Abstract
As computer processing power and cyber connectivity has increased, states have turned to intelligent software agents (ISA) as a potential means to extend the reach of their militaries and the analytical capacity of their intelligence agencies. Intelligent software agents (ISA) are computer programs that have the ability to learn, cooperate, and act independently of humans. The development of technologies that can operate autonomously has generated nearly as much anxiety as it has excitement, often to the detriment of clear eyed analysis. The path to acquiring and fully implementing ISA is farther away, and more complex than its advocates and detractors will admit. In addition to this, while ISAs could afford new capabilities for information analysis and battlefield risk reduction, they simultaneously introduce their own unique risks in implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Many thanks to the scholars and practitioners who took the time to assist me in formulating the thoughts contained herein. Special thanks to Lt. Col. Paul Brister Ph.D. U.S. Air Force, computer software engineer and research associate Tad Masek Naval Postgraduate School, Assistant Professor of Computer Science, USAFA Dr. Andrew Sellers, and CISO Eric J. Smith at Bucknell University. Any errors in fact or interpretation are entirely mine.
- 2.
While there are well-established theories regarding the probability of smart technologies outpacing the intelligence and control of humans (a term generally known as technological singularity), this chapter does not address this debate. For more on this see: Kurzweil, Ray (2005), ‘The Singularity is Near: When Humans Transcend Biology’, New York: Viking.
- 3.
This abstract categorization is an adapted version of Nwana and Azarmi’s ISA typology which is an extension of Wooldridge and Jennings.
- 4.
The design architecture of information ISAs are generally categorized into supervised and unsupervised learning. For more see Chapter 2 of: Dua, Sumeet and Xian Du. 2011. Data mining and machine learning in cybersecurity. Boca Raton: Auerbach Publications.
- 5.
This collection of multifaceted data has simultaneously given rise to a research niche sometimes known as ISS – intelligent software surveillance.
- 6.
This is particularly true of military organizations that compete across and within services. See: Posen, Barry. 1984. Sources of military doctrine. Ithaca, NY: Cornell University Press.
- 7.
The research niche most commonly cited in this work is the literature on human robot interaction (HRI).
- 8.
As Arkin also notes, the potential for a single lethal robot to exhibit unanticipated behaviors is not necessarily unique to robots – humans can also do this, although the mechanisms are likely different.
Bibliography
Allenby, Braden R. (2014) ‘Are New Technologies Undermining the Laws of War?’ Bulletin of the Atomic Scientists 70(1).
Anderson, Kenneth and Waxman, Matthew C. (2013) ‘Law and Ethics for Autonomous Weapon Systems: Why a Ban Won’t Work and How the Laws of War Can’ In American University Washington College of Law Research Paper No. 2013-11.
Arkin, Ronald (2009) Governing Lethal Behavior in Autonomous Robots, Florida: CRC Press.
Benjamin, Medea (2013) Drone Warfare: Killing by Remote Control, New York: Verso Books.
Bhamra, Gurpreet Singh, A. K. Verma and R. B. Patel (2014) ‘Intelligent Software Agent Technology: An Overview’ International Journal of Computer Applications 89(2).
Brake, Dennis E. and Emami Gholamreza (2004) ‘Control of Agent Based Systems (CoABS) Grid’, DTIC Document.
Bray-Miners, Jordan, Ste-Croix, Chris and Morton, Andrew (2012) ‘Human-Robot Interaction Literature Review’, DTIC Document.
Dua, Sumeet, and Du Xian (2011) Data Mining and Machine Learning in Cybersecurity, Boca Raton: Auerbach Publications.
Eid, Mohamad et al. (2005) ‘Trends in Mobile Agent Applications’, Journal of Research and Practice in Information Technology, 37(4).
Fitzgerald, Ben, and Timlin, Katrina (2015) ‘Time for a Private-Sector Pivot on Military Technology’, War on the Rocks, Washington DC.
Franklin, Stan, and Graesser, Art (1997) ‘Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents’, Intelligent Agents III Agent Theories, Architectures, and Languages, Springer, 21–35.
Gentry, John A. (2002). ‘Doomed to Fail: America’s Blind Faith in Military Technology’, Parameters, US Army War College, 32(4).
Greenwald, Glenn (2014) No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State, London: Macmillan.
Greenwald, Glenn, and MacAskill, Ewen (2013) ‘NSA Prism Program Taps in to User Data of Apple, Google and Others’, The Guardian, July, 6, 2015.
Halsey, Ashley III (2015) ‘Automation Problem Led to Ground Stop for United Airlines’ The Washington Post. Washington Post 08 July 2015. Web. 12 July 2015.
Hassell, Adam J., Smith, Philip, and Stratton, David (2007) ‘An Evaluation Framework for Videogame Based Tasking of Remote Vehicles’, Proceedings of the 4th Australasian Conference on Interactive Entertainment, RMIT University. 10.
