Showing posts with label Intelligence. Show all posts
Showing posts with label Intelligence. Show all posts

21 July 2017

Elon Musk Says Artificial Intelligence Is the ‘Greatest Risk We Face as a Civilization’

David Z. Morris

Appearing before a meeting of the National Governor’s Association on Saturday, Tesla CEO Elon Musk described artificial intelligence as “the greatest risk we face as a civilization” and called for swift and decisive government intervention to oversee the technology’s development. 

“On the artificial intelligence front, I have access to the very most cutting edge AI, and I think people should be really concerned about it,” an unusually subdued Musk said in a question and answer session with Nevada governor Brian Sandoval. 

Musk has long been vocal about the risks of AI. But his statements before the nation’s governors were notable both for their dire severity, and his forceful call for government intervention. 

“AI’s a rare case where we need to be proactive in regulation, instead of reactive. Because by the time we are reactive with AI regulation, it’s too late," he remarked. Musk then drew a contrast between AI and traditional targets for regulation, saying “AI is a fundamental risk to the existence of human civilization, in a way that car accidents, airplane crashes, faulty drugs, or bad food were not.” 

19 July 2017

Artificial Intelligence Will Help Hunt Daesh By December

By Sydney J. Freedberg Jr.

THE NEWSEUM: Artificial intelligence is coming soon to a battlefield near you — with plenty of help from the private sector. Within six months the US military will start using commercial AI algorithms to sort through its masses of intelligence data on the Islamic State.

“We will put an algorithm into a combat zone before the end of this calendar year, and the only way to do that is with commercial partners,” said Col. Drew Cukor.

Air Force intelligence analysts at work.

Millions of Humans?

How big a deal is this? Don’t let the lack of general’s stars on Col. Cukor’s shoulders lead you to underestimate his importance. He heads the Algorithmic Warfare Cross Function Team, personally created by outgoing Deputy Defense Secretary Bob Work to apply AI to sorting the digital deluge of intelligence data.

This isn’t a multi-year program to develop the perfect solution: “The state of the art is good enough for the government,” he said at the DefenseOne technology conference here this morning. Existing commercial technology can be integrated onto existing government systems.

“We’re not talking about three million lines of code,” Cukor said. “We’re talking about 75 lines of code… placed inside of a larger software (architecture)” that already exists for intelligence-gathering.

14 July 2017

Info Ops Officer Offers Artificial Intelligence Roadmap

By CHRIS TELLEY

Artificial intelligence, machine learning and autonomy are central to the future of American war. In particular, the Pentagon wants to develop software that can absorb more information from more sources than a human can, analyze it and either advise the human how to respond or — in high-speed situations like cyber warfare and missile defense — act on its own with careful limits. Call it the War Algorithm, the holy grail of a single mathematical equation designed to give the US military near-perfect understanding of what is happening on the battlefield and help its human designers to react more quickly than our adversaries and thus win our wars. Our coverage of this issue attracted the attention of Capt. Chris Telley, an Army information operations officer studying at the Naval Postgraduate School. In this op-ed, he offers something of a roadmap for the Pentagon to follow as it pursues this highly complex and challenging goal. Read on! The Editor.

“If I had an hour to solve a problem I’d spend 55 minutes thinking about the problem and five minutes thinking about solutions.” Albert Einstein

Artificial intelligence is to be the crown jewel of the Defense Department’s much-discussed Third Offset, the US military’s effort to prepare for the next 20 years. Unfortunately, “joint collaborative human-machine battle networks” are off to a slow, even stumbling, start. Recognizing that today’s AI is different from the robots that have come before, the Pentagon must seize what may be just a fleeting opportunity to get ahead on the adoption curve. Adapting the military to the coming radical change requires some simultaneous baby steps to learn first and buy second while growing leaders who can wield the tools of the fourth industrial revolution.

