Killer Robots Will Be Ubiquitous In The US Army

Gen. Mark Milley, the US Army’s chief of staff (pictured) said that the service’s future combat vehicles and helicopters will need to serve in both manned and unmanned roles to meet commanders’ needs.

The General fleshed out his vision for an Army of the future that depends on robotics, artificial intelligence and other cutting-edge technologies that do not yet exist.

A large part of the success the service enjoyed in the first Gulf War and more recent conflicts, he said, was the result of the focused modernisation vision of leaders in the 1970s that created the Army’s previous big 5, the Abrams stank, Bradley fighting vehicle, Apache attack helicopter, Black Hawk helicopter, and the Patriot air defense missile system.

The Army now faces a similar challenge of modernising its major weapon systems that are quickly becoming obsolete, said Milley.

“If we, the United States military, do not recognise the need for change, and if we do not adapt and pivot to that change then, in my mind, that will be a grave strategic mistake,” he said.

For months, Milley has been pushing his modernisation strategy, which prioritizes next-generation combat vehicles, future vertical lift, long-range precision fires, sophisticated command network and soldier lethality.

“I am not interested in a linear progression into the future that will end up in defeat on a future battlefield,” said Milley, describing the mistake of depending on improvements to existing combat platforms.

“We are talking about ten times capabilities that don’t physically exist in the real world right this minute, but they will,” he added.

More than a decade ago, Army leaders touted the need for “leap-ahead” technology in the service’s Future Combat Systems effort, a multiyear, multibillion dollar program that consisted of 14 lightweight manned and unmanned systems tied together by an extensive communications and information network.

But, as was written in military.com, the technology FCS depended on simply did not exist. The Army spent billions on FCS, only to see it fail when then-Defense Secretary Robert Gates killed the 27-ton Manned Ground Vehicles portion of FCS in the 2010 budget while criticizing the advanced design as ill-suited to survive current battlefield threats.

After the demise of FCS, Army officials quickly took aim at the Ground Combat Vehicle, an effort to replace the Bradley fighting vehicle with a technologically advanced fighting vehicle that would last far into the future.

Five years later, Congress cut most of the funding for the overweight, over-budget vehicle program in the face of mandatory budget cuts under sequestration.

Milley acknowledges the failures of FCS but maintains that the Army must embrace emerging technologies such as robotics and artificial intelligence if the service wants to keep pace with its adversaries.

“Robotics is here; it is real,” he said. “We are talking about vehicles that are both manned and unmanned … every vehicle is going to have the capability to be robotic.”

Within 10 to 15 years, ground forces are going to have robotic vehicles for ground and air operations, Milley said.

“So If the commander on the ground can make an evaluation of his mission, enemy, terrain, time and troops available, and he can estimate the situation, he can make a determination as to whether he wants this assault to be manned or unmanned,” he said. “Does he want to attack Hill 101 with robots or does he want to do it with manned vehicles?”

Artificial intelligence is another example of a key emerging technology that the Army must recognise, Milley said.

“Whether we like it or not, artificial intelligence is coming,” he said. “I am willing to bet on it with programs and money.”

In terms of decision-making, “we want capabilities in the network that are taking advantage of significant advances in information technology to include artificial intelligence”, Milley said.

“I don’t know if artificial intelligence is going to mean robots and machines replace humanity … but I do know the quantum computing and some of the IT technologies that are out there today are so significant and can help you [with] rapid decision-making in complex decentralised environments, that if we don’t take advantage of that in things like the network, then we would be fools because others are moving out quickly on that,” he said.

I-HLS

You Might Also Read:

Russia's New Generation Of Military Robots:

'Killer Robot' Warfare Is Coming Closer:

 

« High Tech Police Tool Up For Winter Olympics
Prime Minister Wants A 'fake news' Rapid Response Team »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub is a non-profit network organization focused on cooperation, information sharing, research and implementation of cutting-edge technologies in cybersecurity.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

CloudCover

CloudCover

CloudCover is a software-defined cybersecurity risk solution that provides risk awareness, risk analytics, and data security in real time.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.