13,693 research outputs found

    Post-Westgate SWAT : C4ISTAR Architectural Framework for Autonomous Network Integrated Multifaceted Warfighting Solutions Version 1.0 : A Peer-Reviewed Monograph

    Full text link
    Police SWAT teams and Military Special Forces face mounting pressure and challenges from adversaries that can only be resolved by way of ever more sophisticated inputs into tactical operations. Lethal Autonomy provides constrained military/security forces with a viable option, but only if implementation has got proper empirically supported foundations. Autonomous weapon systems can be designed and developed to conduct ground, air and naval operations. This monograph offers some insights into the challenges of developing legal, reliable and ethical forms of autonomous weapons, that address the gap between Police or Law Enforcement and Military operations that is growing exponentially small. National adversaries are today in many instances hybrid threats, that manifest criminal and military traits, these often require deployment of hybrid-capability autonomous weapons imbued with the capability to taken on both Military and/or Security objectives. The Westgate Terrorist Attack of 21st September 2013 in the Westlands suburb of Nairobi, Kenya is a very clear manifestation of the hybrid combat scenario that required military response and police investigations against a fighting cell of the Somalia based globally networked Al Shabaab terrorist group.Comment: 52 pages, 6 Figures, over 40 references, reviewed by a reade

    U.S. Military Innovation In The 21st Century: The Era Of The “Spin-On”

    Get PDF
    The intersection between the U.S. military and technological innovation, a “military-innovation nexus,” has led to the genesis of key technologies, including nuclear energy, general computing, GPS, and satellite technology from World War II to the present. However, an evolving innovation context in the twenty-first century, including the leadership of the commercial sector in technology innovation and the resurgence of great power competition, has led to doubts about the ability of the Department of Defense to discover and promote the technological innovations of the future. The Third Offset Strategy was formulated in 2014 in response to these concerns: The offset strategy promulgated reforms to bring the Pentagon and the commercial sector closer together while creating alternative contracting mechanisms for streamlined procurement and prototyping. Using defense biometrics and artificial intelligence as case studies of spin-on innovations adopted by the military, this Article seeks to understand the efficacy of the reforms undertaken under the auspices of the Third Offset Strategy to improve the institutional underpinnings of the U.S. innovation system for national security. I argue that the Third Offset Strategy has allowed the Pentagon to more effectively procure, develop, and field commercial technologies in the twenty-first century, and I conclude by proposing modest recommendations for the successful acquisition of spin-on innovations

    SERENITY: THE FUTURE OF COGNITIVE MODULATION FOR THE HYPER ENABLED OPERATOR

    Get PDF
    In the Special Operations community, cognitive enhancement and resilience is at the forefront of the 2035 Hyper Enabled Operator Program (HEO). The United States Special Operations Command’s vision is to combine cutting-edge communications and data capabilities into a next generation tactical system for the end user. Using algorithms and autonomous systems to enhance the ability to make rational decisions faster can ultimately determine life or death on the battlefield. Over the past several years, cognitive enhancement with the introduction of brain computer interface (BCI) technology has had major breakthroughs in the medical and science fields. This thesis looks to analyze BCI technology for future cognitive dominance and cognitive overmatch in the Hyper Enabled Operator. Machine-assisted cognitive enhancement is not beyond reach for special operations; throughout the research and after multiple interviews with subject matter experts, it has been concluded that interfaces using transcranial alternating current stimulation (tACS), median nerve stimulation (MNS), or several other exploratory procedures have been successful with enhancing cognition and reducing cognitive load. Special Operations should not shy away from transformational innovative technology or wait for commercial or lab-tested solutions. To start, Special Operations should foster avant-garde theories that provide solutions and evolve ideas into unsophisticated prototypes that can be fielded immediately.Major, United States ArmyApproved for public release. Distribution is unlimited

    Computable Rationality, NUTS, and the Nuclear Leviathan

    Get PDF
    This paper explores how the Leviathan that projects power through nuclear arms exercises a unique nuclearized sovereignty. In the case of nuclear superpowers, this sovereignty extends to wielding the power to destroy human civilization as we know it across the globe. Nuclearized sovereignty depends on a hybrid form of power encompassing human decision-makers in a hierarchical chain of command, and all of the technical and computerized functions necessary to maintain command and control at every moment of the sovereign's existence: this sovereign power cannot sleep. This article analyzes how the form of rationality that informs this hybrid exercise of power historically developed to be computable. By definition, computable rationality must be able to function without any intelligible grasp of the context or the comprehensive significance of decision-making outcomes. Thus, maintaining nuclearized sovereignty necessarily must be able to execute momentous life and death decisions without the type of sentience we usually associate with ethical individual and collective decisions

    Europe's Capacity to Act in the Global Tech Race: Charting a Path for Europe in Times of Major Technological Disruption

    Get PDF
    Technological leadership has become a central dimension of geopolitical power. In this development, the primary front in the emerging tech power rivalry is between the US (United States of America) and China (People’s Republic of China). The European Union (EU) has fallen behind and needs to catch-up. The stakes in this race are high and will have an impact on economic competition, national security and broader values-based notions of political order. This study sheds light on Europe’s approach to technological mastery. This study looks into the progress of the EU and its member states across selected technological fields and their global entanglements with other nations and technology actors

    Defining Biometrics: Toward a Transnational Ethic of Personal Information

    Get PDF
    Innovations in biotechnology, computer science, and engineering throughout the late 20th and early 21st centuries dramatically expanded possible modes of data-based surveillance and personal identification. More specifically, new technologies facilitated enormous growth in the biometrics sector. The response to the explosion of biometric technologies was two-fold. While intelligence agencies, militaries, and multinational corporations embraced new opportunities to fortify and expand security measures, many individuals objected to what they perceived as serious threats to privacy and bodily autonomy. These reactions spurred both further technological innovation, and a simultaneous proliferation of hastily drafted policies, laws, and regulations governing the collection, use, and sharing of biometric data. In this paper, I argue that these policies are predicated on a fundamental misunderstanding of the nature of biometric information. Definitions of biometrics presume that “biologicalness” is binary. These definitions also imply, for a number of reasons, that biometric information is more dangerous than other kinds of personal information, therefore requiring stricter regulation. I propose an alternative explanation of biometrics, situating biometric information on a larger spectrum of personal information, rather than in a discrete category of its own. This revised definition of biometrics is necessary to effectively regulate personal information, particularly as the trend of rapid technological growth and change continues. I focus, in particular, on the implications of these findings in a transnational context, where transmission of personal information is largely unregulated, and has significant impact on international relations, security, and individual privacy

    Real Islamic Logic

    Get PDF
    Four options for assigning a meaning to Islamic Logic are surveyed including a new proposal for an option named "Real Islamic Logic" (RIL). That approach to Islamic Logic should serve modern Islamic objectives in a way comparable to the functionality of Islamic Finance. The prospective role of RIL is analyzed from several perspectives: (i) parallel distributed systems design, (ii) reception by a community structured audience, (iii) informal logic and applied non-classical logics, and (iv) (in)tractability and artificial intelligence

    Cyber-Human Systems, Space Technologies, and Threats

    Get PDF
    CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp

    The Need for An Australian Regulatory Code for the Use of Artificial Intelligence (AI) in Military Application

    Get PDF
    Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of Armed Conflict, and the Use of Force. This paper examines comparative international regulatory approaches across major allied nations in the US, UK, and Europe and suggests future direction for Australian regulation of AI in lethal application
    • …
    corecore