AI Will Not Replace Soldiers

Artificial Intelligence (AI) is poised to change the character of the future battlefield and the pace of threats faced in today’s security environment. However, AI will not replace US warriors, says a DoD summary of its AI strategy published recently.

Soldiers in the US armed forces “remain our enduring source of strength; we will use AI-enabled information, tools, and systems to empower, not replace, those who serve.”

The Strategy states that other nations, particularly China and Russia, are making significant investments in AI for military purposes, including in applications that raise questions regarding international norms and human rights.

The department’s strategic approach to AI emphasises its rapid, iterative, and responsible delivery and then the use of lessons learned to create repeatable and scalable processes and systems that will improve functions and missions across the department.

Examples of AI’s potential use Include

  • Improving situational awareness and decision-making. AI applied to perception tasks such as imagery analysis can extract useful information from raw data and equip leaders with increased situational awareness.
  • Increasing safety of operating equipment. AI has the potential to enhance the safety of operating aircraft, ships and vehicles in complex, rapidly changing situations by alerting operators to hidden dangers.
  • Implementing predictive maintenance and supply.

AI will be used to predict the failure of critical parts, automate diagnostics and plan maintenance based on data and equipment condition. Similar technology will be used to guide provisioning of spare parts and optimise inventory levels.

The DOD will continue funding research and development for “explainable AI” so users can understand the basis of AI outputs and therefore understand, appropriately trust and effectively manage AI systems.

The DOD plans to engage with the open source community by contributing data, challenges, research, and technologies as a vehicle for attracting talent and identifying and advancing new AI technologies.

I-HLS

You Might Also Read:

The Pentagon Doesn’t Want To Use Real AI:

 

 

« National Security & Surveillance In The Age Of AI
Cybercrime Misconceptions Put Consumers At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.

AppSentinels

AppSentinels

Appsentinels are a group of security and technology experts with a mission to fix gaps in application security.