33. Can TV and Movies Predict the Battlefield of the Future?

(Editor’s Note: Mad Scientist Laboratory is pleased to present Dr. Peter Emanuel’s guest blog post, illustrating how popular culture often presages actual technological advancements and scientific breakthroughs.)

Did Dick Tracy’s wrist watch telephone or Star Trek’s communicator inspire future generations of scientists and engineers to build today’s smartphone? Or were they simply depicting the inevitable manifestation of future technology? If we look back on old issues of Superman comic books that depict a 3D printer half a century before it was invented, we can see popular media has foreshadowed future technology, time and time again. Clearly, there are many phenomena, from time travel to force fields, that have not, and may not ever see the light of day; however, there are enough examples to suggest that dedicated and forward thinking scientists, trying to defend the United States, should consider this question:

Can comic books, video games, television, and movies give us a glimpse into the battlefield of the future?

For today’s Mad Scientist blog, consider what the future may hold for defense against weapons of mass destruction.

Let’s get the 800 lb. gorilla out of the room first! Or, perhaps, the 800 lb. dinosaur by talking about biological warfare in the future. The movie Jurassic Park depicts the hubris of man trying to control life by “containing” its DNA. Our deeper understanding of DNA shows us that life is programmed to be redundant and error prone. It’s actually a fundamental feature that drives evolution. In the year 2050, if we are to control our genetically modified products, we must master containment and control for a system designed since the dawn of time to NOT be contained. Forget bio-terror…What about bio-Error?! Furthermore, the lesson in Jurassic Park from the theft of the frozen dinosaur eggs shows us the asymmetric impact that theft of genetic products can yield. Today, our adversaries amass databases on our genetic histories through theft and globalization and one only has to ask, “What do they know that we should be worried about?”

Let’s move from biology to chemistry. A chemist will argue that biology is just chemistry, and at some level it’s true. Like the movie Outlander and anime like Cowboy Bebop, today’s Middle East battlefield shows the use of CAPTAGON, an addictive narcotic blend used to motivate and subjugate radical Islamists. In 2050, our mastery of tailored chemistry will likely lead to more addictive or targeted drug use that could elicit unpredictable or illogical behaviors. Controlled delivery of mood/behavior altering drugs will frustrate efforts to have a military workforce managed by reliability programs and will require layered and redundant controls even on trusted populations. Such vulnerabilities will likely be a justification for placing weapons and infrastructure under some level of artificial intelligence in the year 2050. Imagine this is the part of the blog where we talked about the Terminator and CyberDyne Systems.

Today, the thought of man-machine interfaces depicted by the Borg from Star Trek and the TV shows such as Aeon Flux and Ghost in the Shell may make our skin crawl. In 2050, societal norms will likely evolve to embrace these driven by the competitive advantage that implants and augmentation affords. Cyborgs and genetic chimeras will blur the line between what is man and what is machine; it will usher in an era when a computer virus can kill, and it will further complicate our ability to identify friend from foe in a way best depicted by the recent Battlestar Galactica TV show. Will the point of need manufacturing systems of the future be soulless biological factories like those depicted in Frank Herbert’s book series, “Dune”? As we prepare for engaging in a multi-domain battlespace by extending our eyes and ears over the horizon with swarming autonomous drones are we opening a window into the heart and mind of our future fighting force?

Some final thoughts for the year 2050 when we maintain a persistent presence off planet Earth. As Robert Heinlein predicted, and recent NASA experiments proved, our DNA changes during prolonged exposure to altered gravity. What of humans who never stepped foot on Earth’s surface, as shown in the recent movie, The Fate of our Stars. Eventually, non-terrestrially based populations will diverge from the gene pool, perhaps kindling a debate on what is truly human? Will orbiting satellites with hyperkinetic weapons such as were pictured in GI Joe Retaliation add another dimension to the cadre of weapons of mass destruction? I would argue that popular media can help spur these discussions and give future mad scientists a glimpse into the realm of the possible. To that end, I think we can justify a little binge watching in the name of national security!

