<?xml version="1.0" encoding="UTF-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:news="http://www.pugpig.com/news" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[C4ISRNet]]></title><link>https://www.c4isrnet.com</link><atom:link href="https://www.c4isrnet.com/arc/outboundfeeds/rss/category/cyber/" rel="self" type="application/rss+xml"/><description><![CDATA[C4ISRNet News Feed]]></description><lastBuildDate>Thu, 23 Apr 2026 04:00:03 +0000</lastBuildDate><language>en</language><ttl>1</ttl><sy:updatePeriod>hourly</sy:updatePeriod><sy:updateFrequency>1</sy:updateFrequency><item><title><![CDATA[French Navy dials up stress level in crew drills after Red Sea experience]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/global/europe/2026/02/06/french-navy-dials-up-stress-level-in-crew-drills-after-red-sea-experience/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/global/europe/2026/02/06/french-navy-dials-up-stress-level-in-crew-drills-after-red-sea-experience/</guid><dc:creator><![CDATA[Rudy Ruitenberg]]></dc:creator><description><![CDATA[The idea is to make people "feel like their final hour has come," said the officer in charge of training naval surface personnel.]]></description><pubDate>Fri, 06 Feb 2026 09:43:07 +0000</pubDate><content:encoded><![CDATA[<p>PARIS — The French Navy is toughening crew drills to better prepare sailors for the stress of coming under fire, following deployments to the Red Sea where Houthi rebels targeted Western warships and commercial traffic with drones and ballistic missiles.</p><p>The navy is experimenting with its simulator drills to put crews in “increasingly stressful situations,” said Capt. Jérôme Henry, the head of training for the navy’s surface personnel, at the Paris Naval Conference this week. Henry said he’s drawing on past experience as commander of the frigate Alsace, which came under attack multiple times in the Red Sea, to “toughen up our crews.”</p><p>“What I saw in the Red Sea is that when you’re under intense stress, people react more or less well but in any case, you lose some of your composure, you get what’s called tunnel vision,” Henry told Defense News on the sidelines of the conference. “If we’re going to be in <a href="https://www.defensenews.com/global/europe/2024/01/11/french-navy-defends-use-of-million-euro-missiles-to-down-houthi-drones/" target="_self" rel="" title="https://www.defensenews.com/global/europe/2024/01/11/french-navy-defends-use-of-million-euro-missiles-to-down-houthi-drones/">high-intensity combat</a>, our crews need to be ready for that stress, and the question is, how are we going to prepare them?”</p><p><a href="https://www.defensenews.com/global/europe/2024/11/05/french-uk-naval-chiefs-urge-dramatic-changes-in-warship-design/">French, UK naval chiefs urge dramatic changes in warship design</a></p><p>Training tweaks include crews going for a run or doing push-ups right before stepping into weapon simulators to get heart rates up, creating sensory overload by adding noise, smoke and drone swarms to simulations, and adding weapon malfunctions in drills, said Henry, who took on his current role last year.</p><p>Henry says he adopted the idea of stress drills from the French Navy’s special forces, the Commandos Marine, and is seeking to find out how American and Israeli forces include stress in their training.</p><p>The goal for now is to dial up stress levels “as high as possible” to ensure that reflex actions are always the right ones, the training chief said. Henry said the challenge is the difficulty of putting people under such stress “that they feel like their final hour has come.”</p><p>The training division is trying to create the most disruptive environment possible in its simulators, so that personnel including gunners and missile operators “can mechanize their actions” to ensure they’ll be able to perform in combat whatever the situation, according to Henry.</p><p>“I know what it feels like to take a missile on the nose at four times the speed of sound,” Henry said. “So we know where we start to get stressed, we know we have to prepare for that.”</p><p>The most important lesson learned from the Red Sea is the need to be ready at all times, Adm. Harold Liebregs, commander of the Royal Netherlands Navy, told Defense News.</p><p>“The time when we could leave port, then build up and then see what mission we were going to do, that has changed,” Liebregs said. “It’s about training, but also about buildup. It’s about everything becoming more and more realistic, and it starts with having your war plans ready.”</p><p>Liebregs said the officer who commanded the support ship Karel Doorman during its deployment in the Red Sea, Paul Bijleveld, is now the navy’s commander for Sea Training, “so all the lessons we learned there, he’ll take onboard. Perhaps that is no coincidence.”</p><p>Western navies lack combat experiences in terms of high-intensity naval war, said Capt. Bryan McCavour, deputy assistant chief of staff for information warfare at the United Kingdom’s Royal Navy, who spoke on a panel with Henry. With fewer and fewer platforms in national fleets, ongoing problems with ship maintenance and availability, training is consistently getting compressed, he said.</p><p>“If we’re going to engender that war-fighting spirit and maintain it, and have that culture as a decisive factor in battle, we need to invest more time in high-end war-fighting training than I think we currently do,” McCavour said.</p><p>McCavour said it’s been longer since the Falklands War than between that conflict and World War II, and “combat-ready naval forces in that sense maybe don’t exist today in the way we think, because it’s been a very long time since we had a high-end conflict.”</p><p>He said Russia was reminded of that lesson with the sinking of the cruiser Moskva in the Black Sea, and Western forces need to take that into account when they look at responding in the South China Sea or the High North around the Kola Peninsula.</p><p>The Red Sea was also “a little bit the rediscovery” of low-end threats, with renewed focus on small-caliber weapons and cannons, and a pipeline of defensive layers including jamming, light missiles and laser-guided rockets, according to Henry, who directed the navy’s annual Wildfire drone exercise to focus on saturation as well as the risk of friendly fire in a busy environment.</p><p>“When you have a lot of things flying around you, and you open fire with other friendly units, we saw in the Red Sea that mistakes can be made,” Henry said. “So we’re working on that.”</p><p>The French Navy is furthermore training for combat while minimizing radio emissions, relying on adversary emissions to build situational awareness, according to Henry. The force is working to cut reliance on satellite positioning, helped by improved inertial-navigation systems as well as astral sights using the stars for positioning.</p><p>Henry mentioned the ‘Back to the ‘80s’ exercises by the French carrier strike group, which entails forgoing satellite communications and instead using HF and UHF radio for comms, “and above all, to be more frugal in our exchanges.”</p><p>Cyber warfare is the prime example of a threat likely to deprive naval forces of capabilities “at the worst possible moment,” according to Capt. Florian El-Ahdab, commanding officer of the French frigate Languedoc. He said preparing for eventualities such as loss of connectivity requires ‘Back to 80s’ type exercises and placing forces in situations of “great discomfort.”</p><p>“Today’s sailors reflect today’s society, so if I took your smartphone away today and told you to go somewhere, I’m not sure you’d feel very comfortable,” said El-Ahdab. He said “it’s the same thing” for the navy.</p><p>“If you take away all the tools available to the commander today, and all the amazing tools that are currently being developed, if I suddenly tell you that all of that is no longer available for one reason or another, how would you respond?” El-Ahdab asked. “That seems like a very, very good challenge to explore.”</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/5ZBIHQMVKVHKZK5YIMPP4TXY2U.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/5ZBIHQMVKVHKZK5YIMPP4TXY2U.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/5ZBIHQMVKVHKZK5YIMPP4TXY2U.jpg" type="image/jpeg" height="3509" width="5263"><media:description type="plain"><![CDATA[Members of French navy stand on the deck of French aircraft carrier Charles de Gaulle in Toulon, Nov. 28, 2024. (Clement Mahoudeau/AFP via Getty Images)]]></media:description><media:credit role="author" scheme="urn:ebu">CLEMENT MAHOUDEAU</media:credit></media:content></item><item><title><![CDATA[Taiwan’s Tron Future unveils AI-guided anti-armor rockets]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/global/asia-pacific/2026/02/03/taiwans-tron-future-unveils-ai-guided-anti-armor-rockets/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/global/asia-pacific/2026/02/03/taiwans-tron-future-unveils-ai-guided-anti-armor-rockets/</guid><dc:creator><![CDATA[Elisabeth Gosselin-Malo]]></dc:creator><description><![CDATA[Designed for unguided munitions, the device uses a variety of sensors and AI to instantly calculate and predict the projectile flight paths.]]></description><pubDate>Tue, 03 Feb 2026 14:09:48 +0000</pubDate><content:encoded><![CDATA[<p>SINGAPORE — The Taiwan-based company Tron Future has unveiled an AI-assisted system that guides anti-armor rockets, which could help to accelerate the training of civilians and soldiers during a war, according to company officials. </p><p>The Singapore Airshow, organized here from Feb 3-8, marks the first time the T-Scope has been shown overseas. The device was designed specifically for unguided munitions and uses a variety of sensors and AI to instantly calculate and predict the projectile flight paths, taking into account environmental and physical factors. </p><p>“What we’re doing rather than placing sensors on the rocket itself, is we are putting them into an AI-driven guidance kit, which essentially transforms unguided rockets into precision-guided munitions to improve their accuracy for cheaper,” Alan Kuo, Tron Future’s director of sales, told Defense News. </p><p>Taiwan has been gradually building up its inventory of anti-tank weapons, including an unknown number of unguided rocket-propelled grenades, to deter potential attacks. </p><p>Wang said they were approached by one of the country’s leading defense institutes to develop a device that could help quickly mobilize personnel, if needed. </p><p>“By combining automated complex ballistic calculations and displaying a live corrected aiming point, T.Scope allows soldiers to achieve marksman-level proficiency within a very compressed training timeframe,” Kuo added. “It would allow for combat readiness even under limited preparation.”</p><img src="https://archetype-military-times-prod.web.arc-cdn.net/resizer/v2/X2yQ6EMTdS5lcp2wfVD_BEA06mU=/cloudfront-us-east-1.images.arcpublishing.com/archetype/GIFAA4RUTBDCPGV4ABRGJVC244.png" alt="(Tron Future)" height="1086" width="2022"/><p>Although it has already been tested, the company is hopeful that it will receive army certification before the end of the year.</p><p>Further testing has already been planned to see how it performs in shallow water, per a request from the undisclosed defense institute.</p><p>The National Chung-Shan Institute of Science Technology, or NCSIST, is largely regarded as the leading research and development center in the defense sector in Taiwan. It focuses on designing and producing indigenous weapons, including missiles and unmanned systems.</p><p>Tron Future’s counter-drone radars have been used by the Taiwanese Army for several years. The company has also been assisting the government in integrating counter-drone technologies with Taiwan’s low Earth orbit satellites through its T.SpaceRouter user terminals to increase the island’s communication resilience.</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/CJT7CUYPV5DAJIW3XGKTGO23RI.png" type="image/png"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/CJT7CUYPV5DAJIW3XGKTGO23RI.png" type="image/png"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/CJT7CUYPV5DAJIW3XGKTGO23RI.png" type="image/png" height="1030" width="1984"><media:description type="plain"><![CDATA[A mockup view of Tron Future's AI-assisted system. (Tron Future)]]></media:description></media:content></item><item><title><![CDATA[SWORD training platform key to US space superiority, program head says]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/your-military/2026/01/28/sword-training-platform-key-to-us-space-superiority-program-head-says/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/your-military/2026/01/28/sword-training-platform-key-to-us-space-superiority-program-head-says/</guid><dc:creator><![CDATA[Michael Scanlon]]></dc:creator><description><![CDATA[The U.S. Space Force is positioning its Space Warfighter Operational Readiness Domain as a cornerstone for maintaining space superiority.]]></description><pubDate>Wed, 28 Jan 2026 22:12:01 +0000</pubDate><content:encoded><![CDATA[<p>The U.S. Space Force is positioning its Space Warfighter Operational Readiness Domain, or SWORD, as a cornerstone for maintaining space superiority in an increasingly contested domain. </p><p><a href="https://www.defensenews.com/space/2025/03/13/space-force-teaming-with-air-force-on-joint-simulation-environment/" target="_blank" rel="" title="https://www.defensenews.com/space/2025/03/13/space-force-teaming-with-air-force-on-joint-simulation-environment/">Col. Corey Klopstein</a>, program executive officer for Operational Test and Training Infrastructure and commander of System Delta 81, described the program’s focus on realism and readiness during a media roundtable at Space Industry Days in Los Angeles, California, on Friday.</p><p>SWORD, the Space Force’s primary synthetic training environment, is a cloud-enabled, digital simulation platform designed to replicate contested space operations, including orbital dynamics, electronic warfare, cyber effects and adversary tactics. It allows guardians to train in realistic scenarios without relying solely on live, on-orbit assets or centralized facilities. </p><p>The platform has been demonstrated in large-scale exercises like Space Flag, supporting hundreds of guardians in realistic training, and is being scaled for broader enterprise use.</p><p>Klopstein stressed that SWORD is being developed to deliver the highest possible realism and adaptability. </p><p>“Our intent is to develop SWORD and make it as realistic as possible and increase the fidelity as we work closely with our users to understand what they need … and increase that work with our contractors to increase the fidelity of SWORD,” he told reporters.</p><p>That realism is achieved through rigorous validation. Digital models in the SWORD training environment are continuously being updated and refined by cross-checking against hardware-in-the-loop facilities (integrating real components into simulated environments) and live on-orbit assets. </p><p>“It’s a constant back and forth in trying to increase the fidelity of your digital environment and make it as realistic as possible,” Klopstein said, stressing that the Space Force cannot rely on synthetic data alone.</p><p>Speed is equally critical. With adversary tactics evolving rapidly, Operational Test and Training Infrastructure is prioritizing rapid integration of new threats into SWORD. </p><p>Klopstein highlighted close coordination with intelligence elements and the National Space Intelligence Center to ensure timely updates to red threat emulations. </p><p>“We’re working closely with our S2 and the Field COM S2s, as well as NSIC, to get the latest information that we can and leverage that information to provide updates to any red threat emulations within SWORD … to ensure the greatest accuracy possible,” he said.</p><p>These efforts support a long-term vision of enterprise-wide access, transitioning SWORD to a cloud-based infrastructure so guardians can conduct realistic, distributed training from home stations rather than centralized facilities. </p><p>While current implementations are site-specific, Klopstein described the goal as creating “backyard ranges” so guardians can “train from their home station, using the synthetic environment as the source of the truth.”</p><p>The SWORD program is supported by 10-12-month agile acquisition cycles to close near-term training gaps, alongside a planned fiscal 2027 cloud pathfinder, as reported by Air &amp; Space Forces Magazine and Breaking Defense.</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/EUDUCVWV2JEYRDYAJBLVZHD5HA.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/EUDUCVWV2JEYRDYAJBLVZHD5HA.