Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
Story Views
Now:
Last hour:
Last 24 hours:
Total:

Jade Helm 2015 - Cyberdyne and Skynet are Born

% of readers think this story is Fact. Add your two cents.



JADE HELM 2015 – Cyberdyne and Skynet are Born

Like a combination of the fictional “Cyberdyne” and “Skynet” of the “Terminator” movies and the predictive element of the “Majority Report”, we may be seeing the birth of a real life version of the same with a large scale test of a computer directed military exercise called JADE Helm 15. If you add in the robotics from DARPA and similar enterprises then the “Terminator” movie and the “Majority Report” seem almost prophetic.

The following excerpts from military documents and related websites offer proof that JADE Helm 2015 is a large scale computer driven military exercise. This is only a sampling. “Just the facts, Ma’am. Just the facts.”

- Clark Hay (Friday, June 5, 2015)

JADE – Definition One

ForMAT2–Prodigy/CBMIP–Parka: The JADE Project

This page presents the results of a technology integration experiment (TIE) under the DARPA/Rome-Lab Planning Initiative between Carnegie Mellon’s Prodigy/CBMIP case-based mixed-initiative planner, BBN’s ForMAT2 force management and analysis tool, and the University of Maryland’s PARKA Parallel Knowledge Representation system. The Joint Assistant for Deployment and Execution (JADE) is an integrated mixed-initiative prototype whose goal is to provide military planners with the ability to generate a skeleton deployment plan within an extremely fast time period. That is, JADE can generate an 80% logistics solution in less than an hour. [Emphasis mine] ForMAT2 provides a drag and drop interface to the human deployment planner, Parka provides the high performance knowledge base to past deployment plans, and Prodigy/CBMIP provides modifications suggestions to the human user to facilitate the reuse of past plans in new situations. The JADE technology is demonstrated in a highly complex and realistic Pacific Command crisis scenario.

 

JADE – The OTHER Definition

ADA490293.pdf

P. 14

3.3.2 DEEP Agents

The DEEP system uses two different types of agents. The first type is called an interface or planning agent and the second type is a critic agent.

Agents in the DEEP architecture extend and use the Java Agent DEvelopment (JADE) framework (Bellifemine, 2006). DEEP requires a distributed multi-agent system and a framework to help simplify the implementation of this system. JADE was chosen because it is fully implemented in Java, and supports these requirements.

 

The role of DEEP in the JADE Helm exercise:

ADA490293.pdf

Abstract

This report describes an overview and the progress to date of the Distributed Episodic Exploratory Planning (DEEP) project. DEEP is a mixed-initiative decision support system that utilizes past experiences to suggest courses of action for new situations. It has been designed as a distributed multi-agent system, using agents to maintain and exploit the experiences of individual commanders as well as to transform suggested past plans into potential solutions for new problems. The system is mixed-initiative in the sense that a commander, through his or her agent, can view and modify the contents of the shared repository as needed. The agents interact through a common knowledge repository, represented by a blackboard in the initial architecture. The blackboard architecture is well-suited for dealing with ill-defined, complex situations such as warfare.

 

Part of the program (DEEP) uses Artificial Intelligence:

ADA490293.pdf

3.3.1 Blackboard – The Distributed Shared Knowledge Structure

As can be seen from the DEEP architecture in Figure 1, the various DEEP systems rely on a shared knowledge structure to act as a medium of communication and interaction.

Also, in order to support the NCO vision discussed in Section 2.1, the DEEP architecture requires a mechanism that supports reach-back in a distributed system. A blackboard system was chosen to fulfill this need as it not only functions as a shared memory for the DEEP system, but as we discussed in Section 3.1, it provides other functionality as well.

A blackboard system is an opportunistic artificial intelligence application based on the blackboard architectural software engineering paradigm (Corkill, 1991).The blackboard system functions as a central knowledge store facilitating communication and interaction between the different software systems, including interface agents, critic agents, and simulation engines (explained later in this chapter). These interactions are made possible by the sharing and passing of objects.

To fully meet the requirements of the DEEP vision for distributed C2, a distributed blackboard system was required. Current commercial and open source blackboard system implementations are not distributed, so the paradigm needed to be extended from a monolithic to a distributed environment. The current DEEP blackboard, shown in Figure 4, was designed and implemented following this extended view using design patterns described in (Hughes & Hughes, 2003).

