Using Artificial Intelligence In Military Operations

In modern warfare there is a necessity to keep pace with the volume and complexity of the data being generated and Artificial Intelligence (AI) will power the new  US Joint All-Domain Command and Control system. AI will will allow US military commanders to better communicate and make decisions. 

Indeed, AI could potentially revolutionise warfighting concepts based on manoeuvre, but there are several technical and operational hurdles that need to be overcome.

AI has many potential military uses:  AI-guided intelligence, surveillance and reconnaissance (ISR) and battle-management systems that provide commanders enhanced situational awareness could facilitate the quick identification of an enemy’s ‘centre of gravity’ in the battlespace and enable forces rapidly to coordinate joint attacks.

“We are going to use a lot of sensors, whether they're unmanned aerial systems, unmanned ground systems, unmanned maritime systems, unintended sensors, all working together, and what our goal is to have those working together collaboratively and autonomously,” US Special Operations Command (SOCOM) says acquistion chief executive, James Smith at a recent event

SOCOM doesn’t just want networks of sensors to collaborate better. They also want the underlying autonomy software to work the same on everything from a 3-D printer to a $10,000 drone. “We have a goal of what we're calling ‘portable autonomy,’ so being able to port software, virtual algorithms across different classes,” of small drones... We would have an autonomy developer actually have their software algorithms on a payload and then integrate that onto a third-party platform and demonstrate the ability to control that platform without talking to that third-party platform provider,” a spokesman told DefenseOne.

Part of the answer is to put more information and computing power on the battlefield instead of counting on being able to “reach back” for it. The military and SOCOM in particular have been trying to bring cloud capabilities much closer to the battlefield.

One example of tactical cloud use is integrating radar sensor data for air defense in the field, closer to the threat, rather than receiving an alert from a command centre.

AI uses machine learning to simulate the human mind’s problem-solving and decision-making capabilities, easing the cognitive load on humans, enabling quicker decision-making and follow-on actions. In an age of information overload, the issue the military and intelligence community must deal with isn’t having too little data to work with as it once may have been, but how to process all the available data to find and utilize what is important quickly and efficiently.

SOCOM’s commander, General Richard Clarke, has emphasised the importance of AI and cyber warfare, suggesting that the future of US special operations might not be with the operator on the ground but rather with the cyber soldier behind a keyboard.

AI is expected to be used more widely by the US Defense Department to maintain a lead against military competitors China and Russia. This means it will require updating policy and infrastructure, using cloud computing and highly skilled operators and leadership.

US Dept. Of Defense:     DefenseOne:     National Interest:     US Army:     National Defense Magazine

IISS:       Lockheed Martin:        GovExec:  

You Might Also Read: 

Cyber Warfare Needs Rules Of Engagement:

 

« Ransomware’s Serious Effects On Cyber Security
Critical Business Systems Left Unmonitored & Insecure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Ixia

Ixia

Ixia provides testing, visibility, and security solutions to strengthen applications across physical and virtual networks.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Conscia

Conscia

Conscia provides IT infrastructure solutions and 24/7 services in network, data center, security and mobility.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

HunCERT

HunCERT

HunCERT's mission is to assist Hungarian Internet Service Providers in applying appropriate procedures to address the risks of computer network incidents and to respond to such incidents.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

iTRUSTXForce

iTRUSTXForce

iTRUSTXForce is a global provider of DigitalX (cybersecurity, privacy, and digital trust) services. We offer comprehensive services that focus on delivering outcomes for our clients.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.