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/EUDUCVWV2JEYRDYAJBLVZHD5HA.jpg" type="image/jpeg" height="3990" width="6000"><media:description type="plain"><![CDATA[Guardians and airmen of the 4th Electromagnetic Warfare Squadron, Mission Delta 3, participate in Space Flag 26-1 at Peterson Space Force Base, Colorado, Dec. 12, 2025. (Dave Grim/U.S. Space Force)]]></media:description><media:credit role="author" scheme="urn:ebu">David Grim</media:credit></media:content></item><item><title><![CDATA[AI-powered military neurotech: Mind enhancement or control? ]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/your-military/2026/01/22/ai-powered-military-neurotech-mind-enhancement-or-control/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/your-military/2026/01/22/ai-powered-military-neurotech-mind-enhancement-or-control/</guid><dc:creator><![CDATA[Aliya Sternstein]]></dc:creator><description><![CDATA[AI's ability to monitor a warfighter’s mental state, visuals or inner dialog may outpace the ability to shield that data from misuse, some scientists say.]]></description><pubDate>Thu, 22 Jan 2026 21:46:28 +0000</pubDate><content:encoded><![CDATA[<p><a href="https://www.neurable.com/about" target="_blank" rel="" title="https://www.neurable.com/about"><u>Neurable</u></a>, a consumer neurotechnology startup, has partnered with the Air Force to study whether electrode-studded headphones can track service members’ cognitive fitness, much like <a href="https://www.garmin.com/en-US/newsroom/press-release/wearables-health/garmin-smartwatches-help-launch-u-s-space-force-fitness-study/" target="_blank" rel="" title="https://www.garmin.com/en-US/newsroom/press-release/wearables-health/garmin-smartwatches-help-launch-u-s-space-force-fitness-study/"><u>Garmin smartwatches have monitored</u></a> <a href="https://www.afrl.af.mil/Portals/90/Documents/711/CFA/AFRL_CFA_FAQs_1123.pdf?ver=h2iuPx8m_c8Qrs3twQSYoQ==" rel=""><u>Space Force members’ physical fitness</u></a>, company and government officials said this month. </p><p>The $1.2 million <a href="https://www.fpds.gov/ezsearch/search.do?indexName=awardfull&amp;templateName=1.5.3&amp;s=FPDS.GOV&amp;q=FA86492599003" target="_blank" rel="" title="https://www.fpds.gov/ezsearch/search.do?indexName=awardfull&amp;templateName=1.5.3&amp;s=FPDS.GOV&amp;q=FA86492599003"><u>project</u></a> adds to the Pentagon’s growing investment in the <a href="https://www.precedenceresearch.com/brain-computer-interface-market" target="_blank" rel="" title="https://www.precedenceresearch.com/brain-computer-interface-market"><u>$3 billion market</u></a> for brain-computer interfaces (BCIs) — helmets, earbuds, other wearable devices and medical implants that use artificial intelligence to make sense of brain signals. </p><p><a href="https://neuralink.com/trials/" target="_blank" rel="" title="https://neuralink.com/trials/"><u>Elon Musk’s Neuralink</u></a>, perhaps the most high-profile implantable example, has enabled clinical trial patients who cannot move or speak to type words that they imagine. Since <a href="https://www.sciencedirect.com/science/article/pii/S0165027014002702" target="_blank" rel="" title="https://www.sciencedirect.com/science/article/pii/S0165027014002702"><u>at least the 1970s</u></a>, the Defense Department has funded the development of BCIs that, among other things, <a href="https://biosciences.lbl.gov/2017/07/24/darpa-optogenetic-neural-interface/" target="_blank" rel="" title="https://biosciences.lbl.gov/2017/07/24/darpa-optogenetic-neural-interface/"><u>restore eyesight</u></a> and <a href="https://www.darpa.mil/research/programs/revolutionizing-prosthetics" target="_blank" rel="" title="https://www.darpa.mil/research/programs/revolutionizing-prosthetics"><u>control prosthetic arms</u></a>. </p><p>Now, advances in AI enable BCIs to interpret or change brain activity with unprecedented accuracy and speed. So much so that some scientists and neuroethicists say the capacity to monitor signals that reveal a warfighter’s or a veteran’s <a href="https://www.sbir.gov/portfolio/1251447" target="_blank" rel="" title="https://www.sbir.gov/portfolio/1251447"><u>mental states</u></a>, <a href="https://sam.gov/workspace/contract/opp/e1eb13270a3d4166a257c9b637045ac0/view" target="_blank" rel="" title="https://sam.gov/workspace/contract/opp/e1eb13270a3d4166a257c9b637045ac0/view"><u>visual perceptions</u></a> or <a href="https://cdmrp.health.mil/alsrp/research_highlights/25Critical-Development_highlight.aspx" target="_blank" rel="" title="https://cdmrp.health.mil/alsrp/research_highlights/25Critical-Development_highlight.aspx"><u>inner</u></a> <a href="https://dtic.dimensions.ai/details/grant/grant.13740448?search_mode=content&amp;search_text=braingate&amp;search_type=kws&amp;search_field=full_search" rel=""><u>dialogue</u></a> may outpace the ability to shield that data from misuse. </p><p>“One could certainly imagine how enforced use of such devices could create a very dystopian basis for behavioral control,” warned James Giordano, director of the National Defense University’s Center for Disruptive Technology and Future Warfare and Georgetown University Medical Center’s former chief of neuroethics studies. </p><p>Consequently, any accessing or use of neural data must require “ongoing, active informed consent,” so active and retired military have the chance to opt in or out without penalty, he said. </p><p>Giordano, who was sharing his personal views and not speaking on behalf of any government agency, added, “The security of the neurological data used for that individual — and in that individual’s wellbeing only — is paramount. It goes beyond simple HIPAA.” </p><p>He was referring to the 1996 Health Insurance Portability and Accountability Act, a law regulating healthcare providers that predates global Wi-Fi and does not cover most app and algorithm developers, commercial cloud providers or consumer wearable designers. </p><p>Neurable and Air Force officials say that the non-invasive cognitive fitness tracker will build upon <a href="https://downloads.ctfassets.net/2yjc1ych3g2w/4081ZGqAAzmgjZnvKvGYL9/e9edab589d786c12d3f6b84346ca4b5a/Neurable_Whitepaper.pdf" target="_blank" rel="" title="https://downloads.ctfassets.net/2yjc1ych3g2w/4081ZGqAAzmgjZnvKvGYL9/e9edab589d786c12d3f6b84346ca4b5a/Neurable_Whitepaper.pdf"><u>technology</u></a> in the firm’s consumer BCI product — <a href="https://www.neurable.com/products/mw75neurolt?variant=48878808236278" target="_blank" rel="" title="https://www.neurable.com/products/mw75neurolt?variant=48878808236278"><u>Master &amp; Dynamic luxury headphones containing fabric electroencephalogram, or EEG, sensors</u></a> and electrically conductive inks to gauge mental focus. </p><img src="https://archetype-military-times-prod.web.arc-cdn.net/resizer/v2/pThW_TdHi6AHOch77lwEZaqbEHg=/cloudfront-us-east-1.images.arcpublishing.com/archetype/ICEGVV73XFGMRH674A3QSBO6YI.jpg" alt="A clinical trial participant shows his “neural-enabled” prosthetic arm at Walter Reed National Military Medical Center, Oct. 22. (Ann Brandstadter)" height="4000" width="6000"/><p>The $500 device, which launched last June, deploys an algorithm that maps brainwaves to ground-truth markers of focus — users’ speed and accuracy in finishing tasks, while undistracted and distracted. When the wearer’s brainwaves resemble those tied to flagging attention, the headphones sync with an app that alerts the user: “You’ve earned a Brain Break.” </p><p>The Air Force-funded BCI project will use other headset models, such as noise protectors or helmets, said Neurable co-founder Adam Molnar, who helped secure <a href="https://www.usaspending.gov/search?hash=264727648ea071830e64217cfccd04d7" target="_blank" rel="" title="https://www.usaspending.gov/search?hash=264727648ea071830e64217cfccd04d7"><u>$4 million</u></a> for prior military research and development work. </p><p>The study will measure cognitive performance with and without pressure — for instance, memory skill with and without sleep deprivation — against brainwaves to identify brain activity associated with optimal and suboptimal performance, according to Neurable. </p><p>The idea is that alerting service members to significant brain signal changes throughout the day — or, providing “neurofeedback” — will train them to adjust their behavior and brainwaves to hit peak performance. </p><p>“This is all within this concept of readiness. How do we make sure that we have a ready and able defense?” said Molnar, who anticipates wrapping development within two years. </p><p>Molnar added that the Space Force has a “<a href="https://www.afrl.af.mil/Portals/90/Documents/711/CFA/AFRL_CFA_FAQs_1123.pdf?ver=h2iuPx8m_c8Qrs3twQSYoQ==" rel=""><u>really cool program where they’re using</u></a> <a href="https://www.garmin.com/en-US/newsroom/press-release/wearables-health/garmin-smartwatches-help-launch-u-s-space-force-fitness-study/" target="_blank" rel="" title="https://www.garmin.com/en-US/newsroom/press-release/wearables-health/garmin-smartwatches-help-launch-u-s-space-force-fitness-study/"><u>the Garmin watch</u></a>,” embedded with heart rate, blood oxygen and other wrist-worn sensors, <a href="https://www.spaceforce.mil/News/Article/3406768/space-force-details-holistic-health-approach-continuous-fitness-assessment-study/" target="_blank" rel="" title="https://www.spaceforce.mil/News/Article/3406768/space-force-details-holistic-health-approach-continuous-fitness-assessment-study/"><u>“to help improve cardio fitness and physical activity</u></a>‚” but “we don’t really have that for the brain.” </p><p>A comparable neurofeedback tool, he said, may spur “more robust brain health practices, not just for defense, but also for possibly identifying Parkinson’s or Alzheimer’s disease indicators a decade before you feel your first symptom.” </p><p>Air Force Research Laboratory officials said that Neurable’s fabric-based sensing technology may aid multiple operations, inside and outside of the cockpit. </p><p>“I suspect that there are a large number of military members for whom a real-time fatigue or cognitive state monitor would be appealing if they thought it would make them more effective at executing the mission,” William Aue, cognitive neuroscience section chief at the <a href="https://www.afrl.af.mil/711HPW/" target="_blank" rel="" title="https://www.afrl.af.mil/711HPW/"><u>Air Force Research Laboratory’s 711th Human Performance Wing</u></a>, said by email. </p><h3>Let them ‘make their mind up’ </h3><p>Some neuroethicists, however, cautioned that the use of brain wearables may also invade troops’ privacy and foster prejudice. </p><p>“We need to be much more reflective on, much more concerned about and much more focused on the implications of altering a person’s brainwaves,” through neurofeedback training, “as compared to having them work out more or do more pull-ups,” said Jared Genser, a lawyer and co-founder of the Neurorights Foundation, a group advocating for the legal protection of people’s brain data. </p><p>Similarly, Giordano said, “The concept of personalized medicine must be applied here,” meaning that military leaders must tailor training and performance metrics to the limits of each individual’s brain and body, so “that you don’t get plateaus, and you’re not beginning to see performance decrement or performance fatigue.” </p><p>The Neurorights Foundation’s Medical Director Sean Pauzauskie, a neurologist in the UCHealth University of Colorado system, added that cognitive fitness standards may overstep the proposed right to <a href="https://www.neurorightsfoundation.org/mission/impact#:~:text=Our%20Approach:%20The%20Five%20Neurorights,for%20neurotechnology%20consumer%20in%20history" target="_blank" rel="" title="https://www.neurorightsfoundation.org/mission/impact#:~:text=Our%20Approach:%20The%20Five%20Neurorights,for%20neurotechnology%20consumer%20in%20history"><u>freedom from algorithmic bias based on neural data interpretations</u></a>. </p><p>“If the warfighter’s brain is incapable of the appropriate plasticity to achieve the desired [mental] state,” through neurofeedback training, “they could be discriminated” against by their superiors, Pauzauskie said. </p><img src="https://archetype-military-times-prod.web.arc-cdn.net/resizer/v2/W5PZJOc6TWNTNUMp1N5kplIQt08=/cloudfront-us-east-1.images.arcpublishing.com/archetype/MNJO24A37FHLFHBHNX5YOM3RSU.jpg" alt="The Neuralink website is displayed on a mobile phone with Neuralink visible in the background. (Jonathan Raa/NurPhoto via Getty Images)" height="683" width="1024"/><p>Also, EEG data flowing into and out of consumer wearables can reveal several diseases, <a href="https://jamanetwork.com/journals/jamaneurology/article-abstract/2827460" target="_blank" rel="" title="https://jamanetwork.com/journals/jamaneurology/article-abstract/2827460"><u>including epilepsy and mild cognitive impairment</u></a>, as well as a <a href="https://link.springer.com/article/10.1038/s44319-025-00505-6" target="_blank" rel="" title="https://link.springer.com/article/10.1038/s44319-025-00505-6"><u>range of emotions</u></a>. </p><p>Via email, Molnar responded to such concerns, saying, “Neurable’s focus is on supporting human performance and safety, not enforcing neurological conformity.” </p><p>“Any feedback provided by our systems is designed to be informational and user-centered, helping individuals understand factors like cognitive workload or fatigue,” he added, “much like a heart-rate monitor provides insight into physical exertion.” </p><p>Neurable officials said the system’s sensors filter out all EEG data not needed by its algorithms and encrypt the limited amount of necessary data in transit. </p><p>“Even if someone hacked someone’s brain data, they would not be able to make sense of it,” Molnar said. </p><p>The Air Force’s Aue confirmed that, during experiments, the Air Force lab anonymizes EEG data streaming from Neurable’s wearables, adding that the information is “challenging to interpret without the algorithms we use to process the raw data.” </p><p>But, such protections may not stop adversaries from decoding wearable-based intelligence in the future, as AI becomes smarter and devices utilize more EEG data. </p><p>Already, <a href="https://www.nature.com/articles/s41597-025-05378-x#Sec1" target="_blank" rel="" title="https://www.nature.com/articles/s41597-025-05378-x#Sec1"><u>in the laboratory</u></a>, algorithms can <a href="https://www.nature.com/articles/s41598-022-21384-0" target="_blank" rel="" title="https://www.nature.com/articles/s41598-022-21384-0"><u>narrow down a person’s identity into a “mindprint” of their mental processing or “brainprint” of their brain structures, based on EEG data</u></a> from a medical headcap, Pauzauskie noted. </p><p>Likewise, Genser explained, EEG data that is out into the open, if isolated from a person’s name and identity, will remain deidentified but only for a period. The problem is that, as generative AI-powered software develops, “you are going to be able to decode a lot more information from the data that escaped, enabling the data to be reidentified and traced back to you personally.” </p><p>In an email, Molnar acknowledged that as “AI continues to accelerate research and development, it is prudent to anticipate how capabilities might evolve and to establish safeguards early.” </p><img src="https://archetype-military-times-prod.web.arc-cdn.net/resizer/v2/3GS-GOiBMZTM4069c9xM-ghnTlU=/cloudfront-us-east-1.images.arcpublishing.com/archetype/RJEW24NC3FETBOYSCHXREDXGKM.jpg" alt="Paul Barbaste, the co-founder of French startup "Inclusive Brains," shows a mind controlled prosthesis, May 31, 2024. (Fabrice Coffrini/AFP via Getty)" height="3333" width="5000"/><p>He suggested additional ethical review, clear boundaries on acceptable uses, and dialogue across technologists, ethicists, policymakers and technology users. </p><p>Aue, who has been working on other research with Neurable for four years, said in an email that research study participants “are fully informed about the nature of the work before participating.” </p><p>That said, as the technology matures, conversations “need to occur about the ethical use of the technology and what military doctrine might entail,” he added. </p><p>Giordano said that the key to any adoption of AI-based neurotech in the military is mandatory informed consent during and after service. </p><p>Personnel must receive updates on any adverse effects and information on “the availability or non-availability of continuity of care if things go wrong,” he added. “That way, they can make their mind up.” </p><h3>Reading the minds of wounded warriors? </h3><p>Due to AI, implantable brain devices, much as non-invasive brain wearables, now offer troops and veterans novel insights into themselves — and possibly the same intel to adversaries, too. </p><p>For instance, new eyesight neuroprostheses rely on AI to “bridge artificial vision and neural tissue,” said Christopher Steele, chief of strategy at the Pentagon-backed nonprofit Medical Technology Enterprise Consortium. The consortium provided <a href="https://sam.gov/workspace/contract/opp/e1eb13270a3d4166a257c9b637045ac0/view" target="_blank" rel="" title="https://sam.gov/workspace/contract/opp/e1eb13270a3d4166a257c9b637045ac0/view"><u>$2 