Smart Artificial Intelligence

Alan Turing, computer genius of World War II Britain, posited in a 1950 paper that machines could possibly become as intelligent as humans.  The so-called Turing test put forward a scenario where development of computers would come to a point where a neutral observer could not tell the difference between a human and a machine in blind test responses. A machine could actually “think.”

It’s been controversial proposition since day one, but it is a foundation principle in the 21st century development of Artificial Intelligence (AI). And for the U.S. military, private sector businesses, and our political leadership, AI is today strongly enticing, quite opaque, and a potentially dangerous matter sitting right on our doorstep.

The Realities and the Concerns

AI today is nowhere near the Turing Test.  But, it is rapidly moving there with speed enhance by the promise of quantum computers which move the “thinking” software and algorithms on which AI is based far faster than any human could respond.  In an age of developing hypersonic weapons, ever more complex consumer supply chains, threatened and broken software encryption, and instaneously moving fake news, even these early versions of AI could provide a real tool to counter these problems and more.

The recent U.S. Commission on Artificial Intelligence, chaired by former Deputy Secretary of Defense Bob Work and Google chieftain Eric Schmidt examined the challenges of AI and the use of it by other nations around the world. The report painted a complex picture of the need for American development of AI.

The Commission noted our vulnerabilities in use of AI in warfare,  Intelligence gathering and analysis, and finding the right kind of talent to enable the advancement and use of AI.  It also expressed concern over the leakage of our technology to other nations (read: China – a nation that considers AI a top priority) and the challenges of our microelectronics industry staying ahead of the game. Oh yes, and a loose Intellectual Property system that does not protect American inventions from overseas poaching.  Add to that the age-old problem of needed additional investment in the development of AI from the government and the U.S. has some real AI headaches.

Person in the Loop and Bias

AI represents several other less tangible, but still important challenges and concerns.  For the military dealing with increasingly fast and complex weapons, AI represents a real countermeasure to such things as hypersonic missiles.  And, of course, we can use AI for our weapons.  The problem, however, is what will these weapons do undirected.  Humans still hold the lead in complex judgment.  How do you keep the human in the process and not retard the system’s effectiveness?  

Autonomous weapons, for instance, represent a real ethical problem.  A human in the loop would be able to make the judgement about when to fire a missile on a target based on whether the target could be hit without hitting other humans. What is the “value” of potential “collateral damage” – for instance, are they children, or family members, or simply in the wrong place?

Another big problem is bias in the AI systems themselves.  AI is based on software created by human beings who develop the algorithms for the use within the software. In short, it carries within it all the biases of the humans who wrote it.  As of now, the industry is dominated by white, middle class, “educated” males in their 20’s and 30’s. Does this lead to faulty choices when used such as predicting potential high crime areas to readjust police resources and focusing on ethnic neighborhoods? Indications are that it does.  Equally facial recognition seems to be a problem based on these “baked in” biases.

What Now for AI?

The AI Commission Report is a good first step in identifying problems and potential solutions.  However, the ground in D.C. is littered with bright reports done by bright people.  The best hope is that the tech-minded Biden Administration will go beyond picking up only the rhetorical charge on AI and make it an important part of our national security strategy – as currently does Beijing. 

We need to set rules for its use at home and among like-minded nations.  And we need to support its development in the U.S. --  providing R&D support, training a new generation of AI experts, and substantially improving our legal protection of our IP.   

Welcome to the 3rd decade of the 21st century.  Technology matters more than ever in national security policy.  And AI is the way of the future.

Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies                                           

Image: Unsplash

You Might Also Read:

A Successful Solar Winds Investigation:

 

« Cyber Security Supplier Directory - Are You Listed?
Five Great Online Cyber Security Courses For Beginners »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

AusCERT

AusCERT

AusCERT is the premier Computer Emergency Response Team (CERT) in Australia and a leading CERT in the Asia/Pacific region

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

WireX Systems

WireX Systems

WireX is an innovative network intelligence and forensics company that is changing the way businesses resolve cyber-attacks.

Mondo

Mondo

Mondo is the largest national staffing agency specializing exclusively in high-end, niche IT, Tech, and Digital Marketing talent. Areas of expertise include Cybersecurity.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications provides critical, tactical capabilities that inform decision making in the most challenging environments.

Anterix

Anterix

Anterix is focused on empowering the modernization of critical infrastructure and enterprise businesses by enabling private broadband connectivity.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

SandboxAQ

SandboxAQ

SandboxAQ is an enterprise SaaS company combining AI + Quantum tech to solve hard problems impacting society.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.

LeakSignal

LeakSignal

At LeakSignal, we transform the way you monitor and protect your data. We provide unparalleled visibility and control over your sensitive data flows.