Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 87))

  • 425 Accesses

Abstract

The application of Artificial Intelligence Cyber defense Agents (or AICA) poses policy challenges to civil and military doctrine- and policy-makers. These challenges are made more complex by the changing nature of the global information technology eco-system in which AICA tools may be deployed. This eco-system, consisting of billions of Internet of Things (IoT) devices, global 5G (and even next-G and space-based) backbones and cloud architectures, and interdependent infrastructures (e.g., energy, transportation, water, policing, civil governance, etc.) will make difficult the use of AICA tools whose effects are limited and precise. New civil and military operational doctrine, including “persistent engagement,” an approach under which the United States engages in cyberspace with adversaries outside our borders, and “defend forward” in which the United States disrupts adversary operations on their networks, means that AICA use must be calibrated to achieve only the effects desired in a world in which miscalculation and escalation are possible. This chapter explore the new, complex information technology eco-system in which AICA will operate, and some of the policy and doctrinal concepts the United States and its allies are using to defend the cyberspace on which we depend.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See: https://www.statista.com/statistics/269329/penetration-rate-of-the-internet-by-region/ Accessed March 21, 2022.

  2. 2.

    See: https://www.broadbandsearch.net/blog/internet-statistics Accessed March 21, 2022.

  3. 3.

    Ibid.

  4. 4.

    Ibid.

  5. 5.

    See: https://en.wikipedia.org/wiki/Starlink Accessed March 21, 2022.

  6. 6.

    See: https://orbitaltoday.com/2021/11/19/jeff-bezos-kuiper-holding-llc-seeks-permission-to-launch-4538-more-satellites/ Accessed March 21, 2022.

  7. 7.

    See: https://techstory.in/china-to-start-building-5g-satellite-network/ Accessed March 21, 2022.

  8. 8.

    See: https://www.verizon.com/business/resources/articles/s/5G-device-density-and-the-industries-it-will-impact/ Accessed March 21, 2022.

  9. 9.

    See: https://apps.nsa.gov/iad/programs/iad-initiatives/active-cyber-defense.cfm Accessed March 21, 2022.

  10. 10.

    See: https://cyber.forum.yale.edu/blog/2021/7/20/defend-forward-adapting-offense-and-defense-strategy-to-cyberspace Accessed March 21, 2022.

  11. 11.

    “Achieve and Maintain Cyberspace Superiority,” Command Vision for US Cyber Command, April 2018.

  12. 12.

    See: https://www.defense.gov/News/News-Stories/Article/Article/2840284/persistent-engagement-strategy-paying-dividends-cybercom-general-says/ Accessed March 21, 2022.

  13. 13.

    See: https://www.solarium.gov/home Accessed March 21, 2022.

  14. 14.

    Ibid.

  15. 15.

    See: https://www.un.org/securitycouncil/sanctions/2374/panel-of-experts/work-mandate Accessed March 21, 2022.

  16. 16.

    See: “Proportionality and Force in International Law,” Judith Gail Gardam, The American Journal of International Law, Vol 87. No 3, July, 1993, Pages 391–413.

  17. 17.

    See: https://besacenter.org/proportionality-in-the-modern-law-of-war-an-unenforceable-norm-or-the-answer-to-our-dilemma/ Accessed, March 27, 2022.

  18. 18.

    Ibid.

  19. 19.

    See: https://ccdcoe.org/research/tallinn-manual/ Accessed March 27, 2022.

  20. 20.

    See: https://ccdcoe.org/ Accessed March 27, 2022.

  21. 21.

    Ibid.

  22. 22.

    Ibid.

  23. 23.

    Ibid.

  24. 24.

    See: https://www.defense.gov/News/Releases/Release/Article/2091996/dod-adopts-ethical-principles-for-artificial-intelligence/ Accessed May 6, 2020.

  25. 25.

    Antulio J. Echevarria II, “Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy,” United States Army War College Press, United States Army War College, 2016.

  26. 26.

    Op cit. page 1.

  27. 27.

    Artificial Intelligence and Cybersecurity: Opportunities and Challenges Technical Workshop Summary, a report by the Networking and Information Technology Research and Development Subcommittee and the Machine Learning and Artificial Intelligence Subcommittee of the National Science and Technology Council and the Office of Science and Technology Policy (Executive Office of the President), March 2020.

  28. 28.

    Ibid.

  29. 29.

    Final Report, National Security Commission on Artificial Intelligence, 2021.

  30. 30.

    Ibid.

  31. 31.

    See: National Institutes of Standards and Technology Special Publication 800–122 “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII).”

  32. 32.

    See: https://gdpr-info.eu/art-25-gdpr/

  33. 33.

    See: https://www.oag.ca.gov/privacy/ccpa

  34. 34.

    See: https://constitution.congress.gov/constitution/amendment-4/

  35. 35.

    Op cit.

  36. 36.

    Proceedings of the 6th International Conference on Cyber Conflict, P. Brangetto, M. Maybaum, J Stinissen (Eds.), NATO Cooperative Cyber Defense Center of Excellence, 2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samuel Sanders Visner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Visner, S.S. (2023). Policy Issues. In: Kott, A. (eds) Autonomous Intelligent Cyber Defense Agent (AICA). Advances in Information Security, vol 87. Springer, Cham. https://doi.org/10.1007/978-3-031-29269-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-29269-9_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-29268-2

  • Online ISBN: 978-3-031-29269-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics