[Editor’s Note: Today’s post poses four central questions to our Mad Scientist community of action regarding bias in machine learning and the associated ramifications for artificial intelligence, autonomy, lethality, and decision-making on future warfighting.]
“We thought that we had the answers, it was the questions we had wrong” – Bono, U2
As machine learning and deep learning algorithms become more commonplace, it is clear that the utopian ideal of a bias-neutral Artificial Intelligence (AI) is exactly just that. These algorithms have underlying biases embedded in their coding, imparted by their human programmers (either consciously or unconsciously). These algorithms can develop further biases during the machine learning and training process. Dr. Tolga Bolukbasi, Boston University, recently described algorithms as not being capable of distinguishing right from wrong, unlike humans that can judge their actions, even when they act against ethical norms. For algorithms, data is the ultimate determining factor.
Realizing that algorithms supporting future Intelligence, Surveillance, and Reconnaissance (ISR) networks and Commander’s decision support aids will have inherent biases — what is the impact on future warfighting? This question is exceptionally relevant as Soldiers and Leaders consider the influence of biases in man-machine relationships, and their potential ramifications on the battlefield, especially with regard to the rules of engagement (i.e., mission execution and combat efficiency versus the proportional use of force and minimizing civilian casualties and collateral damage).
“It is difficult to make predictions, particularly about the future.” This quote has been attributed to anyone ranging from Mark Twain to Niels Bohr to Yogi Berra. Point prediction is a sucker’s bet. However, asking the right questions about biases in AI is incredibly important.
The Mad Scientist Initiative has developed a series of questions to help frame the discussion regarding what biases we are willing to accept and in what cases they will be acceptable. Feel free to share your observations and questions in the comments section of this blog post (below) or email them to us at: email@example.com.
1) What types of bias are we willing to accept? Will a so-called cognitive bias that forgoes a logical, deliberative process be allowable? What about a programming bias that is discriminative towards any specific gender(s), ethnicity(ies), race(s), or even age(s)?
2) In what types of systems will we accept biases? Will machine learning applications in supposedly non-lethal warfighting functions like sustainment, protection, and intelligence be given more leeway with regards to bias?
3) Will the biases in machine learning programming and algorithms be more apparent and/or outweigh the inherent biases of humans-in-the-loop? How will perceived biases affect trust and reliance on machine learning applications?
4) At what point will the pace of innovation and introduction of this technology on the battlefield by our adversaries cause us to forego concerns of bias and rapidly field systems to gain a decisive Observe, Orient, Decide, and Act (OODA) loop and combat speed advantage on theHyperactive Battlefield?
For additional information impacting on this important discussion, please see the following:
[Editor’s Note: Since its inception last November, the Mad Scientist Laboratory has enabled us to expand our reach and engage global innovators from across industry, academia, and the Government regarding emergent disruptive technologies and their individual and convergent impacts on the future of warfare. For perspective, our blog has accrued almost 60K views by over 30K visitors from around the world!
Our Mad Scientist Community of Action continues to grow — in no small part due to the many guest bloggers who have shared their provocative, insightful, and occasionally disturbing visions of the future. Almost half (36 out of 81) of the blog posts published have been submitted by guest bloggers. We challenge you to contribute your ideas!
In particular, we would like to recognize Mad Scientist Mr. Sam Bendett by re-posting his submission entitled “Russian Ground Battlefield Robots: A Candid Evaluation and Ways Forward,” originally published on 25 June 2018. This post generated a record number of visits and views during the past six month period. Consequently, we hereby declare Sam to be the Mad Scientist Laboratory’s “Maddest” Guest Blogger! for the latter half of FY18. In recognition of his achievement, Sam will receive much coveted Mad Scientist swag.
While Sam’s post revealed the many challenges Russia has experienced in combat testing the Uran-9 Unmanned Ground Vehicle (UGV) in Syria, it is important to note that Russia has designed, prototyped, developed, and operationally tested this system in a combat environment, demonstrating a disciplined and proactive approach to innovation. Russia is learning how to integrate robotic lethal ground combat systems….
Enjoy re-visiting Sam’s informative post below, noting that many of the embedded links are best accessed using non-DoD networks.]
Russia, like many other nations, is investing in the development of various unmanned military systems. The Russian defense establishment sees such systems as mission multipliers, highlighting two major advantages: saving soldiers’ lives and making military missions more effective. In this context, Russian developments are similar to those taking place around the world. Various militaries are fielding unmanned systems for surveillance, intelligence, logistics, or attack missions to make their forces or campaigns more effective. In fact, the Russian military has been successfully using Unmanned Aerial Vehicles (UAVs) in training and combat since 2013. It has used them with great effect in Syria, where these UAVs flew more mission hours than manned aircraft in various Intelligence, Surveillance, and Reconnaissance (ISR) roles.
Russia is also busy designing and testing many unmanned maritime and ground vehicles for various missions with diverse payloads. To underscore the significance of this emerging technology for the nation’s armed forces, Russian Defense Minister Sergei Shoigurecently stated that the serial production of ground combat robots for the military “may start already this year.”
But before we see swarms of ground combat robots with red stars emblazoned on them, the Russian military will put these weapons through rigorous testing in order to determine if they can correspond to battlefield realities. Russian military manufacturers and contractors are not that different from their American counterparts in sometimes talking up the capabilities of their creations, seeking to create the demand for their newest achievement before there is proof that such technology can stand up to harsh battlefield conditions. It is for this reason that the Russian Ministry of Defense (MOD) finally established several centers such as Main Research and Testing Center of Robotics, tasked with working alongside thedefense-industrial sector to create unmanned military technology standards and better communicate warfighters’ needs. The MOD is also running conferences such as the annual “Robotization of the Armed Forces” that bring together military and industry decision-makers for a better dialogue on the development, growth, and evolution of the nation’s unmanned military systems.
This brings us to one of the more interesting developments in Russian UGVs. Then Russian Deputy Defense Minister Borisov recentlyconfirmed that the Uran-9 combat UGV was tested in Syria, which would be the first time this much-discussed system was put into combat. This particular UGV is supposed to operate in teams of three or four and is armed with a 30mm cannon and 7.62 mm machine guns, along with avariety of other weapons.
Just as importantly, it was designed to operate at a distance of up to three kilometers (3000 meters or about two miles) from its operator — a range that could be extended up to six kilometers for a team of these UGVs. This range is absolutely crucial for these machines, which must be operated remotely. Russian designers are developing operational electronics capable of rendering the Uran-9more autonomous, thereby moving the operators to a safer distance from actual combat engagement. The size of a small tank, the Uran-9 impressed the international military community when first unveiled and it was definitely designed to survive battlefield realities….
However, just as “no plan survives first contact with the enemy,” the Uran-9, though built to withstand punishment, came up short in its first trial run in Syria. In a candid admission, Andrei P. Anisimov, Senior Research Officer at the 3rd Central Research Institute of the Ministry of Defense, reported on the Uran-9’s critical combat deficiencies during the 10th All-Russian Scientific Conference entitled “Actual Problems of Defense and Security,” held in April 2018. In particular, the following issues came to light during testing:
• Instead of its intended range of several kilometers, the Uran-9 could only be operated at distance of “300-500 meters among low-rise buildings,” wiping out up to nine-tenths of its total operational range.
• There were “17 cases of short-term (up to one minute) and two cases of long-term (up to 1.5 hours) loss of Uran-9 control” recorded, which rendered this UGV practically useless on the battlefield.
• The UGV’s running gear had problems – there were issues with supporting and guiding rollers, as well as suspension springs.
• The electro-optic stations allowed for reconnaissance and identification of potential targets at a range of no more than two kilometers.
• The OCH-4 optical system did not allow for adequate detection of adversary’s optical and targeting devices and created multiple interferences in the test range’s ground and airspace.
• Unstable operation of the UGV’s 30mm automatic cannon was recorded, with firing delays and failures. Moreover, the UGV could fire only when stationary, which basically wiped out its very purpose of combat “vehicle.”
• The Uran-9’s combat, ISR, and targeting weapons and mechanisms were also not stabilized.
