AI Dominance On The Battlefield

In the near future, soldiers on the battlefield may depend more on Artificial Intelligence (AI) than their own comrades and in many cases those soldiers won’t need to be on or near near the battlefield. They might instead remotely operate sophisticated, intelligent and sensor-clad weapons possessing innate problem-solving abilities. AI is already part of our lives and as the technology matures, it will play a key role in future wars.

Battle lines have become opaque and an attack can come from terrorists who easily blend in as civilians, drones that are undetectable to the eye, and it is now being suggested that we can reduce human costs through the deployment of  AI and other computational agents.

AI by itself is not a game changer, but when it's paired with humans, it can be a great tool, particularly in the future of warfare, US Defense Department experts said. The most important element in the battlefield of the future won't be rockets, bullets or robots, but data and the ability to collect it from any point and send it where it is needed in the conflict zone.

As AI power develops, the push towards systems becoming autonomous will only increase, although at present the US militariy prefer to have a human involved in the decision-making loop. 

The majority of drones currently deployed around the world would lose their core functions if the data link connecting them to their human operator were severed.

Multi-Domain Warfare

Multi-domain warfare is designed to provide the ability to attack enemy targets at a rate that the enemy cannot withstand. 
The multi-domain warfare concept shifts the combat management paradigm from one-dimensional hierarchies and patterns, in which a platform with a specific sensor is used for a specific mission, to a distributed management approach, where each platform using advanced management tools can serve several missions and users. This makes resource allocation more efficient.

Consequently, there is a need to provide supporting intelligence at a sufficient rate, resolution and precision, while properly managing the intelligence gathering resources by using a “many-to-many” approach, in which multi-sensor platforms serve multiple users.

AI, could possibly be deployed on the battlefield in multidomain operations. 'Mosaic warfare,'' a concept being developed by the Defense Advanced Research Projects Agency, would link warfighter platforms, missile batteries, tanks, planes, ships and drones, through a communications network powered by AI. Layering a network with AI would enable the warfighter to better decide which asset is most effective in carrying out a specific mission. For example, if both Air Force and Navy aircraft are in an area to be targeted, AI could suggest which would be the better choice.

In a mosaic warfare ground scenario, AI might suggest sending an unmanned aerial vehicle or ground robot ahead of the main, ground battle force. That unmanned system might spot an enemy tank and pass the coordinates back, which are then relayed to a non-line-of-sight strike system in the rear that, in turn, launches its munitions and takes out the target. 

A new generation of autonomous vehicles is a high priority for military applications of AI, with much of the focus on navigation for a variety of unmanned land, sea, and air systems. Space and undersea platforms will also benefit from AI-informed guidance systems. 

AI is at the heart of the so-called drone swarms that have been the subject of much attention in recent years. AI-informed navigation software supported by ubiquitous sensors not only enables unmanned vehicles to find their way through hostile terrain, but also may eventually make it possible for complex formations of various types of drones operating in multiple domains, with complementary armaments to conduct sophisticated battle tactics. 

AI has steadily been increasing the power of simulations and gaming tools used to study nuclear and conventional weapons. 
Advances in AI-enhanced targeting and navigation also improve prospects for a wide range of tactical and strategic defense systems, especially ballistic missile defences, by empowering target acquisition, tracking, and discrimination. 

The interface between humans and machines, where the human in the loop is supposed to exert overall  control, raises critical questions about decision-making authority and organisational hierarchies. 

The rapid expansion of AI’s military applications throughout the world merits a high level of focused attention to minimise its negative impacts on strategic stability and to prevent nasty surprises. 

US Dept. of Defense:     US Army:    JSTOR / Defense University     Al Jazeera:      I-HLS   

London School of Economics:     Image: Unsplash

You Might Also Read:

The Emerging Domain Of  Cyber War:

 

« Worldwide Internet Outage Caused By Single Configuration Error
Developing A Sustainable Cyber Security Workforce »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

DCIT

DCIT

DCIT is a specialist in providing comprehensive consulting and auditing services in the field of information technology, PROVYS development software and security system AuditSquare.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

VariQ

VariQ

VariQ is a premier provider of Cybersecurity, Software Development and Cloud services to federal, state, and local government.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.