Securing AI In Military Systems

Artificial Intelligence (AI) is a very important current technology that will alter warfare in the years to come. It is hard to predict the exact impact and trajectory of technologies but some analysts are saying that these AI technologies will enable military transformations that is comparable with the invention of electricity and the airplane. 

Both military and commercial robots will in the future incorporate AI that could make them capable of undertaking tasks and missions on their own. 

There is an important debate amongst military experts about whether robots should be allowed to execute some missions if human life could be at stake.  

AI software in military battlefield autonomous and self-governing systems are sometimes extremely vulnerable to cyber attacks. Now researchers are reviewing techniques to make the systems’ Machine Learning (ML) algorithms more secure. These ML algorithms make decisions and adjust the machines on the battlefield. The research project, led by Purdue University is part of the US Army Research Laboratory Army Artificial Intelligence Institute.

The prototype system will be called SCRAMBLE, short for “SeCure Real-time Decision-Making for the AutonoMous BattLefield.” Army researchers will be evaluating SCRAMBLE at the Army Research Laboratory’s autonomous battlefield test bed to ensure that the ML algorithms can be feasibly deployed and avoid cognitive overload for combatants using these machines.

There are several points of an autonomous operation where a hacker might attempt to compromise a ML algorithm.

Before even putting an autonomous machine on a battlefield, an adversary could manipulate the process that technicians use to feed data into algorithms and train them offline. SCRAMBLE would close these hackable loopholes in three ways.

  • The first is through “robust adversarial” machine learning algorithms that can operate with uncertain, incomplete or maliciously manipulated data sources. 
  • Second, the prototype will include a set of “interpretable” machine learning algorithms aimed at increasing a combatants trust of an autonomous machine while interacting with it. 
  • The third strategy will be a secure, distributed execution of these various machine learning algorithms on multiple platforms in an autonomous operation.

The research objective is to make all of these algorithms secure despite the fact that they are distributed and separated out over an entire domain, according to  researchers at  Purdue University. The US military is already integrating AI systems into combat via a controversial initiative called Project Maven, which uses AI algorithms to identify targets in Iraq and Syria. 

The AI revolution and accompanying technologies are transforming geopolitical competition and the development of AI, machine learning, and autonomous systems relies on factors such as data, workforces, computing power, and semiconductors, disparities in how well different countries harness these technologies may prove to be critical military technologies.

US Army:      Carnegie Endowment:        Chatham House:        USCongress:       I-HLS:          Modern War Institute

You Might Also Read:

Cyber Warfare Creates Ghosts In Our Machines:

 

« California & Florida Voter Websites Vulnerable To Hackers
New Software Makes Data From Multiple Sources Readable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

LevelOps

LevelOps

LevelOps is an industry application security platform that tracks and develops your application security.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Cufflink

Cufflink

Cufflink makes your business more secure, compliant and trusted. We limit the likelihood and impact of a data breach by controlling exactly what can and can't be done with personal data.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Information Security Society of Africa – Nigeria (ISSAN)

Information Security Society of Africa – Nigeria (ISSAN)

The Information Security Society of Africa – Nigeria (ISSAN) is a not-for-profit organization dedicated to the protection of Nigeria’s cyberspace.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.