Autonomous & Hypersonic
Weapon Systems Conference
November 4-6, 2020
George Galdorisi (Captain U.S. Navy – retired)
Naval Information Warfare Center Pacific
Dr. Sam Tangredi (Captain U.S. Navy – retired)
U.S. Naval War College
This document discusses the changing nature of warfare due to new unmanned vehicle robotic technologies. It covers the current state of robotic technology in militaries, including unmanned ground vehicles (UGVs) and unmanned aerial vehicles (UAVs). The document also discusses future strategies that may involve hiding robots from sensors using decoys, fiber optic vehicles, electronic attack, and swarming robot strategies. It considers how technologies may change after electronic attacks and proposes concepts like cell phone dirigibles. The overall document examines how robotic technologies will impact future warfare.
acquisition, ash carter, Technology, Innovation and Modern War, department of defense, dod, hacking for defense, intlpol 340, joe felter, kill chain, max boot, military innovation, ms&e296, raj shah, requirements, stanford, Steve blank, China
Facing the World - 4.6.15 presentation with CW edits 2.6 AH1001Andy Healey
The document discusses how to effectively communicate during emergencies involving aviation accidents or incidents. It notes that media coverage of such events often includes speculation presented as fact, conflicting information, and "expert" commentary that may not be well-informed. This can lead to confusion and reputational damage. The document recommends that aviation organizations develop emergency communications plans with reliable spokespeople to proactively provide accurate information. It also stresses practicing such plans through exercises to ensure an effective response.
This document provides a retrospective from 1998 on intelligence challenges and proposed solutions. Some key points:
1. In the 1990s, the author recognized emerging threats like information warfare, transnational gangs, disease, and economic competition that conventional intelligence was not prepared to address.
2. A 2008 conference reiterated these issues and the need for a strategic model linking threats, preventive action, and whole-of-government/multinational cooperation.
3. The top threats to global security are said to be poverty, disease, environmental degradation, and conflict, according to a 2004 UN report, though these are still ignored.
4. To address today's threat of global destabilization, the author
acquisition, ash carter, department of defense, dod, hacking for defense, intlpol 340, joe felter, kill chain, max boot, military innovation, ms&e296, raj shah, requirements, stanford, Steve blank, Technology, Innovation and Modern War
The document discusses how machine-written news may redefine the core skills of human journalists. It summarizes the findings of a study on how content automation could change journalism. The study found that automation may put some journalists doing routine tasks out of work but could also allow journalists more time for in-depth reporting. Ultimately, audiences and publishers will decide how automation affects journalism.
The document discusses the threat of improvised explosive devices (IEDs) coming to America. It covers the nature of the problem, providing a general assessment of the threat. Specific topics discussed include suicide bombers, vehicle-borne IEDs (VBIEDs), and other considerations like the history and spread of attacks globally. The document aims to educate attendees on IED tactics used by terrorists to help prevent future attacks within the United States.
Lecture 1 -Technology, Innovation and Great Power CompetitionStanford University
acquisition, Mattis, Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&e296, raj shah, requirements, stanford, Steve blank, China,
This document discusses the changing nature of warfare due to new unmanned vehicle robotic technologies. It covers the current state of robotic technology in militaries, including unmanned ground vehicles (UGVs) and unmanned aerial vehicles (UAVs). The document also discusses future strategies that may involve hiding robots from sensors using decoys, fiber optic vehicles, electronic attack, and swarming robot strategies. It considers how technologies may change after electronic attacks and proposes concepts like cell phone dirigibles. The overall document examines how robotic technologies will impact future warfare.
acquisition, ash carter, Technology, Innovation and Modern War, department of defense, dod, hacking for defense, intlpol 340, joe felter, kill chain, max boot, military innovation, ms&e296, raj shah, requirements, stanford, Steve blank, China
Facing the World - 4.6.15 presentation with CW edits 2.6 AH1001Andy Healey
The document discusses how to effectively communicate during emergencies involving aviation accidents or incidents. It notes that media coverage of such events often includes speculation presented as fact, conflicting information, and "expert" commentary that may not be well-informed. This can lead to confusion and reputational damage. The document recommends that aviation organizations develop emergency communications plans with reliable spokespeople to proactively provide accurate information. It also stresses practicing such plans through exercises to ensure an effective response.
This document provides a retrospective from 1998 on intelligence challenges and proposed solutions. Some key points:
1. In the 1990s, the author recognized emerging threats like information warfare, transnational gangs, disease, and economic competition that conventional intelligence was not prepared to address.
2. A 2008 conference reiterated these issues and the need for a strategic model linking threats, preventive action, and whole-of-government/multinational cooperation.
3. The top threats to global security are said to be poverty, disease, environmental degradation, and conflict, according to a 2004 UN report, though these are still ignored.
4. To address today's threat of global destabilization, the author
acquisition, ash carter, department of defense, dod, hacking for defense, intlpol 340, joe felter, kill chain, max boot, military innovation, ms&e296, raj shah, requirements, stanford, Steve blank, Technology, Innovation and Modern War
The document discusses how machine-written news may redefine the core skills of human journalists. It summarizes the findings of a study on how content automation could change journalism. The study found that automation may put some journalists doing routine tasks out of work but could also allow journalists more time for in-depth reporting. Ultimately, audiences and publishers will decide how automation affects journalism.
The document discusses the threat of improvised explosive devices (IEDs) coming to America. It covers the nature of the problem, providing a general assessment of the threat. Specific topics discussed include suicide bombers, vehicle-borne IEDs (VBIEDs), and other considerations like the history and spread of attacks globally. The document aims to educate attendees on IED tactics used by terrorists to help prevent future attacks within the United States.
Lecture 1 -Technology, Innovation and Great Power CompetitionStanford University
acquisition, Mattis, Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&e296, raj shah, requirements, stanford, Steve blank, China,
1) The document discusses the need for holistic, whole-of-government intelligence that considers a wide range of threats and policies and is focused on decision support rather than secret sources or individual disciplines.
2) It argues that intelligence should not be divided into separate functions but viewed as a "scheme of things entire" and that supporting judgment should be a core function.
3) The document presents a preliminary holistic analytic model and identifies gaps in considering issues like poverty, disease, and environmental threats that are essential to future-proofing analysis.
This document summarizes a presentation given by John S. Canning on the legal, ethical, and policy issues surrounding autonomous weapons systems. It discusses meetings with lawyers, philosophers, computer scientists, and policy experts on this topic. Key legal issues addressed are weapons reviews to ensure compliance with international law and allowing autonomous systems to discriminate between legal and illegal targets. Ethical issues surround developing systems that avoid harming humans. Policy must consider these technical, legal and ethical factors to guide the responsible development of autonomous weapons.
Article review - "Sometimes the dragon wins: A perspective on information-age...stuimrozsm
1) The document summarizes a presentation by Colonel Charles J. Dunlap Jr. about how future information-age warfare may differ from modern conflicts.
2) It outlines 10 propositions about how future adversaries may be unlike Western militaries, using advanced technologies to level the battlefield and wage savage information and media campaigns.
3) It warns that the US should prepare for conflicts where opponents do not value self-preservation and may use unexpected tactics like collapsing economies or suicidal attacks to indirectly influence the US.
