The Next Big Conflict Will Turn On Artificial Intelligence

Imagine a sort of digital collection blitzkrieg, with data-gathering software and sensors setting of alarms left and right as they vacuum up info for a massive AI. 

Whoever collects the most data on Day One just might win the war before a single shot is fired. Therefore, the first day of the next major conflict shouldn’t look like war at all according to William Roper, who runs the Pentagon’s Strategic Capabilities Office, or SCO. 

“My prediction for the future is that when we go out to fly planes on the first day of battle, whether they are manned or unmanned, that the purpose of the first day or the second day will not be to go out and destroy enemy aircraft or other systems. 

It’s to go out, collect data, do data reconnaissance, so that our learning system gets smarter than [the enemy’s],” Roper said recently at an Air Force Association event. “Every day you fly, you get that exponential increase in sophistication.”

As head of the SCO, Roper helps the services turn existing technologies and weapons into surprising new capabilities…fast. He is the military’s foremost go-to guy to figure out how to use advances in technology to secure military advantage and how the enemy might do the same 

Roper says that the United States’ most important and overlooked asset is probably the digital information it produces in terrific abundance. Every second, data is pouring out of planes, satellites, and sensors related to targeting, machine performance, mission success, intelligence, and more. The military, he says, treats that data cheaply.

“We’re still focusing on data in a 1990s way: something you use to go into a fight and win and after that, the data, its raison d’être is over,” he says. The Air Force, in particular, is a “service that generates a lot of data and that goes into mission planning.”

That’s not how the commercial world values data, and particularly not companies like Facebook and Google. Many Silicon Valley companies are charging ahead with deep learning to create new products, services, and ways of outmaneuvering competitors.

“To them that data is…oil,” said Roper. “It’s wealth and fuel. Your data keeps working for you. You stockpile the most data that you can and train that to teach and train autonomous systems. Roper hopes to spread this notion throughout the Pentagon.

“Almost nowhere do I see a technology that’s current that offers as much as autonomy,” he said. “We’re working very hard to produce a learning system.”

He said the military had several “pathfinder” initiatives underway but could not go into detail.

Sooner rather than later, Roper envisions, American forces will train to go to war with highly networked (and largely disposable) drones and missiles, which would be in constant communication with one another, learning collectively, constantly, and in real time to take out targets and adapt new defensive strategies. 

Those connections, between every machine on the battlefield, with humans, with deep learning programs that crunch every available piece of information about enemy defenses, will result in a crushing Day Three for the enemy. At least that’s the hope.

Key to that strategy: drones and weapons that can improvise on their own while remain beholden to a human operator. Roper pointed to the Pentagon’s Perdix mini-drone swarm program. “You have no idea where the [drones] are going to go. That’s awesome, because the pilot doesn’t have to joystick each one of them.”

Roper, like every Defense Department leader we’ve talked to about autonomy and weapons, was careful to emphasise that the Pentagon is not looking to replace human decision-making. He echoed Undersecretary Bob Work, who has made collaboration with AIs as central aspect of the Pentagon’s technology strategy. He emphasised the role of the human operator as the “quarterback” in operations. “It’s kind of a technology we will have to keep our eyes on” he said.

Roper described his “biggest fear” as, “letting-perfect, exquisite government-only solutions be the pacing function for our military.”

That fear is one Roper shared with former Defense Secretary Ash Carter, who championed efforts to bypass bureaucratic acquisition cycles that move much, much slower than technology.

Carter’s successor, James Mattis, has so far been coy about his own research and development priorities. That may come out in the weeks ahead in the form of a budget.

DefenseOne

You Might Also Read:

Technology, Multilateralism, War and Peace:

Cyber War Calls For A New Look US Soldier:

China’s Intelligent Weaponry Gets Smarter:

 

 

« Cyber Attacks Against Korean Missile Launches
The Dark Web: What It Is And How It Works »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

Cobwebs Technologies

Cobwebs Technologies

Cobwebs Technologies provide web intelligence solutions for Law Enforcement (including cybercrime), Intelligence Agencies and Federal Agencies.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Cyber Security Austria (CSA)

Cyber Security Austria (CSA)

Cyber Security Austria (CSA) is an independent non-profit association with the aim to address security issues in the area of IT/cyber security of critical/strategic infrastructures in Austria.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Bluewave

Bluewave

Bluewave are a strategic IT advisory company that offers businesses a simple and comprehensive way to purchase information technology solutions.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.