Using Artificial Intelligence In Military Operations

In modern warfare there is a necessity to keep pace with the volume and complexity of the data being generated and Artificial Intelligence (AI) will power the new  US Joint All-Domain Command and Control system. AI will will allow US military commanders to better communicate and make decisions. 

Indeed, AI could potentially revolutionise warfighting concepts based on manoeuvre, but there are several technical and operational hurdles that need to be overcome.

AI has many potential military uses:  AI-guided intelligence, surveillance and reconnaissance (ISR) and battle-management systems that provide commanders enhanced situational awareness could facilitate the quick identification of an enemy’s ‘centre of gravity’ in the battlespace and enable forces rapidly to coordinate joint attacks.

“We are going to use a lot of sensors, whether they're unmanned aerial systems, unmanned ground systems, unmanned maritime systems, unintended sensors, all working together, and what our goal is to have those working together collaboratively and autonomously,” US Special Operations Command (SOCOM) says acquistion chief executive, James Smith at a recent event

SOCOM doesn’t just want networks of sensors to collaborate better. They also want the underlying autonomy software to work the same on everything from a 3-D printer to a $10,000 drone. “We have a goal of what we're calling ‘portable autonomy,’ so being able to port software, virtual algorithms across different classes,” of small drones... We would have an autonomy developer actually have their software algorithms on a payload and then integrate that onto a third-party platform and demonstrate the ability to control that platform without talking to that third-party platform provider,” a spokesman told DefenseOne.

Part of the answer is to put more information and computing power on the battlefield instead of counting on being able to “reach back” for it. The military and SOCOM in particular have been trying to bring cloud capabilities much closer to the battlefield.

One example of tactical cloud use is integrating radar sensor data for air defense in the field, closer to the threat, rather than receiving an alert from a command centre.

AI uses machine learning to simulate the human mind’s problem-solving and decision-making capabilities, easing the cognitive load on humans, enabling quicker decision-making and follow-on actions. In an age of information overload, the issue the military and intelligence community must deal with isn’t having too little data to work with as it once may have been, but how to process all the available data to find and utilize what is important quickly and efficiently.

SOCOM’s commander, General Richard Clarke, has emphasised the importance of AI and cyber warfare, suggesting that the future of US special operations might not be with the operator on the ground but rather with the cyber soldier behind a keyboard.

AI is expected to be used more widely by the US Defense Department to maintain a lead against military competitors China and Russia. This means it will require updating policy and infrastructure, using cloud computing and highly skilled operators and leadership.

US Dept. Of Defense:     DefenseOne:     National Interest:     US Army:     National Defense Magazine

IISS:       Lockheed Martin:        GovExec:  

You Might Also Read: 

Cyber Warfare Needs Rules Of Engagement:

 

« Ransomware’s Serious Effects On Cyber Security
Critical Business Systems Left Unmonitored & Insecure »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DKCERT

DKCERT

DKCERT (Danish Computer Security Incident Response Team) handles security incidents on forskningsnettet, the National Research and Education Network (NREN) in Denmark.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

Intigriti

Intigriti

Intigriti helps companies protect themselves from cybercrime. Our community of ethical hackers provides continuous, realistic security testing to protect our customer’s assets and brand.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

CESAR

CESAR

CESAR is one of the premier R+D and innovation centers in Brazil and a designated Cybersecurity Competence Center.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.