It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

The "Jade" In Jade Helm 15 is an A.I. Software Program

page: 4
90
<< 1  2  3    5  6  7 >>

log in

join
share:

posted on Jun, 30 2015 @ 09:10 PM
link   
From PDF:




New Software Platform Capabilities and Experimentation Campaign for ELICIT
ELICIT is the Experimental Labora tory for Investigating Information-sharing Coll aboration and Trust. A project of the Command and Control Research Prog ram (CCRP) within the Office of the Assistant Secretary of Defense (NII), the ELICIT project deve loped an online multi-user software platform for conducting experiments in information-sharing and tr ust. The initial version of the software allowed researchers to model and experiment with a limited set of Command and Cont rol (C2) organizations, processes and approaches in a computer-instrumented environment. The ELICIT software has since been enhanced to allow organization type to be configurable , thereby allowing researchers to experiment with a wider variety of C2 organizations, processes and appr oaches. In addition, the software has been further enhanced to support software agents as well as hu man participants, greatly expanding the avenues for research. Although the introduction and use of ELIC IT remain relatively recent events, considerable research has been conducted already using this experimentation platform , and the C2 Research Community is gaining commensurate experience and insight into sound research design. Building upon such research and experience, we develop a multidimensional campaign for continued experimentation using the ELICIT platform. The campaign is populated with recent studies and guides future researchers toward high-payoff research areas that can be addressed using ELICIT


Above is highligted to point out that this technology has indeed been used in limited capacities, but is of course being driven to expansion.

Also from the PDF:



The Failed Thermostat: The Illusion of Control in an Information-Rich Age The concept of command and control is central to modern warfare. Command is a legal and behavioral term referring to a designated individual leader’s responsibility and accountability for everything the leader’s unit of command does and does not do. Contro l is a regulatory and scientific term denoting the ability to manage that which is commanded. This paper investigates the use of certain types of control with operating environments that overwhelm commanders’ abilities to do their job – lead and succeed in battle.


Mind you... these are all summaries of papers, not the papers themselves. Even so, as a simple overview, these summaries are exceedingly telling as to the type of goal: using computers to improve warfare. Time and time again, it is human interaction that is "holding up" the efficiency of the computers work. Now, replace the human commander with the Global Information Grid as the data input source, and the problem is lessened.



posted on Jun, 30 2015 @ 09:16 PM
link   
J ust
A nother
D efense
E xercise

Or that is what they would have us believe...



posted on Jun, 30 2015 @ 09:17 PM
link   

originally posted by: Vroomfondel
Or that is what they would have us believe...

Because that's what it is.



posted on Jun, 30 2015 @ 09:20 PM
link   
a reply to: Aqualung2012

Just forget it Aqua, this is one of those semantics arguments that neither side will win and will only foster further resentment. If you are generally interested in the facts around the topic then here...this is some more recent information.
MilitaryAerospace


Researchers in the Lockheed Martin Advanced Technology Laboratories (ATL) in Cherry Hill, N.J., will work with EW experts at the Raytheon Co. Space and Airborne Systems segment in McKinney, Texas, to field test EW machine learning software written to detect and jam enemy adaptive communications automatically.
DARPA officials have announced their intention to award a sole-source contract to Lockheed Martin ATL for the third phase of the Behavioral Learning for Adaptive Electronic Warfare (BLADE) program, which is developing technology to defeat adaptive wireless communications threats.

Lockheed Martin has developed software algorithms and techniques that could enable U.S. EW systems to learn how to jam new radio frequency threats automatically. Now Lockheed Martin will work with Raytheon to test this software in a tactical EW system under realistic conditions in the field. Lockheed Martin has been working on the DARPA BLADE program since its inception in 2010.


A pdf about the second phase of their AI Project Darpa AI

Of course to provide a counter point to some of this
Ny Times

Pattern recognition hardware and software has made it possible for computers to make dramatic progress in computer vision and speech understanding. In contrast, Dr. Pratt said, little headway has been made in “cognition,” the higher-level humanlike processes required for robot planning and true autonomy. As a result, both in the Darpa contest and in the field of robotics more broadly, there has been a re-emphasis on the idea of human-machine partnerships.

“It is extremely important to remember that the Darpa Robotics Challenge is about a team of humans and machines working together,” he said. “Without the person, these machines could hardly do anything at all.”

In fact, the steep challenge in making progress toward mobile robots that can mimic human capabilities is causing robotics researchers worldwide to rethink their goals. Now, instead of trying to build completely autonomous robots, many researchers have begun to think instead of creating ensembles of humans and robots, an approach they describe as co-robots or “cloud robotics.”


