Military Intelligence: British Army Operation Using AI

The British Army has used Artificial Intelligence (AI) for the first time ever, during Exercise Spring Storm, as part of a joint military operation in Estonia. Soldiers from the 20th Armoured Infantry Brigade used an AI engine which provides information on the surrounding environment and terrain. Through the development of significant automation and smart analytics, the engine is able to rapidly cut through masses of complex data.

Providing efficient information regarding the environment and terrain, it enables Army commanders to plan its appropriate activity and operational decisions. The AI capability, which can be hosted in the cloud or operate in independent mode, saves significant time and effort, providing soldiers with instant planning support and enhancing command and control processes. 

During the annual large-scale NATO exercise, soldiers from France, Denmark, Belgium, Estonia and the UK used the technology whilst carrying out live-fire drills.

Defence has received an extra £24 billion across the next four years, focusing on the ability to adapt to meet future threats. The intention is to invest £6.6billion over the next four years in defence research and development, focusing on emerging technologies in AI-enabled autonomous systems, cyber space and directed energy systems.  

The deployment was a first of its kind for the British  Army,  built on close collaboration with industry partners that developed AI specifically designed for the way the Army is trained to operate. The Army’s Director of Information, Major General Jonathan Cole said "The lessons this has provided are considerable, not just in terms of our support to deployed forces, but more broadly in how we inform Defence’s digital transformation agenda and the best practices we must adopt to integrate and exploit leading-edge technologies."

Military sources claim that the exercise outperformed their expectations and has clear applications for improving our level of analysis and speed to conduct planning. In future, the UK armed forces will increasingly use AI to predict adversaries’ behaviour, perform reconnaissance and relay real-time intelligence from the battlefield.

GovUK:       Forces.net:   SWArgusAI Business:

You Might Also Read:

Britain Is At Cyber War Every Day:

 

 

 

« The State Of Cyber Security In Healthcare
The Semiconductor Shortage Is Causing Cyber Security Problems »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

C2 Risk

C2 Risk

C2 Risk are focussed on risk analytics for information assurance, privacy and ESG (Environmental, Social, and Governance).

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.