On one hand, these many failures are a sign that this much–discussed and much-advertised machine is in need of significant upgrades, testing, and perhaps even a redesign before it gets put into another combat situation. The Russian militarydid say that it tested nearly 200 types of weapons in Syria, so putting the Uran-9 through its combat paces was a logical step in the long development of this particular UGV. If the Syrian trial was the first of its kind for this UGV, such significant technical glitches would not be surprising.
However, the MOD has been testing this Uran-9 for a while now, showing videosof this machine at a testing range, presumably in Russia. The truly unexpected issue arising during operations in Syria had to do with the failure of the Uran-9 to effectively engage targets with its cannon while in motion (along with a number of other issues). Still, perhaps many observers bought into the idea that this vehicle would perform as built – tracks, weapons, and all. A closer examination of the publicly-releasedtesting video probably foretold some of the Syrian glitches – in this particular one, Uran-9 is shown firing its machine guns while moving, but its cannon was fired only when the vehicle was stationary. Another interesting aspect that is significant in hindsight is that the testing range in the video was a relatively open space – a large field with a few obstacles around, not the kind of complex terrain, dense urban environment encountered in Syria. While today’s and future battlefields will range greatly from open spaces to megacities, a vehicle like the Uran-9 would probably be expected to perform in all conditions. Unless, of course, Syrian tests would effectively limit its use in future combat.
On another hand, so many failures at once point to much larger issues with the Russian development of combat UGVs, issues that Anisimov also discussed during his presentation. He highlighted the following technological aspects that are ubiquitous worldwide at this point in the global development of similar unmanned systems:
• Low level of current UGV autonomy;
• Low level of automation of command and control processes of UGV management, including repairs and maintenance;
• Low communication range, and;
• Problems associated with “friend or foe” target identification.
Judging from the Uran-9’s Syrian test, Anisimov made the following key conclusions which point to the potential trajectory of Russian combat UGV development – assuming thatother unmanned systems may have similar issues when placed in a simulated (or real) combat environment:
• These types of UGVs are equipped with a variety of cameras and sensors — and since the operator is presumably located a safe distance from combat, he may have problems understanding, processing, and effectively responding to what is taking place with this UGV in real-time.
• For the next 10-15 years, unmanned military systems will be unable to effectively take part in combat, with Russians proposing to use them in storming stationary and well-defended targets (effectively giving such combat UGVs a kamikaze role).
• One-time and preferably stationary use of these UGVs would be more effective, with maintenance and repair crews close by.
• These UGVs should be used with other military formations in order to target and destroy fortified and firing enemy positions — but never on their own, since their breakdown would negatively impact the military mission.
The presentation proposed that some of the above-mentioned problems could be overcome by domestic developments in the following UGV technology and equipment areas:
• Creating secure communication channels;
• Building miniaturized hi-tech navigation systems with a high degree of autonomy, capable of operating with a loss of satellite navigation systems;
• Developing miniaturized and effective ISR components;
• Integrating automated command and control systems, and;
• Better optics, electronics and data processing systems.
According to Anisimov’s report, the overall Russian UGV and unmanned military systems development arch is similar to the one proposed by the United States Army Capabilities Integration Center (ARCIC): the gradual development of systems capable of more autonomy on the battlefield, leading to “smart” robots capable of forming “mobile networks” and operating in swarm configurations. Such systems should be “multifunctional” and capable of being integrated into existing armed forces formations for various combat missions, as well as operate autonomously when needed. Finally, each military robot should be able to function within existing and future military technology and systems.
Such a candid review and critique of the Uran-9 in Syria, if true, may point to the Russian Ministry of Defense’s attitude towards its domestic manufacturers. The potential combat effectiveness of this UGV was advertised for the past two years, but its actual performance fell far short of expectations. It is a sign for developers of other Russian unmanned ground vehicles – like Soratnik, Vihr, and Nerehta — since it displays the full range of deficiencies that take place outside of well-managed testing ranges where such vehicles are currently undergoing evaluation. It also brought to light significant problems with ISR equipment — this type of technology is absolutely crucial to any unmanned system’s successful deployment, and its failures during Uran-9 tests exposed a serious combat weakness.
It is also a useful lesson for many other designers of domestic combat UGVs who are seeking to introduce similar systems into existing order of battle. It appears that the Uran-9’s full effectiveness can only be determined at a much later time if it can perform its mission autonomously in the rapidly-changing and complex battlefield environment. Fully autonomous operation so far eludes its Russian developers, who are nonetheless still working towards achieving such operational goals for their combat UGVs. Moreover, Russian deliberations on using their existing combat UGV platforms in one-time attack mode against fortified adversary positions or firing points, tracking closely with ways that Western military analysts arethinking that such weapons could be used in combat.
The Uran-9 is still a test bed and much has to take place before it could be successfully integrated into current Russian concept of operations. We could expect more eye-opening “lessons learned” from its and other UGVs potential deployment in combat. Given the rapid proliferation of unmanned and autonomous technology, we are already in the midst of a new arms race. Many states are now designing, building, exporting, or importing various technologies for their military and security forces.
To make matters more interesting, the Russians have been public with both their statements about new technology being tested and evaluated, and with the possible use of such weapons in current and future conflicts. There should be no strategic or tactical surprise when military robotics are finally encountered in future combat.
Samuel Bendett is a Research Analyst at the CNA Corporation and a Russia Studies Fellow at the American Foreign Policy Council. He is an official Mad Scientist, having presented and been so proclaimed at a previous Mad Scientist Conference. The views expressed here are his own.
[Editor’s Note: Mad Scientist Laboratory is pleased to present our August edition of “The Queue” – a monthly post listing the most compelling articles, books, podcasts, videos, and/or movies that the U.S. Army’s Training and Doctrine Command (TRADOC) Mad Scientist Initiative has come across during the past month. In this anthology, we address how each of these works either informs or challenges our understanding of the Future Operational Environment. We hope that you will add “The Queue” to your essential reading, listening, or watching each month!]
Gartner’s annual hype cycle highlights many of the technologies and trends explored by the Mad Scientist program over the last two years. This year’s cycle added 17 new technologies and organized them into five emerging trends: 1) Democratized Artificial Intelligence (AI), 2)Digitalized Eco-Systems, 3) Do-It-Yourself Bio-Hacking, 4) Transparently Immersive Experiences, and 5) Ubiquitous Infrastructure. Of note, many of these technologies have a 5–10 year horizon until the Plateau of Productivity. If this time horizon is accurate, we believe these emerging technologies and five trends will have a significant role in defining the Character of Future War in 2035 and should have modernization implications for the Army of 2028. For additional information on the disruptive technologies identified between now and 2035, see the Era of Accelerated Human Progress portion of ourPotential Game Changers broadsheet.
[Gartner disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]
“Let’s say you’re an AI scientist, and you’ve found the holy grail of your field — you figured out how to build an artificial general intelligence (AGI). That’s a truly intelligent computer that could pass as human in terms of cognitive ability or emotional intelligence. AGI would be creative and find links between disparate ideas — things no computer can do today.
That’s great, right? Except for one big catch: your AGI system is evil or could only be used for malicious purposes.
So, now a conundrum. Do you publish your white paper and tell the world exactly how to create this unrelenting force of evil? Do you file a patent so that no one else (except for you) could bring such an algorithm into existence? Or do you sit on your research, protecting the world from your creation but also passing up on the astronomical paycheck that would surely arrive in the wake of such a discovery?”
The panel’s responses ranged from controlling — “Don’t publish it!” and treat it like a grenade, “one would not hand it to a small child, but maybe a trained soldier could be trusted with it”; to the altruistic — “publish [it]… immediately” and “there is no evil technology, but there are people who would misuse it. If that AGI algorithm was shared with the world, people might be able to find ways to use it for good”; to the entrepreneurial – “sell the evil AGI to [me]. That way, they wouldn’t have to hold onto the ethical burden of such a powerful and scary AI — instead, you could just pass it to [me and I will] take it from there.”
