SlideShare une entreprise Scribd logo
1  sur  89
Télécharger pour lire hors ligne
Dr. George Poste
Chief Scientist, Complex Adaptive Systems Initiative
and Regents Professor of Health Innovation
Arizona State University
george.poste@asu.edu
www.casi.asu.edu
Security, Sensors, Surveillance,
Smart Machines and Supercomputers
Presentation at TASER International
Scottsdale, Arizona
6 June 2016
Innovation Cool Facilities
Geekiest Offices Compelling Mission
Advisory Roles in US National Security:
Dr. George Poste and US Secretary of Defense Dr. Ashton Carter
 Defense Science Board
 DOD Bioterrorism Task Force
 National Academy of Medicine
Global Forum on Infectious
Disease
 National Blueprint for Biodefense
 In-Q-Tel
 Defense Threat Reduction Agency
 Department of Homeland Security
 Council on Foreign Relations
Security
 threat mitigation/elimination
 proactive risk assessment and mitigation
versus reactive post-incident actions
 immediate and long-term protection
 channeling events to most desired
outcomes
 escalating complexities
 constant learning and adaptation
Rumsfeld’s Rules
 known, knowns
– preparedness
 known, unknowns
– R&D for new capabilities
 unknown, unknowns
– potential for rude surprises
Hon. D. Rumsfeld
US Secretary of Defense
Global Security Risks: Escalating Diversity and Complexity
WMD
Proliferation
Rise of
New Powers
Jihadi Terrorism
and Religious
Fundamentalism
Failed
States
Refugees
Cybersecurity
Homeland
Security
Biosecurity
Robotics,
Autonomous
Weapons
Asymmetric
Vulnerabilities
Global Security Risks: Escalating Diversity and Complexity
Climate-Change and
New Vector Range
Pandemic Disease
Natural Resources
Depletion
Feeding
9 Billion
Aging Society
and Health Cost
Antibiotic
Resistance
Automation and
Unemployment
Future Workforce
Education
Global Urbanization
 28 megacities in 2016
 70% current/projected megacities
in countries with Global Conflict
Risk Index probability of conflict
within 10 years
 unprecedented stresses on
infrastructure and services by
2030
– food (35% ), water (40% ),
energy (50% )
 susceptibility to extreme
weather/natural disaster
– littoral locations, slums
Global Security Risks: The Impact of Urbanization
Inadequate Health
Infrastructure
Megacities
in DCs
Warlords, Gangs and
No Go Zones
MOUT/DUCT
COIN
Offshoring and
Supply Chain Risk
Climate
Change
Aging
Infrastructure
Disaster
Management
Developing Countries and Failed States
USA
The ‘Fog of Disaster’: Crisis Standards of Care and
Proliferation of Unanticipated Events and Consequences
Domestic Social Issues and Perceived Inequity as
Triggers of Resentment, Unrest and Instability
Security: Sustained Competitiveness in Advanced Technologies
Nanotechnology
and Novel
Materials
Genetic and
Synthetic Biology
Photonics
and Optics
Sensors
and IoT
3-D
Manufacturing
Robotics and
Automation
Cognitive
Computing and
Neurotechnology
Man-Machine
Interactions
Machine
Learning
Deep Learning
and Artificial
Intelligence
Convergence, Connectivity and Complexity
living
systems
mechanical
systems
digital
systems
The Big Data V6 Challenge:
The Pending Zettabyte-Brontobyte Worlds
 volume
 velocity
 variety
 veracity
 visualization
 value
Big Data and Analytics:
Integration of Diverse Data Streams for
Comprehensive Real Time Situational Awareness
“Actionable Intelligence Starts at Ingestion”
Ubiquitous Sensing
Internet – of – Things (IoT)
Biometrics and Surveillance
AORTA: Always On, Real Time Awareness
Faster Data, Smarter Analytics, Better Decisions
Sensor World
The Relentless Battle Against
Ever Changing Infectious Diseases
pandemic (avian)
influenza
HIV
West Nile
virus
MERS
Ebola
virus
bush meat
food chain
Zika
virus
what’s
out there?
?
Geodemographic Information Systems (GIS):
Ground Zero Data
Comprehensive Front Line Sampling of Sentinel Species
Real-time Intelligence and Faster Preparedness
Engineering Pathogenic Organisms
With Increased Virulence and/or Ability to
Evade Detection by Body’s Immune System
Ebola as a
potential bioweapon
synthetic
poliovirus
