ENGINEERING A TRAITOR

Similar documents
The Future is Now: Are you ready? Brian David

Future of New Capabilities

DoD Research and Engineering Enterprise

DoD Research and Engineering Enterprise

The inside enemy: Weaponisation of your logistical footprint

War of 2050: a Battle for Information, Communications, and Computer Security

DoD Research and Engineering

The Next Generation of Secure Position, Navigation and Timing Technology

NATO Science and Technology Organisation conference Bordeaux: 31 May 2018

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)

Rise of Robotics. According to the National Information Systems Security Glossary, information security is

Prototyping: Accelerating the Adoption of Transformative Capabilities

Navigating The Fourth Industrial Revolution: Is All Change Good?

Future of Financing. For more information visit ifrc.org/s2030

Do Now. Don't forget to turn your homework into the basket! Describe what you know about how the Japanese were defeated in World War II.

Science and Technology for Naval Warfare,

INTEL INNOVATION GENERATION

technologies, Gigaom provides deep insight on the disruptive companies, people and technologies shaping the future for all of us.

OFFensive Swarm-Enabled Tactics (OFFSET)

Chapter 2 Threat FM 20-3

When it comes to generic 25mm Science Fiction skirmish games, there are really only two choices.

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 5 R-1 Line #102

Why Record War Casualties?

Future Technology Drivers and Creating Innovative Technology Cooperation

Accelerating innovations in science and technology (S&T) are having profound effects on global civilization These developments will have strategic

The Swedish Armed Forces Sensor Study

General Claudio GRAZIANO

CONVERGENCE BETWEEN SIGNALS INTELLIGENCE AND ELECTRONIC WARFARE SUPPORT MEASURES

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE S: Microelectronics Technology Development and Support (DMEA) FY 2013 OCO

Engineered Resilient Systems NDIA Systems Engineering Conference October 29, 2014

The use of armed drones must comply with laws

The Role of the Communities of Interest (COIs) March 25, Dr. John Stubstad Director, Space & Sensor Systems, OASD (Research & Engineering)

Impact of Technology on Future Defense. F. L. Fernandez

Defence R&D Canada. Valcartier Research Centre. Presented by Richard Lestage. Photonics Workshop of January 17, 2019 National Research Council, Ottawa

Mission Engineering and Prototype Warfare: Operationalizing Technology Faster to Stay Ahead of the Threat

Preserving Technological Superiority

USEUCOM Science & Technology, E

Preface to "What Principles Should Guide America's Conduct of War?" on Opposing Viewpoints,

Academic Year

Digital Transformation Delivering Business Outcomes

Chemical-Biological Defense S&T For Homeland Security

Specialized Committee. Committee on the Peaceful Uses of Outer Space

MEDIA KIT

Data-Starved Artificial Intelligence

Tac2i s Quick Start Guide for New Players

Suggested Prompts for Problem Statements to Support Idea Development

NATIONAL DEFENSE AND SECURITY ECONOMICS

Engineering Autonomy

SUBJECT: Army Directive (Acquisition Reform Initiative #3: Improving the Integration and Synchronization of Science and Technology)

Executive Summary FUTURE SYSTEMS. Thriving in a world of constant change

Cloud Computing & Virtual Worlds: the next revolution for the gaming industry

Leveraging Digital RF Memory Electronic Jammers for Modern Deceptive Electronic Attack Systems

Non-lethal Electromagnetic Stand-off Weapon

The C2/C4ISR Systems Market

Breaking News English.com Ready-to-Use English Lessons by Sean Banville

SACT s. State of the NIF. Brussels, 09 Nov 2016, Hr

ASSAULT RIFLE SIMULATOR

Office of Naval Research Naval Science and Technology Exposition

GEC LABS SCHEDULE DAY 0 11 DEC 2017

DEPARTMENT OF THE NAVY the Future of Naval Innovation

ROBOTICS IN FUTURE WARFARE

MOD(ATLA) s Technology Strategy

Highlighting Artificial Intelligence: An Interview with Paul Scharre

2017/18 KEYNOTE OVERVIEW DIGITAL EVANGELIST PATTERN HUNTER TREND SPOTTER MEDIA COMMENTATOR STORY TELLER

FUTURE WAR WAR OF THE ROBOTS?

Spin-on and Spin-off Challenges of Commercial Technologies

Countering Weapons of Mass Destruction (CWMD) Capability Assessment Event (CAE)

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

ADDENDUM 1. Changes Related to the Bachelor of Science in Intelligence Degree:

F-35 HELMET AND MILITARY TECHNOLOGIES PAPER WORK - INTERNET OF THINGS. GACHET Lénaïck QUEULAIN Jérémy. Academic year:

Quo vadis EU? Giorgio Mosca Director Strategy & Technologies. Bruxelles, 6 th December Company General Use

The challenges raised by increasingly autonomous weapons

Weapon A Visual History Of Arms And Armour

Proclamation Honoring John L. Gray, City Manager City of Lexington, NC

Princeton University Jan. 23, 2015 Dr. Maryann Cusimano Love

Department of Defense Instruction (DoDI) requires the intelligence community. Threat Support Improvement. for DoD Acquisition Programs

Legends of War: Patton Manual

Strategic Partner of the Report

Computer Technology and National

Advanced Technologies Group programs aim to improve security

Our Corporate Strategy Digital

RAPID FIELDING A Path for Emerging Concept and Capability Prototyping

DIGITAL TECHNOLOGY AT THE HEART OF THE LIFE CYCLE OF NAVAL SYSTEMS

Remember the Alamo!* By George Knapp Version 6, 31 Jan 2000

The ICT Story. Page 3 of 12

Is your career really at risk?