The US Government has refused since WWII to be serious about intelligence as decision support, instead treating intelligence (and now DHS) and mini versions of the DoD prok process. There is nothing intelligent about how the USG does intelligence, and that is our national sucking chest wound.
Lecture 5- Technology, Innovation and Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, JAIC, DIU, Mike Brown,Nand Mulchandani, Jacqueline Tame
This document summarizes a report titled "The Strategic Defense: America's Next National Security Concept" authored by Major Mark W. Elfers of the U.S. Marine Corps. The report argues that due to economic challenges, the U.S. needs to adopt a new national security concept called the "Strategic Defense." This concept would involve maintaining a credible military force but only using it defensively to defeat attacking enemies, rather than offensively attacking others. The report outlines this concept and addresses counterarguments, concluding that a Strategic Defense aligns with America's founding principles and would help ensure long-term national security.
War by other means. building complete and balanced capabilities for counterin...mmangusta
Insurgency and counterinsurgency are examined to improve U.S. capabilities for dealing with 21st century challenges. The study analyzes 89 insurgencies since WWII to understand why and how they begin, grow, and are resolved. Recommendations are provided to strengthen security and governance capabilities of local states, the U.S., and partners to more effectively counter insurgencies through a balanced approach incorporating both military and non-military means.
These are 19 questions for my international politics class. I need t.docxalisoncarleen
These are 19 questions for my international politics class. I need the answers in less than 24h. I'm not paying more than $25. It has to be fully answered! Please, if you don't know politics don't even bother. Please, don't waste my time.
Thanks.
Here you go:
Fully answer each question with the question number on the attached, rule sheets. Please keep all pages together.
ALL QUESTIONS, INCLUDING “OPINION QUESTIONS” REQUIRE CONCLUSIONS BASED UPON FULLY ARTICULATED AND REASONED PREMISES, NOT JUST A SUMMARY OPINION ANSWER,
1. lf a terrorist group sets off a nuclear bomb in one American city which city do you think they will choose and why? Discuss fully.
2. Nuclear Terrorism
a. Is it in the interests of a foreign government to harbor/sanction a terrorist group in its territory that it KNOWS to be planning to detonate a nuclear bomb in one or more American cities? Yes or no and why?
b. Discuss any immediate and long term consequences of such a government’s decision to harbor such a terrorist group?
3. Discuss problems of international scope that can be or have been created by the current three non—signatories to the Nuclear Non Proliferation Treaty Of 1969, namely, India, Pakistan and Israel. Note: also address North Korea, which though it has signed the NPT is not in current compliance. Iran has signed the NPT though there are issues with the West.
4. Thanks to hydraulic fracturing, or
fracking
, the United States is now the world’s number one producer of natural gas though not of oil. Yet, the worldwide price of oil is always valued in US. dollars. Why is this so? What international consequences or for individual countries might exist if oil were NOT so pegged in US. dollars?
5. Twenty-one leaders of the Nazi regime were tried at Nuremburg immediately after World War II. They were tried under four counts agreed by the victorious allies: war crimes not justified by military necessity, crimes against humanity, crimes against peace and waging aggressive war. Eleven defendants were hanged; three were acquitted and seven were given prison sentences. All imprisoned defendants were released early, except Albert Speer and Rudolf Hess who had been imprisoned in England after 1940. Except for War Crimes trials held at The Hague after the Bosnian War of 1993, no war crimes trials have been held, no perpetrators of Nuremburg offenses have been tried, punished or even sought out by the NATO allies or otherwise by the international community. With all of the destructive and genocidal wars that have occurred since WWII and the villains who have perpetrated Nuremburg crimes, why have not more war crimes trials occurred? Are the Nuremburg offenses of any enduring value? Is there such a thing as meaningful international law in the Nuremburg trials?
6. The Ukraine situation
a. Who or which side in the conflict do you think started the conflict and why?
b. Leaving aside who or which side is responsible for starting the conflict, do you think the Weste.
The document discusses challenges facing US defense innovation. It notes that while US defense spending remains the highest globally, it has declined in recent years due to budget constraints. This threatens US technological leadership, as other nations increase spending. The document outlines the history of US defense innovation and key actors like DOD, DARPA, and defense contractors. It analyzes issues like declining budgets, short-term thinking, acquisition problems, erosion of the defense industry, and rising foreign competition. Maintaining US innovation leadership will require restoring investment in defense R&D to develop new technologies and offset adversaries' capabilities despite limited budgets.
The document discusses the concepts of strategy and grand strategy in international relations. It provides definitions of strategy, grand strategy, and analyzes characteristics of the grand strategy process. It then summarizes the grand strategies of several countries, including the United States, India, and China. The US grand strategy during the Cold War was containment and post-Cold War has elements of both unipolar and multipolar approaches. India's strategy emphasizes non-alignment and moral persuasion. China's strategy focuses on relations with major powers through cooptation and prevention, military modernization, and influencing international regimes.
This document discusses military power and the use of force. It examines elements of power including military capability, economic size, population, and technology. It also analyzes trends in global military spending, the changing role of military power, and proliferation of weapons including nuclear, chemical, and precision guided munitions. The document also covers topics like deterrence, compellence, coercive diplomacy, and unilateral military intervention.
Special Operations West will take an in depth look at the current and upcoming changes for USSOCOM and SOF to ensure attendees have a complete understanding of Special Operations’ aims and needs. Join us for solution oriented discussion on the current military-industry relationship, its current impediments, and its future success.
Death Stars and Droids: Security in Zero GravityEmerson Jones
- An in-depth look at a upcoming possible area of conflict, especially under the guise of the recent announcement by the current presidential administration to stand up a space force by 2020.
Project White Horse analyzes worst case disaster response and decision making when time is critical. It considers scenarios like additional terrorist attacks following 9/11, such as suicide bombers merging with evacuating crowds. The project aims to understand decision making under uncertainty and identify skills like adaptability that are key for responding effectively. It examines implications of 4th generation warfare and issues around joint civil-military responses. The goal is to develop training focused on thinking about low probability but high consequence "what if" scenarios to improve crisis response.
The document summarizes a discussion from a 2008 Harvard executive session on unmanned and robotic warfare.
Over the past 10 years, the U.S. has made tremendous progress developing unmanned systems, growing from one UAV to over 5,000 systems deployed today. However, the rapid proliferation of new systems has also created issues with reliability, logistics, interoperability, and a lack of unified vision or requirements process. While technology is advancing quickly, the U.S. military faces challenges in keeping acquisition, training, and command structures adapted to maximize the potential of unmanned systems. Without addressing these issues, there is a risk that the U.S. could lose its advantage as other nations develop similar capabilities.
- President Ronald Reagan announced the Strategic Defense Initiative (SDI), nicknamed "Star Wars", in 1983 which envisioned creating a missile defense system to protect the US from nuclear attack.
- The SDI proposed developing new technologies like lasers and particle beams to intercept incoming missiles, replacing the policy of mutual nuclear deterrence between the US and Soviet Union during the Cold War.
- Reagan's announcement marked the beginning of extensive research into missile defense, though the technology proposed in 1983 was still far beyond what was feasible at the time.
