Military


Learning from public sector experimentation with artificial intelligence Brookings Institution

#artificialintelligence

Understanding the difference between the causation and prediction policy problem is a critical first step for developing AI tools. Building powerful AI tools that aid decisionmaking (or make decisions outright) depends on the availability of large volumes of data. Finally, as we increasingly leverage AI tools for sorting, recommending, and making decisions, we have to pay attention to protecting these tools from hackers. Coordinated initiatives across public agencies are a good first step towards protecting data from hackers, particularly as AI tools become a critical component for public service delivery.


Farm Researchers Are Using Military Face-Recognition Software to Inspect Grapes

#artificialintelligence

This little robo-farmer is just one project developed by FarmView, a multidisciplinary, multi-institution effort to put advanced technology to use on the farm. With an exploding global population, we need to increase food production by 70 percent over the next 40 years if we hope to feed everybody, according to the United Nation's Food and Agriculture Organization. The sorghum-stabbing robot project puts technology to use in the field of crop breeding. By using this vision system while driving through the fields, a farmer can easily get all that data and make more prudent water decisions.


an-advanced-ai-has-been-deployed-to-fight-against-hackers

#artificialintelligence

The grid connects computers in more than 40 countries from more than 170 research facilities, and works like a power grid to some extent, providing computing resources to facilities based on demand. This presents a unique cybersecurity challenge: keeping the massive globally-distributed grid secure while maintaining the computing power and storage unimpeded. Machine learning can train a system to detect potential threats while retaining the flexibility that it needs to provide computing power and storage on demand. If they work well protecting just the part of the grid that ALICE (A Large Ion Collider Experiment) uses, the team can deploy AI cybersecurity measures throughout the system.


CARNAC program researching autonomous co-piloting

Robohub

DARPA, the Defense Advanced Research Projects Agency, is researching autonomous co-piloting so they can fly without a human pilot on board. RE2, the CMU spin-off located in Pittsburgh, makes mobile manipulators for defense and space. "Our team is excited to incorporate the Company's robotic manipulation expertise with proven technologies in applique systems, vision processing algorithms, and decision making to create a customized application that will allow a wide variety of existing aircraft to be outfitted with a robotic pilot," stated Jorgen Pedersen, president and CEO of RE2 Robotics. This application will open up a whole new market for our mobile robotic manipulator systems."


Why AI is crucial to cyber security

#artificialintelligence

This should include social engineering training and the use of AI/machine learning in your environment. Then, add a tool that gives you a holistic view of your entire network in real time that identifies advanced threats, including those stealthy, unconventional, silent attackers. Whereas cyber attackers in years past have struck quickly and loudly as part of a virtual sneak attack, today's cyber criminals are taking it much more slowly and methodically. Threat detection is certainly a main focus of today's AI and machine learning technology push.


US Intelligence director: "AI will replace 75 percent of spies"

#artificialintelligence

The annual conference, hosted by the United States Geospatial Intelligence Foundation, brings together technologists, soldiers, and intelligence professionals to discuss national security threats, changes in technology, and data collection and processing. The message he's sending to workers at the agency is that the goal of automation "isn't to get rid of you -- it's there to elevate you.… In Cardillo's eyes, the profession of geospatial intelligence – monitoring and exploiting commercial and proprietary video and imagery feeds, such as those available from global satellite surveillance company Planet – is on the precipice of a data explosion similar to when the internet took off. At that point, the National Security Agency (NSA), which is responsible for collecting and analysing digital communications, had to figure out ways to vacuum up and glean specific conclusions from an explosion of communications traveling back and forth on the web. RELATED: Promising'Genetic Chainsaw in a pill' could solve the world's antibiotic crisis NGA is responsible for tracking potential threats, such as military testing sites in North Korea.


IBM is working with the Air Force Research Lab on a TrueNorth 64-chip array

#artificialintelligence

IBM's chips are still too experimental to be used in mass production, but they've shown promise in running a special type of neural network called a spiking neural network. The chips are designed in such a way that researchers can run a single neural net on multiple data sets or run multiple neural nets on a single data set. Similar to other experimental computing hardware like chips enabling quantum annealing, IBM's TrueNorth approach has drawn criticism from some leaders of the field who say it offers limited advantages over more conventional custom chips, FPGAs and GPUs. He went on to argue that IBM's chips are designed for spiking neural networks, a type of network that hasn't shown as much promise as convolutional neural networks on common tasks like object recognition.


Five myths about machine learning in cybersecurity

#artificialintelligence

It can solve some creative tasks – recognize images, predict the weather, play chess, etc. In the majority of spheres where machine learning is used, the objective is not changing with time, while in the case of malware things are changing constantly and rapidly. Obviously, with rapidly modifying malware, a security solution based on a model without an antivirus database is worthless. However, it doesn't work like that, because the number of malware samples passing through the computer of an average client is much smaller than the amount of malware samples collected by an antivirus lab system.


Robots' role in humanity to be a core topic at TechCrunch Sessions: Robotics

#artificialintelligence

Prof. Barrett has more than 25 years experience in robotics, including VP of engineering at iRobot, director of the Walt Disney Imagineering Corporation, research engineer at MIT's Artificial Intelligence Laboratory, and technical director at Draper Laboratory. David Edelman is leading the Project on Technology, the Economy, and National Security (TENS) at the MIT, which is a joint position between MIT CSAIL and MIT's Center for International Studies. Edelman recently left government, where he served for the past seven years in a variety of roles, including Special Assistant to President Barack Obama on issues of the digital economy and national security, including the impact of robotics on the economy and cyberwarfare. Brian Pierce is the director of the DARPA Information Innovation Office (I2O) and has 30 years of experience developing advanced technologies in the aerospace/defense industry.


The future of the Air Force is fighter pilots leading drone swarms into battle

Popular Science

Earlier this month, Air Force F-35As were grounded because the system supplying oxygen to pilots failed, and the F-22 struggled with oxygen problems for years as well. Another challenge is the gravitational force on a pilot from sudden and sharp maneuvers; there is an upper limit on how much force a human body can withstand before they black out and possibly die. The primary target drone Fendley is talking about is the BQM-167 aerial target, which can cost between $750,000 and $900,000, depending on the options selected and the size of the order. That body is the basis for the Mako, one of two combat drones designed and built by Kratos.