13 July 2017

Swarms at War: Chinese Advances in Swarm Intelligence

Source Link
By: Elsa Kania
The Chinese People’s Liberation Army (PLA) anticipates that future warfare will be “unmanned, invisible, and silent” (“无人、无形、无声”战争), with ever higher degrees of “intelligentization” (智能化). [1] PLA strategists expect that future, autonomous combat involving unmanned systems, as well as the joint operations of unmanned and manned systems, will have a dramatic impact on traditional operational models (PLA Daily, January 5, 2016). Future UAV swarming (无人机集群) will involve “intelligentized” and semi- or fully autonomous systems. [2] The PLA recognizes the disruptive potential of these techniques, which could be used for saturation assaults (饱和攻击) to overwhelm the defenses of high-value targets, including perhaps U.S. fighter jets or aircraft carriers (Science and Technology Daily, March 29; China News Network, November 2, 2016; China Military Online, December 31, 2016).

Chinese advances in artificial intelligence, including deep learning techniques, have enabled considerable progress in swarm intelligence. There is technical and conceptual research, development, and testing ongoing across Chinese academic institutions, the private sector, defense industry, and military research institutes to support such capabilities. At this point, given the limited information available and the relative opacity of these efforts, it is difficult to compare U.S. and Chinese advances in swarm intelligence. Nonetheless, the PLA has closely tracked U.S. initiatives focused on swarm tactics (e.g., Science and Technology Daily, March 29; Science and Technology Daily, May 30, 2016) and seeks to develop countermeasures and comparable capabilities. Looking forward, the PLA’s advances in intelligent unmanned systems and swarm tactics could serve as a force multiplier for its future military capabilities.

12 July 2017

Artificial intelligence in here and now

Vanitha Narayanan

Today, even as automation is prevalent across industries, we have quickly moved to the age of robotics and artificial intelligence

The paradox of automation says the more efficient the automated systems, the more critical is the human contribution. Photo: Bloomberg

If I got a dollar every time artificial intelligence (AI) came up in a conversation around jobs, I would be very rich by now.

I want to spend a few minutes on the potential of AI—the way I see it. And let me tell you, it’s not in the future, it’s here and now. There is no point being an ostrich and burying our heads in the sand.

Automation has been part of our fabric since 1771, with the advent of the first fully automated spinning mill, and continues to be an integral part of every manufacturing process. Today, even as automation is prevalent across industries, we have quickly moved to the age of robotics and AI. Interestingly, the paradox of automation says the more efficient the automated systems, the more critical is the human contribution.

5 July 2017

What’s now and next in analytics, AI, and automation


Innovations in digitization, analytics, artificial intelligence, and automation are creating performance and productivity opportunities for business and the economy, even as they reshape employment and the future of work. Rapid technological advances in digitization and data and analytics have been reshaping the business landscape, supercharging performance, and enabling the emergence of new business innovations and new forms of competition. At the same time, the technology itself continues to evolve, bringing new waves of advances in robotics, analytics, and artificial intelligence (AI), and especially machine learning. Together they amount to a step change in technical capabilities that could have profound implications for business, for the economy, and more broadly, for society.
Table of contents





The opportunity available now Some companies are gaining a competitive edge with their use of data and analytics, which can enable faster and larger-scale evidence-based decision making, insight generation, and process optimization. But there is room to catch up and to excel. Harnessing digitization’s potential is similarly uneven.

Data and analytics are transformational, yet many companies are capturing only a fraction of their value Data and analytics have been changing the basis of competition in the years since our first report on big data in 2011. Leading companies are using their capabilities not only to improve their core operations but also to launch entirely new business models. The network effects of digital platforms are creating a winner-take-most dynamic in some markets. Yet while the volume of available data has grown exponentially in recent years, most companies are capturing only a fraction of the potential value in terms of revenue and profit gains.

25 June 2017

Russia May Have Accidentally Revealed Their New Military Satellites

Key points: 

Analysis of the photograph by Jane’s Intelligence Review identifies what appears to be a previously unknown Russian military satellite program named ‘Repei.’ 
The photograph was released following a low-profile visit by Russian Minister of Defence Sergei Shoigu to the ISS Reshtnev satellite factory near Krasnoyarsk. 
It is possible the photograph was released as part of an intentional leak — Russia has used this tactic in the past. 

