Military Operating Systems Bring AI To The Battlefield

The US finds itself in the middle of an Artificial Intelligence (AI) arms race, with the aim to gain decision dominance on the battlefield for whoever gets there first. 

Now, the Pentagon’s Joint Artificial Intelligence Center (JAIC) has begun a joint operating system that can use, make and field AI algorithms. AI is widely recognised as a vital military capability that will only grow in importance in the era of Multi-Domain Operations (MDO). In the MDO platforms and systems across land, sea, air, space and cyber will interact and reinforce one another.

In order to make this happen, military forces will process vast amounts of data using information processing, and AI can significantly improve the processes analysing data at a rate far beyond a human analyst. This work is one key piece of the centre’s new Artificial Intelligence and Data Accelerator (AIDA) set up by the US Dept. of Defense in 2021. 

AIDA  marks a broad initiative to boost data-based decision-making across the US military’s 11 combat commands.

“AIDA brings us, in small teams, out to the combatant commanders…And so what we're trying to do from an information advantage perspective is bring them the advantages of good data and good artificial intelligence-generating insights,” said AIDA Director, Lt. Gen. Michael Groen at a recent conference. Groen also said that his office has already begun working with different commands to help them shape and curate their data environments.

“Throughout AIDA, we hope to illuminate what's possible,” Groen said, and “do lots of experiments within their data environments to help them make sense of their environments more clearly.” Groen said 

In developing this new integration layer, the  aim is to make AI algorithm-sharing and usage easier for the military decision-makers involved. In Groen's view, it’s imperative for the United States to organise AI  innovation enough swiftly in order to be competitive against strategic competitors, particularly China, in the event of future conflict.

US Dept. of Defense:    DefensOne:      NextGov:      Real Clear Defense:    Shepard Media

You Might Also Read: 

China Intends To Be An AI Superpower:

 

« British Foreign Office Hacked
Vodafone Portugal Has Been Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Security Risk Management (SRM)

Security Risk Management (SRM)

SRM provide a comprehensive security risk management service encompassing people, processes, technology, governance, compliance and risk management.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Oasis Technology

Oasis Technology

Oasis Technology are experts in cyber security. In addition to pioneering the game-changing TITAN anti-hacking device, we provide extensive cyber security consulting services.

CryptoNext Security

CryptoNext Security

CryptoNext provides optimal end-to-end post-quantum cybersecurity remediation tools and solutions for IT/OT infrastructures & applications.