Skip to main content

Autonomous Systems and Cyberspace: Opportunities for the Armed Forces

  • Conference paper
  • First Online:
Modelling and Simulation for Autonomous Systems (MESAS 2021)

Abstract

The development of autonomous systems represents an opportunity for states to enhance their military power and change their status in the system of international relations, probably with the presumptions of the new Revolution in Military Affairs (RMA). Characteristics like flexible deployment, efficiency, adaptability, rapid upgradability, and/or the capacity to absorb losses that crewed systems cannot constitute potential game-changing technology in terms of military capabilities. The usage of the autonomous systems may vary from support functions (such as intelligence gathering, reconnaissance, or transportation) to coercive ones (autonomous weapon systems) in different operational domains. However, all types share a common characteristic – their interconnection with information technologies and cyberspace. Features like the complex structure, absence of specific borders, and diminished role of distance clearly distinguish this domain from land, sea, air, and even space and change the logic of how the security is provided there. Autonomous cyber systems (ACS) that operate in and through this domain represent unique military systems even among autonomous systems themselves. This paper aims to examine the interconnection between ACS and cyberspace and identify opportunities for a state’s military power represented by armed forces. This relation addresses not only the dependency of the ACS on cyberspace and cybersecurity but also possibilities to enhance the cyber capabilities of the state to promote its national interests. The paper will focus on opportunities of the relation between ACS and cyberspace for capabilities of the NATO member states’ armed forces. The Main Capability Areas (MCA) analytical framework will be used to analyze these aspects. Orientation on Prepare; Project; Engage; Sustain; Consult, Command and Control; Protect; Inform areas will identify opportunities to develop the full spectrum of potential capabilities and highlight main aspects of the transformation of the armed forces.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gettinger, D.: Drone Databook Update: March 2020. Center for the Study of the Drone at Bard College (2020). https://dronecenter.bard.edu/projects/drone-proliferation/drone-databook-update-march-2020/

  2. Hodicky, J., Prochazka, D.: Challenges in the implementation of autonomous systems into the battlefield. In: 6th International Conference on Military Technologies, ICMT 2017, Brno, pp. 743–744 (2017)

    Google Scholar 

  3. Stojar, R., Frank, L.: Changes in armed forces and their significance for the regular armed forces. In: The 18th International Conference. The Knowledge-Based Organization: Conference Proceedings 1 - Management and Military Sciences, vol. 1, pp. 142–145 (2012)

    Google Scholar 

  4. NATO: Strategic Foresight Analysis Report (2017)

    Google Scholar 

  5. Shieber, J.: Telegram faces DDoS attack in China…again (2019). https://tcrn.ch/2ZJgfbc

  6. Karl, A.: Blockchain Technology for Cloud Storage: This Looks Like Future. Tech Genix (2018). https://1url.cz/yM4zC

  7. Kelly, J.: Top Banks and R3 Build Blockchain-Based Payments System. Reuters (2017). https://1url.cz/vM4zs

  8. Sui, D., Caverlee, J., Rudesill, D.: The Deep Web and Darknet: A Look Inside the Internet’s Massive Black Box. Wilson Center (2015). https://www.wilsoncenter.org/sites/default/files/media/documents/publication/deep_web_report_october_2015.pdf

  9. Wakefield, J.: Russia ‘successfully tests’ its unplugged internet. BBC (2019). https://bbc.in/2X7vyst

  10. Wyciślik-Wilson, M.: It is getting harder than ever for VPNs to break through the Great Firewall of China. Beta News (2019). https://bit.ly/3gr4v32

  11. Russell, J.: IBM Quantum Update: Q System One Launch, New Collaborators, and QC Center Plans. HPC wire (2019). https://1url.cz/kM4K2

  12. Swayne, M.: Four Ways Quantum Computing Will Change Artificial Intelligence Forever. The Quantum Daily (2020). https://thequantumdaily.com/2020/01/23/four-ways-quantum-computing-will-change-artificial-intelligence-forever/

  13. Hodicky, J.: Modelling and simulation in the autonomous systems’ domain – current status and way ahead. In: Hodicky, J. (ed.) MESAS 2015. LNCS, vol. 9055, pp. 17–23. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-22383-4_2

    Chapter  Google Scholar 

  14. Scharre, P.: Autonomy, “Killer Robots,” and human control in the use of force – Part I. Just Security 7(1) (2014). https://www.justsecurity.org/12708/autonomy-killer-robots-human-control-force-part/