If you enjoyed this post, please check out the following:

– Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is co-sponsoring the Bio Convergence and Soldier 2050 Conference with SRI International at Menlo Park, California, on 08-09 March 2018. Click here to learn more about the conference, the associated on-line game, and then watch the live-streamed proceedings, starting at 0840 PST / 1140 EST on 08 March 2018.

– Our friends at Small Wars Journal are continuing to publish the finalists from our most recent Call for Ideas — click here to check them out!


Dr. Peter Emanuel is the Army’s Senior Research Scientist (ST) for Bioengineering. In this role, he advises Army Leadership on harnessing the opportunities that synthetic biology and biotechnology can bring to National Security.

32. Virtual War – A Revolution in Human Affairs (Part I)

(Editor’s Note: Originally published under the same title in Small Wars Journal, Mad Scientist Laboratory is pleased to have COL(R) Stefan J. Banach distill his compelling article into several guest blog posts. The article is a crystal clear clarion call for the need to design a lasting national technology-based policy, strategy, and doctrine in the face of increasingly agile adversaries.)

War, of any kind, is the ultimate failure of mankind. Yet, in the course of human endeavors, we have found another way in which to wage global war – in this case, Virtual War in Virtual Battle Space. The “Technology Singularity” espoused by Vernor Vinge and Ray Kurzweil, is the fundamental source and accelerant for Virtual War. The Vinge and Kruzweil articulation of the “Singularity” of biological and machine intelligence is much closer than most of us understand. The majority of the people in the world are caught up in the inertia of everyday activities, and the emergence of Virtual War is opaque to most of us. To that end and for clarity, the world is experiencing Virtual War – A Revolution in Human Affairs.

Virtual War transcends the “normal” revolutions in military affairs or traditional security rubrics that are discussed in Pentagon forums, within the defense industrial base, and among law enforcement agencies. Virtual War is drastically transforming global human affairs as we know them, and in ways that we do not yet understand. Eric Schmidt got it right when he opined that,

“the Internet is the first thing that humanity has built that humanity doesn’t understand, it is the largest experiment in anarchy that we have ever had.”

Virtual War is a global systems approach to achieve social control. Virtual War heuristics include: offensive and defensive cyber capabilities, social media, information operations (e.g., “Fake News”), artificial intelligence, stealth technologies, and cloaking techniques. The end game is to control and influence the will of a person, group, or larger population to achieve ideological objectives over time in support of a cause or a specific sponsor.

The United States, and indeed the world, is experiencing the birth pains of the coming exponential technological change that Vinge and Kurzweil predicted in the 1990’s, and in 2005. Let the drastically reduced lifespans of commercial companies be a guide in this regard. The average age of an S&P 500 company is currently under 20 years, decreased from 60 years in the 1950s, according to Credit Suisse. The Wall Street firm says the trend is accelerating and blames the disruption on unprecedented technological advancements. In that vein, Andy Serwer, Editor-in-Chief of Yahoo Finance, asked this important question at the 2018 Davos World Economic Forum,

If robots, AI, nanotechnology, machine learning, and 3D printing are going to be doing all the work, what the heck will human beings do nine to five?

This question portends more challenges than simply the re-training and the re-education of a pending massive unemployed work force. The world has seen, since the events on 9/11, that large populations of unemployed or under-employed people are not helpful in terms of maintaining global security and stability.

Tangentially, sixteen years of attrition warfare and the banality associated with fighting predominantly in Physical Battle Space are financially unsustainable. The National Security Act of 1947, which is the basis of U.S. National Security, is seventy-one years old and is collapsing under the weight of Virtual War exigencies. As Peter Drucker noted,

“The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic.”

