Cyber Warfare & The Future Of AI

Low-grade Artificial Intelligence (AI) versus higher-grade AI conflicts in which AI systems will be used by adversaries to carry out cyber attacks against the US is likely in the near future, Jude Sunderbruch, the US Defense Department’s Cyber Crime Center (DC3) Director has said. 

His predictions is that AI will be integral in the next phase of cyber warfare, enabling new tools and new versions of classic attacks, according to intelligence experts.  

DC3 serves as one of a number of US federal cyber security analysis agencies and has advanced forensics capabilities used to collaborate with other intelligence community players and share information about cyberthreats. 

 Sunderbruch was speaking at  the DefenseScoop Google Defense Forum alongside Col. Richard Leach, the US Defense Information Systems Agency’s Intelligence Director. “I think we’re really just at the start,” Sunderbruch said, later adding that the US and its allies will have to get creative and learn how to best use existing AI systems to gain a leg up on competing intelligence giants like China.

AI and machine learning technologies have often been said to be the next phase of cyber security, with researchers and officials saying they will heighten capabilities of both novice and nation-state hackers. In the near term, AI systems can be used for threat and vulnerability analysis, as well as system testing, said Sunderbruch. 

An up-dated cyber security strategy  published in September 2023  says the agency will study how to apply automated and AI-driven capabilities to US cyberspace. The Pentagon plan takes an offensive approach for US cyber operations, shifting focus from counter terrorism to combating nation state operations from  China and Russia.

This strategic shift appears to be influenced by Russia’s failed invasion of Ukraine and how the continuing battle there has demonstrated how cyber capabilities may be used in large-scale conventional conflict.   

@USDSIA:    US Dept. of Defense:   US Dept.of Defense:  DefenseScoop:     DefenseOne:     The White House:

Washington Post:      NextGov

You Might Also Read: 

Cyberwar: Lessons From Ukraine:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ten Ways To Elevate Public Sector Cyber Security
Businesses Must Prioritise Safeguards Against Common Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Quality Professionals (Q-Pros)

Quality Professionals (Q-Pros)

QPros are a recognized leader in providing full-cycle software quality assurance and application testing services.

KFSensor

KFSensor

KFSensor is an advanced 'honeypot' intrusion and insider threat detection system for Windows networks.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Clavis Information Security

Clavis Information Security

Clavis is an Information Security company offering a complete portfolio of solutions from Pentesting and Security Assessments to Managed Security Services and Training.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

Timus Networks

Timus Networks

Timus Networks enables today's work from anywhere organizations to secure their networks very easily and cost effectively.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Ampcus Cyber

Ampcus Cyber

Ampcus Cyber specialize in providing comprehensive security solutions and services that are tailored to safeguard our clients' networks, infrastructure, and valuable assets.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

ThreatDown

ThreatDown

ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today’s most advanced threats.

Security4Media

Security4Media

Security4Media is a non-profit association set up to reduce risks and support trust in media, in the face of increasing cybersecurity threat levels.