AI Increases The Risks of Nuclear War

Artificial intelligence could destabilise the delicate balance of nuclear deterrence, inching the world closer to catastrophe, according to a working group of experts convened by RAND, the global policy think tank.

New smarter, faster intelligence analysis from AI agents, combined with more sensor and open-source data, could convince countries that their nuclear capability is increasingly vulnerable. That may cause them to take more drastic steps to keep up with the US.

Another worrying scenario: commanders could make decisions to launch strikes based on advice from AI assistants that have been fed wrong information.

Last May and June, RAND convened a series of workshops, bringing together experts from nuclear security, artificial intelligence, government, and industry.

The workshops produced a recent report, that underlines how AI promises to rapidly improve Country A’s ability to target Country B’s nuclear weapons. And that may lead Country B to radically rethink the risks and rewards of acquiring more nuclear weapons or even launching a first strike.

“Even if AI only modestly improves the ability to integrate data about the disposition of enemy missiles, it might substantially undermine a state’s sense of security and undermine crisis stability,” the report said.

North Korea, China, and Russia use mobile launchers (even elaborate tunnel networks) to position ICBMs rapidly for strike. The US would have less than 15 minutes of warning before a North Korean launch, Joint Chiefs of Staff Vice Chairman Gen. Paul Selva told reporters in January.

If US analysts could harness big data and AI to better predict the location of those launchers, North Korea might conclude that it needs more of them. Or Russia might decide that it needs nuclear weapons that are harder to detect, such as the autonomous Status-6 torpedo.

“It is extremely technically challenging for a state to develop the ability to locate and target all enemy nuclear-weapon launchers, but such an ability also yields an immense strategic advantage,” the report said.

“The tracking and targeting system needs only to be perceived as capable to be destabilising. A capability that is nearly effective might be even more dangerous than one that already works.”

Such a capability might employ drones with next-generation sensors, which “could enable the development of strategically destabilising threats to the survivability of mobile ICBM launchers but also offer some hope that arms control could help forestall threats.”

The workshop also explored how commanders might use artificially-intelligent decision aids when making judgment calls about nuclear strikes. Such aids might help commanders to make much better-informed decisions, or, if penetrated and fed malicious data by an adversary, catastrophically wrong ones.

Absent some means to better verify the validity of data inputs, an ongoing project at the Defense Advanced Research Projects Agency and a key concern of the CIA, and a better understanding of enemy intent, adversaries could turn the vast US intelligence collection and digestion tools against them, especially as those tools work faster and more efficiently.

In other words, fake news, combined with AI, just might bring about World War III.

DefenseOne:

You Might Also Read: 

On Twitter Fake News Gets More Traction Than Truth:

Offensive Cyberattacks Must Balance Lawful Deterrence & The Risks Of Escalation:

 

« GDPR Deadline: A Horrorshow Or A Non-Event?
Cambridge Analytica Goes Out Of Business »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.

Business Communications Inc (BCI)

Business Communications Inc (BCI)

BCI is a leading technology company known for its exceptional team of experienced engineers with a focus on providing top-notch technology and security products and services.

Concentrix

Concentrix

Concentrix - the intelligent transformation partner. We help the world’s leading organisations to modernise technology, transform experiences, and solve their toughest business challenges.