Will The CIA Be Run By Robots…?

The CIA currently has 137 different artificial intelligence pilot projects underway, according to a senior agency official.

Dawn Meyerriecks, the CIA’s deputy director for science and technology, told an audience at the annual Intelligence and National Security Summit in Washington that the agency has a “punch list” of different artificial intelligence problems that it wants the private sector to work on. The CIA is already coordinating this work with In-Q-Tel, the agency’s venture capital firm, she said.

The intelligence community has been eyeing artificial intelligence and machine learning to replace some of the tedious tasks its analysts perform for a while now. 

In June, Robert Cardillo, the director of the National Geospatial-Intelligence Agency, vowed to bring in robots to do 75 percent of the tasks currently being done by employees to analyse and interpret images beamed in from feeds around the globe and in space.

The CIA and other intelligence agencies have been investing in artificial intelligence for decades and the technology is already prevalent in certain security applications including facial and voice recognition. But there are a growing number of more ambitious practical applications, including in detecting malicious hacking online and helping pilot drones and other autonomous vehicles.

The transition from analyst to robot won’t necessarily be seamless, however. Replacing analysts with algorithms is troubling to some who believe humans are irreplaceable in the delicate art of intelligence. “We can’t just feed information into a black box,” Meyerriecks said. “We can’t go to leadership with recommendations when we don’t understand what happened in the middle.”
But intelligence officials are warning that adversaries and competitors like Russia and China are competing for similar capabilities.

Some technology that was proprietary even 10 years ago in the United States is “mass-produced in China today,” Brian Sadler, a senior research scientist for intelligence systems for the US Army, said during another panel at the conference. 
Meyerriecks, however, said she was confident in the United States’ long-term ability to outpace its opponents. “If there’s a bear in the woods, I just have to be faster than the slowest person,” she said.

Foreign Policy:

You Might Also Read:

Ethics of Drones, Remote Weapons and Robots:

Give Robots Human Status:
 

 

« Essentials: A Cybersecurity Strategy For Healthcare
The IoT Will Bring Cyberwar Close To Home »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

CynergisTek

CynergisTek

CynergisTek is a top-ranked cybersecurity and information management consulting firm dedicated to serving the healthcare industry.

CONCORDIA

CONCORDIA

Concordia is a Cybersecurity Competence Network with leading research, technology, and competences to build the European Secure, Resilient and Trusted Ecosystem.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

TryHackMe

TryHackMe

TryHackMe is an online platform that teaches cyber security through short, gamified real-world labs. We have content for both complete beginners and seasoned hackers.

Trilateral Research

Trilateral Research

Trilateral Research provide regulatory and policy advice; develop new data-driven technologies and contribute to the latest standards in safeguarding privacy, ethics and human rights.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

Papua New Guinea National Cyber Security Centre (PNG NCSC)

Papua New Guinea National Cyber Security Centre (PNG NCSC)

PNG NCSC is a jointly funded initiative enabling PNG to benefit with the most advanced cyber protection of its critical information and communications technology infrastructure.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.