Page 141 - Elana Freeland - Under an Ionized Sky
P. 141
25 Cade Metz, “Building AI Is Hard—So Facebook Is Building AI That Builds AI.” Wired, May 6, 2016. Other social media
—Twitter, LinkedIn, Uber, etc.—will soon be using Facebook’s Flow tool “to help engineers build, test, and execute machine
learning algorithms on a massive scale . . .”
26 Peter Dockrill, “Scientists have developed an algorithm that learns as fast as humans.” Science Alert, 11 December 2015.
27 Brianna Blaschke, “Elon Musk Funds $1B Proposal To Stop Human Destruction From ‘Demon’ of Artificial
Intelligence.” Activist Post, May 20, 2016.
28 “Elon Musk on mission to link human brains with computers in four years: report.” Reuters, April 21, 2017.
29 Claire Burnish, “Stephen Hawking Warns Humanity: Leave Earth Before the Ruling Class Destroys It.” Antimedia.org,
January 22, 2016.
30 Bianca Spinosa, “As AI advances, military leaders mull the ‘Terminator conundrum’.” Defense Systems, January 25, 2016.
31 “Artificial Intelligence Now Decides Targets on Aegis Ships.” Sputnik News, March 5, 2016.
32 John Markoff, “Pentagon Turns to Silicon Valley for Edge in Artificial Intelligence.” New York Times, May 11, 2016.
33 The CNAS think tank began in 2007 in Washington, D.C., the year after the infamous Project for the New American
Century (PNAC) ceased operation and morphed into the Foreign Policy Initiative.
34 John Markoff, “Report Cites Dangers of Autonomous Weapons.” New York Times, February 28, 2016.
35 Markoff.
36 Tom Burghardt, “Network-Centric Warfare.” Global Research, June 11, 2009.
37 Col. Alan D. Campen, “Look Closely At Network-Centric Warfare.” SIGNAL, Armed Forces Communications and
Electronics Association (AFCEA), January 2004.
38 Douglas Waller, “Onward Cyber Soldiers.” Time magazine, August 21, 1995.
39 Ibid.
40 Robert G. Willscroft, Ph.D., “Combat Zones that ‘See’ Everything.” Defense Watch, July 14, 2003.
41 Tom Burghardt, “Network-centric warfare.” Global Research, June 11, 2009.
42 Beth Bacheldor, “Queralt Developing Behavior-Monitoring RFID Software.” RFID Journal, April 23, 2009.
43 Other NCW “war games” may not have been made public. For example, in October 2015 on Wake Island “a tandem
defense capability in the Pacific unmatched in the world today by successfully combining U.S. Aegis BMD and THAAD multi-
layered defense in a live-fire exercise against both cruise and ballistic missiles” (“Guam — A Fiesta,” Missile Defense Advocacy
Alliance, November 30, 2015).
44 “Joint Publication 3-35: Deployment and Redeployment Operations,” Joint Chiefs of Staff, 31 January 2013. The primary
AI “military planner” in 2001 was the force management module for ForMAT and PARKA; now, JADE 2 is served by the
Prodigy module.
45 I am indebted to system and network engineer DJ Walsh’s Level9News YouTubes. Please watch them all, beginning with
“www.youtube.com/watch?v=FiKBPmq37Yo, and her July 26, 2016 interview on John B. Wells’ show Caravan to Midnight,
“Pentagon’s HSCOI Program Using Social Media as Targeting Telemetry.”
46 DJ Walsh, “The History of JADE II: Planetary Conquest By a Global A.I. Warfare System.” Level9News YouTube, May
19, 2015.
47 Tom Vanden Brook, “$725M program Army ‘killed’ found alive, growing.” USA Today, March 10, 2016.