Killer Robots Will Be Ubiquitous In The US Army

Gen. Mark Milley, the US Army’s chief of staff (pictured) said that the service’s future combat vehicles and helicopters will need to serve in both manned and unmanned roles to meet commanders’ needs.

The General fleshed out his vision for an Army of the future that depends on robotics, artificial intelligence and other cutting-edge technologies that do not yet exist.

A large part of the success the service enjoyed in the first Gulf War and more recent conflicts, he said, was the result of the focused modernisation vision of leaders in the 1970s that created the Army’s previous big 5, the Abrams stank, Bradley fighting vehicle, Apache attack helicopter, Black Hawk helicopter, and the Patriot air defense missile system.

The Army now faces a similar challenge of modernising its major weapon systems that are quickly becoming obsolete, said Milley.

“If we, the United States military, do not recognise the need for change, and if we do not adapt and pivot to that change then, in my mind, that will be a grave strategic mistake,” he said.

For months, Milley has been pushing his modernisation strategy, which prioritizes next-generation combat vehicles, future vertical lift, long-range precision fires, sophisticated command network and soldier lethality.

“I am not interested in a linear progression into the future that will end up in defeat on a future battlefield,” said Milley, describing the mistake of depending on improvements to existing combat platforms.

“We are talking about ten times capabilities that don’t physically exist in the real world right this minute, but they will,” he added.

More than a decade ago, Army leaders touted the need for “leap-ahead” technology in the service’s Future Combat Systems effort, a multiyear, multibillion dollar program that consisted of 14 lightweight manned and unmanned systems tied together by an extensive communications and information network.

But, as was written in military.com, the technology FCS depended on simply did not exist. The Army spent billions on FCS, only to see it fail when then-Defense Secretary Robert Gates killed the 27-ton Manned Ground Vehicles portion of FCS in the 2010 budget while criticizing the advanced design as ill-suited to survive current battlefield threats.

After the demise of FCS, Army officials quickly took aim at the Ground Combat Vehicle, an effort to replace the Bradley fighting vehicle with a technologically advanced fighting vehicle that would last far into the future.

Five years later, Congress cut most of the funding for the overweight, over-budget vehicle program in the face of mandatory budget cuts under sequestration.

Milley acknowledges the failures of FCS but maintains that the Army must embrace emerging technologies such as robotics and artificial intelligence if the service wants to keep pace with its adversaries.

“Robotics is here; it is real,” he said. “We are talking about vehicles that are both manned and unmanned … every vehicle is going to have the capability to be robotic.”

Within 10 to 15 years, ground forces are going to have robotic vehicles for ground and air operations, Milley said.

“So If the commander on the ground can make an evaluation of his mission, enemy, terrain, time and troops available, and he can estimate the situation, he can make a determination as to whether he wants this assault to be manned or unmanned,” he said. “Does he want to attack Hill 101 with robots or does he want to do it with manned vehicles?”

Artificial intelligence is another example of a key emerging technology that the Army must recognise, Milley said.

“Whether we like it or not, artificial intelligence is coming,” he said. “I am willing to bet on it with programs and money.”

In terms of decision-making, “we want capabilities in the network that are taking advantage of significant advances in information technology to include artificial intelligence”, Milley said.

“I don’t know if artificial intelligence is going to mean robots and machines replace humanity … but I do know the quantum computing and some of the IT technologies that are out there today are so significant and can help you [with] rapid decision-making in complex decentralised environments, that if we don’t take advantage of that in things like the network, then we would be fools because others are moving out quickly on that,” he said.

I-HLS

You Might Also Read:

Russia's New Generation Of Military Robots:

'Killer Robot' Warfare Is Coming Closer:

 

« High Tech Police Tool Up For Winter Olympics
Prime Minister Wants A 'fake news' Rapid Response Team »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

New Zealand Internet Task Force (NZITF)

New Zealand Internet Task Force (NZITF)

The New Zealand Internet Task Force (NZITF) is a non-profit with the mission of improving the cyber security posture of New Zealand.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

FraudHunt

FraudHunt

FraudHunt protects your website from account fraud, ad fraud, fraud clicks, and malicious bots.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

BitTrap

BitTrap

BitTrap helps companies worldwide detect attackers and put an early end to breaches, preventing data exfiltration and ransomware altogether.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.