The Pentagon Needs To Change How It Does AI

Rapid technological changes and automation are dramatically changing the nature of work and the focus of these changes is moving to military applications, especially in the field of Artificial Intelligence (AI). 

In the US there is an active debate over military leadership in technology and the competition with China, which focused on the assumption that there is a big first-mover advantage when it comes to AI technologies, 

Now,  the US Department of Defense (DoD) is considering organisational changes designed to create a more integrated approach to Data and AI, including the creation of a Chief Data and Artificial Intelligence Officer (CDAO).

 Technological leadership requires Data and AI management to be effective and the Pentagon's efforts to date are widely considered inadequate compared to those China. As an illustration, it is thought that there are 15 separate Pentagon managed  institutions investing in AI-related technologies, basic AI capabilities, or applications that use AI in development, each with its own separate processes, data, code and programs.

There is not enough structured coordination between them or oversight through a central “AI hub” and this only undermines the US’ ability to take the lead in new technologies. 

Consolidated oversight through creating an empowered CDAO could help ensure the DoD has the tools it needs to excel and ensure US defense innovation leadership moving forward.

Adopting emerging technologies requires experimenting with the institutional structures necessary to take advantage of them. The consolidation of the office of the CDO, the JAIC, and the DDS offices under the CDAO represents a potential moment of organisational growth for DoD when it comes to taking data and emerging technology seriously. 

  • The Chief Data Officer is responsible for data management and coordination across the Department.
  • The JAIC was created to help DoD enable and implement uses of artificial intelligence.
  • The Defense Digital Service is a data science strike team designed to handle data and security issues. 

Earlier in 2021, the JAIC became a direct report to the Deputy Secretary of Defense. Previously, it reported to the Chief Information Officer, however, the JAIC has a conflict between being a developer of algorithms itself and being an enabler that helps the military services work out how to develop and implement algorithms within relevant military programs. The JAIC does not  the authority to compel the military services and other institutions to collaborate, whereas a closer link between the Pentagon'’s data and AI hubs will give the overall development  effort better access to necessary data to succeed.

The proposed reorganisation could face bureaucratic obstacles that undermine the goal of consolidated AI, data, and digital leadership. For example, The organisation also needs the authority to get the Pentagon's various  components, especially the individual military services, to share data from databases never designed for sharing. 

The reorganisation seems necessary, because the existing institutions do not have the focus to effectively coordinate the Pentagon's efforts. 

The potential reorganisation of AI and data efforts will provide an opportunity for more integrated  emerging technology leadership that can connect with the required military capabilities and close relationships with other technology partners, whether in Research & Engineering or in the military services, will be essential. 

The  proposed  reorganisation will ultimately succeed or fail based on the support it receives from senior Pentagon leadership. The US has the technical and financial capacity to become a world leader in AI, but it needs to take the necessary steps to adopt technical innovations, if it is to succeed.

CFR:      CFR:       CFR:        DefenseOne:       Days Tech:      Breaking Defense:      DigiChat

You Might Also Read: 

NATO Publishes An Artificial Intelligence Strategy:

 

« Stealthy Malware Hiding Behind An Invalid Date
Microsoft's New AI Debugging Tool »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

ANIS

ANIS

ANIS represents the interests of Romanian IT companies and supports the development of the software and services industry.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Cyral

Cyral

Easily observe, control, and protect your data endpoints in a cloud and DevOps-first world. Discover Data Mesh Security with Cyral.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.