U.S. Air Force envisions drone that makes attack decisions by itself
A key question: Who's responsible for mistakes?
Network World - By 2047, the Air Force says unmanned aircraft with blazing artificial intelligence systems could fly over a target and determine whether or not to unleash lethal weapons – without human intervention.
Such intelligent unmanned aircraft were described in the Air Force’s wide-ranging “Unmanned Aircraft Systems Flight Plan 2009-2047” report which outlines the service’s future use of drones. The report details major new responsibilities for unmanned aircraft from the ability to refuel other aircraft to the capacity to swarm multiple drones on a single target or to attack enemy targets on its own.
In 2047 technology onboard an unmanned aircraft will be able to observe, evaluate and act on a situation in micro or nanoseconds. According to the Air Force: “Increasingly humans will no longer be “in the loop” but rather “on the loop” – monitoring the execution of certain decisions. Simultaneously, advances in AI will enable systems to make combat decisions and act within legal and policy constraints without necessarily requiring human input.” The loop in this case is a concept known as observe-orient-decide-act or OODA which describes the process by which a person or computer would go through before taking action.
There obviously would be some stop-gap measures. The Air Force went on to say that assuming the decision is reached to allow some degree of aircraft autonomy, commanders must retain the ability to refine the level of autonomy the systems will be granted by mission type, and in some cases by mission phase, just as they set rules of engagement for the personnel under their command today.
The trust required for increased autonomy of systems will be developed incrementally. The systems’ programming will be based on human intent, with humans monitoring the execution of operations and retaining the ability to override the system or change the level of autonomy instantaneously during the mission. Such unmanned aircraft must achieve a level of trust approaching that of humans charged with executing missions, the Air Force stated.
Authorizing a machine to make lethal combat decisions is contingent upon political and military leaders resolving legal and ethical questions. These include the appropriateness of machines having this ability, under what circumstances it should be employed, where responsibility for mistakes lies and what limitations should be placed upon the autonomy of such systems, the Air Force stated.
The super-intelligent drone was just one of myriad plans the Air Force floated in it report. Some of the other intriguing unmanned aircraft possibilities included matching conventional, manned jet fighters with a drone, or “loyal wingman” as the Air Force called it that could help protect a pilot on a critical mission or drop additional ordnance on a target.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts