Enabling Successful Artificial Intelligence Implementation in the Department of Defense
Abstract:
The Pentagon sees Artificial Intelligence (AI) as a key enabler of future military operations. However, to secure the potential promise of AI, the Department of Defense (DoD) must address a number of challenges including technological diversity, cultural silos, and insufficient skillsets. The onset of what is perceived to be the next global ‘arms’ race will position ’the winner’ as the top superpower that could define and dictate future directions and priorities across the globe. One of the key areas of concern is in the area of cyber—the next major cyberattack is predicted to involve AI systems. There is growing concern that cyberattacks that utilise AI will be more efficient, more powerful, and more damaging in their impact. As a result, there is a great deal of concern among senior leaders on how to best position the DoD for the inevitable threats and expected attacks. This paper focuses on ways in which the DoD can use AI to better position itself for cyber events and challenges in the future.
AUTHORS
National Defense University
USA
Dr. John S. Hurley serves as a Professor in the College of Information and Cyberspace at the National Defense University. Hurley has over 35 years’ experience in the area of information and computing technologies. He served as Senior Manager, Distributed Computing in the Networked Systems Division, for the Boeing Company, Bellevue, WA. Dr. Hurley was Professor of Electrical Engineering and Director of three research centers (Scalable and Embedded Applications Center, Materials Processing Assessment and Characterization Center, and Avalon Scalable Embedded Computing Center) and the Co-Director, Army Center of Excellence in Electronic Sensors and Combat at Clark Atlanta University, in Atlanta, GA. He is a 2015 Seminar XXl Fellow.
Published In
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive