{"id":24656,"date":"2016-02-17T14:30:45","date_gmt":"2016-02-17T03:30:45","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=24656"},"modified":"2016-02-17T09:33:46","modified_gmt":"2016-02-16T22:33:46","slug":"children-of-the-revolution-technology-and-the-future","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/","title":{"rendered":"Children of the revolution: technology and the future"},"content":{"rendered":"

\"5031552602_b5cfb2b466_z\"<\/a><\/p>\n

At the turn of the millennium, the smart phone didn\u2019t exist, Google wasn\u2019t yet the dominant choice for navigating the internet and the majority of investment in cutting edge computing capability was driven by governments.<\/span><\/p>\n

Since 2000, the speed at which technology is developed and deployed has accelerated rapidly. In the same period, technology crossed a threshold to become a major element in the lives of an increasing number of consumers across the globe.<\/span><\/p>\n

In<\/span> launching the iPhone in 2007<\/span><\/a>, Steve Jobs was embarking on a project that altered the way that many of us interact with each other and the world.<\/span><\/p>\n

Unfortunately, acceleration in the development and use of technology has been matched by changes in the capability of those that would do us harm. State and non-state actors alike are actively leveraging technology to communicate, undertake information operations and conduct cyber attacks. For instance the use of twitter and<\/span> twitter bots by ISIS<\/span><\/a> to organise and market its message broadly.<\/span><\/p>\n

In light of technology\u2019s ever-increasing pace of change, it\u2019s an important time for technologists, strategists, policy professionals and economists to collaboratively look to the future for the next technical trends and their security implications. Last December, the Australian Strategic Policy Institute and the SAP Institute for Digital Government hosted a<\/span> roundtable<\/span><\/a> to consider what the next 15 years of technology development might bring. Four key themes emerged during the roundtable: the growing use of drones; the changing nature of critical infrastructure; quantum computing and the rise of Artificial Intelligence (AI); and the changing nature of the internet.<\/span><\/p>\n

Current experimentation in the use of drones has moved from single drone activity to models that support<\/span> Eusocial behaviours<\/span><\/a>. Eusocial behaviours are best represented by ants, bees and other forms of insect life which are capable of supporting complex social behaviour and acting in a highly coordinated manner despite the limited intelligence of individual units within the colony. Those patterns of behaviour have been modelled for the purposes of allowing drones to perform complex tasks in a coordinated fashion.<\/span><\/p>\n

Perhaps in the next 15 years we will see a shift to true independence of action by drones, leveraging elements of AI allowing missions to be finished when circumstances change.<\/span><\/p>\n

The growing capabilities of drones will provide significant benefits for emergency response and combat scenarios, as well as a reduction in risk to responders. However, we may also see the<\/span> hijacking of drones<\/span><\/a> to undertake terrorist actions.<\/span><\/p>\n

Critical national infrastructure is undergoing a change in definition and distribution. In the future some forms of critical infrastructure will be physically distributed but digitally concentrated.<\/span><\/p>\n

This physical distribution will, like the original<\/span> ARPANET<\/span><\/a>, reduce the value of physical attacks on a single point of failure; however, this assumption is highly contestable. Commercial update servers and peer-to-peer relationships between devices will allow for rapid dissemination of viruses and malware which may cripple such infrastructure.<\/span><\/p>\n

Commercial providers of devices and systems will need to<\/span> significantly improve cyber security<\/span><\/a> in light of the likely growth in our dependence on digitally distributed systems.<\/span><\/p>\n

Our understanding of how we\u2019ll leverage AI and how it will impact on our society are limited. The development of AI will have impacts on national security. And there\u2019s a real possibility that AI will<\/span> disrupt employment and social cohesion<\/span><\/a>.<\/span><\/p>\n

The largest IT companies on the planet\u2014including<\/span> Facebook, Google, IBM and Microsoft<\/span><\/a>\u2014are in the front seat to develop AI. The benchmark for AI is technology that\u2019s emulative of the human condition, rather than one that will deliver improvement in the human condition. As such, there\u2019s a real possibility that someone will produce a machine intelligent enough to<\/span> achieve a single goal<\/span><\/a>, without any ability to understand the broader impact of its actions.<\/span><\/p>\n

Contemporary approaches to software development can\u2019t meet the needs of the exponentially growing computing power used to support quantum and AI-based systems. To support new capabilities we may see a move to intelligent systems that are decoupled from underlying infrastructure.<\/span><\/p>\n