The new normal, inherent in Virtual War, is the unprecedented kinetic maneuvering of one civilian population against another, which has produced hundreds of mass casualty events around the world since 9/11. The civilian vs. civilian terror attacks on 9/11 were planned using the Internet of Things (IoTs) – in Virtual Space – prior to the execution of the physical attacks on the respective civilian targets in the United States. Hundreds of other terror attacks have taken place around the world since 9/11, and were planned and coordinated in Virtual Space before the horrific attacks took place in Physical Space. What will the world’s security paradigm for warfare and law enforcement look like when the Internet of Things (IoTs) evolves to the Internet of Everything (IoET), that includes much more powerful Nano-Biologically enhanced human beings?

Non-lethal Virtual Space activities also occur continuously around the world in social and political domains that target domestic and foreign matters, with the aim to gain and maintain control of a particular narrative to influence an audience to act in a certain ideological manner. The growing liminality which exists today, by way of virtual space activity, is causing a truth crisis, as the velocity of human interaction and the velocity of information is at an all-time high. The average person does not know what to believe given the ubiquity of information and the obvious bias in government and within traditional and non-traditional media sources.

On the socio-economic front, there is a growing divide between the rich and poor, as the middle class struggles with sustainability. There is also a widening chasm between globalist and nationalist. The 1648 Westphalian nation-state model is at odds with a growing number of emergent empowered actors who do not rely on monolithic state entities to govern their behavior in virtual or physical space. Each of these aforementioned variables are all interdependently joined and, to varying degrees, are technologically driven fissures in the world today.

Per Kurzweil’s prose, future changes will be tantamount to a technological tsunami – which is now at our doorstep, in the context of the evolutionary timeline. Given the accelerating pace of technological advancements, we should expect significant social change. An unprecedented rupture of all the classic learning, leadership, management, strategy development, planning, and governance archetypes that are in existence today is absolutely possible. This externality will move the world from its current state of complexity to chaos. The end result will be the first of many instances where biological and machine intelligence forever transforms warfare and our existence as we know it.

The pending exponential technological advancements will move civilization to a completely new era. This will be an era where humans will not be able to survive without machine intelligence, augmented synthetic strength, and artificial stealth capabilities on the web or in physical space. Subterranean and extra-terrestrial options will be sought to support life and will be made possible by new technological advancements that were previously unimaginable. The nation-state or actors who can learn the fastest, and optimally frame and reframe their strategies the best, will rule the day in a world that fights predominantly in Virtual Space, and only as necessary in Physical Space, as it is too costly on multiple fronts.

Additional Mad Scientist items interest include:

A New National Security Innovation Base — New America is hosting a live and on-line event today, Monday, 26 Feb 18, that will address what America’s National Security Innovation Base looks like in the 21st century and how to protect and channel its power. For more information regarding this event, click here.

Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is co-sponsoring the Bio Convergence and Soldier 2050 Conference with SRI International at Menlo Park, California, on 08-09 March 2018. Click here to learn more about the conference and then watch the live-streamed proceedings, starting at 0840 PST / 1140 EST on 08 March 2018.

COL(R) Stefan J. Banach concluded his military service as the U.S. Army’s 11th Director of the School of Advanced Military Studies (SAMS). As the SAMS Director, he led the development of the initial Design Methodology concepts and doctrine for the U.S. Army from 2007-2010. He is a Distinguished Member of the 75th Ranger Regiment and served in that organization for nine years, culminating with command of the 3rd Ranger Battalion from 2001-2003.

31. Top Ten Bio Convergence Trends Impacting the Future Operational Environment

As Mad Scientist Laboratory has noted in previous blog posts, War is an intrinsically human endeavor. Rapid innovations in the biological sciences are changing how we work, live, and fight. Drawing on the past two years of Mad Scientist events, we have identified a change in the character of war driven by the exponential convergence of bio, neuro, nano, quantum, and information. This convergence is leading to revolutionary achievements in sensing, data acquisition and retrieval, and computer processing hardware; creating a new environment in which humans must co-evolve with these technologies. Mad Scientist has identified the following top ten bio convergence trends associated with this co-evolution that will directly impact the Future Operational Environment (OE).

