Securing AI In Military Systems

Artificial Intelligence (AI) is a very important current technology that will alter warfare in the years to come. It is hard to predict the exact impact and trajectory of technologies but some analysts are saying that these AI technologies will enable military transformations that is comparable with the invention of electricity and the airplane. 

Both military and commercial robots will in the future incorporate AI that could make them capable of undertaking tasks and missions on their own. 

There is an important debate amongst military experts about whether robots should be allowed to execute some missions if human life could be at stake.  

AI software in military battlefield autonomous and self-governing systems are sometimes extremely vulnerable to cyber attacks. Now researchers are reviewing techniques to make the systems’ Machine Learning (ML) algorithms more secure. These ML algorithms make decisions and adjust the machines on the battlefield. The research project, led by Purdue University is part of the US Army Research Laboratory Army Artificial Intelligence Institute.

The prototype system will be called SCRAMBLE, short for “SeCure Real-time Decision-Making for the AutonoMous BattLefield.” Army researchers will be evaluating SCRAMBLE at the Army Research Laboratory’s autonomous battlefield test bed to ensure that the ML algorithms can be feasibly deployed and avoid cognitive overload for combatants using these machines.

There are several points of an autonomous operation where a hacker might attempt to compromise a ML algorithm.

Before even putting an autonomous machine on a battlefield, an adversary could manipulate the process that technicians use to feed data into algorithms and train them offline. SCRAMBLE would close these hackable loopholes in three ways.

  • The first is through “robust adversarial” machine learning algorithms that can operate with uncertain, incomplete or maliciously manipulated data sources. 
  • Second, the prototype will include a set of “interpretable” machine learning algorithms aimed at increasing a combatants trust of an autonomous machine while interacting with it. 
  • The third strategy will be a secure, distributed execution of these various machine learning algorithms on multiple platforms in an autonomous operation.

The research objective is to make all of these algorithms secure despite the fact that they are distributed and separated out over an entire domain, according to  researchers at  Purdue University. The US military is already integrating AI systems into combat via a controversial initiative called Project Maven, which uses AI algorithms to identify targets in Iraq and Syria. 

The AI revolution and accompanying technologies are transforming geopolitical competition and the development of AI, machine learning, and autonomous systems relies on factors such as data, workforces, computing power, and semiconductors, disparities in how well different countries harness these technologies may prove to be critical military technologies.

US Army:      Carnegie Endowment:        Chatham House:        USCongress:       I-HLS:          Modern War Institute

You Might Also Read:

Cyber Warfare Creates Ghosts In Our Machines:

 

« California & Florida Voter Websites Vulnerable To Hackers
New Software Makes Data From Multiple Sources Readable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Indemnity Solutions (CIS)

Cyber Indemnity Solutions (CIS)

CIS is an InsurTech company focused on licensing innovative cyber risk insurance solutions to the global insurance industry.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

Alliance for Cyber Security (ACS)

Alliance for Cyber Security (ACS)

An alliance of all major players in the field of cyber security in Germany with a mission to strengthen Germany’s resistance to cyber-attacks.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Bittnet Training

Bittnet Training

Bittnet Training is the leader in the IT Training market in Romania. We develop the IT skills of IT professionals as well as those who wish to start a career in IT.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

CentriVault

CentriVault

CentriVault is a leading independent provider of Cyber Security and Data protection services to small and medium enterprises (SMEs).

Firesand

Firesand

Based in Milton Keynes, Firesand Ltd provides penetration testing services to improve your cyber security and protect your company against hackers.