creation of pandemic
influenza strains
Editing Humanity:
No Longer An Abstract Question
Gene Editing As One of the Top Six
Existential Threats to the USA
The Crucial Value of Point-of-Need Multiplex Diagnostic
Devices for Real-Time Health Status Monitoring
Wearable Devices and Wireless Monitoring of Health Status
Gastroenterology Mini-Cam
Vital Signs Monitoring
Glucose MonitoringPills with Chips
Implantable Devices and Wireless Monitoring
(and Modulation)
next-generation
miniaturized
power sources
security and
hacker protections
Invasion of the Body Trackers
Remote Health Status and Behavior Monitoring
Meta-Data Consent
Privacy
and Security
Your Molecular Uniqueness
genome
proteome
exposome
immunosignature
Construction of Biometric Databases
Facial Recognition and Identification of Terrorism Suspects
The DNA Identikit:
Tracking Genes Coding for Facial Bones, Eye and Hair Color
Biometrics of Unknown Person (BUPs)
 recovery of DNA and other biological markers from
objects seized abroad in military/intelligence
operations
 bomb casings, keyboards, phones, clothing
 matching of recovered papers and electronic
materials to other datastreams
Computer-Based Facial Recognition Plus Idiosyncratic
Patterns of Body Language and Movement
The Challenge of Real-Time Monitoring and
Individual Recognition in Crowded Spaces
Evolution of Dynamic Interfaces for Computer-Based
Individual Recognition and Real Time Decisions
Legal and Policy Issues Generated by Use of
Body-Worn Cameras (BWC) and other Technologies for
Front-Line Police and On-Ground Military
 privacy, transparency, accountability
 the ‘gotcha’ phenomenon
– every action potentially recorded by third
parties
– vital record of the perspective of the front-line
operator(s)
 integrated end-to-end data ecosystem
Integrated Ecosystems for Facile, End-to-End Secure
Data Capture, Authentication and Analytics
From Conflict Zone to
Adaptive CONOPS
From Capture to
Courtroom
• Evidence.com • C4ISR
 security
 scalability
 sustainability
 authenticity
 availability
 audit
 speed
 search
 synthesis
Digital Signatures/Traces/Exhaust/Dust
Tracking Personal Behavior and Activities
Predictive Analytics
Digital Traces
 every move you make
 every twitter feed you update
 every facebook friend you add
 every internet search you log
 every cell phone call you transmit
 every time you use your credit card
SOMETHING AND/OR SOMEONE IS TRACKING YOU
You’re So Predictable!
Social Behavior Becomes Quantifiable
 who knows why people do what they do?
– the fact is that they do!
 these actions can now be traced and measured with
unprecedented precision
 with sufficient data, the patterns reveal increasingly
predictable behavior and individual risk patterns
 new opportunities in multiple business sectors
 broad utility in national security, intelligence and
military operations
 new ethical and legal issues regarding privacy and
data security
Cell-Phone Based Digital Geo-spatial Information Services
Individual-Specific Patterns of App Use
and Keyboard Use Dynamics
Avatar Personalities in Gaming Reveal Behavioral Clues to
Match With Other Aspects of User Activities
 risk profiling
 predispositions to
anti-social
actions/susceptibilities
 mapping correlation with
real world actions,
including law breaking
International Mobile Subscriber Identity (IMSI)
Catcher Technology (Cell-Site Simulator)
 tracking of mobile phones by IMSI signal
 police depts., FBI, IRS and IC (restricted)
– Hailstorm
– Stingray, Triggerfish, Kingfish, Amberjack,
Harpoon
 consumer products
– Snoopsnitch, Cryptophone
 legal challenges to privacy invasion
Your Car Knows A Lot About You
Will We Even Call It A Phone In 2020?
Lots of Little Brothers Create – Big Brother
The Democratization of Surveillance
Large Scale Probalistic Analysis of Electronic Traffic Networks
to Identify Anomalies and Potential Risk Emergence
Real Time Analytics (Mining) of
High Volume Social Media Feeds
Profiling of Militant Islamic Fundamentalists
and Terrorism Behavioral Indicators
Mogadishu
1993
