AI Dominance On The Battlefield

In the near future, soldiers on the battlefield may depend more on Artificial Intelligence (AI) than their own comrades and in many cases those soldiers won’t need to be on or near near the battlefield. They might instead remotely operate sophisticated, intelligent and sensor-clad weapons possessing innate problem-solving abilities. AI is already part of our lives and as the technology matures, it will play a key role in future wars.

Battle lines have become opaque and an attack can come from terrorists who easily blend in as civilians, drones that are undetectable to the eye, and it is now being suggested that we can reduce human costs through the deployment of  AI and other computational agents.

AI by itself is not a game changer, but when it's paired with humans, it can be a great tool, particularly in the future of warfare, US Defense Department experts said. The most important element in the battlefield of the future won't be rockets, bullets or robots, but data and the ability to collect it from any point and send it where it is needed in the conflict zone.

As AI power develops, the push towards systems becoming autonomous will only increase, although at present the US militariy prefer to have a human involved in the decision-making loop. 

The majority of drones currently deployed around the world would lose their core functions if the data link connecting them to their human operator were severed.

Multi-Domain Warfare

Multi-domain warfare is designed to provide the ability to attack enemy targets at a rate that the enemy cannot withstand. 
The multi-domain warfare concept shifts the combat management paradigm from one-dimensional hierarchies and patterns, in which a platform with a specific sensor is used for a specific mission, to a distributed management approach, where each platform using advanced management tools can serve several missions and users. This makes resource allocation more efficient.

Consequently, there is a need to provide supporting intelligence at a sufficient rate, resolution and precision, while properly managing the intelligence gathering resources by using a “many-to-many” approach, in which multi-sensor platforms serve multiple users.

AI, could possibly be deployed on the battlefield in multidomain operations. 'Mosaic warfare,'' a concept being developed by the Defense Advanced Research Projects Agency, would link warfighter platforms, missile batteries, tanks, planes, ships and drones, through a communications network powered by AI. Layering a network with AI would enable the warfighter to better decide which asset is most effective in carrying out a specific mission. For example, if both Air Force and Navy aircraft are in an area to be targeted, AI could suggest which would be the better choice.

In a mosaic warfare ground scenario, AI might suggest sending an unmanned aerial vehicle or ground robot ahead of the main, ground battle force. That unmanned system might spot an enemy tank and pass the coordinates back, which are then relayed to a non-line-of-sight strike system in the rear that, in turn, launches its munitions and takes out the target. 

A new generation of autonomous vehicles is a high priority for military applications of AI, with much of the focus on navigation for a variety of unmanned land, sea, and air systems. Space and undersea platforms will also benefit from AI-informed guidance systems. 

AI is at the heart of the so-called drone swarms that have been the subject of much attention in recent years. AI-informed navigation software supported by ubiquitous sensors not only enables unmanned vehicles to find their way through hostile terrain, but also may eventually make it possible for complex formations of various types of drones operating in multiple domains, with complementary armaments to conduct sophisticated battle tactics. 

AI has steadily been increasing the power of simulations and gaming tools used to study nuclear and conventional weapons. 
Advances in AI-enhanced targeting and navigation also improve prospects for a wide range of tactical and strategic defense systems, especially ballistic missile defences, by empowering target acquisition, tracking, and discrimination. 

The interface between humans and machines, where the human in the loop is supposed to exert overall  control, raises critical questions about decision-making authority and organisational hierarchies. 

The rapid expansion of AI’s military applications throughout the world merits a high level of focused attention to minimise its negative impacts on strategic stability and to prevent nasty surprises. 

US Dept. of Defense:     US Army:    JSTOR / Defense University     Al Jazeera:      I-HLS   

London School of Economics:     Image: Unsplash

You Might Also Read:

The Emerging Domain Of  Cyber War:

 

« Worldwide Internet Outage Caused By Single Configuration Error
Developing A Sustainable Cyber Security Workforce »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

GuardianKey

GuardianKey

GuardianKey is a solution to protect systems against authentication attacks.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

RESTIV Technology

RESTIV Technology

RESTIV Compliance Copilot is your partner in continuous compliance. Real-time monitoring, continuous testing, and transparent evidence—no surprises, just peace of mind.