Improving The Safety & Stability Of Artificial Intelligence

Nations around the world are investing in Artificial Intelligence (AI) to improve their military, intelligence, and other national security capabilities. Yet AI technology, at present, has significant safety and security issues and AI systems can currently fail in unexpected ways due to a variety of causes. 

Now, a US defence & foreign policy think tank, the Center for a New American Security (CANS) has announced the creation of a Task Force on Artificial Intelligence and National Security to look into AI’s impact both in the US and around the world. 

This comes at a time when the interactive nature of military competition means that one nation’s actions affect others, including in ways that may be detrimental to mutual stability.  Currently, there is an urgent need to explore actions that can mitigate these risks, such as improved processes for AI assurance, norms and best practices for responsible AI adoption, and confidence-building measures that improve stability among all nations.

CNAS is launching a new project to better understand AI risks and specific steps that can be taken to improve AI safety and stability in national security applications. 

Major Project Objectives Include   

  • Anticipating, preventing, and mitigating catastrophic AI failures.
  • Improving US Defense Department processes for ensuring safe, secure, and trusted AI.
  • Understanding and shaping opportunities for computer governance.

This effort will include the CNAS Technology and National Security, Defense, Indo-Pacific Security, Transatlantic Security, and Energy, Economics, and Security programmes.

CNAS experts will share their findings in public reports and policy briefs with recommendations for policymakers.

Paul Scharre, the Director of Studies at CNAS commented, “AI technology is powerful but brittle, with significant reliability and security concerns...  As nations integrate AI into national security applications, it is imperative that AI systems are safe, reliable, robust, and secure. This project will help deepen our understanding of concrete steps that can be taken to address these risks in the national security space.”

CNAS:     Pymnts:    Georgetown University:      India Stategic Studies:  

You Might Also Read: 

Russia’s AI Plans Might Not Survive The Ukraine War:

 

« Email Infection Chains Are Diversifying In 2022
Chinese Internet Companies Required To Disclose Algorithm Data »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

IPN (ICT Research Platform Nederlands)

IPN (ICT Research Platform Nederlands)

IPN promotes academic research and education in the ICT field by building and maintaining a national community, and by developing policy to advance the field. Areas of focus include Cyber Security.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

PureID

PureID

Protect your enterprise with PureAUTH #IAMFirewall, Resilient SSO platform, purpose built to provide Passwordless Authentication & Zero Trust Access, by default.

Redapt

Redapt

Redapt is an end-to-end technology solutions provider that brings clarity to a dynamic technical environment.