million</u></a> to help develop a prototype. </p><p>The camera-equipped BCI uses AI to decode brain signals that convey the landscape a person’s eyes are trying to see. AI then translates data from the camera and other external sensors focused on that view into artificial signals that the mind understands as shapes and motion. </p><p>Finally, AI compares the desired and perceived scenes and adjusts the artificial signals to show more detail, said Steele, a former director of the Army Medical Research and Development Command. </p><p>This self-adjusting AI, while a potential breakthrough for visually-impaired warfighters, also introduces risks, Giordano said. </p><p>“The AI that provides continuous closed-loop signals between the eye and the brain is not monitored,” he explained. </p><p>As such, it may self-adapt in a way that falsifies images, omits certain elements of the view or delays transmission of an image, any of which may result in a loss of situational awareness, Giordano said. </p><p>Compounding the problem, when the AI “system itself is vulnerable to hacking,” an adversary can monitor or corrupt the warfighter’s visual input, he added. </p><p>“If we deploy this device downrange” in a combat zone, ”can it be hacked by an enemy?" Steele said. “We are concerned about the hacking of any medical capability.” </p><p>Currently, the system only operates in clinical trials that are subject to HIPAA, and other protections include hardware isolation, encryption and AI guardrails that prevent unsafe adaptation, he added. </p><p>Yet, as Giordano cautioned, self-learning AI, by design, can learn good or bad behavior that may override guardrails. </p><p>Another military funding arm, the <a href="https://cdmrp.health.mil/alsrp/research_highlights/25Critical-Development_highlight.aspx" target="_blank" rel="" title="https://cdmrp.health.mil/alsrp/research_highlights/25Critical-Development_highlight.aspx"><u>Amyotrophic Lateral Sclerosis Research Program</u></a>, is underwriting clinical trials to evaluate <a href="https://www.braingate.org/" target="_blank" rel="" title="https://www.braingate.org/"><u>Braingate</u></a>, a forerunner to Musk’s Neuralink implant that translates words a patient imagines into audible speech. </p><p>The <a href="https://dtic.dimensions.ai/details/grant/grant.13740448?search_mode=content&amp;search_text=braingate&amp;search_type=kws&amp;search_field=full_search" target="_blank" rel="" title="https://dtic.dimensions.ai/details/grant/grant.13740448?search_mode=content&amp;search_text=braingate&amp;search_type=kws&amp;search_field=full_search"><u>Defense Department’s $2.3 million contribution</u></a> aims to help people with ALS — <a href="https://news.va.gov/press-room/va-secretary-establishes-als-as-a-presumptive-compensable-illness/" target="_blank" rel="" title="https://news.va.gov/press-room/va-secretary-establishes-als-as-a-presumptive-compensable-illness/"><u>a disease associated with military service</u></a> — who cannot move or talk. </p><p>This advance is “foundationally fantastic” for people with various neuro-motor conditions who can think of speech but not generate motor output to move their mouths, meaning “they’re communicatively locked in,” Giordano said. The device “allows these individuals the autonomy of communication.” </p><p>At the same time, because the device reads signals in the motor cortex that show attempts at moving the mouth, the tool allows for “what might be regarded as mind-reading,” Giordano said. </p><p>Currently, human beings, military or not, have no legal right to be free of mind-reading. </p><p>Neither international human rights law nor federal regulations safeguard mental privacy, mental autonomy (“free will”) or neural data, according to the Neurorights Foundation. </p><p>Only four states — <a href="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB1223" target="_blank" rel="" title="https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202320240SB1223"><u>California</u></a>, <a href="https://leg.colorado.gov/bills/hb24-1058" target="_blank" rel="" title="https://leg.colorado.gov/bills/hb24-1058"><u>Colorado</u></a>, <a href="https://www.cga.ct.gov/2025/act/pa/pdf/2025PA-00113-R00SB-01295-PA.pdf" target="_blank" rel="" title="https://www.cga.ct.gov/2025/act/pa/pdf/2025PA-00113-R00SB-01295-PA.pdf"><u>Connecticut</u></a> and <a href="https://legiscan.com/MT/text/SB163/id/3212476/Montana-2025-SB163-Enrolled.pdf" target="_blank" rel="" title="https://legiscan.com/MT/text/SB163/id/3212476/Montana-2025-SB163-Enrolled.pdf"><u>Montana afford protection to “neural data”</u></a> within their state consumer data privacy laws. And one country, <a href="https://www.bcn.cl/leychile/navegar?idNorma=1166983&amp;tipoVersion=0" target="_blank" rel="" title="https://www.bcn.cl/leychile/navegar?idNorma=1166983&amp;tipoVersion=0"><u>Chile, has adopted a constitutional amendment to protect “mental integrity.”</u></a> </p><p>As the Foundation’s Genser notes, one of the only countries with a <a href="https://cset.georgetown.edu/publication/china-bci-ethics/" target="_blank" rel="" title="https://cset.georgetown.edu/publication/china-bci-ethics/"><u>national-level set of principles on the ethical use of BCIs, China, may be the least likely to use it</u></a>. </p><p>He is pressing for “clear limits” on the purposes for developing and using neurotech and neural data in the military, subject to strong oversight that safeguards the health and autonomy of service members. </p><p>“If we don’t have any tools or standards around the national security implications of emerging neurotechnologies, then how is our military different than any other military?” Genser posited. </p><p>As an illustration of unregulated brain alteration, he pointed to the CIA’s MKUltra program, a Cold War-era mind-control experiment that <a href="https://www.intelligence.senate.gov/wp-content/uploads/2024/08/sites-default-files-hearings-95mkultra.pdf" target="_blank" rel="" title="https://www.intelligence.senate.gov/wp-content/uploads/2024/08/sites-default-files-hearings-95mkultra.pdf"><u>tested LSD and other psychedelic drugs on soldiers</u></a> and others, sometimes with <a href="https://www.cia.gov/readingroom/docs/CIA-RDP88-01070R000301530003-5.pdf" target="_blank" rel="" title="https://www.cia.gov/readingroom/docs/CIA-RDP88-01070R000301530003-5.pdf"><u>permanent psychological and physical harm</u></a>. </p><p>“The last thing we want is for neurotech to be the next version of MKUltra,” Genser said, “not using drugs, but using neuro-stimulation or other neural approaches to alter brain activity.” </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/52CHVDFQCFC2BKZSNCNQHGZIZY.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/52CHVDFQCFC2BKZSNCNQHGZIZY.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/52CHVDFQCFC2BKZSNCNQHGZIZY.jpg" type="image/jpeg" height="1299" width="2309"><media:description type="plain"><![CDATA[(Getty Images)]]></media:description><media:credit role="author" scheme="urn:ebu">imaginima</media:credit></media:content></item><item><title><![CDATA[Hands full at home, Iran is seen slowing cyber attacks on UK]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/global/europe/2026/01/19/hands-full-at-home-iran-is-seen-slowing-cyber-attacks-on-uk/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/global/europe/2026/01/19/hands-full-at-home-iran-is-seen-slowing-cyber-attacks-on-uk/</guid><dc:creator><![CDATA[Tom Kington]]></dc:creator><description><![CDATA[The CEO of Leonardo UK said online bot activity promoting the independence of Scotland from the UK reduced as Iranian authorities were crushing protests.]]></description><pubDate>Mon, 19 Jan 2026 10:07:08 +0000</pubDate><content:encoded><![CDATA[<p>ROME — Cyber attacks on the U.K. noticeably dropped off during the recent protests in Iran, a senior British defense executive has reported.</p><p>Clive Higgins, the CEO of Leonardo UK, said that online bot activity promoting the independence of Scotland from the UK reduced as Iranian authorities violently suppressed civil protest this month.</p><p>The implication is that Iran has been pushing the cause of Scottish independence through malign cyber activity in a bid to weaken the UK, but slowed its activity as violent protests raged in Iran.</p><p>“What has been very interesting over the recent period, given the social unrest in Iran, is the drop off in social media activity and chat bot activity focused on Scotland, elections and independence,” Higgins told Defense News.</p><p>On Sunday, Scotland’s first minister John Swinney said he would call for a referendum on Scottish independence if his SNP party wins a majority in Scottish parliamentary elections in May. At a referendum on independence held in 2014, 55% of Scots voted to stay in the U.K.</p><p>A report produced by the British parliament’s intelligence and security committee last July said the U.K. was a priority target for Iranian cyber attacks, ranking just behind the U.S. and Saudi Arabia.</p><p>“Iran has a high appetite for risk when conducting offensive activity and its intelligence services are ferociously well-resourced,” said committee chairman Kevan Jones at the time. He added, “It supplements this with its use of proxy groups – including criminal networks, militant and terrorist organizations, and private cyber actors – to provide it with a deniable means of attacking its adversaries with minimal risk of retaliation.”</p><p>Leonardo has been <a href="https://www.defensenews.com/global/europe/2024/03/12/leonardo-banks-on-space-cybersecurity-ai-for-double-digit-growth/" target="_self" rel="" title="https://www.defensenews.com/global/europe/2024/03/12/leonardo-banks-on-space-cybersecurity-ai-for-double-digit-growth/">raising its profile</a> as a cyber security provider, and Higgins said, “We are very clearly aware of the increasing threat from a cyber perspective and our capabilities monitor very regularly state actors who are mobilizing chat bots and social media accounts to disrupt the normal way of life we all enjoy.”</p><p>He added, “We are able to see very clearly the actions of state actors where we can identify IP addresses and other elements that articulate to us where things are being done, what kind of messages they are trying to deliver and how they are trying to disrupt U.K. society.”</p><p>He said, “There are three or four main state actors. We see a lot from North Korea, Iran, Russia and China. I don’t want to say that is state sponsored activity. It is where the activity derives from.”</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/SGOZYVPDPRFILPVHKNUCNABKTE.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/SGOZYVPDPRFILPVHKNUCNABKTE.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/SGOZYVPDPRFILPVHKNUCNABKTE.jpg" type="image/jpeg" height="2268" width="3024"><media:description type="plain"><![CDATA[Iranians gather while blocking a street during a protest in Tehran, Iran, on Jan. 9, 2026. (MAHSA / Middle East Images / AFP via Getty Images)]]></media:description><media:credit role="author" scheme="urn:ebu">MAHSA</media:credit></media:content></item><item><title><![CDATA[Pentagon is embracing Musk’s Grok AI chatbot as it draws global outcry]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/pentagon-congress/2026/01/13/pentagon-is-embracing-musks-grok-ai-chatbot-as-it-draws-global-outcry/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/pentagon-congress/2026/01/13/pentagon-is-embracing-musks-grok-ai-chatbot-as-it-draws-global-outcry/</guid><dc:creator><![CDATA[Konstantin Toropin and David Klepper, The Associated Press]]></dc:creator><description><![CDATA[Hegseth announced that Grok will soon go live in DOD and that “all appropriate data” from military IT systems would be available for "AI exploitation."]]></description><pubDate>Tue, 13 Jan 2026 12:18:54 +0000</pubDate><content:encoded><![CDATA[<p>Defense Secretary Pete Hegseth said Monday that Elon Musk’s <a href="https://www.militarytimes.com/news/your-military/2025/11/24/new-lab-offers-generative-ai-for-defense-wargaming/" target="_blank" rel="" title="https://www.militarytimes.com/news/your-military/2025/11/24/new-lab-offers-generative-ai-for-defense-wargaming/">artificial intelligence</a> chatbot Grok will join Google’s generative <a href="https://www.militarytimes.com/news/your-military/2025/12/31/army-stands-up-ai-machine-learning-career-field-for-officers/" target="_blank" rel="" title="https://www.militarytimes.com/news/your-military/2025/12/31/army-stands-up-ai-machine-learning-career-field-for-officers/">AI engine</a> in operating inside the Pentagon network, as part of a broader push to feed as much of the military’s data as possible into the developing <a href="https://www.militarytimes.com/news/your-military/2025/12/31/rotc-students-are-helping-the-military-defend-against-ai-deepfakes/" target="_blank" rel="" title="https://www.militarytimes.com/news/your-military/2025/12/31/rotc-students-are-helping-the-military-defend-against-ai-deepfakes/">technology</a>.</p><p>“Very soon we will have the world’s leading <a href="https://www.militarytimes.com/air/2025/12/09/us-air-force-wants-ai-to-power-high-speed-wargaming/?contentFeatureId=f0fmoahPVC2AbfL-2-1-8&amp;contentQuery=%7B%22includeSections%22%3A%22%2Fhome%22%2C%22excludeSections%22%3A%22%22%2C%22feedSize%22%3A10%2C%22feedOffset%22%3A5%7D" target="_blank" rel="" title="https://www.militarytimes.com/air/2025/12/09/us-air-force-wants-ai-to-power-high-speed-wargaming/?contentFeatureId=f0fmoahPVC2AbfL-2-1-8&amp;contentQuery=%7B%22includeSections%22%3A%22%2Fhome%22%2C%22excludeSections%22%3A%22%22%2C%22feedSize%22%3A10%2C%22feedOffset%22%3A5%7D">AI models</a> on every unclassified and classified network throughout our department,” <a href="https://www.militarytimes.com/news/pentagon-congress/2026/01/12/pentagon-clarifies-hegseths-putting-hands-on-recruits-statement/" target="_blank" rel="" title="https://www.militarytimes.com/news/pentagon-congress/2026/01/12/pentagon-clarifies-hegseths-putting-hands-on-recruits-statement/">Hegseth</a> said in a speech at Musk’s space flight company, SpaceX, in South Texas.</p><p>The announcement comes just days after <a href="https://www.armytimes.com/pentagon/2025/12/09/pentagon-taps-google-gemini-launches-new-site-to-boost-ai-use/" target="_blank" rel="" title="https://www.armytimes.com/pentagon/2025/12/09/pentagon-taps-google-gemini-launches-new-site-to-boost-ai-use/">Grok</a> — which is embedded into X, the social media network owned by Musk — drew global outcry and scrutiny for generating highly sexualized deepfake images of people without their consent.</p><p>Malaysia and Indonesia have blocked Grok, while the U.K.’s independent online safety watchdog announced an investigation Monday. Grok has limited image generation and editing to paying users.</p><p>Hegseth said Grok will go live inside the Defense Department later this month and announced that he would “make all appropriate data” from the military’s IT systems available for “AI exploitation.” He also said data from intelligence databases would be fed into AI systems.</p><p>Hegseth’s aggressive push to embrace the still-developing technology stands in contrast to the Biden administration, which, while pushing federal agencies to come up with policies and uses for AI, was also wary of misuse. </p><p>Officials said rules were needed to ensure that the technology, which could be harnessed for mass surveillance, cyberattacks or even lethal autonomous devices, was being used responsibly.</p><p>The Biden administration enacted a framework in late 2024 that directed national security agencies to expand their use of the most advanced AI systems but prohibited certain uses, such as applications that would violate constitutionally protected civil rights or any system that would automate the deployment of nuclear weapons. It is unclear if those prohibitions are still in place under the Trump administration.</p><p>During his speech, Hegseth spoke of the need to streamline and speed up technological innovations within the military, saying, “We need innovation to come from anywhere and evolve with speed and purpose.”</p><p>He noted that the Pentagon possesses “combat-proven operational data from two decades of military and intelligence operations.”</p><p>“AI is only as good as the data that it receives, and we’re going to make sure that it’s there,” Hegseth said.</p><p>The defense secretary said he wants AI systems within the Pentagon to be responsible, though he went on to say he was shrugging off any AI models “that won’t allow you to fight wars.”</p><p>Hegseth said his vision for military AI systems means that they operate “without ideological constraints that limit lawful military applications,” before adding that the Pentagon’s “AI will not be woke.”