Improving The Safety & Stability Of Artificial Intelligence

Nations around the world are investing in Artificial Intelligence (AI) to improve their military, intelligence, and other national security capabilities. Yet AI technology, at present, has significant safety and security issues and AI systems can currently fail in unexpected ways due to a variety of causes. 

Now, a US defence & foreign policy think tank, the Center for a New American Security (CANS) has announced the creation of a Task Force on Artificial Intelligence and National Security to look into AI’s impact both in the US and around the world. 

This comes at a time when the interactive nature of military competition means that one nation’s actions affect others, including in ways that may be detrimental to mutual stability.  Currently, there is an urgent need to explore actions that can mitigate these risks, such as improved processes for AI assurance, norms and best practices for responsible AI adoption, and confidence-building measures that improve stability among all nations.

CNAS is launching a new project to better understand AI risks and specific steps that can be taken to improve AI safety and stability in national security applications. 

Major Project Objectives Include   

  • Anticipating, preventing, and mitigating catastrophic AI failures.
  • Improving US Defense Department processes for ensuring safe, secure, and trusted AI.
  • Understanding and shaping opportunities for computer governance.

This effort will include the CNAS Technology and National Security, Defense, Indo-Pacific Security, Transatlantic Security, and Energy, Economics, and Security programmes.

CNAS experts will share their findings in public reports and policy briefs with recommendations for policymakers.

Paul Scharre, the Director of Studies at CNAS commented, “AI technology is powerful but brittle, with significant reliability and security concerns...  As nations integrate AI into national security applications, it is imperative that AI systems are safe, reliable, robust, and secure. This project will help deepen our understanding of concrete steps that can be taken to address these risks in the national security space.”

CNAS:     Pymnts:    Georgetown University:      India Stategic Studies:  

You Might Also Read: 

Russia’s AI Plans Might Not Survive The Ukraine War:

 

« Email Infection Chains Are Diversifying In 2022
Chinese Internet Companies Required To Disclose Algorithm Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

S21sec

S21sec

S21sec is a leading European pure play cybersecurity consultancy, services and solutions provider.

DataSunrise

DataSunrise

DataSunrise Data-Centric high-performance security software protects the sensitive data in real-time in cloud or on premises, and helps organizations to stay compliant.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.