Why military AI startups have become so popular in recent years
Two weeks into the Russia-Ukraine conflict, Alexander Karp, CEO of the data analytics company Palantir, has a proposal for European leaders. In an open letter, he said Europeans should modernize their weapons with help from Silicon Valley.
#For Europe to “remain strong enough to defeat the threat of foreign occupation,” Karp writes, countries need to embrace “the interplay between technology and states. relationships, and funding relationships between destructive companies seeking to escape entrenched contractor control and federal agencies.”
And the military has begun to answer this call. NATO announced on June 30 that it was creating a $1 billion innovation fund that will invest in early-stage startups and venture capital funds to develop "priority" technologies such as artificial intelligence, big data processing and automation.
Since the Russia-Ukraine conflict, the UK has launched a new artificial intelligence strategy specifically for defense, and Germany has allocated nearly $5 billion to the military after already injecting $100 billion into it. Research and artificial intelligence.
"War is a catalyst for change," says Kenneth Payne, author of "I, Warbot: The Dawn of Artificial Intelligence Conflict" and head of defense studies at King's College London.
The Russia-Ukraine conflict has increased the urgency to bring more artificial intelligence tools to the battlefield. Those who stand to benefit the most are startups like Palantir, which hope to cash in as militaries race to update their arsenals with the latest technology. But as the technology becomes more advanced, long-standing ethical questions about using artificial intelligence in warfare become more pressing, and the prospect of limiting and regulating its use looks as remote as ever.
The relationship between technology and the military has not always been friendly. In 2018, after employee protests and outrage, Google withdrew from the Pentagon's Project Maven, which sought to build an image recognition system to improve drone strikes. The incident sparked a heated debate about human rights and the ethics of developing artificial intelligence for autonomous weapons.
The project also led many prominent AI researchers to pledge not to work on lethal AI. These include Turing Award winner Yoshua Bengio, founders of industry-leading AI lab DeepMind Demis Hassabis, Shane Legg and Mustafa Suleyman.
Four years later, Silicon Valley is closer to the military than ever. Yll Bajraktari, who was once the executive director of the National Security Council on Artificial Intelligence (NSCAI) and currently works for the Special Competition Research Program, said that not only large companies, but also many startups are now starting to get involved in this field. Bajraktari is lobbying for greater adoption of AI in the United States.
Why choose AI
Companies selling military AI claim that their technology can achieve a wide range of functions. The companies say AI can help with everything from the "mundane" to the "lethal," such as screening targets, processing data from satellites, identifying patterns in data, helping soldiers make faster decisions on the battlefield, and more. Image recognition software can help identify targets. Autonomous drones could be used for surveillance or attack on land, air or water, or to help soldiers deliver supplies more safely than by land.
Payne said the use of AI on the battlefield is still in its infancy, and the military is going through a period of experimentation where sometimes the technologies don't pan out. There are countless examples of AI companies tending to make big promises about technologies that don’t turn out to work as advertised, and war zones can be one of the most challenging areas to deploy AI technology because There is little relevant training data.
Arthur Holland Michel, an expert on drones and other surveillance technologies, argued in a paper for the United Nations Institute for Disarmament Research that this could lead to autonomous systems with "complex and "Unpredictable way" fails.
Despite this, many militaries are still actively promoting the implementation of AI. In a vaguely worded press release in 2021, the British Army proudly announced that it was using AI for the first time in military operations to provide information about the surrounding environment and terrain. The United States is working with startups to develop self-driving military vehicles. In the future, hundreds or even thousands of autonomous drones being developed by the U.S. and British militaries could prove to be powerful and deadly weapons.
Many experts are concerned about this. Meredith Whittaker, senior adviser for artificial intelligence at the Federal Trade Commission and faculty director of the AI Now Institute, said the push is really more about enriching tech companies than improving military operations.
In a joint article for Prospect magazine with Lancaster University sociology professor Lucy Suchman, Lancaster University sociology professor Lucy Suchman argued that AI boosters are fanning the flames of Cold War rhetoric and trying to Create a setting that positions big tech companies as “critical national infrastructure” and therefore regulation becomes very important. They warn that the military's adoption of artificial intelligence is an inevitability rather than what it truly is: an active choice involving moral complexities and trade-offs.
AIWAR chests
As the controversy surrounding Maven receded, calls for more AI defenses have grown louder over the past few years. One of the loudest voices has been former Google CEO Eric Schmidt, who chairs the NSCAI and has called for the United States to take a more aggressive approach to military AI adoption.
NSCAI outlined steps the U.S. should take to accelerate the pace of artificial intelligence by 2025 in a report last year, calling on the U.S. military to invest $8 billion annually in these technologies or risk falling behind. in other countries.
The U.S. Department of Defense is requesting $874 million for artificial intelligence in 2022, the Department of Defense said in a March 2022 report, although that figure does not reflect the department’s total AI investments.
It’s not just the U.S. military that believes in this need. Heiko Borchert, co-director of the Defense Artificial Intelligence Observatory at Helmut Schmidt University in Hamburg, Germany, said that European countries tend to be more cautious when adopting new technologies, and they are also investing more in artificial intelligence.
France and the UK have identified artificial intelligence as a key defense technology, and the European Commission, the EU’s executive arm, has set aside $1 billion to develop new defense technologies.
The above is the detailed content of Why military AI startups have become so popular in recent years. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



