AI Will Not Replace Soldiers

Artificial Intelligence (AI) is poised to change the character of the future battlefield and the pace of threats faced in today’s security environment. However, AI will not replace US warriors, says a DoD summary of its AI strategy published recently.

Soldiers in the US armed forces “remain our enduring source of strength; we will use AI-enabled information, tools, and systems to empower, not replace, those who serve.”

The Strategy states that other nations, particularly China and Russia, are making significant investments in AI for military purposes, including in applications that raise questions regarding international norms and human rights.

The department’s strategic approach to AI emphasises its rapid, iterative, and responsible delivery and then the use of lessons learned to create repeatable and scalable processes and systems that will improve functions and missions across the department.

Examples of AI’s potential use Include

  • Improving situational awareness and decision-making. AI applied to perception tasks such as imagery analysis can extract useful information from raw data and equip leaders with increased situational awareness.
  • Increasing safety of operating equipment. AI has the potential to enhance the safety of operating aircraft, ships and vehicles in complex, rapidly changing situations by alerting operators to hidden dangers.
  • Implementing predictive maintenance and supply.

AI will be used to predict the failure of critical parts, automate diagnostics and plan maintenance based on data and equipment condition. Similar technology will be used to guide provisioning of spare parts and optimise inventory levels.

The DOD will continue funding research and development for “explainable AI” so users can understand the basis of AI outputs and therefore understand, appropriately trust and effectively manage AI systems.

The DOD plans to engage with the open source community by contributing data, challenges, research, and technologies as a vehicle for attracting talent and identifying and advancing new AI technologies.

I-HLS

You Might Also Read:

The Pentagon Doesn’t Want To Use Real AI:

 

 

« National Security & Surveillance In The Age Of AI
Cybercrime Misconceptions Put Consumers At Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

Robert Walters

Robert Walters

Robert Walters is one of the world's leading global specialist professional recruitment and recruitment process outsourcing consultancies.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Cyber Suraksa

Cyber Suraksa

We make security simple and hassle-free by offering a sustained and secure IT environment with next-gen cybersecurity solutions through a scalable security-as-a-service model.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.