Cyber Warfare & The Future Of AI

Low-grade Artificial Intelligence (AI) versus higher-grade AI conflicts in which AI systems will be used by adversaries to carry out cyber attacks against the US is likely in the near future, Jude Sunderbruch, the US Defense Department’s Cyber Crime Center (DC3) Director has said. 

His predictions is that AI will be integral in the next phase of cyber warfare, enabling new tools and new versions of classic attacks, according to intelligence experts.  

DC3 serves as one of a number of US federal cyber security analysis agencies and has advanced forensics capabilities used to collaborate with other intelligence community players and share information about cyberthreats. 

 Sunderbruch was speaking at  the DefenseScoop Google Defense Forum alongside Col. Richard Leach, the US Defense Information Systems Agency’s Intelligence Director. “I think we’re really just at the start,” Sunderbruch said, later adding that the US and its allies will have to get creative and learn how to best use existing AI systems to gain a leg up on competing intelligence giants like China.

AI and machine learning technologies have often been said to be the next phase of cyber security, with researchers and officials saying they will heighten capabilities of both novice and nation-state hackers. In the near term, AI systems can be used for threat and vulnerability analysis, as well as system testing, said Sunderbruch. 

An up-dated cyber security strategy  published in September 2023  says the agency will study how to apply automated and AI-driven capabilities to US cyberspace. The Pentagon plan takes an offensive approach for US cyber operations, shifting focus from counter terrorism to combating nation state operations from  China and Russia.

This strategic shift appears to be influenced by Russia’s failed invasion of Ukraine and how the continuing battle there has demonstrated how cyber capabilities may be used in large-scale conventional conflict.   

@USDSIA:    US Dept. of Defense:   US Dept.of Defense:  DefenseScoop:     DefenseOne:     The White House:

Washington Post:      NextGov

You Might Also Read: 

Cyberwar: Lessons From Ukraine:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ten Ways To Elevate Public Sector Cyber Security
Businesses Must Prioritise Safeguards Against Common Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

iLand

iLand

iland is a global cloud service provider of secure and compliant hosting for infrastructure (IaaS), disaster recovery (DRaaS), and backup as a service (BaaS).

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

CybrHawk

CybrHawk

CybrHawk is a leading provider of information security-driven risk intelligence solutions focused solely on protecting clients from cyber-attacks.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Secfix

Secfix

Secfix helps companies get secure and compliant in weeks instead of months. We are on a mission to automate security and compliance for small and medium-sized businesses.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

Cyberleaf

Cyberleaf

Cyberleaf is simplified managed cybersecurity for MSPs, enabling top tier cyber protection for small and medium enterprise.

UFS Technology

UFS Technology

UFS, the bank technology outfitter for community banks, provides purpose-built, bank-exclusive technology services and solutions including cybersecurity.