ethical hackers, and the public view as a potentially irrecoverable situation, many are suggesting starting over and abandoning the internet as we know it in favor of alternative internet options or “Alternet.” [1]

These initiatives are nascent but are increasingly gaining traction as they offer users the option to manage their own identity and information online; choose what they do and don’t want to share digitally; provide transparency as a currency, meaning users can view rules, policies, and protocols openly at any time and see when changes are made real-time; and allow users to be their own data authority. While progress in this space will be slow but steady over the next two years, expect that “Alternets” will become a publicly recognized substitute to the big internet companies in five years and a commonplace feature of the web in 10 years as users become more disenchanted, distrustful, and decide they want greater control, attribution, or anonymity as needed, and desire an internet that meets their norms, cultural, and community preferences.

There are several interesting challenges that come with the fracturing of the internet in this manner.

First, Alternets will be more insular, require individual verification to join, and users will need to buy special equipment like a community specific encrypted router or use a particular variant of the blockchain to access the web.

Secondly, Alternets may serve to fracture the internet itself in interesting ways that could impact how data and users are able to digitally traverse the globe.

Third, Alternets will provide both the attribution many desire in social media to stop cyber bullying, scammers, and fake news, and the anonymity features that allow both dissident and terror groups to operate safely in virtual spaces. As with all technologies, there will always be opportunities for both positive and malicious use.

Fourth, the development and spread of Alternets may serve to further polarize various interests, organizations, and nations as like-minded communities will group together rather than strive to engage in constructive discourse, further reducing the opportunity for bridging entities to be effective negotiators.

Fifth, such online fracturing may also manifest physically in real life leading to conflict, both digital and physical, and may enhance the weaponization of cyber in new ways to include citizen cyber militia actively operating in defense of their communities and/or their nation or offensive attacks by nations operating from their own “Alternet” separate from the existing DNS system and not regulated and not easily targetable by competitor nations, thus limiting their ability to counterstrike and creating an overmatch situation. [2]

Current examples of “Alternets” that exist today include the private citizen efforts of the Metacurrency Project called Holo; the Russian independent internet for the BRICS block of nations; the PRC alternative which has also been installed in Tanzania, Nigeria, and Vietnam; BitDust, a decentralized, encrypted, anonymous storage and communication solution; Mastodon a decentralized, personally hosted, microblogging solution used in the Middle East, Africa, and Asia; and Hyperboria which was born out of the DarkNet and is an encrypted, distributed, peer-to-peer IPv6 network with Distributed Hash Table (DHT)-based source routing.

A full listing of “Alternet” projects and tools can be found in the footnotes. [3]

To learn more about the security ramifications associated with the rise of Alternets, read the following blog posts:

The Future of the Cyber Domain

Virtual Nations: An Emerging Supranational Cyber Trend, by Marie Murphy

JJ Snow is an Air Force Lt Colonel assigned as the U.S. Special Operations Command Innovation Officer and the J5 Donovan Group Future Plans and Strategy Deputy Director. In her current role, JJ serves as the government representative for technology outreach and engagement on behalf of the command and 756 interagency action officers spanning 40 different government agencies.

She is responsible for maintaining a network of non-traditional experts across industry, academia and ethical hackers/technologists to provide government with critical access, expertise and capacity across a broad spectrum of technologies to rapidly identify best of breed while also proactively responding to potential threat aspects of concern to Special Operations and national security. She supports senior government leadership in process innovation, innovation planning in big government, and the development of smart technology policy and advises senior government representatives on emerging disruptive technologies.

She holds a MS Degree in Defense Analysis with distinction from the Naval Postgraduate School (NPS) and a MA from American Military University in Strategic Intelligence with honors.


[1] Saldana et al., “Alternative Networks: Toward Global Access to the Internet for All.” IEEE Communications Magazine, vol. 55, no. 9, pp. 187-193, 2017.
Lafrance, Adrienne; “The Promise of a New Internet.” The Atlantic (10 JUN 2014)
Finley, Klint; “The Pied Piper’s New Internet Isn’t Just Possible – It’s Almost Here.” Wired (1 JUN 2017)

[2] Eric Harris-Braun, Nicolas Luck, Arthur Brock; “Holochain: Scalable Agent-Centric Distributed Computing.” Holo (15 FEB 2018)
Degurin, Mack; “Russia’s Alternate Internet.” NY Magazine (13 JUL 2018)
Sacks, Sam; “Beijing Wants to Rewrite the Rules of the Internet.” The Atlantic (18 JUN 2018)

