AI Is The New Weapon In The Cyber Arms Race

Artificial Intelligence (AI) is a rapidly growing field of technology with potentially significant implications for national security with the United States and other nations actively developing AI applications for a range of military functions.

Indeed, AI promises to change the face of future warfare as it becomes absorbed into autonomous weapons systems and being increasingly used to manage military operations. It has already been incorporated into military operations in Iraq and Syria.

Research is underway for AI to be applied in the fields of intelligence collection and analysis, logistics, cyber operations, information operations, command and control, as well as a variety of autonomous vehicles and the US military is already integrating AI systems into combat via an initiative called Project Maven, which has used AI algorithms to identify insurgent targets in Iraq and Syria.

These investments are the early stages of an AI arms race, similar to the nuclear arms race of the 20th century and this type of military escalation poses a threat to all humanity. Nevertheless, the development of military AI is accelerating and right now AI is now being deployed on multiple military applications, mainly to conduct predictive analysis at a scale beyond human means. 

Hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. As companies move to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber attacks.

The trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely serves to increase the threat surface.

According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cyber-criminals. This escalation reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. 

AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users. 
Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. 

Chief Information Officers advise boards on the growing cyber security threats and although AI programs cannot presently replace experienced cyber security professionals, AI technology can make security staff smarter, more vigilant and more responsive.

Organizations like the US Department of Defense and the space agency NASA, as well as governments around the world are implementing AI-based tools to address the cyber threat and many experts believe that AI will have a significant impact on warfare and it will transform how war happens in the future. 

West Point Modern War Inst:        US Congress Research Service:      FutureofLife Inst:    Fortuna's Corner: Gen. John Allen:

You Might Also Read: 

The Emerging Domain Of Cyber War:

 

« Detecting Rogue Mobile Devices
Take Your Network Security One Step Further »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

BlastWave

BlastWave

BlastWave deliver Operational Technology Cybersecurity solutions that minimize the available attack surface and protect against the rising tide of AI-powered cyber attacks.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Boecore

Boecore

Boecore is an aerospace and defense engineering company that specializes in software solutions, systems engineering, cybersecurity, enterprise networks, and mission operations.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.