Grozny
1994 and 1999
Fallujah
2004
Sadr City
2008
Gaza
2013
Aleppo
2016
Urban Warfare, Counter-Terrorism
and Counter-Insurgency Operations
Real Time Intelligence for On-Ground, Dismounted Forces
Electronic Intelligence for On-Ground Dismounted
Forces in Urban Settings
seeing round corners seeing through walls
Everything is a Potential On-Ground Sensor and Signal
Satellites, Drones and Robots
Semi-Autonomous and Autonomous Weapons
The New Automated Battlefield
Eyes in the Sky: “Persistent Stare”
The Rise of the Keyboard Warriors:
The USAF Now Trains More Drone Pilots Than
Conventional Fighter and Transport Pilots
Diversification of Military and
Law Enforcement Drone Platforms
Cicada: Covert Autonomous Disposable Aircraft
The Miniaturized Drone That Can Spy From a Leaf
Drone
Paramedics
Drones to
Your Door
Drones for
Your Dog
Paul Revere Updated
The Robots are Coming, The Robots are Coming!
The Robots are Coming
Civilian Sector 4-D Jobs – Dull, Dirty, Dangerous and Digital
Progressive Redundancy and Replacement of Human Skills
Submersile - Bots Snake-Bots Buddy-Bots
All-Terrain Fast Mobility Robotics:
Boston Dynamics
Armed Robots
The Complex Ethical and Legal Landscape of New
Classes of Fully Autonomous Battlefield Machines
Keeping Humans In-the-Loop
Robot Wars
Iron Man: The SOCOM-TALOS Project
Tactical Assault Light Operator Suit (Ekso Bionics)
Human-Machine Interactions
Human-Computer Interactions
Neurotechnologies and Artificial Intelligence
Implanted Brain Microelectrode Arrays and Mind Control of
Prosthetic Arm by Quadriplegic Patient
Direct Connection of Nervous Control to Prostheses
“Brain Net”
 first brain-to-brain link via remote transfer of encoded brain
pattern to decoder animal and triggering of behavioral mimicry
 build inventory of codes to elicit specific behavior in target
(decoder)
– design of new control systems for robots
 legal and ethical implications of extension to elicited behavior
(control, modulation) of humans
Dual-Use Implications of Advances in Neural Science
Designing New Ways to Expand Human
Cognitive, Sensory and Motor Capabilities
Heads-up Display Technologies to Optimize Complex
Manufacturing Assembly and Reduce Risk
Virtual Reality and Training for Complex, Dynamic Tasks
Advances in Cognitive Neurosciences and
New Patterns of Cognitive Processing
 optimize information representation (perception)
 neuroplasticity and selection of new cognitive mechanisms
 modulation of brain function to optimize comprehension
Massive Data and the Sophistication of Analytical Algorithms
is Outpacing Human Cognitive and Sensory Capabilities
Why Wait for the Slow Brain to Catchup
With the Fast Machine
Machine Learning and Artificial Intelligence
Recent Acquisitions mid-2015 to May 2016
Automation, Robotics, Machine Intelligence
and the Future Workforce
“I Can’t Let You Do That Dave”
Robotic Dystopias
Blade Runner (1982)
iRobot (2004)
Terminator (1984)
Ex Machina (2015)
Original Sin Updated?
Artificial Intelligence and the Elimination of Mankind?
Science 20 May 2016
China’s Military Aspirations
Ubiquitous
Sensing/
Devices &
Social Networks
Genetics,
Biotechnology,
Synthetic
Biology
Advanced
Computing
Mega- &
Meta- Data
Robotics and
Advanced
Autonomous
Systems
Neurosciences
and
Human-Machine
Interactions
“Connected
Space”
“Bio-Space” “Analytics Space”
and
“Surveillance Space”
“Design Control
Space”
“Cognitive
Space”
Technology Acceleration and Convergence:
Escalating Complexities
Ubiquitous
Sensing/
Devices &
Social Networks
Genetics,
Biotechnology,
Synthetic
Biology
Advanced
Computing
Mega- &
Meta- Data
Robotics and
Advanced
Autonomous
Systems
Neurosciences
and
Human-Machine
Interactions
“Connected
Space”
“Bio-Space” “Analytics Space”
and
“Surveillance Space”
“Design Control
Space”
“Cognitive
Space”
Technology Acceleration and Convergence:
Escalating Complexities
New Patterns of Technology Fusion,
Evolution and Adoption
New Markets
and
Business Models
New Knowledge
Networks
New
Participants
Slides available @ http://casi.asu.edu/

