AI In Conflict: Cyberwar & Robot Soldiers

Artificial intelligence in conflict, from robot soldiers to cyber warfare, what will it look like? It's a question that was under discussion at this year's Munich Security Conference.

Leading the debate, Estonian President Kersti Kaljulaid (pictured). Her country was the victim of a massive hacking attack that was widely blamed on Russia.

The future of warfare will involve artificial intelligence systems acting as lethal weapons, and much like cyber a decade ago, NATO allies are ill-equipped to manage the potential threat, said current and former European leaders speaking at the Munich Security Conference. 

Kersti Kaljulaid, estimated a 50 percent chance that by the middle of this century we will have an AI system capable of launching a lethal attack. And yet, just as the world was not prepared for a cyberattack when Russia first launched a cyberattack against Estonia in 2007 — bombarding websites of Estonian parliament, banks, ministries, and news outlets — there is no strategy or international law to deter such tactics of warfare.

“I have been really worried as an Estonian. Estonia is a digital state compared to many others, that our capacity to internationally agree and regulate for technological development has been extremely low," Kaljulaid told euronews. "We haven’t managed to do any progress, for example, even on cyber issues”.

Members of the public present in the audience said they are worried about robot soldiers, and self-piloted weaponised drones. 

NATO's former Secretary General Anders Fogh Rassmussen said it's a legitimate concern: 

“The use of robots and artificial intelligence within the military might make the whole world more unstable. For that reason, I think we should elaborate an international and legally binding treaty to prohibit the production and use of what has been called autonomous lethal weapons". 

But such standards don’t come fast. It took until 2017 for NATO to declare that a cyber-attack would spur an Article 5 response, that being, collective defense among allies, after a massive computer hack paralysed portions of government and businesses in Ukraine before spreading around the globe. 

In the meantime, much like cyber-security, AI presents an opportunity for Russia as well as China to use “grey zones,” said Rasmussen, not initiating open military conflict, but provoking allies enough to disrupt.

Ein News:         DefenseNews

You Might Also Read: 

Artificial Intelligence, Robotics & All Tomorrows Wars:

The Current Threat Of Global Cyber Warfare:

Cyberwar: A Guide:
 

« Chinese Police Wearing Face Recognition Glasses
Tackling The Insider Threat: … Where To Start? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Ascentor

Ascentor

Ascentor specialises in independent information and cyber security consultancy. We’re experienced industry experts, providing cyber security services since 2004.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Messageware

Messageware

Messageware is the market leader in securing, enhancing, and customizing Microsoft Exchange and Outlook Web App.

Kaymera Technologies

Kaymera Technologies

Kaymera’s comprehensive mobile enterprise security solution defends against all mobile threat and attack vectors.

Sentia

Sentia

Sentia is an IT and infrastructure firm, with focus on Outsourcing, IT operation and management, Hosting, Co-location, Network, and IT security.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Active Navigation

Active Navigation

Active Navigation is a data privacy and governance software company.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Polymer

Polymer

Polymer is a Data Governance & Privacy Platform for third party SaaS apps. A modern Data Loss Protection (DLP) approach to remove sensitive data exposure on collaboration tools in real-time.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

StrataCore

StrataCore

StrataCore is a single-source technology lifecycle advocate that works behind IT teams as a strategic partner to help them achieve peak enterprise outcomes.