This document discusses intelligence and open source information. It argues that intelligence should focus on decision support, holistic analysis, counterintelligence on domestic threats, and integrated scalable IT. The document outlines a preliminary holistic analytic model and proposes that open source information can address most economic, social and military threats. It advocates for a whole of government approach to intelligence that focuses on cross-cutting issues rather than individual countries or domains. The document also discusses the need for new rules and approaches for intelligence, including greater emphasis on non-traditional threats, cultural and geospatial analysis, and collaborative work.
The Army War College annual Strategy conferences are generally a decade or more ahead of what the generals can handle. This is a summary of the 2008 conference.
The Global Operating Environment: Strategic ImplicationsFabius Maximus
The document summarizes Colonel Douglas Macgregor's presentation on the global operating environment and its strategic implications. Some key points include:
1) Historic problems with American national military strategy include failure to recognize limited resources/patience, define attainable goals, accurately gauge competence, identify advantages, and understand opponents.
2) Emerging technologies in the early 20th century dramatically changed warfare but were not fully recognized or adapted to.
3) Regions discussed include Northeast Asia, Russia/Iran/Israel, Turkey/Saudi Arabia, Germany/France/NATO, with notes on challenges, opportunities and relationships between countries.
4) Future warfare will be characterized by increased lethality, expanded
Attribution, competition and military tactics in digital marketing mc syd sep...Scott Sunderland
1. Lessons from military strategists like Sun Tzu and von Clausewitz can be applied to digital marketing. This includes gaining trust from your team, knowing yourself and your competitors, using multiple marketing channels together (like combined arms in battle), and accepting uncertainty in decision making.
2. Smaller companies can prevail over larger competitors through leadership, geography, technology, strategy/tactics, and discipline rather than focusing solely on attribution modeling.
3. Building a great digital marketing team is more important than creating a perfect attribution model, as humans and war have change little over thousands of years despite technological advances.
The document discusses plotting techniques for writing successful novels, using George Galdorisi's presentation on writing naval and military fiction as an example. It explains Freytag's pyramid as a model for plot structure, with components like exposition, inciting incident, rising action, climax, and resolution. It also provides an analysis of the plot in The Wizard of Oz using this model to illustrate how to "deconstruct" a story's plot progression.
This document provides a summary of topics covered in previous weeks for establishing an online presence, including why write, writing for publication, and writing fiction and non-fiction. It then discusses finding the heart of a story by nurturing the original idea. This involves stating the idea in one sentence, focusing the idea from divergent to convergent thinking, and determining if it is just a story or has deeper intent. Developing the idea requires using who, what, why, where, when and how questions to expand the spark into a full narrative.
More Related Content
Similar to Algorithms of Armageddon: What Happens When We Insert AI Into Our Military Weapons Systems?
1) The document discusses the need for holistic, whole-of-government intelligence that considers a wide range of threats and policies and is focused on decision support rather than secret sources or individual disciplines.
2) It argues that intelligence should not be divided into separate functions but viewed as a "scheme of things entire" and that supporting judgment should be a core function.
3) The document presents a preliminary holistic analytic model and identifies gaps in considering issues like poverty, disease, and environmental threats that are essential to future-proofing analysis.
This document summarizes a presentation given by John S. Canning on the legal, ethical, and policy issues surrounding autonomous weapons systems. It discusses meetings with lawyers, philosophers, computer scientists, and policy experts on this topic. Key legal issues addressed are weapons reviews to ensure compliance with international law and allowing autonomous systems to discriminate between legal and illegal targets. Ethical issues surround developing systems that avoid harming humans. Policy must consider these technical, legal and ethical factors to guide the responsible development of autonomous weapons.
Article review - "Sometimes the dragon wins: A perspective on information-age...stuimrozsm
1) The document summarizes a presentation by Colonel Charles J. Dunlap Jr. about how future information-age warfare may differ from modern conflicts.
2) It outlines 10 propositions about how future adversaries may be unlike Western militaries, using advanced technologies to level the battlefield and wage savage information and media campaigns.
3) It warns that the US should prepare for conflicts where opponents do not value self-preservation and may use unexpected tactics like collapsing economies or suicidal attacks to indirectly influence the US.
The US Government has refused since WWII to be serious about intelligence as decision support, instead treating intelligence (and now DHS) and mini versions of the DoD prok process. There is nothing intelligent about how the USG does intelligence, and that is our national sucking chest wound.
Lecture 5- Technology, Innovation and Great Power CompetitionStanford University
Technology, Innovation and Great Power Competition,TIGPC, Gordian knot Center, DIME-FIL, department of defense, dod, hacking for defense, intlpol 340, joe felter, ms&e296, raj shah, stanford, Steve blank, AI, ML, AI/ML, china, JAIC, DIU, Mike Brown,Nand Mulchandani, Jacqueline Tame
This document summarizes a report titled "The Strategic Defense: America's Next National Security Concept" authored by Major Mark W. Elfers of the U.S. Marine Corps. The report argues that due to economic challenges, the U.S. needs to adopt a new national security concept called the "Strategic Defense." This concept would involve maintaining a credible military force but only using it defensively to defeat attacking enemies, rather than offensively attacking others. The report outlines this concept and addresses counterarguments, concluding that a Strategic Defense aligns with America's founding principles and would help ensure long-term national security.
War by other means. building complete and balanced capabilities for counterin...mmangusta
Insurgency and counterinsurgency are examined to improve U.S. capabilities for dealing with 21st century challenges. The study analyzes 89 insurgencies since WWII to understand why and how they begin, grow, and are resolved. Recommendations are provided to strengthen security and governance capabilities of local states, the U.S., and partners to more effectively counter insurgencies through a balanced approach incorporating both military and non-military means.
These are 19 questions for my international politics class. I need t.docxalisoncarleen
These are 19 questions for my international politics class. I need the answers in less than 24h. I'm not paying more than $25. It has to be fully answered! Please, if you don't know politics don't even bother. Please, don't waste my time.
Thanks.
Here you go:
Fully answer each question with the question number on the attached, rule sheets. Please keep all pages together.
ALL QUESTIONS, INCLUDING “OPINION QUESTIONS” REQUIRE CONCLUSIONS BASED UPON FULLY ARTICULATED AND REASONED PREMISES, NOT JUST A SUMMARY OPINION ANSWER,
1. lf a terrorist group sets off a nuclear bomb in one American city which city do you think they will choose and why? Discuss fully.
2. Nuclear Terrorism
a. Is it in the interests of a foreign government to harbor/sanction a terrorist group in its territory that it KNOWS to be planning to detonate a nuclear bomb in one or more American cities? Yes or no and why?
b. Discuss any immediate and long term consequences of such a government’s decision to harbor such a terrorist group?
3. Discuss problems of international scope that can be or have been created by the current three non—signatories to the Nuclear Non Proliferation Treaty Of 1969, namely, India, Pakistan and Israel. Note: also address North Korea, which though it has signed the NPT is not in current compliance. Iran has signed the NPT though there are issues with the West.
