Ukraine Uses Artificial Intelligence To Speed Up Attacks

The 21st century has brought significant new developments in warfare. Technological development has led to major upgrades in military operations & tactics. The reality of the modern battlefield is presenting big challenges to established military theory, revealing significant gaps in ideas about the role of technology in modern warfare  

Indeed, Russia's failing invasion of Ukraine shows just how far modern technologies have shifted traditional warfare aa deomonstarted by the Ukrainian military, who are successfully applying advanced AI tools to publicly available imagery, producing critical actionable information for its soldiers.

Ukraine’s innovative, fast-moving military tactics owe a lot to weapons, planning, and AI intelligence in combined operations, demonstrating how to move intelligence in the form of actionable information quickly from satellites to military units on the ground. That means “trying to locate where the targets are now in the targeting board, you know, making sure that the effect that the commander wants on the battlefield is there and it's right there in the stack,” according to Lt. Gen. Daniel Karbler, the commanding general of US Army Space and Missile Defense Command.

New Software Tools

Innovative use of software tools is enabling the sort of highly mobile combat that Ukraine is using to push back Russian forces.

US defence contractor Palantir has developed MetaConstellation, which allows a user to specify a time and ground location. This can, for example, help identify the results of a recently launched a missile strike against a Russian forces, using an AI-assisted search of all the relevant data gathered by passing satellites to collect radio signals, thermal imagery, or aerial photos.

With this level of information, a ground commander to do the kind of search that used to be possible only at a higher HQ level, with the results available much faster than previously possible. 

Companies that sell military AI make expansive claims for what their technology can do. They say it can help with everything from the mundane to the lethal, including processing data from satellites or recognising patterns in data to help soldiers make quicker decisions on the battlefield.

  • Image recognition software can help with identifying targets. 
  • Autonomous drones can be used for surveillance or attacks on land, air, or water, or to help soldiers deliver supplies more safely than is possible by land. 

In a different example, the Ukrainian government has partnered with Clearview AI, which offers Ukrainian commanders facial recognition software to discover the social media profiles of deceased soldiers, which can be used to notify relatives and transfer bodies to the families.

Palantir:     Atlantic Council:     Defense One:        Economist:      Freiheit:     MIT:     Bloomberg:  

You Might Also Read: 

The Pentagon Gets $250m Extra To Spend On AI:

 

« Medibank Won’t Pay Ransom
The Reality Check For Small & Medium Businesses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

Cybersprint

Cybersprint

Cybersprint's Digital Risk Protection platform continuously monitors your digital footprint so you can make informed decisions on exposure to online threats, identify vulnerabilities and take action.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

OAS Chain

OAS Chain

OAS Blockchain Renaissance Project presents three platforms that address the major challenges of public blockchain, private blockchain, and IoT security.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Cyber Skyline

Cyber Skyline

Cyber Skyline is a revolutionary cloud platform to practice, develop, and measure your team's technical cybersecurity skills.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

ThreatBlockr

ThreatBlockr

ThreatBlockr (formerly Bandura Cyber) is the only active defense cybersecurity platform that fully automates the enforcement, deployment and analysis of cyber intelligence at a massive scale.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.