Ukraine Uses Artificial Intelligence To Speed Up Attacks

The 21st century has brought significant new developments in warfare. Technological development has led to major upgrades in military operations & tactics. The reality of the modern battlefield is presenting big challenges to established military theory, revealing significant gaps in ideas about the role of technology in modern warfare  

Indeed, Russia's failing invasion of Ukraine shows just how far modern technologies have shifted traditional warfare aa deomonstarted by the Ukrainian military, who are successfully applying advanced AI tools to publicly available imagery, producing critical actionable information for its soldiers.

Ukraine’s innovative, fast-moving military tactics owe a lot to weapons, planning, and AI intelligence in combined operations, demonstrating how to move intelligence in the form of actionable information quickly from satellites to military units on the ground. That means “trying to locate where the targets are now in the targeting board, you know, making sure that the effect that the commander wants on the battlefield is there and it's right there in the stack,” according to Lt. Gen. Daniel Karbler, the commanding general of US Army Space and Missile Defense Command.

New Software Tools

Innovative use of software tools is enabling the sort of highly mobile combat that Ukraine is using to push back Russian forces.

US defence contractor Palantir has developed MetaConstellation, which allows a user to specify a time and ground location. This can, for example, help identify the results of a recently launched a missile strike against a Russian forces, using an AI-assisted search of all the relevant data gathered by passing satellites to collect radio signals, thermal imagery, or aerial photos.

With this level of information, a ground commander to do the kind of search that used to be possible only at a higher HQ level, with the results available much faster than previously possible. 

Companies that sell military AI make expansive claims for what their technology can do. They say it can help with everything from the mundane to the lethal, including processing data from satellites or recognising patterns in data to help soldiers make quicker decisions on the battlefield.

  • Image recognition software can help with identifying targets. 
  • Autonomous drones can be used for surveillance or attacks on land, air, or water, or to help soldiers deliver supplies more safely than is possible by land. 

In a different example, the Ukrainian government has partnered with Clearview AI, which offers Ukrainian commanders facial recognition software to discover the social media profiles of deceased soldiers, which can be used to notify relatives and transfer bodies to the families.

Palantir:     Atlantic Council:     Defense One:        Economist:      Freiheit:     MIT:     Bloomberg:  

You Might Also Read: 

The Pentagon Gets $250m Extra To Spend On AI:

 

« Medibank Won’t Pay Ransom
The Reality Check For Small & Medium Businesses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Data Recovery Services (DRS)

Data Recovery Services (DRS)

DRS provides data recovery services from media including hard disk drives, RAID, solid state disks SSD, memory sticks, USB drives, SD cards, tapes and mobile phones.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Astute Technology Management

Astute Technology Management

Astute Technology Management helps businesses take control of their technology and work with greater confidence.

NewEvol

NewEvol

Don’t React, Evolve! Outsmart threats with real-time AI-powered dynamic defense capability of NewEvol all-in-one cybersecurity platform.