Contenu connexe

Similaire à G. Poste. Security, Sensors, Surveillance, Smart Machines and Supercomputers. TASER International. Scottsdale, Arizona (Jun 6 2016)

TRADOC OE Dr. Bishop Presentation
TRADOC OE Dr. Bishop PresentationTRADOC OE Dr. Bishop Presentation
TRADOC OE Dr. Bishop Presentation
US Army TRADOC G2
 

Similaire à G. Poste. Security, Sensors, Surveillance, Smart Machines and Supercomputers. TASER International. Scottsdale, Arizona (Jun 6 2016) (20)

Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
Emerging Forms of Data and Analytics
Emerging Forms of Data and AnalyticsEmerging Forms of Data and Analytics
Emerging Forms of Data and Analytics
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Supporting epidemic intelligence, personalised and public health with advance...
Supporting epidemic intelligence, personalised and public health with advance...Supporting epidemic intelligence, personalised and public health with advance...
Supporting epidemic intelligence, personalised and public health with advance...
 
G. Poste. Managing the Data Deluge: Critical Issues in the Integration and An...
G. Poste. Managing the Data Deluge: Critical Issues in the Integration and An...G. Poste. Managing the Data Deluge: Critical Issues in the Integration and An...
G. Poste. Managing the Data Deluge: Critical Issues in the Integration and An...
 
Big data for knowledge extraction - COVID19 examples (ScanBaltForum2020)
Big data for knowledge extraction - COVID19 examples (ScanBaltForum2020)Big data for knowledge extraction - COVID19 examples (ScanBaltForum2020)
Big data for knowledge extraction - COVID19 examples (ScanBaltForum2020)
 
Nca pres saturday
Nca pres saturdayNca pres saturday
Nca pres saturday
 
Teacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsTeacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implications
 
Chicago crime conference
Chicago crime conferenceChicago crime conference
Chicago crime conference
 
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
Tracking Drug Shortages with Open APIs and Hedera Hashgraph | Hedera18
 
Dangers of Over-Reliance on AI in the Military
Dangers of Over-Reliance on AI in the MilitaryDangers of Over-Reliance on AI in the Military
Dangers of Over-Reliance on AI in the Military
 
TRADOC OE Dr. Bishop Presentation
TRADOC OE Dr. Bishop PresentationTRADOC OE Dr. Bishop Presentation
TRADOC OE Dr. Bishop Presentation
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
AI WORLD: I-World: EIS Global Innovation Platform: BIG Knowledge World vs. BI...
 
“Data for Development – the value of data for research and society” by Dr. Ma...
“Data for Development – the value of data for research and society” by Dr. Ma...“Data for Development – the value of data for research and society” by Dr. Ma...
“Data for Development – the value of data for research and society” by Dr. Ma...
 
Health Solutions at the Edge: Mobile and IoT for Life Sciences | AWS Public S...
Health Solutions at the Edge: Mobile and IoT for Life Sciences | AWS Public S...Health Solutions at the Edge: Mobile and IoT for Life Sciences | AWS Public S...
Health Solutions at the Edge: Mobile and IoT for Life Sciences | AWS Public S...
 
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and ProvocationsYale ISP, Sensors, Journalism, Laws, Ethics and Provocations
Yale ISP, Sensors, Journalism, Laws, Ethics and Provocations
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
Future Ways of Doing Science science world conf of scientific youth peru 2016
Future Ways of Doing Science science world conf of scientific youth peru 2016Future Ways of Doing Science science world conf of scientific youth peru 2016
Future Ways of Doing Science science world conf of scientific youth peru 2016
 

Dernier

Dernier (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

G. Poste. Security, Sensors, Surveillance, Smart Machines and Supercomputers. TASER International. Scottsdale, Arizona (Jun 6 2016)

