The Next Industrial Revolution

We are enterung the next industrial revolution, one based upon on Robotics, Artificial Intelligence, Biotechnology, IoT and Cybertronics. This contemporary revolution will merge and combine these innovative technologies. 

Each time we go through one of these massive automated revolutions, it completely alters most country’s economics, geo-politics, society and warfare.

 

  • The First Industrial Revolution used water and steam power to mechanise production. 
  • The Second used electric power to create mass production. 
  • The Third used electronics and information technology to automate production. 

Now we have a Fourth Industrial Revolution, which is a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres.

We now have mobile AI super-computing which imitates human thought, Intelligent robots, self-driving cars and biotechnology all of which has applications in major industrial areas, including health care, crop production and agriculture. 

Each Industrial Revolution has an enormous impact on warfare, society, crime and business. 

Warfare
Part of the outcome of the 1st Industrial Revolution was the creation of railroads and the telegraph and each significantly affected the American Civil War. A decade before the war the telegraph was invented by Samuel Morse in 1844, and telegraph wires soon sprang up all along the East Coast. During the American Civil War 15,000 miles of telegraph cable was laid purely for military purposes. Lincoln intensively used the telegraph to get faster and clearer understanding of the conflict and used the information to change his strategy and battle tactics. 

For the first time in the history of warfare, the telegraph helped field commanders to direct real-time battlefield operations and permitted senior military officials to coordinate strategy across large distances. These capabilities were key factors in the North's victory. 

Similar to way Lincoln viewed the telegraph and the use of the railways cyber-space is now seen by senior military officers and officials as another “domain” of warfare, along with air, land, sea, and space but it’s effective purpose is still in debate. 
However, in this era of the 4th Industrial Revolution so far the pace of technological development has surpassed most nation’s ability to govern effectively. We live in a time where security risks emerging from the threat of bio-weapons, nano-weapons, cyber-weapons. Several countries are now developing nano-weapons that can attack using mini-nuclear bombs and insect-like robots.

The new cyber space can be visualised as an electronic nervous system running through many national and international sectors and systems. The process has and is changing many areas of social life, commerce and government.

Society
From 2000 to 2019, the number of global Internet users rose from 394 million to 4.2 billion, so over half the world’s population of 7.6B use the Internet. 
These technologies include 3D commercial production, data driven vehicles, robotic, bio-technology, AI and there is a blurring of physical, digital and biological elements to create a new techno-reality. And of course this is also changing and bringing new types of criminal activity. Now over half of the world’s population browses the Web. 

Crime
However, cyber-space also includes hacker criminal threats, and the growing arena of cyber-warfare.
The potential for engaging with and countering cyber-crime comes in many new unique ways, one of which is Automated Content Recognition technologies. These technologies can extract visual data from thousands of information streams which can be used to identify criminal activity and specific individuals who have been criminally active. 

It is very important that all areas of business and commerce, police forces and the military create and continually review an electronic cyber strategy ensuring that this is used in their tactics on the ground.  

The Dark Web
The Dark Web is a term that refers specifically to a collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or visited by using traditional browsers. Almost all sites on the so-called Dark Web hide their identity using the Tor encryption tool. Currently Londoners are losing an average of £26 million a month in cyber-attacks on businesses and individuals, Scotland Yard has warned and often this being done by criminals using the Dark Web.
Analysists suggest that about 73 per cent of frauds are carried out online, with many criminals based overseas, making it difficult for local police to pursue a case. 

The Future of Robotics
In the future, robots with artificial intelligence will help make life easier for all of us, doing our dull, dirty, difficult jobs, and tackling tasks we simply couldn’t do ourselves The use of autonomous robotic submarines to determine ice hazards and risks for shipping and energy installations in the arctic.

AI equipped machines will also play a big part in the future of agriculture, reducing food production costs and improving land use. 

With an estimated 60% more food needed by 2050, the UK government is investing £90m to transform food production. This will include funding for demonstrator projects that show how innovative agri-tech ideas can be applied in the real world. This is the transformative effect of technology. 

Robots will of course be used in warfare as we already use drones and so in some respects the types of ground attacks will require less soldiers as planes will not need pilots. Drones can be used to spy and monitor the enemy with live video and remote communications to ground troops and other weapons. Already several military robots have been developed by various armies. Some believe the future of modern warfare will be fought by automated weapons systems and will be initially controlled by the next generation of cyber soldiers.

Future of Artificial Intelligence 
Artificial intelligence (AI) is an area of computer science that emphasises the creation of intelligent machines that work and react like humans. AI has been a prediction for decades but was initially associated with robots only. AI now gives us more variables to work with and helps us to process all the variables in a programmatic way which is much simpler and offers a transparent level of confidence. 

Merging AI and decision management systems are capable enough to take decision-making to an entirely new level. Today, some people are starting to strategically come to terms with Artificial Intelligence, robotics and bio-technology after estimating how much it is going to change aspects of their professional work. 

Or, as some others predict, the development of full artificial intelligence could spell the end of the human race.  Stephen Hawking said that once humans really develop artificial intelligence, it will take off on its own and redesign itself at an ever-increasing rate. 

Subscribe To Cyber Security Intelligence:           

You Might Also Read: 

E-Fusion And Industry 4.0:

 

 

« Cyber Insurance Will Reshape Cyber Security
WEBINAR: How to Build a Threat Hunting Capability in AWS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CloudDNA

CloudDNA

CloudDNA deliver solutions that enable users and devices to connect over high performance, secure, efficient, scalable cloud networks.

K7 Computing

K7 Computing

K7 provides antivirus and internet security products for business and home users.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

NetExtend

NetExtend

NetExtend services include backup and recovery, endpoint protection, network monitoring, cloud portal and billing and payment solutions.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Randaemon

Randaemon

RANDAEMON’s mission is to create True Random Number Generators (TRNG) that are hardware-based and integrated into System-on-Chip.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.