Securing AI In Military Systems

Artificial Intelligence (AI) is a very important current technology that will alter warfare in the years to come. It is hard to predict the exact impact and trajectory of technologies but some analysts are saying that these AI technologies will enable military transformations that is comparable with the invention of electricity and the airplane. 

Both military and commercial robots will in the future incorporate AI that could make them capable of undertaking tasks and missions on their own. 

There is an important debate amongst military experts about whether robots should be allowed to execute some missions if human life could be at stake.  

AI software in military battlefield autonomous and self-governing systems are sometimes extremely vulnerable to cyber attacks. Now researchers are reviewing techniques to make the systems’ Machine Learning (ML) algorithms more secure. These ML algorithms make decisions and adjust the machines on the battlefield. The research project, led by Purdue University is part of the US Army Research Laboratory Army Artificial Intelligence Institute.

The prototype system will be called SCRAMBLE, short for “SeCure Real-time Decision-Making for the AutonoMous BattLefield.” Army researchers will be evaluating SCRAMBLE at the Army Research Laboratory’s autonomous battlefield test bed to ensure that the ML algorithms can be feasibly deployed and avoid cognitive overload for combatants using these machines.

There are several points of an autonomous operation where a hacker might attempt to compromise a ML algorithm.

Before even putting an autonomous machine on a battlefield, an adversary could manipulate the process that technicians use to feed data into algorithms and train them offline. SCRAMBLE would close these hackable loopholes in three ways.

  • The first is through “robust adversarial” machine learning algorithms that can operate with uncertain, incomplete or maliciously manipulated data sources. 
  • Second, the prototype will include a set of “interpretable” machine learning algorithms aimed at increasing a combatants trust of an autonomous machine while interacting with it. 
  • The third strategy will be a secure, distributed execution of these various machine learning algorithms on multiple platforms in an autonomous operation.

The research objective is to make all of these algorithms secure despite the fact that they are distributed and separated out over an entire domain, according to  researchers at  Purdue University. The US military is already integrating AI systems into combat via a controversial initiative called Project Maven, which uses AI algorithms to identify targets in Iraq and Syria. 

The AI revolution and accompanying technologies are transforming geopolitical competition and the development of AI, machine learning, and autonomous systems relies on factors such as data, workforces, computing power, and semiconductors, disparities in how well different countries harness these technologies may prove to be critical military technologies.

US Army:      Carnegie Endowment:        Chatham House:        USCongress:       I-HLS:          Modern War Institute

You Might Also Read:

Cyber Warfare Creates Ghosts In Our Machines:

 

« California & Florida Voter Websites Vulnerable To Hackers
New Software Makes Data From Multiple Sources Readable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Upstream Security

Upstream Security

Upstream Security is the first cloud-based cyber-security solution that protects the technologies and applications of connected and autonomous vehicles.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.