Using Artificial Intelligence In Military Operations

In modern warfare there is a necessity to keep pace with the volume and complexity of the data being generated and Artificial Intelligence (AI) will power the new  US Joint All-Domain Command and Control system. AI will will allow US military commanders to better communicate and make decisions. 

Indeed, AI could potentially revolutionise warfighting concepts based on manoeuvre, but there are several technical and operational hurdles that need to be overcome.

AI has many potential military uses:  AI-guided intelligence, surveillance and reconnaissance (ISR) and battle-management systems that provide commanders enhanced situational awareness could facilitate the quick identification of an enemy’s ‘centre of gravity’ in the battlespace and enable forces rapidly to coordinate joint attacks.

“We are going to use a lot of sensors, whether they're unmanned aerial systems, unmanned ground systems, unmanned maritime systems, unintended sensors, all working together, and what our goal is to have those working together collaboratively and autonomously,” US Special Operations Command (SOCOM) says acquistion chief executive, James Smith at a recent event

SOCOM doesn’t just want networks of sensors to collaborate better. They also want the underlying autonomy software to work the same on everything from a 3-D printer to a $10,000 drone. “We have a goal of what we're calling ‘portable autonomy,’ so being able to port software, virtual algorithms across different classes,” of small drones... We would have an autonomy developer actually have their software algorithms on a payload and then integrate that onto a third-party platform and demonstrate the ability to control that platform without talking to that third-party platform provider,” a spokesman told DefenseOne.

Part of the answer is to put more information and computing power on the battlefield instead of counting on being able to “reach back” for it. The military and SOCOM in particular have been trying to bring cloud capabilities much closer to the battlefield.

One example of tactical cloud use is integrating radar sensor data for air defense in the field, closer to the threat, rather than receiving an alert from a command centre.

AI uses machine learning to simulate the human mind’s problem-solving and decision-making capabilities, easing the cognitive load on humans, enabling quicker decision-making and follow-on actions. In an age of information overload, the issue the military and intelligence community must deal with isn’t having too little data to work with as it once may have been, but how to process all the available data to find and utilize what is important quickly and efficiently.

SOCOM’s commander, General Richard Clarke, has emphasised the importance of AI and cyber warfare, suggesting that the future of US special operations might not be with the operator on the ground but rather with the cyber soldier behind a keyboard.

AI is expected to be used more widely by the US Defense Department to maintain a lead against military competitors China and Russia. This means it will require updating policy and infrastructure, using cloud computing and highly skilled operators and leadership.

US Dept. Of Defense:     DefenseOne:     National Interest:     US Army:     National Defense Magazine

IISS:       Lockheed Martin:        GovExec:  

You Might Also Read: 

Cyber Warfare Needs Rules Of Engagement:

 

« Ransomware’s Serious Effects On Cyber Security
Critical Business Systems Left Unmonitored & Insecure »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

CYBERPOL

CYBERPOL

CYBERPOL is the leading Public Utility Agency for investigating cyber crimes and cyber attacks by criminals, international adversaries.

Micro Focus

Micro Focus

Micro Focus is one of the world’s largest enterprise software providers. We deliver trusted and proven mission-critical software that keeps the digital world running.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

EY Advisory

EY Advisory

EY is a multinational professional services firm headquartered in the UK. EY Advisory service areas include Cybersecurity.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Obsidian Security

Obsidian Security

Protect your business-critical applications by mitigating threats and reducing risk with Obsidian, the first truly comprehensive security solution for SaaS.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Tek Yantra

Tek Yantra

Empower your business with our adept IT specialists, delivering rapid, scalable, and resilient cloud-based solutions designed to spur innovation and elevate productivity.