[3] The following links are included to provide the reader with the options of exploring some additional alternative internet options that exist and are in use today. A big thank you to Ross Jones in recognition for his detailed GitHub Wiki on this subject which is captured in the last link concerning alternative-internet solutions and tools:  https://hyperboria.net/, https://github.com/redecentralize/alternative-internet

85. Benefits, Vulnerabilities, and the Ethics of Soldier Enhancement

[Editor’s Note: The United States Army Training and Doctrine Command (TRADOC) co-hosted the Mad Scientist Bio Convergence and Soldier 2050 Conference with SRI International at their Menlo Park, CA, campus on 8-9 March 2018, where participants discussed the advent of new biotechnologies and the associated benefits, vulnerabilities, and ethics associated with Soldier enhancement for the Army of the Future.  The following post is an excerpt from this conference’s final report.]

Source:  Max Pixel

Advances in synthetic biology likely will enhance future Soldier performance – speed, strength, endurance, and resilience – but will bring with it vulnerabilities, such as genomic targeting, that can be exploited by an adversary and/or potentially harm the individual undergoing the enhancement.

 

Emerging synthetic biology tools – e.g., CRISPR, Talon, and ZFN – present an opportunity to engineer Soldiers’ DNA and enhance their abilities. Bioengineering is becoming easier and cheaper as a bevy of developments are reducing biotechnology transaction costs in gene reading, writing, and editing. [1] Due to the ever-increasing speed and lethality of the future battlefield, combatants will need cognitive and physical enhancement to survive and thrive.

Cognitive enhancement could make Soldiers more lethal, more decisive, and perhaps more resilient. Using neurofeedback, a process that allows a user to see their brain activity in real-time, one can identify ideal brain states, and use them to enhance an individual’s mental performance. Through the mapping and presentation of identified expert brains, novices can rapidly improve their acuity after just a few training sessions. [2] Further, there are studies being conducted that explore the possibility of directly emulating those expert brain states with non-invasive EEG caps that could improve performance almost immediately. [3]  Dr. Amy Kruse, the Chief Scientific Officer at the Platypus Institute, referred to this phenomenon as “sitting on a gold mine of brains.”

There is also the potential to change and improve Soldier’s physical attributes. Scientists can develop drugs, specific dietary plans, and potentially use genetic editing to improve speed, strength, agility, and endurance.

Source: Andrew Herr, CEO Helicase

In order to fully leverage the capability of human performance enhancement, Andrew Herr, CEO of Helicase and an Adjunct Fellow at CNAS, suggested that human performance R&D be moved out of the medical field and become its own research area due to its differing objectives and the convergence between varying technologies.

Soldiers, Airmen, Marines, and Sailors are already trying to enhance themselves with commercial products – often containing unknown or unsafe ingredients – so it is incumbent on the U.S. military to, at the very least, help those who want to improve.

However, a host of new vulnerabilities, at the genetic level, accompany this revolutionary leap in human evolution. If one can map the human genome and more thoroughly scan and understand the brain, they can target genomes and brains in the same ways. Soldiers could become incredibly vulnerable at the genomic level, forcing the Army to not only protect Soldiers using body armor and armored vehicles, but also protect their identities, genomes, and physiologies.

Adversaries will exploit all biological enhancements to gain competitive advantage over U.S. forces. Targeted genome editing technology such as CRISPR will enable adversarial threats to employ super-empowered Soldiers on the battlefield and target specific populations with bioweapons. U.S. adversaries may use technologies recklessly to achieve short term gains with no consideration of long range effects. [4] [5]

There are numerous ethical questions that come with the enhancement of Soldiers such as the moral acceptability of the Army making permanent enhancements to Soldiers, the responsibility for returning transitioning Soldiers to a “baseline human,” and the general definition of what a “baseline human” is legally defined as.

