Distributed Intelligence: Cyber Warfare Application Possibilities of Computer Vision and Artificial Intelligence
DOI:
https://doi.org/10.35926/HDR.2021.1-2.1Kulcsszavak:
Artificial Intelligence, decentralized, blockchain, security, military, law enforcement, cyber security, machine learningAbsztrakt
Artificial Intelligence (AI) and blockchain technology have significant transformative potential to create next level solutions in improving traditional systems within military and law enforcement. Despite initial scepticism in scaling blockchain technology beyond the boundaries of digital currencies and overcoming dependence on traditional legacy systems, it is evident that the technology, together with AI has the potential to become greater than the internet itself.2 Countries like China and the United States have expressed interest in applying and combining the technologies for improvements and advancements in military and law enforcement areas, such as “cyber defence, secure messaging, resilient communications, logistics support and the networking of the defence Internet of Things (IoT)”.3 As investors and innovators seek to cash in on the merging of two powerful technologies, we have reached the crossroads necessitating a comprehensive research effort to determine best-use cases and utilization practices for military and law enforcement purposes.
Hivatkozások
• Allen, G. C. “Project Maven Brings AI to the Fight Against ISIS.” Bulletin of the Atomic Scientists, 21 December 2017. https://thebulletin.org/2017/12/project-maven-brings-ai-to-the-fight-against-isis/, Accessed on 22 May 2020.
• Alshibly, H., Alzou’bi, S. and Al-Ma’aitah, Mohammed. “Artificial Intelligence in Law Enforcement, A Review.” In-ternational Journal of Advanced Information Technology 4/4. 2014. 1–9. https://doi.org/10.5121/IJAIT.2014.4401
• Andersen, C. “The Great Chain of Being Sure About Things.” The Economist, 31 Oct 2015. https://www.economist.com/briefing/2015/10/31/the-great-chain-of-being-sure-about-things, Accessed on 22 May 2020.
• “Arleigh Burke-Class (Aegis) Destroyer”. Naval Technology. https://www.naval-technology.com/projects/burke/, Ac-cessed on 20 April 2020.
• Axe, D. “Failure to Communicate: Inside the Army’s Doomed Quest for the ‘Perfect’ Radio.” The Center for Public Integrity. 10 January 2012. https://publicintegrity.org/national-security/failureto-communicate-inside-the-armys-doomed-quest-for-the-perfect-radio/, Accessed on 22 May 2020.
• Babones, S. “Smart ‘Blockchain Battleships’ Are Right Around the Corner.” The National Interest, 17 May 2018. https://nationalinterest.org/feature/smart-battleships-are-right-around-the-corner-25872, Accessed on 22 May 2020.
• Bilyana, L. and Sale L. „Weaponising Blockchain: Military Applications of Blockchain Technology in the US, China and Russia”. The RUSI Journal 166/3. 2021. 46–56, DOI: 10.1080/03071847.2021.1886871
• Bower, J. L. and Christensen, C. M. “Disruptive Technologies: Catching the Wave.” Harvard Business Review 73/1. 1995. 43–53. https://hbr.org/1995/01/disruptive-technologies-catching-the-wave
• Bretl, T., Righetti, L. and Madhavan, R. “Epstein, Project Maven, and Some Reasons to Think About Where We Get Our Funding.” IEEE Robotics & Automation 26/4. 2019. 8–13. DOI: 10.1109/MRA.2019.2943271
• Crofts, P. and Rijswijik, H. v. “Negotiating ‘Evil’: Google, Project Maven and the Corporate Form.” Law, Technology and Humans 2/1. 75–90. DOI: 10.5204/lthj.v2i1.1313
• “Cyber Defence”. NATO. 17 March 2020. https://www.nato.int/cps/en/natohq/topics_78170.htm, Accessed on 22 May 2020.
• “DoD Digital Modernization Strategy: DoD Information Resource Management Strategic Plan FY19-23.” United States, Department of Defence. 12 July 2019. https://media.defence.gov/2019/Jul/12/2002156622/-1/-1/1/DOD-DIGITAL-MODERNIZATION-STRATEGY-2019.PDF, Accessed on 17 April 2020.
• Dwyer, G. P. “The Economics of Bitcoin and Other Private Digital Currencies.” Journal of Financial Stability 17. 2015. 81–91. DOI: 10.1016/j.jfs.2014.11.006
• Ferdinando, L. “‘Terabyte of Death’ Cyberattack against DoD Looms, DISA Director Warns”. 11 January 2018. https://www.defense.gov/Explore/News/Article/Article/1414146/terabyte-of-deathcyberattack-against-dod-looms-disa-director-warns/, Accessed on 20 April 2020.
• “Galois and Guardtime Federal Awarded $1.8 Million DARPA Contract to Formally Verify Blockchain-Based Integrity Monitoring System”. Galois. 13 September 2016. https://galois.com/news/galois-guardtime-formal-verification/, Acces-sed on 20 April 2020.
• Garstka, J. J. “Network-Centric Warfare Offers Warfighting Advantage.” SIGNAL Magazine, May 2003. https://www.afcea.org/content/network-centric-warfare-offers-warfighting-advantage, Accessed on 20 April 2020.
• Haber, S. and Stornetta, W. S. “How to time-stamp a digital document.” Journal of Cryptology 3/2. 1991. 99–111. DOI: 10.1007/bf00196791
• Haig, Zs. “Connections between Cyber Warfare and Information Operations” AARMS 8/2. 2009. 329–337. http://m.ludita.uni-nke.hu/repozitorium/bitstream/handle/11410/1900/13haig.pdf, Accessed on 20 April 2020.