4. Thanks to hydraulic fracturing, or
fracking
, the United States is now the world’s number one producer of natural gas though not of oil. Yet, the worldwide price of oil is always valued in US. dollars. Why is this so? What international consequences or for individual countries might exist if oil were NOT so pegged in US. dollars?
5. Twenty-one leaders of the Nazi regime were tried at Nuremburg immediately after World War II. They were tried under four counts agreed by the victorious allies: war crimes not justified by military necessity, crimes against humanity, crimes against peace and waging aggressive war. Eleven defendants were hanged; three were acquitted and seven were given prison sentences. All imprisoned defendants were released early, except Albert Speer and Rudolf Hess who had been imprisoned in England after 1940. Except for War Crimes trials held at The Hague after the Bosnian War of 1993, no war crimes trials have been held, no perpetrators of Nuremburg offenses have been tried, punished or even sought out by the NATO allies or otherwise by the international community. With all of the destructive and genocidal wars that have occurred since WWII and the villains who have perpetrated Nuremburg crimes, why have not more war crimes trials occurred? Are the Nuremburg offenses of any enduring value? Is there such a thing as meaningful international law in the Nuremburg trials?
6. The Ukraine situation
a. Who or which side in the conflict do you think started the conflict and why?
b. Leaving aside who or which side is responsible for starting the conflict, do you think the Weste.
The document discusses challenges facing US defense innovation. It notes that while US defense spending remains the highest globally, it has declined in recent years due to budget constraints. This threatens US technological leadership, as other nations increase spending. The document outlines the history of US defense innovation and key actors like DOD, DARPA, and defense contractors. It analyzes issues like declining budgets, short-term thinking, acquisition problems, erosion of the defense industry, and rising foreign competition. Maintaining US innovation leadership will require restoring investment in defense R&D to develop new technologies and offset adversaries' capabilities despite limited budgets.
The document discusses the concepts of strategy and grand strategy in international relations. It provides definitions of strategy, grand strategy, and analyzes characteristics of the grand strategy process. It then summarizes the grand strategies of several countries, including the United States, India, and China. The US grand strategy during the Cold War was containment and post-Cold War has elements of both unipolar and multipolar approaches. India's strategy emphasizes non-alignment and moral persuasion. China's strategy focuses on relations with major powers through cooptation and prevention, military modernization, and influencing international regimes.
This document discusses military power and the use of force. It examines elements of power including military capability, economic size, population, and technology. It also analyzes trends in global military spending, the changing role of military power, and proliferation of weapons including nuclear, chemical, and precision guided munitions. The document also covers topics like deterrence, compellence, coercive diplomacy, and unilateral military intervention.
Special Operations West will take an in depth look at the current and upcoming changes for USSOCOM and SOF to ensure attendees have a complete understanding of Special Operations’ aims and needs. Join us for solution oriented discussion on the current military-industry relationship, its current impediments, and its future success.
Death Stars and Droids: Security in Zero GravityEmerson Jones
- An in-depth look at a upcoming possible area of conflict, especially under the guise of the recent announcement by the current presidential administration to stand up a space force by 2020.
Project White Horse analyzes worst case disaster response and decision making when time is critical. It considers scenarios like additional terrorist attacks following 9/11, such as suicide bombers merging with evacuating crowds. The project aims to understand decision making under uncertainty and identify skills like adaptability that are key for responding effectively. It examines implications of 4th generation warfare and issues around joint civil-military responses. The goal is to develop training focused on thinking about low probability but high consequence "what if" scenarios to improve crisis response.
The document summarizes a discussion from a 2008 Harvard executive session on unmanned and robotic warfare.
Over the past 10 years, the U.S. has made tremendous progress developing unmanned systems, growing from one UAV to over 5,000 systems deployed today. However, the rapid proliferation of new systems has also created issues with reliability, logistics, interoperability, and a lack of unified vision or requirements process. While technology is advancing quickly, the U.S. military faces challenges in keeping acquisition, training, and command structures adapted to maximize the potential of unmanned systems. Without addressing these issues, there is a risk that the U.S. could lose its advantage as other nations develop similar capabilities.
- President Ronald Reagan announced the Strategic Defense Initiative (SDI), nicknamed "Star Wars", in 1983 which envisioned creating a missile defense system to protect the US from nuclear attack.
- The SDI proposed developing new technologies like lasers and particle beams to intercept incoming missiles, replacing the policy of mutual nuclear deterrence between the US and Soviet Union during the Cold War.
- Reagan's announcement marked the beginning of extensive research into missile defense, though the technology proposed in 1983 was still far beyond what was feasible at the time.
This document discusses intelligence and open source information. It argues that intelligence should focus on decision support, holistic analysis, counterintelligence on domestic threats, and integrated scalable IT. The document outlines a preliminary holistic analytic model and proposes that open source information can address most economic, social and military threats. It advocates for a whole of government approach to intelligence that focuses on cross-cutting issues rather than individual countries or domains. The document also discusses the need for new rules and approaches for intelligence, including greater emphasis on non-traditional threats, cultural and geospatial analysis, and collaborative work.
The Army War College annual Strategy conferences are generally a decade or more ahead of what the generals can handle. This is a summary of the 2008 conference.
The Global Operating Environment: Strategic ImplicationsFabius Maximus
The document summarizes Colonel Douglas Macgregor's presentation on the global operating environment and its strategic implications. Some key points include:
1) Historic problems with American national military strategy include failure to recognize limited resources/patience, define attainable goals, accurately gauge competence, identify advantages, and understand opponents.
2) Emerging technologies in the early 20th century dramatically changed warfare but were not fully recognized or adapted to.
3) Regions discussed include Northeast Asia, Russia/Iran/Israel, Turkey/Saudi Arabia, Germany/France/NATO, with notes on challenges, opportunities and relationships between countries.
4) Future warfare will be characterized by increased lethality, expanded
Attribution, competition and military tactics in digital marketing mc syd sep...Scott Sunderland
1. Lessons from military strategists like Sun Tzu and von Clausewitz can be applied to digital marketing. This includes gaining trust from your team, knowing yourself and your competitors, using multiple marketing channels together (like combined arms in battle), and accepting uncertainty in decision making.
2. Smaller companies can prevail over larger competitors through leadership, geography, technology, strategy/tactics, and discipline rather than focusing solely on attribution modeling.
3. Building a great digital marketing team is more important than creating a perfect attribution model, as humans and war have change little over thousands of years despite technological advances.
Similar to Algorithms of Armageddon: What Happens When We Insert AI Into Our Military Weapons Systems? (20)
The document discusses plotting techniques for writing successful novels, using George Galdorisi's presentation on writing naval and military fiction as an example. It explains Freytag's pyramid as a model for plot structure, with components like exposition, inciting incident, rising action, climax, and resolution. It also provides an analysis of the plot in The Wizard of Oz using this model to illustrate how to "deconstruct" a story's plot progression.
This document provides a summary of topics covered in previous weeks for establishing an online presence, including why write, writing for publication, and writing fiction and non-fiction. It then discusses finding the heart of a story by nurturing the original idea. This involves stating the idea in one sentence, focusing the idea from divergent to convergent thinking, and determining if it is just a story or has deeper intent. Developing the idea requires using who, what, why, where, when and how questions to expand the spark into a full narrative.
