Using Artificial Intelligence In Military Operations

In modern warfare there is a necessity to keep pace with the volume and complexity of the data being generated and Artificial Intelligence (AI) will power the new  US Joint All-Domain Command and Control system. AI will will allow US military commanders to better communicate and make decisions. 

Indeed, AI could potentially revolutionise warfighting concepts based on manoeuvre, but there are several technical and operational hurdles that need to be overcome.

AI has many potential military uses:  AI-guided intelligence, surveillance and reconnaissance (ISR) and battle-management systems that provide commanders enhanced situational awareness could facilitate the quick identification of an enemy’s ‘centre of gravity’ in the battlespace and enable forces rapidly to coordinate joint attacks.

“We are going to use a lot of sensors, whether they're unmanned aerial systems, unmanned ground systems, unmanned maritime systems, unintended sensors, all working together, and what our goal is to have those working together collaboratively and autonomously,” US Special Operations Command (SOCOM) says acquistion chief executive, James Smith at a recent event

SOCOM doesn’t just want networks of sensors to collaborate better. They also want the underlying autonomy software to work the same on everything from a 3-D printer to a $10,000 drone. “We have a goal of what we're calling ‘portable autonomy,’ so being able to port software, virtual algorithms across different classes,” of small drones... We would have an autonomy developer actually have their software algorithms on a payload and then integrate that onto a third-party platform and demonstrate the ability to control that platform without talking to that third-party platform provider,” a spokesman told DefenseOne.

Part of the answer is to put more information and computing power on the battlefield instead of counting on being able to “reach back” for it. The military and SOCOM in particular have been trying to bring cloud capabilities much closer to the battlefield.

One example of tactical cloud use is integrating radar sensor data for air defense in the field, closer to the threat, rather than receiving an alert from a command centre.

AI uses machine learning to simulate the human mind’s problem-solving and decision-making capabilities, easing the cognitive load on humans, enabling quicker decision-making and follow-on actions. In an age of information overload, the issue the military and intelligence community must deal with isn’t having too little data to work with as it once may have been, but how to process all the available data to find and utilize what is important quickly and efficiently.

SOCOM’s commander, General Richard Clarke, has emphasised the importance of AI and cyber warfare, suggesting that the future of US special operations might not be with the operator on the ground but rather with the cyber soldier behind a keyboard.

AI is expected to be used more widely by the US Defense Department to maintain a lead against military competitors China and Russia. This means it will require updating policy and infrastructure, using cloud computing and highly skilled operators and leadership.

US Dept. Of Defense:     DefenseOne:     National Interest:     US Army:     National Defense Magazine

IISS:       Lockheed Martin:        GovExec:  

You Might Also Read: 

Cyber Warfare Needs Rules Of Engagement:

 

« Ransomware’s Serious Effects On Cyber Security
Critical Business Systems Left Unmonitored & Insecure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tymlez Software & Consulting

Tymlez Software & Consulting

Tymlez Software and Consulting is a start-up specialised in blockchain technology for enterprises.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Fortanix

Fortanix

Fortanix Runtime Encryption keeps keys, data, and applications completely protected from external and internal threats.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

CyberSalus

CyberSalus

CyberSalus is a pioneering cyber tech services company dedicated to protecting the digital integrity of healthcare organizations.