Quantum Computing – Advantage Or Security Threat?

Several Federal agencies of the US security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in the near-term.

The US government passed a bill to foster an active quantum computing industry in, yet this hasn’t prevented the security community from regarding quantum computing being seen as an ’emerging threat’ together with certain forms of artificial intelligence.

The study was commissioned by the US Government Accountability Office, in a white paper titled “Long-Range Emerging Threats Facing the United States as Identified by Federal Agencies.”

The agencies identified 26 long-term threats within four categories, which were:

  • Adversaries’ Political and Military Advances—e.g., China’s increasing ability to match the U.S. military’s strength.
  • Dual-Use Technologies—e.g., self-driving cars might be developed for private use, but militaries can use them too.
  • Weapons—advances in weapons technology, e.g., cyber-weapons.
  • Events and Demographic Changes—e.g., infectious disease outbreaks.

Within the “dual-use technologies” category, that took center stage, the security agencies expressed fear that continued advances with quantum computing and artificial intelligence could be used to cause harm, rather than advance society.

Quantum computing continues to advance. This year, for instance, computer technologists set a new speed record for the trapped-ion ‘building blocks’ (or logic gates) of future-generation quantum computers.

As an example of the potential threat posed by quantum computing, researchers from the Russian Quantum Center in Moscow have gone on record to state that cryptocurrencies and blockchain technology will be vulnerable in the future from quantum systems unless these applications themselves integrate quantum technologies.

The same stands with AI, where studies are underway to assess the extent that AI can understand what it is like to be human, according to digitaljournal.com. The report reflects the concern where “adversaries could gain increased access to AI through affordable designs used in the commercial industry, and could apply AI to areas such as weapons.”

Also, “quantum communications could enable adversaries to develop secure communications that US personnel would not be able to intercept or decrypt.” Centered on this is the deployment by terror groups or rogue states of sophisticated technologies in the future, directed against the US.

I-HLS

You Might Also Read:

Quantum Computing Is Becoming Reality:

« How To Develop Good Cybersecurity Practice
Fortnite Teen Hackers 'Earning Thousands of Pounds a Week' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Africa ICS Cyber Security Conference

Africa ICS Cyber Security Conference

Africa's largest ICS Cyber Security Conference and Expo. The only platform that will proudly present top level B2B and B2C networking opportunities.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

BuddoBot

BuddoBot

BuddoBot has been a pioneering force in cybersecurity and information technology since 2008.