Abstract
The application of Artificial Intelligence Cyber defense Agents (or AICA) poses policy challenges to civil and military doctrine- and policy-makers. These challenges are made more complex by the changing nature of the global information technology eco-system in which AICA tools may be deployed. This eco-system, consisting of billions of Internet of Things (IoT) devices, global 5G (and even next-G and space-based) backbones and cloud architectures, and interdependent infrastructures (e.g., energy, transportation, water, policing, civil governance, etc.) will make difficult the use of AICA tools whose effects are limited and precise. New civil and military operational doctrine, including “persistent engagement,” an approach under which the United States engages in cyberspace with adversaries outside our borders, and “defend forward” in which the United States disrupts adversary operations on their networks, means that AICA use must be calibrated to achieve only the effects desired in a world in which miscalculation and escalation are possible. This chapter explore the new, complex information technology eco-system in which AICA will operate, and some of the policy and doctrinal concepts the United States and its allies are using to defend the cyberspace on which we depend.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See: https://www.statista.com/statistics/269329/penetration-rate-of-the-internet-by-region/ Accessed March 21, 2022.
- 2.
See: https://www.broadbandsearch.net/blog/internet-statistics Accessed March 21, 2022.
- 3.
Ibid.
- 4.
Ibid.
- 5.
See: https://en.wikipedia.org/wiki/Starlink Accessed March 21, 2022.
- 6.
See: https://orbitaltoday.com/2021/11/19/jeff-bezos-kuiper-holding-llc-seeks-permission-to-launch-4538-more-satellites/ Accessed March 21, 2022.
- 7.
See: https://techstory.in/china-to-start-building-5g-satellite-network/ Accessed March 21, 2022.
- 8.
See: https://www.verizon.com/business/resources/articles/s/5G-device-density-and-the-industries-it-will-impact/ Accessed March 21, 2022.
- 9.
See: https://apps.nsa.gov/iad/programs/iad-initiatives/active-cyber-defense.cfm Accessed March 21, 2022.
- 10.
See: https://cyber.forum.yale.edu/blog/2021/7/20/defend-forward-adapting-offense-and-defense-strategy-to-cyberspace Accessed March 21, 2022.
- 11.
“Achieve and Maintain Cyberspace Superiority,” Command Vision for US Cyber Command, April 2018.
- 12.
- 13.
See: https://www.solarium.gov/home Accessed March 21, 2022.
- 14.
Ibid.
- 15.
See: https://www.un.org/securitycouncil/sanctions/2374/panel-of-experts/work-mandate Accessed March 21, 2022.
- 16.
See: “Proportionality and Force in International Law,” Judith Gail Gardam, The American Journal of International Law, Vol 87. No 3, July, 1993, Pages 391–413.
- 17.
See: https://besacenter.org/proportionality-in-the-modern-law-of-war-an-unenforceable-norm-or-the-answer-to-our-dilemma/ Accessed, March 27, 2022.
- 18.
Ibid.
- 19.
See: https://ccdcoe.org/research/tallinn-manual/ Accessed March 27, 2022.
- 20.
See: https://ccdcoe.org/ Accessed March 27, 2022.
- 21.
Ibid.
- 22.
Ibid.
- 23.
Ibid.
- 24.
- 25.
Antulio J. Echevarria II, “Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy,” United States Army War College Press, United States Army War College, 2016.
- 26.
Op cit. page 1.
- 27.
Artificial Intelligence and Cybersecurity: Opportunities and Challenges Technical Workshop Summary, a report by the Networking and Information Technology Research and Development Subcommittee and the Machine Learning and Artificial Intelligence Subcommittee of the National Science and Technology Council and the Office of Science and Technology Policy (Executive Office of the President), March 2020.
- 28.
Ibid.
- 29.
Final Report, National Security Commission on Artificial Intelligence, 2021.
- 30.
Ibid.
- 31.
See: National Institutes of Standards and Technology Special Publication 800–122 “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII).”
- 32.
- 33.
- 34.
- 35.
Op cit.
- 36.
Proceedings of the 6th International Conference on Cyber Conflict, P. Brangetto, M. Maybaum, J Stinissen (Eds.), NATO Cooperative Cyber Defense Center of Excellence, 2014.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Visner, S.S. (2023). Policy Issues. In: Kott, A. (eds) Autonomous Intelligent Cyber Defense Agent (AICA). Advances in Information Security, vol 87. Springer, Cham. https://doi.org/10.1007/978-3-031-29269-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-29269-9_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-29268-2
Online ISBN: 978-3-031-29269-9
eBook Packages: Computer ScienceComputer Science (R0)