</p><p>Musk developed and pitched Grok as an alternative to what he called “woke AI” interactions from rival chatbots like Google’s Gemini or OpenAI’s ChatGPT. In July, Grok also caused controversy after it appeared to make antisemitic comments that praised Adolf Hitler and shared several antisemitic posts.</p><p>The Pentagon did not immediately respond to questions about the issues with Grok.</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/RXV3GMTZ2FBM7AYN4WTONBCGKM.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/RXV3GMTZ2FBM7AYN4WTONBCGKM.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/RXV3GMTZ2FBM7AYN4WTONBCGKM.jpg" type="image/jpeg" height="720" width="1280"><media:description type="plain"><![CDATA[The Pentagon recently launched a major push to encourage troops and DOD personnel to use generative AI. (DOD)]]></media:description></media:content></item><item><title><![CDATA[Army stands up AI, machine-learning career field for officers]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/your-military/2025/12/31/army-stands-up-ai-machine-learning-career-field-for-officers/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/your-military/2025/12/31/army-stands-up-ai-machine-learning-career-field-for-officers/</guid><dc:creator><![CDATA[Eve Sampson]]></dc:creator><description><![CDATA[The Army is considering broadening the program in the future to include warrant officers. ]]></description><pubDate>Wed, 31 Dec 2025 00:56:08 +0000</pubDate><content:encoded><![CDATA[<p>The <a href="https://www.armytimes.com/news/your-military/2025/12/29/army-nato-allies-test-stealth-in-new-fpv-drone-warfighter-competition/" target="_blank" rel="" title="https://www.armytimes.com/news/your-military/2025/12/29/army-nato-allies-test-stealth-in-new-fpv-drone-warfighter-competition/">Army</a> on Tuesday announced that it is standing up a dedicated artificial intelligence and machine-learning career field for officers.</p><p>The new specialty, designated 49B, will be open to eligible officers through the Voluntary Transfer Incentive Program, beginning in January 2026, with the goal of developing a group of leaders that “advances the Army’s ongoing transformation into a data-centric and AI-enabled force,” the <a href="https://www.army.mil/article/289843" rel="">statement</a> said. </p><p>The Army said officers with applicable backgrounds would use their expertise to accelerate decision-making, sharpen targeting, improve logistics efficiency and support the fielding of robotics systems on the battlefield.</p><p>“This is a deliberate and crucial step in keeping pace with present and future operational requirements,” Lt. Col. Orlando Howard, an Army spokesperson, said in a statement. “We’re building a dedicated cadre of in-house experts who will be at the forefront of integrating AI and machine learning across our warfighting functions.”</p><p>The statement said the program was open to all officers eligible to voluntarily transfer branches, but those with related background experience or education “will be particularly competitive candidates.”</p><p>The officers chosen for the new pathway will get graduate-level training and hands-on experience with AI-enabled systems, the statement said, adding that officers will be reclassified by the end of fiscal year 2026. </p><p>The Army is considering broadening the program in the future to include warrant officers.</p><p>The new officer roles were announced shortly after the Pentagon launched GenAI.mil, an artificial intelligence platform for the Department of Defense, and then announced an upcoming <a href="https://www.war.gov/News/Releases/Release/Article/4366573/the-war-department-to-expand-ai-arsenal-on-genaimil-with-xai/#:~:text=This%20initiative%20will%20soon%20embed,with%20a%20decisive%20information%20advantage." target="_blank" rel="" title="https://www.war.gov/News/Releases/Release/Article/4366573/the-war-department-to-expand-ai-arsenal-on-genaimil-with-xai/#:~:text=This%20initiative%20will%20soon%20embed,with%20a%20decisive%20information%20advantage.">expansion</a> of available tools. </p><p>In 2025, the Army also introduced a Robotics Technician <a href="https://recruiting.army.mil/In-Service-Opportunities/US-Army-Warrant-Officer-Recruiting/Do-I-Qualify/WO-MOS-Feeder-List/39A-Robotics-Technician/" target="_blank" rel="" title="https://recruiting.army.mil/In-Service-Opportunities/US-Army-Warrant-Officer-Recruiting/Do-I-Qualify/WO-MOS-Feeder-List/39A-Robotics-Technician/">specialty</a> for warrant officers, meant to provide brigade and special forces formations with information on robotics, AI and machine-learning. </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/ZL56QUO44ZCGFA4S2UL5S7OCKM.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/ZL56QUO44ZCGFA4S2UL5S7OCKM.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/ZL56QUO44ZCGFA4S2UL5S7OCKM.jpg" type="image/jpeg" height="3260" width="4492"><media:description type="plain"><![CDATA[U.S. Army Gen. James J. Mingus speaks with soldiers assigned to the Artificial Intelligence Integration Center, July 2024. (Spc. Rebeca Soria/Army)]]></media:description><media:credit role="author" scheme="urn:ebu">Spc. Rebeca Soria</media:credit></media:content></item><item><title><![CDATA[Pentagon must do better to safeguard public information, GAO warns]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/pentagon-congress/2025/11/20/pentagon-must-do-better-to-safeguard-public-information-gao-warns/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/pentagon-congress/2025/11/20/pentagon-must-do-better-to-safeguard-public-information-gao-warns/</guid><dc:creator><![CDATA[Lillian Juarez, J.D. Simkins]]></dc:creator><description><![CDATA[Of 10 DOD components assessed, only U.S. Special Operations Command was found to have consistently trained troops about the risks of digital information.]]></description><pubDate>Thu, 20 Nov 2025 16:18:49 +0000</pubDate><content:encoded><![CDATA[<p>The Defense Department continues to encounter <a href="https://www.militarytimes.com/video/2025/06/19/what-cyber-lessons-has-the-pentagon-learned-from-recent-global-conflicts/" target="_blank" rel="" title="https://www.militarytimes.com/video/2025/06/19/what-cyber-lessons-has-the-pentagon-learned-from-recent-global-conflicts/">cyber security</a> vulnerabilities stemming from publicly accessible information shared across digital platforms, a recent report from the U.S. Government Accountability Office warns.</p><p>The <a href="https://www.gao.gov/products/gao-26-107492" target="_blank" rel="" title="https://www.gao.gov/products/gao-26-107492">report</a>, released on Nov. 17, highlights security lapses across 10 DOD components linked to digital activity from personal and government devices, online communications and defense platforms that “generate volumes of traceable data.” </p><p>“Massive amounts of traceable data about military personnel and operations now exist due to the digital revolution,” according to the report, which highlighted ship and aircraft movements as examples of accessible information. “Public accessibility of this data enables malicious actors to exploit critical information and jeopardize DOD’s mission and the safety of its personnel.”</p><p>The report found that U.S. Cyber Command, the National Security Agency, the Defense Intelligence Agency, the Defense Counterintelligence and Security Agency, U.S. Special Operations Command and every branch of the military failed to adequately address two critical areas — training and security assessments — for reducing the risk of digital threats. </p><p>Of the components assessed, only U.S. Special Operations Command was found to have consistently trained personnel about the risks of digital information in the public across all relevant security areas. </p><p>The report also found that eight of the 10 DOD components did not conduct threat assessments across the required security areas of force protection, insider threat, mission assurance and operations security. </p><p>The GAO goes on to illustrate how threat actors can steal public digital information about DOD operations and personnel, thereby posing operational and national security risks. </p><p>Information transmitted through press releases, news sources, online activity, social media posts and ship coordinates could, in theory, be used to project a vessel’s route and disrupt an aircraft carrier’s operations, the report states. </p><p>The GAO noted that three of five offices under the Office of the Secretary of Defense have issued policies and guidance on risks associated with public access to digital information. </p><p>Those initiatives, however, are too “narrowly focused” and do not include all relevant security areas, the report states.</p><p>The Defense Security Enterprise Executive Committee is “well-positioned to lead a department-wide collaborative assessment of policies and guidance on digital footprint and profile risks,” according to the report’s authors. </p><p>“Without such an assessment, DOD will have difficulty in determining whether risks are being sufficiently managed within the boundaries of their legal authorities,” the report adds. “Also, DOD will face ever-increasing threats to personnel privacy and safety, mission success, and national security.”​</p><p>The GAO report made 12 recommendations to DOD to assess its policies and guidance, collaborate to reduce risks, provide training on the digital environment along with its associated risks across security areas and complete required security assessments.</p><p>DOD agreed with 11 of 12 recommendations and partially concurred with one.</p><p>Among the recommendations in the GAO report are instructions for the service secretaries of the Army, Navy and Air Force to conduct “required assessments in the security areas of force protection, insider threat and mission assurance.” </p><p>The report also recommends that Defense Secretary Pete Hegseth oversee the implementation of security assessments for the other listed components. </p><p>On Capitol Hill, Congress has echoed similar security concerns targeting the Defense Department. In an effort to mitigate national security risks, both the Senate and the House have introduced <a href="https://www.congress.gov/committee-report/118th-congress/senate-report/58" target="_blank" rel="" title="https://www.congress.gov/committee-report/118th-congress/senate-report/58">legislation</a> in recent years with recommended provisions to protect the digital footprint of DOD personnel. </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/4NPKGU6KURHFPLB547ZF7O6HUU.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/4NPKGU6KURHFPLB547ZF7O6HUU.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/4NPKGU6KURHFPLB547ZF7O6HUU.jpg" type="image/jpeg" height="3172" width="5568"><media:description type="plain"><![CDATA[A U.S. airman performs network analysis during a training exercise at Ramstein Air Base, Germany, May 2022. (A1C Jared Lovett/Air Force)]]></media:description><media:credit role="author" scheme="urn:ebu">Airman 1st Class Jared Lovett</media:credit></media:content></item><item><title><![CDATA[Military experts warn security hole in most AI chatbots can sow chaos]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/land/2025/11/10/military-experts-warn-security-hole-in-most-ai-chatbots-can-sow-chaos/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/land/2025/11/10/military-experts-warn-security-hole-in-most-ai-chatbots-can-sow-chaos/</guid><dc:creator><![CDATA[Aliya Sternstein]]></dc:creator><description><![CDATA[Current and former military officers are warning that countries are likely to exploit a security hole in artificial intelligence chatbots.]]></description><pubDate>Mon, 10 Nov 2025 21:50:50 +0000</pubDate><content:encoded><![CDATA[<p>Current and former military officers are warning that adversaries are likely to exploit a natural flaw in artificial intelligence chatbots to inject instructions for stealing files, distorting public opinion or otherwise betraying trusted users. </p><p>The vulnerability to such “prompt injection attacks” exists because large language models, the backbone of chatbots that digest hordes of user text to generate responses, cannot distinguish between malicious and trusted user instructions. </p><p>“The AI is not smart enough to understand that it has an injection inside, so it carries out something it’s not supposed to do,” Liav Caspi, a former member of the Israel Defense Forces cyberwarfare unit, told Defense News.</p><p>In effect, “an enemy has been able to turn somebody from the inside to do what they want,” such as deleting records or biasing decisions, according to Caspi, who co-founded Legit Security, which recently spotted one such <a href="https://www.legitsecurity.com/blog/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code" target="_blank" rel="" title="https://www.legitsecurity.com/blog/camoleak-critical-github-copilot-vulnerability-leaks-private-source-code">security hole in Microsoft’s Copilot chatbot</a>.</p><p>“It’s like having a spy in your ranks,” he said. </p><p>Former military officials say that, with greater reliance on chatbots and hackers backed by China, Russia and other nations already instructing <a href="https://services.google.com/fh/files/misc/advances-in-threat-actor-usage-of-ai-tools-en.pdf" target="_blank" rel="" title="https://services.google.com/fh/files/misc/advances-in-threat-actor-usage-of-ai-tools-en.pdf">Google’s Gemini</a>, <a href="https://openai.com/index/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors/" target="_blank" rel="" title="https://openai.com/index/disrupting-malicious-uses-of-ai-by-state-affiliated-threat-actors/">OpenAI’s ChatGPT</a> and <a href="https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/" rel="">Copilot</a> to create malware and fake personas, a prompt injection that orders the bots themselves to copy files or spread lies looms near.</p><p>Microsoft’s <a href="https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025" target="_blank" rel="" title="https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digital-defense-report-2025">annual digital defense report</a>, released last month, for the first time said, “AI systems themselves have become high-value targets, with adversaries amping up use of methods like prompt injection.” </p><p>What’s more, the problem of <a href="https://versprite.com/blog/still-obedient-prompt-injection-in-llms-isnt-going-away-in-2025/#:~:text=Conclusion,for%20all%20the%20wrong%20reasons." target="_blank" rel="" title="https://versprite.com/blog/still-obedient-prompt-injection-in-llms-isnt-going-away-in-2025/#:~:text=Conclusion,for%20all%20the%20wrong%20reasons.">prompt injection</a> has <a href="https://www.ibm.com/think/insights/prevent-prompt-injection" target="_blank" rel="" title="https://www.ibm.com/think/insights/prevent-prompt-injection">no</a> easy solution, <a href="https://x.com/cryps1s/status/1981037851279278414" target="_blank" rel="" title="https://x.com/cryps1s/status/1981037851279278414">OpenAI</a> and security researchers say. </p><p>An attack simply involves hiding malicious instructions — sometimes in white or tiny text — in a chatbot or content that the chatbot reads, such as a blog post or PDF. </p><p>For example, a security researcher demonstrated a prompt injection attack against OpenAI’s new AI-based browser, ChatGPT Atlas, in which the chatbot responded, <a href="https://x.com/p1njc70r/status/1980701879987269866" target="_blank" rel="" title="https://x.com/p1njc70r/status/1980701879987269866">“Trust No AI,”</a> when a user asked for an analysis of a Google Docs file about horses that concealed malicious commands. Also, last month, a researcher tipped Microsoft off to a prompt injection vulnerability in Copilot that may have allowed attackers to <a href="https://www.adamlogue.com/microsoft-365-copilot-arbitrary-data-exfiltration-via-mermaid-diagrams-fixed/" target="_blank" rel="" title="https://www.adamlogue.com/microsoft-365-copilot-arbitrary-data-exfiltration-via-mermaid-diagrams-fixed/">trick the chatbot into stealing sensitive data</a>, including emails. </p><p>In an emailed statement, Microsoft said its security team continuously tries hacking Copilot to find any prompt injection vulnerabilities, blocks users who try to exploit any found and monitors for abnormal chatbot behavior, among other tactics. </p><p>“Microsoft ensures its generative AI systems remain resilient against evolving threats for all our customers, including defense and national security,” the statement said. </p><p>Responding publicly to criticism on X, <a href="https://x.com/cryps1s/status/1981037851279278414" target="_blank" rel="" title="https://x.com/cryps1s/status/1981037851279278414">Dane Stuckey, OpenAI’s chief information security officer, wrote</a> that “prompt injection remains a frontier, unsolved security problem, and our adversaries will spend significant time and resources to find ways to make ChatGPT agent fall for these attacks.”