Hayes, Caroline C. (1999) ‘Agents in a Nutshell-a Very Brief Introduction’, Knowledge and Data Engineering, IEEE Transactions On, 11(1).
Hoagland, Bradley T. (2013) ‘Manning the Next Unmanned Air Force: Developing RPA Pilots of the Future’, DTIC Document.
Hoffman, Mike (2014) ‘Google Rejects Military Funding of Robots’, Defense Tech.
Hudaib, Adam Ali Zare (2014) ‘Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology’, International Journal of Computer Science and Security (IJCSS), 8(4).
Jones, Calvert (2007) ‘Intelligence Reform: The Logic of Information Sharing’, Intelligence and National Security, 22(3).
Krogmann, U (2000) ‘From Automation to Autonomy-Trends Towards Autonomous Combat Systems’, DTIC Document
Kurzweil, Ray (2005) The Singularity is Near: When Humans Transcend Biology, New York: Viking.
Liu, Weiru, Miller, Paul, Jianbing, Ma and Yan, Weiqi (2009) ‘Challenges of Distributed Intelligent Surveillance System with Heterogenous Information’, Proceedings of QRASA, Pasadena, California.
Madden, Mary. (2015) ‘Privacy and Cybersecurity: Key Findings from Pew Research’, Pew Research Center, 16. Last accessed 20, January 2017. http://www.pewresearch.org/key-data-points/privacy/
Mandry, Torsten, and Alexander W. Rohm Gunther Pernul (2000) ‘Mobile Agents in Electronic Markets: Opportunities, Risks, Agent Protection’, International Journal of Electronic Commerce, 5(2), 47–60.
Marsland, Stephen (2014) Machine Learning: An Algorithmic Perspective, Florida: CRC Press.
McGlynn, Daniel (2015) ‘Robotic Warfare: Should Autonomous Military Weapons Be Banned?’, CQ Researcher.
McGrath, Susan, Chacon, Daria, and Whitebread, Kenneth (2000) ‘Intelligent Mobile Agents in Military Command and Control’, Proceedings of the Workshop on Agents in Industry, in Autonomous Agents 2000 Conference, Barcelona, Spain.
Murphy, Robin, and Shields, James (2012) ‘The Role of Autonomy in DoD Systems’ Defense Science Board.
Nwana, Hyacinth Sama, and Azarmi, Nader (1997) Software Agents and Soft Computing: Towards Enhancing Machine Intelligence: Concepts and Applications, New York: Springer.
Ososky, Scott, Schuster, David, Phillips, Elizabeth, and Jentsch, Florian (2013) ‘Building Appropriate Trust in Human-Robot Teams’, 2013 AAAI Spring Symposium Series.
Overholt, Jim. 2012. Practical To Tactical: Making the Case for a Shift in Ground Vehicle Robotics. DTIC Document.
Paliouras, Georgios, Papatheodorou, Karkaletsis, Christos Vangelis, and Spyropoulos, Constantine (2002) ‘Discovering User Communities on the Internet Using Unsupervised Machine Learning Techniques’, Interacting with Computers, 14(6).
Pohl, Jens, and Porczak, Mark et al. (2001) ‘IMMACCS: A Multi-Agent Decision-Support System’, DTIC Document
Popper, Nathaniel (2015) ‘The Stock Market Bell Rings, Computers Fail, Wall Street Cringes’ New York Times, July, 8, 2015.
Posen, Barry (1984) Sources of Military Doctrine, Ithaca, NY: Cornell University Press.
Rosen, Stephen Peter (1991) Winning the Next War, Ithaca, NY: Cornell University Press.
Sciortino, John, Kowtha, Vijayan, Mittu, Ranjeev, and Frank Segaria (2003) ‘Multi-Agent System for Mission and Situational Awareness Management (MASAM) for Airborne Platforms’, DTIC Document.
Voth, Danna (2004) ‘A New Generation of Military Robots’, Intelligent Systems, IEEE 19(4).
Weiss, Lora G (2011) ‘Autonomous Robots in the Fog of War’, Spectrum, IEEE 48(8).
Wooldridge, Michael and Nicholas R. Jennings (1995) ‘Intelligent Agents: Theory and Practice’, The Knowledge Engineering Review, 2.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Kollars, N.A. (2017). The Rise of Smart Machines: The Unique Peril of Intelligent Software Agents in Defense and Intelligence. In: Dover, R., Dylan, H., Goodman, M. (eds) The Palgrave Handbook of Security, Risk and Intelligence. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-53675-4_11
Download citation
DOI: https://doi.org/10.1057/978-1-137-53675-4_11
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-53674-7
Online ISBN: 978-1-137-53675-4
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)