Abstract
As cyber weapons and artificial intelligence technologies share the same technological foundation of bits and bytes, there is a strong trend of connecting both, thus addressing the imminent challenge of cyber weapons of processing, filtering and aggregating huge amounts of digital data in real time into decisions and actions. This chapter will analyze this development and highlight the increasing tendency towards AI enabled autonomous decisions in defensive as well as offensive cyber weapons, the arising additional challenges for attributing cyberattacks and the problems for developing arms control measures for this “technology fusion”. However, the article also ventures an outlook how AI methods can help to mitigate these challenges if applied for arms control measures itself.
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Apruzzese, G., Colajanni, M., Ferretti, L., & Marchetti, M. (2019). Addressing adversarial attacks against security systems based on machine learning. In 2019 11th International Conference on Cyber Conflict (CyCon) (pp. 1–18). https://doi.org/10.23919/CYCON.2019.8756865
Bajema, N. E. (2019, November 12). Can humans resist the allure of machine speed for nuclear weapons? Retrieved from https://outrider.org/nuclear-weapons/articles/can-humans-resist-allure-machine-speed-nuclear-weapons/
Barredo Arrieta, A., Díaz-Rodríguez, N., Del Ser, J., Bennetot, A., Tabik, S., Barbado, A., Garcia, S., Gil-Lopez, S., Molina, D., Benjamins, R., Chatila, R., & Herrera, F. (2020). Explainable Artificial Intelligence (XAI): Concepts, taxonomies, opportunities and challenges toward responsible AI. Information Fusion, 58, 82–115. https://doi.org/10.1016/j.inffus.2019.12.012
Boulanin, V. (2019). The impact of artificial intelligence on strategic stability and nuclear risk. Retrieved from https://www.sipri.org/publications/2019/other-publications/impact-artificial-intelligence-strategic-stability-and-nuclear-risk-volume-i-euro-atlantic
Burgers, T., & Robinson, D. R. S. (2018). Keep dreaming: Cyber arms control is not a viable policy option. Sicherheit und Frieden, 36(3), 140–145. https://doi.org/10.5771/0175-274X-2018-3-140
Burton, J., & Soare, S. R. (2019). Understanding the strategic implications of the weaponization of artificial intelligence. In 2019 11th International Conference on Cyber Conflict (CyCon) (pp. 1–17). https://doi.org/10.23919/CYCON.2019.8756866
Charniak, E. (2019). Introduction to deep learning. The MIT Press. https://dl.acm.org/doi/book/10.5555/3351847
Desouza, K. C., Ahmad, A., Naseer, H., & Sharma, M. (2020). Weaponizing information systems for political disruption: The actor, lever, effects, and response taxonomy (ALERT). Computers and Security, 88, 101606. https://doi.org/10.1016/j.cose.2019.101606
Field, M. (2019, December 20). As the US, China, and Russia build new nuclear weapons systems, how will AI be built in? Retrieved from https://thebulletin.org/2019/12/as-the-us-china-and-russia-build-new-nuclear-weapons-systems-how-will-ai-be-built-in/
GReAT. (2017). WannaCry ransomware used in widespread attacks all over the world. Securelist.Com. Retrieved from https://securelist.com/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/78351/
Grosswald, L. (2011). Cyberattack attribution matters under article 51 of the U.N. Charter. Brooklyn Journal of International Law, 36(3), 1151–1181.
