AI Targeted Drones Are Not Working

Both Russia and Ukraine had deployed small drones that used Artificial Intelligence (AI) to identify and to focus in on potential enemy targets, however, analysis of their current actual performance on the battlefield indicates they are inferior to human operators.

Using AI has meant that the drones, versions of the Russian Lancet and the Ukrainian Saker Scout, wouldn’t need a human operator to guide them all the way to impact. But now a detailed report from the Center for a New American Security (CNAS) dismisses the military effectiveness of these AI drones.

“The Lancet-3 was advertised as having autonomous target identification and engagement, although these claims are unverified...   Both parties claim to be using Artificial Intelligence to improve the drone’s ability to hit its target, but likely its use is limited.” according the the CNAS report.

Electronic warfare systems are designed to disrupt the operator’s control link, or worse, trace the transmission to its source for a precision strike, would have been largely useless against self-guided drones.

Has these AI drones proved more effective, it would have been a revolution in the use of deadly autonomous weapons.

Skilled drone operators are in short supply  could have been replaced by thousands of conscripts quickly trained to point-and-click on potential targets. Instead of every drone requiring an operator staring at its video feed full-time, a single human could have overseen a swarm of lethal machines.

Military AI would have taken a terrifying step towards independence from human control, however after months of frontline field-testing, neither Ukraine nor Russia’s AI-augmented drones seem to have made any measurable impact.

While access to Russian military documents or their AI drone’s performance data is not available, it does appear from the CNAS analysis of the Ukraine's' AI drones, that they are  are not working in the way that was anticipated.

CNAS     |      Breaking Defense     |     Bloomberg     |     Washington Post     |     Defence Blog     |    

CNAS     |     Forbes

ImageDiana Măceşanu

You Might Also Read: 

Artificial Intelligence & The Ethics Of War:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Surge In Ransomware & AI Defence Innovations
Major US Mobile Network Failure »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Gradient Cyber

Gradient Cyber

Gradient Cyber is a trusted cybersecurity partner specializing in small businesses and mid-market enterprises concerned about cybersecurity but lacking the staff to give it the attention it deserves.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.