Quantum Computing – Advantage Or Security Threat?

Several Federal agencies of the US security network, when polled, indicated they see quantum computing and artificial intelligence as potential security threats, especially in the near-term.

The US government passed a bill to foster an active quantum computing industry in, yet this hasn’t prevented the security community from regarding quantum computing being seen as an ’emerging threat’ together with certain forms of artificial intelligence.

The study was commissioned by the US Government Accountability Office, in a white paper titled “Long-Range Emerging Threats Facing the United States as Identified by Federal Agencies.”

The agencies identified 26 long-term threats within four categories, which were:

  • Adversaries’ Political and Military Advances—e.g., China’s increasing ability to match the U.S. military’s strength.
  • Dual-Use Technologies—e.g., self-driving cars might be developed for private use, but militaries can use them too.
  • Weapons—advances in weapons technology, e.g., cyber-weapons.
  • Events and Demographic Changes—e.g., infectious disease outbreaks.

Within the “dual-use technologies” category, that took center stage, the security agencies expressed fear that continued advances with quantum computing and artificial intelligence could be used to cause harm, rather than advance society.

Quantum computing continues to advance. This year, for instance, computer technologists set a new speed record for the trapped-ion ‘building blocks’ (or logic gates) of future-generation quantum computers.

As an example of the potential threat posed by quantum computing, researchers from the Russian Quantum Center in Moscow have gone on record to state that cryptocurrencies and blockchain technology will be vulnerable in the future from quantum systems unless these applications themselves integrate quantum technologies.

The same stands with AI, where studies are underway to assess the extent that AI can understand what it is like to be human, according to digitaljournal.com. The report reflects the concern where “adversaries could gain increased access to AI through affordable designs used in the commercial industry, and could apply AI to areas such as weapons.”

Also, “quantum communications could enable adversaries to develop secure communications that US personnel would not be able to intercept or decrypt.” Centered on this is the deployment by terror groups or rogue states of sophisticated technologies in the future, directed against the US.

I-HLS

You Might Also Read:

Quantum Computing Is Becoming Reality:

« How To Develop Good Cybersecurity Practice
Fortnite Teen Hackers 'Earning Thousands of Pounds a Week' »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

Gytpol

Gytpol

Gytpol is a leader in Endpoint Configuration Security (ECS) solutions, providing validation, remediation & securing of IT Policies and IT Infrastructure on-premise and in the cloud.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

Arakyta

Arakyta

Arakÿta specializes in business strategy, work flow process and IT systems for organizations.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

SPYROS Information & Technology Consulting

SPYROS Information & Technology Consulting

SPYROS specializes in providing highly qualified professionals in Computer Network Operations, Signals Intelligence, Technical Training and Certifications, Network Administration and Security.

Qodea

Qodea

Qodea (formerly Appsbroker CTS) is Europe's largest Google Premier only transformation partner.

GrayHats

GrayHats

GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape.

Sensiba

Sensiba

Sensiba are accountants, consultants, and experts in good business. We use deep industry experience to help organizations solve problems, navigate complexity, and build sustainable growth.