Application Of Unmanned Military Systems

The field of Unmanned Systems is rapidly developing, as part of other burgeoning sectors, such as artificial intelligence, robotics and cyber. In the course of 2013, INSS carried out a study, which focused on Unmanned Vehicles. This program is designed to execute studies incorporating long-term technological projection and formulating policy. The following summarized the first of these studies, in an effort to serve as a model for subsequent ones.

1. The current status:
The current level of credibility unmanned ground and sea systems feature is considered quite low, in particular compared with unmanned aerial systems (UAS). Unmanned systems suffer from the lack of technical maturity when it comes to certain missions such as detection of explosive charges in open areas or in urban environments. These insights are in line with experts' assessment that unmanned systems are currently where household computers used to be in the 1980's. Furthermore, there is a great potential for a far-reaching improvement within 20 years.

2. In the future, we will see a major improvement in the performance of Autonomous systems, along with the level of trust we can have for them.

Unmanned systems are in for a significant improvement in terms of their respective abilities to gather intelligence, carry out reconnaissance missions, monitor sectors and detect targets, distinguish friendly enemy from friendly ones, as well as carry out damage assessment of enemy targets, i.e. infrastructure. These systems will have become simpler to operate. High system autonomy will allow each operator to control a larger number of vehicles at once. Respective systems will exhibit high levels of execution and high levels of credibility both singularly and as parts of larger formations. Furthermore, "wild cards" may well be introduced – systems with capabilities we nowadays perceive as fantastic, whose application would be tantamount to a 'game changer' compared with what we are familiar with today.

The primary consequences of these technology projections are that the bulk of military tactical missions could be planned in advanced and executed autonomously (with no human involvement) within 20 years. Using swarms of autonomous systems will play a growing part of the current face of the battlefield, and will greatly alter the pace of fighting, as well as other element of combat.

IHLS:

 

« Hacking Paranoia: Switzerland Cashing In By Marketing Itself As A 'Safe Haven' For Storing Data
The US and UK are to stage CyberWar against the Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

Glocomms

Glocomms

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs in San Francisco, New York, London and Berlin.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

National Cyber Coordination & Command Centre (NC4) - Malaysia

National Cyber Coordination & Command Centre (NC4) - Malaysia

NC4 is established as a center for dealing with cyber threats and crisis at the national level in Malaysia.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.