Carriers, Fighter Jets and Tanks Get “Adaptable” AI for Cybersecurity
Weather obscurants and bandwidth challenges can complicate the growing extent to which AI can safeguard data transiting between platforms
·
By Vokreka Senatus, Warrior Cyberwar Analyst
The integration of Artificial Intelligence (AI) into cybersecurity is paramount for enhancing the defense against evolving cyber threats, something which is particularly crucial in military environments, such as armored vehicles amid heavy combat, air-to-ground networking and targeting with fighter jets, and naval environments like the USS Gerald R. Ford. These are all combat circumstances where harsh environmental conditions pose unique challenges to data collection and processing. Both weather obscurants and bandwidth challenges can complicate the growing extent to which AI can safeguard data transiting between platforms and across domains. Should air, land or sea combat conditions impact the environment, the scope and quality of data aggregated by various sensors can be impacted in a way that challenges information analysis and transition.
Environmental and combat variables can also impact bandwidth, something which naturally impacts the volume, speed and efficiency of data collection, organization and transmission. Perhaps fog, snow or sandstorms impact the resolution of EO/IR-collected sensor data, or “electromagnetic jamming” or cluttering compromises bandwidth? Both of these scenarios would benefit from AI-enabled algorithms designed to accommodate fluctuations and changing variables impacting data collection and processing.
Therefore, the services have been working intensely to improve the efficiency of data collection and analysis and ensure fidelity of the data itself amidst changing circumstances.
These efforts have both gained momentum and achieved great success in recent years and are consistently being enhanced. For instance, nearly a decade ago, US Navy cybersecurity experts told Warrior about a special Task Force Cyber Awakening designed to increase computer security and harden networks given the fast-growing extent to which weapons systems and major combat platforms are becoming computer reliant. This is something AI can greatly improve, yet it seems it must be applied and engineered in a way that accommodates or accounts for these kinds of challenges and variations.
Part of Task Force Cyber Awakening’s focus was to improve cyber awareness and sophistication, recognizing the growing reliance on AI-enabled programming in weapon platforms, and it is an effort which continues to evolve into today’s modern environment. Today, systems need engineering to accommodate for changing variables in critical areas such as impact of combat circumstances, bandwidth limitations, sensoring, and center data flow and data transmission. Additionally, AI systems should be robust enough to handle these variations in network traffic and potential disruptions caused by any environmental factors analogous to detection, response, and mitigation of cyber threats; providing a proactive defense against evolving security challenges.
Integrating AI into cybersecurity for military applications requires a comprehensive understanding of both the cybersecurity landscape and the unique challenges posed by harsh environmental conditions in naval operations. Rigorous testing and validation processes are essential to ensure the reliability and effectiveness of AI-based cybersecurity solutions in such demanding scenarios. Theoretically, during operations, if a multitude of electronic systems are all functioning at high-volume or full-capacity, then the risk for electronic warfare or breach is respectfully understood to also be positively reinforced. Therefore, as long as the USS Ford can experience vibrations or electromagnetic shocks during operations, this should be recognized as a risk. AI components must be ruggedized to withstand such any physical stresses.
Analogous to the consideration of physical military environments, exclusively throughout naval operations, AI hardware and systems must also be designed to reliably operate under extreme measures and still sustain capacity to continuously log data analytics in accordance to the systems’ exposure. Without proper mitigation protocols, the possibility of breach increases. Any possible signal interruptions allude to electromagnetic interference; this can register troubleshooting as limited bandwidth. It can result from factors such as network congestion, low available data rates, or intentional attack thereby operating through the potential bandwidth limitation. Limited bandwidth can impact the speed and efficiency of data transfer, leading to delays, reduced performance, or the inability to transmit large amounts of data quickly. Especially in scenarios where communication channels are constrained, automations in connectivity data must be pre scripted, encrypted, and readily on standby.