Application Of Unmanned Military Systems

The field of Unmanned Systems is rapidly developing, as part of other burgeoning sectors, such as artificial intelligence, robotics and cyber. In the course of 2013, INSS carried out a study, which focused on Unmanned Vehicles. This program is designed to execute studies incorporating long-term technological projection and formulating policy. The following summarized the first of these studies, in an effort to serve as a model for subsequent ones.

1. The current status:
The current level of credibility unmanned ground and sea systems feature is considered quite low, in particular compared with unmanned aerial systems (UAS). Unmanned systems suffer from the lack of technical maturity when it comes to certain missions such as detection of explosive charges in open areas or in urban environments. These insights are in line with experts' assessment that unmanned systems are currently where household computers used to be in the 1980's. Furthermore, there is a great potential for a far-reaching improvement within 20 years.

2. In the future, we will see a major improvement in the performance of Autonomous systems, along with the level of trust we can have for them.

Unmanned systems are in for a significant improvement in terms of their respective abilities to gather intelligence, carry out reconnaissance missions, monitor sectors and detect targets, distinguish friendly enemy from friendly ones, as well as carry out damage assessment of enemy targets, i.e. infrastructure. These systems will have become simpler to operate. High system autonomy will allow each operator to control a larger number of vehicles at once. Respective systems will exhibit high levels of execution and high levels of credibility both singularly and as parts of larger formations. Furthermore, "wild cards" may well be introduced – systems with capabilities we nowadays perceive as fantastic, whose application would be tantamount to a 'game changer' compared with what we are familiar with today.

The primary consequences of these technology projections are that the bulk of military tactical missions could be planned in advanced and executed autonomously (with no human involvement) within 20 years. Using swarms of autonomous systems will play a growing part of the current face of the battlefield, and will greatly alter the pace of fighting, as well as other element of combat.

IHLS:

 

« Hacking Paranoia: Switzerland Cashing In By Marketing Itself As A 'Safe Haven' For Storing Data
The US and UK are to stage CyberWar against the Banks »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

Industrial Cyber Security

Industrial Cyber Security

Industrial Cyber Security provides specialist consulting services in enterprise and SCADA system security.

CyberPoint

CyberPoint

CyberPoint delivers innovative, leading-edge cyber security products, solutions, and services to customers worldwide.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

Telstra

Telstra

Telstra is one of the world's leading telecommunications and technology companies, offering a wider range of services from networks and cloud solutions to mobility and enterprise collaboration tools.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

Business Communications Inc (BCI)

Business Communications Inc (BCI)

BCI is a leading technology company known for its exceptional team of experienced engineers with a focus on providing top-notch technology and security products and services.