Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Hacktivism

The Pentagon is in its AI era: 5 stories from 2022

admin by admin
Dec 21, 2022
in Hacktivism
0 0
A A
0
FacebookTwitterLinkedIn

The Pentagon logo, after some technical difficulties. (Graphic by Breaking Defense)

WASHINGTON — Writing about artificial intelligence, cyber and networks can be dry. But it’s a vital topic to stay on top of when the next conflict might be fought with ones and zeros as much as it is with missiles and bullets.

So, as the staid Pentagon raced to catch up to the digital age, there was plenty to write about. Below are my top five stories, that I think, as the Breaking Defense Gen-Z ambassador, slayed. [Editor’s Note: What’s that mean?]

[This article is one of many in a series in which Breaking Defense reporters look back on the most significant (and entertaining) news stories of 2022 and look forward to what 2023 may hold.]

1. Lyft exec Craig Martell tapped as Pentagon’s AI chief: Exclusive Interview

As the title says, the Pentagon is in its AI era. Among the many investments the Defense Department is making in that area, it stood up a brand new AI office earlier this year and hired a Silicon Valley heavy hitter to lead it. In April I got the chance to exclusively interview the new Chief Digital and AI Officer Craig Martell, a former Lyft exec, on his priorities for the next year and the benefits and challenges of DoD hiring someone as technically minded as him. 

Martell isn’t the stereotypical Silicon Valley tech bro though: Prior to Lyft, he was a professor at the Naval Postgraduate School for over a decade studying AI for the military. He also worked as head of machine learning at Dropbox and led several AI teams at LinkedIn.

In the past few months, Martell learned that bureaucracy within DoD is real (three days into the job he revealed he still didn’t have a CAC card and had to wait in line at the visitor’s entrance to get into the building) and his priorities have slightly shifted. 

“I’m convinced we’re going to be able to do some great things,” Martell told me. “But they’re going to be hard things. It’s going to be a challenge.”

2. Anduril CRO: ‘There is no fair competition’ for non-traditional companies in defense

This one made my list because it got people riled up and I received a few salty emails about it. But besides that point, the Anduril chief revenue officer’s comments highlight a very real issue that the Pentagon faces and is trying to mitigate: non-traditional companies/startups face long odds when trying to get in the DoD game, even if Anduril itself has found its way to lucrative deals.

It’s because DoD takes forever to award real production contracts to companies, which, unlike larger defense firms, cannot sustain such a delay financially. And DoD knows this is an issue. Heidi Shyu, undersecretary of defense for research and engineering, has initiated several efforts over the past year focused on funding these non-traditional companies and rapid experimentation. 

3. Pentagon’s Shyu eyes base defense for third ‘sprint’ of rapid experiment campaign

Speaking of Heidi Shyu, she spoke to me and my colleague Courtney Albon, a reporter at C4ISRNET, at the sidelines of the annual Association of the US Army conference in October. Of the many things Shyu is responsible for in her role, she’s spearheading the Rapid Defense Experimentation Reserve, a relatively new effort aimed at addressing capability gaps and emerging technologies.

At AUSA, Shyu told us the next experiment — the third “sprint” — will be focused on base defense. She’s previously said she wants to do two sprints of RDER per year focused on different areas, but not a lot has been revealed about the effort. 

She also hit on another effort she’s leading called the Accelerate the Procurement and Fielding of Innovation Technologies, a program established this year to bridge that dreaded valley of death. Under that effort, $100 million is allocated to 10 different program offices to procure technologies from vendors. 

Shyu said the companies “are thrilled.”  

4. JADC2 chair: ‘I cringe’ at reports saying services efforts aren’t aligned

Joint All Domain Command and Control lives rent free in my head, and there’s been a lot of back and forth surrounding the infamously nebulous initiative. 

Some of it’s coming from inside the military services themselves, whether it’s a Navy official saying DoD hasn’t actually defined the problem it’s trying to solve with JADC2, the Army acquisition executive saying there isn’t enough coordination between the services (each service has its own JADC2-aligned effort underway) or the Air Force’s principal cyber advisor saying between all of the disparate service-specific efforts, no one is thinking about how to be interoperable. 

So when the head of the JADC2 Cross-Functional Team said the services actually are aligned and that she cringes reading stories saying otherwise, it added even more confusion to the mix. There’s also the issue of defining what exactly JADC2 is and how to think about it. For the CFT director, it’s an “ecosystem.” The Pentagon earlier this year also released a public version of its JADC2 strategy which left more questions than answers as to how the military services were going to accomplish goals defined in the document. 

5. Why Ukraine recruiting amateur ‘IT army’ could backfire

During the onset of Russia’s invasion of Ukraine, volunteer hacktivists from all around the world formed Ukraine’s “IT Army” to fight on the cyber front. Ukraine’s deputy prime minister and minister for digital transformation announced the effort in February on Twitter, linking to a Telegram channel that would give out “tasks” to people. The channel currently has over 200,000 subscribers, but it’s unclear how many of those subscribers are actually involved in the cyber operations. 

There were concerns that the digital free-for-all could backfire, but Ukrainian officials have claimed that there have been some successes from the group in which people shut down a number of Russian government websites and propaganda TV channels.

Recommended



Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.
Hacktivism

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.

Healthcare industry most common victim of third-party breaches, Black Kite finds
Hacktivism

Healthcare industry most common victim of third-party breaches, Black Kite finds

Why cybercrooks love Telegram Messenger
Hacktivism

Why cybercrooks love Telegram Messenger

Preparing for an attack on the war’s anniversary.
Hacktivism

Preparing for an attack on the war’s anniversary.

Hacktivism Is a Risky Career Path
Hacktivism

Hacktivism Is a Risky Career Path

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams
Hacktivism

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams

Pro-Russia Hacktivist Group’s Support and Influence Grows
Hacktivism

Pro-Russia Hacktivist Group’s Support and Influence Grows

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks
Hacktivism

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks

The global ICS security market is projected to grow from USD 16.7 Billion in 2022 to USD 23.7 Billion by 2027, at a Compound Annual Growth Rate (CAGR) of 7.2% from 2022 to 2027
Hacktivism

The DDOS protection and mitigation security market is projected to grow from USD 3.9 billion in 2022 to USD 7.3 billion by 2027, at a CAGR of 132%

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

Iran launched a Cyberattack Against Critical Infrastructure in Israel

Iran launched a Cyberattack Against Critical Infrastructure in Israel

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems
  • Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.