While no consensus of opinion was arrived at, the panel discussion served a useful exercise in illustrating how AIdiffers from previous eras’ game changing technologies. Unlike Nuclear, Biological, and Chemical weapons, no internationally agreed to and implemented control protocols can be applied to AI, as there are no analogous gas centrifuges, fissile materials, or triggering mechanisms; no restricted access pathogens; no proscribed precursor chemicals to control. Rather, when AGI is ultimately achieved, it is likely to be composed of nothing more than diffuse code; a digital will’o wisp that can permeate across the global net to other nations, non-state actors, and super-empowered individuals, with the potential to facilitate unprecedentedly disruptiveInformation Operation (IO) campaigns and Virtual Warfare, revolutionizing human affairs. The West would be best served in emulating the PRC with itsMilitary-Civil Fusion Centers and integrate the resources of the State with the innovation of industry to achieve their own AGI solutions soonest. Thedecisive edge will “accrue to the side with more autonomous decision-action concurrency on the Hyperactive Battlefield” — the best defense against a nefarious AGI is a friendly AGI!
Can justice really be blind? The International Conference on Machine Learning (ICML) was held in Stockholm, Sweden, in July 2018. This conference explored the notion of machine learning fairness and proposed new methods to help regulators provide better oversight and practitioners to develop fair and privacy-preserving data analyses. Like ethical discussions taking place within the DoD, there are rising legal concerns that commercial machine learning systems (e.g., those associated with car insurance pricing) might illegally or unfairly discriminate against certain subgroups of the population. Machine learning will play an important role in assisting battlefield decisions (e.g., the targeting cycle and commander’s decisions) – especially lethal decisions. There is a common misperception that machines will make unbiased and fair decisions, divorced from human bias. Yet the issue of machine learning bias is significant because humans, with their host of cognitive biases, code the very programming that will enable machines to learn and make decisions. Making the best, unbiased decisions will become critical in AI-assisted warfighting. We must ensure that machine-based learning outputs are veriﬁed and understood to preclude the inadvertent introduction of human biases. Read the full reporthere.
In a study published byPLOS ONE, researchers found that arobot’s personality affected a human’s decision-making. In the study, participants were asked to dialogue with a robot that was either sociable (chatty) or functional (focused). At the end of the study, the researchers let the participants know that they could switch the robot off if they wanted to. At that moment, the robot would make an impassioned plea to the participant to resist shutting them down. The participants’ actions were then recorded. Unexpectedly, there were a large number of participants who resisted shutting down the functional robots after they made their plea, as opposed to the sociable ones. This is significant. It shows, beyond the unexpected result, that decision-making is affected by robotic personality. Humans will form an emotional connection to artificial entities despite knowing they are robotic if they mimic and emulate human behavior. If the Army believes its Soldiers will beaccompanied and augmented heavily by robots in the near future, it must also understand that human-robot interaction will not be the same as human-computer interaction. The U.S. Army must explore how attain theappropriate level of trust between Soldiers and their robotic teammates on the future battlefield. Robots must be treated more like partners than tools, with trust, cooperation, and even empathy displayed.
While the advent of the Internet brought home computing and communication even deeper into global households, the revolution of smart phones brought about the concept of constant personal interconnectivity. Today and into the future, not only are humans being connected to the global commons via their smart devices, but a multitude of devices, vehicles, and various accessories are being integrated into the Internet of Things (IoT). Previously, the IoT was addressed as a game changing technology. The IoT is composed of trillions of internet-linked items, creating opportunities and vulnerabilities. There has been explosive growth in low Size Weight and Power (SWaP) and connected devices (Internet of Battlefield Things), especially for sensor applications (situational awareness).
Large companies are expected to quickly grow their spending on Internet-connected devices (i.e., appliances, home devices [such as Google Home, Alexa, etc.], various sensors) to approximately $520 billion. This is a massive investment into what will likely become the Internet of Everything (IoE). While growth is focused on known devices, it is likely that it will expand to embedded and wearable sensors – think clothing, accessories, and even sensors and communication devices embedded within the human body. This has two major implications for the Future Operational Environment (FOE):
– The U.S. military is already struggling with the balance between collecting, organizing, and using critical data, allowing service members to use personal devices, and maintaining operations and network security and integrity (see banning of personal fitness trackers recently). A segment of the IoT sensors and devices may be necessary or critical to the function and operation of many U.S. Armed Forces platforms and weapons systems, inciting some critical questions about supply chain security, system vulnerabilities, and reliance on micro sensors and microelectronics
– The U.S. Army of the future will likely have to operate in and arounddense urban environments, where IoT devices and sensors will be abundant, degrading blue force’s ability to sense the battlefield and “see” the enemy, thereby creating a veritable needle in a stack of needles.
With the possibility of a “cyber Pearl Harbor” becoming increasingly imminent, intelligence officials warn of the rising danger of cyber attacks. Effects of these attacks have already been felt around the world. They have the power to break the trust people have in institutions, companies, and governments as they act in the undefinedgray zone between peace and all-out war. The military implications are quite clear: cyber attacks can cripple the military’s ability to function from a command and control aspect to intelligence communications and materiel and personnel networks. Besides the military and government, private companies’ use of the internet must be accounted for when discussing cyber security. Some companies have felt the effects of cyber attacks, while others are reluctant to invest in cyber protection measures. In this way, civilians become affected by acts of cyber warfare, and attacks on a country may not be directed at the opposing military, but the civilian population of a state, as in the case of power and utility outages seen in eastern Europe. Any actor with access to the internet can inflict damage, and anyone connected to the internet is vulnerable to attack, so public-private cooperation is necessary to most effectively combat cyber threats.
If you read, watch, or listen to something this month that you think has the potential to inform or challenge our understanding of the Future Operational Environment, please forward it (along with a brief description of why its potential ramifications are noteworthy to the greater Mad Scientist Community of Action) to our attention at: firstname.lastname@example.org — we may select it for inclusion in our next edition of “The Queue”!
[Editor’s Note: Mad Scientist Laboratory is pleased to present the following post by guest blogger LTC Rob Taber, U.S. Army Training and Doctrine Command (TRADOC) G-2 Futures Directorate, clarifying the often confused character and nature of warfare, and addressing their respective mutability.]
No one is arguing that warfare is not changing. Where people disagree, however, is whether the nature of warfare, the character of warfare, or both are changing.
Take, for example, the National Intelligence Council’s assertion in “Global Trends: Paradox of Progress.” They state, “The nature of conflict is changing. The risk of conflict will increase due to diverging interests among major powers, an expanding terror threat, continued instability in weak states, and the spread of lethal, disruptive technologies. Disrupting societies will become more common, with long-range precision weapons, cyber, androbotic systems to target infrastructure from afar, and more accessible technology to create weapons of mass destruction.”[I]
Additionally, Brad D. Williams, in an introductionto an interview he conducted with Amir Husain, asserts, “Generals and military theorists have sought to characterize the nature of war for millennia, and for long periods of time, warfare doesn’t dramatically change. But, occasionally, new methods for conducting war cause a fundamental reconsideration of its very nature and implications.”[II] Williams then cites “cavalry, the rifled musket and Blitzkrieg as three historical examples”[III] from Husain and General John R. Allen’s (ret.) article, “On Hyperwar.”
Unfortunately, the NIC and Mr. Williams miss the reality that the nature of war is not changing, and it is unlikely to ever change. While these authors may have simply interchanged “nature” when they meant “character,” it is important to be clear on the difference between the two and the implications for the military. To put it more succinctly, words have meaning.
The nature of something is the basic make up of that thing. It is, at core, what that “thing” is. The character of something is the combination of all the different parts and pieces that make up that thing. In the context of warfare, it is useful to ask every doctrine writer’s personal hero, Carl Von Clausewitz, what his views are on the matter.
He argues that war is “subjective,”[IV] “an act of policy,”[V] and “a pulsation of violence.”[VI] Put another way, the nature of war is chaotic, inherently political, and violent. Clausewitz then states that despite war’s “colorful resemblance to a game of chance, all the vicissitudes of its passion, courage, imagination, and enthusiasm it includes are merely its special characteristics.”[VII] In other words, all changes in warfare are those smaller pieces that evolve and interact to make up the character of war.
The argument thatartificial intelligence (AI) and other technologies will enable military commanders to have “a qualitatively unsurpassed level of situational awareness and understanding heretofore unavailable to strategic commander[s]”[VIII] is a grand claim, but one that has been made many times in the past, and remains unfulfilled. The chaos of war, its fog, friction, and chance will likely never be deciphered, regardless of what technology we throw at it. While it is certain that AI-enabled technologies will be able to gather, assess, and deliver heretofore unimaginable amounts of data, these technologies will remain vulnerable to age-old practices ofdenial, deception, and camouflage.