 

The Predictive and Preemptive Capability of JADE – ala the Minority Report

ADA490293.pdf

p. 3

Experience with recent operations also reveals that the C2 process must transition from a process of observation and reaction to one of prediction and preemption. [Emphasis mine] To achieve this, we will need to go beyond the focus of military operations, and instead address the entire spectrum of Political, Military, Economics, Social, Infrastructure, and Information (PMESII) (Alberts & Hayes, 2007).

To that end, the focus of the research reported here is on developing a C2 environment that supports the vision of Network Centric Operations (NCO) (Alberts & Hayes, 2007).

The tenets of NCO are:

• Information sharing

• Shared situational awareness

• Knowledge of commander’s intent

 

JADE can select its own course of action

ADA490293.pdf

p. 18

3.3.4.3 Execution Selection Critic Agents

Once there are several plans that have been instantiated, adapted, and scored by the various agents in the DEEP system, a final agent is responsible for selecting the top scoring plan(s) and sending them off for execution. This agent is known as the Execution Selection Critic Agent. Its specialization is taking all of the information on the blackboard and using it to evaluate and rank the plans. It then either decides which plan(s) are to be executed by either prompting the user for mixed-initiative input, or selecting one on its own. [Emphasis mine]…

After the agent realizes that the plans have converged, it then sorts the plans in order of best to worst. In order to sort the plans, it uses the scores associated with each plan to rate them. This functionality does not currently assign a weight to the scores; however, in the future it should …

 

So what is the Human Domain?

From the “Cognitive Joint Force Entry White Paper” – 26 September 2014

3-2. Central Idea. The United States Army Special Operations Command (USASOC) provides Cognitive Joint Force Entry capability to support Geographic Combatant Commanders (GCC) and Joint Force Commanders (JFC) using information and influence activities to prepare the environment for follow-on actions. Cognitive Joint Force Entry is a proactive, Human Domain-centered strategy that synchronizes and employs all components of the global information environment to predispose populations of a foreign country or countries to favorably view U.S. activities or operations. It reflects campaigning to win in the shaping phase of an operation, and it is a component to achieve persistent influence within the operating environment to create decisive influence. It achieves strategic depth, builds cognitive security, and it provides scalable options to achieve favorable outcomes.

3-3. Solution Concepts and Components.

a. Win in the Human Domain. Cognitive Joint Force Entry is part of Strategic Landpower designed to prevail in the Human Domain. In COMUSSOCOM’s Posture Statement to the House Armed Services committee on 11 Mar 2014, Admiral McRaven described the Human Domain. He stated: “Our SOF engagement takes place in the Human Domain — the totality of the physical, cultural, and social environments that influence human behavior in a population-centric conflict. [Emphasis mine] The Human Domain is about developing an understanding of, and nurturing influence among, critical populaces. SOF is uniquely suited for operations that win population-centric conflicts, oftentimes, and preferably, before they start.”3 Success within the Human Domain “depends on the application of unique capabilities that are designed to influence, fight, and win in population-centric conflicts.”4 To achieve the goal of nurturing influence and winning in population-centric conflicts, the ARSOF approach will be to “first understand the population within the context of the operational environment and then take meaningful action to effectively influence human behavior toward achieving the desired outcome.”5 Cognitive Joint Force Entry provides the mechanism for ARSOF to set the conditions for success in the Human Domain.

b. Establish a pro-active posture. ARSOF will employ Cognitive Joint Force Entry activities in the earliest stage to shape the future operating environment and achieve favorable outcomes before conflicts start. As the USSOCOM input to the 2014 Quadrennial Defense Review (QDR) recommended, “Preventing war through presence and an innovative, small-footprint, low-cost, and responsive approach to posture is far cheaper than waging war and mitigating the instability and radiating effects that come with waging war.”6 Cognitive Joint Force Entry addresses a key notion of that cost calculus by using information and influence activities to shape the environment beginning in pre-conflict stages. ARSOF achieves this by maintaining a persistent, continuous awareness of the global information environment, which provides the ability to anticipate challenges and identify opportunities for early and responsive

