Skip to main content

The Rise of Smart Machines: The Unique Peril of Intelligent Software Agents in Defense and Intelligence

  • Chapter
  • First Online:
The Palgrave Handbook of Security, Risk and Intelligence

Abstract

As computer processing power and cyber connectivity has increased, states have turned to intelligent software agents (ISA) as a potential means to extend the reach of their militaries and the analytical capacity of their intelligence agencies. Intelligent software agents (ISA) are computer programs that have the ability to learn, cooperate, and act independently of humans. The development of technologies that can operate autonomously has generated nearly as much anxiety as it has excitement, often to the detriment of clear eyed analysis. The path to acquiring and fully implementing ISA is farther away, and more complex than its advocates and detractors will admit. In addition to this, while ISAs could afford new capabilities for information analysis and battlefield risk reduction, they simultaneously introduce their own unique risks in implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Many thanks to the scholars and practitioners who took the time to assist me in formulating the thoughts contained herein. Special thanks to Lt. Col. Paul Brister Ph.D. U.S. Air Force, computer software engineer and research associate Tad Masek Naval Postgraduate School, Assistant Professor of Computer Science, USAFA Dr. Andrew Sellers, and CISO Eric J. Smith at Bucknell University. Any errors in fact or interpretation are entirely mine.

  2. 2.

    While there are well-established theories regarding the probability of smart technologies outpacing the intelligence and control of humans (a term generally known as technological singularity), this chapter does not address this debate. For more on this see: Kurzweil, Ray (2005), ‘The Singularity is Near: When Humans Transcend Biology’, New York: Viking.

  3. 3.

    This abstract categorization is an adapted version of Nwana and Azarmi’s ISA typology which is an extension of Wooldridge and Jennings.

  4. 4.

    The design architecture of information ISAs are generally categorized into supervised and unsupervised learning. For more see Chapter 2 of: Dua, Sumeet and Xian Du. 2011. Data mining and machine learning in cybersecurity. Boca Raton: Auerbach Publications.

  5. 5.

    This collection of multifaceted data has simultaneously given rise to a research niche sometimes known as ISS – intelligent software surveillance.

  6. 6.

    This is particularly true of military organizations that compete across and within services. See: Posen, Barry. 1984. Sources of military doctrine. Ithaca, NY: Cornell University Press.

  7. 7.

    The research niche most commonly cited in this work is the literature on human robot interaction (HRI).

  8. 8.

    As Arkin also notes, the potential for a single lethal robot to exhibit unanticipated behaviors is not necessarily unique to robots – humans can also do this, although the mechanisms are likely different.

Bibliography

  • Allenby, Braden R. (2014) ‘Are New Technologies Undermining the Laws of War?’ Bulletin of the Atomic Scientists 70(1).

    Google Scholar 

  • Anderson, Kenneth and Waxman, Matthew C. (2013) ‘Law and Ethics for Autonomous Weapon Systems: Why a Ban Won’t Work and How the Laws of War Can’ In American University Washington College of Law Research Paper No. 2013-11.

    Google Scholar 

  • Arkin, Ronald (2009) Governing Lethal Behavior in Autonomous Robots, Florida: CRC Press.

    Book  Google Scholar 

  • Benjamin, Medea (2013) Drone Warfare: Killing by Remote Control, New York: Verso Books.

    Google Scholar 

  • Bhamra, Gurpreet Singh, A. K. Verma and R. B. Patel (2014) ‘Intelligent Software Agent Technology: An Overview’ International Journal of Computer Applications 89(2).

    Google Scholar 

  • Brake, Dennis E. and Emami Gholamreza (2004) ‘Control of Agent Based Systems (CoABS) Grid’, DTIC Document.

    Google Scholar 

  • Bray-Miners, Jordan, Ste-Croix, Chris and Morton, Andrew (2012) ‘Human-Robot Interaction Literature Review’, DTIC Document.

    Google Scholar 

  • Dua, Sumeet, and Du Xian (2011) Data Mining and Machine Learning in Cybersecurity, Boca Raton: Auerbach Publications.

    Book  Google Scholar 

  • Eid, Mohamad et al. (2005) ‘Trends in Mobile Agent Applications’, Journal of Research and Practice in Information Technology, 37(4).

    Google Scholar 

  • Fitzgerald, Ben, and Timlin, Katrina (2015) ‘Time for a Private-Sector Pivot on Military Technology’, War on the Rocks, Washington DC.

    Google Scholar 

  • Franklin, Stan, and Graesser, Art (1997) ‘Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents’, Intelligent Agents III Agent Theories, Architectures, and Languages, Springer, 21–35.

    Google Scholar 

  • Gentry, John A. (2002). ‘Doomed to Fail: America’s Blind Faith in Military Technology’, Parameters, US Army War College, 32(4).

    Google Scholar 

  • Greenwald, Glenn (2014) No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State, London: Macmillan.

    Google Scholar 

  • Greenwald, Glenn, and MacAskill, Ewen (2013) ‘NSA Prism Program Taps in to User Data of Apple, Google and Others’, The Guardian, July, 6, 2015.

    Google Scholar 

  • Halsey, Ashley III (2015) ‘Automation Problem Led to Ground Stop for United Airlines’ The Washington Post. Washington Post 08 July 2015. Web. 12 July 2015.