The enemy gets a vote, and in this case, the enemy also gets to play with their AI-enabled technologies that are doing their best to provide decision advantage over us. The information sphere in war will be more cluttered and more confusing than ever.
Regardless of the tools of warfare, be they robotic,autonomous, and/or AI-enabled, they remain tools. And while they will be the primary tools of the warfighter, the decision to enable the warfighter to employ those tools will, more often than not, come from political leaders bent on achieving a certain goal with military force.
Finally, the violence of warfare will not change. Certainly robotics and autonomy will enable machines that can think and operate without humans in the loop. Imagine the future in which the unmanned bomber gets blown out of the sky by the AI-enabled directed energy integrated air defense network. That’s still violence. There are still explosions and kinetic energy with the potential for collateral damage to humans, both combatants and civilians.
Not to mention the bomber carried a payload meant to destroy something in the first place. A military force, at its core, will always carry the mission to kill things and break stuff. What will be different is what tools they use to execute that mission.
To learn more about the changing character of warfare:
– Watch videos of each of the conference presentations on the TRADOC G-2 Operational Environment (OE) Enterprise YouTube Channelhere.
– Review the conference presentation slides (with links to the associated videos) on the Mad Scientist All Partners Access Network (APAN) sitehere.
LTC Rob Taber is currently the Deputy Director of the Futures Directorate within the TRADOC G-2. He is an Army Strategic Intelligence Officer and holds a Master of Science of Strategic Intelligence from the National Intelligence University. His operational assignments include 1st Infantry Division, United States European Command, and the Defense Intelligence Agency.
Note: The featured graphic at the top of this post captures U.S. cavalrymen on General John J. Pershing’s Punitive Expedition into Mexico in 1916. Less than two years later, the United States would find itself fully engaged in Europe in a mechanized First World War. (Source: Tom Laemlein / Armor Plate Press, courtesy of Neil Grant, The Lewis Gun, Osprey Publishing, 2014, page 19)
[I] National Intelligence Council, “Global Trends: Paradox of Progress,” January 2017, https://www.dni.gov/files/documents/nic/GT-Full-Report.pdf, p. 6. [II] Brad D. Williams, “Emerging ‘Hyperwar’ Signals ‘AI-Fueled, machine waged’ Future of Conflict,” Fifth Domain, August 7, 2017, https://www.fifthdomain.com/dod/2017/08/07/emerging-hyperwar-signals-ai-fueled-machine-waged-future-of-conflict/. [III] Ibid. [VI] Carl Von Clausewitz, On War, ed. Michael Howard and Peter Paret (Princeton: Princeton University Press, 1976), 85. [V] Ibid, 87. [VI] Ibid. [VII] Ibid, 86. [VIII] John Allen, Amir Hussain, “On Hyper-War,” Fortuna’s Corner, July 10, 2017, https://fortunascorner.com/2017/07/10/on-hyper-war-by-gen-ret-john-allenusmc-amir-hussain/.
[Editor’s Note: Mad Scientist Laboratory is pleased to publish the following post by guest blogger Dr. Jan Kallberg, faculty member, United States Military Academy at West Point, and Research Scientist with the Army Cyber Institute at West Point. His post serves as a cautionary tale regarding our finite intellectual resources and the associated existential threat in failing to protect them!]
Preface: Based on my experience in cybersecurity, migrating to a broader cyber field, there have always been those exceptional individuals that have an unreplicable ability to see the challenge early on, create a technical solution, and know how to play it in the right order for maximum impact. They are out there – the Einsteins, Oppenheimers, and Fermis of cyber. The arrival ofArtificial Intelligence increases our reliance on these highly capable individuals – because someone must set the rules, the boundaries, and point out the trajectory for Artificial Intelligence at initiation.
As an industrialist society, we tend to see technology and the information that feeds it as the weapons – and ignore the few humans that have a large-scale direct impact. Even if identified as a weapon, how do you make a human mind classified? Can we protect these high-ability individuals that in the digital world are weapons, not as tools but compilers of capability, or are we still focused on the tools? Why do we see only weapons that are steel and electronics and not the weaponized mind as a weapon? I believe firmly that we underestimate the importance of Applicable Intelligence – the ability to play the cyber engagement in the optimal order. Adversaries are often good observers because they are scouting for our weak spots. I set the stage for the following post in 2034, close enough to be realistic and far enough for things to happen when our adversaries are betting that we rely more on a few minds than we are willing to accept.
Post: In a not too distant future, 20th of August 2034, a peer adversary’s first strategic moves are the targeted killings of less than twenty individuals as they go about their daily lives: watching a 3-D printer making a protein sandwich at a breakfast restaurant; stepping out from the downtown Chicago monorail; or taking a taste of a poison-filled retro Jolt Cola. In thegray zone, when the geopolitical temperature increases, but we are still not at war yet, our adversary acts quickly and expedites a limited number of targeted killings within the United States of persons whom are unknown to mass media, the general public, and have only one thing in common – Applicable Intelligence (AI).
The ability to apply is a far greater asset than the technology itself. Cyber and card games have one thing in common, the order you play your cards matters. In cyber, the tools are publicly available, anyone can download them from the Internet and use them, but the weaponization of the tools occurs when used by someone who understands how to play the tools in an optimal order. These minds are different because they see an opportunity to exploit in a digital fog of war where others don’t or can’t see it. They address problems unburdened by traditional thinking, in new innovative ways, maximizing the dual-purpose of digital tools, and can create tangible cyber effects.
It is the Applicable Intelligence (AI) that creates the procedures, the application of tools, and turns simple digital software in sets or combinations as a convergence to digitally lethal weapons. This AI is the intelligence to mix, match, tweak, and arrange dual purpose software. In 2034, it is as if you had the supernatural ability to create a thermonuclear bomb from what you can find at Kroger or Albertson.
Sadly we missed it; we didn’t see it. We never left the 20th century. Our adversary saw it clearly and at the dawn of conflict killed off the weaponized minds, without discretion, and with no concern for international law or morality.
These intellects are weapons of growing strategic magnitude. In 2034, the United States missed the importance of these few intellects. This error left them unprotected.
All of our efforts were instead focusing on what they delivered, the application and the technology, which was hidden in secret vaults and only discussed in sensitive compartmented information facilities. Therefore, we classify to the highest level to ensure the confidentiality and integrity of our cyber capabilities. Meanwhile, the most critical component, the militarized intellect, we put no value to because it is a human. In a society marinated in an engineering mindset, humans are like desk space, electricity, and broadband; it is a commodity that is input in the production of the technical machinery. The marveled technical machinery is the only thing we care about today, 2018, and as it turned out in 2034 as well.
We are stuck in how we think, and we are unable to see it coming, but our adversaries see it. At a systematic level, we are unable to see humans as the weapon itself, maybe because we like to see weapons as something tangible, painted black, tan, or green, that can be stored and brought to action when needed. As the armory of the war of 1812, as the stockpile of 1943, and as the launch pad of 2034. Arms are made of steel, or fancier metals, with electronics – we failed in 2034 to see weapons made of corn, steak, and an added combative intellect.
General Nakasone stated in 2017, “Our best ones [coders] are 50 or 100 times better than their peers,” and continued “Is there a sniper or is there a pilot or is there a submarine driver or anyone else in the military 50 times their peer? I would tell you, some coders we have are 50 times their peers.” In reality, the success of cyber and cyber operations is highly dependent not on the tools or toolsets but instead upon the super-empowered individual that General Nakasone calls “the 50-x coder.”
There were clear signals that we could have noticed before General Nakasone pointed it out clearly in 2017. The United States’ Manhattan Project during World War II had at its peak 125,000 workers on the payroll, but the intellects that drove the project to success and completion were few. The difference with the Manhattan Project and the future of cyber is that we were unable to see the human as a weapon, being locked in by our path dependency as an engineering society where we hail the technology and forget the importance of the humans behind it.
America’s endless love of technical innovations and advanced machinery reflects in a nation that has celebrated mechanical wonders and engineered solutions since its creation. For America, technical wonders are a sign of prosperity, ability, self-determination, and advancement, a story that started in the early days of the colonies, followed by the intercontinental railroad, the Panama Canal, the manufacturing era, the moon landing, and all the way to the autonomous systems, drones, and robots. In a default mindset, there is always a tool, an automated process, a software, or a set of technical steps that can solve a problem or act.