Transhumanism H+ symbol by Antonu / Source:  https://commons.wikimedia.org/wiki/File:Transhumanism_h%2B.svg

By altering, enhancing, and augmenting the biology of the human Soldier, the United States Army will potentially enter into uncharted ethical territory. Instead of issuing items to Soldiers to complement their physical and cognitive assets, by 2050, the U.S. Army may have the will and the means to issue them increased biological abilities in those areas. The future implications and the limits or thresholds for enhancement have not yet been considered. The military is already willing to correct the vision of certain members – laser eye surgery, for example – a practice that could be accurately referred to as human enhancement, so discretely defining where the threshold lies will be important. It is already known that other countries, and possible adversaries, are willing to cross the line where we are not. Russia, most recently, was banned from competition in the 2018 Winter Olympics for widespread performance-enhancing drug violations that were believed to be supported by the Russian Government. [6] Those drugs violate the spirit of competition in the Olympics, but no such spirit exists in warfare.

Another consideration is whether or not the Soldier enhancements are permanent. By enhancing Soldiers’ faculties, the Army is, in fact, enhancing their lethality or their ability to defeat the enemy. What happens with these enhancements—whether the Army can or should remove them— when a Soldier leaves the Army is an open question. As stated previously, the Army is willing and able to improve eyesight, but does not revert that eyesight back to its original state after the individual has separated. Some possible moral questions surrounding Soldier enhancement include:

• If the Army were to increase a Soldier’s stamina, visual acuity, resistance to disease, and pain tolerance, making them a more lethal warfighter, is it incumbent upon the Army to remove those enhancements?

• If the Soldier later used those enhancements in civilian life for nefarious purposes, would the Army be responsible?

Answers to these legal questions are beyond the scope of this paper, but can be considered now before the advent of these new technologies becomes widespread.

Image by Leonardo da Vinci / Source: Flickr

If the Army decides to reverse certain Soldier enhancements, it likely will need to determine the definition of a “baseline human.” This would establish norms for features, traits, and abilities that can be permanently enhanced and which must be removed before leaving service. This would undoubtedly involve both legal and moral challenges.

 

The complete Mad Scientist Bio Convergence and Soldier 2050 Final Report can be read here.

To learn more about the ramifications of Soldier enhancement, please go to:

– Dr. Amy Kruse’s Human 2.0 podcast, hosted by our colleagues at Modern War Institute.

– The Ethics and the Future of War panel discussion, facilitated by LTG Jim Dubik (USA-Ret.) from Day 2 (26 July 2017) of the Mad Scientist Visualizing Multi Domain Battle in 2030-2050 Conference at Georgetown University.


[1] Ahmad, Zarah and Stephanie Larson, “The DNA Utility in Military Environments,” slide 5, presented at Mad Scientist Bio Convergence and the Soldier 2050 Conference, 8 March 2018.
[2] Kruse, Amy, “Human 2.0 Upgrading Human Performance,” Slide 12, presented at Mad Scientist Bio Convergence and the Soldier 2050 Conference, 8 March 2018
[3]https://www.frontiersin.org/articles/10.3389/fnhum.2016.00034/full
[4] https://www.technologyreview.com/the-download/610034/china-is-already-gene-editing-a-lot-of-humans/
[5] https://www.c4isrnet.com/unmanned/2018/05/07/russia-confirms-its-armed-robot-tank-was-in-syria/
[6] https://www.washingtonpost.com/sports/russia-banned-from-2018-olympics-following-doping-allegations/2017/12/05/9ab49790-d9d4-11e7-b859-fb0995360725_story.html?noredirect=on&utm_term=.d12db68f42d1

84. Quantum Surprise on the Battlefield?

[Editor’s Note:  In the following guest blog post, Mad Scientist Elsa B. Kania addresses quantum technology and the potential ramifications should the People’s Republic of China (PRC) win the current race in fielding operational quantum capabilities].

If China were to succeed in realizing the full potential of quantum technology, the Chinese People’s Liberation Army (PLA) might have the capability to offset core pillars of U.S. military power on the future battlefield.  Let’s imagine the worst-case (or, for China, best-case) scenarios.

The Chinese military and government could leverage quantum cryptography and communications to enable “perfect security” for its most sensitive information and communications. The PLA may look to employ ‘uncrackable’ quantum key distribution (QKD), which involves the provably secure exchange of keys in quantum states, over fiber optic networks for secure command and control, while extending the range of its quantum networks to more far-flung units or even ships at sea, through an expanding constellation of quantum satellites.

If China were to ‘go dark’ to U.S. intelligence capabilities as a result, then a new level of uncertainty could complicate U.S. calculus and assessments, while exacerbating the risks of surprise or misperception in a crisis or conflict scenario.

