Military Operating Systems Bring AI To The Battlefield

The US finds itself in the middle of an Artificial Intelligence (AI) arms race, with the aim to gain decision dominance on the battlefield for whoever gets there first. 

Now, the Pentagon’s Joint Artificial Intelligence Center (JAIC) has begun a joint operating system that can use, make and field AI algorithms. AI is widely recognised as a vital military capability that will only grow in importance in the era of Multi-Domain Operations (MDO). In the MDO platforms and systems across land, sea, air, space and cyber will interact and reinforce one another.

In order to make this happen, military forces will process vast amounts of data using information processing, and AI can significantly improve the processes analysing data at a rate far beyond a human analyst. This work is one key piece of the centre’s new Artificial Intelligence and Data Accelerator (AIDA) set up by the US Dept. of Defense in 2021. 

AIDA  marks a broad initiative to boost data-based decision-making across the US military’s 11 combat commands.

“AIDA brings us, in small teams, out to the combatant commanders…And so what we're trying to do from an information advantage perspective is bring them the advantages of good data and good artificial intelligence-generating insights,” said AIDA Director, Lt. Gen. Michael Groen at a recent conference. Groen also said that his office has already begun working with different commands to help them shape and curate their data environments.

“Throughout AIDA, we hope to illuminate what's possible,” Groen said, and “do lots of experiments within their data environments to help them make sense of their environments more clearly.” Groen said 

In developing this new integration layer, the  aim is to make AI algorithm-sharing and usage easier for the military decision-makers involved. In Groen's view, it’s imperative for the United States to organise AI  innovation enough swiftly in order to be competitive against strategic competitors, particularly China, in the event of future conflict.

US Dept. of Defense:    DefensOne:      NextGov:      Real Clear Defense:    Shepard Media

You Might Also Read: 

China Intends To Be An AI Superpower:

 

« British Foreign Office Hacked
Vodafone Portugal Has Been Hacked »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

National Information Security & Safety Authority (NISSA) - Libya

National Information Security & Safety Authority (NISSA) - Libya

NISSA is responsible for safeguarding the integrity, availability and resilienceof ICT infrastructure, resources, services and data in Libya.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Privafy

Privafy

Privafy helps mobile service providers, IoT manufactures , and enterprises redefine the way they protect Data-in-Motion.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Offensive Security Manager (OSM)

Offensive Security Manager (OSM)

Offensive Security Manager is the ultimate AI software that will enforce offensive security automation, orchestration, coverage, ensure quality, and lets you manage whole process.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.

Promptfoo

Promptfoo

Promptfoo helps developers and enterprises build secure, reliable AI applications.