AI Dominance On The Battlefield

In the near future, soldiers on the battlefield may depend more on Artificial Intelligence (AI) than their own comrades and in many cases those soldiers won’t need to be on or near near the battlefield. They might instead remotely operate sophisticated, intelligent and sensor-clad weapons possessing innate problem-solving abilities. AI is already part of our lives and as the technology matures, it will play a key role in future wars.

Battle lines have become opaque and an attack can come from terrorists who easily blend in as civilians, drones that are undetectable to the eye, and it is now being suggested that we can reduce human costs through the deployment of  AI and other computational agents.

AI by itself is not a game changer, but when it's paired with humans, it can be a great tool, particularly in the future of warfare, US Defense Department experts said. The most important element in the battlefield of the future won't be rockets, bullets or robots, but data and the ability to collect it from any point and send it where it is needed in the conflict zone.

As AI power develops, the push towards systems becoming autonomous will only increase, although at present the US militariy prefer to have a human involved in the decision-making loop. 

The majority of drones currently deployed around the world would lose their core functions if the data link connecting them to their human operator were severed.

Multi-Domain Warfare

Multi-domain warfare is designed to provide the ability to attack enemy targets at a rate that the enemy cannot withstand. 
The multi-domain warfare concept shifts the combat management paradigm from one-dimensional hierarchies and patterns, in which a platform with a specific sensor is used for a specific mission, to a distributed management approach, where each platform using advanced management tools can serve several missions and users. This makes resource allocation more efficient.

Consequently, there is a need to provide supporting intelligence at a sufficient rate, resolution and precision, while properly managing the intelligence gathering resources by using a “many-to-many” approach, in which multi-sensor platforms serve multiple users.

AI, could possibly be deployed on the battlefield in multidomain operations. 'Mosaic warfare,'' a concept being developed by the Defense Advanced Research Projects Agency, would link warfighter platforms, missile batteries, tanks, planes, ships and drones, through a communications network powered by AI. Layering a network with AI would enable the warfighter to better decide which asset is most effective in carrying out a specific mission. For example, if both Air Force and Navy aircraft are in an area to be targeted, AI could suggest which would be the better choice.

In a mosaic warfare ground scenario, AI might suggest sending an unmanned aerial vehicle or ground robot ahead of the main, ground battle force. That unmanned system might spot an enemy tank and pass the coordinates back, which are then relayed to a non-line-of-sight strike system in the rear that, in turn, launches its munitions and takes out the target. 

A new generation of autonomous vehicles is a high priority for military applications of AI, with much of the focus on navigation for a variety of unmanned land, sea, and air systems. Space and undersea platforms will also benefit from AI-informed guidance systems. 

AI is at the heart of the so-called drone swarms that have been the subject of much attention in recent years. AI-informed navigation software supported by ubiquitous sensors not only enables unmanned vehicles to find their way through hostile terrain, but also may eventually make it possible for complex formations of various types of drones operating in multiple domains, with complementary armaments to conduct sophisticated battle tactics. 

AI has steadily been increasing the power of simulations and gaming tools used to study nuclear and conventional weapons. 
Advances in AI-enhanced targeting and navigation also improve prospects for a wide range of tactical and strategic defense systems, especially ballistic missile defences, by empowering target acquisition, tracking, and discrimination. 

The interface between humans and machines, where the human in the loop is supposed to exert overall  control, raises critical questions about decision-making authority and organisational hierarchies. 

The rapid expansion of AI’s military applications throughout the world merits a high level of focused attention to minimise its negative impacts on strategic stability and to prevent nasty surprises. 

US Dept. of Defense:     US Army:    JSTOR / Defense University     Al Jazeera:      I-HLS   

London School of Economics:     Image: Unsplash

You Might Also Read:

The Emerging Domain Of  Cyber War:

 

« Worldwide Internet Outage Caused By Single Configuration Error
Developing A Sustainable Cyber Security Workforce »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

Inetum

Inetum

Inetum (formerly Gfi Informatique) is an agile IT services providing digital services and solutions, and a global group that helps companies and institutions to get the most out of digital flow.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

CipherStash

CipherStash

CipherStash is a complete data governance and breach prevention platform.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Coastline Cybersecurity

Coastline Cybersecurity

Coastline Cyber is a cybersecurity consulting firm dedicated to helping organizations strengthen their security posture by reducing risks, mitigating threats, and protecting against attacks.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.