The Next Big Conflict Will Turn On Artificial Intelligence

Imagine a sort of digital collection blitzkrieg, with data-gathering software and sensors setting of alarms left and right as they vacuum up info for a massive AI. 

Whoever collects the most data on Day One just might win the war before a single shot is fired. Therefore, the first day of the next major conflict shouldn’t look like war at all according to William Roper, who runs the Pentagon’s Strategic Capabilities Office, or SCO. 

“My prediction for the future is that when we go out to fly planes on the first day of battle, whether they are manned or unmanned, that the purpose of the first day or the second day will not be to go out and destroy enemy aircraft or other systems. 

It’s to go out, collect data, do data reconnaissance, so that our learning system gets smarter than [the enemy’s],” Roper said recently at an Air Force Association event. “Every day you fly, you get that exponential increase in sophistication.”

As head of the SCO, Roper helps the services turn existing technologies and weapons into surprising new capabilities…fast. He is the military’s foremost go-to guy to figure out how to use advances in technology to secure military advantage and how the enemy might do the same 

Roper says that the United States’ most important and overlooked asset is probably the digital information it produces in terrific abundance. Every second, data is pouring out of planes, satellites, and sensors related to targeting, machine performance, mission success, intelligence, and more. The military, he says, treats that data cheaply.

“We’re still focusing on data in a 1990s way: something you use to go into a fight and win and after that, the data, its raison d’être is over,” he says. The Air Force, in particular, is a “service that generates a lot of data and that goes into mission planning.”

That’s not how the commercial world values data, and particularly not companies like Facebook and Google. Many Silicon Valley companies are charging ahead with deep learning to create new products, services, and ways of outmaneuvering competitors.

“To them that data is…oil,” said Roper. “It’s wealth and fuel. Your data keeps working for you. You stockpile the most data that you can and train that to teach and train autonomous systems. Roper hopes to spread this notion throughout the Pentagon.

“Almost nowhere do I see a technology that’s current that offers as much as autonomy,” he said. “We’re working very hard to produce a learning system.”

He said the military had several “pathfinder” initiatives underway but could not go into detail.

Sooner rather than later, Roper envisions, American forces will train to go to war with highly networked (and largely disposable) drones and missiles, which would be in constant communication with one another, learning collectively, constantly, and in real time to take out targets and adapt new defensive strategies. 

Those connections, between every machine on the battlefield, with humans, with deep learning programs that crunch every available piece of information about enemy defenses, will result in a crushing Day Three for the enemy. At least that’s the hope.

Key to that strategy: drones and weapons that can improvise on their own while remain beholden to a human operator. Roper pointed to the Pentagon’s Perdix mini-drone swarm program. “You have no idea where the [drones] are going to go. That’s awesome, because the pilot doesn’t have to joystick each one of them.”

Roper, like every Defense Department leader we’ve talked to about autonomy and weapons, was careful to emphasise that the Pentagon is not looking to replace human decision-making. He echoed Undersecretary Bob Work, who has made collaboration with AIs as central aspect of the Pentagon’s technology strategy. He emphasised the role of the human operator as the “quarterback” in operations. “It’s kind of a technology we will have to keep our eyes on” he said.

Roper described his “biggest fear” as, “letting-perfect, exquisite government-only solutions be the pacing function for our military.”

That fear is one Roper shared with former Defense Secretary Ash Carter, who championed efforts to bypass bureaucratic acquisition cycles that move much, much slower than technology.

Carter’s successor, James Mattis, has so far been coy about his own research and development priorities. That may come out in the weeks ahead in the form of a budget.

DefenseOne

You Might Also Read:

Technology, Multilateralism, War and Peace:

Cyber War Calls For A New Look US Soldier:

China’s Intelligent Weaponry Gets Smarter:

 

 

« Cyber Attacks Against Korean Missile Launches
The Dark Web: What It Is And How It Works »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cleafy

Cleafy

Cleafy protects web and mobile applications from tampering attempts and deploys countermeasures to guarantee data and content integrity at scale.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

LRQA Nettitude

LRQA Nettitude

LRQA Nettitude is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Bounga Informatics

Bounga Informatics

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

CloudMask

CloudMask

CloudMask patent technology provides Dynamic Data Masking (DDM) that masks sensitive data, structured or non-structured, in real-time.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Sunartek Labs

Sunartek Labs

Sunartek are equipped with expert resources and advanced technology to identify cyber threats and prevent any breach, bypassing the security network of your organization.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.