</p><p>Along the same lines, Caspi said, “You cannot prevent the prompt injection [fully], but you need to limit the impact.” He advised that organizations limit an AI assistant’s access to sensitive data and limit the user’s access to other organizational data.</p><p>For instance, the Army has awarded contracts <a href="https://www.usaspending.gov/search?hash=3979bd67b427c3c8dfd88e6832c8fcca" target="_blank" rel="" title="https://www.usaspending.gov/search?hash=3979bd67b427c3c8dfd88e6832c8fcca">worth at least $11 million</a> to deploy <a href="https://www.army.mil/article/285537/army_launches_army_enterprise_llm_workspace_the_revolutionary_ai_platform_that_wrote_this_article" target="_blank" rel="" title="https://www.army.mil/article/285537/army_launches_army_enterprise_llm_workspace_the_revolutionary_ai_platform_that_wrote_this_article">Ask Sage</a>, a tool that lets users restrict which Army data Microsoft Azure OpenAI, Gemini and other AI models can access to run queries and tasks. Ask Sage also <a href="https://docs.asksage.ai/docs/faq/faq.html" target="_blank" rel="" title="https://docs.asksage.ai/docs/faq/faq.html">isolates Army data</a> from user prompts and external data sources.</p><p>Caspi, who is not an Army contractor, likened a prompt injection attack against an organization running Ask Sage to a lockdown situation where “you’ve got this insider, but it’s sitting in one room, and it can’t leave the room or carry out sensitive information.” </p><p>Andre Slonopas, a Virginia Army National Guard member and former Army cyber and information operations officer, uses Ask Sage and voiced confidence in the Army’s defensive AI tools, if not those of nuclear power plants or manufacturing entities, largely in rural, poorer areas. </p><p>The <a href="https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/March-April-2025/AI-Cyber-Information-Operations-Integration/" target="_blank" rel="" title="https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/March-April-2025/AI-Cyber-Information-Operations-Integration/">Virginia National Guard joined</a> with <a href="https://va.ng.mil/Army-Guard/91st-Cyber/#:~:text=Cyber%20Fortress%202025%20Public%20Notice,efforts%20in%20enhancing%20cybersecurity%20measures." target="_blank" rel="" title="https://va.ng.mil/Army-Guard/91st-Cyber/#:~:text=Cyber%20Fortress%202025%20Public%20Notice,efforts%20in%20enhancing%20cybersecurity%20measures.">essential services</a>, such as power utilities, to help defend their networks against AI-powered cyberattacks, as part of a September simulation, given that service disruptions can jeopardize military preparations.</p><p>Typically, an adversary encrypts its network traffic to evade detection, but, for the sake of an experiment, organizers did not encrypt the AI offender’s traffic because “we wanted the blue team [of humans] to see exactly what the AI was doing,” Slonopas said.</p><p>“The blue team was absolutely defeated,” despite being able to watch the AI scanning its networks, creating fake usernames to gain unauthorized access and executing instructions to defeat the team’s systems.</p><p>“Whether the AI is doing prompt injection, spoofing or maybe even some sort of a brute force attack, the speed of AI is so unbelievably immense that simply human beings cannot counter it,” and, therefore, “you have to make cybersecurity AI more accessible and more affordable,” Slonopas said. </p><p>“If a water utility has to pay, say, $30,000 for a defensive AI license, well, it will amplify one person to be like 40″ or dozens of personnel, he said. </p><p>In response to questions, Army Cyber Command spokesperson Kyle Alvarez said in an emailed statement, “Due to the current lapse in appropriations, ARCYBER was unable to accept or respond to any media engagements or requests.”</p><p>Army contractors, too, are under attack from state-affiliated AI. </p><p>“China is using offensive AI like nobody else,” said Nicolas Chaillan, the founder of Ask Sage and a former U.S. Air Force and Space Force chief software officer.</p><p>“We see so many attacks coming after us,” all of which the company has stopped, Chaillan added.</p><p>A military official, who spoke on condition of anonymity due to the geopolitical sensitivity of the matter, said that China does “appear” to be the most skilled in offensive AI. However, the official added, AI spoofing and translation allow the United States, China, Iran, other countries, hacktivists and financial cybercriminals to masquerade as one another.</p><p>For example, the official said, “Right now, with ChatGPT, I can program in Chinese. I don’t speak Chinese, but because of the ChatGPT capabilities that I have, I can do that.”</p><p><i>Aliya Sternstein, J.D., is an investigative journalist who has covered technology, cognition, and national security since Napster shut down, working for various outlets including Atlantic Media, Christian Science Monitor, Daily Beast, Forbes Magazine and Just Security. She is also a research analyst at Georgetown Law.</i></p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/GF2XA6SSIYZXITRTIZUWI2RUGB.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/GF2XA6SSIYZXITRTIZUWI2RUGB.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/GF2XA6SSIYZXITRTIZUWI2RUGB.jpg" type="image/jpeg" height="4000" width="6000"><media:description type="plain"><![CDATA[Current and former military officers are warning that countries are likely to exploit a security hole in artificial intelligence chatbots. (Getty Images)]]></media:description><media:credit role="author" scheme="urn:ebu">seksan Mongkhonkhamsao</media:credit></media:content></item><item><title><![CDATA[To coordinate strikes from space, US needs space JTACs, experts argue]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/your-military/2025/10/28/to-coordinate-strikes-from-space-us-needs-space-jtacs-experts-argue/</link><category>Battlefield Tech</category><guid isPermaLink="true">https://www.c4isrnet.com/news/your-military/2025/10/28/to-coordinate-strikes-from-space-us-needs-space-jtacs-experts-argue/</guid><dc:creator><![CDATA[Michael Peck]]></dc:creator><description><![CDATA[Soon after planes were first used in war, there were specialists on the ground coordinating strikes. Space-based weapons could one day yield new observers.]]></description><pubDate>Tue, 28 Oct 2025 15:30:00 +0000</pubDate><content:encoded><![CDATA[<p>Not long after airplanes were first used in war, armies realized that close air support required specialists on the ground to coordinate with the pilots. Hence the advent of forward air controllers, and later the U.S. military’s Joint Terminal Attack Controllers, or JTACs.</p><p>But if you need JTACs to call in air strikes, and space-based weapons are becoming a reality, then don’t you also need specialists to call in space strikes? That’s why there should be Space Joint Terminal Attack Controllers, or SJTACs, argue two experts.</p><p>For example, “the space JTAC would connect tactical, on-the-ground SOF [special operations forces] units with space assets for targeting adversary military airbases, critical infrastructure, and more complex targets, such as Russian floating nuclear power plants,” wrote retired U.S. Army colonel Kevin Stringer and Marius Kristiansen, a Norwegian Army officer, in a July <a href="https://irregularwarfare.org/articles/space-and-ice-envisioning-special-operations-forces-role-in-future-operational-environments/" target="_blank" rel="" title="https://irregularwarfare.org/articles/space-and-ice-envisioning-special-operations-forces-role-in-future-operational-environments/">essay</a> for the Irregular Warfare Initiative website. </p><p>Unlike space personnel already assigned theater special operations commands, SJTACs would embed with special operations tactical units, the essay suggests. They would “enable the assessment of vulnerabilities, ensuring precision in any potential attack, as well as monitoring target activities, tracking movements, and providing real-time situational awareness for preemptive strikes or future sabotage missions,” Stringer and Kristiansen wrote.</p><p>SJTACs are needed to coordinate the advent of space-based weapons that paint a future where orbital bombardment of ground targets is the norm, the pair argues. </p><p>“As space capabilities develop from science fiction to reality, the SJTAC could access future space weaponry ranging from lasers, electromagnetic pulse (EMP) weapons, to the currently theoretical <a href="https://orbitaltoday.com/2025/08/10/rods-from-god-weapon-explained/" target="_blank" rel="" title="https://orbitaltoday.com/2025/08/10/rods-from-god-weapon-explained/">‘Rods from God’</a> kinetic bombardment concept,” Stringer and Kristiansen wrote.</p><p>Just as JTACs are needed to target airstrikes and avoid hitting friendly forces, SJTACs would perform the same role for space. </p><p>“For normal airstrikes, an infantry scout or aviation aeroscout can call them in during an emergency,” Stringer told Defense News. “But the margin of error grows with a generalist doing infrequent specialist activities. A JTAC is a professional who focuses on this task. The SJTAC would be similar.”</p><p>There has long been an intimate link between space and special operations forces. The <a href="https://defensescoop.com/2022/10/14/armys-cyber-space-sof-triad-seeks-to-complement-nuclear-triad-with-enhanced-deterrence/" target="_blank" rel="" title="https://defensescoop.com/2022/10/14/armys-cyber-space-sof-triad-seeks-to-complement-nuclear-triad-with-enhanced-deterrence/">“Cyber-Space-SOF” triad</a> is seen as a strategic capability, while <a href="https://www.sandboxx.us/news/space-force-will-get-its-own-special-operations-element-socom-commander-reveals/" target="_blank" rel="" title="https://www.sandboxx.us/news/space-force-will-get-its-own-special-operations-element-socom-commander-reveals/">U.S. Space Force</a> is now standing up its own special operations component as part of U.S. Special Operations Command (SJTACs would belong to that Space Force component). </p><p>“Combined with space and cyber capabilities, SOF can access satellite communications, space-based reconnaissance, and cyber tools to disrupt enemy activities while maintaining a low signature,” the essay explained.</p><p>One question is redundancy. Rather than having separate SJTACs, would it be simpler to offer additional training in space capabilities to existing JTACs? Such training could be added to the Army-run Special Operations Terminal Attack Control Course, or SOTACC, which certifies JTACs. Or, the space role could be handed to Air Force combat controllers.</p><p>Stringer and Kristiansen disagree. In their view, SJTAC critics “overlook the fact that with space defined as a separate warfighting domain from the air, and with the creation of U.S. Space Force as a separate service, organizational logic and the development of deep space expertise necessitate a division of labor that would place the SJTAC function firmly within the Space Force sphere of responsibility.”</p><p>Separate STACs “would also avoid the inefficiency of having SOF from each service — Army, Navy, Air Force, and Marines — develop their own SJTAC capabilities," the essay argues.</p><p>SJTACs would also be useful for coordinating U.S. space capabilities with NATO and other allies, Stringer and Kristiansen wrote.</p><p>“Given that not all NATO countries have space assets, and the planning assumption is that NATO SOF formations will operate in a combined fashion, a space JTAC becomes a critical linkage for allied interoperability,” the essay suggested.</p><p>Ultimately, if the special operations community wants to play a role in space-based capabilities, it will need to have its own space specialists, Stringer argues.</p><p>“Without this function, SOF will not be able to access the developing space capabilities nor be involved in their development and experimentation,” Stringer told Defense News.</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/B5VNBV2TTFDQRKFXME75H7WBTU.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/B5VNBV2TTFDQRKFXME75H7WBTU.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/B5VNBV2TTFDQRKFXME75H7WBTU.jpg" type="image/jpeg" height="4000" width="6000"><media:description type="plain"><![CDATA[A Joint Terminal Attack Controller participates in an exercise at Camp Shelby, Mississippi. (Sgt. Alexis Washburn-Jasinski/U.S. Army)]]></media:description><media:credit role="author" scheme="urn:ebu">Staff Sgt. Lexy Washburn</media:credit></media:content></item><item><title><![CDATA[Soldiers stress-test translator tech to bridge allied language gaps]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/your-military/2025/10/16/soldiers-stress-test-translator-tech-to-bridge-allied-language-gaps/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/your-military/2025/10/16/soldiers-stress-test-translator-tech-to-bridge-allied-language-gaps/</guid><dc:creator><![CDATA[J.D. Simkins]]></dc:creator><description><![CDATA[The exchange program marked one small part of an ongoing effort to stress-test military technology across the continent’s 54 sovereign nations. ]]></description><pubDate>Thu, 16 Oct 2025 12:00:00 +0000</pubDate><content:encoded><![CDATA[<p>Army medical and public affairs personnel on a recent week-long exchange with Angolan service members set out to bridge one rather significant gap capable of making or breaking operations between allied nations: language. </p><p>Part of the exchange, which matched up troops from U.S. Army Southern European Task Force, Africa, with personnel from the Angolan Military Health Division, sought to identify emerging, scalable tech capable of real-time language translation in what could one day be high-stress environments in which interpreters are not readily available.</p><p>As select personnel in the exchange trained on an array of medical procedures, others, like 1st Lt. Tucker Chase, a PAO assigned to SETAF-AF, worked on translations between U.S. personnel and their allies from Angola, a Portuguese-speaking nation in southern Africa that also boasts more than 40 local languages. </p><p>“Translation tools like these help us engage more directly with our counterparts and ensure their voices are accurately represented,” Chase said in a service press release. “We’re always looking for ways to improve how we tell the story of our missions.” </p><p>And improvements were indeed established. By the end of the exchange, which was conducted over the last week of September, soldiers had zeroed in on at least one translator app capable of processing smooth conversation by way of side-by-side — or face-to-face — displays without needing to hand the phone back and forth, according to the release. </p><p>Thanks to the technology’s hands-free, auto-translate function, communication between the allied partners continued to flow without interruption, the release said. </p><p>While not necessarily replacing human interpreters, that capability could prove vital in overcoming language barriers in the midst of what could be life-or-death situations. </p><p>“I would pull out my phone and open the app,” 1st Lt. Matthew Higgerson, a perioperative nurse with Landstuhl Regional Medical Center, said in the release. “We’d basically just talk regularly as if we’re having a conversation, then give each other time to read what was translated and continue talking.”</p><p>In another portion of the exchange, which was hosted on site in Angola’s capital city of Luanda, personnel were able to employ the translator tool during a joint medical press conference conducted by both nations.</p><p>Chase noted that the tech proved its value during that exercise, as well.</p><p>“It’s a practical solution when resources are limited,” he said. “It’s intuitive, fast and helps us maintain the authenticity of our engagements.” </p><p>Though it was brief, the exchange program marked one small part of an ongoing effort by SETAF-AF to stress-test military technology across the continent’s 54 sovereign nations, much of which is aimed assisting humanitarian emergencies. </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/QT5WAYFUJVH2NARAC3R5UBCKQE.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/QT5WAYFUJVH2NARAC3R5UBCKQE.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/QT5WAYFUJVH2NARAC3R5UBCKQE.jpg" type="image/jpeg" height="4287" width="6430"><media:description type="plain"><![CDATA[Army 1st Lt. Matthew Higgerson, left, and Paulo Dominho, an Angolan Armed Forces Health Services member, experiment with a translation app. (1st Lt. Tucker Chase/Army)]]></media:description><media:credit role="author" scheme="urn:ebu">1st Lt. Tucker Chase</media:credit></media:content></item><item><title><![CDATA[Army looking to increase AI role in personnel system]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/your-army/2025/10/14/army-looking-to-increase-ai-role-in-personnel-system/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/your-army/2025/10/14/army-looking-to-increase-ai-role-in-personnel-system/</guid><dc:creator><![CDATA[Hope Hodge Seck]]></dc:creator><description><![CDATA[Shift in IPPS-A system is aimed at lowering paperwork for soldiers as Army continues shift from existing systems.]]