Page 98 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 98

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        3  From Asymmetric, Cyber and Hybrid Threats to
             Hyper Threats to South-Eastern European Countries’
             CI and CII

        The term “hyper threat” is not a new “buzz word” that has just recently begun to dominate
        geo-strategic and security debates. During World War II the term combined many concurrent
        theatres of war. Giving the technological development of that time it is understandable that
        the revolution in military affairs that occurred prior to WWII led the idea of a “pan-war” to
        influence the understanding of the term “hyper”.

        Little has been written about hyper war and hyper threats. Most of the existing debates in the
        modern context connect this term to a desire to explain threats that come from the intercon-
        nectivity and interdependence of the modern way of living put in the context of AI systems.
        The origin of the word, however, comes from the Greek term “hyper” meaning over or above.
        Usually this term is used to express something that is beyond what is already known, defining
        an abundance of something.

        In the modern context, hyper threats in their essence have AI systems’ performance and ability
        to collect, process, and disseminate data at a higher volume and a greater velocity. As General
        John R. Allen asserted, “What makes this new form of warfare unique is the unparalleled speed
        enabled by automating decision-making and the concurrency of action that will become possible
        by leveraging artificial intelligence and machine cognition” (Allen & Hussain, July 10, 2017).

        Similarly, Stuart Lauchlan argued that “hyper warfare is the idea that future war could take
        place at such a high level of strategy, technology and destruction that its effects would be
        worse than the Second World War between 1939 and 1945” (Lauchlan, 2019). Euhus believes
        that hyper war requires more strategic comprehension than just the tactical effects of AI sys-
        tems (Euhus, 2019).

        The GLOBSEC NATO Adaptation Initiative analysis, on the other hand, concluded that “Ad-
        vances underway in security and defence-related technologies that span the conflict spectrum
        from Hybrid War at the lower end, to Hyper War at the future high end, will be rapid and dra-
        matic. Hybrid War will continue to drive requirements for enhanced intelligence collection,
        cyber-security, and critical infrastructure protection. Given the reliance of Alliance societies
        on web-vulnerable infrastructures, the effects of a cyberattack could lead to significant if not
        catastrophic physical damage” (GLOBSEC, 2018).

        From all of the above, it seems that applying AI systems in the security context brings an abil-
        ity that is beyond just the asymmetric cyber capacities or hybridity. The asymmetry of these
        systems spans from their availability right up to the ethical, moral and legal boundaries of their
        applications. AI systems are expanding very fast. Terrorist organizations have so far proved
        creative and ready to employ whatever serves their cause (Heffelfinger, 2013). They would
        not be hesitant to employ AI systems and applications to achieve their strategic ends. Hacking
        these systems, overriding their algorithms and subordinating them to the terrorists’ goals is not
        impossible. Terrorists or hackers working in these capacities could endanger existing SEE gov-
        ernments’ AI systems or partner nations’ systems performing critical functions or missions. As
        Tomáš Valášek of Carnegie Europe argued, “AI can be effectively deployed to undermine trust
        among countries fighting on the same side by discrediting their intelligence (Valášek, 2017).

       98
   93   94   95   96   97   98   99   100   101   102   103