China’s massive investments in quantum computing could succeed someday in the decadal marathon towards a fully functional and universal quantum computer.

Liaoning Exercise in the West Pacific / Source: Flickr by rhk111

If developed in secret or operational sooner than expected, then these immense computing capabilities could be unleashed to break public key cryptography. Such asymmetric cryptography, which today is quite prevalent and integral to the security of our information technology ecosystem, relies upon the difficulty of prime factorization, a task beyond the capabilities of today’s classical computers but that could be cracked by a future quantum computer. The impact could be analogous to the advantage that the U.S. achieved through the efforts of American code-breakers ahead of the Battle of Midway.

Although there will be options available for ‘quantum-proof’ encryption, the use of public key cryptography could remain prevalent in older military and government information systems, such as legacy satellites. Moreover, any data previously collected while encrypted could be rapidly decrypted and exploited, exposing perhaps decades of sensitive information. Will the U.S. military and government take this potential security threat seriously enough to start the transition to quantum-resistant alternatives?

Future advances in quantum computing could be game changers for intelligence and information processing. In a new era in which data is a critical resource, the ability to process it rapidly is at a premium. In theory, quantum computing could also accelerate the development of artificial intelligence towards a closer approximation to “superintelligence,” provoking concerns of unexpected, by some accounts even existential, risks and powerful capabilities.

PLA Navy Kilo-Class Submarine / Source: Took-ranch at English Wikipedia https://commons.wikimedia.org/w/index.php?curid=12184725

Meanwhile, based on active efforts in the Chinese defense industry, the next generation of Chinese submarines could be equipped with a ‘quantum compass’ to enable greater precision in positioning and independence from space-based navigation systems, while perhaps also leveraging quantum communications underwater for secure control and covert coordination.

The PLA might realize its ambitions to develop quantum radar that could be the “nemesis” of U.S. stealth fighters and bolster Chinese missile defense. This “offset” technology could overcome the U.S. military’s advantage in stealth. Similarly, the ‘spooky’ sensitivity in detection enabled by techniques such as ghost imaging and quantum remote sensing could enhance PLA ISR capabilities.

In the aggregate, could China’s future advances in these technologies change the balance of power in the Indo-Pacific?

Su-27 Flanker fighter / Source: DoD photo by Staff Sgt. D. Myles Cullen

For China, the potential to disrupt paradigms of information dominance through quantum computing and cryptography, while perhaps undermining U.S. advantages in stealth technologies through quantum radar and sensing, and even more actively contesting the undersea domain, could create a serious challenge to U.S. military-technological predominance.

Perhaps, but this imagining of impactful military applications of quantum technology is far from a reality today. For the time being, these technologies still confront major constraints and limitations in their development.

It seems unlikely that quantum cryptography will ever enable truly perfect security, given the perhaps inevitable human and engineering challenges, along with remaining vulnerabilities to exploitation.

At present, quantum computing, while approaching the symbolic milestone of “quantum supremacy,” faces a long road ahead, due to challenges of scaling and error correction.

Certain quantum devices, for sensing, metrology, and positioning, may be quite useful but could enable fairly incremental, evolutionary improvements relative to the full range of alternatives.

There are also reasons to consider critically when Chinese official media discloses (especially in English) oft-hyped advances such as in quantum radar – since reporting on such apparent progress could be variously intended for purposes of signaling or perhaps even misdirection.

National Institute of Standards and Technology (NIST) neutral-atom quantum processors — prototype devices which designers are trying to develop into full-fledged quantum computers  https://www.flickr.com/photos/usnistgov/5940500587/

Although China’s advances and ambitions should be taken quite seriously – particularly considering the talent and resources evidently mobilized to advance these objectives – the U.S. military may also be well postured to leverage quantum technology on the future battlefield.

 

Inevitably, the timeframe for the actual operationalization of these technologies is challenging to evaluate, especially because a significant proportion of the relevant research may be occurring in secret.

For that reason, it is also difficult to determine with confidence whether the U.S. or China is truly leading in the advancement of various disciplines of quantum science.

Moreover, beyond concerns of competition between the U.S. and China, exciting research is occurring worldwide, from Canada and Europe to Australia, often with tech companies and start-ups at the forefront of the development and commercialization of these technologies.