></description><pubDate>Tue, 14 Oct 2025 16:51:52 +0000</pubDate><content:encoded><![CDATA[<p>As the Army continues a shift from dozens of legacy human resources systems to its Integrated Personnel and Pay System-Army (IPPS-A), emphasizing mobile documents and transactions, it is examining how artificial intelligence could further lower soldiers’ paperwork.</p><p>IPPS-A active-duty administrators told reporters at the Association of the United States Army’s annual meeting on Tuesday they planned a “disruptive technology pilot” in the coming year. Known as the HR Intelligent Engagement Platform, it is designed to “push the envelope” on building smart tech into existing processes, Col. Matt Paul, project manager for IPPS-A, said.</p><p>“Were using the Army’s open solicitation and going through a competitive down-select process to do some prototyping, to determine, how can we use AI – we’ve got all these disparate HR and non-HR related systems out there in the wild – how can we use AI to bridge that?” he said. </p><p>“So, if I’m a soldier and I’m just on a prompt, how do I use a single prompt to get the information that I need?” he asked.</p><p>An agentic AI tool being evaluated could offer soldiers a help desk within the IPPS-A mobile app to troubleshoot issues and help locate functions, Paul said. In the future, he said, AI may take over some form-writing entirely, he said.</p><p>“Next level would be how to actually initiate HR transactions from a prompt,” he said. “I’m Col. Matthew Paul, and I need a leave form, and then it might ask me some questions, and then I might respond, and at the end of that conversation, I may have an approved leave form, all through AI prompting. I don’t know if we’re going to get there, but that’s the whole point of the pilot, to push the envelope, to see how far we can get.”</p><p>The IPPS-A team is looking to award a contract for the pilot program this year, Paul said, but does not have a fixed timeline for its execution. </p><p>“It could be three months. It could be eight months,” he said. “We’re trying to maximize flexibility and go where the technology leads us.”</p><p>IPPS-A, an investment of nearly $600 million for the Army, went live across the service in January 2023 after several years of rollout delays. While the system has prompted its share of user complaints, particularly in its early days, officials said they are continually pushing out updates and soliciting feedback as they absorb new processes from existing systems.</p><p>In May, IPPS-A took over creation of DD-214 discharge papers, allowing soldiers to see draft DD-214s on their mobile devices and correct errors before leaving the service.</p><p>“When we released it, it was a minimal viable product,” Col. Becky Lust, director of the Army’s Functional Management Division, said. </p><p>“Since May … I’m not sure there’s been a release that we haven’t added some functionality,” she said. </p><p>In coming months, IPPS-A officials are also looking to take over the process of checking soldiers into new units and detaching them from old ones, a task that would require multiple stops at physical locations for paperwork processing and approval. Within eight months, Paul and Lust said, they hope to launch a new, mobile-based workflow.</p><p>Soldiers “would be able to show up at the location and maybe scan a QR code that says that I’m here, and that will trigger the [Military Personnel Division] to initiate in-processing. And then the soldier will get what we call activity guides in IPPS-A, and that will guide him through each of the spots that they want him to visit,” Lust said. “But he visits them all virtually, so he gets the information about that installation, and he can click yes or no if there’s questions that they need. And then he doesn’t really have to go to multiple spots … And then he’s building readiness for the Army, because then he will be able to go to his unit much quicker.”</p><p>Also in the works, with the help of soldier officer, enlisted and warrant officer working groups assembled over the summer, are improvements to the soldier talent profile functionality on the app that will allow troops to put all their relevant experiences and skills in one place for future civilian job hunts. Updates on that project will be pushed out over the next 90 days, Lust said.</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/YZCR3Q6CNZBILOGS5F33F7MW7Q.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/YZCR3Q6CNZBILOGS5F33F7MW7Q.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/YZCR3Q6CNZBILOGS5F33F7MW7Q.jpg" type="image/jpeg" height="1333" width="2000"><media:description type="plain"><![CDATA[Shift in IPPS-A system is aimed at lowering paperwork for soldiers as Army continues shift from existing systems. (Staff Sgt. Frank O'Brien/U.S. Army)]]></media:description><media:credit role="author" scheme="urn:ebu">Staff Sgt. Frank O'Brien</media:credit></media:content></item><item><title><![CDATA[First shots in future fights will be fired in cyberspace, leaders warn]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/news/your-army/2025/10/14/first-shots-in-future-fights-will-be-fired-in-cyberspace-leaders-warn/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/news/your-army/2025/10/14/first-shots-in-future-fights-will-be-fired-in-cyberspace-leaders-warn/</guid><dc:creator><![CDATA[Todd South]]></dc:creator><description><![CDATA[The military's use of AI will be critical to operate at the speed needed to react to cyber threats, Army leaders said.]]></description><pubDate>Tue, 14 Oct 2025 14:38:51 +0000</pubDate><content:encoded><![CDATA[<p>The next conflict likely won’t start with bullets or missiles at a distant overseas location, but instead could be a cyber strike on the homeland.</p><p>“The first shots will be fired in the cyber domain,” said Maj. Gen. Jake Kwon, director of strategic operations for the Army’s Office of the Deputy Chief of Staff. “The Army has to think differently, and we have to fight faster.”</p><p>Kwon spoke Tuesday alongside Lt. Gen. Jeth Rey, deputy chief of staff G-6, and Brandon Pugh, principal cyber advisor to the secretary of the Army, at the annual <a href="https://www.defensenews.com/digital-show-dailies/ausa/" target="_blank" rel="noreferrer" title="https://www.defensenews.com/digital-show-dailies/ausa/">Association of the U.S. Army conference</a> in Washington.</p><p>To move faster on cyber, Kwon said several initiatives must be met. First on the list is artificial intelligence-driven mission command, with the top goal to achieve decision dominance.</p><p>Using AI will be critical to operate at the speed needed to react to cyber threats, Kwon said. </p><p>Next is pushing commanders to see a data-centric Army, treating data as a strategic asset. Kwon likened data to the new ammunition, both critical pieces of the larger warfighting puzzle.</p><p>Third is that training must evolve beyond linear scenarios and move into a contested environment, and leaders must push units to outpace the enemy in their battlefield actions.</p><p>Lastly, Kwon noted that with <a href="https://www.armytimes.com/news/your-army/2025/04/28/this-army-division-will-change-how-armor-brigades-and-divisions-fight/" target="_blank" rel="noreferrer" title="https://www.armytimes.com/news/your-army/2025/04/28/this-army-division-will-change-how-armor-brigades-and-divisions-fight/">the division as the new unit of action</a> in the Army’s plans for large-scale combat operations, much experimenting will happen at that level. As a division goes into the dirt at one of the combat training centers, cyber work will feature prominently in what leaders will learn from each rotation.</p><p>Pugh warned that commanders can’t see cyber as an isolated capability performed by certain cyber commands or units. Division and corps commanders have access to these tools and must use them in conjunction with other assets, such as electronic warfare, he said.</p><p>Rey tied together the non-kinetic nature of the fight, noting that units must be able to fight from their forts to their ports, all of which will require resilient cyber capabilities and practices.</p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/R3WO5UBELJDMFBXB326L3J4TO4.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/R3WO5UBELJDMFBXB326L3J4TO4.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/R3WO5UBELJDMFBXB326L3J4TO4.jpg" type="image/jpeg" height="4032" width="6048"><media:description type="plain"><![CDATA[Service members and civilian partners operate from a tactical command post during Exercise Arcane Thunder 25 at Fort Huachuca, Arizona, May 28, 2025. (Staff Sgt. Rajheem Dixon/Army)]]></media:description><media:credit role="author" scheme="urn:ebu">Staff Sgt. Rajheem Dixon</media:credit></media:content></item><item><title><![CDATA[NATO takes aim at Russia’s GPS hacking after EU leader’s plane jammed]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/global/europe/2025/09/02/nato-takes-aim-at-russias-gps-hacking-after-eu-leaders-plane-jammed/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/global/europe/2025/09/02/nato-takes-aim-at-russias-gps-hacking-after-eu-leaders-plane-jammed/</guid><dc:creator><![CDATA[Sam Mcneil]]></dc:creator><description><![CDATA[The push comes days after a jet carrying EU President Ursula von der Leyen lost its ability to use GPS navigation midair in Bulgarian airspace.]]></description><pubDate>Tue, 02 Sep 2025 19:43:36 +0000</pubDate><content:encoded><![CDATA[<p>NATO is working to thwart Russian jamming of civilian flights, said the alliance’s chief on Tuesday, two days after a jet carrying European Commission President Ursula von der Leyen lost its ability to use GPS navigation midair in Bulgarian airspace.</p><p>The plane landed safely on Sunday, but Bulgarian authorities said they <a href="https://apnews.com/article/europe-leyen-plane-radar-russia-jammed-51fa78294c2d0464dce5fd24dd4f273b" rel="">suspected Russia was behind the interference</a>.</p><p>“It is taken very seriously,” said NATO Secretary-General Mark Rutte during a news conference in Luxembourg with the duchy’s prime minister and defense minister. “I can assure you that we are working day and night to counter this, to prevent it, and to make sure that they will not do it again.” He did not elaborate.</p><p>Neither Russia nor von der Leyen has commented publicly on the incident. The EU and NATO are separate entities with different sets of member countries, but Europe’s security is a vital issue for both.</p><p>Rutte said the jamming was part of a complex campaign by Russia of “hybrid threats” like <a href="https://apnews.com/article/nato-france-russia-baltic-cables-ships-damage-764964a275530915c2cc5af1125ec125" rel="">cutting of undersea cables in the Baltic Sea</a>, <a href="https://apnews.com/article/germany-russia-threats-report-rheinmetall-plot-2cee42e9f9f6940eb960b0b052e3e670" rel="">a plot to assassinate a German industrialist</a>, and <a href="https://apnews.com/article/britain-nhs-ransomware-attack-qilin-2dfa0d0426ce640e5a3782900b9596f9" rel="">a cyberattack on the National Heath Service</a> in the United Kingdom.</p><p>“I have always hated the words hybrid because it sounds so cuddly, but hybrid is exactly this jamming of commercial airplanes, with potentially disastrous effects,” he said.</p><p>The Associated Press has plotted almost 80 incidents on <a href="https://apnews.com/article/russia-ukraine-war-europe-hybrid-campaign-d61887dd3ec6151adf354c5bd3e6273e" rel="">a map tracking a campaign of disruption across Europe blamed on Russia,</a> which the head of Britain’s foreign intelligence service has described as “staggeringly reckless.” Since Moscow’s full-scale invasion of Ukraine in 2022, Western officials have accused Russia and its proxies of staging <a href="https://apnews.com/article/russia-sabotage-europe-ukraine-13ee37cf869139839f0d4a3ebe7bd80d" rel="">dozens of attacks and other incidents</a>, ranging from vandalism to arson and attempted assassination.</p><p>The interference from Russia includes jamming and spoofing. Jamming means a strong radio signal overwhelms communications, whereas spoofing misleads a receiver into thinking it is in a different location or in a past or future time period.</p><p>“The threat from the Russians is increasing every day. Let’s not be naive about it: this might also involve one day Luxembourg, it might come to the Netherlands,” Rutte said. “With the latest Russian missile technology for example, the difference now between Lithuania on the front line and Luxembourg, The Hague or Madrid is five to 10 minutes. That’s the time it takes this missile to reach these parts of Europe.”</p><p>The whole continent was under “direct threat from the Russians,” he warned. “We are all on the eastern flank now, whether you live in London or Tallinn.”</p><p>Bulgaria will not investigate the jamming of von der Leyen’s plane because “such things happen every day,” Bulgarian Prime Minister Rosen Zhelyazkov said Tuesday.</p><p>He said it was one of the side effects of Russia’s war in Ukraine and had occurred across Europe.</p><p><i>Associated Press writer Veselin Toshkov in Sofia, Bulgaria contributed to this report.</i></p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/ORVUUTCQIRLTG3SNNZCUYMKTFN.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/ORVUUTCQIRLTG3SNNZCUYMKTFN.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/ORVUUTCQIRLTG3SNNZCUYMKTFN.jpg" type="image/jpeg" height="2815" width="4223"><media:description type="plain"><![CDATA[A plane carrying European Commission President Ursula von der Leyen, seen here, lost GPS navigation midair in Bulgarian airspace on Aug. 31. (Pascal Bastien/AP)]]></media:description><media:credit role="author" scheme="urn:ebu">Pascal Bastien</media:credit></media:content></item><item><title><![CDATA[For Air Force weather experts, the cloud is the future – rain or shine]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/air/2025/06/10/for-air-force-weather-experts-the-cloud-is-the-future-rain-or-shine/</link><category>Battlefield Tech</category><guid isPermaLink="true">https://www.c4isrnet.com/air/2025/06/10/for-air-force-weather-experts-the-cloud-is-the-future-rain-or-shine/</guid><dc:creator><![CDATA[Courtney Albon]]></dc:creator><description><![CDATA[The organization, which provides operational weather tools to the military and intelligence agencies, expects to fully transition to the cloud next year.]]></description><pubDate>Tue, 10 Jun 2025 12:20:15 +0000</pubDate><content:encoded><![CDATA[<p>After spending the better part of a decade transitioning outdated systems and infrastructure to the cloud, the Air Force agency responsible for providing key weather and environmental inputs for military and intelligence operations is starting to see a silver lining. </p><p>Air Force Weather started its digital transformation in 2017 amid a broader U.S. government push to migrate away from siloed data centers to more secure, efficient and <a href="https://www.federaltimes.com/it-networks/2019/11/19/heres-some-good-news-for-the-pentagons-cloud-migrations/" target="_self" rel="" title="https://www.federaltimes.com/it-networks/2019/11/19/heres-some-good-news-for-the-pentagons-cloud-migrations/">capable could-based environments</a>. As the Air Force’s largest special-purpose data processing node — crunching around 80 terabytes of data, or the equivalent of 6.6 billion pages of text, a day — the organization was a “big fat target” for cyber threats, according to Fred Fahlbusch, Air Force Weather’s data domain officer and chief of the weather resources, programs, data and cybersecurity division.</p><p>So, with fresh funding in hand, it began the process of migrating its operations from physical servers at the 557th Weather Wing at Offutt Air Force Base in Nebraska to its new digital home in the cloud. It contracted with Amazon for cloud services and shifted its high-performance computing capability from Offutt to Oak Ridge National Laboratory in Tennessee, which could better accommodate its power and cooling needs.</p><p>The transition has been difficult on multiple levels, but Fahlbusch and other officials told Defense News the organization is on the verge of completing its change to the cloud by next year — a milestone they say is likely to spike demand for the operational weather products the organization provides to its user base. </p><p>“If we deliver what people want, then the demand signals are going to explode,” Fahlbusch said. </p><p>That demand, while a sign of success, presents a whole new set of challenges for Air Force Weather. More utilization requires more resources, Fahlbusch said, and the organization will likely have to take a new approach to funding the services it provides. </p><h2>Virtual Private Cloud</h2><p>According to Rod Grady, chief architect and cloud integrator at the Air Force Life Cycle Management Center’s Weather Systems Branch, it’s not data that makes Air Force Weather indispensable. In fact, while the organization draws data from Air Force and <a href="https://www.defensenews.com/space/2025/04/25/space-force-weather-satellite-deemed-ready-for-forecasts/" target="_self" rel="" title="https://www.defensenews.com/space/2025/04/25/space-force-weather-satellite-deemed-ready-for-forecasts/">Space Force radars and satellites</a>, much of the weather information it relies on comes from unclassified sources like the National Oceanic and Atmospheric Administration, or NOAA, and commercial firms.