1) Bio convergence with advanced computing is happening at the edge. Humans will become part of the network connected through their embedded and worn devices. From transhumanism to theorizing about uploading the brain, the Future OE will not be an internet of things but the internet of everything (including humans).

2) The next 50 years will see an evolution in human society; we will be augmented by Artificial Intelligence (AI), partner with AI in centaur chess fashion, and eventually be eclipsed by AI.


3) This augmentation and enhanced AI partnering will require hyper-connected humans with wearables and eventually embeddables to provide continuous diagnostics and human-machine interface.


4) The Army will need to measure cognitive potential and baseline neural activity of its recruits and Soldiers.




5) The Army needs new training tools to take advantage of neuralplasticity and realize the full cognitive potential of Soldiers. Brain gyms and the promise of Augmented and Virtual Reality (AR/VR) training sets could accelerate learning and, in some cases, challenge the tyranny of “the 10,000 hour rule.”

6) Human enhancement, the unlocking of the genome, and improving AI will stress the Army’s policies and ethics. In any case, potential adversaries are exploring using all three of these capabilities as a way to gain advantage over U.S. Forces. This is not a 2050 problem but more than likely a 2030 reality.

7) Asymmetric Ethics, where adversaries make choices we will not (e.g., manipulating the DNA of pathogens to target specific genome populations or to breed “super” soldiers) will play a bigger part in the future. This is not new, but will be amplified by future technologies. Bio enhancements will be one of the areas and experimentation is required to determine our vulnerabilities.

8) Cognitive enhancement and attacking the human brain (neurological system) is not science fiction. The U.S. Army should establish a Program Executive Office (PEO) for Soldier Enhancement to bring unity of purpose to a range of possibilities from physical/mental enhancement with wearables, embeddables, stimulants, brain gyms, and exoskeletons.

9) Chemical and bio defense will need to be much more sophisticated on the next battlefield. The twin challenges of democratization and proliferation have resulted in a world where the capability of engineering potentially grave bio-weapons, once only the purview of nation states and advance research institutes and universities, is now available to Super-Empowered Individuals, Violent Non-State Actors (VNSA), and criminal organizations.

10) We are missing the full impact of bio on all emerging trends. We must focus beyond human enhancement and address how bio is impacting materials, computing, and garage level, down scaled innovation.


Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is co-sponsoring the Bio Convergence and Soldier 2050 Conference with SRI International at Menlo Park, California, on 08-09 March 2018. Click here to learn more about the conference and then watch the live-streamed proceedings, starting at 0840 PST / 1140 EST on 08 March 2018.


Also note that our friends at Small Wars Journal have published the first paper from our series of Soldier 2050 Call for Ideas finalists — enjoy!

30. Leveraging Artificial Intelligence and Machine Learning to Meet Warfighter Needs

(Editor’s Note: The Mad Scientist Laboratory is pleased to present a companion piece to last Thursday’s post that addressed human-machine networks and their cross-domain effects. On 10 January 2018, CAPT George Galdorisi, (U.S. Navy-Ret.), presented his Mad Scientist Speaker Series topic entitled, Designing Unmanned Systems For the Multi-Domain Battle. CAPT Galdorisi has distilled the essence of this well-received presentation into the following guest blog post — enjoy!)

The U.S. military no longer enjoys technological superiority over a wide-range of potential adversaries. In the words of former Deputy Secretary of Defense Robert Work, “Our forces face the very real possibility of arriving in a future combat theater and finding themselves facing an arsenal of advanced, disruptive technologies that could turn our previous technological advantage on its head — where our armed forces no longer have uncontested theater access or unfettered operational freedom of maneuver.”

SILENT RUIN: Written by Brian David Johnson • Creative Direction: Sandy Winkelman
Illustration: Don Hudson & Kinsun Lo • Brought to you by Army Cyber Institute at West Point

The Army Cyber Institute’s graphic novel, Silent Ruin, posits one such scenario.