• Hashim, H. “Military Applications of Blockchain Technology.” Fintech News, 1 July 2020. https://www.fintechnews.org/military-applications-of-blockchain-technology/
• Jobbágy, Z. “Innovation Methodologies for Defence Challenges: On Design Thinking and Organic Approaches”. Hun-garian Defence Review 148/2. 2020. 50–64. https://doi.org/10.35926/HDR.2020.2.3
• Kovács, L. “National Cyber Security as the Cornerstone of National Security.” Land Forces Academy Review 23/2. 2018. 113–120. DOI: 10.2478/raft-2018-0013
• Kovács, L. “National Cybersecurity Strategy Framework.” AARMS 18/2. 2019. 65–76. DOI: 10. 32565/aarms.2019.2.9
• “Launchpad to Relevance: Aerospace and Defence Technology Vision 2018”. Accenture. 1 June 2018. https://www.accenture.com/_acnmedia/PDF-79/Aerospace-Defence-Tech-Vision-2018.PDF, Accessed on 22 May 2020.
• Lindorff, D. “Exclusive: The Pentagon’s Massive Accounting Fraud Exposed”. The Nation, 27 November 2018. https://www.thenation.com/article/archive/pentagon-audit-budget-fraud/, Accessed on 22 May 2020.
• Lindsay, J. M. (host). “Killer Robots and Autonomous Weapons With Paul Scharre”. Podcast. 1 June 2018. https://www.cfr.org/podcasts/killer-robots-and-autonomous-weapons-paul-scharre, Accessed on 28 May 2020.
• Madhavan, R. “Artificial Intelligence in Policing: Use-Cases, Ethical Concerns, and Trends.” EMERJ. 19 December 2016. https://emerj.com/ai-sector-overviews/artificial-intelligence-inpolicing/,Accessed on 22 May 2020.
• Malik, A. A., Mahboob, A., Khan, A. and Zubairi, J. “Application of Cyber Security in Emerging C4ISR Systems.” In Crisis Management: Concepts, Methodologies, Tools, and Applications. Hershey: Information Science Reference, 2014. 1705–1738. DOI: 10.4018/978-1-4666-4707-7.ch086
• McAbee, A., Tummala, M. and McEachen, J. “Military Intelligence Applications for Blockchain Technology.” In Pro-ceedings of the 52nd Hawaii International Conference on System Sciences. Honolulu: University of Hawaiʻi at Mānoa, 2019. DOI: 10.24251/HICSS.2019.726
• McCaney, K. “Law Enforcement Using Analytical Tools to Predict Crime”. GCN. 22 December 2010. https://gcn.com/articles/2010/12/22/police-predictive-analysis-software.aspx?m=1, Accessed on 22 May 2020.
• McCarter, J. “DON Innovator Embraces a New Disruptive Technology: Blockchain”. Secretary of the Navy. 22 June 2017. https://www.secnav.navy.mil/innovation/Pages/2017/06/BlockChain.aspx, Accessed on 22 May 2020.
• Mire, S. “Blockchain for Military Defence.” Disruptor Daily, 9 November 2018. https://www.disruptordaily.com/blockchain-use-cases-military-defence/, Accessed on 22 May 2020.
• Nassar, A. R. and Reutzel, E. W. “A proposed digital thread for additive manufacturing”. In Proceedings for the 2013 International Solid Freeform Fabrication Symposium. Austin: University of Texas, 2013. 19–43. http://utw10945.utweb.utexas.edu/Manuscripts/2013/2013-02-Nassar.pdf
• National Defence Authorization Act for Fiscal Year 2018, H.R. 2810, 115th Cong. (2017–2018)
• Pawlyk, O. “If It’s Not Ethical, They Won’t Field It: Pentagon Release New A.I. Guidelines”. Military.com. 24 Febru-ary 2020. https://www.military.com/daily-news/2020/02/24/if-its-not-ethicalthey-wont-field-it-pentagon-release-new-ai-guidelines.html, Accessed on 23 April 2020.
• Perera, W. “Understanding Blockchain: How it works”. The Capital, 13 May 2020. https://medium.com/the-capital/understanding-blockchain-how-it-works-5772e29421b8, Accessed on 28 May 2020.
• Pinna, A. and Ruttenberg, W. Distributed ledger technologies in securities post-trading: revolution or evolution? Frankfurt: European Central Bank, 2016. DOI: 10.2866/270533
• Popescu, V. A., Popescu, G. and Popescu, C. R. “The amazing world of the Internet-Challenges of the Internet Age”. Manager Journal 12/1. 2010. 13–23. http://manager.faa.ro/download/536_1202.pdf
• Reed, J. “Israel’s Killer Robot Cars”. Foreign Policy, 20 November 2012. https://foreignpolicy.com/2012/11/20/israels-killer-robot-cars/, Accessed on 28 May 2020.
• Sanchez, S. L. “Blockchain Technology In Defence”. European Defence Matters 14. 2017. 17. https://www.eda.europa.eu/webzine/issue14/cover-story/blockchain-technology-in-defence
• Simerly, M. T. and Keenaghan, D. J. “Blockchain for military logistics”. Army Sustainment, 4 November 2019. https://www.army.mil/article/227943/blockchain_for_military_logistics, Accessed on 22 May 2020.
• Swan, M. Blockchain: Blueprint for a New Economy. Sebastopol, CA: O’Reilly Media, 2015.
• Tapscott, D. and Tapscott A. Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Busi-ness, and the World. London: Penguin, 2016.
• Wyden, R. Ron Wyden to Alan R. Lynn, 22 March 2017. Letter. https://www.documentcloud.org/documents/3527403-Ron-Wyden-DISA-STARTTLS-Letter-March-22.html, Accessed on 17 April 2020.