Could An AI Arms Race Lead To Accidental War?

Experts and politicians in China are worried that a rush to integrate Artificial Intelligence into weapons and military equipment could accidentally lead to war between nations.

According to a new report published by US national security think tank Center for a New American Security (CNAS), Chinese officials increasingly see an “arms race” dynamic in AI as a threat to global peace.

As countries scramble to reap the benefits of artificial intelligence in various domains, including the military, the fear is that international norms shaping how countries communicate will become outdated, leading to confusion and potential conflict.

“The specific scenario described to me [by one anonymous Chinese official] is unintentional escalation related to the use of a drone,” Gregory C. Allen, an adjunct senior fellow at CNAS and author of the new report, tells The Verge.

As Allen explains, the operation of drones both large and small has become increasingly automated in recent years. In the US, drones are capable of basic autopilot, performing simple tasks like flying in a circle around a target.

But China is being “more aggressive about introducing greater levels of autonomy closer to lethal use of force,” he says. One example is the Blowfish A2 drone, which China exports internationally and which, says Allen, is advertised as being capable of “full autonomy all the way up to targeted strikes.”

Because drones are controlled remotely, militaries tend to be more cavalier about their use. With no risk of human casualties, they’re more willing to shoot them down, but also deploy them into contested airspaces in the first place. This attitude can also be seen in cyberwarfare, where countries will intrude in ways they wouldn’t necessarily risk if humans were involved.

“The point made to me was that it’s not clear how either side will interpret certain behaviors [involving autonomous equipment],” says Allen. “The side sending out an autonomous drone will think it’s not a big deal because there’s no casualty risk, while the other side could shoot it down for the same reason. But there’s no agreed framework on what message is being sent by either sides’ behavior.”

The risks in such a scenario become greater when factoring in advanced autonomy. If a drone or robot fires a warning shot at enemy troops, for example, how will that action be interpreted? Will the troops understand it as an automated response, or will they think it’s the decision of a human commander? How would they know in either case?

In essence, says Allen, countries around the world have yet to define “the norms of armed conflict” for autonomous systems. And the longer that continues, the greater the risk for “unintentional escalation.”

“I think that’s a real and legitimate threat,” says Allen.

The rest of the CNAS report, titled “Understanding China’s AI Strategy: Clues to Chinese Strategic Thinking on Artificial Intelligence and National Security,” notes a number of other high-level concerns and attitudes in China’s government-led AI strategy.

Chinese officials recognise, for example, that it and America are the only two viable AI superpowers. Both countries have the talent, the funding, and the bustling tech sectors needed to push this technology further, though each nation also has its own particular strengths and weaknesses.

China has access to more data, for example, and has the potential to leapfrog Western technology. (Many Chinese citizens went from having no phone to a mobile phone, without getting a landline in between, for example). America, meanwhile, has a significant lead in the development of chip technology, a vital component in processing the huge datasets that power AI applications.

CNAS’s report notes that China is particularly keen to close this important gap. Chinese firms like Baidu, Alibaba, and Huawei have established new projects to develop AI accelerator hardware; government money is pouring into these initiatives; and the industry is trying other methods to get a hold of foreign expertise. These include the recent proposed acquisition of US chip designer Qualcomm by Singapore firm Broadcom, which was blocked by President Trump on national security grounds.

While a certain amount of competition between China and the US is to be expected, Allen says cooperation is also needed, especially when it comes to these military questions.

He notes that while Chinese officials he spoke to had a good grasp of contemporary US thinking on issues like autonomous warfare, American officials tend to be less well-briefed about their Chinese counterparts, partly because many Chinese policy documents are never translated into English.

Without properly understanding different nations’ strategies in these domains, says Allen, the chances of misunderstanding and conflict increase.

“There are definitely pockets of real expertise on this issue [in the US] but there’s not the widespread comprehension there needs to be,” he says.

The Verge

You Might Also Read:

DARPA Wants To Emulate Insect Brains:

 

 

« Facebook Is Moving Fast To Get Into Blockchain
New Zealand Business Has Increased Cybersecurity Spending, Not Expertise »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

Wallarm

Wallarm

Wallarm is the only unified, best-in-class API Security and WAAP (Web App and API Protection) platform to protect your entire API and web application portfolio.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Ergo

Ergo

Ergo is a world-class IT Partner of choice, leveraging the latest technology available in cloud, mobility, big data, analytics, and social media.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

Phakamo Tech

Phakamo Tech

Phakamo Tech offers a full set of governance, risk, compliance, cybersecurity and Microsoft Cloud services that include consulting, planning, implementation and cyber incident response.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

Qi An Xin (QAX)

Qi An Xin (QAX)

QAX is a listed company based in China, and a leader in cybersecurity industry, providing new generation enterprise-level and national-level cybersecurity solutions.