PHILADELPHIA — U.S. Army officials urge companies to look inside the artificial intelligence algorithms they use to better understand their origins and potential cybersecurity weaknesses. Are considering.
Early AI “bill of materials” efforts will be similar to existing software bills of materials (SBOMs), which are comprehensive lists of the components and dependencies that make up software, said the Army Assistant Chief of Staff for Procurement. says Young Bang of , logistics and technology.
Such disclosures are supported by the National Telecommunications and Information Administration, Cybersecurity, Infrastructure and Security Agency and other organizations.
“We’re looking at the concept of an AI BOM because really, we’re looking at things from a risk perspective,” Bang said in Philadelphia on May 24-25. He told reporters on the sidelines of the defense industry conference “Technical Exchange Meeting X.” “In the same way that we protect the supply chain for semiconductors, components, sub-components, etc., we also think about it from a digital perspective. So we are looking at software, data and AI. .”
Bang and his colleagues met with AI companies during the conference to gather feedback on potential requirements. He did not share the insights he gained during the private gathering.
In an increasingly high-tech battlefield, leaders want faster decision-making, longer-term and more remote intelligence gathering, and reduced human risk. are investing in The Pentagon will set up a Chief Digital and AI Office in 2021, and its executives have since said high-quality data is the cornerstone of all pursuits.
There are more than 685 AI-related projects underway in the department, with at least 232 under the responsibility of the Army, according to the Government Accountability Office, a federal watchdog. Peering inside algorithms is focused on eliminating “risks such as Trojan horses, triggers, harmful datasets, or promoting unintended consequences,” Bang said, and can be reverse engineered or classified. The leak of intellectual property is not material.
“I want to be clear about this, it’s not about getting vendor IP. It’s about how you manage cyber risk and vulnerabilities,” he said. rice field. “We are looking at how we work with the industry.”
Colin Demarest is a reporter for C4ISRNET covering military networks, cyber and IT. Colin previously covered the Department of Energy and its National Nuclear Security Agency, the Cold War cleanup and nuclear weapons development, for a daily South Carolina newspaper. Colin is also an award-winning photographer.
