Military Operating Systems Bring AI To The Battlefield

The US finds itself in the middle of an Artificial Intelligence (AI) arms race, with the aim to gain decision dominance on the battlefield for whoever gets there first. 

Now, the Pentagon’s Joint Artificial Intelligence Center (JAIC) has begun a joint operating system that can use, make and field AI algorithms. AI is widely recognised as a vital military capability that will only grow in importance in the era of Multi-Domain Operations (MDO). In the MDO platforms and systems across land, sea, air, space and cyber will interact and reinforce one another.

In order to make this happen, military forces will process vast amounts of data using information processing, and AI can significantly improve the processes analysing data at a rate far beyond a human analyst. This work is one key piece of the centre’s new Artificial Intelligence and Data Accelerator (AIDA) set up by the US Dept. of Defense in 2021. 

AIDA  marks a broad initiative to boost data-based decision-making across the US military’s 11 combat commands.

“AIDA brings us, in small teams, out to the combatant commanders…And so what we're trying to do from an information advantage perspective is bring them the advantages of good data and good artificial intelligence-generating insights,” said AIDA Director, Lt. Gen. Michael Groen at a recent conference. Groen also said that his office has already begun working with different commands to help them shape and curate their data environments.

“Throughout AIDA, we hope to illuminate what's possible,” Groen said, and “do lots of experiments within their data environments to help them make sense of their environments more clearly.” Groen said 

In developing this new integration layer, the  aim is to make AI algorithm-sharing and usage easier for the military decision-makers involved. In Groen's view, it’s imperative for the United States to organise AI  innovation enough swiftly in order to be competitive against strategic competitors, particularly China, in the event of future conflict.

US Dept. of Defense:    DefensOne:      NextGov:      Real Clear Defense:    Shepard Media

You Might Also Read: 

China Intends To Be An AI Superpower:

 

« British Foreign Office Hacked
Vodafone Portugal Has Been Hacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Blockchain Reactor

Blockchain Reactor

Blockchain Reactor is a blockchain consultancy and implementation company providing cutting-edge blockchain solutions for start-ups and enterprises.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

Firmus

Firmus

As the leading penetration testing services provider in Malaysia, Firmus evaluates the ability of your internal or external information assets to withstand attacks.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.