Ukraine Uses Artificial Intelligence To Speed Up Attacks

The 21st century has brought significant new developments in warfare. Technological development has led to major upgrades in military operations & tactics. The reality of the modern battlefield is presenting big challenges to established military theory, revealing significant gaps in ideas about the role of technology in modern warfare  

Indeed, Russia's failing invasion of Ukraine shows just how far modern technologies have shifted traditional warfare aa deomonstarted by the Ukrainian military, who are successfully applying advanced AI tools to publicly available imagery, producing critical actionable information for its soldiers.

Ukraine’s innovative, fast-moving military tactics owe a lot to weapons, planning, and AI intelligence in combined operations, demonstrating how to move intelligence in the form of actionable information quickly from satellites to military units on the ground. That means “trying to locate where the targets are now in the targeting board, you know, making sure that the effect that the commander wants on the battlefield is there and it's right there in the stack,” according to Lt. Gen. Daniel Karbler, the commanding general of US Army Space and Missile Defense Command.

New Software Tools

Innovative use of software tools is enabling the sort of highly mobile combat that Ukraine is using to push back Russian forces.

US defence contractor Palantir has developed MetaConstellation, which allows a user to specify a time and ground location. This can, for example, help identify the results of a recently launched a missile strike against a Russian forces, using an AI-assisted search of all the relevant data gathered by passing satellites to collect radio signals, thermal imagery, or aerial photos.

With this level of information, a ground commander to do the kind of search that used to be possible only at a higher HQ level, with the results available much faster than previously possible. 

Companies that sell military AI make expansive claims for what their technology can do. They say it can help with everything from the mundane to the lethal, including processing data from satellites or recognising patterns in data to help soldiers make quicker decisions on the battlefield.

  • Image recognition software can help with identifying targets. 
  • Autonomous drones can be used for surveillance or attacks on land, air, or water, or to help soldiers deliver supplies more safely than is possible by land. 

In a different example, the Ukrainian government has partnered with Clearview AI, which offers Ukrainian commanders facial recognition software to discover the social media profiles of deceased soldiers, which can be used to notify relatives and transfer bodies to the families.

Palantir:     Atlantic Council:     Defense One:        Economist:      Freiheit:     MIT:     Bloomberg:  

You Might Also Read: 

The Pentagon Gets $250m Extra To Spend On AI:

 

« Medibank Won’t Pay Ransom
The Reality Check For Small & Medium Businesses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

Baffle

Baffle

Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.