Spies Really Like Artificial Intelligence

AI research is underway in the fields of intelligence collection and analysis, logistics, cyber operations, information operations, command and control and in a variety of semi-autonomous and autonomous vehicles.

Already, AI has been incorporated into military operations in Iraq and Syria. But before the US various intelligence agencies  can use AI to its full potential, it must be hardened against attack. The humans who use it, analysts, policy-makers and leaders, must better understand how advanced AI systems reach their conclusions.

The field of AI research began in the 1940s, but an explosion of interest in AI began around 2010 due to the convergence of three enabling developments:

  1. Availability of “big data” sources,
  2.  Improvements to machine learning approaches,
  3. Increases in computer processing power. 

Now US intelligence agencies are using AI to scan the news for dangerous developments, send alerts to ships about rapidly changing conditions, and speed up the NSA’s regulatory compliance efforts.  

When you think of nations using artificial intelligence (AI) and enhanced surveillance technologies, China probably comes to mind as the place where facial recognition is used to find their targets. However, at least 75 out of 176 countries globally are actively using AI technologies for surveillance purposes, including smart city/safe city platforms, now in use by 56 countries; facial recognition systems, being used by 64 countries; and smart policing, now used by law enforcement in 52 countries.

AI is also helping the National Geospatial-Intelligence Agency, or NGA, notify sailors and mariners around the world about new threats, like pirates, or new navigation information that might change naval charts. It’s a mix of open source and classified information. 

The NSA has begun to use AI to better understand and see patterns in the vast amounts of signals intelligence data it collects, screening for anomalies in web traffic patterns or other data that could portend an attack. NSA analysts and operators are also using AI to make sure they are following the many rules and guidelines that govern how the NSA collects intelligence on foreign targets. 

In the future AI will make analysts work easier as it can prove instantaneous machine translation and speech recognition. This will allow analysts to review different types of collected data, corroborate intelligence, and reach firmer conclusions. 

There  are also big problem is making AI models more secure. In the commercial world, this isn’t a big problem, or at least it isn’t seen as one yet, because there’s no adversary trying to spoof the system. But concern is rising, in 2017, researchers at MIT showed how easy it was to fool neural networks with 3D-printed objects by just slightly changing the texture. 

An even a bigger problem is that humans generally don’t understand the processes by which very complex algorithms like deep learning systems and neural nets reach the determinations that they do. 

That may be a small concern for the commercial world, where the most important thing is the ultimate output, not how it was reached, but national security leaders who must defend their decisions to lawmakers, say opaque functioning isn’t good enough to make war or peace decisions. 

DefenseOne:           Naked Security         EMERJ:        NextGov:      US Congress Research Service:  


You Might Also Read:

Artificial Intelligence & The Ethics Of War:

US Army To Focus On Information Warfare:

 

« Fake News Uses Coronavirus To Spread Malware
Attack Vectors Are Proliferating »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

Advenica

Advenica

Advenica develops, manufactures and sells innovative cybersecurity solutions for encryption and secure information exchange.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

Riscure

Riscure

Riscure is a global test lab and tools leader for device security. Core expertise in side channel analysis, fault injection and embedded device software.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Blacksands

Blacksands

Blacksands is a leader in network architecture, identity & services management, threat analysis, industrial IoT architecture, and invisible dynamic networks.

gener8tor

gener8tor

The gener8tor Cybersecurity Accelerator offers a cutting-edge program in San Antonio, home to the second-largest concentration of cybersecurity experts in the United States.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.