However, the absence of the photograph from the Russian MoD website suggests that the leak may have been unintentional. 
On June 6, a delegation headed by Russian Minister of Defence (MoD) Sergei Shoigu visited the ISS Reshetnev satellite factory near Krasnoyarsk. Intended to acquaint Russia’s leadership with the company’s military products, it was a relatively low-key visit that was not even mentioned on the company’s website. 

Several photographs of the visit taken by a TASS photographer were released by the Russian MoD and subsequently appeared on the Press Association and Getty websites.

One of the photographs showed the delegation inspecting a board containing information on a geostationary satellite identified as the ‘Repei-S’ and what appears to be a sister satellite named ‘Repei-V’ that will fly in highly elliptical orbits. Significantly, the name Repei (meaning ‘burdock’) had not previously been associated with any Russian satellite project known in open sources.

What are the Repei satellites?

The satellite shown in the photograph has a pair of large antennae, indicating it could be either a communications satellite or a signals intelligence (SIGINT) satellite intended for intelligence collection. Writing in a forthcoming feature for Jane’s Intelligence Review, Bart Hendrickx, an experienced observer of the Russian space program and co author of the book Energiya-Buran: The Soviet Space Shuttle, he assesses that Repei may be one of two things: 

23 June 2017

Intelligence community must embrace the digital era: DIA director

By: Rachael Kalinyak

“What kind of future will we embrace?” 

This question echoed throughout Marine Corps Lt. Gen. Vincent Stewart’s speech at the 2017 GEOINT Conference in San Antonio, Texas. The director of the Defense Intelligence Agency spoke about the risks the intelligent community faces, including becoming irrelevant in a technology-driven era. To make his point, he mentioned the challenges faced by the Kodak film company as digital photography first entered the picture. Embracing the digital age is critical for intelligence community, he said. 

The desire to stay in the past, live in the success of the Cuban Missile Crisis, and stick to the techniques that have proven to be successful is strong, Stewart said. But he noted that failing to embrace the digital world will only lead the intelligence community to extinction. 

“We are not indispensable unless we are relevant to our customers, all of them,” Stewart said, explaining that the notion that “our success in the past is good enough for our success in the future” is wrong. This idea stifles innovation, stopping those who wish to help shape the future. To remain relevant, the intelligence community must learn to nurture innovation and take risks. 

After concluding his speech, Stewart noted a military downfall that has occurred in recent years — wargaming. 

14 June 2017

How a crippling shortage of analysts let the London Bridge attackers through


Last Tuesday, in the wake of the latest terror atrocity to strike Britain, the former head of MI5 Dame Stella Rimington recalled just how primitive intelligence gathering used to be. Addressing a conference of security officials in west London – four miles from London Bridge where the terror attack had taken place three days earlier – Rimington recounted an anecdote about how her spy training in the 1970s involved infiltrating a local pub to eavesdrop on targets. 

Over the four decades since then, intelligence gathering within Britain’s security services has evolved beyond comparison. Eking out a lead is no longer an issue – instead extraordinary volumes of information are relentlessly harvested electronically. The worry, according to experts, is whether they are acquiring too much. 

The information-collecting machine grew even larger when the Investigatory Powers Act passed with little fanfare last November, handing UK intelligence agencies a comprehensive range of tools for snooping and hacking unparalleled in any other country in western Europe, and even the US. 

12 June 2017

British Intelligence Fails Again

By Jytte Klausen

Following the third terror attack in the United Kingdom in two-and-a-half months, on Sunday British Prime Minister Theresa May went before the cameras to declare that “enough is enough” and outline a new round of anti-terrorism legislation. She pinned the blame for Britain’s vulnerability to terrorism on excessive toleration of extremist ideology—citing the “safe spaces” that exist online, and in British society generally, protecting the open expression of Islamist extremism. Addressing the problem, she said, will require “difficult, and often embarrassing, conversations.” 

The string of recent violence began on March 22 with an attack in Westminster, near the British Parliament. A 52-year-old convert to Islam, Khaled Masood, used a white van to strike pedestrians on a bridge. He then ran on foot into Parliament’s New Palace Yard, where he killed a guard before he was shot. On May 22 came the suicide bombing at a concert in Manchester, which was attended mainly by young girls and women. Salman Abedi, the bomber, was a local man who had traveled to Libya with his family some months earlier. He had returned to Manchester just four days prior to the attack.

