User:BlueBuddies/sandbox

= Digital Spies: The Emergence of A.I. in Cyber Surveillance. = ''Mission report Russian Federation submarine K599 Sevastopol. ''

Operation: Podkova  

Day 74  

The active learning defense system testing…  

''continues to operate flawlessly. ''

''One might even say… miraculously. ''

''We are navigating under the Arctic ice cap by dead reckoning and five days from home. ''

''After 25,000 nautical miles, the Sevastopol has deliberately approached every navy in the world and remained completely undetected. ''

''The Podkova’s stealth capability has exceeded all expectations. ''

''We are at this moment the state of the art of war. ''

''The most fearsome killing machine ever devised by man. ''

These words from Mission: Impossible: Dead Reckoning, Part One. Envision the world's most potent submarine, the Sevastopol, under the control of Artificial Intelligence (A.I.). The A.I. called "The Entity", seizes command of a Russian submarine system, deceiving its crew into believing they're under attack by a U.S. submarine. I'll leave it at that.

Believe it or not, a very early version similar to "The Entity" is already being used by foreign countries and companies to spy and conduct cyberattacks against the U.S. government, companies and its people. While the implementation of A.I. in fields such as transportation, medicine, and the food industry has proven to be helpful, in cyber espionage and cyberattacks it means a change in thinking in digital warfare, where the ability to adapt and learn from data improves offensive and defensive cyber capabilities and raises questions about ethical boundaries and global cybersecurity governance. In the military, we are constantly under surveillance when we leave the country or during a regular day at work. Every day, we spend more time on our phones and interact with different applications on them that we are not sure if they are safe to use. Not only that, but I am also certain that many adversaries would love to know where we are stationed every day, and with the help of A.I., our adversaries can now know our location in real time. Former Army Ranger and executive vice president of studies at the Center for a New American Security, Paul Scharre, explained in an interview for the NPR podcast that China is using this technology to help in the repression of the ethnic group Uyghurs, and he mentioned that they are already beginning to export their model of A.I. globally (Shapiro). Imagine the consequences if this type of technology were to fall into the hands of our adversaries. They would acquire the ability to manipulate us in ways that we could not even imagine. Therefore, I argue that we must be vigilant about what we do and post on the Internet and that we must have the proper training and understanding of A.I. and its potential uses against us.

Conversely, I argue that the intelligence community in our government needs the help of this technology to better deal with the proliferation of A.I. in cyber espionage and cyberattacks. Dr. Amy Zegart, a professor at Stanford, said people post about 500 million tweets, send nearly 300 billion emails, and post about 300 million photos on Facebook every day. She argues that the intelligence community needs help from A.I. to better handle this crushing load of data ("The future of cybersecurity"). Adaptation to this new technology can improve human analysis, aid pattern recognition, and process massive data amounts, which is crucial in the era of cyberespionage and cyberattacks. Zegart also talks about the shift from traditional spy operations to leveraging open-source data and A.I., urging government agencies to adapt to technological advancements. She points out that cultural resistance within intelligence communities is a barrier to integrating this technology, recommending a culture that embraces change and the technological integration of A.I. ("Spies, Lies and Algorithms"). This proactive approach enables a more responsive and informed decision-making process, allowing for timely interventions in international and local affairs. I firmly believe that embracing A.I. is not just an option but a necessity in our times, when more and more we depend on the Internet in our daily lives.

The escalating cyber threats coming from North Korea highlight the vulnerability of our global cyber infrastructure and the simultaneous rise of A.I.-driven security solutions. We can think of how North Korea conducted a cyberattack on Sony a couple of years ago, which showed how weak the cyberinfrastructures of American companies were. According to the CEO of Platzi, Freddy Vega, North Korea allegedly has an organization called Lazarus Group that specializes in ransomware1 against not only governments or companies, but also regular people like us. With generative A.I., North Korea automatically conducts cyberattacks on millions, enabling them to collect millions of dollars, sustaining their dictatorship (Vega). Considering the increasing cyber threats from North Korea, our cyber infrastructure is at risk. It is imperative for us to fortify our cyber infrastructure, both at governmental and corporate levels, through collaborative efforts and innovative technological solutions.

