Quantum Computing – Advantage Or Security Threat?

Several Federal agencies of the US security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in the near-term.

The US government passed a bill to foster an active quantum computing industry in, yet this hasn’t prevented the security community from regarding quantum computing being seen as an ’emerging threat’ together with certain forms of artificial intelligence.

The study was commissioned by the US Government Accountability Office, in a white paper titled “Long-Range Emerging Threats Facing the United States as Identified by Federal Agencies.”

The agencies identified 26 long-term threats within four categories, which were:

  • Adversaries’ Political and Military Advances—e.g., China’s increasing ability to match the U.S. military’s strength.
  • Dual-Use Technologies—e.g., self-driving cars might be developed for private use, but militaries can use them too.
  • Weapons—advances in weapons technology, e.g., cyber-weapons.
  • Events and Demographic Changes—e.g., infectious disease outbreaks.

Within the “dual-use technologies” category, that took center stage, the security agencies expressed fear that continued advances with quantum computing and artificial intelligence could be used to cause harm, rather than advance society.

Quantum computing continues to advance. This year, for instance, computer technologists set a new speed record for the trapped-ion ‘building blocks’ (or logic gates) of future-generation quantum computers.

As an example of the potential threat posed by quantum computing, researchers from the Russian Quantum Center in Moscow have gone on record to state that cryptocurrencies and blockchain technology will be vulnerable in the future from quantum systems unless these applications themselves integrate quantum technologies.

The same stands with AI, where studies are underway to assess the extent that AI can understand what it is like to be human, according to digitaljournal.com. The report reflects the concern where “adversaries could gain increased access to AI through affordable designs used in the commercial industry, and could apply AI to areas such as weapons.”

Also, “quantum communications could enable adversaries to develop secure communications that US personnel would not be able to intercept or decrypt.” Centered on this is the deployment by terror groups or rogue states of sophisticated technologies in the future, directed against the US.

I-HLS

You Might Also Read:

Quantum Computing Is Becoming Reality:

« How To Develop Good Cybersecurity Practice
Fortnite Teen Hackers 'Earning Thousands of Pounds a Week' »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

APMG International (APM Group)

APMG International (APM Group)

APM Group is a global accreditation, certification and examination body specializing in certification schemes for individuals, organizations and software.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Iceberg

Iceberg

Since 2016, Iceberg has redefined how businesses approach hiring in the Cybersecurity and eDiscovery space.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

Senserva

Senserva

Senserva delivers a deep analysis for security user accounts and applications within the Microsoft cloud environment.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.

ThreatMate

ThreatMate

ThreatMate empowers businesses with comprehensive tools to detect, protect, and remediate against cyber threats.