In Debian systems, readdir system calls are used to read directory contents. If its performance is not good, try the following optimization strategy: Simplify the number of directory files: Split large directories into multiple small directories as much as possible, reducing the number of items processed per readdir call. Enable directory content caching: build a cache mechanism, update the cache regularly or when directory content changes, and reduce frequent calls to readdir. Memory caches (such as Memcached or Redis) or local caches (such as files or databases) can be considered. Adopt efficient data structure: If you implement directory traversal by yourself, select more efficient data structures (such as hash tables instead of linear search) to store and access directory information

This article discusses how to improve Hadoop data processing efficiency on Debian systems. Optimization strategies cover hardware upgrades, operating system parameter adjustments, Hadoop configuration modifications, and the use of efficient algorithms and tools. 1. Hardware resource strengthening ensures that all nodes have consistent hardware configurations, especially paying attention to CPU, memory and network equipment performance. Choosing high-performance hardware components is essential to improve overall processing speed. 2. Operating system tunes file descriptors and network connections: Modify the /etc/security/limits.conf file to increase the upper limit of file descriptors and network connections allowed to be opened at the same time by the system. JVM parameter adjustment: Adjust in hadoop-env.sh file

The readdir function in the Debian system is a system call used to read directory contents and is often used in C programming. This article will explain how to integrate readdir with other tools to enhance its functionality. Method 1: Combining C language program and pipeline First, write a C program to call the readdir function and output the result: #include#include#include#includeintmain(intargc,char*argv[]){DIR*dir;structdirent*entry;if(argc!=2){

The steps to install an SSL certificate on the Debian mail server are as follows: 1. Install the OpenSSL toolkit First, make sure that the OpenSSL toolkit is already installed on your system. If not installed, you can use the following command to install: sudoapt-getupdatesudoapt-getinstallopenssl2. Generate private key and certificate request Next, use OpenSSL to generate a 2048-bit RSA private key and a certificate request (CSR): openss

Website performance optimization is inseparable from in-depth analysis of access logs. Nginx log records the detailed information of users visiting the website. Cleverly using this data can effectively improve the speed of the website. This article will introduce several website performance optimization methods based on Nginx logs. 1. User behavior analysis and optimization. By analyzing the Nginx log, we can gain a deep understanding of user behavior and make targeted optimization based on this: High-frequency access IP identification: Find the IP address with the highest access frequency, and optimize the server resource configuration for these IP addresses, such as increasing bandwidth or improving the response speed of specific content. Status code analysis: analyze the frequency of different HTTP status codes (such as 404 errors), find out problems in website navigation or content management, and proceed

In Debian systems, OpenSSL is an important library for encryption, decryption and certificate management. To prevent a man-in-the-middle attack (MITM), the following measures can be taken: Use HTTPS: Ensure that all network requests use the HTTPS protocol instead of HTTP. HTTPS uses TLS (Transport Layer Security Protocol) to encrypt communication data to ensure that the data is not stolen or tampered during transmission. Verify server certificate: Manually verify the server certificate on the client to ensure it is trustworthy. The server can be manually verified through the delegate method of URLSession

Upgrading the Zookeeper version on Debian system can follow the steps below: 1. Backing up the existing configuration and data Before any upgrade, it is strongly recommended to back up the existing Zookeeper configuration files and data directories. sudocp-r/var/lib/zookeeper/var/lib/zookeeper_backupsudocp/etc/zookeeper/conf/zoo.cfg/etc/zookeeper/conf/zookeeper/z

This article describes how to clean useless software packages and free up disk space in the Debian system. Step 1: Update the package list Make sure your package list is up to date: sudoaptupdate Step 2: View installed packages Use the following command to view all installed packages: dpkg--get-selections|grep-vdeinstall Step 3: Identify redundant packages Use the aptitude tool to find packages that are no longer needed. aptitude will provide suggestions to help you safely delete packages: sudoaptitudesearch '~pimportant' This command lists the tags
