AI Increases The Risks of Nuclear War

Artificial intelligence could destabilise the delicate balance of nuclear deterrence, inching the world closer to catastrophe, according to a working group of experts convened by RAND, the global policy think tank.

New smarter, faster intelligence analysis from AI agents, combined with more sensor and open-source data, could convince countries that their nuclear capability is increasingly vulnerable. That may cause them to take more drastic steps to keep up with the US.

Another worrying scenario: commanders could make decisions to launch strikes based on advice from AI assistants that have been fed wrong information.

Last May and June, RAND convened a series of workshops, bringing together experts from nuclear security, artificial intelligence, government, and industry.

The workshops produced a recent report, that underlines how AI promises to rapidly improve Country A’s ability to target Country B’s nuclear weapons. And that may lead Country B to radically rethink the risks and rewards of acquiring more nuclear weapons or even launching a first strike.

“Even if AI only modestly improves the ability to integrate data about the disposition of enemy missiles, it might substantially undermine a state’s sense of security and undermine crisis stability,” the report said.

North Korea, China, and Russia use mobile launchers (even elaborate tunnel networks) to position ICBMs rapidly for strike. The US would have less than 15 minutes of warning before a North Korean launch, Joint Chiefs of Staff Vice Chairman Gen. Paul Selva told reporters in January.

If US analysts could harness big data and AI to better predict the location of those launchers, North Korea might conclude that it needs more of them. Or Russia might decide that it needs nuclear weapons that are harder to detect, such as the autonomous Status-6 torpedo.

“It is extremely technically challenging for a state to develop the ability to locate and target all enemy nuclear-weapon launchers, but such an ability also yields an immense strategic advantage,” the report said.

“The tracking and targeting system needs only to be perceived as capable to be destabilising. A capability that is nearly effective might be even more dangerous than one that already works.”

Such a capability might employ drones with next-generation sensors, which “could enable the development of strategically destabilising threats to the survivability of mobile ICBM launchers but also offer some hope that arms control could help forestall threats.”

The workshop also explored how commanders might use artificially-intelligent decision aids when making judgment calls about nuclear strikes. Such aids might help commanders to make much better-informed decisions, or, if penetrated and fed malicious data by an adversary, catastrophically wrong ones.

Absent some means to better verify the validity of data inputs, an ongoing project at the Defense Advanced Research Projects Agency and a key concern of the CIA, and a better understanding of enemy intent, adversaries could turn the vast US intelligence collection and digestion tools against them, especially as those tools work faster and more efficiently.

In other words, fake news, combined with AI, just might bring about World War III.

DefenseOne:

You Might Also Read: 

On Twitter Fake News Gets More Traction Than Truth:

Offensive Cyberattacks Must Balance Lawful Deterrence & The Risks Of Escalation:

 

« GDPR Deadline: A Horrorshow Or A Non-Event?
Cambridge Analytica Goes Out Of Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

Cybellum

Cybellum

Cybellum provides software risk assessment for DevOps and security executives, by detecting vulnerabilities automatically, without source code.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

RIA in a Box

RIA in a Box

MyRIACompliance combines our team of RIA compliance experts with an online software platform to help investment advisers better manage regulatory compliance and cybersecurity responsibilities.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Pentesec

Pentesec

Pentesec is a security specialist offering professional services, managed security services and expertise within an extensive range of security technologies.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

Insurica

Insurica

INSURICA is a full-service insurance agency built upon a tradition of integrity, industry leadership, and excellence.