Online glitches are basically modern day gremlins--and they can cost companies millions of dollars. With so much data to check and double-check, maybe artificial intelligence (AI) can help stop these "gremlins" from wreaking havoc online. Perhaps the most iconic World War II cartoon is the Warner Bros. episode "Falling Hare." Bugs Bunny pooh-poohs the notion of gremlins committing sabotage on the Allied war effort, until those little creatures cause malfunctions in everything from bombs to planes, with devastating results in the Merrie Melodies classic. SEE ALSO: The'Quantum Computing' Decade Is Coming--Why You Should Care According to Robert O. Harder, in a piece published by MHQ--The Quarterly Journal of Military History, "gremlins" were tall tales told by pilots of mischief makers that would infect aircraft, causing all kinds of maladies.
The Pentagon launched its Joint Artificial Intelligence Center in 2018 to strategically unify and accelerate AI applications across the nation's defense and military enterprise. Insiders at the center have now spent about nine months executing that defense driven AI-support. At an ACT-IAC forum in Washington Wednesday, Rachael Martin, the JAIC's mission chief of Intelligent Business Automation Augmentation and Analytics, highlighted insiders' early approach to automation and innovation. "Our mission is to transform the [Defense] business process through AI technologies, to improve efficiency and accuracy--but really to do all those things so that we can improve our overall warfighter support," Martin said. Within her specific mission area, Martin and the team explore and develop automated applications that support a range of efforts across the Pentagon, such as business administration, human capital management, acquisitions, finance and budget training, and beyond.
As one of the leading enterprise AI software providers, C3.ai is renowned for building enterprise-scale AI applications and harnessing digital transformation. The C3 AI Suite is software that uses a model-driven architecture to speed up delivery and reduce the complexities of developing enterprise-scale AI applications. Supply Chain Digital takes a closer look at the AI firm. The Suite propels organisations to deliver AI-enabled applications quicker than alternative methods while reducing the technical debt from maintaining and upgrading these applications. Its solutions cater to a range of different industries such as manufacturing, oil and gas, utilities, banking, aerospace and defence, healthcare, retail, telecoms, smart cities and transportation.
BEFORE PULLING the trigger, a sniper planning to assassinate an enemy operative must be sure the right person is in the cross-hairs. Western forces commonly use software that compares a suspect's facial features or gait with those recorded in libraries of biometric data compiled by police and intelligence agencies. Such technology can, however, be foiled by a disguise, head-covering or even an affected limp. For this reason America's Special Operations Command (SOC), which oversees the units responsible for such operations in the various arms of America's forces, has long wanted extra ways to confirm a potential target's identity. Responding to a request from SOC, the Combating Terrorism Technical Support Office (CTTSO), an agency of the defence department, has now developed a new tool for the job.
WASHINGTON – President Donald Trump unveiled the logo for the U.S. Space Force on Friday, attracting critics who said America's newest military branch had boldly gone where "Star Trek" went before. With a central symbol resembling an arrowhead, ringed by an orbiting object and set to a starry backdrop, many people argued the design was pilfered from the famous science fiction franchise. But a spokesman for the branch hit back, arguing that the "Delta" emblem had been used by U.S. Air Force space organizations as early as 1961, before the first Star Trek show aired. The emblem also closely resembles the "widget" logo adopted by Delta Air Lines in 1959. "After consultation with our Great Military Leaders, designers, and others, I am pleased to present the new logo for the United States Space Force, the Sixth Branch of our Magnificent Military!" wrote Trump of the branch he championed and which came into being in December 2019.
WASHINGTON – The Pentagon disclosed on Friday that 34 U.S. service members suffered traumatic brain injury in Iran's missile strike this month on an Iraqi air base, and although half have returned to work, the casualty total belies President Donald Trump's initial claim that no Americans were harmed. He later characterized the injuries as "not very serious." Eight of the injured arrived in the United States on Friday from Germany, where they and nine others had been flown days after the Jan. 8 missile strike on Iraq's Ain al-Asad air base. The nine still in Germany are receiving treatment and evaluation at Landstuhl Regional Medical Center, the largest U.S. military hospital outside the continental United States. Jonathan Hoffman, the chief Pentagon spokesman, said the eight in the U.S. will be treated at Walter Reed National Military Medical Center at Bethesda, Maryland, or at their home bases.
WASHINGTON – U.S. Defense Secretary Mark Esper said on Friday that China's Communist Party had created a surveillance state that uses artificial intelligence to repress Muslim minorities and pro-democracy demonstrators. China has faced an outcry from activists, scholars, foreign governments and U.N. rights experts over what they call mass detentions and strict surveillance of the mostly Muslim Uighur minority and other Muslim groups who call Xinjiang home. "As we speak, the Communist Party of China is using artificial intelligence to repress Muslin minority communities and pro-democracy demonstrators," Esper said during a speech in Washington. "In fact, the party has constructed a 21st century surveillance state with unprecedented abilities to censor speech and infringe upon basic human rights," Esper added. "George Orwell would be proud."
Kremlin analysts could have used Twitter as a source of military intelligence to inform their actions in the 2014 Russia–Ukraine conflict, a study has found. University of California experts showed that location-tagged tweets by Ukraine residents could have been used to map out sentiments towards Russia in real-time. The map they made of pro-Kremlin regions turned out to bear a striking resemblance to the actual areas to which Russia dispatched its special forces. Specifically, this included Crimea and regions in the far east of Ukraine -- where the incoming forces would have been most likely to be seen as liberators. In contrast, the data could also reveal those areas where dispatching forces would have lead to greater resistance and corresponding casualties and costs.
The comments of the president, who avoided the Vietnam War draft thanks to a diagnosis of bone spurs, drew swift criticism from veterans groups. "Don't just be outraged by #PresidentMayhem's latest asinine comments," Paul Rieckhoff, the founder of Iraq and Afghanistan Veterans of America, wrote in a Twitter post that day. "Take action to help vets facing TBIs," meaning traumatic brain injuries. Traumatic brain injuries result from the powerful changes in atmospheric pressure that accompany an explosion like that from a missile warhead. The missiles were launched by Iran in retaliation for the killing of a top Iranian general, Qassim Suleimani, by an American drone strike in Baghdad on Jan. 3.
Researchers simulated a real-looking "Industrial prototyping" organization with fake employees, PLCs, and websites to study the types of cyber-attacks that commonly on such networks. The elaborately fake organization's website and the network worked on a highly advanced interactive "honeypot" network that worked extensively on attracting the attention of potential hackers. The plan was to create such a legitimate-looking network that no one could even doubt it's being phony and to accumulate serious information related to cyber-threats and attacks to study and analyze them. Behind researching these threats and attack mechanisms the motive was to dig out the threats that the "Industrial control system" (ICS) sector faces today. Per sources, the sham company specifically let some ports of its network be susceptible to attack and Voila!