    Google Scholar 

  • Hassell, Adam J., Smith, Philip, and Stratton, David (2007) ‘An Evaluation Framework for Videogame Based Tasking of Remote Vehicles’, Proceedings of the 4th Australasian Conference on Interactive Entertainment, RMIT University. 10.

    Google Scholar 

  • Hayes, Caroline C. (1999) ‘Agents in a Nutshell-a Very Brief Introduction’, Knowledge and Data Engineering, IEEE Transactions On, 11(1).

    Google Scholar 

  • Hoagland, Bradley T. (2013) ‘Manning the Next Unmanned Air Force: Developing RPA Pilots of the Future’, DTIC Document.

    Google Scholar 

  • Hoffman, Mike (2014) ‘Google Rejects Military Funding of Robots’, Defense Tech.

    Google Scholar 

  • Hudaib, Adam Ali Zare (2014) ‘Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology’, International Journal of Computer Science and Security (IJCSS), 8(4).

    Google Scholar 

  • Jones, Calvert (2007) ‘Intelligence Reform: The Logic of Information Sharing’, Intelligence and National Security, 22(3).

    Google Scholar 

  • Krogmann, U (2000) ‘From Automation to Autonomy-Trends Towards Autonomous Combat Systems’, DTIC Document

    Google Scholar 

  • Kurzweil, Ray (2005) The Singularity is Near: When Humans Transcend Biology, New York: Viking.

    Google Scholar 

  • Liu, Weiru, Miller, Paul, Jianbing, Ma and Yan, Weiqi (2009) ‘Challenges of Distributed Intelligent Surveillance System with Heterogenous Information’, Proceedings of QRASA, Pasadena, California.

    Google Scholar 

  • Madden, Mary. (2015) ‘Privacy and Cybersecurity: Key Findings from Pew Research’, Pew Research Center, 16. Last accessed 20, January 2017. http://www.pewresearch.org/key-data-points/privacy/

  • Mandry, Torsten, and Alexander W. Rohm Gunther Pernul (2000) ‘Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection’, International Journal of Electronic Commerce, 5(2), 47–60.

    Google Scholar 

  • Marsland, Stephen (2014) Machine Learning: An Algorithmic Perspective, Florida: CRC Press.

    Book  Google Scholar 

  • McGlynn, Daniel (2015) ‘Robotic Warfare: Should Autonomous Military Weapons Be Banned?’, CQ Researcher.

    Google Scholar 

  • McGrath, Susan, Chacon, Daria, and Whitebread, Kenneth (2000) ‘Intelligent Mobile Agents in Military Command and Control’, Proceedings of the Workshop on Agents in Industry, in Autonomous Agents 2000 Conference, Barcelona, Spain.

    Google Scholar 

  • Murphy, Robin, and Shields, James (2012) ‘The Role of Autonomy in DoD Systems’ Defense Science Board.

    Google Scholar 

  • Nwana, Hyacinth Sama, and Azarmi, Nader (1997) Software Agents and Soft Computing: Towards Enhancing Machine Intelligence: Concepts and Applications, New York: Springer.

    Book  Google Scholar 

  • Ososky, Scott, Schuster, David, Phillips, Elizabeth, and Jentsch, Florian (2013) ‘Building Appropriate Trust in Human-Robot Teams’, 2013 AAAI Spring Symposium Series.

    Google Scholar 

  • Overholt, Jim. 2012. Practical To Tactical: Making the Case for a Shift in Ground Vehicle Robotics. DTIC Document.

    Google Scholar 

  • Paliouras, Georgios, Papatheodorou, Karkaletsis, Christos Vangelis, and Spyropoulos, Constantine (2002) ‘Discovering User Communities on the Internet Using Unsupervised Machine Learning Techniques’, Interacting with Computers, 14(6).

    Google Scholar 

  • Pohl, Jens, and Porczak, Mark et al. (2001) ‘IMMACCS: A Multi-Agent Decision-Support System’, DTIC Document

    Google Scholar 

  • Popper, Nathaniel (2015) ‘The Stock Market Bell Rings, Computers Fail, Wall Street Cringes’ New York Times, July, 8, 2015.

    Google Scholar 

  • Posen, Barry (1984) Sources of Military Doctrine, Ithaca, NY: Cornell University Press.

    Google Scholar 

  • Rosen, Stephen Peter (1991) Winning the Next War, Ithaca, NY: Cornell University Press.

    Google Scholar 

  • Sciortino, John, Kowtha, Vijayan, Mittu, Ranjeev, and Frank Segaria (2003) ‘Multi-Agent System for Mission and Situational Awareness Management (MASAM) for Airborne Platforms’, DTIC Document.

    Google Scholar 

  • Voth, Danna (2004) ‘A New Generation of Military Robots’, Intelligent Systems, IEEE 19(4).

    Google Scholar 

  • Weiss, Lora G (2011) ‘Autonomous Robots in the Fog of War’, Spectrum, IEEE 48(8).

    Google Scholar 

  • Wooldridge, Michael and Nicholas R. Jennings (1995) ‘Intelligent Agents: Theory and Practice’, The Knowledge Engineering Review, 2.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nina A. Kollars .

Editor information

Editors and Affiliations

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Kollars, N.A. (2017). The Rise of Smart Machines: The Unique Peril of Intelligent Software Agents in Defense and Intelligence. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_11

Download citation

Publish with us

Policies and ethics