Quantum Computing – Advantage Or Security Threat?

Several Federal agencies of the US security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in the near-term.

The US government passed a bill to foster an active quantum computing industry in, yet this hasn’t prevented the security community from regarding quantum computing being seen as an ’emerging threat’ together with certain forms of artificial intelligence.

The study was commissioned by the US Government Accountability Office, in a white paper titled “Long-Range Emerging Threats Facing the United States as Identified by Federal Agencies.”

The agencies identified 26 long-term threats within four categories, which were:

  • Adversaries’ Political and Military Advances—e.g., China’s increasing ability to match the U.S. military’s strength.
  • Dual-Use Technologies—e.g., self-driving cars might be developed for private use, but militaries can use them too.
  • Weapons—advances in weapons technology, e.g., cyber-weapons.
  • Events and Demographic Changes—e.g., infectious disease outbreaks.

Within the “dual-use technologies” category, that took center stage, the security agencies expressed fear that continued advances with quantum computing and artificial intelligence could be used to cause harm, rather than advance society.

Quantum computing continues to advance. This year, for instance, computer technologists set a new speed record for the trapped-ion ‘building blocks’ (or logic gates) of future-generation quantum computers.

As an example of the potential threat posed by quantum computing, researchers from the Russian Quantum Center in Moscow have gone on record to state that cryptocurrencies and blockchain technology will be vulnerable in the future from quantum systems unless these applications themselves integrate quantum technologies.

The same stands with AI, where studies are underway to assess the extent that AI can understand what it is like to be human, according to digitaljournal.com. The report reflects the concern where “adversaries could gain increased access to AI through affordable designs used in the commercial industry, and could apply AI to areas such as weapons.”

Also, “quantum communications could enable adversaries to develop secure communications that US personnel would not be able to intercept or decrypt.” Centered on this is the deployment by terror groups or rogue states of sophisticated technologies in the future, directed against the US.

I-HLS

You Might Also Read:

Quantum Computing Is Becoming Reality:

« How To Develop Good Cybersecurity Practice
Fortnite Teen Hackers 'Earning Thousands of Pounds a Week' »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Wall Street Technology Association (WSTA)

Wall Street Technology Association (WSTA)

The Wall Street Technology Association (WSTA) provides financial industry technology professionals with forums to learn from and connect with each other.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Neosoft

Neosoft

Néosoft is an independent digital transformation consulting group with expertise in Consulting & Agility, Cybersecurity, Data, DevOps, Infrastructure & Cloud and Software Engineering.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

Helix Tech Consulting

Helix Tech Consulting

Helix Tech have expertise in a wide range of technology areas, including IT strategy, infrastructure design, cybersecurity, disaster recovery, cloud, data centers, IT cost optimization, and more.