AI Will Not Replace Soldiers

Artificial Intelligence (AI) is poised to change the character of the future battlefield and the pace of threats faced in today’s security environment. However, AI will not replace US warriors, says a DoD summary of its AI strategy published recently.

Soldiers in the US armed forces “remain our enduring source of strength; we will use AI-enabled information, tools, and systems to empower, not replace, those who serve.”

The Strategy states that other nations, particularly China and Russia, are making significant investments in AI for military purposes, including in applications that raise questions regarding international norms and human rights.

The department’s strategic approach to AI emphasises its rapid, iterative, and responsible delivery and then the use of lessons learned to create repeatable and scalable processes and systems that will improve functions and missions across the department.

Examples of AI’s potential use Include

  • Improving situational awareness and decision-making. AI applied to perception tasks such as imagery analysis can extract useful information from raw data and equip leaders with increased situational awareness.
  • Increasing safety of operating equipment. AI has the potential to enhance the safety of operating aircraft, ships and vehicles in complex, rapidly changing situations by alerting operators to hidden dangers.
  • Implementing predictive maintenance and supply.

AI will be used to predict the failure of critical parts, automate diagnostics and plan maintenance based on data and equipment condition. Similar technology will be used to guide provisioning of spare parts and optimise inventory levels.

The DOD will continue funding research and development for “explainable AI” so users can understand the basis of AI outputs and therefore understand, appropriately trust and effectively manage AI systems.

The DOD plans to engage with the open source community by contributing data, challenges, research, and technologies as a vehicle for attracting talent and identifying and advancing new AI technologies.

I-HLS

You Might Also Read:

The Pentagon Doesn’t Want To Use Real AI:

 

 

« National Security & Surveillance In The Age Of AI
Cybercrime Misconceptions Put Consumers At Risk »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Site24x7

Site24x7

Site24x7 is an AI-powered observability platform for DevOps and IT operations.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Fernao Group

Fernao Group

Fernao offer you all solutions from a single source - from cyber security, business resilience and digital infrastructure to cloud technologies and pentesting.