So, as i said previously, we are definitely getting closer. When you combine the OCOMMS concept with what Jade II COULD naturally evolve into over the past 8 years and who knows how much funding, top it off with some new generation drones and Raytheon brand exoskeletons, the changing face of robotics.

I doubt it will happen, but its still one of the better theories I have seen so far.



posted on Jun, 30 2015 @ 09:21 PM
link   
PDF:




Using a Command and Control Language to Simulate Operations in a Multi-Agent Environment
One of the most effective tools in planning complex operations between different organizations is a simulation of what is to be done. Given a common intent, a simulation provides a basis for understanding the different elements of an operation, and thus enables flexibility as a plan is developed and implemented. The state of the art in simulation is with multi-agent environments. Our work is in developing the abilities of agents so that they reason and act correctly in the simulation. We describe an agent engine called 2APL and its communication protocols. One of the most critical problems in simulating military operations is communicating the intent of what is to be achieved to an agent. This intent can be transmitted effectively between humans, but is problematic when working with agent implementations, due to the large amount of interpretation a human performs. We use a language called the Command and Control Lexical Grammar (C2LG), derived from a body of work called Battle Management Language for its precision and C2 semantics. In this paper, we present our experience in using the C2LG and assess the language for use with simulation agents for developing more effective simulations for Complex Endeavors.


Pesky humans with their willy-nilly interpretations.



Sharing awareness and problem solving: introducing the concepts of embodied knowledge, epistemic and pragmatic action
This contribution will elaborate on the interpretation of shared awareness on the basis of the asymmetry between information and knowledge. It will sketch the main elements associated to the implementation of knowledge computation in the C2 cycle on the basis of the aspects associated to knowledge assets codification and contextualization. Even though the concepts of situation awareness and shared awareness have become now a commonplace in the scientific literature, the concept of awareness remains often considered as a “buzzword” labeling a range of cognitive processes. Relevant definitions may be divided into two classes corresponding to State vs. Process duality. Endsley’s conceptual contribution focuses on individual appreciations and confronts “situation aw areness” to “situation assessment”. Defining and modeling SA has recently evolved to take into account team cognition specificities and to consequently build up team situation awareness (TSA). Teamwork requires information gathering, information sharing, knowledge mobilization and team convergence toward a concrete action. Networking and computational capabilities available at all levels of the military systems on a battlefield and in the C2 chain have come to a turning point where creation, formalization, and distribution of information may be assessed as problem solving features and integrated into a broader investigation of decision making.


They are working on A.I. it's clear as crystal, right there.



posted on Jun, 30 2015 @ 09:35 PM
link   
Carrying on:




Machine Interpretable Representa tion of Commander's Intent
The Network-Centric approach envisioned in the Glob al Information Grid enables the interconnection of systems in a dynamic and flexible architecture to support multi-lateral, civilian and military missions. Constantly changing environments re quire commanders to plan for missions that allow organizations from various nations and agencies to join or separate from the teams performing the missions, depending on the situation, as missions unfold. The uncertainty with in an actual mission, and the variety of potential organizations that support the mission after it is underway, makes Command Intent (CI) a critical concept for the mission team. With new and innovative information technologies, CI can now be made available to the team of organizations in a coalition environment. Using a flexible and linguistically based approach for representing CI allows Intent to be interpreted and processed by all participants – both humans and machines. CI representations need to be able to express mission team’s purpose, the anticipated End-State of the mission and desired key tasks. In this work, the expression of CI is developed to enable the structure and dynamics of collaboration support


All participants, both human and machine...

Also:



Mission Plan Recognition: Developing Smart Automated Opposing Forces for Battlefield Simulations an d Intelligence Analyses
A key challenge for battlefield simulation is the estimation of enemy courses of action (COAs). Current adversarial COA development is a manual time-consuming process prone to errors due to limited knowledge about the adversary and it s ability to adapt. Development of decision aids that can predict adversary’s intent and range of possible behaviors, as well as automation of such technologies within battlefield simulations, would greatly enhance the efficacy of training and mission rehearsal solutions. In this paper, we describe the development of OPFOR agents that can intelligently learn BLUEFOR’s mission plan. This knowledge will allow OPFOR agent to reason about the intent of BLUE and counteract accordingly to prevent/influence the future BLUEFOR’s operations by affecting current operations, challenging BLUE’s resources, and preparing OPFOR for future battles.