Looking forward, the trajectory of this second quantum revolution will play out over decades to come. Future successes will require sustained investments, such as those China is actively pursuing in the range of tens of billions.

As the Chinese military and defense industry start testing and experimenting with quantum technology, the U.S. military should also explore further the potential – and evaluate the limitations – of these capabilities, including through deepening public-private partnership.

As China challenges American leadership in innovation, the U.S. military and government should recognize the real risks of future surprises that could result from truly ‘made in China’ innovation, while also taking full advantage of the opportunities to impose surprise upon strategic competitors.

The above blog post is based on the recently published Center for a New American Security (CNAS) report entitled Quantum Hegemony? – China’s Ambitions and the Challenges to U.S. Innovation Leadership, co-authored by Ms. Elsa Kania and  Mr. John Costello.  Mad Scientist believes that this report is the best primer on the current state of quantum technology.  Note that quantum science – communication, computing, and sensing – was previously addressed by the Mad Scientist Laboratory as a Pink Flamingo.

Ms. Kania was proclaimed an official Mad Scientist following her presentation on PLA Human-Machine Integration at the Bio Convergence and Soldier 2050 Conference at SRI International, Menlo Park, 8-9 March 2018.  Her podcast from this event, China’s Quest for Enhanced Military Technology, is hosted by Modern War Institute.

Disclaimer: The views expressed in this article belong to the author alone and do not represent the Department of Defense, the U.S. Army, or the U.S. Army Training and Training Doctrine Command.

Ms. Kania is an Adjunct Fellow with the Technology and National Security Program at CNAS.

83. A Primer on Humanity: Iron Man versus Terminator

[Editor’s Note: Mad Scientist Laboratory is pleased to present a post by guest blogger MAJ(P) Kelly McCoy, U.S. Army Training and Doctrine Command (TRADOC), with a theme familiar to anyone who has ever debated super powers in a schoolyard during recess. Yet despite its familiarity, it remains a serious question as we seek to modernize the U.S. Army in light of our pacing threat adversaries. The question of “human-in-the-loop” versus “human-out-of-the-loop” is an extremely timely and cogent question.]

Iron Man versus Terminator — who would win? It is a debate that challenges morality, firepower, ingenuity, and pop culture prowess. But when it comes down to brass tacks, who would really win and what does that say about us?

Mad Scientist maintains that:

  • Today: Mano a mano, Iron Man’s human ingenuity, grit, and irrationality would carry the day; however…
  • In the Future: Facing the entire Skynet distributed neural net, Iron Man’s human-in-the-loop would be overwhelmed by a coordinated, swarming attack of Terminators.
Soldier in Iron Man-like exoskeleton prototype suit

Iron Man is the super-empowered human utilizing Artificial Intelligence (AI) — Just A Rather Very Intelligent System or JARVIS — to augment the synthesizing of data and robotics to increase strength, speed, and lethality. Iron Man utilizes autonomous systems, but maintains a human-in-the- loop for lethality decisions. Conversely, the Terminator is pure machine – with AI at the helm for all decision-making. Terminators are built for specific purposes – and for this case let’s assume these robotic soldiers are designed specifically for urban warfare. Finally, strength, lethality, cyber vulnerabilities, and modularity of capabilities between Iron Man and Terminator are assumed to be relatively equal to each other.

Up front, Iron Man is constrained by individual human bias, retention and application of training, and physical and mental fatigue. Heading into the fight, the human behind a super powered robotic enhancing suit will make decisions based on their own biases. How does one respond to too much information or not enough? How do they react when needing to respond while wrestling with the details of what needs to be remembered at the right time and space? Compounding this is the retention and application of the individual human’s training leading up to this point. Have they successfully undergone enough repetitions to mitigate their biases and arrive at the best solution and response? Finally, our most human vulnerability is physical and mental fatigue. Without adding in psychoactive drugs, how would you respond to taking the Graduate Record Examinations (GRE) while simultaneously winning a combatives match? How long would you last before you are mentally and physically exhausted?

Terminator / Source: http://pngimg.com/download/29789

What the human faces is a Terminator who removes bias and optimizes responses through machine learning, access to a network of knowledge, options, and capabilities, and relentless speed to process information. How much better would a Soldier be with their biases removed and the ability to apply the full library of lessons learned? To process the available information that contextualizes environment without cognitive overload. Arriving at the optimum decision, based on the outcomes of thousands of scenarios.