</p><img src="https://archetype-military-times-prod.web.arc-cdn.net/resizer/v2/4ntJ-fD2s-9kixMRsUD41Mq5BjM=/cloudfront-us-east-1.images.arcpublishing.com/archetype/772KJLSFTVG6JL4YYG7H5QHFMM.jpg" alt="U.S. Air Force Master Sgt. Samuel Davis, from the 2nd Weather Squadron, inspects the telescope of the observatory at Holloman Air Force Base, New Mexico -- one of three in use by the Air Force that tracks unusual solar activities that would disrupt missions around the world. (U.S. Air Force photo by Airman 1st Class Isaiah Pedrazzini)" height="367" width="551"/><p>The organization’s value proposition, instead, is in what it does with that data.</p><p>“You can go out and buy weather data from many different sources,” Grady said. “But what makes us unique is the application of that data to support mission decision-making. And we have services and capability on enclaves that are being exploited every day by the millions.”</p><p>The organization, which is the go-to source for environmental data tools for the Air Force, Space Force, Army and intelligence community, sees around 30 million requests a month for weather products from users operating in classified enclaves.</p><p>One such tool gives military aircraft access to severe weather data when operating in areas without radar coverage. A hydro-intelligence product developed by Air Force Weather provides detailed flood mapping and forecasting. And a web-based application uses a network of terminals to pull data from U.S. and international weather satellites and make it available to users.</p><p>Moving operations to the cloud will help the organization develop more tools at a faster rate and increase its processing abilities, Grady said. It also will make its products available to more users.</p><p>The office is already seeing the initial impact of cloud operations on its products, as its transition to what it calls the Virtual Private Cloud, or VPC, has been incremental. One illustration of this, Grady said, is a capability called the Operational Data Layer, which allows a forecaster to create mission-specific tools out of large data sets. </p><p>The office started experimenting with the capability in 2010, but the technology proved too challenging and the project lost momentum. In 2020, amid the transition to VPC, Air Force Weather revived the effort with a new plan to use cloud computing processes to develop the data tool. This time, it went from initial concept to operations in less than six months and the organization is now expanding the capability for more applications. </p><p>“That product is now the number one hit product and is integrated into a number of applications across the Air Force and the DOD on the unclassified level and higher enclaves,” Grady said. </p><p>Fahlbusch said Air Force Weather’s products and delivery timelines will only improve once it’s fully leveraging VPC. And a better product combined with a cloud-based environment that allows users outside its typical base to access its tools will likely mean a significant increase in utilization.</p><p>“Once we’re in a cloud environment and available to people we’re not currently available to, there could be an explosion of demand from end users we’re not even aware of,” Fahlbusch said. </p><h2>Managing demand</h2><p>The office welcomes the larger user base but is also preparing for the challenges that will come with managing more demand. Fahlbusch said funding is his biggest concern.</p><p>The organization, whose fiscal 2025 funding sits around $250 million — not including personnel costs – could request more money to operate in the cloud, but that’s a difficult ask when the defense budget is tightening, Fahlbusch said. </p><p>It could also shift to a fee-for-service model, which puts the cost burden on the offices using its services. While the products the organization provides differentiate it from other sources, the cost could prove to be a barrier for users who are also seeing their budgets shrink, he said.</p><p>Fahlbusch is not alone in his concerns. Managing the cost and distribution of cloud services has been <a href="https://www.c4isrnet.com/battlefield-tech/it-networks/2023/10/09/army-cio-garciga-forecasts-cloud-growth-following-really-hard-sprint/" target="_self" rel="" title="https://www.c4isrnet.com/battlefield-tech/it-networks/2023/10/09/army-cio-garciga-forecasts-cloud-growth-following-really-hard-sprint/">a challenge for Pentagon agencies</a> that have embraced cloud operations over the last decade without aligning their processes under an enterprise-level management approach. In an effort to address these issues, the Defense Department released a Cloud Financial Operations Strategy last year designed to help both providers and users better navigate the cloud.</p><p>Air Force Weather is applying that strategy as it prepares for demand, according to Grady and Fahlbusch — monitoring usage more tightly and putting mechanisms in place to make sure it’s not sending duplicative information or larger amounts of data than necessary. </p><p>In practice, that means working more closely with users to get a better understanding of how much data they actually need for a particular task, which is often less than they originally requested, Fahlbusch said.</p><p>“We can work with them, and we can tailor it,” he said. “I think that will help defray some of the costs smartly and help curate what the end user really needs — targeted curation, if you will, versus asking for everything. That’ll kill us.”</p><h2>Workforce, funding cuts</h2><p>Air Force Weather’s concerns about managing the supply and demand that come with providing a more effective and capable product are set against the backdrop of the Trump administration’s <a href="" rel="" title="">deep cuts to the federal civilian workforce</a>. The Department of Government Efficiency has also targeted contracting expertise and agencies like NOAA — both of which the organization relies on to provide high-quality weather products. </p><p>The office has seen some indirect impacts of those reductions, with civilian workforce cuts hitting the Air Force Life Cycle Management Center, which provides acquisition and program management support. Fahlbusch said cuts to contractors and federally funded research and development centers — which provide crucial expertise to support Air Force Weather’s cloud transition — could also impact the agency. </p><p>“We need these specialists not as consultants but working the front lines as ‘digital grease monkeys,’ doing the coding, data curation, integration and other digital functions to help optimize weather integration into weapon systems,” a spokesman added in a June 4 statement following the interview.</p><p>Deep staffing and budget reductions at NOAA could also impact Air Force Weather, Fahlbusch said, giving it fewer reliable data sources from which to draw. </p><p>It’s not yet clear what the scope of that impact might be. Fahlbusch noted that while funding and personnel reductions could make it harder for Air Force Weather to continue to support military readiness and planning, the team understands the push for fiscal responsibility and will do what it can to realign manpower and funding if required.</p><p>“If there are things we have to stop doing to focus on those warfighting priorities, we will do it . . . consistent with the president and [secretary of defense] guidance,” he said. “Because that’s what we’re all about.” </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/N4CRKQDYTBCZ5ESDQTWMENFP3Y.jpeg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/N4CRKQDYTBCZ5ESDQTWMENFP3Y.jpeg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/N4CRKQDYTBCZ5ESDQTWMENFP3Y.jpeg" type="image/jpeg" height="3368" width="5052"><media:description type="plain"><![CDATA[Air Force Weather, which provides operational weather products to the Air Force, Space Force, Army and intelligence community, expects to fully transition to the cloud in 2026. (Tech. Sgt. Emerson Nuñez/U.S. Air Force)]]></media:description><media:credit role="author" scheme="urn:ebu">Tech. Sgt. Emerson Nunez</media:credit></media:content></item><item><title><![CDATA[Leidos acquires cyber company Kudu Dynamics]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/industry/2025/05/28/leidos-acquires-cyber-company-kudu-dynamics/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/industry/2025/05/28/leidos-acquires-cyber-company-kudu-dynamics/</guid><dc:creator><![CDATA[Courtney Albon]]></dc:creator><description><![CDATA[The finalized deal comes as Leidos is implementing a new “NorthStar” strategy that identifies cyber as one of five primary growth areas for the company.]]></description><pubDate>Wed, 28 May 2025 13:08:14 +0000</pubDate><content:encoded><![CDATA[<p>Defense technology firm Leidos announced Wednesday it closed a $300 million acquisition of Kudu Dynamics, a company that develops AI-enabled cyber capabilities. </p><p>The finalized deal comes as Leidos is implementing a new <a href="https://www.c4isrnet.com/home/2023/08/08/leidos-refining-focus-crafting-north-star-vision-ceo-tom-bell-says/" target="_self" rel="" title="https://www.c4isrnet.com/home/2023/08/08/leidos-refining-focus-crafting-north-star-vision-ceo-tom-bell-says/">“NorthStar” strategy</a> that identifies cyber as one of five primary growth areas for the company.</p><p>“Kudu’s ability to generate new cyber capabilities with AI perfectly complements our strategy to rapidly grow differentiated offensive cyber technology capabilities,” Leidos CEO Tom Bell said in a statement. “This acquisition underlines Leidos’s commitment to continue to build smarter full-spectrum cyber capabilities, so that the U.S. and its allies dominate the cyber warfighting domain.”</p><p>Kudu has around 170 employees and is based in Chantilly, Virginia. The firm has customers in the Defense Department and the intelligence community. </p><p>Roy Stevens, president of Leidos’ national security sector, told Defense News the firm was particularly drawn to Kudu’s expertise in identifying cyber vulnerabilities, developing code that can exploit flaws in a system and then create an electronic-warfare or other effect.</p><p>He specifically highlighted the firm’s application of AI to exploit an adversary system. </p><p>“We really believe warfare is moving more and more in that direction,” Stevens said. “That’s a place where they have a unique position.”</p><p>Those strengths, he said, directly align with the opportunities and gaps Leidos has identified within its own cyber portfolio, and the company expects the acquisition will help it get after its growth targets 18 months faster than it may have otherwise.</p><p>Leidos today has a large defensive and offensive cyber footprint and <a href="https://www.c4isrnet.com/battlefield-tech/it-networks/2023/09/20/leidos-wins-79-billion-us-army-information-technology-contract/" target="_self" rel="" title="https://www.c4isrnet.com/battlefield-tech/it-networks/2023/09/20/leidos-wins-79-billion-us-army-information-technology-contract/">provides support to DOD </a>and intelligence customers, including the National Security Agency. The company in April won a $390 million contract to provide signals intelligence to the NSA, and last June the Air Force and Space Force re-upped their enterprise IT contract with a $738 million award to Leidos. </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/R6JJQFWRYZEGVLNXEIWXK6DCDM.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/R6JJQFWRYZEGVLNXEIWXK6DCDM.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/R6JJQFWRYZEGVLNXEIWXK6DCDM.jpg" type="image/jpeg" height="533" width="800"><media:description type="plain"><![CDATA[Leidos, a defense technology firm, acquired Kudu Dynamics in a move to expand its cyber portfolio. (Getty)]]></media:description></media:content></item><item><title><![CDATA[Switzerland to expand EU defense ties with new cyber-defense role]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/global/europe/2025/05/23/switzerland-to-expand-eu-defense-ties-with-new-cyber-defense-role/</link><category>Cyber</category><guid isPermaLink="true">https://www.c4isrnet.com/global/europe/2025/05/23/switzerland-to-expand-eu-defense-ties-with-new-cyber-defense-role/</guid><dc:creator><![CDATA[Linus Höller]]></dc:creator><description><![CDATA[Swiss defense planners have balanced these new engagements with Bern’s policy of armed neutrality.]]></description><pubDate>Fri, 23 May 2025 14:01:15 +0000</pubDate><content:encoded><![CDATA[<p>THE HAGUE, Netherlands — Switzerland has received the European Union’s approval to join a multinational military cybersecurity project, the EU’s Council announced this week. </p><p>The decision allows Switzerland to become part of the Estonian-led Cyber Ranges Federations project under the EU’s Permanent Structured Cooperation (PESCO) framework, marking a notable advance in Swiss–EU military cooperation. This comes despite Bern’s famously longstanding policy of strict military neutrality. </p><p>Switzerland had applied to join the project in October of last year, shortly after submitting an application for another joint project focused on military mobility. Two formalities remain before becoming a full project member: Estonia must invite Switzerland to the cooperation, and Bern needs a so-called administrative arrangement with the EU governing formalities such a data exchange and other parameters.</p><p>The <a href="https://www.news.admin.ch/en/newnsb/ixok7i2Pz56NfYqzJhZVA" rel="">Swiss government welcomed</a> this week’s EU decision, saying that the country “will take part in the European PESCO project.”</p><p>Switzerland has beefed up its own cyber defense capabilities in recent years with its Swiss Cyber Training Range and a <a href="https://www.cydcampus.admin.ch/en" rel="">Cyber-Defence Campus</a>.</p><p>The EU’s Cyber Ranges Federations initiative seeks to centralize capacity, pool unique services and automate processes across member states, reducing manual workload during exercises and accelerating the development of advanced cybersecurity technologies.</p><p>Austria, Belgium, Bulgaria, Finland, France, Italy and Luxembourg are already members of the project, in addition to Estonia.</p><p>Under PESCO’s third-state participation rules established in 2020, non-EU countries may join individual projects if they share EU values and pose no threat to member states’ security interests. The Council confirmed that Switzerland meets the required political, legal and substantive criteria and will bring “substantial added value and mutual benefit” to the federation, it said in a press release.</p><p>The Council retains oversight of third-state involvement and may adjust conditions should security considerations evolve, ensuring alignment with the EU’s collective defense objectives.</p><p>Swiss defense planners have balanced these new engagements with Bern’s policy of armed neutrality, with <a href="https://www.euractiv.com/section/defence/news/switzerland-considers-joining-eus-military-mobility-cyberdefence-projects/" rel="">federal officials calling</a> cooperation in PESCO initiatives “ad hoc collaboration on specific projects which are thematically in the interest of both parties and which do not create critical dependencies for neutrality.” </p><p>Participation in the cyber project enables Switzerland to contribute – and benefit from – expertise and infrastructure without entangling the country too deeply in broader EU defense commitments, from Bern’s point of view. The Swiss government said that “participation will take place selectively and on a needs-oriented basis.”</p><p>The latest project represents part of Switzerland’s broader strategic approach to selective participation in PESCO projects that align with its defense interests while maintaining neutrality.