Gunning, D., Stefik, M., Choi, J., Miller, T., Stumpf, S., & Yang, G.-Z. (2019). XAI—Explainable artificial intelligence. Science Robotics, 4(37). https://doi.org/10.1126/scirobotics.aay7120
Healey, J. (2019). The implications of persistent (and permanent) engagement in cyberspace. Journal of Cybersecurity, 5(1), 1–25. https://doi.org/10.1093/cybsec/tyz008
Herpig, S. (2019). Securing artificial intelligence. Retrieved from https://www.stiftung-nv.de/sites/default/files/securing_artificial_intelligence.pdf
IPRAW. (2019). Focus on human control. Retrieved from https://www.ipraw.org/wp-content/uploads/2019/08/2019-08-09_iPRAW_HumanControl.pdf
Ji-Young, K., Jong In, L., & Kyoung Gon, K. (2019). The all-purpose sword: North Korea’s cyber operations and strategies. In 2019 11th International Conference on Cyber Conflict (CyCon) (pp. 1–20). https://doi.org/10.23919/CYCON.2019.8756954
Kanzig, N., Meier, R., Gambazzi, L., Lenders, V., & Vanbever, L. (2019). Machine learninģ-based detection of C&C channels with a focus on the locked shields cyber defense exercise. In 2019 11th International Conference on Cyber Conflict (CyCon) (pp. 1–19). https://doi.org/10.23919/CYCON.2019.8756814
Kaufhold, M.-A., Rupp, N., Reuter, C., & Habdank, M. (2020). Mitigating information overload in social media during conflicts and crises: Design and evaluation of a cross-platform alerting system. Behaviour and Information Technology, 39(3), 319–342. https://doi.org/10.1080/0144929X.2019.1620334
Kersting, K. (2018). Machine learning and artificial intelligence: Two fellow travelers on the quest for intelligent behavior in machines. Frontiers in Big Data, 1, 6. https://doi.org/10.3389/fdata.2018.00006
Kersting, K., & Meyer, U. (2018). From big data to big artificial intelligence? KI – Künstliche Intelligenz, 32(1), 3–8. https://doi.org/10.1007/s13218-017-0523-7
Kubovic, O. (2018). One year later: EternalBlue exploit more popular now than during WannaCryptor outbreak. ESET. Retrieved from https://www.welivesecurity.com/2018/05/10/one-year-later-eternalblue-exploit-wannacryptor/.
Kütt, M., Göttsche, M., & Glaser, A. (2018). Information barrier experimental: Toward a trusted and open-source computing platform for nuclear warhead verification. Measurement, 114, 185–190. https://doi.org/10.1016/j.measurement.2017.09.014
Langner, R. (2013). To kill a centrifuge—A technical analysis of what Stuxnet’s creators tried to achieve. Retrieved from https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf.
Lück, N. (2019). Machine learning powered artificial intelligence in arms control. PRIF Report 8/2019. Retrieved from https://www.hsfk.de/fileadmin/HSFK/hsfk_publikationen/prif0819.pdf
Miller, S., Brubaker, N., Zafra, D. K., & Caban, D. (2019, April 10). TRITON actor TTP profile, custom attack tools, detections, and ATT&CK mapping. Retrieved from https://www.fireeye.com/blog/threat-research/2019/04/triton-actor-ttp-profile-custom-attack-tools-detections.html
Mimoso, M. (2017, June 28). New petya distribution vectors bubbling to surface. Threatpost.Com. Retrieved from https://threatpost.com/new-petya-distribution-vectors-bubbling-to-surface/126577/
Nakashima, E., & Warrick, J. (2012). Stuxnet was work of U.S. and Israeli experts, officials say. The Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html
NATO. (2016). Warsaw Summit Communiqué: Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw 8-9 July 2016. Retrieved from http://www.nato.int/cps/en/natohq/official_texts_133169.htm
Olszewski, B. (2018). Advanced persistent threats as a manifestation of states’ military activity in cyber space. Scientific Journal of the Military University of Land Forces, 189(3), 57–71. https://doi.org/10.5604/01.3001.0012.6227
Perkovich, G., & Hoffman, W. (2019). From cyber swords to plowshares. In T. de Waal (Ed.), Think peace: Essays for an age of disorder. Last retrieved on 03.01.2022, from https://carnegieeurope.eu/2019/10/14/from-cyber-swords-to-plowshares-pub-80035
Putz, B., Menges, F., & Pernul, G. (2019). A secure and auditable logging infrastructure based on a permissioned blockchain. Computers and Security, 87, 101602. https://doi.org/10.1016/j.cose.2019.101602
Reinhold, T., & Reuter, C. (2019a). Arms control and its applicability to cyberspace. In C. Reuter (Ed.), Information technology for peace and security—IT-applications and infrastructures in conflicts, crises, war, and peace (pp. 207–231). Springer Fachmedien. https://doi.org/10.1007/978-3-658-25652-4_10
Reinhold, T., & Reuter, C. (2019b). From cyber war to cyber peace. In C. Reuter (Ed.), Information technology for peace and security—IT-applications and infrastructures in conflicts, crises, war, and peace (pp. 139–164). Springer Fachmedien. https://doi.org/10.1007/978-3-658-25652-4_7