The same mindset sees humans merely as an input to technology, so humans are interchangeable and can be replaced. In 2034, the era of digital conflicts and thewar between algorithms with engagements occurring at machine speed with no time for leadership or human interaction, it is the intellects that design and understand how to play it. We didn’t see it.
In 2034, with fewer than twenty bodies piled up after targeted killings, resides the Cyber Pearl Harbor. It was not imploding critical infrastructure, a tsunami of cyber attacks, nor hackers flooding our financial systems, but instead traditional lead and gunpowder. The super-empowered individuals are gone, and we are stuck in a digital war at speeds we don’t understand, unable to play it in the right order, and with limited intellectual torque to see through the fog of war provided by an exploding kaleidoscope of nodes and digital engagements.
Dr. Jan Kallberg is currently an Assistant Professor of Political Science with the Department of Social Sciences, United States Military Academy at West Point, and a Research Scientist with the Army Cyber Institute at West Point. He was earlier a researcher with the Cyber Security Research and Education Institute, The University of Texas at Dallas, and is a part-time faculty member at George Washington University. Dr. Kallberg earned his Ph.D. and MA from the University of Texas at Dallas and earned a JD/LL.M. from Juridicum Law School, Stockholm University. Dr. Kallberg is a certified CISSP, ISACA CISM, and serves as the Managing Editor for the Cyber Defense Review. He has authored papers in the Strategic Studies Quarterly, Joint Forces Quarterly, IEEE IT Professional, IEEE Access, IEEE Security and Privacy, and IEEE Technology and Society.
[Editor’s Note: Mad Scientist is pleased to present Mr. Mike Matson‘s guest blog post set in 2037 — pitting the defending Angolan 6th Mechanized Brigade with Russian advisors and mercenaries against a Namibian Special Forces incursion supported by South African National Defence Force (SANDF) Special Operators. Both sides employ autonomous combat systems, albeit very differently — Enjoy!]
Preface: This story was inspired by two events. First, Boston Dynamics over the last year had released a series of short videos of theirhumanoid and animal-inspired robots which had generated a strong visceral Internet reaction. Elon Musk had commented about one video that they would “in a few years… move so fast you’ll need a strobe light to see it.” That visual stuck with me and I was looking for an opportunity to expand on that image.
The second event was a recent trip to the Grand Tetons. I had a black bear rise up out of an otherwise empty meadow less than 50 meters away. A 200-kilo predator which can run at 60kph and yet remain invisible in high grass left a strong impression. And while I didn’t see any gray wolves, a guide discussed how some of the packs, composed of groups of 45-kilogram sized animals, had learned how to take down 700-kilogram bison. I visualized packs of speeding robotic wolves with bear-sized robots following behind.
I used these events as the genesis to explore a completely different approach to designing and employing unmanned ground combat vehicles (GCVs). Instead of the Russian crewless, traditional-styled armored vehicles, I approached GCVs from the standpoint of South Africa, which may not have the same resources as Russia, but has an innovative defense industry. If starting from scratch, how might their designs diverge? What could they do with less resources? And how would these designs match up to “traditional” GCVs?
To find out what would happen, I pitted an Angolan mechanize brigade outfitted with Russian GCVs against South African special forces armed with a top secret indigenous GCV program. The setting is southern Angola in 2037, and there are Demons in the Tall Grass. As Mr. Musk said in his Tweet, sweet dreams! Mike Matson
(2230Z 25 May 2037) Savate, Angola
Paulo crouched in his slit trench with his squad mates. He knew this was something other than an exercise. The entire Angolan 6th Mechanized Brigade had road marched south to Savate, about 60 kilometers from the Namibian border. There, they were ordered to dig fighting positions and issued live ammunition.
Everyone was nervous. Thirty minutes before, one of their patrols a kilometer south of them had made contact. A company had gone out in support and a massive firefight had ensued. A panicked officer could be heard on the net calling in artillery on their own position because they were being attacked by demons in the tall grass. Nobody had yet returned.
Behind Paulo, the battalion commander came forward. With him were three Russian mercenaries. Paulo knew the Russians had brought along two companies of robot tanks. The robot tanks sported an impressively large number of guns, missiles and lasers. Two of them had deployed with the quick reaction force. Explosions suggested that they had been destroyed.
Paulo watched the Angolan officer carefully. Suddenly there was a screamed warning from down the trenches. He whipped around and saw forms in the tall grass moving towards the trenches at a high rate of speed, spread out across his entire front. A dozen or more speeding lines headed directly towards the trenches like fish swimming just under the water.
“Fire!” Paulo ordered and started shooting, properly squeezing off three round bursts. The lines kept coming. Paulo had strobe light-like glimpses of bounding animals. Just before they burst from cover, piercingly loud hyena cries filled the night. Paulo slammed his hand on the nearby clacker to detonate the directional mines to his front. The world exploded in noise and dust.
(Earlier That Morning) 25 Kilometers south of Savate
Captain Verlin Ellis, Bravo Group, SANDF, crouched with his NCO, his soldiers, and his Namibian SF counterpart at dawn under a tree surrounded by thick green bush.
“Listen up everyone, the operation is a go. Intelligence shows the brigade in a holding position south of Savate. We are to conduct a recon north until we can fix their position. Alpha and Charlie groups will be working their way up the left side. Charlie will hit their right flank with their predator package at the same time we attack from the south and Alpha will be the stopper group with the third group north of town. Once we have them located, we are to hold until nightfall, then attack.”
The tarps came off Bravo Group’s trucks and the men got to work unloading.
First off were Bravo Group’s attack force of forty hyenas. Standing just under two feet high on their articulated legs, and weighing roughly 40 kilos, the small robots were off-loaded and their integrated solar panels were unfolded to top off their battery charges.
The hyenas operated in pack formations via an encrypted mesh network. While they could be directed by human operators if needed and could send and receive data via satellite or drone relay, they were designed to operate in total autonomy at ranges up to 40 kilometers from their handlers.
Each hyena had a swiveling front section like a head with four sensors and a small speaker. The sensors were a camera and separate thermal camera, a range finder, and a laser designator/pointer. Built into the hump of the hyena’s back was a fixed rifle barrel in a bullpup configuration, chambered in 5.56mm, which fired in three round bursts.
On each side there was a pre-loaded 40mm double tube grenade launcher. The guided, low velocity grenades could be launched forward between 25-150 meters. The hyenas were loaded with a mix of HE, CS gas, HEAT, and thermite grenades. They could select targets themselves or have another hyena or human operator designate a target, in which case they were also capable of non-line-of-sight attacks. The attack dogs contained a five-kilo shaped charge limpet mine for attaching to vehicles. There were 24 attack hyenas.
Second off came the buffalos, the heavy weapons support element. There were six of the 350 kilo beasts. They were roughly the same size as a water buffalo, hence their name. They retained the same basic head sensor suite as the hyenas, and a larger, sturdier version of the hyena’s legs.
Three of them mounted an 81mm auto-loading mortar and on their backs were 10 concave docking stations each holding a three ounce helicopter drone called a sparrow. The drone had a ten-minute flight radius with its tiny motor. One ounce of the drone was plastic explosive. They had a simple optical sensor and were designed to land and detonate on anything matching their picture recognition algorithms, such as ammo crates, fuel cans, or engine hoods.
The fourth buffalo sported a small, sleek turret on a flat back, with a 12.7mm machine gun, and the buffalo held 500 rounds of armor-piercing tracer.
The fifth buffalo held an automatic grenade launcher with 200 smart rounds in a similar turret to the 12.7mm gun. The grenades were programmed as they fired and could detonate over trenches or beyond obstacles to hit men behind cover.
The sixth carried three anti-tank missiles in a telescoping turret. Like the mortars, their fire could be directed by hyenas, human operators, or self-directed.
Once the hyenas and buffalos were charging, the last truck was carefully unloaded. Off came the boars — suicide bombs on legs. Each of the 15 machines was short, with stubbier legs for stability. Their outer shells were composed of pre-scarred metal and were overlaid with a layer of small steel balls for enhanced shrapnel. Inside they packed 75 kilos of high explosive. For tonight’s mission each boar was downloaded with different sounds to blare from their speakers, with choices ranging from Zulu war cries, to lion roars, to AC/DC’s Thunderstruck. Chaos was their primary mission.