  • 1. Dr. George Poste Chief Scientist, Complex Adaptive Systems Initiative and Regents Professor of Health Innovation Arizona State University george.poste@asu.edu www.casi.asu.edu Security, Sensors, Surveillance, Smart Machines and Supercomputers Presentation at TASER International Scottsdale, Arizona 6 June 2016
  • 2. Innovation Cool Facilities Geekiest Offices Compelling Mission
  • 3. Advisory Roles in US National Security: Dr. George Poste and US Secretary of Defense Dr. Ashton Carter  Defense Science Board  DOD Bioterrorism Task Force  National Academy of Medicine Global Forum on Infectious Disease  National Blueprint for Biodefense  In-Q-Tel  Defense Threat Reduction Agency  Department of Homeland Security  Council on Foreign Relations
  • 4. Security  threat mitigation/elimination  proactive risk assessment and mitigation versus reactive post-incident actions  immediate and long-term protection  channeling events to most desired outcomes  escalating complexities  constant learning and adaptation
  • 5. Rumsfeld’s Rules  known, knowns – preparedness  known, unknowns – R&D for new capabilities  unknown, unknowns – potential for rude surprises Hon. D. Rumsfeld US Secretary of Defense
  • 6. Global Security Risks: Escalating Diversity and Complexity WMD Proliferation Rise of New Powers Jihadi Terrorism and Religious Fundamentalism Failed States Refugees Cybersecurity Homeland Security Biosecurity Robotics, Autonomous Weapons Asymmetric Vulnerabilities
  • 7. Global Security Risks: Escalating Diversity and Complexity Climate-Change and New Vector Range Pandemic Disease Natural Resources Depletion Feeding 9 Billion Aging Society and Health Cost Antibiotic Resistance Automation and Unemployment Future Workforce Education
  • 8. Global Urbanization  28 megacities in 2016  70% current/projected megacities in countries with Global Conflict Risk Index probability of conflict within 10 years  unprecedented stresses on infrastructure and services by 2030 – food (35% ), water (40% ), energy (50% )  susceptibility to extreme weather/natural disaster – littoral locations, slums
  • 9. Global Security Risks: The Impact of Urbanization Inadequate Health Infrastructure Megacities in DCs Warlords, Gangs and No Go Zones MOUT/DUCT COIN Offshoring and Supply Chain Risk Climate Change Aging Infrastructure Disaster Management Developing Countries and Failed States USA
  • 10. The ‘Fog of Disaster’: Crisis Standards of Care and Proliferation of Unanticipated Events and Consequences
  • 11. Domestic Social Issues and Perceived Inequity as Triggers of Resentment, Unrest and Instability
  • 12. Security: Sustained Competitiveness in Advanced Technologies Nanotechnology and Novel Materials Genetic and Synthetic Biology Photonics and Optics Sensors and IoT 3-D Manufacturing Robotics and Automation Cognitive Computing and Neurotechnology Man-Machine Interactions Machine Learning Deep Learning and Artificial Intelligence
  • 13. Convergence, Connectivity and Complexity living systems mechanical systems digital systems
  • 14. The Big Data V6 Challenge: The Pending Zettabyte-Brontobyte Worlds  volume  velocity  variety  veracity  visualization  value
  • 15. Big Data and Analytics: Integration of Diverse Data Streams for Comprehensive Real Time Situational Awareness “Actionable Intelligence Starts at Ingestion”
  • 16. Ubiquitous Sensing Internet – of – Things (IoT) Biometrics and Surveillance AORTA: Always On, Real Time Awareness Faster Data, Smarter Analytics, Better Decisions Sensor World
  • 17. The Relentless Battle Against Ever Changing Infectious Diseases pandemic (avian) influenza HIV West Nile virus MERS Ebola virus bush meat food chain Zika virus what’s out there? ?
  • 18. Geodemographic Information Systems (GIS): Ground Zero Data Comprehensive Front Line Sampling of Sentinel Species Real-time Intelligence and Faster Preparedness
  • 19. Engineering Pathogenic Organisms With Increased Virulence and/or Ability to Evade Detection by Body’s Immune System Ebola as a potential bioweapon synthetic poliovirus creation of pandemic influenza strains
