50. Four Elements for Future Innovation

(Editor’s Note: Mad Scientist Laboratory is pleased to present a new post by returning guest blogger Dr. Richard Nabors addressing the four key practices of innovation. Dr. Nabors’ previous guest posts discussed how integrated sensor systems will provide Future Soldiers with the requisite situational awareness to fight and win in increasingly complex and advanced battlespaces, and how Augmented and Mixed Reality are the critical elements required for these integrated sensor systems to become truly operational and support Soldiers’ needs in complex environments.)


For the U.S. military to maintain its overmatch capabilities, innovation is an absolute necessity. As noted in The Operational Environment and the Changing Character of Future Warfare, our adversaries will continue to aggressively pursue rapid innovation in key technologies in order to challenge U.S. forces across multiple domains. Because of its vital necessity, U.S. innovation cannot be left solely to the development of serendipitous discoveries.

The Army has successfully generated innovative programs and transitioned them from the research community into military use. In the process, it has identified four key practices that can be used in the future development of innovative programs. These practices – identifying the need, the vision, the expertise, and the resources – are essential in preparing for warfare in the Future Operational Environment. The recently completed Third Generation Forward Looking Infrared (3rd Gen FLIR) program provides us with a contemporary use case regarding how each of these practices are key to the success of future innovations.


1. Identifying the NEED:
To increase speed, precision, and accuracy of a platform lethality, while at the same time increasing mission effectiveness and warfighter safety and survivability.

As the U.S. Army Training and Doctrine Command (TRADOC) noted in its Advanced Engagement Battlespace assessment, future Advanced Engagements will be…
compressed in time, as the speed of weapon delivery and their associated effects accelerate enormously;
extended in space, in many cases to a global extent, via precision long-range strike and interconnectedness, particularly in the information environment;
far more lethal, by virtue of ubiquitous sensors, proliferated precision, high kinetic energy weapons and advanced area munitions;
routinely interconnected – and contested — across the multiple domains of air, land, sea, space and cyber; and
interactive across the multiple dimensions of conflict, not only across every domain in the physical dimension, but also the cognitive dimension of information operations, and even the moral dimension of belief and values.

Identifying the NEED within the context of these future Advanced Engagement characteristics is critical to the success of future innovations.

The first-generation FLIR systems gave a limited ability to detect objects on the battlefield at night. They were large, slow, and provided low-resolution, short-range images. The need was for greater speed, precision, and range in the targeting process to unlock the full potential of infrared imaging. Third generation FLIR uses multiband infrared imaging sensors combined with multiple fields of view which are integrated with computer software to automatically enhance images in real-time. Sensors can be used across multiple platforms and missions, allowing optimization of equipment for battlefield conditions, greatly enhancing mission effectiveness and survivability, and providing significant cost savings.


Source: John-Stone-Art
2. Identifying the VISION:
To look beyond the need and what is possible to what could be possible.

As we look forward into the Future Operational Environment, we must address those revolutionary technologies that, when developed and fielded, will provide a decisive edge over adversaries not similarly equipped. These potential Game Changers include:
Laser and Radio Frequency Weapons – Scalable lethal and non-Lethal directed energy weapons can counter Aircraft, UAS, Missiles, Projectiles, Sensors, and Swarms.
Swarms – Leverage autonomy, robotics, and artificial intelligence to generate “global behavior with local rules” for multiple entities – either homogeneous or heterogeneous teams.
• Rail Guns and Enhanced Directed Kinetic Energy Weapons (EDKEW) – Non explosive electromagnetic projectile launchers provide high velocity/high energy weapons.
• Energetics – Provides increased accuracy and muzzle energy.
• Synthetic Biology – Engineering and modification of biological entities has potential weaponization.
• Internet of Things – Linked internet “things” create opportunity and vulnerability. Great potential benefits already found in developing U.S. systems also create a vulnerability.
• Power – Future effectiveness depends on renewable sources and reduced consumption. Small nuclear reactors are potentially a cost-effective source of stable power.

Understanding these Future Operational Environment Game Changers is central to identifying the VISION and looking beyond the need to what could be possible.

The 3rd Gen FLIR program struggled early in its development to identify requirements necessary to sustain a successful program. Without the user community’s understanding of a vision of what could be possible, requirements were based around the perceived limitations of what technology could provide. To overcome this, the research community developed a comprehensive strategy for educational outreach to the Army’s requirement developers, military officers, and industry on the full potential of what 3rd Gen FLIR could achieve. This campaign highlighted not only the recognized need, but also a vision for what was possible, and served as the catalyst to bring the entire community together.


