Securing AI In Military Systems

Artificial Intelligence (AI) is a very important current technology that will alter warfare in the years to come. It is hard to predict the exact impact and trajectory of technologies but some analysts are saying that these AI technologies will enable military transformations that is comparable with the invention of electricity and the airplane. 

Both military and commercial robots will in the future incorporate AI that could make them capable of undertaking tasks and missions on their own. 

There is an important debate amongst military experts about whether robots should be allowed to execute some missions if human life could be at stake.  

AI software in military battlefield autonomous and self-governing systems are sometimes extremely vulnerable to cyber attacks. Now researchers are reviewing techniques to make the systems’ Machine Learning (ML) algorithms more secure. These ML algorithms make decisions and adjust the machines on the battlefield. The research project, led by Purdue University is part of the US Army Research Laboratory Army Artificial Intelligence Institute.

The prototype system will be called SCRAMBLE, short for “SeCure Real-time Decision-Making for the AutonoMous BattLefield.” Army researchers will be evaluating SCRAMBLE at the Army Research Laboratory’s autonomous battlefield test bed to ensure that the ML algorithms can be feasibly deployed and avoid cognitive overload for combatants using these machines.

There are several points of an autonomous operation where a hacker might attempt to compromise a ML algorithm.

Before even putting an autonomous machine on a battlefield, an adversary could manipulate the process that technicians use to feed data into algorithms and train them offline. SCRAMBLE would close these hackable loopholes in three ways.

  • The first is through “robust adversarial” machine learning algorithms that can operate with uncertain, incomplete or maliciously manipulated data sources. 
  • Second, the prototype will include a set of “interpretable” machine learning algorithms aimed at increasing a combatants trust of an autonomous machine while interacting with it. 
  • The third strategy will be a secure, distributed execution of these various machine learning algorithms on multiple platforms in an autonomous operation.

The research objective is to make all of these algorithms secure despite the fact that they are distributed and separated out over an entire domain, according to  researchers at  Purdue University. The US military is already integrating AI systems into combat via a controversial initiative called Project Maven, which uses AI algorithms to identify targets in Iraq and Syria. 

The AI revolution and accompanying technologies are transforming geopolitical competition and the development of AI, machine learning, and autonomous systems relies on factors such as data, workforces, computing power, and semiconductors, disparities in how well different countries harness these technologies may prove to be critical military technologies.

US Army:      Carnegie Endowment:        Chatham House:        USCongress:       I-HLS:          Modern War Institute

You Might Also Read:

Cyber Warfare Creates Ghosts In Our Machines:

 

« California & Florida Voter Websites Vulnerable To Hackers
New Software Makes Data From Multiple Sources Readable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

Zymr

Zymr

Zymr specialize in cloud computing solutions including Cloud Security, Cloud Mobility, Cloud Apps, Cloud Infrastructure and Cloud Orchestration.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

Marcus Donald People

Marcus Donald People

Marcus Donald People is a UK IT recruitment specialist covering the following sectors: Infrastructure & Cloud, Information Security, Development, Business transformation.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

eCloudvalley Digital Technology

eCloudvalley Digital Technology

eCloudvalley Digital Technology is a born-in-the-cloud partner focused entirely on AWS services across APAC region.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.