  • 20. Editing Humanity: No Longer An Abstract Question
  • 21. Gene Editing As One of the Top Six Existential Threats to the USA
  • 22. The Crucial Value of Point-of-Need Multiplex Diagnostic Devices for Real-Time Health Status Monitoring
  • 23. Wearable Devices and Wireless Monitoring of Health Status Gastroenterology Mini-Cam Vital Signs Monitoring Glucose MonitoringPills with Chips
  • 24. Implantable Devices and Wireless Monitoring (and Modulation) next-generation miniaturized power sources security and hacker protections
  • 25. Invasion of the Body Trackers Remote Health Status and Behavior Monitoring Meta-Data Consent Privacy and Security
  • 26.
  • 29. Facial Recognition and Identification of Terrorism Suspects
  • 30. The DNA Identikit: Tracking Genes Coding for Facial Bones, Eye and Hair Color
  • 31. Biometrics of Unknown Person (BUPs)  recovery of DNA and other biological markers from objects seized abroad in military/intelligence operations  bomb casings, keyboards, phones, clothing  matching of recovered papers and electronic materials to other datastreams
  • 32. Computer-Based Facial Recognition Plus Idiosyncratic Patterns of Body Language and Movement
  • 33. The Challenge of Real-Time Monitoring and Individual Recognition in Crowded Spaces
  • 34. Evolution of Dynamic Interfaces for Computer-Based Individual Recognition and Real Time Decisions
  • 35. Legal and Policy Issues Generated by Use of Body-Worn Cameras (BWC) and other Technologies for Front-Line Police and On-Ground Military  privacy, transparency, accountability  the ‘gotcha’ phenomenon – every action potentially recorded by third parties – vital record of the perspective of the front-line operator(s)  integrated end-to-end data ecosystem
  • 36. Integrated Ecosystems for Facile, End-to-End Secure Data Capture, Authentication and Analytics From Conflict Zone to Adaptive CONOPS From Capture to Courtroom • Evidence.com • C4ISR  security  scalability  sustainability  authenticity  availability  audit  speed  search  synthesis
  • 37. Digital Signatures/Traces/Exhaust/Dust Tracking Personal Behavior and Activities Predictive Analytics
  • 38. Digital Traces  every move you make  every twitter feed you update  every facebook friend you add  every internet search you log  every cell phone call you transmit  every time you use your credit card SOMETHING AND/OR SOMEONE IS TRACKING YOU
  • 39. You’re So Predictable! Social Behavior Becomes Quantifiable  who knows why people do what they do? – the fact is that they do!  these actions can now be traced and measured with unprecedented precision  with sufficient data, the patterns reveal increasingly predictable behavior and individual risk patterns  new opportunities in multiple business sectors  broad utility in national security, intelligence and military operations  new ethical and legal issues regarding privacy and data security
  • 40. Cell-Phone Based Digital Geo-spatial Information Services
  • 41. Individual-Specific Patterns of App Use and Keyboard Use Dynamics
  • 42. Avatar Personalities in Gaming Reveal Behavioral Clues to Match With Other Aspects of User Activities  risk profiling  predispositions to anti-social actions/susceptibilities  mapping correlation with real world actions, including law breaking
  • 43. International Mobile Subscriber Identity (IMSI) Catcher Technology (Cell-Site Simulator)  tracking of mobile phones by IMSI signal  police depts., FBI, IRS and IC (restricted) – Hailstorm – Stingray, Triggerfish, Kingfish, Amberjack, Harpoon  consumer products – Snoopsnitch, Cryptophone  legal challenges to privacy invasion
  • 44. Your Car Knows A Lot About You
  • 45. Will We Even Call It A Phone In 2020?
  • 46. Lots of Little Brothers Create – Big Brother The Democratization of Surveillance
  • 47. Large Scale Probalistic Analysis of Electronic Traffic Networks to Identify Anomalies and Potential Risk Emergence
  • 48. Real Time Analytics (Mining) of High Volume Social Media Feeds
  • 49. Profiling of Militant Islamic Fundamentalists and Terrorism Behavioral Indicators
