The Pentagon Doesn’t Want To Use Real AI

The term “artificial intelligence” gets thrown around a lot today, especially in government circles, where leaders are eager to get ahead of the technological curve. But the military, at least, doesn’t really want true AI, according to a former deputy defense secretary.

“We are not talking about Skynets and we’re not talking about Terminators. Those are what you would call an artificial general intelligence-type weapon,” Bob Work, who served as deputy defense secretary under Presidents Obama and Trump said, speaking recently at the annual SAP NS2 Solutions Summit

“We’re looking for narrow AI systems that can compose courses of action to accomplish the tasks that the machine is given and it can choose among the courses of action.”

Work made a hard distinction between general AI and more narrow forms—what he preferred to call machine intelligence and algorithmic warfare.

“Improved autonomy is going to be the natural result of machine intelligence. We always use artificial intelligence, but I think machine intelligence is more accurate,” he said. “It’s the programmed ability to process information and, this is key, to make decisions as well as or better than human beings, and faster.”

He offered an example of a smart missile that is able to assess a situation, choose the best target based on preset parameters. In the example, the missile spots an enemy tank formation, determines which is the command tank and picks the most lethal form of attack to incapacitate the enemy.

“That is a good thing. It’s a totally autonomous weapon and it will do what it’s asked to do,” Work said. “It won’t say, ‘Hey, I woke up this morning and I decided I want to shoot down an airplane.’ A general AI system sets its own goals and can change them. No one in the Department of Defense is saying we ought to go toward those type of weapons.”

Work referenced the department’s Project Maven, a high-profile Pentagon program that made headlines when Google employees petitioned their company to remove itself from the project for ethical reasons. 

The former deputy secretary noted the true name inside the Pentagon is the Algorithmic Warfare Cross-Functional Team, with a focus on merging human and machine intelligence in a way that improves human decision-making.

“Human-machine collaboration is using machines to make better human decisions,” he said. “The human is always in front in terms of DOD thinking.”

Defense One:

You Might Also Read:

Killer Robots Are A Revolution In Warfare

« What Northrop’s Unified Platform Win Means For Cyber War
Britain Needs A Cyber Army To Defend Against Prolific Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Security Magazine

Security Magazine

Security, the business magazine for security executives, focuses on management issues facing top security professionals and effective solutions being employed, both physical and cyber.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Experian

Experian

Experian provide software solutions to help organizations prevent identity fraud and crime.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Micro Strategies Inc.

Micro Strategies Inc.

Micro Strategies provides IT solutions that help businesses tackle digital transformation in style.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

AnaVation

AnaVation

AnaVation is a trusted partner delivering high-value, cost-effective solutions that solve the most complex technical and analytical problems for our customers.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

BlastWave

BlastWave

BlastWave’s BlastShield integrates three innovative products into a single solution to help prevent inadvertent and intentional attacks.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.