Killer Robots For Export

The US Pentagon believes that China is working hard to challenge US miliatry supremacy on the battlefields of the future by vigorously pursuing Artificial Intelligence (AI) military programs and they dont want to lag behind. 

US Defense Secretay Mark Esper (pictured) says that China is exporting drones that it advertises as having lethal autonomy to the Middle East, It’s the first time that a senior Defense official has acknowledged that China is selling drones capable of taking life with little or no human oversight.

Speaking at the resent US National Security Commission on Artificial Intelligence conference Esper said that,

“As we speak, the Chinese government is already exporting some of its most advanced military aerial drones to the Middle East, as it prepares to export its next-generation stealth UAVs when those come one line,” ....In addition, Chinese weapons manufacturers are selling drones advertised as capable of full autonomy, including the ability to conduct lethal targeted strikes.” 

The Chinese company Ziyan, for instance, markets the Blowfish A3, essentially a helicopter drone outfitted with a machine gun. The intelligent swarming attack technology enables as many as 10 unmanned helicopter drones to autonomously form up into a swarm

Esper also said Chinese surveillance software and hardware could help China develop AI. “All signs point to the construction of a 21st-century surveillance state designed to censor speech and deny basic human rights on an unprecedented scale. Look no further than its use of surveillance to systematically repress more than a million Muslim Uighurs,” he said. “Beijing has all the power and tools it needs to coerce Chinese industry and academia into supporting its government-led efforts.” 

The US Defense Innovation Board has put forward a list of AI principles for the US military, which listed human governability as key, in line with previous policy going back to 2012. Esper called the list comprehensive and applauded it. He said it was “equally troubling are the outside firms or multinational corporations that are inadvertently or tacitly providing the technology or research behind China’s unethical use of AI.”

One company that has received criticism recently for partnering with Chinese researchers is Google. Kent Walker, Senior Vice President for Global Affairs told the audience, “We have chosen to scope our operations there very carefully.” Walker added that the partnerships are limited to advertising and work that to support open-source coding initiatives. 

DefenseOne:        SputnikNews:     Global Times:

You Might Also Read: 

AI - Driven Warfare Using Robots:

Distinguished AI Expert Is Concerned  About ‘Killer Robots’:

 

 

« Britain’s Cybersecurity Skills Gap
British Police At War Against Cyber Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Nmap Project

Nmap Project

Nmap Project is a Free and open source tool for network discovery, administration, and security auditing.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

GroupSense

GroupSense

GroupSense helps governments and enterprises take control of digital risk with cyber reconnaissance, counterintelligence and monitoring for breached credentials.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

endpointX

endpointX

endpointX is a preventative cyber security company. We help companies minimize their risk of breach by improving cyber hygiene.