5

actions. The pro-active posture provided by Cognitive Joint Force Entry will preclude shortfalls in the past where “the US was slow to recognize the importance of information and the battle for the narrative in achieving objectives at all levels,”7 and the proactive posture addresses the critique that “the US response to the emergent battle for the narrative was characterized by an initial lack of leadership emphasis and resources that addressed information as an instrument of national power.”8 Cognitive Joint Force Entry provides a vital capability in a critical domain at strategic windows of opportunity where other instruments of national power may not or cannot function. Adopting a pro-active posture through Cognitive Joint Force Entry will gain the initiative in setting the conditions for success by achieving favorable outcomes before conflicts start.

c. Dominate Cognitive Depth. For the purposes of this paper, Cognitive Depth is a dimension of the operating environment encompassing a populations’ realm of perceptions, beliefs, opinions, and attitudes. It can have a global scope and includes the dimension of time. These components present a highly complex challenge for successfully generating persistent influence and preparing the environment for follow on actions.

1) The concept of Cognitive Depth can be viewed through a combination of terms drawn from psychology linked to doctrine. It is a dimension influenced by an extremely broad range of factors, “to include individual and cultural beliefs, norms, vulnerabilities, motivation, emotion, experiences, morals, education, mental health, identities, and ideologies.” 9 That broad scope is formed over time and incorporates multiple references in a complex framework of attitudes, beliefs, and behaviors, which are acquired.10 The source of attitudes are “culture, social role, laws, mass media, institutes, schools, parents, family, peers and others, various groups and direct experience.”11 Cognitive Depth, therefore, is formed, informed, and modulated by a whole-of-environment interaction. Understanding that complex arena to create effective strategies for the initial, shaping phase of a campaign requires significant skill, deep knowledge, and supporting capacity.

2) While Cognitive Depth may be formed by multiple factors, its potential scale can range from individuals and groups to populaces and nations. As Global Trends 2030 has described an interconnected world with instant information access, it is possible that the perceptions, dispositions, and attitudes of people, groups, and populations can be exposed to a near limitless realm of influence, including global, virtual sources of influence. Cognitive Depth can therefore be both local and global and can range from the tactical to the strategic level. The global context may possess multiple strata where attitudes, perceptions, beliefs, and opinions can potentially create a range of decisions and behaviors. It includes what JP 2-0 calls “human factors affecting a leader’s or key actor’s decision-making influences.12 Those decisions and

6

behaviors could include various degrees of influence impacting a campaign. Therefore, understanding and assessing the complex, global nature of Cognitive Depth will become essential. Joint Publication 5-0 indicates “As planners assess complex human behaviors…they draw on multiple sources across the operational environment, including both analytical and subjective measures that support a more informed assessment.”13 The new information environment will be inherently dynamic and requires maintaining a persistent awareness to know how and where influence and information activities can be applied. Achieving persistent awareness will be a necessary precondition to effectively apply influence and information activities. Having the capacity to maintain persistent awareness remains an essential ingredient to success in the earliest stage of a campaign.

3) As Cognitive Depth has a wide range and includes the realm of perceptions, beliefs, opinions, and attitudes, it also incorporates the dimension of time, past, present, and future. This characteristic requires a capacity to maintain persistent engagement in the information environment, understanding the past and looking into the future. The Joint Publication 3-13, Information Operations, states: “the cognitive dimension encompasses the minds of those who transmit, receive and respond to or act on information.”14 That description points to a space with processes working at the present time in the here and now. But because cognition is “a general term of the higher mental processes by which people acquire knowledge, solve problems, and plan for the future,”15 it also spans the past in terms of memory, functions in the present, and reaches into the future in terms of conceptualization. Maintaining persistent engagement will enable an understanding of the continuum of the information environment, which is necessary to implementing influence and information activities. The combination of persistent awareness and persistent engagement will yield deep cultural knowledge to craft and implement activities specifically tailored to the environment.

4) Another aspect of time as it relates to Cognitive Depth is the tempo at which change occurs, and – within the cognitive domain – change takes time. Because change takes time, implementing influence and information activities should occur as early as possible in order to achieve persistent influence. Due to the complexity in the way opinions and attitudes are formed and held, and because aspects of the cognitive domain directly relate to the notion of identity and the way individuals interact with the world, changes in the cognitive domain occur over time. Psychology texts refer to the complexity of attitudes and why they are fundamental aspects of individuals. “Attitudes help [people] to function in the social world”16 and result from “the multiple processes by which humans adapt to their environment.”17 It indicates that attitudes are integral to the way that people function in relation to others and how individuals relate to the world. These primal factors contribute to the lengthy process where change occurs. Because of the lengthy process and the long lead times to effect change, information and

7

influence activities should be planned strategically and applied pro-actively to develop decisive influence in the earliest stage of campaigning. It should be planned through a whole-of-government approach and should be implemented in early, whole-of-government manner to achieve sustainable, persistent influence.

