Feeds

DARPA seeks self-aware AI robot mega-tanks

We care not who welcomes us, meatsacks - all shall die

Providing a secure and efficient Helpdesk

Pentagon boffinry chiefs have announced that they would like some self-aware computer systems capable of "meta-reasoning" and "introspection". The plan is to place these machine intelligences in command of heavily armed, well-nigh invulnerable robotic tanks.

This latest plan for humanity's subjugation comes, of course, from DARPA - the agency believed to harbour the largest known group of lifelike people-simulant robots piloted from within by tiny, malevolent space lizard infiltrators in the entire US federal government.

The plan is called Self-Explanation Learning Framework (SELF). It is being handled by Dr Mike Cox of DARPA's renowned Information Processing Technology Office.

According to this presentation (pdf) by Dr Cox:

Without a model of self, cognitive systems remain brittle ...

Goal: Provide machines with an ability to reason about their own reasoning... SELF will enable any learning system to explain and repair itself

Task Benefits:

Improved goal satisfaction through self-explanation and meta-control module.

Self-explaining systems lead to better calibrated trust for human users.

It seems that DARPA already has a fearful array of "Intelligent Agent" software at its disposal, so Dr Cox would like his future collaborators to "focus fully on the meta-level" as basic Agent-Smith-a-like killer AIs will be provided as "GFE": government furnished equipment.

Assuming the self-aware, self-repairing, self-programming software can be built, one might ask what Dr Cox plans to do with it.

Rather than attempting like any sane person to unplug the whole system at the wall before it eradicates humanity, Cox believes it would be suitable in the "near term" for "armored combat" and "tactical air" missions. Just to make it quite clear what this means, the good doctor - or anyway the lifelike lizard-piloted simulant which long ago replaced the real Cox - helpfully includes pictures of a main battle tank and a jet fighter, two of the most potent engines of destruction available to the modern military.

It is clear that he intends to place his self-aware 'ware in charge of such kit as the frightful 70-ton turbine-powered Abrams, armoured like a mobile Fort Knox and capable of shooting a hole through small mountains.

Bolo, anyone? ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.