This document provides an overview of content for a writing workshop. It discusses establishing writing goals, creating content for publications, and strategies for placing written work. Some key points covered include:
- Encouraging participants to share brief stories about their lives and writing inspirations.
- Advising writers to create interesting content for publications on topics they are passionate about in order to build relationships with editors.
- Suggesting a "building block" approach of starting with non-paying publications and working up to paid work.
- Offering tips for submitting work, such as following submission guidelines, writing a compelling pitch email, and providing sample materials to showcase writing style.
This document provides guidance on leveraging social media to promote writing and get published. It discusses establishing an online presence through nurturing original ideas and balancing entertaining and informative content. The document then focuses on social media challenges and opportunities, noting that everyone uses it but engagement, visibility, and momentum must be sustained. Specific social media platforms like email, blogging, Facebook, Twitter, and others are examined in terms of their benefits and how to best utilize them for writing promotion. Maintaining a balance of online and offline connections is advised.
This document provides information about writing novels, including the genres of mainstream and genre fiction, developing characters, plots, and action, as well as getting a novel published. It discusses that novels require strong storytelling ability through compelling characters, plots, and pacing to engage readers. Successful novels are grounded in truth but present something familiar in a new way to publishers and audiences.
This document provides guidance and advice for writing non-fiction books. It discusses determining what type of non-fiction book to write (narrative or prescriptive), overcoming common objections from publishers such as a book being "just an article" or the author lacking a platform, and how to write an effective query letter and book proposal to get a book deal. It also lists some iconic non-fiction writers and resources for learning more about writing in the non-fiction genre.
This document provides an overview of a seminar on why to write. It discusses that writers shape history through their works and outlines various writing mediums. It encourages building writing skills incrementally, from articles to books. It also stresses doing research by reading various publications to find story ideas and learn about different markets. Throughout, it shares advice from successful authors about working hard at writing and making time for it while balancing other responsibilities.
This document summarizes a presentation on finding and shaping original story ideas. It discusses generating an initial spark of an idea, then developing it by exploring what the plot is, who the characters are, what's at stake, and how it begins, progresses, and ends. It emphasizes focusing ideas through divergent and convergent thinking. The presentation also covers turning ideas into narratives and writing the full novel or story.
Finding the Heart of Your Story: Your Original Ideaggaldorisi
This document summarizes a workshop on developing original story ideas. It discusses exploring the kernel of an original idea and shaping it into a story. Attendees will learn how to generate ideas, fan the spark of an idea into a fire by developing plot, characters, stakes, and setting. The workshop also covers focusing an idea and determining if it is just a story or something more substantial, like conveying an emotion or theme. Attendees will then learn how to turn their idea into a narrative by creating a treatment and outline to develop the story without being chained to the initial idea.
You Don't Have to Make It Up: Breaking Into the Non-Fiction Marketggaldorisi
This document summarizes a lecture on breaking into the non-fiction book market. It discusses that non-fiction is easier to enter than fiction as it focuses on expertise in a topic rather than creative storytelling. It also emphasizes finding a topic you are passionate about and becoming an expert in through research. Further, it stresses convincing publishers that the topic has not been sufficiently covered elsewhere and that the author has a platform to promote the book. The summary provides the key high-level takeaways around subject selection, expertise, query letters, and book proposals.
The Secrets Behind Everything Successful Novelggaldorisi
The document provides guidance on writing a successful novel, including common steps successful writers follow. It discusses establishing a clear plot, developing characters, and ensuring enough action to keep readers engaged. Specific techniques are presented, such as deconstructing a novel treatment or outline using plot points, character details, and scenario summaries. The importance of storytelling skills like suspense and believable motivations are also covered. Overall, the document offers practical advice focused on organizing one's ideas and learning from examples to produce a publishable novel.
This document summarizes a presentation on developing original story ideas. It discusses generating the initial spark of an idea, developing it by focusing on the key questions of what, who, why, where, when and how. It emphasizes the importance of stating the idea in one sentence and examining if it has the elements of a protagonist, antagonist and conflict. The presentation also covers turning the idea into a narrative by creating a treatment and outline to convince oneself and others it is a full book. Attendees are provided online access to the workshop materials.
The Secrets Behind Every Successful Novelggaldorisi
The document provides an overview of a conference on writing successful novels. It discusses common steps that most successful writers follow, such as having a focused story with compelling characters, plot, and action. It then examines these elements in more detail, including how to develop characters, design plots using various structures, and ensure engaging action scenes. Examples are provided from well-known novels to illustrate these concepts. Overall, the document offers guidance on key ingredients of novels and how to approach writing a successful story.
This document provides an overview of topics covered in Tamara and Jerome's marketing course for books. The class covers creating and using a perpetual marketing calendar, branding oneself, writing bios, discovering one's target market, using social media, determining a marketing schedule, writing blogs and posts, deciding when to hire a PR firm, writing book pitches, doing podcasts and blog tours, and more. It also discusses establishing an online presence, engagement, design, visibility, and using various social media platforms like email, blogging, Facebook, Twitter, and others for book marketing purposes.
The document summarizes a workshop on finding the heart of your story and developing your original idea. The workshop covers generating original ideas, focusing an idea from divergent to convergent thinking, examining if an idea is just a story or something more meaningful, turning an idea into a narrative outline, and important elements of writing like characterization, plotting, and action. Attendees are provided materials and guidance to develop their story ideas.
This document summarizes a presentation given by Dick Couch at the Palm Springs Writers Guild on writing. It discusses Couch's background as a naval aviator and author. Couch explains that he writes about what he knows from his experiences. He writes adventure stories to relive the thrill of his past career. The presentation provides tips for writers, including starting small with articles and building experience, as well as the importance of establishing an online presence through websites and social media. It previews the next workshop on developing original story ideas.
This document summarizes a workshop on developing plots and narratives for books. The workshop covers analyzing other successful books to understand what works and doesn't work, focusing on protagonists and antagonists, ensuring the story has conflict to drive it forward, and providing a satisfying resolution. It emphasizes starting with a clear original idea that can be summarized in one sentence, and developing the characters, their goals and conflicts, complications throughout the story, and its climax and conclusion. The workshop aims to help authors take their ideas from inception to a full narrative structure that keeps readers engaged.
This document provides an overview of a writing workshop on finding the heart of your story and developing your original idea. It discusses generating ideas, focusing an idea from divergent to convergent thinking, and turning the idea into a narrative through outlining and plotting. It emphasizes developing the three key elements of characterization, plotting, and action. Specific techniques are presented like using Kipling's six questions to expand an idea and deconstructing a classic plot structure. Character examples from thriller novels are also provided.
The document provides an overview of a lecture titled "A Thrill a Minute: Crafting, Pitching, Writing, Selling and Promoting Thrillers" given by George Galdorisi at the La Jolla Writer's Conference. The lecture focuses on how to write a thriller novel, pitch it to agents and publishers, and work with a publisher to promote the book. It discusses developing a high concept and effective pitch, writing techniques like characterization, plotting and action, the publishing process, and book promotion strategies. The goal is to help attendees understand how to successfully publish a thriller with a mainstream publisher.
