AI Is The New Weapon In The Cyber Arms Race

Artificial Intelligence (AI) is a rapidly growing field of technology with potentially significant implications for national security with the United States and other nations actively developing AI applications for a range of military functions.

Indeed, AI promises to change the face of future warfare as it becomes absorbed into autonomous weapons systems and being increasingly used to manage military operations. It has already been incorporated into military operations in Iraq and Syria.

Research is underway for AI to be applied in the fields of intelligence collection and analysis, logistics, cyber operations, information operations, command and control, as well as a variety of autonomous vehicles and the US military is already integrating AI systems into combat via an initiative called Project Maven, which has used AI algorithms to identify insurgent targets in Iraq and Syria.

These investments are the early stages of an AI arms race, similar to the nuclear arms race of the 20th century and this type of military escalation poses a threat to all humanity. Nevertheless, the development of military AI is accelerating and right now AI is now being deployed on multiple military applications, mainly to conduct predictive analysis at a scale beyond human means. 

Hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. As companies move to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber attacks.

The trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely serves to increase the threat surface.

According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cyber-criminals. This escalation reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. 

AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users. 
Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. 

Chief Information Officers advise boards on the growing cyber security threats and although AI programs cannot presently replace experienced cyber security professionals, AI technology can make security staff smarter, more vigilant and more responsive.

Organizations like the US Department of Defense and the space agency NASA, as well as governments around the world are implementing AI-based tools to address the cyber threat and many experts believe that AI will have a significant impact on warfare and it will transform how war happens in the future. 

West Point Modern War Inst:        US Congress Research Service:      FutureofLife Inst:    Fortuna's Corner: Gen. John Allen:

You Might Also Read: 

The Emerging Domain Of Cyber War:

 

« Detecting Rogue Mobile Devices
Take Your Network Security One Step Further »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

SI-CERT

SI-CERT

SI-CERT (Slovenian Computer Emergency Response Team) is the national cyber scurity incident response center for Slovenia.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Vulcan Cyber

Vulcan Cyber

At Vulcan, we’re modernizing the way enterprises reduce their cyber risk. From detection to resolution, we automate and orchestrate the vulnerability remediation process dynamically and at scale.

National Cryptologic Foundation (NCF)

National Cryptologic Foundation (NCF)

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

Anvilogic

Anvilogic

Anvilogic provides a unifying experience for security professionals aimed at providing improved visibility, enrichment, and context across hundreds of alerting datasets and security tools.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Fraud.net

Fraud.net

Fraud.net operates the first end-to-end fraud management and revenue enhancement ecosystem specifically built for digital enterprises and fintechs globally.