In order to regain this technological edge, the Department of Defense has crafted a Third Offset Strategy and a Defense Innovation Initiative, designed to help the U.S. military regain technological superiority. At the core of this effort are artificial intelligence, machine learning, and unmanned systems.

Much has been written about efforts to make U.S. military unmanned systems more autonomous in order to fully leverage their capabilities. But unlike some potential adversaries, the United States is not likely to deploy fully autonomous machines. An operator will be in the loop. If this is the case, how might the U.S. military best exploit the promise offered by unmanned systems?

One answer may well be to provide “augmented intelligence” to the warfighter. Fielding unmanned vehicles that enable operators to teach these systems how to perform desired tasks is the first important step in this effort. This will lead directly to the kind of human-machine collaboration that transitions the “artificial” nature of what the autonomous system does into an “augmented” capability for the military operator.

But this generalized explanation begs the question — what would augmented intelligence look like to the military operator? What tasks does the warfighter want the unmanned system to perform to enable the Soldier, Sailor, Airman, or Marine in the fight to make the right decision quickly in stressful situations where mission accomplishment must be balanced against unintended consequences?

Consider the case of an unmanned system conducting a surveillance mission. Today, an operator receives streaming video of what the unmanned system sees, and in the case of aerial unmanned systems, often in real-time. But this requires the operator to stare at this video for hours on end (the endurance of the U.S. Navy’s MQ-4C Triton is thirty hours). This concept of operations is an enormous drain on human resources, often with little to show for the effort.

Using basic augmented intelligence techniques, the MQ-4C can be trained to deliver only that which is interesting and useful to its human partner. For example, a Triton operating at cruise speed, flying between San Francisco and Tokyo, would cover the five-thousand-plus miles in approximately fifteen hours. Rather than send fifteen hours of generally uninteresting video as it flies over mostly empty ocean, the MQ-4C could be trained to only send the video of each ship it encounters, thereby greatly compressing human workload.


Taken to the next level, the Triton could do its own analysis of each contact to flag it for possible interest. For example, if a ship is operating in a known shipping lane, has filed a journey plan with the proper maritime authorities, and is providing an AIS (Automatic Identification System) signal; it is likely worthy of only passing attention by the operator, and the Triton will flag it accordingly. If, however, it does not meet these criteria (say, for example, the vessel makes an abrupt course change that takes it well outside normal shipping channels), the operator would be alerted immediately.

For lethal military unmanned systems, the bar is higher for what the operator must know before authorizing the unmanned warfighting partner to fire a weapon — or as is often the case — recommending that higher authority authorize lethal action. Take the case of military operators managing an ongoing series of unmanned aerial systems flights that have been watching a terrorist and waiting for higher authority to give the authorization to take out the threat using an air-to-surface missile fired from that UAS.

Using augmented intelligence, the operator can train the unmanned aerial system to anticipate what questions higher authority will ask prior to giving the authorization to fire, and provide, if not a point solution, at least a percentage probability or confidence level to questions such as:

• What is level of confidence this person is the intended target?

• What is this confidence based on?

– Facial recognition

– Voice recognition

– Pattern of behavior

– Association with certain individuals

– Proximity of known family members

– Proximity of known cohorts

• What is the potential for collateral damage to?

– Family members

– Known cohorts

– Unknown persons

• What are the potential impacts of waiting versus striking now?

These considerations represent only a subset of the kind of issues operators must train their unmanned systems armed with lethal weapons to deal with. Far from ceding lethal authority to unmanned systems, providing these systems with augmented intelligence and leveraging their ability to operate inside the enemy’s OODA loop, as well as ours, enables these systems to free the human operator from having to make real-time (and often on-the-fly-decisions) in the stress of combat.

Designing this kind of augmented intelligence into unmanned systems from the outset will ultimately enable them to be effective partners for their military operators.

