The Pentagon Doesn’t Want To Use Real AI

The term “artificial intelligence” gets thrown around a lot today, especially in government circles, where leaders are eager to get ahead of the technological curve. But the military, at least, doesn’t really want true AI, according to a former deputy defense secretary.

“We are not talking about Skynets and we’re not talking about Terminators. Those are what you would call an artificial general intelligence-type weapon,” Bob Work, who served as deputy defense secretary under Presidents Obama and Trump said, speaking recently at the annual SAP NS2 Solutions Summit

“We’re looking for narrow AI systems that can compose courses of action to accomplish the tasks that the machine is given and it can choose among the courses of action.”

Work made a hard distinction between general AI and more narrow forms—what he preferred to call machine intelligence and algorithmic warfare.

“Improved autonomy is going to be the natural result of machine intelligence. We always use artificial intelligence, but I think machine intelligence is more accurate,” he said. “It’s the programmed ability to process information and, this is key, to make decisions as well as or better than human beings, and faster.”

He offered an example of a smart missile that is able to assess a situation, choose the best target based on preset parameters. In the example, the missile spots an enemy tank formation, determines which is the command tank and picks the most lethal form of attack to incapacitate the enemy.

“That is a good thing. It’s a totally autonomous weapon and it will do what it’s asked to do,” Work said. “It won’t say, ‘Hey, I woke up this morning and I decided I want to shoot down an airplane.’ A general AI system sets its own goals and can change them. No one in the Department of Defense is saying we ought to go toward those type of weapons.”

Work referenced the department’s Project Maven, a high-profile Pentagon program that made headlines when Google employees petitioned their company to remove itself from the project for ethical reasons. 

The former deputy secretary noted the true name inside the Pentagon is the Algorithmic Warfare Cross-Functional Team, with a focus on merging human and machine intelligence in a way that improves human decision-making.

“Human-machine collaboration is using machines to make better human decisions,” he said. “The human is always in front in terms of DOD thinking.”

Defense One:

You Might Also Read:

Killer Robots Are A Revolution In Warfare

« What Northrop’s Unified Platform Win Means For Cyber War
Britain Needs A Cyber Army To Defend Against Prolific Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.