Smart Artificial Intelligence

Alan Turing, computer genius of World War II Britain, posited in a 1950 paper that machines could possibly become as intelligent as humans.  The so-called Turing test put forward a scenario where development of computers would come to a point where a neutral observer could not tell the difference between a human and a machine in blind test responses. A machine could actually “think.”

It’s been controversial proposition since day one, but it is a foundation principle in the 21st century development of Artificial Intelligence (AI). And for the U.S. military, private sector businesses, and our political leadership, AI is today strongly enticing, quite opaque, and a potentially dangerous matter sitting right on our doorstep.

The Realities and the Concerns

AI today is nowhere near the Turing Test.  But, it is rapidly moving there with speed enhance by the promise of quantum computers which move the “thinking” software and algorithms on which AI is based far faster than any human could respond.  In an age of developing hypersonic weapons, ever more complex consumer supply chains, threatened and broken software encryption, and instaneously moving fake news, even these early versions of AI could provide a real tool to counter these problems and more.

The recent U.S. Commission on Artificial Intelligence, chaired by former Deputy Secretary of Defense Bob Work and Google chieftain Eric Schmidt examined the challenges of AI and the use of it by other nations around the world. The report painted a complex picture of the need for American development of AI.

The Commission noted our vulnerabilities in use of AI in warfare,  Intelligence gathering and analysis, and finding the right kind of talent to enable the advancement and use of AI.  It also expressed concern over the leakage of our technology to other nations (read: China – a nation that considers AI a top priority) and the challenges of our microelectronics industry staying ahead of the game. Oh yes, and a loose Intellectual Property system that does not protect American inventions from overseas poaching.  Add to that the age-old problem of needed additional investment in the development of AI from the government and the U.S. has some real AI headaches.

Person in the Loop and Bias

AI represents several other less tangible, but still important challenges and concerns.  For the military dealing with increasingly fast and complex weapons, AI represents a real countermeasure to such things as hypersonic missiles.  And, of course, we can use AI for our weapons.  The problem, however, is what will these weapons do undirected.  Humans still hold the lead in complex judgment.  How do you keep the human in the process and not retard the system’s effectiveness?  

Autonomous weapons, for instance, represent a real ethical problem.  A human in the loop would be able to make the judgement about when to fire a missile on a target based on whether the target could be hit without hitting other humans. What is the “value” of potential “collateral damage” – for instance, are they children, or family members, or simply in the wrong place?

Another big problem is bias in the AI systems themselves.  AI is based on software created by human beings who develop the algorithms for the use within the software. In short, it carries within it all the biases of the humans who wrote it.  As of now, the industry is dominated by white, middle class, “educated” males in their 20’s and 30’s. Does this lead to faulty choices when used such as predicting potential high crime areas to readjust police resources and focusing on ethnic neighborhoods? Indications are that it does.  Equally facial recognition seems to be a problem based on these “baked in” biases.

What Now for AI?

The AI Commission Report is a good first step in identifying problems and potential solutions.  However, the ground in D.C. is littered with bright reports done by bright people.  The best hope is that the tech-minded Biden Administration will go beyond picking up only the rhetorical charge on AI and make it an important part of our national security strategy – as currently does Beijing. 

We need to set rules for its use at home and among like-minded nations.  And we need to support its development in the U.S. --  providing R&D support, training a new generation of AI experts, and substantially improving our legal protection of our IP.   

Welcome to the 3rd decade of the 21st century.  Technology matters more than ever in national security policy.  And AI is the way of the future.

Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies                                           

Image: Unsplash

You Might Also Read:

A Successful Solar Winds Investigation:

 

« Cyber Security Supplier Directory - Are You Listed?
Five Great Online Cyber Security Courses For Beginners »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

Continuity Shop

Continuity Shop

Continuity Shop provides training and consultancy in Business Continuity and Information Security to some of the world's biggest organisations.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

CERT.JE

CERT.JE

CERT.JE is responsible for promoting and improving the cyber resilience across the critical national infrastructure, business communities and citizens in Jersey.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.