Application Of Unmanned Military Systems

The field of Unmanned Systems is rapidly developing, as part of other burgeoning sectors, such as artificial intelligence, robotics and cyber. In the course of 2013, INSS carried out a study, which focused on Unmanned Vehicles. This program is designed to execute studies incorporating long-term technological projection and formulating policy. The following summarized the first of these studies, in an effort to serve as a model for subsequent ones.

1. The current status:
The current level of credibility unmanned ground and sea systems feature is considered quite low, in particular compared with unmanned aerial systems (UAS). Unmanned systems suffer from the lack of technical maturity when it comes to certain missions such as detection of explosive charges in open areas or in urban environments. These insights are in line with experts' assessment that unmanned systems are currently where household computers used to be in the 1980's. Furthermore, there is a great potential for a far-reaching improvement within 20 years.

2. In the future, we will see a major improvement in the performance of Autonomous systems, along with the level of trust we can have for them.

Unmanned systems are in for a significant improvement in terms of their respective abilities to gather intelligence, carry out reconnaissance missions, monitor sectors and detect targets, distinguish friendly enemy from friendly ones, as well as carry out damage assessment of enemy targets, i.e. infrastructure. These systems will have become simpler to operate. High system autonomy will allow each operator to control a larger number of vehicles at once. Respective systems will exhibit high levels of execution and high levels of credibility both singularly and as parts of larger formations. Furthermore, "wild cards" may well be introduced – systems with capabilities we nowadays perceive as fantastic, whose application would be tantamount to a 'game changer' compared with what we are familiar with today.

The primary consequences of these technology projections are that the bulk of military tactical missions could be planned in advanced and executed autonomously (with no human involvement) within 20 years. Using swarms of autonomous systems will play a growing part of the current face of the battlefield, and will greatly alter the pace of fighting, as well as other element of combat.

IHLS:

 

« Hacking Paranoia: Switzerland Cashing In By Marketing Itself As A 'Safe Haven' For Storing Data
The US and UK are to stage CyberWar against the Banks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Verimatrix

Verimatrix

Verimatrix is a global provider of innovative cybersecurity solutions that protect content, devices, software and applications.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Databarracks

Databarracks

Databarracks deliver award winning IT resilience and continuity services. We help organisations get the most out of the cloud and protect their data, wherever it lives.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.

Tria Federal

Tria Federal

Tria Federal is the premier middle-market Technology and Advisory services provider delivering digital transformation solutions to federal health and public safety agencies.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.