The document summarizes a workshop on developing plots and narratives for books. The workshop covers analyzing other successful books, focusing a story idea, developing protagonists and antagonists, shaping a story using character, conflict, climax and conclusion. Attendees will receive online access to workshop materials.
How To Cultivate Community Affinity Throughout The Generosity JourneyAggregage
This session will dive into how to create rich generosity experiences that foster long-lasting relationships. You’ll walk away with actionable insights to redefine how you engage with your supporters — emphasizing trust, engagement, and community!
Food safety, prepare for the unexpected - So what can be done in order to be ready to address food safety, food Consumers, food producers and manufacturers, food transporters, food businesses, food retailers can ...
This report explores the significance of border towns and spaces for strengthening responses to young people on the move. In particular it explores the linkages of young people to local service centres with the aim of further developing service, protection, and support strategies for migrant children in border areas across the region. The report is based on a small-scale fieldwork study in the border towns of Chipata and Katete in Zambia conducted in July 2023. Border towns and spaces provide a rich source of information about issues related to the informal or irregular movement of young people across borders, including smuggling and trafficking. They can help build a picture of the nature and scope of the type of movement young migrants undertake and also the forms of protection available to them. Border towns and spaces also provide a lens through which we can better understand the vulnerabilities of young people on the move and, critically, the strategies they use to navigate challenges and access support.
The findings in this report highlight some of the key factors shaping the experiences and vulnerabilities of young people on the move – particularly their proximity to border spaces and how this affects the risks that they face. The report describes strategies that young people on the move employ to remain below the radar of visibility to state and non-state actors due to fear of arrest, detention, and deportation while also trying to keep themselves safe and access support in border towns. These strategies of (in)visibility provide a way to protect themselves yet at the same time also heighten some of the risks young people face as their vulnerabilities are not always recognised by those who could offer support.
In this report we show that the realities and challenges of life and migration in this region and in Zambia need to be better understood for support to be strengthened and tuned to meet the specific needs of young people on the move. This includes understanding the role of state and non-state stakeholders, the impact of laws and policies and, critically, the experiences of the young people themselves. We provide recommendations for immediate action, recommendations for programming to support young people on the move in the two towns that would reduce risk for young people in this area, and recommendations for longer term policy advocacy.
UN WOD 2024 will take us on a journey of discovery through the ocean's vastness, tapping into the wisdom and expertise of global policy-makers, scientists, managers, thought leaders, and artists to awaken new depths of understanding, compassion, collaboration and commitment for the ocean and all it sustains. The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Algorithms of Armageddon: What Happens When We Insert AI Into Our Military Weapons Systems?
1. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation onlyDistribution Statement A: Approved for public release; distribution is unlimited.
Algorithms of Armageddon:
What Happens When We Insert AI Into Our
Military Weapons Systems?
Autonomous & Hypersonic
Weapon Systems Conference
November 4-6, 2020
George Galdorisi (Captain U.S. Navy – retired)
Naval Information Warfare Center Pacific
Dr. Sam Tangredi (Captain U.S. Navy – retired)
U.S. Naval War College
2. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 1
“Every day, men and women of the United States military risk
their lives in the defense of the United States and our
freedoms. Under extreme pressure and facing life and death
choices, they do an extraordinary job of protecting the United
States in a way that brings honor to our country and our
values.”
Lieutenant General Jack Shanahan
Former Director, Joint Artificial Intelligence Center
1
3. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence and Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
2
4. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
“My view is that technology sets
the parameters of the possible;
it creates the potential for a
military revolution.”
Max Boot
War Made New
3
5. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence and Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
4
6. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 5
“America’s military has no preordained right to victory on
the battlefield”
U.S. National Defense Strategy
5
7. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 6
China
Russia
North Korea
Global Counter-
Terrorism
Iran
Future Security Environment:
Four Contingencies, One Condition
“Long-term strategic competitions with China and Russia are the
principal priorities for the Department, and require both increased
and sustained investment …”
2018 National Defense Strategy
8. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
“The central challenge to
U.S. prosperity and security is
the reemergence of long-
term, strategic competition
by what the National Security
Strategy classifies as
revisionist powers. It is
increasingly clear that China
and Russia want to shape a
world consistent with their
authoritarian model.”
7
9. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
The “Pacing Threat”
8
10. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
The United States Has Always
Had a Pacing Threat
“War Plan Red” was one of the color-coded war plans created
by the U.S. War shortly after World War I to plan for a
hypothetical war with the United Kingdom (the "Red" forces –
and the pacing threat of the time). War Plan Red focused on
the potential for fighting a war with the British Empire and
detailed the steps needed to thwart a British invasion from
Canada or on the Atlantic Coast.
John Major
Historian Magazine
May 1998
9
11. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence and Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
10
12. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 11
“The chances of conflict will be higher in the years ahead
than at any time in recent memory.”
Director of National Intelligence
Global Trends: Paradox of Progress
11
13. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Third Offset Strategy
1950s: New Look Strategy
1970s: Offset Strategy
Today: Defense Innovation Initiative
14. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 13
Long Range
Research and
Development
Plan
Leadership
Development
Practices
New Approach
to Wargaming
Operational
Concepts
Efficient and
Effective
Business
Practices
Third Offset Strategy
Defense Innovation Initiative
Pillars Supporting the Third Offset Strategy
Components of the Third Offset Strategy
Technology Culture User Inputs
New Users /
Marketplace
Processes
15. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
LLRDP Focus: Human-Machine Teaming
Human-Machine
Teaming
Autonomous Deep
Learning Systems
Human-Machine
Collaboration
Assisted Human
Operations
Advanced Human-
Machine Combat
Teaming
Network-Enabled,
Semi-Autonomous
Weapons
14Built on a foundation of artificial intelligence and machine learning
16. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 15
“Hybrid human-machine architectures will be able to leverage
the precision and reliability of automation without
sacrificing the robustness and flexibility of human
intelligence.”
Paul Scharre
“Centaur Warfighting: The False Choice
Between Humans vs. Automation”
15
17. Distribution Statement F: Further dissemination only as directed by Commanding Officer or Executive Director, NIWC pacific
Let’s Talk About Human-Machine Teaming
16
18. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Fundamental Design Principles
• Commander’s intent, and acceptable use of autonomy
19. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Fundamental Design Principles
• Commander’s intent, and acceptable use of autonomy
20. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Fundamental Design Principles
• Commander’s intent, and acceptable use of autonomy
21. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Fundamental Design Principles
• Commander’s intent, and acceptable use of autonomy
22. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
“Never trust anything that can think for itself if you can't see
where it keeps it’s brain.”
J.K.Rowling
(Harry Potter and the Chamber of Secrets)
21
23. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence & Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
22
24. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 23
“For me it’s artificial intelligence. I think artificial intelligence
will likely change the character of warfare, and I believe
whoever masters it first will dominate on the battlefield for
many, many, many years. It’s a fundamental game changer.
We have to get there first.”
U.S. Secretary of Defense Michael Esper
Congressional Testimony July 16, 2019
In response to the question: “What is the
number one priority for DoD technology
modernization?”
23
25. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
“On the top of my list I would put artificial intelligence.”