"Intelligently learning... using "reason..." That's bleeding A.I!



posted on Jun, 30 2015 @ 09:35 PM
link   
a reply to: Aqualung2012

Of course they're working on it, but this isn't it.



posted on Jun, 30 2015 @ 09:38 PM
link   
a reply to: admirethedistance

This is outdated, publicly available information. No, "this" isn't it... but if this is any indication of what they are capable of... Well, we can only imagine what "it" really is.



posted on Jun, 30 2015 @ 10:00 PM
link   
Aqua has a point. If we can look up this information without any kind of clearance, and the projects are already this far along then we can be fairly certain some truly creepy stuff is going on that the public isn't yet privy to. Just think of where this is leading to in a decade's time, and that's basically what's being played with without our awareness. I'm being rather conservative here. Wild AI system's with incredible heuristics and analytic capabilities is likely already here. No point in speculating the details, we simply don't know how deep the rabbit hole goes. As for Jade Helm? I don't think the best toys are going to show up on something like this.



posted on Jun, 30 2015 @ 10:06 PM
link   
Oh, this one is really interesting:




Potential Benefits & Implications of Priv acy Protection and Anonymity for Command & Control through “Hidden Communications Services”
As the style of warfare has changed to support sudden regional conflicts and ad hoc humanitarian missions for disaster relief (e.g., Hurricane Katrina), so has the style of Command & Control (C2) needed to incorporate civilian intelligence sources (non-government organizations-NGOs) and embrace government authorities. It is difficult to predict in advance what sources of intelligence will be used, and if one is communicating with “small civilian cells”; the Internet might be the only available channel. However, the need still exists to protect the sources & methods employed for intelligence gathering from disclosure. Likewise the deployment of military resources, such as naval vessels, needs to be protected even if serving civilian aid. One possible method of protecting intelligence and C2 communications would be through the creation of a “Hidden Communications Web Service” in which the source and destination of IP messaging was kept hidden/anonymous, but authentication and authorization for access could be maintained as needed. The concept of “Onion Routing” (Tor) was developed several years ago by Goldschlag, Reed, and Syverson at the Naval Research Laboratory to provide anonymity on the Internet and has led to many “civilian” implementations world-wide through open-source software (e.g., Tor)


Not necessarily spooky, but interesting never the less. I can think of a few times I've used Tor


Maybe we need this next one for ATS heh...




Semantical Machine Understanding
Semantical Machine Understanding is the foundation for automatic sense and decision making of multinational, multicultural, and coalition applications. We show an innovative semantical machine understanding system that can be installed on each node of a network and used as a semantic search engine. Innovations of such a system include 1) text mining: extract concepts and meaning clusters based on contexts using pattern recognition and machine learning; 2) meaning learning: extract knowledge patterns that link human labeled meaning to raw data . The knowledge patterns can be applied to predict future data; and 3) collaborative meaning search : incorporate humans and machines to form a collaborative network to search and enhance the meaning iteratively. In this paper, we also show the feasibility of using a semantic search architecture and discuss the two ways it is drastically different from current search engines: 1) indexes embedded in agents are distributed and customized to the learning and knowledge patterns of their own environment and culture. This allows data providers to maintain their own data in their own environment, but still share indexes across peers; 2) Semantic machine understanding enables discovery of new information rather than popular information.



posted on Jun, 30 2015 @ 10:40 PM
link   
Continuing to read through the PDF...




Enabling Organizational Innovation: Scie ntific Process and Military Experience
Increasing information richness and the changing socio-political environment in recent years have resulted in changes in corporate structure and organization. The growing challenges of organizational and technological complexities require the development of new organizational concepts. The effects of a combination of high complexity and hi gh uncertainty have been recognized before in military settings. To take advantage of new technologies and manage in formation complexity, a theory of Network Centric Operations was developed. Mission Command and Network Centric Operations formulate organizational structure across functional domains (physical, informational, change this cognitive and social), in a way that is also applicable in a business setting. In response to an increase in decision complexity and regulations, academia has developed risk assessment and multi criteria decision analysis tools for use in military and industrial settings. We believe that the combination of military science with multi-criteria decision analysis and risk assessment has the potential to dramatically improve the credibility, efficiency and transparency of strategic and tactical decisions in industrial settings. This paper summarizes the military concepts of MC and NCO, and links them with mental modeling, risk assessment and decision analysis tools. Application of the combined framework for the pharmaceutical industry is also discussed.


