The Dark Side of the Fourth Industrial Revolution – and How To Avoid It

 

Until recently, to inflict damage on a very large scale – that is, beyond the reach of traditional terrorist means – you needed either a large number of people (as in an army) or a large, sophisticated organization (to develop, for instance, a nuclear weapon). Typically, these capacities were held by states. As a consequence, the world eventually developed tools – albeit imperfect – to prevent the escalation of inter-state disputes. These include treaties, conventions and international organizations, but also the concept of deterrence, and in the nuclear age, the shared notion of mutually assured destruction. The latter was one reason why the Cold War, after all, remained cold.

As the world abandoned this Cold War logic, the focus shifted away from the power dynamics of strong states. From the 1990s onwards, the primary focus of international security was on state collapse rather than strong states, and on asymmetric threats rather than symmetric competition.

Today, it looks like we have the worst of both worlds: strategic geopolitical competition has re-emerged, but fragmentation, fragility and violent chaos “from below” continues; coupled with a serious crisis of international governance, this new world order is stymieing our ability to respond and adapt.

With the Fourth Industrial Revolution, and its promise of technological progress on many fronts simultaneously, comes a dark reality: we are also experiencing a rapid and massive democratization of the capacity to wreak havoc on a very large scale. From 3D-printed weapons to genetic engineering in home laboratories, destructive tools across a range of emerging technologies are becoming more readily available.

We spoke with leading experts from a range of fields and asked them for their take on the security implications of emerging technologies:

Unexpected threats can arise when fields of research merge
With the rise of technology fusion, recognized technological fields are developing rapidly and new technological combinations are being invented faster than we can even dream them up.

Interactions of high-tech and low-tech can also surprise
As is being demonstrated in Syria and Iraq, traditional models of warfare – such as infantry forces using artillery – are being combined with new techniques in ways that create challenging and unpredictable dynamics.

Non-state actors are increasingly powerful
Access to emerging technologies is allowing organized criminal groups to operate with the speed and reach of multinational corporations, for example launching DDoS attacks at an impressive scale.

It is hard to broach the subject of security in emerging technologies research
The world lacks a credible platform for critically important discussions about how we should prepare for the risks which could emerge from new technologies.

We need a new approach to regulating space
Decades ago, only the United States and the Soviet Union could afford space programmes. Now, dozens of countries have a presence in space, and more than half of all satellites are commercial. As space could play a role in future conflicts, concerns are growing that current mechanisms to regulate space activities are no longer fit for purpose.

Autonomous weapons are becoming an urgent concern
Are advanced robots, running on artificial intelligence platforms, liable under international law? If robots fight robots, can we ever again have strategically stable situations, given that a software upgrade or a hack could flip the balance of power overnight? Game theory suggests fighting robots would need to be made adaptive and unpredictable, but how then could their future behaviour be predicted when deployed? Will they become unpredictable even to their creators? Discussions on such issues are just starting to happen, partly because much technological innovation is taking place far away from the confines of inter-state conferences on disarmament, non-proliferation and humanitarian law.

“Internet for all” in an unequal world brings global resent
Increased internet access promises to bring significant economic opportunities; but it also creates new ways for significant numbers of desperate and underemployed young people to express anger at their sense of relative deprivation. It also creates opportunities for cultural collisions – what is permissible in one setting can be shocking in another – without the cultural mediation that human contact traditionally brings. Thanks to the power of the internet, ideas and expressions cross the globe in nanoseconds, long before cultural adaptation.

In cyber warfare, attack is easier than defence
For most states, their destructive capacity already significantly exceeds their defensive capacities. They therefore have an economic incentive to continue investing in their offensive capabilities rather than their defensive ones, which leads to vulnerabilities in industrial and government control systems. The age-old insight that the defendant always has a certain advantage over the attacker is hence turned on its head.

In the face of these challenges, how do we incentivize people to take the security threats from emerging technologies seriously?

The search for MAD 2.0
Over the second half of the last century, the fear of nuclear warfare gradually gave way to the relative stability of mutually assured destruction. MAD has so far worked when only a limited number of entities possess the power to destroy each other, and a proliferation of potentially lethal actors could undermine it. But could we discover some alternative equilibrium that analogously turns vulnerability into stability?

A non-proliferation model for emerging technologies
How can we create legally binding frameworks to control potentially damaging emerging technologies, without impeding on the capacity of research to deliver innovation and economic growth? Some lessons could be found in the history of the nuclear non-proliferation effort, although parallels will not be exact and no existing framework is able to handle emerging technologies. With governments facing difficulties in reaching agreements, it may be up to industry to take the lead.

Ethical norms for teaching and developing new technologies
Conversations about the ethical standards that should apply among educators and developers in emerging technologies are happening in individual institutions, but at different stages. We need to broaden, merge and expedite those conversations to develop common ethical guidelines and embed them in society and culture.

The need for new champions
Who could lead the way in discussing and promoting ethical standards and serious political action on the security implications of emerging technologies? The role for directly affected industries should be clear, but other champions could also be significant – for example, in the gaming community.

A forum for discussion and fostering joint action
While cooperation between states is still of paramount importance, it will not suffice, as the mindboggling speed of technological change will run far ahead of the capacity to regulate and negotiate treaties. We are in dire need of a serious, credible platform for multistakeholder dialogue on all the above issues, fostering an understanding of shared concern and shared responsibility.

Authors:

Espen Barth Eide is Head of the Centre for Global Strategies and a Member of the Managing Board at the World Economic Forum;

Anja Kaspersen is Head of International Security and a Member of the Executive Board at the World Economic Forum
http://ow.ly/UvFTD

 

« The Shrinking of the Big Data Promise
MI5 Relies on Hacking »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XBOSoft

XBOSoft

XBOSoft is a software QA and testing company. We cover the entire QA and testing life cycle including software and application security.

Falanx Cyber

Falanx Cyber

Falanx Cyber provides enterprise-class cyber security services and solutions. We deliver end-to-end cyber capabilities, either as specific engagements or as fully-managed services.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Aware

Aware

Aware is the only comprehensive AI solution for governance, risk, compliance and insights for leading collaboration platforms.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

AVIANET

AVIANET

AVIANET's goal is to empower enterprises and corporations worldwide and manage their digital transformation journey with confidence.