AI Targeted Drones Are Not Working

Both Russia and Ukraine had deployed small drones that used Artificial Intelligence (AI) to identify and to focus in on potential enemy targets, however, analysis of their current actual performance on the battlefield indicates they are inferior to human operators.

Using AI has meant that the drones, versions of the Russian Lancet and the Ukrainian Saker Scout, wouldn’t need a human operator to guide them all the way to impact. But now a detailed report from the Center for a New American Security (CNAS) dismisses the military effectiveness of these AI drones.

“The Lancet-3 was advertised as having autonomous target identification and engagement, although these claims are unverified...   Both parties claim to be using Artificial Intelligence to improve the drone’s ability to hit its target, but likely its use is limited.” according the the CNAS report.

Electronic warfare systems are designed to disrupt the operator’s control link, or worse, trace the transmission to its source for a precision strike, would have been largely useless against self-guided drones.

Has these AI drones proved more effective, it would have been a revolution in the use of deadly autonomous weapons.

Skilled drone operators are in short supply  could have been replaced by thousands of conscripts quickly trained to point-and-click on potential targets. Instead of every drone requiring an operator staring at its video feed full-time, a single human could have overseen a swarm of lethal machines.

Military AI would have taken a terrifying step towards independence from human control, however after months of frontline field-testing, neither Ukraine nor Russia’s AI-augmented drones seem to have made any measurable impact.

While access to Russian military documents or their AI drone’s performance data is not available, it does appear from the CNAS analysis of the Ukraine's' AI drones, that they are  are not working in the way that was anticipated.

CNAS     |      Breaking Defense     |     Bloomberg     |     Washington Post     |     Defence Blog     |    

CNAS     |     Forbes

ImageDiana Măceşanu

You Might Also Read: 

Artificial Intelligence & The Ethics Of War:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Surge In Ransomware & AI Defence Innovations
Major US Mobile Network Failure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

WithSecure

WithSecure

WithSecure (formerly F-Secure Business) is your reliable cyber security partner, providing outcome-based cyber security that protects and enables operations.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.