Artificial Intelligence & The Ethics Of War

The United States Dept. of Defense (DoD) has recently published its AI Ethical use principals and it recognises that AI will transform war and national security. 

If the military manages to adopt, implement, and follow the guidelines, it would leap into an increasingly rare position as a leader in establishing standards for the wider tech world. 

The DoD recommends 5 AI ethics principals:

  • Responsible is the most straightforward: “Human beings should exercise appropriate levels of judgment and remain responsible for the development, deployment, use, and outcomes of AI systems.” This is similar to Defense Department 2012doctrine.
     
  • Equitable as in, avoiding “unintended bias” in algorithms that might be used in combat or elsewhere. This one prescribes care in constructing datasets used in machine learning, that use AI to reduce for example, racist or contribute to racial bias.
  • Traceable: technicians in the Defense Department must be able to go back through any output or AI process and be able to see how the software reached its conclusion. 
     
  • Reliable: Defining “explicit, well-defined domain of use,” and lots of rigorous tests against that use.
     
  • Governable: built with the “ability to detect and avoid unintended harm or disruption.” The software has to be able to stop itself if it sees that it might be causing problems.

The policy doceument emulats similar efforst inthe  private sector where the tech companies like Google, Microsoft, and Facebook, all of which have published their own ethical principles for AI. In the case of Google, a number of their engineers have protested the company's was involvment with the US Defense Department in a develoing AI applications for intelligence gathering using drones named Project Maven. 

The DoD's documnt advocates that the discussion of AI ethics and technological advances and innovation should happen simultaneously. 

"Ethics cannot be “bolted on” after a widget is built or considered only once a deployed process unfolds, and policy cannot wait for scientists and engineers to figure out particular technology problems. Rather, there must be an integrated, iterative development of technology with ethics, law, and policy considerations happening alongside technological development."

Although at an early stage, if the Pentagon ultimately does use AI in a dangerous way in comabt, it won’t be because the it has not begun to think carefully about having guidelines for the US military to follow.

DefenseOne:        US Defense Innovation Board:         Image: Nick Youngson  

You Might Also Read: 

AI - Driven Warfare Using Robots:

 

 

« WEF Report Confirms Cyber Attack Risk Is Growing Worldwide
Ransomware, Phishing And Botnets »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

HKCERT

HKCERT

HKCERT is the centre for coordination of computer security incident response for local enterprises and Internet Users in Hong Kong.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

Heartland Business Systems (HBS)

Heartland Business Systems (HBS)

Heartland Business Systems serves commercial, public sector and small to medium business with results-driven and dedicated information technology services.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

MineOS

MineOS

MineOS aligns compliance with business growth. We designed our platform so that privacy compliance efforts directly benefit other teams and initiatives.