8 June 2017

Strategic Futures and Intelligence: The Head and Heart of ‘Hybrid Defence’ Providing Tangible Meaning and Ways Forward


Strategic Futures and Intelligence are central to the successful conduct of ‘hybrid defence’. However the concept is precisely defined, drawing on the corporeal analogy of Strategic Futures and Intelligence as respectively being the ‘head’ and ‘heart’ of ‘hybrid defence’, emerges as an appropriate approach to adopt for evaluation. Following that path forward is particularly helpful because - as its name suggests - ‘hybrid defence’ frequently can mean almost anything, and even everything-to-nothing (nothing still being something), to different participants and observers.[ii]

Possessing such a vague and contested status renders ‘hybrid defence’ a tricky concept to employ. A high-degree of refinement and improved definitions relating to more specific contexts need their greater advancement. Should Strategic Futures and Intelligence work be more neglected or overlooked, even underfunded, within this sphere of activity, then ‘hybrid defence’-related events and developments will quickly unravel, with cascading effects and outcomes soon becoming endowed with negative repercussions. Those situations cannot be afforded.[iii]

First, in this article, what is meant by ‘hybrid defence’ is further unpacked; before, second, examining the theme of ‘strategic futures and hybrid defence’, including further probing their relations. That analysis is followed, third, by a section on ‘intelligence for hybrid defence’, which examines (a) the utility of intelligence and (b) the value it can bring, as well as (c) suggesting ways in which, extending into the future, intelligence can then be best done both in and for ‘hybrid defence’ and other closely related security enterprises that range beyond. Finally, some overall conclusions are presented.

28 May 2017

*** Guarding the Guards at the CIA

By George Friedman

Over the weekend, The New York Times published a report detailing the discovery and systematic degradation of the U.S. espionage network in China from 2010 to 2012. The report cites 10 officials, former and current, who describe the penetration of the network and speculate on the reason for its failure. Some claim there was a Chinese mole in the CIA. Others claim that lines of communication between assets and the agency had been breached.

The timing of the report is as interesting as the content itself. CIA officials, after all, have already been accused of leaking information designed to weaken President Donald Trump. And now, not only have a handful of officials revealed a massive intelligence failure, but they have done so, apparently in concert, five years after it happened.

One explanation is that a faction in the CIA means to weaken the agency’s credibility by revealing the failure. (I have no evidence for this, but then again, evidence to substantiate charges is optional in Washington.) This would, in effect, undermine the credibility of those claiming to know about secret Russian plots. “You claim to know about them, but you are actually not very good at intelligence,” or so the argument would go.

21 May 2017

Too many spies spoil the intelligence broth

Vinay Kaura

Following the deadly Maoist attack in Sukma last month, India’s various intelligence agencies have come under scathing criticism. The parliamentary standing committee on home affairs, in its report submitted in April, noted the increasing incidence of terror attacks which “exposed the deficiencies of our intelligence agencies” and lamented the lack of analysis of the “failure of the intelligence agencies to provide credible and actionable inputs regarding the attacks at Pathankot, Uri, Pampore, Baramulla and Nagrota”. Clearly, intelligence strategy continues to be India’s Achilles’ heel and there is an urgent need for its re-articulation.

Deficiencies in the intelligence framework have often led to the growth of India’s intelligence ‘community’.

The Kargil intrusion in 1999 convinced the government that India’s national security mechanism stood in need of comprehensive overhaul. Subsequently, the Intelligence Bureau (IB) was designated as the premier counter-terrorism agency and authorized to create a multi-agency centre (MAC) which was to be an intelligence-sharing ‘fusion centre’ in New Delhi.

19 May 2017

HUMINT: A Continuing Crisis?


Before Vietnam completely fades from memory and its lessons learned gather even more dust, it might be worth exploring a few issues that will likely resurface again.

During the latter months of the Vietnam War (1971-72), the United States was actively sending units home, turning facilities and functions over to the South Vietnamese and to U.S. forces located elsewhere before the 29 March 1973 deadline for all U.S. forces to be out of the country. In January 72, President Nixon announced that 70,000 troops would be withdrawn by 1 May 72, reducing the troop level in Vietnam to 69,000.

