US Navy’s State-of-The-Art AI Drone

US Navy X-47B Unmanned Combat Air System makes an arrested carrier landing

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly, the head of the Navy Expeditionary Combat Command (NECC), Rear Adm. Brian Brakke, told defensenews.com recently.

“How can I use UAS to run the initial damage assessment across that airfield?” he asked, outlining his thinking.

“Is there artificial intelligence, deep machine learning, that can run across that field, scan it, tell me what munition I have left, what condition the airfield is in; then map out a plan that my teams can look at and say: ‘OK, this is how we’re going to attack this problem’?”

Experts say the technology for Brakke’s notional drone is partly available already, there are drones that can create this kind of maps of locations and send them back for analysis. But getting the drone to also come up with a plan of attack for repairing the damaged airfield is tricky.

“We’ve got commercial drones flying right now and taking volume measurements of stockpiles,” said Michael Blades, an analyst with consulting and research firm Frost & Sullivan, who studies unmanned systems.

“That kind of high-precision mapping and survey is going on right now. You can get a good three-dimensional map by flying over a few times.” The issue, Blades said, is the analysis piece, telling the difference between a rock and an unexploded ordnance is still very much reliant on expert human eyes. “To do that autonomously, that’s the leap,” he said.

Michael Horowitz, an unmanned systems expert at the University of Pennsylvania, agreed that what’s out there now isn’t exactly what Brakke is looking for.

“Current technologies could give you a high-fidelity map after an attack,” he said. “The ability to use that data to generate a blueprint to repair that runway would be a new step.”

Developing the AI to the level it can help operators plan airfield recoveries could range from relatively simple to enormously difficult, Horowitz said. An easier hurdle would be creating an algorithm that had four pre-programmed damage scenarios and recovery plans, and based on what the drone is seeing it could then recommend the best course of action.

Whatever technologies get delivered to NECC, Brakke said companies need to factor in maintenance and support needs. “If I don’t have the folks to work on it, to understand it, to maintain it, I’m not creating a more effective force, I’m creating something that’s going to sit on a shelf that we’re not going to use,” he said.

I-HLS

You Might Also Read:

British Royal Navy Drone Ships Will Replace Sailors:

The First Ghost Ship In The US Robotic Navy:

 

« A Revolution In Warfare Made Possible By AI
Is The US Constitutional Right To Free Speech Threatened Online? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NSFOCUS Information Technology

NSFOCUS Information Technology

NSFOCUS is a global service provider and enterprise DDoS mitigation solution provider.

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Qmulos

Qmulos

Qmulos’ real-time continuous monitoring risk management suite, Q-Compliance, provides a massively flexible and scalable solution to optimizing operational security.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

CertNexus

CertNexus

CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.