Russia Plans To Dominate Military AI

The United States isn’t the only major military power trying to digitally link all its weapons together and execute operations faster using Artificial Intelligence (AI). Russia has been making gains in its own version of centralised command and control across land, sea, space and cyberspace

As the Russian leadership consider technology’s impact on its military power and its role in the world, AI is an area of substantial growth and increasing influence.

According to a new paper from a US Naval think tank, the Center for Naval Analyses (CNA), the United States isn’t the only major military power trying to digitally link all of its weapons and execute operations faster with AI.

According to a Russian Presidential spokesman, their military will achieve its goal of complete technological sovereignty in 10- 20 years, with an emphasis on the importance of Russia’s ownership over technological developments. This echoes President Putin’s statement in June this year regarding “the importance for the country of creating its own competitive technologies…that can become new world standards.”

The Russian leadership’s continued goal is to use extensive Western sanctions as a jumping off point for the development of indigenous domestic high-tech industries.

Russia has been making gains in its own version of centralised command and control across land, sea, space, and cyberspace and its military leaders have steadily advanced an AI-linked concept called Automated Control Systems (ACS) says the CNA paper.

This shares a resemblance to the US military’s own vision for AI-fueled, network-centric operations. In 2017, US service chiefs began speaking about digitally linking planes, ships, drones, satellites and troops in a comprehensive network of shared data.

The idea was to allow any “shooter” on the battlefield to hit any target. Artificial intelligence would play a key role, analysing rapidly incoming data streams about targets and the state of US forces and then determining best courses of action for commanders to execute.

Outside the conflict in Ukraine, Russian military units are conducting drills and exercises involving the reconnaissance fire/strike practices prior to deployment. Target coordinates are transmitted in real time from an aerial drone and the Strelets reconnaissance, control and communication system, a tactical sensor-to-shooter information sharing system.

The CNA reports that Russia's military leaders clearly think that systems will be equipped with AI will be capable of independently detecting potential targets and launch missile strikes without human intervention. 

They also suggest that Russia might attempt to integrate AI into its nuclear command in order to convince the US that a first strike against Russian leadership wouldn’t stop its ability to fire nuclear weapons.

CNA:     CNAS:     I-HLS:  DefenseOne:     

You Might Also Read: 

Russia’s AI Plans Might Not Survive The Ukraine War:

 

« The Intercontinental Hotels Group was ‘Hacked for Fun!’
Cyber Crime Weaponised: What Business Can Learn From Ukraine »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Venable

Venable

Venable is an American Lawyer 100 law firm with nine offices across the USA, Practice areas include Cybersecurity.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

NSW IT Support

NSW IT Support

NSW IT Support: Your exclusive hub for comprehensive Business IT services in Sydney. Our skilled team ensures seamless technology solutions nationwide, consistently delivering top-tier IT support.

SCS Technology Solutions

SCS Technology Solutions

SCS Technology Solutions has become the preferred partner for top performing organisations across Lincolnshire for IT support and consultancy.