Skip to content Skip to footer

U.S. Military Seeks Business Enter on AI Invoice of Supplies Initiative

U.S. Military officers are searching for trade enter on a brand new initiative that goals to require corporations to reveal the origins of their synthetic intelligence (AI) algorithms. The initiative, often called the AI Invoice of Supplies (AI BOM), would require potential contractors to offer perception into their digital elements and provide chain. This initiative is much like the software program invoice of supplies (SBOM) practices supported by the Nationwide Telecommunications and Info Administration and the Cybersecurity and Infrastructure Safety Company.

The Pentagon has been investing in AI, machine studying, and autonomy so as to meet calls for for quicker decision-making, distant intelligence gathering, and lowered human danger on technologically superior battlefields. To assist this effort, the Protection Division established its Chief Digital and AI Workplace in 2021, with executives highlighting the significance of high-quality information.

The AI BOM measure will not be meant to hurt corporations or compromise delicate mental property. As an alternative, its function is to boost cybersecurity and consistency. The purpose is to cut back the assault floor from an algorithmic standpoint, quite than reverse engineer proprietary data.

The Military beforehand mentioned the opportunity of the AI BOM at an trade convention, the place trade representatives have been invited to offer preliminary suggestions on potential necessities. The Military needs to safe its digital provide chain, together with software program, information, and AI, much like its efforts to safe bodily provide chains for semiconductors and elements.

At present, there are over 685 AI-related tasks underway throughout the Pentagon, with not less than 232 tasks being managed by the Military alone. The introduction of the AI BOM initiative will additional strengthen the Military’s efforts to leverage AI capabilities whereas guaranteeing transparency and cybersecurity.

Leave a comment