If you enjoyed this post, please note the following Mad Scientist events:

– Our friends at Small Wars Journal are publishing the first five selected Soldier 2050 Call for Ideas papers during the week of 19-23 February 2018 (one each day) on their Mad Scientist page.

– Mark on your calendar the next Mad Scientist Speaker Series, entitled “A Mad Scientist’s Lab for Bio-Convergence Research, presented by Drs. Cooke and Mezzacappa, from RDECOM-ARDEC Tactical Behavior Research Laboratory (TBRL), scheduled for 27 February 2018 at 1300-1400 EST.

– Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is co-sponsoring the Bio Convergence and Soldier 2050 Conference with SRI International at Menlo Park, California, on 08-09 March 2018. This conference will be live-streamed; click here to watch the proceedings, starting at 0840 PST / 1140 EST on 08 March 2018.

CAPT George Galdorisi, (U.S. Navy–Ret.), is Director for Strategic Assessments and Technical Futures at SPAWAR Systems Center Pacific. Prior to joining SSC Pacific, he completed a 30-year career as a naval aviator, culminating in fourteen years of consecutive service as executive officer, commanding officer, commodore, and chief of staff.

29. Engaging Human-Machine Networks for Cross-domain Effects

(Editor’s Note: While war will remain an enduring human endeavor for the foreseeable future, engaging human networks will require a greater understanding of robotics, artificial intelligence, autonomy, and the Internet of Everything. Future battlefield networks at the strategic, operational, and tactical levels will leverage these aforementioned technologies to radically change the character of war, increasing the reach, speed, and lethality of conflict. Mad Scientist Laboratory is pleased to present the following guest blog post by Mr. Victor R. Morris, addressing the global implications of human-machine teaming.)

The character of war, strategy development, and operational level challenges are changing; therefore operational approaches must do the same. Joint Publication 3-25 Countering Threat Networks includes versatile lines of effort to identify, neutralize, disrupt, or destroy threat networks. These efforts correspond with engaging diverse networks to reach mission objectives within the overall Network Engagement strategy. Network Engagement consists of three components: partnering with friendly networks, engaging neutral networks, and Countering Threat Networks (CTN).

To successfully engage networks and achieve the desired effects, more advanced human-machine collaborative networks need to be understood and evaluated. Human-machine networks are defined by the integration of autonomy and narrow artificial intelligence to accelerate processes, collective understanding, and effects. These networks exist in military operational systems and within interrelated diplomatic, information, and economic systems.

Photo Credit: RAND Monitoring Social Media Lessons for Future Department of Defense Social Media Analysis in Support of Information Operations

This post analyzes collaborative networks using Network Engagement’s Partnering, Engaging and Countering (PEC) model. The intent is to outline a requirement for enhanced Network Engagement involving human-machine collaboration. An enhanced approach accelerates Joint and multinational engagement capabilities to achieve cross-domain effects in a convergent operational environment. Cross-domain effects are achieved through synchronized capabilities and overmatch in the interconnected physical domains, information environment, and cyberspace.

PEC Model: Partnering with friendly networks, engaging neutral networks, and countering threat networks

The Multi-Domain Battle concept addresses the extended battlefield and large-scale combat through Joint reconnaissance, offensive, and defensive operations to reach positions of relative advantage.

Collective defense treaties and Joint security cooperation consist of both foreign internal defense and security force assistance to deter conflict. Foreign internal defense, when approved, involves combat operations during a state of war.

First, Joint Forces may be required to partner with host nation forces and engage hostile elements with offensive operations to return the situation to a level controllable by the host nation. Additionally, defensive tasks may be required to counter the enemy’s offense and engage the population and interconnected “internet of things.” Protection determines which threats disrupt operations and the rule of law, and then counters or mitigates those threats. Examples of specific collaborative and networked threats include cyber attacks, electronic attack, explosive hazards, improvised weapons, unmanned aerial and ground systems, and weapons of mass destruction. Battle networks are technologically enhanced Anti-Access/Area Denial (A2/AD) human-machine combat capabilities that integrate defense systems for territorial defense and/or protected coercive activities.

