AI In Conflict: Cyberwar & Robot Soldiers

Artificial intelligence in conflict, from robot soldiers to cyber warfare, what will it look like? It's a question that was under discussion at this year's Munich Security Conference.

Leading the debate, Estonian President Kersti Kaljulaid (pictured). Her country was the victim of a massive hacking attack that was widely blamed on Russia.

The future of warfare will involve artificial intelligence systems acting as lethal weapons, and much like cyber a decade ago, NATO allies are ill-equipped to manage the potential threat, said current and former European leaders speaking at the Munich Security Conference. 

Kersti Kaljulaid, estimated a 50 percent chance that by the middle of this century we will have an AI system capable of launching a lethal attack. And yet, just as the world was not prepared for a cyberattack when Russia first launched a cyberattack against Estonia in 2007 — bombarding websites of Estonian parliament, banks, ministries, and news outlets — there is no strategy or international law to deter such tactics of warfare.

“I have been really worried as an Estonian. Estonia is a digital state compared to many others, that our capacity to internationally agree and regulate for technological development has been extremely low," Kaljulaid told euronews. "We haven’t managed to do any progress, for example, even on cyber issues”.

Members of the public present in the audience said they are worried about robot soldiers, and self-piloted weaponised drones. 

NATO's former Secretary General Anders Fogh Rassmussen said it's a legitimate concern: 

“The use of robots and artificial intelligence within the military might make the whole world more unstable. For that reason, I think we should elaborate an international and legally binding treaty to prohibit the production and use of what has been called autonomous lethal weapons". 

But such standards don’t come fast. It took until 2017 for NATO to declare that a cyber-attack would spur an Article 5 response, that being, collective defense among allies, after a massive computer hack paralysed portions of government and businesses in Ukraine before spreading around the globe. 

In the meantime, much like cyber-security, AI presents an opportunity for Russia as well as China to use “grey zones,” said Rasmussen, not initiating open military conflict, but provoking allies enough to disrupt.

Ein News:         DefenseNews

You Might Also Read: 

Artificial Intelligence, Robotics & All Tomorrows Wars:

The Current Threat Of Global Cyber Warfare:

Cyberwar: A Guide:
 

« Chinese Police Wearing Face Recognition Glasses
Tackling The Insider Threat: … Where To Start? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

ThreatSpike Labs

ThreatSpike Labs

ThreatSpike Labs provides the first end-to-end fully managed security service for companies of all sizes.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

StateRAMP

StateRAMP

StateRAMP reduces risk from unsecure cloud solutions and protects data by providing State and local governments a standardized approach for verifying and monitoring security postures.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Rampart AI

Rampart AI

Tackling DevSecOps Issues In Application Security. Rampart has revolutionized the shift left security approach, applying zero-trust to application development.

Solcon Capital

Solcon Capital

Solcon Capital is a forward-looking, technology-focused investment firm that is committed to identifying and investing in the most promising areas of innovation and development in the tech industry.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

NCIIPC's mission is to protect the Critical Information Infrastructure of India, from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction.

Conifers.ai

Conifers.ai

Empower your existing SecOps team with the strength of AI - achieve SOC excellence with Conifers CognitiveSOC.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.