 

Pre-solicitation for a Human Domain Workstation:

https://www.fbo.gov/index?s=opportunity&mode=form&tab=core&id=18728366ffadcfffa3d427e36f8effc7

Solicitation Number:

W909MY-05-R-T020

Notice Type :

Presolicitation

Synopsis :

Added: April 19, 2005

This is a Sole Source requirement for a one year, Time and Materials T&M, Indefinite Delivery Indefinite Quantity contract, with four, one year options to be issued to Northrop Grumman Information Technology Inc., 12005 Sunrise Valley Dr., Reston, VA 20191-3404. Authority for Other Than Full and Open Competition is 10 USC 2304 c 1 and FAR 6.302-1, Only One Responsible Source. All responsible sources may submit a written proposal which shall be considered by the agency for the procurement of engineering/technical support for the Counterintelligence/Human Intelligence (CI/HUMINT) Automation Management Software (CHAMS) and Human Domain Workstation (HDWS) Software Systems. The CHAMS and HDWS are the two software baselines within the CI/HUMINT Management System (CHIMS). CHIMS is a family of intelligence automation systems that facilitate the collection, reporting, analysis and management of human intelligence. The engineering/technical support will include system engineering, design, software development, hardware integration, testing, training development, program support, system security accreditation activities, and configuration management. The proposed effort will provide for the continued development of CHAMS, including enhancements to the current system, and initiatives to support future Army requirements in support of CI-HUMINT automation, and enhancements to the HDWS to meet requirements established jointly by Program Manager (PM), CHIMS and Program Manager, Distributed Common Ground Station-Ar my (PM DCGS-A). Please be advised that the response date included in this notice is a forecast date, see the solicitation document on the IBOP website for the actual response date. Previous procurement history will be in the solicitation. Drawings are not available. The U.S. Army Communications-Electronics Life Cycle Management Command (C-E LCMC) Acquisition Center has established a World Wide Business Opportunity Page at https://abop.monmouth.army.mil, to provide electronic transmittal of Request for Proposals (RFPs), Invitation for Bids (IFBs) and Request for Quotes (RFQs) for Government to Industry. All parties interested in doing business with C-E LCMC are invited to access, operate, and send and receive information for the C-E LCMC Acquisition Center World Wide Business Opportunities Page. Upon accessing the webpage, click on CECOM Business Opportunities Page. Registration for a user ID and password will only be necessary when you are considering the submission of proposals to the Business Opportunities Page. The solicitation W909MY-05-R-T020 will be uploaded to the internet site set forth above in or about 15 days. See note 22.***** Please contact the IBOP help desk, toll free at 1-888-414-BOSS (2677) for technical assistance with the IBOP. Please contact or e-mail [email protected] to request information. The contracting officer for this proposal action is Rosetta Wisdo m-Russell 703-325-1717. SEE NOTE 22.

Contracting Office Address :

US Army Communications-Electronics Command, CECOM Acquisition Center Washington, ATTN: AMSEL-AC-W, 2461 Eisenhower Avenue, Alexandria, VA 22331-0700

Place of Performance :

US Army Communications-Electronics Life Cycle Mangement Command, Acquisition Center Washington ATTN: AMSEL-AC-W, 2461 Eisenhower Avenue Alexandria VA
22331-0700

Point of Contact(s) :

Angle Trimmier, 7033335802

US Army Communications-Electronics Command, CECOM Acquisition Center Washington

 

Northrop has a Human Domain Workstation:

U.S. Army-Northrop Grumman Team Opens Soldiers’ Access to Intelligence Data Through Distributed Common Ground System-Army (DCGS-A)

BALTIMORE, March 2, 2007 (GLOBE NEWSWIRE) — A team led by Northrop Grumman Corporation (NYSE:NOC) has developed and demonstrated technology for users of the U.S. Army’s battlefield networks that allows access to actionable intelligence from virtually anywhere in the field.