Admiral Michael Gilday
Chief of Naval Operations
Speaking on technology priorities
24
26. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
“Our current resource request prioritizes our future naval force
capabilities: not just conventional, but also next generation
weapons like artificial intelligence, unmanned/man-
machine learning and integration.”
General David Berger
Commandant of the Marine Corps
Speaking on the future of the Marine Corps
25
27. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 26
“The Department Defense is working through the problems of
future robotic weapon systems–so-called thinking weapons.
We’re not talking about cruise missiles or mines, but
robotic systems to do lethal harm–a Terminator without a
conscience. Our job is to defeat the enemy, but it is
governed by law and by convention. We have insisted on
keeping humans in the decision-making process to inflict
violence on the enemy. That ethical boundary is the one
we’ve drawn a pretty fine line on. It’s one we must consider
in developing these new weapons.”
General Paul Selva
Former-Vice Chairman of the Joint Chiefs of Staff
26
Distribution Statement A: Approved for public release; distribution is unlimited.
26
28. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 27
29. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence and Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
28
30. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 29
“
29
“Astronauts David Bowman and Frank Poole consider
disconnecting HAL's (Heuristically programmed ALgorithmic
computer) cognitive circuits when he appears to be mistaken
in reporting the presence of a fault in the spacecraft's
communications antenna. They attempt to conceal what they
are saying, but are unaware that HAL can read their lips.
Faced with the prospect of disconnection, HAL decides to kill
the astronauts in order to protect and continue its
programmed directives.
From Stanley Kubrick’s
2001: A Space Odyssey (1968)
31. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 30
32. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 3131
“As they become smarter and more widespread, autonomous machines
are bound to end up making life-or-death decisions in unpredictable
situations, thus assuming—or at least appearing to assume—moral
agency. Weapons systems currently have human operators “in the
loop”, but as they grow more sophisticated, it will be possible to shift to
“on the loop” operation, with machines carrying out orders
autonomously. As that happens, they will be presented with ethical
dilemmas…More collaboration is required between engineers, ethicists,
lawyers and policymakers, all of whom would draw up very different
types of rules if they were left to their own devices.”
“Morals and the Machine”
The Economist June 2012
33. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 32
“If you find the use of remotely piloted warrior drones troubling,
imagine that the decision to kill a suspected enemy is not made by
an operator in a distant control room, but by the machine itself.
Imagine that an aerial robot studies the landscape below, recognizes
hostile activity, calculates that there is minimal risk of collateral
damage, and then, with no human in the loop, pulls the trigger.
Welcome to the future of warfare. While Americans are debating the
president's power to order assassination by drone, powerful
momentum – scientific, military and commercial – is propelling us
toward the day when we cede the same lethal authority to
software.
Bill Keller “Smart Drones”
The New York Times March 201
32
34. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 33
“The theoretical physicist Stephen Hawking told us that “the
development of full artificial intelligence could spell the end of the
human race.” Elon Musk, the chief executive of Tesla, told us that A.I.
was “potentially more dangerous than nukes.” Steve Wozniak, a co-
founder of Apple, told us that “computers are going to take over from
humans” and that “the future is scary and very bad for people.”
Alex Garland
“Alex Garland of ‘Ex Machina’ Talks About Artificial Intelligence”
The New York Times April 22, 2015
33
35. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence and Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
34
36. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
DoD’s Vision for Unmanned Systems
▼ Interoperability as a major thrust area for
the integration of unmanned systems
▼ Autonomy as a revolutionary warfighting
concept
▼ Network security to prevent disruption or
manipulation
▼ Human-Machine collaboration as an
ultimate objective
“DoD maintains a vision for the continued
expansion of unmanned systems into the
Joint Force structure.” Foundational areas of
interest that will accelerate the integration of
unmanned systems include:
37. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 36
“DoD envisions unmanned systems seamlessly operating
with manned systems to compress the warfighters’
decision-making process while reducing the risk to human
life.”
DoD Unmanned Systems
Integrated Roadmap: 2017-2042
36
38. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 37
“Over the past several years, the DoD’s main operational AI
efforts have been focused on missions such as intelligence,
surveillance and reconnaissance; humanitarian assistance
and disaster relief; and predictive maintenance.”
Lieutenant General Jack Shanahan
Director, Joint Artificial Intelligence Center
37
39. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 38
“Over the past several years, the DoD’s main operational AI
efforts have been focused on missions such as intelligence,
surveillance and reconnaissance; humanitarian assistance
and disaster relief; and predictive maintenance.”
Lieutenant General Jack Shanahan
Director, Joint Artificial Intelligence Center
38
40. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
“Please don’t bring me a shiny new widget and tell me that it’s
going to rock my world, unless you can describe my
operational environment to me.”
Admiral Scott Swift
Commander, U.S. Pacific Fleet
Keynote address at the PACOM
Operational S&T Conference
March 7, 2017
39
41. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 40
42. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
C4ISR In Action
▼ Knowing what is ahead of the
strike group
The ISR in C4ISR
▼ Communicating this information to
the strike group
The Communications in C4ISR
▼ Helping the Commander make the
best decision.
The C2 in C4ISR
▼ All this is undergirded by
computers
The Computers in C4ISR
41
43. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
ISR Mission
• Does the Triton send countless hours of video, or
does it alert the operator when a vessel is
located?
• When the Triton does find a vessel, does it:
• Flag it if it isn’t following a normal shipping
channel?
• Correlate Automatic Identification System
(AIS) data?
• Show the vessel’s port of origin and
destinations?
• Does the Triton show areas it should search next
based on:
• Vessels it has found (or not found) in
certain areas?
• Reports of other friendly surveillance
systems?
• Based on GCCS or other reports?
• Does the Triton employ automatic classification
algorithms?
• Does it remind the operator of on-station time?
44. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Communications Mission
• Does the Triton assess the electronic
environment prior to sending information to the
flagship?
• Does the Triton survey multiple communications
paths to:
• Prioritize data transmission based on
commanders intent?
• Determine speed of transmission and
time of arrival?
• Determine levels of vulnerability to
communications intercept?
• If the vulnerability of intercept is too high:
• Does the Triton fly back toward to the
flagship to transmit line-of-sight?
• Does the Triton launch a smaller UAV to
fly back to the flagship?
• Does the Triton warn the strike group regarding
the overall EW environment?
45. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Command and Control Mission
• Is the Commander presented with well-curated
information regarding what is ahead of the force?
• Does the Commander have optimal operational
and tactical decision aids?:
• Is he presented with the pros and cons of
moving forward, waiting, or retreating/
• Is he provided with a well-nuanced idea of
where he should scout next?
• Is he provided with a sense of whether his
forces are adequate for the mission?
• Is he presented with options for additional
forces to draw upon?
• Do operational and tactical decision aids provide
a range of options for the Commander?:
• Do the evaluate the pros and cons of
various courses of action?
• Do they suggest areas where additional
information is needed?
• Are they able to develop suggested COAs
based on commander’s intent?
46. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Lethal Mission
(The Bar is Higher)
• What is the level of confidence this person is
the intended target?
• What is this confidence based on:
• Facial recognition?
• Voice recognition?
