Killer Robots Will Be Ubiquitous In The US Army

Gen. Mark Milley, the US Army’s chief of staff (pictured) said that the service’s future combat vehicles and helicopters will need to serve in both manned and unmanned roles to meet commanders’ needs.

The General fleshed out his vision for an Army of the future that depends on robotics, artificial intelligence and other cutting-edge technologies that do not yet exist.

A large part of the success the service enjoyed in the first Gulf War and more recent conflicts, he said, was the result of the focused modernisation vision of leaders in the 1970s that created the Army’s previous big 5, the Abrams stank, Bradley fighting vehicle, Apache attack helicopter, Black Hawk helicopter, and the Patriot air defense missile system.

The Army now faces a similar challenge of modernising its major weapon systems that are quickly becoming obsolete, said Milley.

“If we, the United States military, do not recognise the need for change, and if we do not adapt and pivot to that change then, in my mind, that will be a grave strategic mistake,” he said.

For months, Milley has been pushing his modernisation strategy, which prioritizes next-generation combat vehicles, future vertical lift, long-range precision fires, sophisticated command network and soldier lethality.

“I am not interested in a linear progression into the future that will end up in defeat on a future battlefield,” said Milley, describing the mistake of depending on improvements to existing combat platforms.

“We are talking about ten times capabilities that don’t physically exist in the real world right this minute, but they will,” he added.

More than a decade ago, Army leaders touted the need for “leap-ahead” technology in the service’s Future Combat Systems effort, a multiyear, multibillion dollar program that consisted of 14 lightweight manned and unmanned systems tied together by an extensive communications and information network.

But, as was written in military.com, the technology FCS depended on simply did not exist. The Army spent billions on FCS, only to see it fail when then-Defense Secretary Robert Gates killed the 27-ton Manned Ground Vehicles portion of FCS in the 2010 budget while criticizing the advanced design as ill-suited to survive current battlefield threats.

After the demise of FCS, Army officials quickly took aim at the Ground Combat Vehicle, an effort to replace the Bradley fighting vehicle with a technologically advanced fighting vehicle that would last far into the future.

Five years later, Congress cut most of the funding for the overweight, over-budget vehicle program in the face of mandatory budget cuts under sequestration.

Milley acknowledges the failures of FCS but maintains that the Army must embrace emerging technologies such as robotics and artificial intelligence if the service wants to keep pace with its adversaries.

“Robotics is here; it is real,” he said. “We are talking about vehicles that are both manned and unmanned … every vehicle is going to have the capability to be robotic.”

Within 10 to 15 years, ground forces are going to have robotic vehicles for ground and air operations, Milley said.

“So If the commander on the ground can make an evaluation of his mission, enemy, terrain, time and troops available, and he can estimate the situation, he can make a determination as to whether he wants this assault to be manned or unmanned,” he said. “Does he want to attack Hill 101 with robots or does he want to do it with manned vehicles?”

Artificial intelligence is another example of a key emerging technology that the Army must recognise, Milley said.

“Whether we like it or not, artificial intelligence is coming,” he said. “I am willing to bet on it with programs and money.”

In terms of decision-making, “we want capabilities in the network that are taking advantage of significant advances in information technology to include artificial intelligence”, Milley said.

“I don’t know if artificial intelligence is going to mean robots and machines replace humanity … but I do know the quantum computing and some of the IT technologies that are out there today are so significant and can help you [with] rapid decision-making in complex decentralised environments, that if we don’t take advantage of that in things like the network, then we would be fools because others are moving out quickly on that,” he said.

I-HLS

You Might Also Read:

Russia's New Generation Of Military Robots:

'Killer Robot' Warfare Is Coming Closer:

 

« High Tech Police Tool Up For Winter Olympics
Prime Minister Wants A 'fake news' Rapid Response Team »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

Brace168

Brace168

Specialising in Cyber Security incident identification and response, Brace168 is uniquely positioned to provide a vast experience in managed security services to meet the needs of all business types.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.