US Navy’s State-of-The-Art AI Drone

US Navy X-47B Unmanned Combat Air System makes an arrested carrier landing

The US Navy is looking for a drone that can fly over a damaged airfield and come up with a plan to get planes back in the air quickly, the head of the Navy Expeditionary Combat Command (NECC), Rear Adm. Brian Brakke, told defensenews.com recently.

“How can I use UAS to run the initial damage assessment across that airfield?” he asked, outlining his thinking.

“Is there artificial intelligence, deep machine learning, that can run across that field, scan it, tell me what munition I have left, what condition the airfield is in; then map out a plan that my teams can look at and say: ‘OK, this is how we’re going to attack this problem’?”

Experts say the technology for Brakke’s notional drone is partly available already, there are drones that can create this kind of maps of locations and send them back for analysis. But getting the drone to also come up with a plan of attack for repairing the damaged airfield is tricky.

“We’ve got commercial drones flying right now and taking volume measurements of stockpiles,” said Michael Blades, an analyst with consulting and research firm Frost & Sullivan, who studies unmanned systems.

“That kind of high-precision mapping and survey is going on right now. You can get a good three-dimensional map by flying over a few times.” The issue, Blades said, is the analysis piece, telling the difference between a rock and an unexploded ordnance is still very much reliant on expert human eyes. “To do that autonomously, that’s the leap,” he said.

Michael Horowitz, an unmanned systems expert at the University of Pennsylvania, agreed that what’s out there now isn’t exactly what Brakke is looking for.

“Current technologies could give you a high-fidelity map after an attack,” he said. “The ability to use that data to generate a blueprint to repair that runway would be a new step.”

Developing the AI to the level it can help operators plan airfield recoveries could range from relatively simple to enormously difficult, Horowitz said. An easier hurdle would be creating an algorithm that had four pre-programmed damage scenarios and recovery plans, and based on what the drone is seeing it could then recommend the best course of action.

Whatever technologies get delivered to NECC, Brakke said companies need to factor in maintenance and support needs. “If I don’t have the folks to work on it, to understand it, to maintain it, I’m not creating a more effective force, I’m creating something that’s going to sit on a shelf that we’re not going to use,” he said.

I-HLS

You Might Also Read:

British Royal Navy Drone Ships Will Replace Sailors:

The First Ghost Ship In The US Robotic Navy:

 

« A Revolution In Warfare Made Possible By AI
Is The US Constitutional Right To Free Speech Threatened Online? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

PrivateCore

PrivateCore

We protect data-in-use from hackers trying to steal data such as encryption keys, certificates, intellectual property.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

TriagingX

TriagingX

TriagingX successfully created the first generation malware sandbox that is being used by many Fortune 500 companies for daily malware analysis.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Dazz

Dazz

Dazz is the cloud security remediation platform for smart security and development teams.

IBM Security

IBM Security

IBM manufactures and markets computer hardware, middleware and software, and offers hosting and consulting services in areas ranging from mainframe computers to nanotechnology.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

Superna

Superna

Superna is the global leader in data security and cyberstorage solutions for unstructured data, both on-prem and in the hybrid multi-cloud.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.