Source:
http://globalbalita.com/wp-content/uploads/2014/03/A2AD-offensive-against-Japan.jpg

Furthermore, countering networks requires an understanding of great powers competition and political ends. Geopolitical competitors develop strategies across the continuum of conflict relative to rival advantages and national interests. These strategies emphasize both direct and indirect approaches across all domains to reach political ends. A mixed approach facilitates statecraft and unbounded policy to offset perceived disadvantages, deliver key narratives, and shape international norms.

Intergovernmental Military Alliances
Photo credit: Wikimedia

The collaborative networks that possess distinctive ways to achieve political objectives include:

1) Conventional Joint and irregular proxy forces with integrated air, ground, and sea defense capabilities

2) Emergent and disruptive technological networks

3) Super-empowered individuals and asymmetric proxy networks

Examples of emergent and disruptive technologies are artificial intelligence, advanced robotics, internet of things consisting of low-cost sensors, and additive manufacturing (3D printing).

Client states and proxy networks present significant challenges for Joint and multinational alliances when used as a key component of a competitor’s grand strategy. Proxy networks, however, are not limited to non-state paramilitary or insurgent networks. These un-attributable organizations also include convergent terrorist, transnational organized crime, and international hacker organizations.

Here the Syrian rebels are a proxy for the United States, and the Syrian government a proxy for Russia.
Image Credit: Thomas Leger

Multinational companies, political parties, and civic groups also act as proxy networks with access to high-end technologies and geo-economic capabilities. Geo-economics refers to the use of economic instruments to manipulate geopolitical objectives. These networks then either blend and cooperate or compete with other proxy actors, based on various motivations and incentives.

Adversaries will also use artificial intelligence networks as proxies to deliver more deniable and innovative attacks. The efficacy of multi-domain networks with human-machine teaming correlates to partnering, engaging, and countering activities designed to shape, deter, and win.

Source:
https://www.hackread.com/darpa-squad-x-help-troops-pinpoint-enemy-in-warfare/

Finally, operational approaches designed to force critical factors analysis, decision-making, and assessments are critical to understanding human and technologically-enabled 21st century competition and conflict. The Joint Operational Area must be assessed as one extended domain with resilient strategic network configurations designed to partner with, engage, and counter diverse systems.

Mission command through human-machine teaming, networks, and systems integration is inevitable and will leverage human adaptability, automated speed, and precision as future capabilities. The global competition for machine intelligence dominance is becoming a key element of both the changing character of war and technical threat to strategic stability.

Modifying doctrine to account for advances in autonomy, narrow artificial intelligence, and quantum computing is inevitable, and human-machine teaming has global implications.

If you enjoyed this post, please note:

  • U.S. Army Training and Doctrine Command (TRADOC) G-2’s Red Diamond Threats Newsletter, Volume 8, Issue 10 October 2017 addresses Russian “Snow Dome” A2/AD human-machine combat capabilities on pages 7-12.

  • The transformative impact of AI, robotics, and autonomy on our Soldiers and networks in future conflicts is further addressed in Redefining the Role of Soldiers on the Future Battlefield.

  • Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is co-sponsoring the Bio Convergence and Soldier 2050 Conference with SRI International at Menlo Park, California, on 08-09 March 2018. This conference will be live-streamed; click here to watch the proceedings, starting at 0840 PST / 1140 EST on 08 March 2018. Ms. Elsa Kania, Adjunct Fellow, Center for New American Security (CNAS), will address “People’s Liberation Army (PLA) Human-Machine Integration” on Day 2 (09 March 2018) of the Conference.



Victor R. Morris is a civilian irregular warfare and threat mitigation instructor at the Joint Multinational Readiness Center (JMRC) in Germany.