</p><p>It’s not Switzerland’s first brush with EU defense initiatives. In January, the government received the green light to join an <a href="https://www.defensenews.com/global/europe/2021/03/02/pentagon-pushes-to-partake-in-eu-military-mobility-planning/" target="_self" rel="" title="https://www.defensenews.com/global/europe/2021/03/02/pentagon-pushes-to-partake-in-eu-military-mobility-planning/">EU-led military mobility project</a>, which it applied for in September 2024. The Military Mobility project aims to simplify and standardize national cross-border military transport procedures, enabling swift movement of military personnel and assets throughout the EU via road, rail, sea, or air. Other non-EU countries, such as the UK, Northway, the USA and Canada are also part of this project. </p><p>In addition to deepening engagement with the EU, Switzerland has also been a member of NATO’s partnership for peace since the 1990s, as has its neutral eastern neighbor, Austria. </p><p>Hardline neutrality defenders have long taken issue with Swiss engagement on military projects beyond its own borders. Their criticism received new urgency in the aftermath of Russia’s attack on Ukraine in 2022. Last year, a civil movement garnered more 130,000 certified signatures to organize a national referendum on strengthening Switzerland’s international neutrality. The referendum organizers specifically want to prevent what they see as a gradual erosion of Switzerland’s traditional neutrality through strengthened international defense cooperation. </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/Y56ZVNI65NHP7PMSVIYYQDFFCE.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/Y56ZVNI65NHP7PMSVIYYQDFFCE.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/Y56ZVNI65NHP7PMSVIYYQDFFCE.jpg" type="image/jpeg" height="3333" width="5000"><media:description type="plain"><![CDATA[F/A-18 fighter jets are seen after landing during tests of the Swiss Air force for take-offs and landings of fighter jets on the A1 motorway between Avenches and Payerne, western Switzerland, on June 5, 2024. (Fabrice Coffrini/AFP via Getty Images)]]></media:description><media:credit role="author" scheme="urn:ebu">FABRICE COFFRINI</media:credit></media:content></item><item><title><![CDATA[How AI voicebots threaten the psyche of US service members and spies]]></title><news:push>0</news:push><link>https://www.c4isrnet.com/industry/techwatch/2025/05/06/how-ai-voicebots-threaten-the-psyche-of-us-service-members-and-spies/</link><category>AI &amp; ML</category><guid isPermaLink="true">https://www.c4isrnet.com/industry/techwatch/2025/05/06/how-ai-voicebots-threaten-the-psyche-of-us-service-members-and-spies/</guid><dc:creator><![CDATA[Aliya Sternstein]]></dc:creator><description><![CDATA[Artificial intelligence voice agents with a wide range of capabilities can now guide interrogations worldwide, Pentagon officials told Defense News. ]]></description><pubDate>Tue, 06 May 2025 23:38:29 +0000</pubDate><content:encoded><![CDATA[<p>Artificial intelligence voice agents with various capabilities can now guide interrogations worldwide, Pentagon officials told Defense News. This advance has influenced the design and testing of U.S. military AI agents intended for questioning personnel seeking access to classified material.</p><p>The situation arrives as concerns grow that lax regulations are allowing AI programmers to dodge responsibility for an algorithmic actor’s perpetration of<a href="https://www.law.cornell.edu/wex/intentional_infliction_of_emotional_distress" rel=""> emotional abuse</a> or<a href="https://www.ohchr.org/en/documents/thematic-reports/ahrc4349-report-psychological-torture-and-ill-treatment" rel=""> “no-marks” cybertorture</a>. Notably, a teenager allegedly<a href="https://storage.courtlistener.com/recap/gov.uscourts.flmd.433581/gov.uscourts.flmd.433581.11.0_2.pdf" rel=""> died by suicide</a> — and several others endured mental distress — after conversing with self-learning voicebot and chatbot<a href="https://www.washingtonpost.com/technology/2024/12/10/character-ai-lawsuit-teen-kill-parents-texas/" rel=""> “companions”</a> that<a href="https://www.documentcloud.org/documents/25450619-filed-complaint/" rel=""> dispensed antagonizing language</a>. </p><p>Now,<a href="https://scholarship.law.umn.edu/cgi/viewcontent.cgi?article=1179&amp;context=mlr" rel=""> seven years after writing about physical torture</a> in “The Rise of A.I. Interrogation in the Dawn of Autonomous Robots and the Need for an Additional Protocol to the U.N. Convention Against Torture,” privacy attorney Amanda McAllister Novak sees an even greater need for bans and criminal repercussions. </p><p>In the wake of the use of “chatbots, voicebots, and other AI-enabled technologies for psychologically-abusive purposes — we have to think about if it’s worth having AI-questioning systems in the military context,” said Novak, who also serves on the World Without Genocide board of directors. Novak spoke to Defense News on her own behalf.</p><p>Royal Reff, a spokesperson for the U.S. Defense Counterintelligence and Security Agency (DCSA), which screens individuals holding or applying for security clearances, said in a statement that the agency’s AI voice agent was “expressly developed” to “mitigat[e] gender and cultural biases” that human interviewers may harbor.</p><p>Also, “because systems like the interviewer software” are “currently being used worldwide, including within the U.S. by state and local law enforcement, we believe that it is important for us to understand the capabilities of such systems,” he stated.</p><p>DCSA spokesperson Cindy McGovern added that the development of this technology continues because of its “potential for enhancing U.S. national security, regardless of other foreign applications.” </p><p>After hearing the rationale for the project, Novak registered concerns about the global race for dominance in military AI capabilities. </p><p>Odds are high that “no matter how much the government cares about proper training, oversight and guardrails,” cybercriminal organizations or foreign-sponsored cybercriminals may hack into and weaponize military-owned AI to psychologically hurt officers or civilians, she said. </p><p>“Online criminal spaces are thriving” and “harming the most vulnerable people,” Novak added. </p><p>Investors are betting<a href="https://www.defensenews.com/pentagon/2025/01/24/power-generation-challenges-could-overshadow-stargate-ai-initiative/" rel=""> $500 billion that data centers for running AI applications</a> will ultimately secure world leadership in AI and cost savings across the public and private sectors. The $13 billion<a href="https://www.marketsandmarkets.com/Market-Reports/conversational-ai-market-49043506.html" rel=""> conversational AI market</a> alone will nearly quadruple to $50 billion by 2030, as the<a href="https://www.globenewswire.com/news-release/2025/03/11/3040734/0/en/AI-Voice-Generators-Market-to-Reach-USD-40-25-Billion-by-2032-Driven-by-Advances-in-AI-and-NLP-for-Lifelike-Voice-Solutions-Research-Report-By-SNS-Insider.html" rel=""> voice generator industry</a> soars from $3 billion to an expected $40 billion by 2032. Meanwhile, the U.S. Central Intelligence Agency<a href="https://www.cia.gov/readingroom/document/0000619182" rel=""> has been toying with AI interrogators</a> since at least the early 1980s. </p><p>DCSA officials publicly wrote in 2022 that<a href="https://www.dcsa.mil/Portals/91/Documents/about/err/DCSA_Gatekeeper_v2i4_web508.pdf" rel=""> whether a security interview can be fully automated remains an open question</a>. Preliminary results from mock questioning sessions “are encouraging,” officials noted, underscoring benefits such as “longer, more naturalistic types of interview formats.” </p><p>Reff stated that the agency “would not employ any such system that was not first sufficiently studied to understand its potential,” including “negative consequences.” </p><p>Researchers let volunteers raise concerns after each test, and none have indicated that the voicebot interviewer harmed them psychologically or otherwise, he added. </p><p>However,<a href="https://www.sciencedirect.com/science/article/abs/pii/S1071581916300799" rel=""> experiments</a> with a recent prototype barred volunteers with mental disorders from participating, whereas actual security interviews typically do not exempt individuals with mental health conditions from questioning, noted Renée Cummings, a data science professor and criminal psychologist at the University of Virginia.</p><p>Cummings said that research and testing can never account for every psychological variable that may influence the emotional or cognitive state of the interviewee.</p><p>In laboratory or field-testing scenarios, “you can’t expose someone to extreme torture by an avatar or by a bot to see the result,” said Cummings, who also sits on the advisory council of the AI &amp; Equality Initiative at the Carnegie Council for Ethics in International Affairs. “We need to focus on gaining a more sophisticated understanding about the impacts of algorithms on the psychological state, our emotions and our brain — because of AI’s ability to impact in real-time.” </p><h3><b>Screening the voicebot screeners </b></h3><p>An early 1980s<a href="https://www.cia.gov/readingroom/document/0000619182" rel=""> CIA transcript of a purported conversation</a> between an AI program and an alleged spy highlights the national security world’s long-held interest in automating human-source intelligence, or HUMINT, collection. </p><p>Developers designed the chatbot’s algorithms to analyze correlations between suspected spook “Joe Hardesty’s” behaviors and words or phrases in Hardesty’s responses to open-ended questions. </p><p>From this analysis, the chatbot pegged some of the suspect’s vulnerabilities, including topics that may hit a raw nerve: </p><p><i>AI: What do you tend to think is my interest in your government?</i> </p><p><i>Hardesty: I think you would do in my government if you had a chance.</i> </p><p><i>AI: You are prone to think I would do in your government because?</i> </p><p><i>Hardesty: You are anti-democratic.</i> </p><p><a href="https://www.cia.gov/readingroom/docs/DOC_0000619182.pdf" rel="">In 1983</a>, the CIA quipped that Joe Hardesty is fortunate that “should the probing get too discomforting, he will have an option that will not be available to him in a true overseas interview situation — he can stop the questions with a flick of the ‘off’ switch.” </p><p>Today, Bradley Moss, a lawyer who represents whistleblowers accused of leaking, is not laughing at DCSA’s vision of fully-automated interviews. </p><p>“There would have to be someone observing” the avatar “that can stop the process, that can come into the room and insert a human element to it,” he cautioned. </p><p>Then again, other critics note that a human may not want to intervene. A situation with “a human overseer monitoring the chatbot is fine, unless the human also believes that verbal torture is a good thing. And that is a real possibility,” said Herb Lin, a senior research scholar for cyber policy and security at Stanford University who once held several security clearances. </p><p>Despite a<a href="https://www.ohchr.org/en/documents/thematic-reports/ahrc4349-report-psychological-torture-and-ill-treatment" rel=""> global ban on torture</a> and evidence that<a href="https://www.justsecurity.org/95683/non-coercive-interrogation-un-manual/" rel=""> rapport-building interviews are more efficient than ones gunning for confessions</a>, intelligence officials continue subjecting interviewees to inhumane treatment. </p><p>Novak, the data privacy attorney and anti-genocide activist, said the idea that excessive force gets the job done may encourage some government contractors to set performance metrics for voice algorithms that permit bullying. </p><p>“While AI has a tremendous ability to bring out the best in human potential, it also has the ability to exacerbate the worst of human potential and to elevate that hostility,” she added.</p><p>Parents contend that voicebot and chatbot companions, trained on<a href="https://www.documentcloud.org/documents/25450619-filed-complaint/" rel=""> content from online forums</a>, show just that.<a href="http://character.ai/" rel=""> </a></p><p><a href="http://character.ai/" rel="">Character AI</a>, the firm that offers virtual relationships with bots patterned after icons and influencers, profits from users glued to their phones. Each user, on average,<a href="https://www.businesswire.com/news/home/20230323005299/en/Personalized-Superintelligence-Platform-Character.AI-Secures-%24150M-in-Series-A-Funding-Led-by-Andreessen-Horowitz" rel=""> talks two hours a day</a> with various virtual friends. Character AI officials have <a href="https://blog.character.ai/community-safety-updates/" rel="">stated</a> that, <a href="https://storage.courtlistener.com/recap/gov.uscourts.flmd.433581/gov.uscourts.flmd.433581.59.0.pdf" rel="">after learning of concerns</a>, the company reduced the likelihood of users encountering suggestive content and now warns them of hour-long conversations. </p><p>Novak commented that the accusations against Character AI illustrate the ability of self-learning voicebots to amplify indecency in training data and to distance trainers from accountability for that offensiveness. </p><p>In the national security realm, developers of military AI voice systems that may potentially abuse or terrorize operate in a virtually lawless no-man’s land. AI ethics policies in the world’s most powerful country offer nearly no guidance on de-escalating abusive conversations. </p><p>Early U.S.<a href="https://www.state.gov/wp-content/uploads/2023/10/Latest-Version-Political-Declaration-on-Responsible-Military-Use-of-AI-and-Autonomy.pdf" rel=""> responsible</a> and<a href="http://defense.gov/News/Releases/release/article/2091996/dod-adopts-ethical-principles-for-artificial-intelligenc" rel=""> ethical AI policies</a> in the<a href="https://ai.gov/wp-content/uploads/2024/10/NSM-Framework-to-Advance-AI-Governance-and-Risk-Management-in-National-Security.pdf" rel=""> national security space</a> focused on accuracy, privacy and minimizing racial and ethnic biases — without regard for psychological impact. That policy gap widened after President Donald Trump<a href="https://www.reuters.com/technology/artificial-intelligence/trump-revokes-biden-executive-order-addressing-ai-risks-2025-01-21/" rel=""> revoked many regulations</a> in an<a href="https://www.whitehouse.gov/presidential-actions/2025/01/removing-barriers-to-american-leadership-in-artificial-intelligence/" rel=""> executive order</a> aimed at accelerating<a href="https://news.bloomberglaw.com/us-law-week/trumps-ai-policy-shift-promotes-us-dominance-and-deregulation" rel=""> private sector innovation</a>. </p><p>In general, psychological suffering is often<a href="https://www2.ohchr.org/english/bodies/hrcouncil/docs/13session/A.HRC.13.39.Add.5_en.pdf" rel=""> “brushed away”</a> as a mere allegation since “<a href="https://www.justsecurity.org/77115/the-mendez-principles-beware-crossing-the-line-to-psychological-torture/" rel="">it leaves no obvious physical scars.”</a> </p><p>The United Nations initially did not address “psychological torture” under the 1984 Convention Against Torture. Not until five years ago did the term take on significance. </p><p>A<a href="https://www.ohchr.org/en/documents/thematic-reports/ahrc4349-report-psychological-torture-and-ill-treatment" rel=""> 2020 UN report now defines “torture,” in part,</a> as any technique intended or designed to purposefully inflict severe mental pain or suffering<a href="https://docs.un.org/en/A/HRC/43/49" rel=""> “without using the conduit” of “severe physical pain or suffering.”</a> </p><p>At bottom, psychological torture targets basic human needs. The interrogation techniques arouse fear; breach privacy or sexual integrity to kindle shame or suicidal ideation; alter sound to heighten disorientation and exhaustion; foster and then betray sympathy to isolate; and instill helplessness.</p><p>When an algorithmic audiobot is the conduit of cruelty, neither the UN treaty nor other international laws are equipped to hold humans accountable, Novak said. Without binding rules on the use of AI in the military context, “bad actors will deny any such torture was ‘intentional’” — a required element for criminal responsibility that the law created before AI matured, she explained.</p><p>Looking to the future, Nils Melzer, author of the 2020 UN report and a former UN special rapporteur on torture, warned that the interpretation of psychological torture must evolve in sync with emerging technologies, “such as artificial intelligence,” because cyber environments provide<a href="https://docs.un.org/en/A/HRC/43/49" rel=""> “virtually guaranteed anonymity and almost complete impunity”</a> to offenders. </p>]]></content:encoded><media:thumbnail url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/HRZYGYQCL5C4TM52T6TWLLI65Q.jpg" type="image/jpeg"/><enclosure url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/HRZYGYQCL5C4TM52T6TWLLI65Q.jpg" type="image/jpeg"/><media:content url="https://cloudfront-us-east-1.images.arcpublishing.com/archetype/HRZYGYQCL5C4TM52T6TWLLI65Q.jpg" type="image/jpeg" height="3791" width="5000"><media:description type="plain"><![CDATA[(Getty Images)]]></media:description><media:credit role="author" scheme="urn:ebu">.shock</media:credit></media:content></item></channel></rss>