The Pentagon Doesn’t Want To Use Real AI

The term “artificial intelligence” gets thrown around a lot today, especially in government circles, where leaders are eager to get ahead of the technological curve. But the military, at least, doesn’t really want true AI, according to a former deputy defense secretary.

“We are not talking about Skynets and we’re not talking about Terminators. Those are what you would call an artificial general intelligence-type weapon,” Bob Work, who served as deputy defense secretary under Presidents Obama and Trump said, speaking recently at the annual SAP NS2 Solutions Summit

“We’re looking for narrow AI systems that can compose courses of action to accomplish the tasks that the machine is given and it can choose among the courses of action.”

Work made a hard distinction between general AI and more narrow forms—what he preferred to call machine intelligence and algorithmic warfare.

“Improved autonomy is going to be the natural result of machine intelligence. We always use artificial intelligence, but I think machine intelligence is more accurate,” he said. “It’s the programmed ability to process information and, this is key, to make decisions as well as or better than human beings, and faster.”

He offered an example of a smart missile that is able to assess a situation, choose the best target based on preset parameters. In the example, the missile spots an enemy tank formation, determines which is the command tank and picks the most lethal form of attack to incapacitate the enemy.

“That is a good thing. It’s a totally autonomous weapon and it will do what it’s asked to do,” Work said. “It won’t say, ‘Hey, I woke up this morning and I decided I want to shoot down an airplane.’ A general AI system sets its own goals and can change them. No one in the Department of Defense is saying we ought to go toward those type of weapons.”

Work referenced the department’s Project Maven, a high-profile Pentagon program that made headlines when Google employees petitioned their company to remove itself from the project for ethical reasons. 

The former deputy secretary noted the true name inside the Pentagon is the Algorithmic Warfare Cross-Functional Team, with a focus on merging human and machine intelligence in a way that improves human decision-making.

“Human-machine collaboration is using machines to make better human decisions,” he said. “The human is always in front in terms of DOD thinking.”

Defense One:

You Might Also Read:

Killer Robots Are A Revolution In Warfare

« What Northrop’s Unified Platform Win Means For Cyber War
Britain Needs A Cyber Army To Defend Against Prolific Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

HYPR

HYPR

HYPR Decentralized Authentication minimizes the risk of enterprise data breaches while providing an enhanced user experience for your customers and employees.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.