• Pattern of behavior?
• Association with certain individuals?
• Proximity of known family members?
• Proximity of known cohorts?
• What is the potential for collateral damage to:
• Family members?
• Known cohorts?
• Unknown persons?
• What are the potential impacts of waiting verses
striking now?
47. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence and Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
46
48. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 47
“The most valuable contribution of AI to U.S. defense will be
how it helps human beings to make better, faster and
more precise decisions, especially during high-
consequence operations.”
Lieutenant General Jack Shanahan
Director, Joint Artificial Intelligence Center
47
49. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 48
50. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 49
51. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
CNO on the Changing Character of War
From:
Traditional Focus
To:
Emerging Competition
50
From Precision to Decision…
How Will Big Data, AI, and Machine Learning
Lead This Shift?
Source: CNO Remarks at the Current Strategy Forum
52. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 51
53. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
54. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
“If a force can harness AI to allow decision makers to make
decisions faster than the adversary, it will win every time.”
The Honorable James Geurts
ASN RD&A
Keynote Address
West Symposium
February 8, 2018
53
55. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 5454
Decision-Making Impacts All Aspects
Of What Warfighters Must Contend With
56. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 55
57. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
58. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
59. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Have Our Warfighters Had Adequate
Information to Make Informed Decisions?
▼ 1987: USS Stark
▼ 1988: USS Vincennes
▼ 1994: USAF Strike Eagles, USA Blackhawks
▼ 2001: USS Greenville
▼ 2017: USS Fitzgerald
▼ 2017: USS John McCain
58
60. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 59
In May 1987, USS Stark (FFG-31) was on patrol near the
Iran–Iraq War exclusion boundary. Incorrectly believing
that neither of the belligerents would target an American
warship, the captain was not initially alarmed when Stark
attempted to communicate with and incoming aircraft. The
Iraqi Mirage jet fired two Exocet missiles, killing thirty-seven
Americans and wounding almost two-dozen others.
59
Distribution Statement A: Approved for public release; distribution is unlimited.
59
61. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 60
In July 1988, with memories of the captain of USS Stark
failing to take action to protect his ship, with the Iran-Iraq war
still raging, and while his ship was being hounded by Iranian
gunboats, the captain of USS Vincennes (CG-49) mistakenly
believed that an approaching aircraft was closing and
descending on an attack profile. He fired an SM-2ER
missile and shot down Iran Air Flight 655, killing all 290
people onboard.
60
Distribution Statement A: Approved for public release; distribution is unlimited.
60
62. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 61
In April 1994, two U.S. Air Force F-15 Strike Eagles shot
down two U.S. Army UH-60 Blackhawk helicopters over Iraq,
believing that they were Iraqi Mi-24 Hind helicopters, killing all
26 military and civilians aboard. Miscommunication
between the Air Force AWACS control aircraft and the
Strike Eagles, as well as failures of automated
identification friend or foe (IFF) systems, were the
proximate causes of this tragedy.
61
Distribution Statement A: Approved for public release; distribution is unlimited.
61
63. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 62
In February 2001, ten miles south of the island of Oahu, in a
demonstration for VIP civilian visitors, the nuclear
submarine USS Greenville (SSN-772) performed an
emergency ballast-blow maneuver and surfaced under the
Japanese fishing vessel Ehime Maru. Nine of the thirty-five
people on board were killed.
62
Distribution Statement A: Approved for public release; distribution is unlimited.
62
64. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 63
In June 2017, USS Fitzgerald (DDG-62) collided with the
container ship MV ACX Crystal. Seven of her crew were
killed, and several others were injured. Just three months
later, USS John S. McCain (DDG-56) collided with the
Liberian-flagged tanker Alnic MC. Ten of her crew died as
a result of the crash.
63
Distribution Statement A: Approved for public release; distribution is unlimited.
63
65. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
What We’ll Talk About Today
▼ Strategic Perspective: Return to Peer-to-Peer Competition
▼ The U.S. DoD Response: Third Offset Strategy
▼ Leveraging Big Data, Artificial Intelligence and Machine Learning
▼ Allying Public Concerns Regarding “Killer Robots”
▼ Unmanned Systems: One U.S. DoD Use Case
▼ A More Universal Use Case: Better Decision-Making
▼ Ensuring That Our Warfighters Can Out-Think Our Adversaries
64
66. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 65
“Humans versus machines is a false choice. The best
systems will combine human and machine intelligence to
create hybrid cognitive architectures that leverage the
advantages of each.”
Paul Scharre
Centaur Warfighting:
The False Choice Between
Humans Vs. Automation
Distribution Statement A: Approved for public release; distribution is unlimited.
67. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
NIWC Pacific
Unmanned Systems History
Triton UAV - 2001UGVs – 1980s
Free Swimmer AUV - 1985
MK18 UUV – Early 2000s
68. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Autonomous Systems at NIWC Pacific Today
▼ Infrastructure for all UxS
domains
40+ Active UxS Projects
− Advanced Autonomy
− Human Machine Teaming
− Sensor Fusion
− Communications
− Payloads
− Operational T&E
− S&T Research
▼ Expert Personnel
400+ government scientists
and engineers
40+ years in unmanned
systems
69. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
We Make Autonomous Systems Smarter
70. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Industry On-Ramps to Ensure To Help Our
Warfighters Leverage BD/AI/ML
▼ There are important corporate, training, maintenance and other
military challenges BD/AI/ML can help address
▼ That said, today’s warfighters need BD/AI/ML to help address
operational challenges (Triton example)
▼ The JIAC Director suggests going after the low-hanging fruit and just
“rolling up our sleeves”
▼ There is no more propitious time for industry to offer BD/AI/ML
solutions to the U.S. military than now
▼ TTC is the right organization, in the right place, at the right time to
help further a dialogue in this effort
▼ NIWC Pacific has enormous equities in unmanned systems,
BD/AI/ML and has strong partnerships with industry
Distribution Statement A: Approved for public release; distribution is unlimited.
69
71. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Channel Nike: “Just Do It” to Get AI
Into Our Warfighter’s Hands
72. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 71
“The United States Navy and Marine Corps have a strategic
imperative to exploit emergent and rapidly developing
unmanned and autonomous technologies.”
James F. Geurts
ASN RDA
Distribution Statement A: Approved for public release; distribution is unlimited.
73. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
Summary and Suggestions for
Military-Industry Dialogue
▼ As with the U.S. Navy Nuclear Power Program, there is a burden of
proof to “first do no harm” with military weapons systems
▼ It is likely a bridge too far to “engineer out” all potential ethical issues
when inserting BD/AI/ML into military weapons systems
▼ Providing operators with the ability to make better decisions, faster,
with fewer people and few mistakes is the key to success
▼ How do this is not a trivial challenge and is worthy of further
coordinated effort and investment by military-industry teams
▼ To that end, it is important to an ongoing conversation about how to
mindfully insert BD/AI/ML into military weapons systems
Distribution Statement A: Approved for public release; distribution is unlimited.
72
74. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only
75. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only 74
Distribution Statement A: Approved for public release; distribution is unlimited.
76. Distribution Statement A: Approved for public release; distribution is unlimited. Note: For presentation only