Beginnings

I was assigned in 1971 to the 571st Military Intelligence Detachment in Da Nang, the unit primarily ran Human Intelligence (HUMINT) operations throughout I Corps in northern South Vietnam. I was quickly exposed to Viet Cong (VC), North Vietnamese Army (NVA) and friendly forces’ activity in our area of interest. As such it was evident that South Vietnamese forces that had taken part in Lam Son 719 in Laos were licking their wounds - even the much touted 1st Army of the Republic of Vietnam (ARVN) Division, garrisoned in Hue had been severely crippled in this failed campaign in 1971.

Intelligence and the Presidency

By Jami Miscik

U.S. presidents and other senior policymakers often come into office knowing little about the 17 federal agencies and offices that make up the U.S. intelligence community, but in short order, they come to rely heavily on its unique technologies, tradecraft, and expert analysis. The intelligence community’s mission is to provide national leaders with the best and most timely information available on global affairs and national security issues—information that, in turn, can help those leaders achieve their foreign policy objectives.

The president is the country’s top intelligence consumer and the only person who can authorize a covert action, and the services he receives from the intelligence community can be invaluable—providing early warning of brewing trouble, identifying and disrupting threats before they materialize, gaining insight into foreign leaders, and discreetly affecting developments abroad. For the relationship between intelligence producers and consumers to work effectively, however, each needs to understand and trust the other.

INFORMATION, NOT POLICY

The most common misperception about the intelligence community is that it makes policy. It doesn’t. As Allen Dulles, the director of central intelligence from 1953 to 1961, once said, “Intelligence is the servant, not the master, of foreign policy.” A new administration considers and articulates what it stands for and what it hopes to achieve; it develops policies and informational priorities, and then it deploys the resources of the intelligence community based on those priorities.

16 May 2017

Complex Intelligence Preparation of the Battlefield in Ukrainian Antiterrorism Operations

by Victor R. Morris

In September 2015, the US Army Europe Joint Multinational Readiness Center’s Raptor 14 Team supported “Battle Staff Attack the Network/Network Engagement and Company Intelligence Support Team” training for Ukrainian Armed forces Officers conducting antiterrorism operations (ATO) at the International Peacekeeping and Security Center (IPSC) in Yavoriv, Ukraine. To help Ukrainian intelligence staffs understand their operational environment (OE), doctrinal tools for intelligence preparation were not adequate. This experience serves as a case study on how cross-functional staffs and Company Command teams can apply a concept called complex intelligence preparation of the battlefield (complex IPB) to improve problem framing, understand relevant issues at all levels, and inform operational planning. Complex IPB focuses on ways to understand group dynamics and how they influence the behavior of relevant populations. Complex IPB can support the Army’s doctrinal intelligence preparation of the battlefield (IPB) process and the joint process called joint intelligence preparation of the operational environment (JIPOE).

From IPB to Complex IPB

According to Army Techniques Publication 2-01.3, Intelligence Preparation of the Battlefield (also published as Marine Corps Reference Publication 2-3A, Intelligence Preparation of the Battlespace), an Army intelligence staff (1) defines the operational environment, (2) describes environmental effects on operations, (3) evaluates the threat, and (4) determines the threat.1 The staff uses this four-step process to analyze certain mission variables in the area of interest for a specific operation.2 The mission variables analyzed are the enemy, terrain, weather, and civil considerations.3 The goal of Army IPB is to provide Army commanders and staffs the information necessary to develop courses of action and make decisions.4

15 May 2017

HILL INTEL COMMITTEES ORDER DNI, NSA/CYBERCOM REVIEW


The panel should present its unclassified report within 180 days of the bill’s passage.

The intel committees come close to calling for the separation of the jobs of NSA Director and the head of Cyber Command.

They want a briefing from Defense Secretary Jim Mattis just three months after passage of the Omnibus Bill considering the “impact of the dual-hatting relationship, including advantages and disadvantages.”