3. Identifying the EXPERTISE:
To gather expertise from all possible sources into a comprehensive solution.

Human creativity is the most transformative force in the world; people compound the rate of innovation and technology development. This expertise is fueling the convergence of technologies that is already leading to revolutionary achievements with respect to sensing, data acquisition and retrieval, and computer processing hardware.

Identifying the EXPERTISE leads to the exponential convergence and innovation that will afford strategic advantage to those who recognize and leverage them.

The expertise required to achieve 3rd Gen FLIR success was from the integration of more than 16 significant research and development projects from multiple organizations: Small Business Innovation Research programs; applied research funding, partnering in-house expertise with external communities; Manufacturing Technology (ManTech) initiatives, working with manufacturers to develop the technology and long-term manufacturing capabilities; and advanced technology development funding with traditional large defense contractors. The talented workforce of the Army research community strategically aligned these individual activities and worked with them to provide a comprehensive, interconnected final solution.


4. Identifying the RESOURCES:
To consistently invest in innovative technology by partnering with others to create multiple funding sources.

The 2017 National Security Strategy introduced the National Security Innovation Base as a critical component of its vision of American security. In order to meet the challenges of the Future Operational Environment, the Department of Defense and other agencies must establish strategic partnerships with U.S. companies to help align private sector Research and Development (R&D) resources to priority national security applications in order to nurture innovation.

The development of 3rd Gen FLIR took many years of appropriate, consistent investments into innovations and technology breakthroughs. Obtaining the support of industry and leveraging their internal R&D investments required the Army to build trust in the overall program. By creating partnerships with others, such as the U.S. Army Communications-Electronics Research, Development and Engineering Center (CERDEC) and ManTech, 3rd Gen FLIR was able to integrate multiple funding sources to ensure a secure resource foundation.




CONCLUSION
The successful 3rd Gen FLIR program is a prototype of the implementation of an innovative program, which transitions good ideas into actual capabilities. It exemplifies how identifying the need, the vision, the expertise and the resources can create an environment where innovation thrives, equipping warriors with the best technology in the world. As the Army looks to increase its exploration of innovative technology development for the future, these examples of past successes can serve as models to build on moving forward.

See our Prototype Warfare post to learn more about other contemporary innovation successes that are helping the U.S. maintain its competitive advantage and win in an increasingly contested Operational Environment.

Dr. Richard Nabors is Associate Director for Strategic Planning and Deputy Director, Operations Division, U.S. Army Research, Development and Engineering Command (RDECOM) Communications-Electronics Research, Development and Engineering Center (CERDEC), Night Vision and Electronic Sensors Directorate.

29. Engaging Human-Machine Networks for Cross-domain Effects

(Editor’s Note: While war will remain an enduring human endeavor for the foreseeable future, engaging human networks will require a greater understanding of robotics, artificial intelligence, autonomy, and the Internet of Everything. Future battlefield networks at the strategic, operational, and tactical levels will leverage these aforementioned technologies to radically change the character of war, increasing the reach, speed, and lethality of conflict. Mad Scientist Laboratory is pleased to present the following guest blog post by Mr. Victor R. Morris, addressing the global implications of human-machine teaming.)

The character of war, strategy development, and operational level challenges are changing; therefore operational approaches must do the same. Joint Publication 3-25 Countering Threat Networks includes versatile lines of effort to identify, neutralize, disrupt, or destroy threat networks. These efforts correspond with engaging diverse networks to reach mission objectives within the overall Network Engagement strategy. Network Engagement consists of three components: partnering with friendly networks, engaging neutral networks, and Countering Threat Networks (CTN).

To successfully engage networks and achieve the desired effects, more advanced human-machine collaborative networks need to be understood and evaluated. Human-machine networks are defined by the integration of autonomy and narrow artificial intelligence to accelerate processes, collective understanding, and effects. These networks exist in military operational systems and within interrelated diplomatic, information, and economic systems.

Photo Credit: RAND Monitoring Social Media Lessons for Future Department of Defense Social Media Analysis in Support of Information Operations

This post analyzes collaborative networks using Network Engagement’s Partnering, Engaging and Countering (PEC) model. The intent is to outline a requirement for enhanced Network Engagement involving human-machine collaboration. An enhanced approach accelerates Joint and multinational engagement capabilities to achieve cross-domain effects in a convergent operational environment. Cross-domain effects are achieved through synchronized capabilities and overmatch in the interconnected physical domains, information environment, and cyberspace.

PEC Model: Partnering with friendly networks, engaging neutral networks, and countering threat networks

The Multi-Domain Battle concept addresses the extended battlefield and large-scale combat through Joint reconnaissance, offensive, and defensive operations to reach positions of relative advantage.