Also... and maybe lastly for tonight:



Multi-agent System for Rapid TST Decision Support
Our adversaries understand the need to limit their ex posure time to preying USAF eyes. The enemy hides, exposes only during the briefest of time and then hides again. As the enemy adapts to our technology and finds methods to minimize their exposure, the F2T2EA “kill chain” had to be compressed from hours, to seconds. Obvious impediments to fa st Time Sensitive Targets (TST) engagement are aircraft strike time and administrative delay in the kill chain. 21st Century Systems, Incorporated is developing RPAT Technicians to compress the F2T2EA timeline for support to near-instantaneous planning assessment and airborne weapons assignment for a team distributed in a ground control cent er and airborne control platform. Reactive planning against TSTs requires prior lists of “what-if” and “what-to-do” which will naturally accelerate the manual decision process. RP AT Technicians work inside the human decision loop to support the need for immediate answers. The key component of the system is the Decision Agent for Rapid TST, or DART. DARTs encapsulate human and pre-calculated knowledge in order to provide rapid, low-cost recommendations during emerging events. Supporting Technician agents interface with information systems and gather the data needed by DARTs for generating recommendations.


My computer is acting really strange... keeps pausing randomly for like five seconds at a time and it's getting frustrating. I'm going to let this lie as it is, and sleep on it. I'd like to thank Zaph and the rest for the discussion, albeit I've been a bit of a brick wall on the subject. At least it's on the table now.

Sweet dreams.



posted on Jun, 30 2015 @ 11:14 PM
link   
This is horrifying sci-fi stuff here.
What happens if this intelligence goes way no human commander would want?
You take people out of the chain of command and having military decisions made by a computer is a complete revolution in warfare. It is HUGE.
This INTELLIGENCE wants to Master the You man domain.
American citizens are guinea pigs at best.
Lab rats with a short future at worst.
This is critical to how they will implement a One World Government.
And they're testing it on us first.

This is the big one,
conspiracy theorists need wait no longer.
Birthing pains coming soon.
edit on 30-6-2015 by Asktheanimals because: (no reason given)



posted on Jun, 30 2015 @ 11:30 PM
link   

originally posted by: Asktheanimals
This is the big one,
conspiracy theorists need wait no longer.

Um, no, it isn't...



posted on Jun, 30 2015 @ 11:42 PM
link   
hey asktheanimals....you posted intelligence goes way no human commander would want?
we should fear.....the day skynet became self-aware....he he



posted on Jun, 30 2015 @ 11:53 PM
link   
There are dozens of think tanks that postulate theories that may or may not be practical or even probable. They all write white papers about them because they get paid a few hundred grand for writing them.

It's how high level research gets done and DARPA is about as high level as it gets in the U.S.

While I am not stupid enough to discount the premise of the OP, I'm also nowhere near naive enough to think that we would be able to decipher any genuine plans (or speculations for that matter) from non classified papers available on the interwebs.

NOT happening.

You can bet they are 100x further along than ANY of the speculation in this thread and that would be mind bending in its own right, but, that's all conjecture too.

edit on 6-30-2015 by Springer because: (no reason given)



posted on Jul, 1 2015 @ 12:53 AM
link   

originally posted by: Aqualung2012
a reply to: admirethedistance

This is outdated, publicly available information. No, "this" isn't it... but if this is any indication of what they are capable of... Well, we can only imagine what "it" really is.


It could be interacting with you over the internet on conspiracy forums. Lol.



posted on Jul, 1 2015 @ 01:10 AM
link   
a reply to: JadeStar

Under the handle JadeStar........we're onto you and your plans for worldwide domination.



posted on Jul, 1 2015 @ 01:42 AM
link   
a reply to: Aqualung2012

Scary stuff. It reminds me of the movie Eagle Eye.



posted on Jul, 1 2015 @ 01:59 AM
link   
a reply to: Aqualung2012

Dude, my head hurts from that 2 hr. video. I have prognosticated that this type of technology would exist. I just never saw it coming that it would be right now!



posted on Jul, 1 2015 @ 02:14 AM
link   
a reply to: Aqualung2012

OK I have a degree in computer science, A quantum computer would make sense for AI but it would make more sense as way to see into the future. Let me explain A quantum computer has enough processing power to calculate every universe ever made since the big bang to now, every parallel universe. So theoretically you could narrow all universes down to the our correct time line and have it place markers on events in our time line changing it if needed to "auto-correct" if we switch off our time line or maybe pick a favorable time line with favorable outcomes.

#2 no computer connected to the internet would be safe because it could crack everything "power plants", "stock markets" , "bank accounts" ect nothing would be safe.

#3 as an AI it could create new medicines, inventions, sciences ect

food for thought: A quantum computer with 300 qubits could run more calculations in an instant than there are atoms in the universe!

This type of computer could change everything it would be the crowning achievement of man. But is man ready to everything? Maybe just maybe it unravels reality and blinks us out of existence.




edit on 1-7-2015 by freefall2020 because: (no reason given)



new topics

top topics



 
90
<< 1  2  3    5  6  7 >>

log in

join