Artificial intelligence is a concept that seems tailor-made for the intelligence community. The ability to sort through massive amounts of data, seeking out patterns large and small, anomalies that warrant further investigation, that’s what intelligence analysts do already. Imagine what they could achieve when augmented by AI?
But it’s not as simple as just adopting it. Dean Souleles, chief technology advisor for the Office of the Director of National Intelligence, said on Agency in Focus – Intelligence Community that the IC is working now to lay the foundation for adopting AI. Read More
Tag Archives: DoD
Defense Innovation Board unveils AI ethics principles for the Pentagon
The Defense Innovation Board, a panel of 16 prominent technologists advising the Pentagon, today voted to approve AI ethics principles for the Department of Defense. The report includes 12 recommendations for how the U.S. military can apply ethics in the future for both combat and non-combat AI systems. The principles are broken into five main principles: responsible, equitable, traceable, reliable, and governable.
The principles state that humans should remain responsible for “developments, deployments, use and outcomes,” and AI systems used by the military should be free of bias that can lead to unintended human harm. Read More
Intelligence & National Security 2019 — Opening Plenary: Fireside Chat
Harnessing Data at the Speed of War
Decades of parochialism within the U.S. military fostered isolated digital networks that force the user to serve as integrator, squandering organizational energy and intellect. For the past 18 years, the U.S. and our partners have been fighting counterinsurgency and counterterrorism wars in Iraq and Afghanistan. In these theaters, arcane methods of digital collaboration with complicated workarounds became the norm, but our ability to set favorable conditions for operations mitigated the egregious distraction of outdated networks. In other words, we got away with it. We are unlikely to be so fortunate against adversaries like Russia or China that can match or exceed our capabilities. The ability to rapidly synthesize data to inform decision-making across all echelons and domains is necessary to achieve victory.
The services lack the ability to effectively communicate – whether internally, amongst one another, with the intelligence community, or with multinational partners. The DoD needs to establish joint data standards with the goal of creating commonly-accessible data. Without commonly-accessible data, the U.S. military will not realize the potential of 21st-century technologies. We remain too reactive and slow to mitigate risk and seize opportunities,[1] and our function- and service-centric infrastructure prevents digital collaboration. Read More
America Needs a “Dead Hand”
America’s nuclear command, control, and communications (NC3) system comprises many component systems that were designed and fielded during the Cold War — a period when nuclear missiles were set to launch from deep within Soviet territory, giving the United States sufficient time to react. That era is over. Today, Russian and Chinese nuclear modernization is rapidly compressing the time U.S. leaders will have to detect a nuclear launch, decide on a course of action, and direct a response. ….
If the ultimate purpose of the NC3 system is to ensure America’s senior leadership has the information and time needed to command and control nuclear forces, then the penultimate purpose of a reliable NC3 system is to reinforce the desired deterrent effect. To maintain the deterrent value of America’s strategic forces, the United States may need to develop something that might seem unfathomable — an automated strategic response system based on artificial intelligence. Read More
Finding enemy radars by Moonlight
Ever since radar proved a game-changer for air defence in World War II, increasingly advanced systems have enabled the accurate detection of enemy aircraft, ships, land systems and missiles and more. But adversaries have equivalent systems that pose a risk to military operations, and not knowing where they are could prove disastrous.
“So we created some business rules and put those manual verification and validation processes into software rules into our system which we’ve called Moonlight. Read More