The Dark Side of the Fourth Industrial Revolution – and How To Avoid It

 

Until recently, to inflict damage on a very large scale – that is, beyond the reach of traditional terrorist means – you needed either a large number of people (as in an army) or a large, sophisticated organization (to develop, for instance, a nuclear weapon). Typically, these capacities were held by states. As a consequence, the world eventually developed tools – albeit imperfect – to prevent the escalation of inter-state disputes. These include treaties, conventions and international organizations, but also the concept of deterrence, and in the nuclear age, the shared notion of mutually assured destruction. The latter was one reason why the Cold War, after all, remained cold.

As the world abandoned this Cold War logic, the focus shifted away from the power dynamics of strong states. From the 1990s onwards, the primary focus of international security was on state collapse rather than strong states, and on asymmetric threats rather than symmetric competition.

Today, it looks like we have the worst of both worlds: strategic geopolitical competition has re-emerged, but fragmentation, fragility and violent chaos “from below” continues; coupled with a serious crisis of international governance, this new world order is stymieing our ability to respond and adapt.

With the Fourth Industrial Revolution, and its promise of technological progress on many fronts simultaneously, comes a dark reality: we are also experiencing a rapid and massive democratization of the capacity to wreak havoc on a very large scale. From 3D-printed weapons to genetic engineering in home laboratories, destructive tools across a range of emerging technologies are becoming more readily available.

We spoke with leading experts from a range of fields and asked them for their take on the security implications of emerging technologies:

Unexpected threats can arise when fields of research merge
With the rise of technology fusion, recognized technological fields are developing rapidly and new technological combinations are being invented faster than we can even dream them up.

Interactions of high-tech and low-tech can also surprise
As is being demonstrated in Syria and Iraq, traditional models of warfare – such as infantry forces using artillery – are being combined with new techniques in ways that create challenging and unpredictable dynamics.

Non-state actors are increasingly powerful
Access to emerging technologies is allowing organized criminal groups to operate with the speed and reach of multinational corporations, for example launching DDoS attacks at an impressive scale.

It is hard to broach the subject of security in emerging technologies research
The world lacks a credible platform for critically important discussions about how we should prepare for the risks which could emerge from new technologies.

We need a new approach to regulating space
Decades ago, only the United States and the Soviet Union could afford space programmes. Now, dozens of countries have a presence in space, and more than half of all satellites are commercial. As space could play a role in future conflicts, concerns are growing that current mechanisms to regulate space activities are no longer fit for purpose.

Autonomous weapons are becoming an urgent concern
Are advanced robots, running on artificial intelligence platforms, liable under international law? If robots fight robots, can we ever again have strategically stable situations, given that a software upgrade or a hack could flip the balance of power overnight? Game theory suggests fighting robots would need to be made adaptive and unpredictable, but how then could their future behaviour be predicted when deployed? Will they become unpredictable even to their creators? Discussions on such issues are just starting to happen, partly because much technological innovation is taking place far away from the confines of inter-state conferences on disarmament, non-proliferation and humanitarian law.

“Internet for all” in an unequal world brings global resent
Increased internet access promises to bring significant economic opportunities; but it also creates new ways for significant numbers of desperate and underemployed young people to express anger at their sense of relative deprivation. It also creates opportunities for cultural collisions – what is permissible in one setting can be shocking in another – without the cultural mediation that human contact traditionally brings. Thanks to the power of the internet, ideas and expressions cross the globe in nanoseconds, long before cultural adaptation.

In cyber warfare, attack is easier than defence
For most states, their destructive capacity already significantly exceeds their defensive capacities. They therefore have an economic incentive to continue investing in their offensive capabilities rather than their defensive ones, which leads to vulnerabilities in industrial and government control systems. The age-old insight that the defendant always has a certain advantage over the attacker is hence turned on its head.

In the face of these challenges, how do we incentivize people to take the security threats from emerging technologies seriously?

The search for MAD 2.0
Over the second half of the last century, the fear of nuclear warfare gradually gave way to the relative stability of mutually assured destruction. MAD has so far worked when only a limited number of entities possess the power to destroy each other, and a proliferation of potentially lethal actors could undermine it. But could we discover some alternative equilibrium that analogously turns vulnerability into stability?

A non-proliferation model for emerging technologies
How can we create legally binding frameworks to control potentially damaging emerging technologies, without impeding on the capacity of research to deliver innovation and economic growth? Some lessons could be found in the history of the nuclear non-proliferation effort, although parallels will not be exact and no existing framework is able to handle emerging technologies. With governments facing difficulties in reaching agreements, it may be up to industry to take the lead.

Ethical norms for teaching and developing new technologies
Conversations about the ethical standards that should apply among educators and developers in emerging technologies are happening in individual institutions, but at different stages. We need to broaden, merge and expedite those conversations to develop common ethical guidelines and embed them in society and culture.

The need for new champions
Who could lead the way in discussing and promoting ethical standards and serious political action on the security implications of emerging technologies? The role for directly affected industries should be clear, but other champions could also be significant – for example, in the gaming community.

A forum for discussion and fostering joint action
While cooperation between states is still of paramount importance, it will not suffice, as the mindboggling speed of technological change will run far ahead of the capacity to regulate and negotiate treaties. We are in dire need of a serious, credible platform for multistakeholder dialogue on all the above issues, fostering an understanding of shared concern and shared responsibility.

Authors:

Espen Barth Eide is Head of the Centre for Global Strategies and a Member of the Managing Board at the World Economic Forum;

Anja Kaspersen is Head of International Security and a Member of the Executive Board at the World Economic Forum
http://ow.ly/UvFTD

 

« The Shrinking of the Big Data Promise
MI5 Relies on Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).