Collective defense treaties and Joint security cooperation consist of both foreign internal defense and security force assistance to deter conflict. Foreign internal defense, when approved, involves combat operations during a state of war.

First, Joint Forces may be required to partner with host nation forces and engage hostile elements with offensive operations to return the situation to a level controllable by the host nation. Additionally, defensive tasks may be required to counter the enemy’s offense and engage the population and interconnected “internet of things.” Protection determines which threats disrupt operations and the rule of law, and then counters or mitigates those threats. Examples of specific collaborative and networked threats include cyber attacks, electronic attack, explosive hazards, improvised weapons, unmanned aerial and ground systems, and weapons of mass destruction. Battle networks are technologically enhanced Anti-Access/Area Denial (A2/AD) human-machine combat capabilities that integrate defense systems for territorial defense and/or protected coercive activities.

Source:
http://globalbalita.com/wp-content/uploads/2014/03/A2AD-offensive-against-Japan.jpg

Furthermore, countering networks requires an understanding of great powers competition and political ends. Geopolitical competitors develop strategies across the continuum of conflict relative to rival advantages and national interests. These strategies emphasize both direct and indirect approaches across all domains to reach political ends. A mixed approach facilitates statecraft and unbounded policy to offset perceived disadvantages, deliver key narratives, and shape international norms.

Intergovernmental Military Alliances
Photo credit: Wikimedia

The collaborative networks that possess distinctive ways to achieve political objectives include:

1) Conventional Joint and irregular proxy forces with integrated air, ground, and sea defense capabilities

2) Emergent and disruptive technological networks

3) Super-empowered individuals and asymmetric proxy networks

Examples of emergent and disruptive technologies are artificial intelligence, advanced robotics, internet of things consisting of low-cost sensors, and additive manufacturing (3D printing).

Client states and proxy networks present significant challenges for Joint and multinational alliances when used as a key component of a competitor’s grand strategy. Proxy networks, however, are not limited to non-state paramilitary or insurgent networks. These un-attributable organizations also include convergent terrorist, transnational organized crime, and international hacker organizations.

Here the Syrian rebels are a proxy for the United States, and the Syrian government a proxy for Russia.
Image Credit: Thomas Leger

Multinational companies, political parties, and civic groups also act as proxy networks with access to high-end technologies and geo-economic capabilities. Geo-economics refers to the use of economic instruments to manipulate geopolitical objectives. These networks then either blend and cooperate or compete with other proxy actors, based on various motivations and incentives.

Adversaries will also use artificial intelligence networks as proxies to deliver more deniable and innovative attacks. The efficacy of multi-domain networks with human-machine teaming correlates to partnering, engaging, and countering activities designed to shape, deter, and win.

Source:
https://www.hackread.com/darpa-squad-x-help-troops-pinpoint-enemy-in-warfare/

Finally, operational approaches designed to force critical factors analysis, decision-making, and assessments are critical to understanding human and technologically-enabled 21st century competition and conflict. The Joint Operational Area must be assessed as one extended domain with resilient strategic network configurations designed to partner with, engage, and counter diverse systems.

Mission command through human-machine teaming, networks, and systems integration is inevitable and will leverage human adaptability, automated speed, and precision as future capabilities. The global competition for machine intelligence dominance is becoming a key element of both the changing character of war and technical threat to strategic stability.

Modifying doctrine to account for advances in autonomy, narrow artificial intelligence, and quantum computing is inevitable, and human-machine teaming has global implications.

If you enjoyed this post, please note:

  • U.S. Army Training and Doctrine Command (TRADOC) G-2’s Red Diamond Threats Newsletter, Volume 8, Issue 10 October 2017 addresses Russian “Snow Dome” A2/AD human-machine combat capabilities on pages 7-12.

  • The transformative impact of AI, robotics, and autonomy on our Soldiers and networks in future conflicts is further addressed in Redefining the Role of Soldiers on the Future Battlefield.

  • Headquarters, U.S. Army Training and Doctrine Command (TRADOC) is co-sponsoring the Bio Convergence and Soldier 2050 Conference with SRI International at Menlo Park, California, on 08-09 March 2018. This conference will be live-streamed; click here to watch the proceedings, starting at 0840 PST / 1140 EST on 08 March 2018. Ms. Elsa Kania, Adjunct Fellow, Center for New American Security (CNAS), will address “People’s Liberation Army (PLA) Human-Machine Integration” on Day 2 (09 March 2018) of the Conference.



Victor R. Morris is a civilian irregular warfare and threat mitigation instructor at the Joint Multinational Readiness Center (JMRC) in Germany.