This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure.
The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.
"Given the number of books addressing cyber threats, discovering a new threat type is difficult. Nevertheless, this book succeeds in doing so: cyber attacks enhanced by artificial intelligence. In the authors’ parlance, we are currently experiencing an artificial intelligence arms race. Cyber warfare between machines driven by artificial intelligence is coming. The later chapters of the book cite actual artificial intelligence programs underway in China, Europe, elsewhere in Asia, and in the US—complete with budgets and mission statements. Though this research has profound social and cultural consequences, Abaimov (Univ. of Rome) and Martellini (Univ. of Insubria, Como) focus on the consequences for cybersecurity. Ultimately the best defense against artificial intelligence attacks is more powerful forms of artificial intelligence. The book ends with a fascinating suggestion: unplugging computer networks from the internet and guarding portals with artificial intelligence may be the best available defense."
— J. A. Stever, emeritus, University of Cincinnati, Choice, July 2021