Between the three Recce groups, nine machines failed warmup. That left 180 fully autonomous and cooperative war machines to hunt the 1,200 strong Angolan 6th Mechanized Brigade.
(One Hour after Attack Began) Savate
Paulo and his team advanced, following spoor through the bush. The anti-tank team begged to go back but Paulo refused.
Suddenly there was a slight gap in the tall grass just as something in front of them on the far side of a clearing fired. It looked like a giant metal rhino, and it had an automatic grenade launcher on top of it. It fired a burst, then sat down on its haunches to hide.
So that’s why I can’t see them after they fire. Very clever, thought Paulo. He tried calling in fire support but all channels were jammed.
Paulo signaled with his hands for both gunners to shoot. The range was almost too close. Both gunners fired at the same time, striking the beast. It exploded with a surprising fury, blowing them all off their feet and lighting up the sky. They laid there stunned as debris pitter-pattered in the dirt around them.
That was enough for Paulo and the men. They headed back to the safety of the trenches.
As they returned, eight armored vehicles appeared. On the left was an Angolan T-72 tank and three Russian robot tanks. On the right there was a BMP-4 and three more Russian robot tanks.
An animal-machine was trotting close to the vegetation outside the trenches and one of the Russian tank’s lasers swiveled and fired, emitting a loud hum, hitting it. The animal-machine was cut in two. The tanks stopped near the trench to shoot at unseen targets in the dark as Paulo entered the trenches.
The hyena yipping increased in volume as predators began to swarm around the armored force. Five or six were circling their perimeter yipping and shooting grenades. Two others crept under some bushes 70 meters to Paulo’s right and laid down like dogs. A long, thin antenna rose out of the back of one dog with some small device on top. The tanks furiously fired at the fleeting targets which circled them.
Mortar rounds burst around the armor, striking a Russian tank on the thin turret top, destroying it.
From a new direction, the ghost machine gun struck a Russian robot tank with a dozen exploding armor-piercing rounds. The turret was pounded and the externally mounted rockets were hit, bouncing the tank in place from the explosions. A robot tank popped smoke, instantly covering the entire armored force in a blinding white cloud which only added to the chaos. Suddenly the Russian turrets all stopped firing just as a third robot tank was hit by armor-piercing rounds in the treads and disabled.
If you enjoyed this blog post, read “Demons in the Grass” in its entiretyhere, published by our colleagues at Small Wars Journal.
Mike Matson is a writer in Louisville, Kentucky, with a deep interest in national security and cyber matters. His writing focuses on military and intelligence-oriented science fiction. He has two previous articles published by Mad Scientist: the non-fiction “Complex Cyber Terrain in Hyper-Connected Urban Areas,” and the fictional story, “Gods of Olympus.” In addition to Louisville, Kentucky, and Washington, DC, he has lived, studied, and worked in Brussels, Belgium, and Tallinn, Estonia. He holds a B.A. in International Studies from The American University and an M.S. in Strategic Intelligence from the National Intelligence University, both in Washington, DC. He can be found on Twitter at @Mike40245.
[Editor’s Note: The Operational Environment (OE) is the start point for Army Readiness – now and in the Future. The OE answers the question, “What is the Army ready for?” Without the OE in training and Leader development, Soldiers and Leaders are “practicing” in a benign condition, without the requisite rigor to forge those things essential for winning in a complex, multi-domain battlefield. Building the Army’s future capabilities, a critical component of future readiness, requires this same start point. The assumptions the Army makes about the Future OE are the sine qua non start point for developing battlefield systems — these assumptions must be at the forefront of decision-making for all future investments.]
There are no facts about the future. Leaders interested in building future ready organizations must develop assumptions about possible futures and these assumptions require constant scrutiny. Leaders must also make decisions based on these assumptions to posture organizations to take advantage of opportunities and to mitigate risks. Making these decisions is fundamental to building future readiness.
1. Contested in all domains (air, land, sea, space, and cyber). Increased lethality, by virtue of ubiquitous sensors, proliferated precision, high kinetic energy weapons and advanced area munitions, further enabled by autonomy, robotics, andArtificial Intelligence (AI)with an increasing potential for overmatch. Adversaries will restrict us to temporary windows of advantage with periods of physical and electronic isolation.
2. Concealment is difficult on the future battlefield. Hiding from advanced sensors — where practicable — will require dramatic reduction of heat, electromagnetic, and optical signatures. Traditional hider techniques such as camouflage, deception, and concealment will have to extend to “cross-domain obscuration” in the cyber domain and the electromagnetic spectrum. Canny competitors will monitor their own emissions in real-time to understand and mitigate their vulnerabilities in the “battle of signatures.” Alternately, “hiding in the open” within complex terrain clutter and near-constant relocation might be feasible, provided such relocation could outpace future recon / strike targeting cycles. Adversaries will operate among populations in complex terrain, including dense urban areas.
3. Trans-regional, gray zone, and hybrid strategies with both regular and irregular forces, criminal elements, and terrorists attacking our weaknesses and mitigating our advantages. The ensuing spectrum of competition will range from peaceful, legal activities through violent, mass upheavals and civil wars to traditional state-on-state, unlimited warfare.
4. Adversaries include states, non-state actors, and super-empowered individuals, with non-state actors and super empowered individuals now having access to Weapons of Mass Effect (WME), cyber, space, and Nuclear/Biological/ Chemical (NBC) capabilities. Their operational reach will range from tactical to global, and the application of their impact from one domain into another will be routine. These advanced engagements will also be interactive across the multiple dimensions of conflict, not only across every domain in the physical dimension, but also the cognitive dimension of information operations, and even the moral dimension of belief and values.
5. Increased speed of human interaction, events and action withdemocratized and rapidly proliferating capabilities means constant co-evolution between competitors. Recon / Strike effectiveness is a function of its sensors, shooters, their connections, and the targeting process driving decisions. Therefore, in a contest between peer competitors with comparable capabilities, advantage will fall to the one that is better integrated and makes better and faster decisions.
These assumptions become useful when they translate to potential decision criteria for Leaders to rely on when evaluating systems being developed for the future battlefield. Each of the following questions are fundamental to ensuring the Army is prepared to operate in the future.
1. How will this system operate when disconnected from a network? Units will be disconnected from their networks on future battlefields. Capabilities that require constant timing and precision geo-locational data will be prioritized for disruption by adversaries with capable EW systems.
2. What signature does this system present to an adversary? It is difficult to hide on the future battlefield and temporary windows of advantage will require formations to reduce their battlefield signatures. Capabilities that require constant multi-directional broadcast and units with large mission command centers will quickly be targeted and neutralized.
3. How does this system operate in dense urban areas? The physical terrain in dense urban areas and megacities creates concrete canyons isolating units electronically and physically. Automated capabilities operating in dense population areas might also increase the rate of false signatures, confusing, rather than improving, Commander decision-making. New capabilities must be able to operate disconnected in this terrain. Weapons systems must be able to slew and elevate rapidly to engage vertical targets. Automated systems and sensors will require significant training sets to reduce the rate of false signatures.
4. How does this system take advantage of open and modular architectures? The rapid rate of technological innovations will offer great opportunities to militaries capable of rapidly integrating prototypes into formations. Capabilities developed with open and modular architectures can be upgraded with autonomous and AI enablers as they mature. Early investment in closed-system capabilities will freeze Armies in a period of rapid co-evolution and lead to overmatch.
5. How does this capability help win in competition short of conflict with a near peer competitor? Near peer competitors will seek to achieve limited objectives short of direct conflict with the U.S. Army. Capabilities will need to be effective at operating in the gray zone as well as serving as deterrence. They will need to be capable of strategic employment from CONUS-based installations.
If you enjoyed this post, check out the following items of interest:
Join SciTech Futures‘ community of experts, analysts, and creatives on 11-18 June 2018 as they discuss the logistical challenges of urban campaigns, both today and on into 2035. What disruptive technologies and doctrines will blue (and red) forces have available in 2035? Are unconventional forces the future of urban combat? Their next ideation exercise goes live 11 June 2018 — click here to learn more!