In the future, programs may become independent consumers of resources, intelligently negotiating with other programs for resources across all domains, including but not limited to mobile devices, traditional server farms and mainframes. Those programs would follow biological models of behaviour: being born, reproducing as required, and dying when they\u2019re no longer required.<\/span><\/p>\n

But that kind of model isn\u2019t without risks. A program could potentially become a pandemic in the digital world, propagating like a bacteria and consuming all available resources. Robust protocols around system behaviour and investment in policing programs to ensure fair use will be required to manage the risks arising from those programs.<\/span><\/p>\n

Divining future developments in technology\u2014and their national security implications\u2014is no easy task. The last 15 years of technological advancement is a mere sample of the potentially staggering change that will confront national security agencies as we approach 2030. \u00a0How well governments respond to this change will be dependent on agility in policy development, technology adoption and programme implementation. \u00a0The question remains, how do governments innovate to protect their citizens in a constantly changing national security landscape?<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

At the turn of the millennium, the smart phone didn\u2019t exist, Google wasn\u2019t yet the dominant choice for navigating the internet and the majority of investment in cutting edge computing capability was driven by governments. …<\/p>\n","protected":false},"author":310,"featured_media":24660,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[1291,391,584,670,332],"class_list":["post-24656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-artificial-intelligence","tag-cyber","tag-development","tag-robots","tag-technology"],"acf":[],"yoast_head":"\nChildren of the revolution: technology and the future | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Children of the revolution: technology and the future | The Strategist\" \/>\n<meta property=\"og:description\" content=\"At the turn of the millennium, the smart phone didn\u2019t exist, Google wasn\u2019t yet the dominant choice for navigating the internet and the majority of investment in cutting edge computing capability was driven by governments. ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-17T03:30:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-16T22:33:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/02\/5031552602_b5cfb2b466_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Coyne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Coyne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/02\/5031552602_b5cfb2b466_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/02\/5031552602_b5cfb2b466_z.jpg\",\"width\":640,\"height\":427},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/\",\"name\":\"Children of the revolution: technology and the future | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#primaryimage\"},\"datePublished\":\"2016-02-17T03:30:45+00:00\",\"dateModified\":\"2016-02-16T22:33:46+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a67980596297e3db4ad0b3fde70aa778\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Children of the revolution: technology and the future\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a67980596297e3db4ad0b3fde70aa778\",\"name\":\"John Coyne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e84af569f04d25615d1447d4fe1908a9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e84af569f04d25615d1447d4fe1908a9?s=96&d=mm&r=g\",\"caption\":\"John Coyne\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/john-coyne\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Children of the revolution: technology and the future | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/","og_locale":"en_US","og_type":"article","og_title":"Children of the revolution: technology and the future | The Strategist","og_description":"At the turn of the millennium, the smart phone didn\u2019t exist, Google wasn\u2019t yet the dominant choice for navigating the internet and the majority of investment in cutting edge computing capability was driven by governments. ...","og_url":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2016-02-17T03:30:45+00:00","article_modified_time":"2016-02-16T22:33:46+00:00","og_image":[{"width":640,"height":427,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/02\/5031552602_b5cfb2b466_z.jpg","type":"image\/jpeg"}],"author":"John Coyne","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"John Coyne","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/02\/5031552602_b5cfb2b466_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2016\/02\/5031552602_b5cfb2b466_z.jpg","width":640,"height":427},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/","url":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/","name":"Children of the revolution: technology and the future | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#primaryimage"},"datePublished":"2016-02-17T03:30:45+00:00","dateModified":"2016-02-16T22:33:46+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a67980596297e3db4ad0b3fde70aa778"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/children-of-the-revolution-technology-and-the-future\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Children of the revolution: technology and the future"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/a67980596297e3db4ad0b3fde70aa778","name":"John Coyne","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e84af569f04d25615d1447d4fe1908a9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e84af569f04d25615d1447d4fe1908a9?s=96&d=mm&r=g","caption":"John Coyne"},"url":"https:\/\/www.aspistrategist.ru\/author\/john-coyne\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/24656"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/310"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=24656"}],"version-history":[{"count":4,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/24656\/revisions"}],"predecessor-version":[{"id":24661,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/24656\/revisions\/24661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/24660"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=24656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=24656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=24656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}