It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: howmuch4another
a reply to: elliotmtl
In fairness to the OP originally the thread was based on the video and the possible application of the data collection into a more robust computing element that created the AI conspiracy accusation. The Raytheon paper was added by another member and is clearly about coordinating the simulation for an exercise in 2007.
The possibility of AI combined with NSA data collection creates just enough of a feasibility cause heads to explode. The reporter isn't credible nor did she provide any real evidence, just supposition so it is just conspiracy.
JADE (Joint Assistant for Deployment and Execution) is a knowledge-based, mixed-initiative system that supports force deployment planning and management. JADE uses case-based and generative planning methods to support the development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three tools: Prodigy-Analogy (a combined case-based and generative planner developed by Carnegie Mellon University); ForMAT (a Force Management and Analysis Tool that supports case-based force deployment planning developed by BBN Technologies); and PARKA (a highly-indexed knowledge based management system developed by the University of Maryland). With JADE, a military planner can build a preliminary force deployment plan, including the Time Phased Force Deployment Data (TPFDD) in less than one hour. This speed in plan construction is possible because JADE supports the rapid retrieval and reuse of previous plan elements for use in the development of new plans. In addition, JADE employs an easy to use map-oriented drag and drop interface where force modules (FMs) from previous plans (cases) whose force capabilities and composition match the requirements of the current situation can be dragged from the case library and dropped onto a geographic destination. Plan modification and/or adaptation is supported through remindings, e.g., each time that a force module is created or is copied into a plan (TPFDD) the user is automatically reminded of the need for geographical changes.
originally posted by: Aqualung2012
a reply to: Thorneblood
No, it means literally that the President of the United States (and the other participating military powers of the world) will no longer be recognized as "Commander in Chief." The computer will be responsible for who lives and who dies, it is capable of determining INTENT of officers/enemies/civilians.... intent. It is not under the influence of emotions, regret or any of the like... it is designed to be the most effective and efficient killer it can be.
It's already got everything it needs. This is why the "meta-data" argument is BS.... meta-data is useless in a system like this: it absolutely needs all of our voice and text messages because it is literally MAPPING our minds. It knows our behavior and can predict intent. Bigger than huge, like I say.
Beyond Reactive Planning:
Self Adaptive Software and Self Modeling Software in Predictive Deliberation Management
The purpose of this paper is to examine an approach to planning which extends beyond the traditional reactive planning state space. We present the following hypothesis: predictive deliberation management using self adapting and se lf modeling software will be required to provide mission planning adjustments after the start of a mission. Self adaptive software evaluates its own behavior and changes behavior when the evaluation indicates that it is not accomplishing what the software is intended to do, or when better functionality or performance is possible1.
Self modeling systems construct their own abstractions as a basis of computational intelligence2. In order to provide a proper process context for the evolution of software toward this level of autonomy, and in alignment with the proposed planning maturity models3, we put forth a concept of a NCW C2 Software Maturity Model. This new C2 software maturity model will take software beyond the service oriented paradigm into a new era of software designing its own replacements or modifications in order to satisfy new command and control requirements.
Performance Measures for Edge Organizations: A Preliminary Report Taking an information-processing view of organizations, we address th e need for building a robust set of performance measures for Edge Organizations (E Os). Alberts and Hayes in Power to the Edge: Command, Control in the Information Age conceptualized EOs as information-intensive entities whose performance is directly related to their ability for agile information processing. We ask the question, how can we measure the information-processing capacities of EOs? To this end, in this research-in-progress paper, we examine (1) the technical dimension of information flows, (2) the human-dimension of information flows, and (3) the socio-technical dimensions of info rmation flows. The technical dimension represents movement of information between two machine nodes and can be informed by drawing on performance measures for telecommunications network theory. The social dimension represents the movement of information between two human nodes for which we examine the literature on social networks for performance measures. Finally, the so cio-technical dimension re presents movement of information between human and technical nodes or vice versa.
To develop measures for these information flows we must not only extend, and customize, the performance measures from telecommunications networks and social networks, but also draw on measures in the disciplines of decision sciences, information sciences, and organizational science, among others.
Disruptive Effects of Net-Centri city on Command and Control
This paper explores the potential for net-centric operating environments to disrupt traditional practices in command and control. We conclude that at least two major disruptive effects are likely: information non- attribution and control decentralization. Information non-attribution reverses the assumption that commands are issued from an individua l entity to an individual entity. In net-centric worlds, orders will be issued to a resource pool, and information will be gleaned from an infosphere. The military command hierarchy must therefore get accustomed to issuing orders to “nobody in particular,” and commanders will lack an individual subordinate with whom to attribute the responsibility. Conversely, they must accept information from the infosphere without the trust inherited from known reliable providers. Control decentralization is a tendency for decision-making to migrate to the “edges” of the organization, where the most direct sensors and effectors are physically located. Net-centricity directly empowers those closest to the action by giving them access to information of quality and quantity that is potentially equal to or better than that available in command centers. Together, these effects of net-centricity suggest disruptive changes in command and control practices that must be modeled and explored as the vision of net-centric command and control becomes a reality.
Supporting Adaptive C2 Structures in Time-critical Environments
As technological advances allow automation of many operations, human operators supervise systems with increasing breadth of scope. In these complex environments, decisions regarding resource assignment to tasks, goal prioritization and coordination strategies during unexpected events become unwieldy as the problem spaces grow. In this paper, we describe the development of technology to support teams of operators controlling teams of unmanned vehicles (UVs) in their global resource planning and re-planning. These teams include a several coordinating Littoral Combat Ships, a mixture of autonomous vehicle types, typically with a range of differing capabilities, and management by multiple human operators attempting to achieve several high-level goals. Using the results of a Cognitive Work Analysis, we extend our work in organization design and analysis to give real-time support to the operators.