It wants to know timelines for ensuring that no damage is done to national security should the arrangement change, any legal changes that might be needed and say “a larger organizational review of NSA should be conducted with respect to the eventual termination of the dual-hatting relationship.”

To that end, they also want a report from the DNI “on options to better align the structure, budgetary procedures, and oversight of NSA with its national intelligence mission in the event of a termination of the dual-hatting relationship.”

National Counterterrorism Center chief says org is sharing intelligence with technology companies

Laura Kelly
Washington Times

The National Counterterrorism Center is incentivizing technology companies by sharing intelligence with them to battle terrorist-recruiting strategies on the web, NCTC Director Nicholas Rasmussen said Wednesday.

The director highlighted that the companies “become burdened with the knowledge” of how certain platforms are being used and exploited by foreign terrorist organizations.

He made his comments at an event discussing new terrorist threats and counterterrorism strategies hosted by the Center for a New American Security.

Short of sharing classified information, the NCTC is looking at ways to make information accessible to people outside of this community, Mr. Rasmussen added.

“We’re leaning forward pretty dramatically in this area to try and share that information,” he said.

“Again to incentivize these partners, these companies to take steps that are in their capacity to take and not to do so

12 May 2017

WHO IS PUBLISHING NSA & CIA SECRETS — AND WHY? “THERE IS SOMETHING GOING ON IN THE INTELLIGENCE COMMUNITIES IN AT LEAST TWO COUNTRIES — AND, WE HAVE NO IDEA WHAT IT IS”

By RC Porter 

Noted, and internationally renowned cyber expert, Bruce Schneier, had an article on April 27, 2016 on the LawFare.com, with the title above. Mr. Schneier begins with this observation: “There is something going on inside the intelligence communities in at least two countries; and, we have no idea what it is. Consider these three data points,” Mr. Schneier wrote: “Someone, probably a country’s intelligence organization, is dumping a massive amount of cyber tools belonging to the NSA on the Internet; Two: someone else, or maybe the same someone, is doing the same thing to the CIA; Three: in March, Deputy Director of the NSA, Richard Ledgett, described how the NSA penetrated the computer networks of a Russian intelligence agency; and, was able to monitor them as they attacked the U.S. State Department in 2014. Even more explicitly, a U.S. ally — my guess (Mr Schneier) is the U.K. — was not only hacking the Russian intelligence agency’s computers; but, also the surveillance cameras inside their building,” Mr. Schneier wrote. “They [the U.S. ally], monitored the [Russian] hackers as they maneuvered throughout the U.S. systems, and as they walked in and out of the work-space, and were able to see faces,” the official said.

“Countries don’t often reveal intelligence capabilities: “sources and methods.” Because it gives their adversaries important information about what to fix, it is a deliberate decision done with good reason. And, it’s not just the target country who learns from a reveal. When the U.S. announces it can see through the cameras inside the buildings of Russia’s cyber warriors, other countries immediately check the security of their own cameras,” Mr. Schneier observes.

10 May 2017

Getting Intelligence Agencies to Adapt to Life Out of the Shadows

by Guest Blogger

Jamie Collier is a Cyber Security DPhil Candidate and a Research Affiliate with the Cyber Studies Programme, University of Oxford. You can follow him @jscollier93

Gone are the days when spy agencies did not officially exist with their personnel and activities guarded surreptitiously away from the public view. Today, the situation could not be more different. The U.S. Office of the Director of National Intelligence has had a Tumblr account since 2014. NSA Director Admiral Mike Rogers appears regularly at conferences and panels. On the other side of the Atlantic, GCHQ Director Robert Hannigan writes op-eds for the Financial Times. GCHQ also recently broke a historical precedent of refusing to comment on allegations about its activities: the agency dismissed the unhelpful allegations about the agency’s role in spying on Trump, made by Andrew Napolitano and then echoed by the White House, claiming that they were ‘utterly ridiculous and should be ignored’. In recent years, signals intelligence (SIGINT) agencies have been pro-actively trying to manage and shape their public perception. 

Why are organisations that pride themselves on secrecy, and which have previously appeared allergic to press relations, now proactively getting their message out there? The answer is that they are increasingly communicating out of necessity.