PACOM S&T Conference

The Ethics of Cyber-conflicts in Hyperhistorical Societies. Luciano Floridi Professor of Philosophy and Ethics of Information

Media Review: The Matrix

COI Annual Update: Guidance April 2017

HOMELAND SECURITY & EMERGENCY MANAGEMENT (HSEM)

Developing S&T Strategy. Lesson 1

DATA AT THE CENTER. Esri and Autodesk What s Next? February 2018

Effects of Adversarial Interaction on the Adoption and Adaptation of Disruptive Communications Technologies

Will robots really steal our jobs?

Industry 4.0 The Future of Innovation

#Renew2030. Boulevard A Reyers 80 B1030 Brussels Belgium

LEADING DIGITAL TRANSFORMATION AND INNOVATION. Program by Hasso Plattner Institute and the Stanford Center for Professional Development

After the Fact Inventing the Future TRANSCRIPT. Originally aired May 24, Total runtime: 00:13:15

Huge Power Containers to Drive the Future Railgun at Sea

Transcription:

ENGINEERING A TRAITOR Written by Brian David Johnson Creative Direction: Sandy Winkelman Illustration: Steve Buccellato Brought to you by the Army Cyber Institute at West Point

BUILDING A BETTER, STRONGER AND MORE SECURE FUTURE FOR OUR ARMED FORCES Science Fiction Prototypes are sci ence fiction stories based on future trends, technologies, economics and cultural change. The story you are about to read is based on threatcasting research from the Army Cyber Institute at West Point and Arizona State University. Our story does not shy away from a dystopian vision of tomorrow. Exploring these dark re gions inspires us to build a better, stronger and more secure future for our Armed Forces. Insider threats in industry can cost millions a year in lost revenue. Insider threats in the military may cost lives. Service members are trained to detect warning signs and potential indicators. Yet as technology evolves, the manner in which troops within our force might be recruited and radicalized might also look different. We can not just focus on countering what an adversary can bring to bear on the battlefield but also their influencing operations that might take place years before the first shot is fired in un-expected means. The attack plain is widening. In the future, physical and cyber attacks might be combined to generate even more devastating effects. Lt. Col. Natalie Vanatta U.S. Army, Cyber The views in this graphic novel are those of the author and do not reflect the official policy or position of the Department of the Army, DOD, or the U.S. Government. 2018 Department of the Army

ENGINEERING A TRAITOR CPT Jake Roberts had always wanted to serve his country. In college, he was the only student in his engineering program to be commissioned as a U.S. Army Second Lieutenant in the Corps of Engineers. But the last year has not been kind to Jake. Bit by bit, he s become disenfranchised from his field office. Not included secretly bullied left behind Jake loses trust with his CO. Turns out - over the last year behind the scenes, he s been nudged and directed by the invisible hand of AI. Targeted for surveillance and coercion, he s pushed to his breaking point until he must take action It was just a small device hooked into the smart building maintenance system How could it lead to the undetected missile attack on Houston? Thousands of civilians killed a Congressional investigation Jake is convicted as a traitor to the country he swore to protect.

AFTERWARD Due to process efficiencies and technology advances, individual actors in the workforce have become more empowered and can cause significant damage to their employer and business environment, often times with little effort. Couple this with cultural changes, and the insider threat has become one of the biggest challenges leaders in the 21st century will face in striving for mission success. Dr. Brad Millick Director for Insider Threat Office of the Under Secretary of Defense for Intelligence

AFTERWARD In this story, artificial intelligence created the conditions to turn Jake into the weapon that the enemy needed. How might you detect such a threat? How are you supposed to protect yourself and your Soldiers in a future where artificial intelligence might shape reality? Think about it. Do you trust everything that is delivered to your electronic devices? Do you let 1s and 0s influence your perception of reality more than your five senses? Also think about your support structure. When life seems to not be going your way, where do you turn? How do we empower our Soldiers to successfully complete missions while also increasing their resiliency? In a future where technology is more prevalent, more and more of the population may become potential insider threats, able to disrupt operations and injure our security - how do we combat this growing problem? What can you do? We must learn how to deal not only with the threat from malicious insiders but also under-trained personnel, accident prone individuals, negligent workers, overwhelmed personnel, mismanaged contractors, and the list goes on. Awareness is the first step. Use this graphic novel to start the conversation.

First Edition: 2018