{"id":2798,"date":"2018-03-21T12:00:06","date_gmt":"2018-03-21T15:00:06","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2798"},"modified":"2018-03-21T12:00:06","modified_gmt":"2018-03-21T15:00:06","slug":"el-pentagono-pretende-que-la-inteligencia-artificial-ia-revele-las-verdaderas-intenciones-de-los-adversarios","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2798","title":{"rendered":"El Pent\u00e1gono pretende que la Inteligencia Artificial (IA) revele las verdaderas intenciones de los adversarios"},"content":{"rendered":"<p>El ej\u00e9rcito de los EE.UU. busca alistar la teor\u00eda de los juegos y la inteligencia artificial para luchar contra las t\u00e1cticas de guerra no convencionales del ma\u00f1ana.<!--more--><\/p>\n<p><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/cdn.defenseone.com\/media\/img\/upload\/2018\/03\/16\/AP_916483777771\/defense-large.jpg\" alt=\"A masked gunman guards combat vehicles with Russian, Donetsk Republic and Ukrainian paratroopers, flags and gunmen on top, parked in downtown of Slovyansk on Wednesday, April 16, 2014. \" width=\"409\" height=\"187\" \/>From eastern Europe to southern Iraq, the\u00a0<span class=\"caps\">U.S.<\/span>\u00a0military faces a \u00a0difficult problem: Adversaries pretending to be something they\u2019re not \u2014 think Russia\u2019s \u201clittle green men\u201d in Ukraine. \u00a0But a new program from the Defense Advanced Research Projects Agency seeks to apply artificial intelligence to detect and understand how adversaries are using sneaky tactics to create chaos, undermine governments, spread foreign influence and sow\u00a0discord.<\/p>\n<p>This activity, hostile action that falls short of \u2014 but often precedes \u2014 violence, is sometimes referred to as gray zone warfare, the \u2018zone\u2019 being a sort of liminal state in between peace and war. The actors that work in it are difficult to identify and their aims hard to predict, by\u00a0design.<\/p>\n<p>\u201cWe\u2019re looking at the problem from two perspectives: Trying to determine what the adversary is trying to do, his intent; and once we understand that or have a better understanding of it, then identify how he\u2019s going to carry out his plans \u2014 what the timing will be, and what actors will be used,\u201d said\u00a0<span class=\"caps\">DARPA<\/span>\u00a0program manager Fotis\u00a0Barlos.<\/p>\n<p>Dubbed\u00a0<span class=\"caps\">COMPASS<\/span>, the new program will \u201cleverage advanced artificial intelligence technologies, game theory, and modeling and estimation to both identify stimuli that yield the most information about an adversary\u2019s intentions, and provide decision makers high-fidelity intelligence on how to respond\u2013-with positive and negative tradeoffs for each course of action,\u201d according to a\u00a0<span class=\"caps\">DARPA<\/span>\u00a0notice posted Wednesday.<\/p>\n<p>Teaching software to understand and interpret human intention \u2014 a task sometimes called \u201cplan recognition\u201d \u2014 has been a subject of scholarship since at least\u00a0a 1978 paper\u00a0by Rutgers University researchers who sought to understand whether computer programs might be able to anticipate human intentions within rule-based environments like\u00a0chess.<\/p>\n<p>Since then, the science of plan recognition has advanced as quickly as the spread of computers and the internet, because all three are intimately\u00a0linked.<\/p>\n<p>From Amazon to Google to Facebook, the world\u2019s top tech companies are pouring money into probabilistic modeling of user behavior, as part of a constant race to keep from losing users to sites that can better predict what they want. A user\u2019s every click, \u201clike,\u201d and even period of inactivity adds to the companies\u2019 almost unimaginably large sets, and new machine learning and statistical techniques (especially involving\u00a0Bayesian reasoning) make it easier than ever to use the information to predict what a given user will do next on a given site. (Among these tools is\u00a0Google\u2019s Activity Recognition library,\u00a0which helps app developers imbue their software with a\u00a0better sense of what the user is\u00a0doing.)<\/p>\n<p>But inferring a user\u2019s next Amazon purchase (based on data that user has volunteered about previous choices, likes, etc.) is altogether different from predicting how an adversary intends to engage in political or unconventional warfare. So the\u00a0<span class=\"caps\">COMPASS<\/span>program seeks to use video, text, and other pieces of intelligence that are a lot harder to get than shopping-cart\u00a0data.<\/p>\n<p>The program aligns well with the needs of the Special Operations Forces community in particular. Gen. Raymond \u201cTony\u201d Thomas, the head of\u00a0<span class=\"caps\">U.S.<\/span>\u00a0Special Operations Command, has said that he\u2019s interested in deploying forces to places before there\u2019s a war to fight. Thomas\u00a0has discussed\u00a0his desire to apply artificial intelligence, including neural nets and deep learning techniques, to get \u201cleft of\u00a0bang.\u201d<\/p>\n<p>Unlike shopping, the analytical tricks that apply to one gray-zone adversary won\u2019t work on another. \u201cHistory has shown that no two [unconventional warfare] situations or solutions are identical, thus rendering cookie-cutter responses not only meaningless but also often counterproductive,\u201d wrote Gen. Joseph Votel, who leads\u00a0<span class=\"caps\">U.S.<\/span>\u00a0Central Command, in\u00a0his seminal 2016 treatise\u00a0on gray zone\u00a0warfare.<\/p>\n<p>As practiced by Amazon and others within the domain of online shopping, \u201cplan recognition\u201d at scale is very cookie-cutter. If\u00a0<span class=\"caps\">COMPASS<\/span>\u00a0succeeds, it will have to apply game theory and big data to behavior prediction in ways that Silicon Valley has never attempted. And it will have to do so repeatedly, in the face of varied and constantly morphing adversaries looking to keep as much of their activity hidden as possible \u2026 an ambitious undertaking even for\u00a0<span class=\"caps\">DARPA<\/span>.<\/p>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"http:\/\/www.defenseone.com\/technology\/2018\/03\/pentagon-wants-ai-reveal-deceptive-adversaries-true-intentions\/146739\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.defenseone.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El ej\u00e9rcito de los EE.UU. busca alistar la teor\u00eda de los juegos y la inteligencia artificial para luchar contra las t\u00e1cticas de guerra no convencionales&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2798"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2798"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2798\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}