Ukraine Uses Artificial Intelligence To Speed Up Attacks

The 21st century has brought significant new developments in warfare. Technological development has led to major upgrades in military operations & tactics. The reality of the modern battlefield is presenting big challenges to established military theory, revealing significant gaps in ideas about the role of technology in modern warfare  

Indeed, Russia's failing invasion of Ukraine shows just how far modern technologies have shifted traditional warfare aa deomonstarted by the Ukrainian military, who are successfully applying advanced AI tools to publicly available imagery, producing critical actionable information for its soldiers.

Ukraine’s innovative, fast-moving military tactics owe a lot to weapons, planning, and AI intelligence in combined operations, demonstrating how to move intelligence in the form of actionable information quickly from satellites to military units on the ground. That means “trying to locate where the targets are now in the targeting board, you know, making sure that the effect that the commander wants on the battlefield is there and it's right there in the stack,” according to Lt. Gen. Daniel Karbler, the commanding general of US Army Space and Missile Defense Command.

New Software Tools

Innovative use of software tools is enabling the sort of highly mobile combat that Ukraine is using to push back Russian forces.

US defence contractor Palantir has developed MetaConstellation, which allows a user to specify a time and ground location. This can, for example, help identify the results of a recently launched a missile strike against a Russian forces, using an AI-assisted search of all the relevant data gathered by passing satellites to collect radio signals, thermal imagery, or aerial photos.

With this level of information, a ground commander to do the kind of search that used to be possible only at a higher HQ level, with the results available much faster than previously possible. 

Companies that sell military AI make expansive claims for what their technology can do. They say it can help with everything from the mundane to the lethal, including processing data from satellites or recognising patterns in data to help soldiers make quicker decisions on the battlefield.

  • Image recognition software can help with identifying targets. 
  • Autonomous drones can be used for surveillance or attacks on land, air, or water, or to help soldiers deliver supplies more safely than is possible by land. 

In a different example, the Ukrainian government has partnered with Clearview AI, which offers Ukrainian commanders facial recognition software to discover the social media profiles of deceased soldiers, which can be used to notify relatives and transfer bodies to the families.

Palantir:     Atlantic Council:     Defense One:        Economist:      Freiheit:     MIT:     Bloomberg:  

You Might Also Read: 

The Pentagon Gets $250m Extra To Spend On AI:

 

« Medibank Won’t Pay Ransom
The Reality Check For Small & Medium Businesses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Sonda

Sonda

SONDA is the leading systems integrator and IT service provider in Latin America.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.