But they are not the only ones making money with the help of A.I. In an article for CNBC, Bob Violino pointed out that the rise of cyberattacks is helping to fuel the growth of A.I.-based security products. The sales of these products are estimated to reach $133.8 billion by 2030. Cybersecurity has become a priority for many people. Many of us are worried about being victims of any type of cyberattack, and this is why we buy these products. But we are not 100% certain that those products really work. Unfortunately, as we all navigate this new era of technological advances, we all find ourselves in the uncertainty of A.I.'s role: whether it is helping us, or perpetuating cyberattacks.

In contrast, by harnessing this technology, the U.S. has achieved technological superiority in intelligence and defense. In an article for Slate, Bruce Schneier a computer security professional, privacy specialist, and writer, mentions how the United States was able to predict that the Russians were poised to invade Ukraine. Thanks to the use of A.I., the government was able to process countless amounts of data and shine a light on the intentions of Russia. This is a great example of how the proper use of A.I. can give us a great advantage against our adversaries. Schneier also argues that this technology is not only good at conducting mass analysis of data, but also can keep records of mass surveillance, and this will allow our intelligence community to conduct surveillance backward in time. This technological progress means that not only can surveillance be conducted retroactively, but that spying can now include the analysis of topics, behaviors, and even intentions on a grand scale. Additionally, Microsoft's new generative A.I. is a big step forward in secure data analysis. In an article published by Bloomberg on May 07, 2024, Katrina Manson details Microsoft's new powerful generative A.I. designed for intelligence agencies in the U.S. According to the article, this highly effective A.I. works completely independently of the internet, analyzing top-secret information. For the first time, the intelligence community can work without the need to access the internet. This new technology has much potential and our government can now be ahead of our adversaries. I believe that with the creation of the new generative A.I. by Microsoft and the ability to retroactively access data we could cultivate a new era of preventive defense against cyberespionage and cyberattacks. In conclusion, as a passionate fan of movies and an observer of technological trends, I recognize the duality of A.I. in our world. The movie's interpretation of A.I. in Mission: Impossible: Dead Reckoning where A.I. commands a submarine may be fictional, but it reflects a shocking reality: the power of A.I. is no longer relegated to our imagination. It is actively shaping our geopolitical landscape, for better or for worse. Technological advances have provided remarkable benefits across various sectors, yet the same technology poses significant challenges in cyberespionage and cyberattacks, where nations are enhancing both offensive and defensive capabilities. The potential for A.I. to be used by adversaries to trespass on our privacy and security is not only a possibility but a present-day concern. In our line of work, surveillance is a constant presence, whether we are deployed outside the U.S. or working here, the constant use of various applications on our phones raises security concerns, especially now that we know that our location can be pinpointed in real-time. Furthermore, the disclosures regarding China's deployment of artificial intelligence for repression are concerning, while North Korea's cyberattacks serve as a reminder of the imperative to remain vigilant against potential threats. These instances underscore the critical importance of exercising caution and awareness in our online activities. As we stand at this crossroads, our intelligence community must embrace this new technology. A.I.'s ability to recognize patterns, and process large amounts of data is indispensable in combating cyber espionage and cyberattacks. The integration of A.I. can fortify our defenses against cyber threats and enable us to rapidly address security risks. However, this technological approach must be accompanied by a strong commitment to ethical standards. I hope for a future where A.I. serves as a guardian of our security, not as a tool for oppression or conflict. Let's advocate for the responsible development and deployment of A.I., ensuring it follows the values of freedom, privacy, and human respect. The mission for us may appear impossible, but we must promote the use of this technology to fortify our defenses, assuming a preventative posture against the ever-evolving landscape of cyber warfare.