  15. Stojar, R.: Bezpilotní prostředky a problematika jejich nasazení v soudobých konfliktech (The Unmanned Aerial Vehicles and Issues Connected with Their Use in Contemporary Conflicts). Obrana a strategie 16(2), 5–18 (2016)

    Article  Google Scholar 

  16. Fučík, J., Frank, L., Stojar, R.: Legality and legitimacy of the autonomous weapon systems. In: Mazal, J., Fagiolini, A., Vasik, P. (eds.) MESAS 2019. LNCS, vol. 11995, pp. 409–416. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43890-6_33

    Chapter  Google Scholar 

  17. Autonomous Weapons: An Open Letter from AI & Robotics Researchers (2017). https://goo.gl/X2N6CA

  18. Gill, A.S.: The role of the united nations in addressing emerging technologies in the area of lethal autonomous weapons systems. UN Chronicle 50(3&4), 15–17 (2018). https://1url.cz/3zZjq

  19. Army-Technology.Com: AvantGuard Unmanned Ground Combat Vehicle, Israel (2016). https://goo.gl/knZqWb

  20. Raytheon: Phalanx Close-in Weapon System: Last Line of Defense for Air, Land and Sea (n.d.). https://goo.gl/Ky3RD1

  21. Gray, C.S.: Strategy for Chaos - Revolution in Military Affairs and the Evidence of History. Frank Cass, London (2005)

    Google Scholar 

  22. Cooper, J.R.: Another View of the Revolution in Military Affairs. Strategic Studies Institute (1994). https://ssi.armywarcollege.edu/another-view-of-the-revolution-in-military-affairs/

  23. Worcester, M.: Autonomous Warfare – A Revolution in Military Affairs. ISPSW, Berlin (2015). https://www.files.ethz.ch/isn/190160/340_Worcester.pdf

  24. Owens, W.A., Offley, E.: Lifting the Fog of War. Farrar Straus Giroux, New York (2000)

    Google Scholar 

  25. Alberts, D.S., Gartska, J.J., Stein, F.P.: Network Centric Warfare: Developing and Leveraging Information Superiority. CCRP, Washington D.C. (1999)

    Google Scholar 

  26. NATO: MC 400/3, MC Guidance for Military Implementation of Alliance Strategy (2012)

    Google Scholar 

  27. NATO: C3 Taxonomy Baseline 3.1 (2019)

    Google Scholar 

  28. Choi, S., et al.: Neural 3D holography: learning accurate wave propagation models for 3D holographic virtual and augmented reality displays. ACM Trans. Graph. 40(6) (2021). https://www.computationalimaging.org/wp-content/uploads/2021/08/NeuralHolography3D.pdf

  29. Ciancaglini, V., et al.: Malicious Uses and Abuses of Artificial Intelligence, p. 35 (2020). https://documents.trendmicro.com/assets/white_papers/wp-malicious-uses-and-abuses-of-artificial-intelligence.pdf

  30. Lyu, S.: Deepfakes and the New AI-Generated Fake Media Creation-Detection Arms Race. Scientific American (2020). https://www.scientificamerican.com/article/detecting-deepfakes1/

  31. Hodicky, J., Prochazka, D.: Modelling and simulation paradigms to support autonomous system operationalization. In: Mazal, J., Fagiolini, A., Vasik, P. (eds.) MESAS 2019. LNCS, vol. 11995, pp. 361–371. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43890-6_29

    Chapter  Google Scholar 

  32. Pandey, S.: Opportunities to use artificial intelligence in Army logistics (2019). https://www.army.mil/article/216389/opportunities_to_use_artificial_intelligence_in_army_logistics

  33. Divišová, V., et al.: “The whole is greater than the sum of the parts” towards developing a multidimensional concept of armed forces’ resilience towards hybrid interference. Obrana Strat. 21(1), 8–15 (2021). https://doi.org/10.3849/1802-7199.21.2021.02.003-020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jakub Fučík .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fučík, J., Frank, L., Stojar, R. (2022). Autonomous Systems and Cyberspace: Opportunities for the Armed Forces. In: Mazal, J., et al. Modelling and Simulation for Autonomous Systems. MESAS 2021. Lecture Notes in Computer Science, vol 13207. Springer, Cham. https://doi.org/10.1007/978-3-030-98260-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-98260-7_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-98259-1

  • Online ISBN: 978-3-030-98260-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics