), The US Army Special Operations Instructions Teach Soldiers to influence opponents. Technology is able to copy the voice of any person, such as a hostile commander, to give a deliberately false order to the offensive in a certain direction where the soldiers will be waiting for a trap. It is easy to get voice data: they are taken from intercepted messages or from open sources. Thus, you can host the captives, make soldiers surrender, desert, etc.
The main restrictions are hardware and the number of voice data available. However, high-performance equipment is capable of making a whole fake "Report" from a 30-second audio recording. Plus, Ghost Machine can reproduce people with machine learning well. For example, the program has created a voice of a Chinese commander who orders his troops to surrender. The interface of the SI programs is based on an open source code Gradio, and its algorithms are based on commercially available CI models.
A large linguistic model used to generate dippers can create whole content fragments. But there is also a problem - creating conditions under which the enemy must hear a fake order. Previously, the units were installed by speakers, but even with the close placement of equipment to the front, the enemy may not hear the message. The problem will help solve drones. With their help it will be possible to deliver and direct the speakers to the desired areas of the front.
All rights reserved IN-Ukraine.info - 2022