Resources:


 * Manson, Katrina. “Microsoft Creates Top Secret Generative AI Service for US Spies” 		bloomberg.com, 7 May 2024
 * McQuarrie, Christopher, director. “Mission: Impossible – Dead Reckoning Part One” Paramount 	Pictures, 12 July 2023
 * Schneier, Bruce. “The Internet Enabled Mass Surveillance. A.I. Will Enable Mass Spying.” 	Slate.com, 4 Dec 2023
 * Shapiro, Ari. “When it comes to the dangers of AI, surveillance poses more risk than anything” 	Npr.org, 2 March 2023
 * Vega, Freddy. “Quiénes Necesitan Aprender Ciberseguridad En Tu Empresa.” YouTube.com, 12 April 2024
 * Violino, Bob. "Artificial intelligence is playing a bigger role in cybersecurity, but the bad 	guys 	may benefit the most." Cnbc.com, 13 Sep 2022
 * Zegart, Amy “Spies, Lies, and Algorithms: The History and Future of American Intelligence” 	hai.stanford.edu, 2 March 2022
 * Zegart, Amy “The future of cybersecurity; by Stanford Engineering Staff” 				engineering.stanford.edu, 3 May 2024

More Learning


 * The Lazarus Group, also known as Guardians of Peace, is a cyberattack unit linked to North Korea, notorious for its advanced persistent threats and diverse methods of operation. It is part of North Korea’s strategy to compromise global cybersecurity and generate revenue, posing a significant asymmetric threat, particularly to South Korea.


 * Cyberattacks to banks conducted by the "Lazarus Group" North Korea.


 * Benjamin Jensen testimony before the Senate to emphasize the critical role of artificial intelligence in national security, highlighting the need for a skilled workforce, nimble bureaucracy, and robust data infrastructure. He warns that not adapting to A.I.-driven warfare could result in ceding the initiative to adversaries, underscoring the urgent need to embrace AI for future competitiveness and security.

Terms use in cyber security:

Adware: Malware that displays ads.

Advanced Persistent Threat: Long-term, unauthorized presence.

Antivirus Software: Software to prevent malware.

Attack Vector: Technique to access or harm a system.

Authentication: Identity verification process.

Botnet: Network of infected computers.

Business Continuity Planning: Protocol for disruption recovery.

Click Fraud: Fake clicks to generate money.

Cloud Computing: Computing and IT resources via the internet.

Cryptography: Securing information through codes.

Cyberattack: Attempts to cause harm or access data.

Cryptovirology: Refers to the study of cryptography use in malware, such as ransomware and asymmetric backdoors.

Cyber Spying: Unauthorized access to sensitive information.

Dark Web: Hidden part of the World Wide Web.

Defense in Depth: Stacking layers of security.

Encryption: Converting information into a code.

Endpoint Detection and Response: Solution to monitor and mitigate threats.

Evil Twin: Fraudulent Wi-Fi access point.

Firewall: Network security device.

File Transfer Protocol: Policies to regulate file exchange.

Gateway: Intersection where networks meet.

Hacker: Someone who tries to access data.

Identity Theft: Unauthorized use of personal information.

Information Security: Subcategory of cybersecurity.

Internet of Things: Network of physical devices.

Intrusion Detection System: Monitoring device or software.

IP Address: String of numbers for a computer.

IP Address Spoofing: Disguising the source of IP packets.

Malware: Malicious software.

Bug: Unintended software or hardware problem.

Decryption: Converting coded data to original form.

Detection Deficit: Gap between attack and discovery.

DDoS Attack: Flooding server with traffic.

Domain Name: Group of connected computers.

Endpoint Security: Physical device connected to network.

Ethical Hacking (White Hat): Authorized hacking to simulate attacks.

Guessing Entropy: Measurement of difficulty to guess.

IP Packet: Unit of data for transmission.

Malicious Code: Code that causes harm or threat

Ransomware: type of crypto virological malware that permanently blocks access to the victim's personal data unless a ransom is paid.