Northrop Grumman and teammates General Dynamics, Lockheed Martin, and Science Applications International Corp. were chartered by the U.S. Army to integrate multiple, existing intelligence, surveillance and reconnaissance (ISR) systems into a single multi-intelligence system called the Distributed Common Ground System – Army (DCGS-A). This team is officially named the DCGS-A Industry Team, with Northrop Grumman acting as the system integrator.

The team successfully conducted several DCGS-A, Version 4, Proof of Concept (PoC) demonstrations at Ft. Belvoir, Va.; Ft. Huachuca, Ariz.; and Northrop Grumman laboratory facilities in Baltimore from August through December 2006. These efforts resulted in a new model for moving battlefield data and intelligence in support of tactically deployed combat commanders. The system uses queried/access methodology, and is designed to operate within a distributed-operations, enterprise environment.

Participating systems included the Army’s Joint STARS Common Ground System, the Joint STARS Work Station, the Human Domain Work Station, the Digital Terrain Support System, the Integrated Meteorological System, the V3 Joint Intelligence Operations Capability – Iraq (JIOC-I) work suites and selected components of the Navy’s DCGS Multi-Intelligence Segment integrated with the DCGS Integration Backbone (DIB).

Data interchange within the PoC was achieved using a combination of a commercially available Enterprise Service Bus and the U.S. Department of Defense DIB. The demonstration adhered to DoD’s guidance to remain consistent with DIB standards, be interoperable with existing components and be facilitated by the use of DIB architecture.

The Northrop Grumman-led DCGS-A Industry Team has continued to expand the Army’s net-cetric enterprise capability with DCGS-A, Version 4. Previous DCGS versions included the Army’s Version 2, Joint Intelligence Operations Capability-Iraq (JIOC-I) and the DCGS-A Version 3, battle command interoperability.

“Our team is committed to designing and delivering the best capabilities for producing actionable intelligence rapidly available to the warfighter,” said Ken Wilson, vice president of C4ISRT Networked Systems for Northrop Grumman’s Electronic Systems sector. “Our approach makes the best of the Army’s investment in ISR technologies. By working with our government and industry partners, we will continue to integrate ‘best of breed’ applications and services from multiple sources in an open service-oriented architecture environment.”

Northrop Grumman Corporation is a $30 billion global defense and technology company whose 120,000 employees provide innovative systems, products, and solutions in information and services, electronics, aerospace and shipbuilding to government and commercial customers worldwide.

CONTACT:  Paul Cabellon

          Northrop Grumman Electronic Systems

          (410) 765-7192

          [email protected]

 

PMESII – An Acronym for the Spectrum of Data Gathered

ADA490293.pdf

p. 38

PMESII Political, Military, Economics, Social, Infrastructure, and Information

 

More on what PMESII is:

In Document “CTC-A-COIN-Guidebook.pdf

p. 11

As with ASCOPE3xD, equal consideration must be given to the insurgent, counterinsurgent, and the population when using ASCOPE/PMESII

However, through the use of PMESII Counterinsurgents can begin to further analyze the information and

civil considerations provided by ASCOPE3xD.

In this regard, PMESII is defined as a set of interrelated operational variables that provides counterinsurgents with a method to analyze the OE through specific filters.

Thus, counterinsurgents consider the following factors and their relevance to the OE as they relate to the civil considerations of ASCOPE:

  • Political: Key elements of the formal, informal, and shadow governance and how they are relevant to the population and overall stability in the area.
  • Military: Key elements influencing the security situation and overall stability in the area.
  • Economic: Key elements of overall economic stability and activity in the area.
  • Social: Key elements that influence traditional social dynamics in the area.
  • Infrastructure: Key facilities, essential services, and installations that affect the overall stability of an area and their relevance to the population
  • Information: Key elements that facilitate the transfer of information amongst the local population and their relevance to the population.
  • Physical Environment: Key terrain affects people, equipment, trafficability, visibility, and the employment of many weapons.
  • Time: The population, counterinsurgent, and insurgent often view time differently.

 

Also See Internet provider Comcast’s involvement:

https://home.comcast.net/~dshartley3/DIMEPMESIIGroup/DPGroup.htm

Related topics at bottom of page:

JADE [at the] Helm is a computerized rapid planning and rapid response tool with a level of Artificial Intelligence and predictive analysis of both individuals, groups, and entire regions. This Summer is the first very large scale test of it’s capabilities.

Whether or not it will be used to issue plans and directives in a drill gone live scenario remains to be seen. Either way, this is pretty scary stuff.



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.