  • 50. Mogadishu 1993 Grozny 1994 and 1999 Fallujah 2004 Sadr City 2008 Gaza 2013 Aleppo 2016 Urban Warfare, Counter-Terrorism and Counter-Insurgency Operations
  • 51. Real Time Intelligence for On-Ground, Dismounted Forces
  • 52. Electronic Intelligence for On-Ground Dismounted Forces in Urban Settings seeing round corners seeing through walls
  • 53. Everything is a Potential On-Ground Sensor and Signal
  • 54. Satellites, Drones and Robots Semi-Autonomous and Autonomous Weapons The New Automated Battlefield
  • 55. Eyes in the Sky: “Persistent Stare”
  • 56. The Rise of the Keyboard Warriors: The USAF Now Trains More Drone Pilots Than Conventional Fighter and Transport Pilots
  • 57. Diversification of Military and Law Enforcement Drone Platforms
  • 58. Cicada: Covert Autonomous Disposable Aircraft
  • 59. The Miniaturized Drone That Can Spy From a Leaf
  • 61. Paul Revere Updated The Robots are Coming, The Robots are Coming!
  • 62. The Robots are Coming Civilian Sector 4-D Jobs – Dull, Dirty, Dangerous and Digital Progressive Redundancy and Replacement of Human Skills
  • 63. Submersile - Bots Snake-Bots Buddy-Bots
  • 64. All-Terrain Fast Mobility Robotics: Boston Dynamics
  • 66. The Complex Ethical and Legal Landscape of New Classes of Fully Autonomous Battlefield Machines Keeping Humans In-the-Loop Robot Wars
  • 67. Iron Man: The SOCOM-TALOS Project Tactical Assault Light Operator Suit (Ekso Bionics)
  • 69. Implanted Brain Microelectrode Arrays and Mind Control of Prosthetic Arm by Quadriplegic Patient
  • 70. Direct Connection of Nervous Control to Prostheses
  • 71. “Brain Net”  first brain-to-brain link via remote transfer of encoded brain pattern to decoder animal and triggering of behavioral mimicry  build inventory of codes to elicit specific behavior in target (decoder) – design of new control systems for robots  legal and ethical implications of extension to elicited behavior (control, modulation) of humans
  • 72. Dual-Use Implications of Advances in Neural Science
  • 73. Designing New Ways to Expand Human Cognitive, Sensory and Motor Capabilities
  • 74. Heads-up Display Technologies to Optimize Complex Manufacturing Assembly and Reduce Risk
  • 75. Virtual Reality and Training for Complex, Dynamic Tasks
  • 76. Advances in Cognitive Neurosciences and New Patterns of Cognitive Processing  optimize information representation (perception)  neuroplasticity and selection of new cognitive mechanisms  modulation of brain function to optimize comprehension
  • 77. Massive Data and the Sophistication of Analytical Algorithms is Outpacing Human Cognitive and Sensory Capabilities Why Wait for the Slow Brain to Catchup With the Fast Machine Machine Learning and Artificial Intelligence
  • 78.
  • 80.
  • 81. Automation, Robotics, Machine Intelligence and the Future Workforce
  • 82. “I Can’t Let You Do That Dave”
  • 83. Robotic Dystopias Blade Runner (1982) iRobot (2004) Terminator (1984) Ex Machina (2015)
  • 84. Original Sin Updated? Artificial Intelligence and the Elimination of Mankind?
  • 87. Ubiquitous Sensing/ Devices & Social Networks Genetics, Biotechnology, Synthetic Biology Advanced Computing Mega- & Meta- Data Robotics and Advanced Autonomous Systems Neurosciences and Human-Machine Interactions “Connected Space” “Bio-Space” “Analytics Space” and “Surveillance Space” “Design Control Space” “Cognitive Space” Technology Acceleration and Convergence: Escalating Complexities
  • 88. Ubiquitous Sensing/ Devices & Social Networks Genetics, Biotechnology, Synthetic Biology Advanced Computing Mega- & Meta- Data Robotics and Advanced Autonomous Systems Neurosciences and Human-Machine Interactions “Connected Space” “Bio-Space” “Analytics Space” and “Surveillance Space” “Design Control Space” “Cognitive Space” Technology Acceleration and Convergence: Escalating Complexities New Patterns of Technology Fusion, Evolution and Adoption New Markets and Business Models New Knowledge Networks New Participants
  • 89. Slides available @ http://casi.asu.edu/