Iron Man arrives to this fight with irrationality and ingenuity; the ability to quickly adapt to complex problems and environments; tenacity; and morality that is uniquely human. Given this, the Terminator is faced with an adversary who can not only adapt, but also persevere with utter unpredictability. And here the Terminator’s weaknesses come to light. Their algorithms are matched to an environment – but environments can change and render algorithms obsolete. Their energy sources are finite – where humans can run on empty, Terminators power off. Finally, there are always glitches and vulnerabilities. Autonomous systems depend on the environment that it is coded for – if you know how to corrupt the environment, you can corrupt the system.

Ultimately the question of Iron Man versus Terminator is a question of time and human value and worth. In time, it is likely that the Iron Man will fall in the first fight. However, the victor is never determined in the first fight, but the last. If you believe in human ingenuity, grit, irrationality, and consideration, the last fight is the true test of what it means to be human.

Note:  Nothing in this blog is intended as an implied or explicit endorsement of the “Iron Man” or “Terminator” franchises on the part of the Department of Defense, the U.S. Army, or TRADOC.

Kelly McCoy is a U.S. Army strategist officer and a member of the Military Leadership Circle. A blessed husband and proud father, when he has time he is either brewing beer, roasting coffee, or maintaining his blog (Drink Beer; Kill War at: https://medium.com/@DrnkBrKllWr). The views expressed in this article belong to the author alone and do not represent the Department of Defense.

82. Bias and Machine Learning

[Editor’s Note:  Today’s post poses four central questions to our Mad Scientist community of action regarding bias in machine learning and the associated ramifications for artificial intelligence, autonomy, lethality, and decision-making on future warfighting.]

We thought that we had the answers, it was the questions we had wrong” – Bono, U2

Source: www.vpnsrus.com via flickr

As machine learning and deep learning algorithms become more commonplace, it is clear that the utopian ideal of a bias-neutral Artificial Intelligence (AI) is exactly just that. These algorithms have underlying biases embedded in their coding, imparted by their human programmers (either consciously or unconsciously). These algorithms can develop further biases during the machine learning and training process.  Dr. Tolga Bolukbasi, Boston University, recently described algorithms as not being capable of distinguishing right from wrong, unlike humans that can judge their actions, even when they act against ethical norms. For algorithms, data is the ultimate determining factor.

Realizing that algorithms supporting future Intelligence, Surveillance, and Reconnaissance (ISR) networks and Commander’s decision support aids will have inherent biases — what is the impact on future warfighting? This question is exceptionally relevant as Soldiers and Leaders consider the influence of biases in man-machine relationships, and their potential ramifications on the battlefield, especially with regard to the rules of engagement (i.e., mission execution and combat efficiency versus the proportional use of force and minimizing civilian casualties and collateral damage).

It is difficult to make predictions, particularly about the future.” This quote has been attributed to anyone ranging from Mark Twain to Niels Bohr to Yogi Berra. Point prediction is a sucker’s bet. However, asking the right questions about biases in AI is incredibly important.

The Mad Scientist Initiative has developed a series of questions to help frame the discussion regarding what biases we are willing to accept and in what cases they will be acceptable. Feel free to share your observations and questions in the comments section of this blog post (below) or email them to us at:  usarmy.jble.tradoc.mbx.army-mad-scientist@mail.mil.

1) What types of bias are we willing to accept? Will a so-called cognitive bias that forgoes a logical, deliberative process be allowable? What about a programming bias that is discriminative towards any specific gender(s), ethnicity(ies), race(s), or even age(s)?

2) In what types of systems will we accept biases? Will machine learning applications in supposedly non-lethal warfighting functions like sustainment, protection, and intelligence be given more leeway with regards to bias?

3) Will the biases in machine learning programming and algorithms be more apparent and/or outweigh the inherent biases of humans-in-the-loop? How will perceived biases affect trust and reliance on machine learning applications?

4) At what point will the pace of innovation and introduction of this technology on the battlefield by our adversaries cause us to forego concerns of bias and rapidly field systems to gain a decisive Observe, Orient, Decide, and Act (OODA) loop and combat speed advantage on the Hyperactive Battlefield?

For additional information impacting on this important discussion, please see the following:

An Appropriate Level of Trust… blog post

Ethical Dilemmas of Future Warfare blog post

Ethics and the Future of War panel discussion video