AI Is The New Weapon In The Cyber Arms Race

Artificial Intelligence (AI) is a rapidly growing field of technology with potentially significant implications for national security with the United States and other nations actively developing AI applications for a range of military functions.

Indeed, AI promises to change the face of future warfare as it becomes absorbed into autonomous weapons systems and being increasingly used to manage military operations. It has already been incorporated into military operations in Iraq and Syria.

Research is underway for AI to be applied in the fields of intelligence collection and analysis, logistics, cyber operations, information operations, command and control, as well as a variety of autonomous vehicles and the US military is already integrating AI systems into combat via an initiative called Project Maven, which has used AI algorithms to identify insurgent targets in Iraq and Syria.

These investments are the early stages of an AI arms race, similar to the nuclear arms race of the 20th century and this type of military escalation poses a threat to all humanity. Nevertheless, the development of military AI is accelerating and right now AI is now being deployed on multiple military applications, mainly to conduct predictive analysis at a scale beyond human means. 

Hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. As companies move to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber attacks.

The trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely serves to increase the threat surface.

According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cyber-criminals. This escalation reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. 

AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users. 
Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. 

Chief Information Officers advise boards on the growing cyber security threats and although AI programs cannot presently replace experienced cyber security professionals, AI technology can make security staff smarter, more vigilant and more responsive.

Organizations like the US Department of Defense and the space agency NASA, as well as governments around the world are implementing AI-based tools to address the cyber threat and many experts believe that AI will have a significant impact on warfare and it will transform how war happens in the future. 

West Point Modern War Inst:        US Congress Research Service:      FutureofLife Inst:    Fortuna's Corner: Gen. John Allen:

You Might Also Read: 

The Emerging Domain Of Cyber War:

 

« Detecting Rogue Mobile Devices
Take Your Network Security One Step Further »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Zybert Computing

Zybert Computing

Zybert Computing provide server solutions with built-in security and information protection features for the SME market.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Cambridge International Systems

Cambridge International Systems

For more than 25 years, Cambridge has been fighting bad actors in both the cyber and physical worlds.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

NCIIPC's mission is to protect the Critical Information Infrastructure of India, from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction.