AI Will Not Replace Soldiers

Artificial Intelligence (AI) is poised to change the character of the future battlefield and the pace of threats faced in today’s security environment. However, AI will not replace US warriors, says a DoD summary of its AI strategy published recently.

Soldiers in the US armed forces “remain our enduring source of strength; we will use AI-enabled information, tools, and systems to empower, not replace, those who serve.”

The Strategy states that other nations, particularly China and Russia, are making significant investments in AI for military purposes, including in applications that raise questions regarding international norms and human rights.

The department’s strategic approach to AI emphasises its rapid, iterative, and responsible delivery and then the use of lessons learned to create repeatable and scalable processes and systems that will improve functions and missions across the department.

Examples of AI’s potential use Include

  • Improving situational awareness and decision-making. AI applied to perception tasks such as imagery analysis can extract useful information from raw data and equip leaders with increased situational awareness.
  • Increasing safety of operating equipment. AI has the potential to enhance the safety of operating aircraft, ships and vehicles in complex, rapidly changing situations by alerting operators to hidden dangers.
  • Implementing predictive maintenance and supply.

AI will be used to predict the failure of critical parts, automate diagnostics and plan maintenance based on data and equipment condition. Similar technology will be used to guide provisioning of spare parts and optimise inventory levels.

The DOD will continue funding research and development for “explainable AI” so users can understand the basis of AI outputs and therefore understand, appropriately trust and effectively manage AI systems.

The DOD plans to engage with the open source community by contributing data, challenges, research, and technologies as a vehicle for attracting talent and identifying and advancing new AI technologies.

I-HLS

You Might Also Read:

The Pentagon Doesn’t Want To Use Real AI:

 

 

« National Security & Surveillance In The Age Of AI
Cybercrime Misconceptions Put Consumers At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.