[Editor’s Note: Mad Scientist Laboratory is pleased to present the following post by returning guest blogger Mr. Frank Prautzsch, addressing the Black Swans and Pink Flamingos associated with our last terrestrial frontier — the Arctic. Mr. Prautzsch haspreviously posted on how the future of vaccines is in nano-biology and convergence with the immune system of the body.]
By now, all Mad Scientists and understudies of history arefamiliar with the conditions for the unknown, unknowns (i.e., Black Swans) and the known, knowns (i.e., Pink Flamingos). Perhaps no place has a greater collection of these attributes than the Arctic. The Arctic Region remains arguably our last international frontier. Over the last 20 years, climate change, unexplored energy reserves, short transpolar navigation, eco-tourism, and commerce (with and without indigenous populations) are taking center stage among stakeholders. This focused international interest in the Arctic has pronounced security implications.
To start our Arctic flamingo category, potential energy reserves take center stage. The US Geological Survey estimates that the Arctic holds 18-23% of the untapped oil reserves remaining on the planet. Alaska and West Siberia are estimated to hold 30% of the world’s remaining gas reserves. Russia has attained strategic deals with Exxon Mobil, Eni, and Statoil for securing up to $500B in investment over the next 30 years. Shell paid $2.1B for 275 blocks of off-shore drilling plots northwest of Alaska, but has encountered difficulties in the harsh climate. The United States and Norway are building stronger partnerships on Arctic drilling.
Perhaps the largest flamingo, and also the leader of the flock (or flamboyance), is the Russian military. Most of the Arctic Ocean littoral states are modernizing their military forces in the Arctic. With countries rebuilding their Arctic military capabilities, in concert with vague territorial zones, rich natural resource options, and no real enforcement of maritime law, some concern should be paid to any Russian attempt to have prime sectors of the Arctic become a “new Crimea”. This is a particularly acute topic should Russia model its behaviors after China and the lack of a concerted international community response to China’s sovereignty claims in the South China Sea.
In August of 2007, two Russian mini-subs planted a Russian flag on a titanium mast 14,000 feet below the North Pole. This was tied to their interpretation of the 1982 UN Convention on the Law of the Sea allowing nations to claim sub terrain beyond 200 nautical miles if they prove that such a location is part of their continental shelf.
In the summer of 2014, “Putin broke away from talking about the Ukraine, and indicated that Russia’s future really didn’t lie to its west, but instead in the north. ‘Our interests are concentrated in the Arctic…. And of course, we should pay more attention to issues of development of the Arctic and the strengthening of our position [there].’”
For the past 4 years, Norway, Finland, and Sweden joined much of the international community to overtly criticize Russian representatives and share their disappointment over Russian violation of international and maritime law by invading Crimea and the Ukraine. Finland and Sweden are exploring NATO membership. The volume of Russian TU-97 Bear C4ISR over flights of Finland’s and Sweden’s waters has gone up exponentially. The bombers are flying C4ISR missions but could easily be armed to follow through with their primary mission.
The day after sanctions were placed on Russia for the invasion of Crimea and their activities in the Ukraine, President Putin moved an expeditionary naval fleet into the Arctic. The ships were dispatched to deliver personnel, equipment, and supplies to the New Siberian Islands where a permanent base was constructed. Central to this operation are revitalized military bases at Kotelny and Wrangel Islands, which were abandoned in 1993. Kotelny now has an airbase and is permanent home of the 99th Arctic Tactical Group. Another new air base was commissioned at Cape Schmidt. Additionally, an expanded airstrip at Novaya Zemlya can now accommodate fighters supporting the Northern Fleet. These moves have prompted serious criticism from Canada.
In addition to Kotelny, the Russian Northern Fleet has expanded operations from the Russian town of Alakurtti, Murmansk, which is 50km from the Finnish border. Large portions of the rest of the Northern Fleet are now there with a full complement of 39 ships and 45 submarines. Alakurtti is the new garrison for the Russian Arctic Commandwith 6000 + Arctic-trained ground troops. Russia maintains a fleet for 54 icebreakers and 78 icebreaker-hulled oil/gas supertankers, while the US maintains one heavy breaker and has hopes of acquiring three more. Russia feels that they have to move to the Arctic Ocean to secure their energy future, and to protect the economic interests of their country. The Russians intend to “homestead”, realizing that global energy supplies will again favor their geographical posture someday. From this strategic position, they maintain multiple black swan options, for which the West will have little to challenge.
Reinforcing these energy efforts in the Arctic, Russia deployed its first floating nuclear power plant in April 2018. Moving slowly from St. Petersburg, its final destination is Pevek on the Arctic coast, where it will replace a land-based nuclear power source. This position is 86km from Alaska and the installation uses similar reactor technology to that of Russian icebreaker ships. The primary concern of the international community is the potential for a nuclear accident, but this new power plant could serve a broader Russian purpose in sequestering and dominating the Arctic and its resources.
One of the baby black swans in the Arctic is our unknown ability to generate a clear national will and investment for heavy icebreakers. The US Coast Guard seeks to build three heavy and three medium icebreakers of US lineage. The entire world (including Russia) seeks the help of Finland in icebreaker building and development. With a lack of port construction facilities and a Request for Proposal for three heavy icebreakers from untested US designs, this cygnet will fight for survival against cost, schedule, performance, and risk. While it all looks good on paper, the operational risks to Arctic operations between now and 2025 are pronounced. At the end of the day, the US should consider modular multi-role heavy icebreaker oil/gas tanker hulls that could be tailored to support multiple US missions and interests, including ship escort duty, refueling, C4ISR, vertical lift support, contingency maneuver asset delivery, oil recovery, medical, SAR, and scientific missions…not just icebreaking.
Another indigo black swan is the US Army’s and its Sister Services’ cold weather climate equipment and training. We must improve our survival techniques, mobility and transport, and combat capabilities in cold weather. In a recent Arctic exercise, the US Marine Corps borrowed arctic tentage and soldier wearables from Sweden and Norway. US Arctic tentage has not changed since the mid 1950s. A recent Request for Information introduces the USMC to its first change in cold weather hats and gloves in decades. It is also important to understand the lack of available C4ISR, the performance of commercial off the shelf C4ISR systems subjected to heating and condensation cycles, and the effects of cyber on C4ISR and transportation. Failure in any of these mission areas will render a highly capable force almost useless.
Finally, the most enormous black swan on the planet resides in the Arctic tied to climate change. The introduction of pronounced Arctic sheet ice melting over the past eight summers has opened up the potential for at least seasonal trans-polar shipping and also selected air routes. While we are in love with pretty pictures of polar bears on ice floes and satellite imagery of an ever-shrinking mass, the true story is 3D. We soon will not have Arctic ice of any accumulated age. This is due to warm subsurface ocean thermoclines and high densities of chlorophyll not before seen. Certain NOAA models predict “Ice Free” Arctic Summers by 2047. The impact on climate, fish/wildlife, weather severity, sea levels, and of course human beings is far from being understood. The ice shelves of Greenland are losing one cubic mile of fresh water per week. This is the equivalent of all of the drinking water consumed by Los Angeles in a year.
So, what do we know going into the unknown? (National Geographic, April 2017)
1. The earth’s temperature goes up and down, but it’s gone up 1.69 deg. F consistently since the end of WWII.
2. CO2 warms the planet and we have increased the amount of CO2 by almost half since 1960.
3. 97% of scientists and 98% of authors fault humans for global warming.
4. Arctic sea ice is shrinking and glaciers are receding worldwide.
5. The number of climate-related disasters has tripled since 1980.
6. Retreat and extinction of various plants and animals is starting to occur.
7. Albeit noble, the switch to renewable energy does not offset the world appetite for energy.
While the green-think world worries, commerce is casting an eye on how the Northwest Passage can cut shipping distances between Asia and Europe by up to 3500-4500 miles. A French cruise line is preparing for trans-polar cruises during optimal weather and navigation times. Russia will seek transit and escort fees over its sovereign territories. Reykjavik, Iceland is labeled as the Singapore of 2050. The truth is we will all have to challenge the unknowns of this great swan over time, and we are ill prepared for this confrontation. While Russia looks like a flamingo, its Arctic behaviors can be totally swan-like. If we are looking into the future, we must fear our drift towards fair-weather Clausewitzian warfare while the rest of the planet sees otherwise. Enjoy the birds!
