Page 181 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 181

GRAEME BALLARD:  IF THE FACE FITS: IS IT POSSIBLE FOR ARTIFICIAL INTELLIGENCE TO ACCURATELY PREDICT THREATS TO
                       PROTECT CRITICAL INFRASTRUCTURE?

            implementation. Change has always been a continuous process but, after engaging ML, the
            process of change will occur at a faster pace. Political and economic systems must adapt to this
                                                8
            – preferably proactively rather than reactively . As I hope will be clear from the discussion so
            far, the relationship between ML and human processes will be symbiotic – each will influence
            the other. Under these conditions, the ML tool itself must be considered as highly active and
            will need to be constantly modified, curated and updated in order to remain relevant and
            accurate – not just technologically, but also in terms of data management and its continued
            ability to identify threats in a world that is constantly changing.

            By definition, therefore, data-sharing is a necessity that will make a positive contribution to the
            identification of threats and those tasked with maintaining security. It must become the norm –
            both in attitude and in practice. The more frictionless movement of data that can be achieved,
            the more accurate and trusted any ML tool will be. Data must be acquired and moved from as
            varied and wide a source(s) as possible. This will mean not only sharing data between nuclear
            power plants within the same company, but data between competing companies; perhaps also
            with different industries and, almost certainly, across geographical and political boundaries.

            In order to facilitate such frictionless data-sharing, it is imperative that changes to both legal
            and commercial practices must be found. This will likely require a shift in the psychological
            attitude of both our politicians and our business leaders, and also significant (and potentially
            disruptive) changes to business models, accounting  practices and the security services
            themselves. This must all be achieved without itself creating a security risk, and achieved
            within the law, ensuring that what Lepine (2014) describes as the social contract remains
            intact.



            6  Conclusion

            The use of ML to identify threats to protect critical infrastructure within the energy sector is a
            tantalising prospect and a project that my consortium partners have been actively undertaking
            for the last 18 months. There is little question that the correct and careful implementation of
            such a technology will add value to the security of nuclear (or other) energy production. The
            ultimate success of any implementation, however, is dependent on six factors:
            •  Finding good consortium partners who truly understand the idiosyncrasies and
               complications of researching human subjects.
            •  Finding the appropriate amount of funding to be able to account for the idiosyncrasies and
               complications of researching human subjects.
            •  If points one and two can be addressed, the next factor of success is the gathering of
               good data and ensuring certain methodological issues are addressed when designing the
               tool. These human methodological issues are no longer mere academic niceties, but are
               essential to the accurate and meaningful implementation of the technology.
            •  Trust in the technology. The technology must be human-centric. It must add value in the
               widest possible terms. For example, ML has the potential to not merely identify threats
               in terms of preventing catastrophe, it has a role to play in human resource management,
               ensuring the wellbeing of workers in terms of their physical and psychological health.
               These factors should be considered not simply because of their relevance in preventing a
               disaster, but in wider acceptance of the results from the tool.

            8   Once more, the lessons from social media v legacy media should be learned.

                                                                                    181
   176   177   178   179   180   181   182   183   184   185   186