Reinhold, T., & Reuter, C. (2019c). Verification in cyberspace. In C. Reuter (Ed.), Information technology for peace and security—IT-applications and infrastructures in conflicts, crises, war, and peace (pp. 257–275). Springer Fachmedien. https://doi.org/10.1007/978-3-658-25652-4_12
Reuter, C. (2019). Information technology for peace and security—IT-applications and infrastructures. In C. Reuter (Ed.), Information technology for peace and security—IT-applications and infrastructures in conflicts, crises, war, and peace (pp. 3–9). Springer Fachmedien. https://doi.org/10.1007//978-3-658-25652-4_1
Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382
Riebe, T., Kaufhold, M.-A., Kumar, T., Reinhold, T., & Reuter, C. (2019). Threat intelligence application for cyber attribution. In C. Reuter, J. Altmann, M. Göttsche, & M. Himmel (Eds.), Science peace security ‘19—Proceedings of the interdisciplinary conference on technical peace and security research (pp. 56–60). TUprints. Retrieved from https://tuprints.ulb.tu-darmstadt.de/9164/2/2019_SciencePeaceSecurity_Proceedings-TUprints.pdf
Riebe, T., & Reuter, C. (2019). Dual-use and dilemmas for cybersecurity, peace and technology assessment. In C. Reuter (Ed.), Information technology for peace and security—IT-applications and infrastructures in conflicts, crises, war, and peace (pp. 165–183). Springer Fachmedien. https://doi.org/10.1007/978-3-658-25652-4_8
Roberts, P. S. (2019, December 13). AI for peace. War on the Rocks. Retrieved from https://warontherocks.com/2019/12/ai-for-peace/
Russell, B. (2020). IoT cyber security. In F. Firouzi, K. Chakrabarty, & S. Nassif (Eds.), Intelligent internet of things (pp. 473–512). Springer. https://doi.org/10.1007/978-3-030-30367-9_10
Schörnig, N. (2018). Artificial intelligence in the military: More than killer robots. In B. Wolff (Ed.), Whither artificial intelligence? Debating the policy challenges of the upcoming transformation (pp. 39–44). Science Policy Paper des Mercator Science-Policy Fellowship-Programms.
Schwarz, E. (2019). Günther Anders in Silicon Valley: Artificial intelligence and moral atrophy. Thesis Eleven, 153(1), 94–112. https://doi.org/10.1177/0725513619863854
SecureList. (2012, September 11). Shamoon the wiper: Further details (part II). Retrieved from https://securelist.com/shamoon-the-wiper-further-details-part-ii/57784/
Sibi Chakkaravarthy, S., Sangeetha, D., & Vaidehi, V. (2019). A survey on malware analysis and mitigation techniques. Computer Science Review, 32, 1–23. https://doi.org/10.1016/j.cosrev.2019.01.002
Silomon, J. (2018). Software as a weapon: Factors contributing to the development and proliferation. Journal of Information Warfare, 17(3), 106–123.
sKyWIper Analysis Team. (2012). sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Retrieved from https://www.crysys.hu/publications/files/skywiper.pdf
Symantec. (2013). Stuxnet 0.5: The missing link. Retrieved from https://docs.broadcom.com/doc/stuxnet-missing-link-13-en..
UK Government. (2016). National cyber security strategy 2016–2021. Retrieved from https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/national_cyber_security_strategy_2016.pdf
UNIDIR. (2013). The cyber index: International security trends and realities. Retrieved from https://www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf
US-DHS. (2020). Guidance on the North Korean cyber threat. Retrieved from https://www.us-cert.gov/ncas/alerts/aa20-106a.
US-DOD. (2018a). National cyber strategy. Last retrieved on 03.01.2022, from https://trumpwhitehouse.archives.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf
US-DOD. (2018b). Summary of the 2018 Department of Defense AI strategy. Last retrieved on 03.01.2022, from https://media.defense.gov/2019/Feb/12/2002088963/-1/-1/1/SUMMARY-OF-DOD-AI-STRATEGY.PDF
Werkner, I.-J., & Schörnig, N. (Eds.). (2019). Cyberwar – die Digitalisierung der Kriegsführung. Springer Fachmedien. https://doi.org/10.1007/978-3-658-27713-0
Zetter, K. (2014, August 13). Meet monstermind, The NSA bot that could wage cyberwar autonomously. Retrieved from https://www.wired.com/2014/08/nsa-monstermind-cyberwarfare/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Reinhold, T., Reuter, C. (2022). Cyber Weapons and Artificial Intelligence: Impact, Influence and the Challenges for Arms Control. In: Reinhold, T., Schörnig, N. (eds) Armament, Arms Control and Artificial Intelligence. Studies in Peace and Security. Springer, Cham. https://doi.org/10.1007/978-3-031-11043-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-031-11043-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-11042-9
Online ISBN: 978-3-031-11043-6
eBook Packages: Political Science and International StudiesPolitical Science and International Studies (R0)