In his current role as President of Velocity Technology Partners LLC, Mr. Frank Prautzsch (LTC, Ret. Signal Corps) is recognized as a technology and business leader supporting the government and is known for exposing or crafting innovative technology solutions for the DoD, SOF, DHS and Intelligence community. He also provides consult to the MEDSTAR Institute for Innovation. His focus is upon innovation and not invention. Mr. Prautzsch holds a Bachelor of Science in Engineering from the United States Military Academy at West Point, is a distinguished graduate of the Marine Corps Signal Advanced Course, Army Airborne School, Ranger School, and Command and General Staff College. He also holds a Master of Science Degree from Naval Postgraduate School in Monterey, California with a degree in Systems Technology (C3) and Space.
The Mad Scientist team participates in many thought exercises, tabletops, and wargames associated with how we will live, work, and fight in the future. A consistent theme in these events is the idea that a major barrier to the integration ofrobotic systems into Army formations is a lack of trust between humans and machines. This assumption rings true as we hear the media and opinion polls describe how society doesn’t trust some disruptive technologies, like driverless cars or the robots coming for our jobs.
In his recent book,Army of None, Paul Scharre describes an event that nearly led to a nuclear confrontation between the Soviet Union and the United States. On September 26, 1983,LTC Stanislav Petrov, a Soviet Officer serving in a bunker outside Moscow was alerted to a U.S. missile launch by a recently deployed space-based early warning system. The Soviet Officer trusted his “gut” – or experientially informed intuition – that this was a false alarm. His gut was right and the world was saved from an inadvertent nuclear exchange because this officer did not over trust the system. But is this the rule or an exception to how humans interact with technology?
The subject of trust between Soldiers, Soldiers and Leaders, and the Army and society is central to the idea of the Army as a profession. At the most tactical level, trust is seen as essential to combat readiness as Soldiers must trust each other in dangerous situations. Humans naturally learn to trust their peers and subordinates once they have worked with them for a period of time. You learn what someone’s strengths and weaknesses are, what they can handle, and under what conditions they will struggle. This human dynamic does not translate to human-machine interaction and the tendency to anthropomorphize machines could be a huge barrier.
We recommend that the Army explore the possibility that Soldiers and Leaders could over trust AI and robotic systems. Over trust of these systems could blunt human expertise, judgement, and intuition thought to be critical to winning in complex operational environments. Also, over trust might lead to additional adversarial vulnerabilities such as deception and spoofing.
In 2016, a research team at the Georgia Institute of Technology revealed the resultsof a study entitled “Overtrust of Robots in Emergency Evacuation Scenarios”. The research team put 42 test participants into a fire emergency with a robot responsible for escorting them to an emergency exit. As the robot passed obvious exits and got lost, 37 participants continued to follow the robot and an additional 2 stood with the robot and didn’t move towards either exit. The study’s takeaway was that roboticists must think about programs that will help humans establish an “appropriate level of trust” with robot teammates.
InFuture Crimes, Marc Goodman writes of the idea of “In Screen We Trust” and the vulnerabilities this trust builds into our interaction with our automation. His example of the cyber-attack against the Iranian uranium enrichment centrifuges highlights the vulnerability of experts believing or trusting their screens against mounting evidence that something else might be contributing to the failure of centrifuges. These experts over trusted their technology or just did not have an “appropriate level of trust”. What does this have to do with Soldiers on the future battlefield? Well, increasingly we depend on our screens and, in the future, our heads-up displays totranslate the world around us. This translation will only become more demanding on the future battlefield with war at machine speed.
So what should our assumptions be about trust and our robotic teammates on the future battlefield?
1) Soldiers and Leaders will react differently to technology integration.
2) Capability developers must account for trust building factors in physical design, natural language processing, and voice communication.
3) Intuition and judgement remain a critical component of human-machine teaming and operating on the future battlefield. Speed becomes a major challenge as humans become the weak link.
4) Building an “appropriate level of trust” will need to be part of Leader Development and training. Mere expertise in a field does not prevent over trust when interacting with our robotic teammates.
5) Lastly, lack of trust is not a barrier to AI and robotic integration on the future battlefield. These capabilities will exist in our formations as well as those of our adversaries. The formation that develops the best concepts for effective human-machine teaming, with trust being a major component, will have the advantage.
[Editor’s Note: Mad Scientist Laboratory is pleased to present the following guest blog post by MAJ Chris Telley, U.S. Army, assigned to the Naval Postgraduate School, addressing how Artificial Intelligence (AI) must be understood as an Information Operations (IO) tool if U.S. defense professionals are to develop effective countermeasures and ensure our resilience to its employment by potential adversaries.]
AI-enabled IO present a more pressing strategic threat than the physical hazards ofslaughter-bots or even algorithmically-escalatednuclear war. IO areefforts to “influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries;” here, we’re talking about using AI to do so. AI-guided IO tools can empathize with an audience to say anything, in any way needed, to change the perceptions that drive those physical weapons. Future IO systems will be able to individually monitor and affecttens of thousands of people at once. Defense professionals must understand the fundamental influence potential of these technologies if they are to drive security institutions to counter malign AI use in the information environment.
Programmatic marketing, using consumer’s data habits to drive real time automated bidding onpersonalized advertising, has been used for a few years now. Cambridge Analytica’sFacebooktargeting made international headlines using similar techniques, but digital electioneering is just the tip of the iceberg. An AI trained with data from users’ social media accounts, economic media interactions (Uber, Applepay, etc.), and their devices’ positional data can infer predictive knowledge of its targets. With that knowledge, emerging tools — likeReplika — can truly befriend a person, allowing it to train that individual, for good or ill.
Substantive feedback is required to train an individual’s response; humans tend to respond best to content and feedback with which they agree. That content can be algorithmically mass produced. For years, Narrative Science tools have helped writers create sports stories and stock summaries, but it’s just as easy to use them to create disinformation. That’s just text, though; today, the AI can create fake video. A recent warning, ostensibly from former President Obama, provides an entertaining yet frightening demonstration of how Deepfakes will challenge our presumptions about truth in the coming years. The Defense Advanced Research Projects Agency (DARPA) is funding aproject this summer to determine whether AI-generated Deepfakes will become impossible to distinguish from the real thing, even using other AI systems.
Given that malign actors can now employ AI to lie “at machine speed,” they still have to get the story to an audience. Russianbot armies continue to make headlines doing this very thing. The New York Times maintains about a dozen Twitter feeds and produces around 300 tweets a day, but Russia’s Internet Research Agency (IRA) regularly puts out25,000 tweets in the same twenty-four hours. The IRA’sbots are really just low-tech curators; they collect, interpret, and display desired information to promote the Kremlin’s narratives.
Next-generation bot armies will employ far faster computing techniques and profit from an order of magnitudegreater network speedwhen 5G services are fielded. If “Repetition is a key tenet ofIO execution,” then this machine gun-like ability to fire information at an audience will, with empathetic precision and custom content, provide the means to change a decisive audience’s very reality. No breakthrough science is needed, no bureaucratic project office required. These pieces arealready there, waiting for an adversary to put them together.
The DoD is looking at AI but remains focused on image classificationandswarming quadcopterswhile ignoring the convergent possibilities of predictive audience understanding, tailored content production, and massive scale dissemination. What little digital IO we’ve done, sometimes called social media “WebOps,” has been contractor heavy and prone to naïve missteps. However, groups like USSOCOM’sSOFWERX and the students at the Naval Postgraduate School are advancing the state of our art. At NPS, future senior leaders are working on AI, now. A half-dozen of the school’s departments have stood up classes and events specifically aimed at operationalizing advanced computing. The young defense professionals currently working on AI should grapple with emerging influence tools and form the foundation of the DoD’s future institutional capabilities.
MAJ Chris Telley is an Army information operations officer assigned to the Naval Postgraduate School. His assignments have included theater engagement at U.S. Army Japan and advanced technology integration with the U.S. Air Force. Chris commanded in Afghanistan and served in Iraq as a United States Marine. He tweets at @chris_telley.
This blog post represents the opinions of the author and do not reflect the position of the Army or the United States Government.