The Pentagon Doesn’t Want To Use Real AI

The term “artificial intelligence” gets thrown around a lot today, especially in government circles, where leaders are eager to get ahead of the technological curve. But the military, at least, doesn’t really want true AI, according to a former deputy defense secretary.

“We are not talking about Skynets and we’re not talking about Terminators. Those are what you would call an artificial general intelligence-type weapon,” Bob Work, who served as deputy defense secretary under Presidents Obama and Trump said, speaking recently at the annual SAP NS2 Solutions Summit

“We’re looking for narrow AI systems that can compose courses of action to accomplish the tasks that the machine is given and it can choose among the courses of action.”

Work made a hard distinction between general AI and more narrow forms—what he preferred to call machine intelligence and algorithmic warfare.

“Improved autonomy is going to be the natural result of machine intelligence. We always use artificial intelligence, but I think machine intelligence is more accurate,” he said. “It’s the programmed ability to process information and, this is key, to make decisions as well as or better than human beings, and faster.”

He offered an example of a smart missile that is able to assess a situation, choose the best target based on preset parameters. In the example, the missile spots an enemy tank formation, determines which is the command tank and picks the most lethal form of attack to incapacitate the enemy.

“That is a good thing. It’s a totally autonomous weapon and it will do what it’s asked to do,” Work said. “It won’t say, ‘Hey, I woke up this morning and I decided I want to shoot down an airplane.’ A general AI system sets its own goals and can change them. No one in the Department of Defense is saying we ought to go toward those type of weapons.”

Work referenced the department’s Project Maven, a high-profile Pentagon program that made headlines when Google employees petitioned their company to remove itself from the project for ethical reasons. 

The former deputy secretary noted the true name inside the Pentagon is the Algorithmic Warfare Cross-Functional Team, with a focus on merging human and machine intelligence in a way that improves human decision-making.

“Human-machine collaboration is using machines to make better human decisions,” he said. “The human is always in front in terms of DOD thinking.”

Defense One:

You Might Also Read:

Killer Robots Are A Revolution In Warfare

« What Northrop’s Unified Platform Win Means For Cyber War
Britain Needs A Cyber Army To Defend Against Prolific Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

ByteSnipers

ByteSnipers

ByteSnipers specialize in penetration testings and secure development services. Our focus is on your security.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Silent Quadrant

Silent Quadrant

Silent Quadrant delivers incomparable cybersecurity consulting, digital transformation, and risk management within our purpose-driven clients - empowering them to be the most resilient entities.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.