Killer Robots Will Be Ubiquitous In The US Army

Gen. Mark Milley, the US Army’s chief of staff (pictured) said that the service’s future combat vehicles and helicopters will need to serve in both manned and unmanned roles to meet commanders’ needs.

The General fleshed out his vision for an Army of the future that depends on robotics, artificial intelligence and other cutting-edge technologies that do not yet exist.

A large part of the success the service enjoyed in the first Gulf War and more recent conflicts, he said, was the result of the focused modernisation vision of leaders in the 1970s that created the Army’s previous big 5, the Abrams stank, Bradley fighting vehicle, Apache attack helicopter, Black Hawk helicopter, and the Patriot air defense missile system.

The Army now faces a similar challenge of modernising its major weapon systems that are quickly becoming obsolete, said Milley.

“If we, the United States military, do not recognise the need for change, and if we do not adapt and pivot to that change then, in my mind, that will be a grave strategic mistake,” he said.

For months, Milley has been pushing his modernisation strategy, which prioritizes next-generation combat vehicles, future vertical lift, long-range precision fires, sophisticated command network and soldier lethality.

“I am not interested in a linear progression into the future that will end up in defeat on a future battlefield,” said Milley, describing the mistake of depending on improvements to existing combat platforms.

“We are talking about ten times capabilities that don’t physically exist in the real world right this minute, but they will,” he added.

More than a decade ago, Army leaders touted the need for “leap-ahead” technology in the service’s Future Combat Systems effort, a multiyear, multibillion dollar program that consisted of 14 lightweight manned and unmanned systems tied together by an extensive communications and information network.

But, as was written in military.com, the technology FCS depended on simply did not exist. The Army spent billions on FCS, only to see it fail when then-Defense Secretary Robert Gates killed the 27-ton Manned Ground Vehicles portion of FCS in the 2010 budget while criticizing the advanced design as ill-suited to survive current battlefield threats.

After the demise of FCS, Army officials quickly took aim at the Ground Combat Vehicle, an effort to replace the Bradley fighting vehicle with a technologically advanced fighting vehicle that would last far into the future.

Five years later, Congress cut most of the funding for the overweight, over-budget vehicle program in the face of mandatory budget cuts under sequestration.

Milley acknowledges the failures of FCS but maintains that the Army must embrace emerging technologies such as robotics and artificial intelligence if the service wants to keep pace with its adversaries.

“Robotics is here; it is real,” he said. “We are talking about vehicles that are both manned and unmanned … every vehicle is going to have the capability to be robotic.”

Within 10 to 15 years, ground forces are going to have robotic vehicles for ground and air operations, Milley said.

“So If the commander on the ground can make an evaluation of his mission, enemy, terrain, time and troops available, and he can estimate the situation, he can make a determination as to whether he wants this assault to be manned or unmanned,” he said. “Does he want to attack Hill 101 with robots or does he want to do it with manned vehicles?”

Artificial intelligence is another example of a key emerging technology that the Army must recognise, Milley said.

“Whether we like it or not, artificial intelligence is coming,” he said. “I am willing to bet on it with programs and money.”

In terms of decision-making, “we want capabilities in the network that are taking advantage of significant advances in information technology to include artificial intelligence”, Milley said.

“I don’t know if artificial intelligence is going to mean robots and machines replace humanity … but I do know the quantum computing and some of the IT technologies that are out there today are so significant and can help you [with] rapid decision-making in complex decentralised environments, that if we don’t take advantage of that in things like the network, then we would be fools because others are moving out quickly on that,” he said.

I-HLS

You Might Also Read:

Russia's New Generation Of Military Robots:

'Killer Robot' Warfare Is Coming Closer:

 

« High Tech Police Tool Up For Winter Olympics
Prime Minister Wants A 'fake news' Rapid Response Team »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

OSSEC

OSSEC

OSSEC is a scalable, multi-platform, open source Host-based Intrusion Detection System (HIDS).

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

Periculus

Periculus

Periculus makes managing digital risk simple. Its integrated platform offers access to purchase cyber insurance and cyber security solutions uniquely tailored to fit the needs of every business.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Onwardly

Onwardly

For everyday folks tasked with implementing security and privacy. Do it faster with Onwardly - build, launch and scale your cyber resilience program in 30 minutes per week.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.