Tag Archive for: Harness

Army cyber officials want to harness AI, but not over-hype


Paul Stanton

U.S. Army Cyber Center of Excellence and Fort Gordon Commanding General, Maj. Gen. Paul Stanton, welcomes attendees to AFCEA’s TechNet Augusta 2022 at the Augusta Marriott Convention Center in Augusta, Georgia, on August 16th, 2022. (Photo by Capt. Rebecca Harr)

AFCEA AUGUSTA 2023 — Army cyber leaders want to harness the potential of artificial intelligence for a role in future operations, but are trying to balance excitement about the capabilities with caution not to get hopes up on how soon it can make a real difference.

Speaking to reporters Aug. 17 at the AFCEA TechNet Augusta conference, officials said the service is actively exploring ways AI can be used in offensive operations against its networks, while service coders are looking at how it can also benefit them. 

“But we’re not developing someone that understands how to write code — what we are developing is someone that understands that artificial intelligence is predicated on the aggregation of a lot of data,” Maj. Gen. Paul Stanton, commander of the Cyber Center of Excellence (CCoE), said. 

“And so, separately, within our cyber workforce and specifically coordination with Army Cyber Command, we’re thinking a lot about what does it mean to develop confidence and an externally derived dataset upon which an AI algorithm is run,” he added. “So if I’m pulling in data from lots of different places, what degree of confidence do I have in individual data set that I didn’t generate?”

The CCoE is currently running a pilot program with Army Futures Command on how large language models can support doctrine-based research, he added. 

“So if a soldier wants to ask a ChatGPT-like question that says, you know, ‘How do I execute a doctrinally correct wet gap crossing?,’ then you would get back an answer, because the large language model had surveyed all of our doctrine in order to support an informed response,” he said. “We’re in the early stages of it. But my point is we’re not sitting on the sidelines and watching, we’re diving in.”

He said that at least one member of every center of excellence has been tasked by Lt. Gen. Milford Beagle from the Combined Arms Center to attend a…

Source…

Scientists harness chaos to protect devices from hackers


hacker
Credit: CC0 Public Domain

Researchers have found a way to use chaos to help develop digital fingerprints for electronic devices that may be unique enough to foil even the most sophisticated hackers.

Just how unique are these fingerprints? The researchers believe it would take longer than the lifetime of the universe to test for every possible combination available.

“In our system, chaos is very, very good,” said Daniel Gauthier, senior author of the study and professor of physics at The Ohio State University.

The study was recently published online in the journal IEEE Access.

The researchers created a new version of an emerging technology called physically unclonable functions, or PUFs, that are built into computer chips.

Gauthier said these new PUFs could potentially be used to create secure ID cards, to track goods in supply chains and as part of authentication applications, where it is vital to know that you’re not communicating with an impostor.

“The SolarWinds hack that targeted the U.S. government really got people thinking about how we’re going to be doing authentication and cryptography,” Gauthier said.

“We’re hopeful that this could be part of the solution.”

The new solution makes use of PUFs, which take advantage of tiny manufacturing variations found in each computer chip—variations so small that they aren’t noticeable to the end user, said Noeloikeau Charlot, lead author of the study and a doctoral student in physics at Ohio State.

“There’s a wealth of information in even the smallest differences found on computers chips that we can exploit to create PUFs,” Charlot said.

These slight variations—sometimes seen only at the atomic level—are used to create unique sequences of 0s and 1s that researchers in the field call, appropriately enough, “secrets.”

Other groups have developed what they thought were strong PUFs, but research showed that hackers could successfully attack them. The problem is that current PUFs contain only a limited number of secrets, Gauthier said.

“If you have a…

Source…

Trump Promises to Harness 3D Printing, AI, Cyberwarfare for Military – Breitbart News


Breitbart News

Trump Promises to Harness 3D Printing, AI, Cyberwarfare for Military
Breitbart News
In a major foreign policy speech, Republican presidential candidate Donald Trump said the U.S. needs to make better use of “3D printing, artificial intelligence, and cyberwarfare.” Promising that ISIS will be gone “quickly” if he is elected president

cyber warfare – read more