The Next Big Conflict Will Turn On Artificial Intelligence

Imagine a sort of digital collection blitzkrieg, with data-gathering software and sensors setting of alarms left and right as they vacuum up info for a massive AI. 

Whoever collects the most data on Day One just might win the war before a single shot is fired. Therefore, the first day of the next major conflict shouldn’t look like war at all according to William Roper, who runs the Pentagon’s Strategic Capabilities Office, or SCO. 

“My prediction for the future is that when we go out to fly planes on the first day of battle, whether they are manned or unmanned, that the purpose of the first day or the second day will not be to go out and destroy enemy aircraft or other systems. 

It’s to go out, collect data, do data reconnaissance, so that our learning system gets smarter than [the enemy’s],” Roper said recently at an Air Force Association event. “Every day you fly, you get that exponential increase in sophistication.”

As head of the SCO, Roper helps the services turn existing technologies and weapons into surprising new capabilities…fast. He is the military’s foremost go-to guy to figure out how to use advances in technology to secure military advantage and how the enemy might do the same 

Roper says that the United States’ most important and overlooked asset is probably the digital information it produces in terrific abundance. Every second, data is pouring out of planes, satellites, and sensors related to targeting, machine performance, mission success, intelligence, and more. The military, he says, treats that data cheaply.

“We’re still focusing on data in a 1990s way: something you use to go into a fight and win and after that, the data, its raison d’être is over,” he says. The Air Force, in particular, is a “service that generates a lot of data and that goes into mission planning.”

That’s not how the commercial world values data, and particularly not companies like Facebook and Google. Many Silicon Valley companies are charging ahead with deep learning to create new products, services, and ways of outmaneuvering competitors.

“To them that data is…oil,” said Roper. “It’s wealth and fuel. Your data keeps working for you. You stockpile the most data that you can and train that to teach and train autonomous systems. Roper hopes to spread this notion throughout the Pentagon.

“Almost nowhere do I see a technology that’s current that offers as much as autonomy,” he said. “We’re working very hard to produce a learning system.”

He said the military had several “pathfinder” initiatives underway but could not go into detail.

Sooner rather than later, Roper envisions, American forces will train to go to war with highly networked (and largely disposable) drones and missiles, which would be in constant communication with one another, learning collectively, constantly, and in real time to take out targets and adapt new defensive strategies. 

Those connections, between every machine on the battlefield, with humans, with deep learning programs that crunch every available piece of information about enemy defenses, will result in a crushing Day Three for the enemy. At least that’s the hope.

Key to that strategy: drones and weapons that can improvise on their own while remain beholden to a human operator. Roper pointed to the Pentagon’s Perdix mini-drone swarm program. “You have no idea where the [drones] are going to go. That’s awesome, because the pilot doesn’t have to joystick each one of them.”

Roper, like every Defense Department leader we’ve talked to about autonomy and weapons, was careful to emphasise that the Pentagon is not looking to replace human decision-making. He echoed Undersecretary Bob Work, who has made collaboration with AIs as central aspect of the Pentagon’s technology strategy. He emphasised the role of the human operator as the “quarterback” in operations. “It’s kind of a technology we will have to keep our eyes on” he said.

Roper described his “biggest fear” as, “letting-perfect, exquisite government-only solutions be the pacing function for our military.”

That fear is one Roper shared with former Defense Secretary Ash Carter, who championed efforts to bypass bureaucratic acquisition cycles that move much, much slower than technology.

Carter’s successor, James Mattis, has so far been coy about his own research and development priorities. That may come out in the weeks ahead in the form of a budget.

DefenseOne

You Might Also Read:

Technology, Multilateralism, War and Peace:

Cyber War Calls For A New Look US Soldier:

China’s Intelligent Weaponry Gets Smarter:

 

 

« Cyber Attacks Against Korean Missile Launches
The Dark Web: What It Is And How It Works »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

InfoGuard

InfoGuard

InfoGuard is a leading Swiss company providing comprehensive cyber security and network solutions.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

CENSUS

CENSUS

CENSUS is a Cybersecurity services provider offering services to multiple industries worldwide such as Security Testing, Code Auditing, Secure SDLC, Vulnerability Research and Consulting Services.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

Vigilant Ops

Vigilant Ops

Vigilant Ops is a leader in Software Bill of Materials (SBOM) Automation. A proactive approach to cybersecurity with continuous vulnerability monitoring.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.