Could An AI Arms Race Lead To Accidental War?

Experts and politicians in China are worried that a rush to integrate Artificial Intelligence into weapons and military equipment could accidentally lead to war between nations.

According to a new report published by US national security think tank Center for a New American Security (CNAS), Chinese officials increasingly see an “arms race” dynamic in AI as a threat to global peace.

As countries scramble to reap the benefits of artificial intelligence in various domains, including the military, the fear is that international norms shaping how countries communicate will become outdated, leading to confusion and potential conflict.

“The specific scenario described to me [by one anonymous Chinese official] is unintentional escalation related to the use of a drone,” Gregory C. Allen, an adjunct senior fellow at CNAS and author of the new report, tells The Verge.

As Allen explains, the operation of drones both large and small has become increasingly automated in recent years. In the US, drones are capable of basic autopilot, performing simple tasks like flying in a circle around a target.

But China is being “more aggressive about introducing greater levels of autonomy closer to lethal use of force,” he says. One example is the Blowfish A2 drone, which China exports internationally and which, says Allen, is advertised as being capable of “full autonomy all the way up to targeted strikes.”

Because drones are controlled remotely, militaries tend to be more cavalier about their use. With no risk of human casualties, they’re more willing to shoot them down, but also deploy them into contested airspaces in the first place. This attitude can also be seen in cyberwarfare, where countries will intrude in ways they wouldn’t necessarily risk if humans were involved.

“The point made to me was that it’s not clear how either side will interpret certain behaviors [involving autonomous equipment],” says Allen. “The side sending out an autonomous drone will think it’s not a big deal because there’s no casualty risk, while the other side could shoot it down for the same reason. But there’s no agreed framework on what message is being sent by either sides’ behavior.”

The risks in such a scenario become greater when factoring in advanced autonomy. If a drone or robot fires a warning shot at enemy troops, for example, how will that action be interpreted? Will the troops understand it as an automated response, or will they think it’s the decision of a human commander? How would they know in either case?

In essence, says Allen, countries around the world have yet to define “the norms of armed conflict” for autonomous systems. And the longer that continues, the greater the risk for “unintentional escalation.”

“I think that’s a real and legitimate threat,” says Allen.

The rest of the CNAS report, titled “Understanding China’s AI Strategy: Clues to Chinese Strategic Thinking on Artificial Intelligence and National Security,” notes a number of other high-level concerns and attitudes in China’s government-led AI strategy.

Chinese officials recognise, for example, that it and America are the only two viable AI superpowers. Both countries have the talent, the funding, and the bustling tech sectors needed to push this technology further, though each nation also has its own particular strengths and weaknesses.

China has access to more data, for example, and has the potential to leapfrog Western technology. (Many Chinese citizens went from having no phone to a mobile phone, without getting a landline in between, for example). America, meanwhile, has a significant lead in the development of chip technology, a vital component in processing the huge datasets that power AI applications.

CNAS’s report notes that China is particularly keen to close this important gap. Chinese firms like Baidu, Alibaba, and Huawei have established new projects to develop AI accelerator hardware; government money is pouring into these initiatives; and the industry is trying other methods to get a hold of foreign expertise. These include the recent proposed acquisition of US chip designer Qualcomm by Singapore firm Broadcom, which was blocked by President Trump on national security grounds.

While a certain amount of competition between China and the US is to be expected, Allen says cooperation is also needed, especially when it comes to these military questions.

He notes that while Chinese officials he spoke to had a good grasp of contemporary US thinking on issues like autonomous warfare, American officials tend to be less well-briefed about their Chinese counterparts, partly because many Chinese policy documents are never translated into English.

Without properly understanding different nations’ strategies in these domains, says Allen, the chances of misunderstanding and conflict increase.

“There are definitely pockets of real expertise on this issue [in the US] but there’s not the widespread comprehension there needs to be,” he says.

The Verge

You Might Also Read:

DARPA Wants To Emulate Insect Brains:

 

 

« Facebook Is Moving Fast To Get Into Blockchain
New Zealand Business Has Increased Cybersecurity Spending, Not Expertise »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.