The Pentagon Needs To Change How It Does AI

Rapid technological changes and automation are dramatically changing the nature of work and the focus of these changes is moving to military applications, especially in the field of Artificial Intelligence (AI). 

In the US there is an active debate over military leadership in technology and the competition with China, which focused on the assumption that there is a big first-mover advantage when it comes to AI technologies, 

Now,  the US Department of Defense (DoD) is considering organisational changes designed to create a more integrated approach to Data and AI, including the creation of a Chief Data and Artificial Intelligence Officer (CDAO).

 Technological leadership requires Data and AI management to be effective and the Pentagon's efforts to date are widely considered inadequate compared to those China. As an illustration, it is thought that there are 15 separate Pentagon managed  institutions investing in AI-related technologies, basic AI capabilities, or applications that use AI in development, each with its own separate processes, data, code and programs.

There is not enough structured coordination between them or oversight through a central “AI hub” and this only undermines the US’ ability to take the lead in new technologies. 

Consolidated oversight through creating an empowered CDAO could help ensure the DoD has the tools it needs to excel and ensure US defense innovation leadership moving forward.

Adopting emerging technologies requires experimenting with the institutional structures necessary to take advantage of them. The consolidation of the office of the CDO, the JAIC, and the DDS offices under the CDAO represents a potential moment of organisational growth for DoD when it comes to taking data and emerging technology seriously. 

  • The Chief Data Officer is responsible for data management and coordination across the Department.
  • The JAIC was created to help DoD enable and implement uses of artificial intelligence.
  • The Defense Digital Service is a data science strike team designed to handle data and security issues. 

Earlier in 2021, the JAIC became a direct report to the Deputy Secretary of Defense. Previously, it reported to the Chief Information Officer, however, the JAIC has a conflict between being a developer of algorithms itself and being an enabler that helps the military services work out how to develop and implement algorithms within relevant military programs. The JAIC does not  the authority to compel the military services and other institutions to collaborate, whereas a closer link between the Pentagon'’s data and AI hubs will give the overall development  effort better access to necessary data to succeed.

The proposed reorganisation could face bureaucratic obstacles that undermine the goal of consolidated AI, data, and digital leadership. For example, The organisation also needs the authority to get the Pentagon's various  components, especially the individual military services, to share data from databases never designed for sharing. 

The reorganisation seems necessary, because the existing institutions do not have the focus to effectively coordinate the Pentagon's efforts. 

The potential reorganisation of AI and data efforts will provide an opportunity for more integrated  emerging technology leadership that can connect with the required military capabilities and close relationships with other technology partners, whether in Research & Engineering or in the military services, will be essential. 

The  proposed  reorganisation will ultimately succeed or fail based on the support it receives from senior Pentagon leadership. The US has the technical and financial capacity to become a world leader in AI, but it needs to take the necessary steps to adopt technical innovations, if it is to succeed.

CFR:      CFR:       CFR:        DefenseOne:       Days Tech:      Breaking Defense:      DigiChat

You Might Also Read: 

NATO Publishes An Artificial Intelligence Strategy:

 

« Stealthy Malware Hiding Behind An Invalid Date
Microsoft's New AI Debugging Tool »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

CUIng.org

CUIng.org

The CUIng initiative was launched to tackle the problem of criminal exploitation of information hiding techniques.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

SecuLetter

SecuLetter

SecuLetter is able to detect unknown attacks with hybrid approaches, static and dynamic analysis.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

Magna5

Magna5

Magna5 is a managed IT service provider focusing in network and server monitoring, backup and disaster recovery, cybersecurity, help desk and SD-WAN.

Nullify

Nullify

Nullify is your automated security sentry that continuously finds and fixes security issues across your codebase.

Solvo

Solvo

Solvo enables security teams and other stakeholders to automatically uncover, prioritize, mitigate and remediate cloud infrastructure access risks.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Guardian Angel Cyber

Guardian Angel Cyber

Guardian Angel Cyber, is your trusted ally in safeguarding your digital assets and online presence.

Cyberleaf

Cyberleaf

Cyberleaf is simplified managed cybersecurity for MSPs, enabling top tier cyber protection for small and medium enterprise.

Cyber Dagger

Cyber Dagger

Cyber Dagger is a cybersecurity company driven by a mission to protect digital infrastructures and close the cybersecurity skills gap.