Smart Artificial Intelligence

Alan Turing, computer genius of World War II Britain, posited in a 1950 paper that machines could possibly become as intelligent as humans.  The so-called Turing test put forward a scenario where development of computers would come to a point where a neutral observer could not tell the difference between a human and a machine in blind test responses. A machine could actually “think.”

It’s been controversial proposition since day one, but it is a foundation principle in the 21st century development of Artificial Intelligence (AI). And for the U.S. military, private sector businesses, and our political leadership, AI is today strongly enticing, quite opaque, and a potentially dangerous matter sitting right on our doorstep.

The Realities and the Concerns

AI today is nowhere near the Turing Test.  But, it is rapidly moving there with speed enhance by the promise of quantum computers which move the “thinking” software and algorithms on which AI is based far faster than any human could respond.  In an age of developing hypersonic weapons, ever more complex consumer supply chains, threatened and broken software encryption, and instaneously moving fake news, even these early versions of AI could provide a real tool to counter these problems and more.

The recent U.S. Commission on Artificial Intelligence, chaired by former Deputy Secretary of Defense Bob Work and Google chieftain Eric Schmidt examined the challenges of AI and the use of it by other nations around the world. The report painted a complex picture of the need for American development of AI.

The Commission noted our vulnerabilities in use of AI in warfare,  Intelligence gathering and analysis, and finding the right kind of talent to enable the advancement and use of AI.  It also expressed concern over the leakage of our technology to other nations (read: China – a nation that considers AI a top priority) and the challenges of our microelectronics industry staying ahead of the game. Oh yes, and a loose Intellectual Property system that does not protect American inventions from overseas poaching.  Add to that the age-old problem of needed additional investment in the development of AI from the government and the U.S. has some real AI headaches.

Person in the Loop and Bias

AI represents several other less tangible, but still important challenges and concerns.  For the military dealing with increasingly fast and complex weapons, AI represents a real countermeasure to such things as hypersonic missiles.  And, of course, we can use AI for our weapons.  The problem, however, is what will these weapons do undirected.  Humans still hold the lead in complex judgment.  How do you keep the human in the process and not retard the system’s effectiveness?  

Autonomous weapons, for instance, represent a real ethical problem.  A human in the loop would be able to make the judgement about when to fire a missile on a target based on whether the target could be hit without hitting other humans. What is the “value” of potential “collateral damage” – for instance, are they children, or family members, or simply in the wrong place?

Another big problem is bias in the AI systems themselves.  AI is based on software created by human beings who develop the algorithms for the use within the software. In short, it carries within it all the biases of the humans who wrote it.  As of now, the industry is dominated by white, middle class, “educated” males in their 20’s and 30’s. Does this lead to faulty choices when used such as predicting potential high crime areas to readjust police resources and focusing on ethnic neighborhoods? Indications are that it does.  Equally facial recognition seems to be a problem based on these “baked in” biases.

What Now for AI?

The AI Commission Report is a good first step in identifying problems and potential solutions.  However, the ground in D.C. is littered with bright reports done by bright people.  The best hope is that the tech-minded Biden Administration will go beyond picking up only the rhetorical charge on AI and make it an important part of our national security strategy – as currently does Beijing. 

We need to set rules for its use at home and among like-minded nations.  And we need to support its development in the U.S. --  providing R&D support, training a new generation of AI experts, and substantially improving our legal protection of our IP.   

Welcome to the 3rd decade of the 21st century.  Technology matters more than ever in national security policy.  And AI is the way of the future.

Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies                                           

Image: Unsplash

You Might Also Read:

A Successful Solar Winds Investigation:

 

« Cyber Security Supplier Directory - Are You Listed?
Five Great Online Cyber Security Courses For Beginners »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

PurpleSynapz

PurpleSynapz

PurpleSynapz provides hyper-realistic Cyber Security Training with a modern curriculum and Cyber Range.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Digital Craftsmen Ltd

Digital Craftsmen Ltd

We're ISO27001 & Cyber Essentials Cybersecurity experts, delivering full cloud security and managed services. We take a bespoke approach for each client from hosting, optimising & securing them online

eMazzanti Technologies

eMazzanti Technologies

eMazzanti Technologies provides IT consulting services for businesses ranging from home offices to multinational corporations throughout the USA and internationally.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).