Abstract
This chapter addresses several of the principal ethical challenges confronting current and proposed new uses of artificial intelligence (AI) undertaken to enhance cybersecurity and conflict operations. Current uses of modular AI—namely AI tailored for specific tasks and involving closely-supervised machine learning—already pervade both defensive and offensive cyber operations with varying degrees of efficiency and success. Representative samples of these are illustrated and discussed, highlighting some of the moral challenges accompanying each. The chapter then concludes with proposed uses of general AI, including deep learning enabling expanded autonomy, along with the attendant risks and prospective moral dilemmas arising from such uses within the cyber domain. Our specific focus will be the impact, both favorable and unfavorable, on the character and capacities of the individuals and teams of professional experts who will constitute the end-users of AI-enhanced cybersecurity measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Akram, A., Lowe-Power, J.: The Tribes of Machine Learning and the Realm of Computer Architecture (2020). arXiv
Apruzzese, G., Colajanni, M., Ferretti, L., Guido, A., Marchetti, M.: On the effectiveness of machine and deep learning for cyber security. In: 10th International Conference on Cyber Conflict (CyCon), Tallinn, pp. 371–390 (2018). https://doi.org/10.23919/CYCON.2018.8405026
Ayoub, K., Payne, K.: Strategy in the age of artificial intelligence. J. Strategic Stud. 39(5–6), 793–819 (2016)
Baker, J.: Counterintelligence Implications of Artificial Intelligence—Part III (2018). https://www.lawfareblog.com/counterintelligence-implications-artificial-intelligence-part-iii. Cited by 8 May 2021
Berman, D.S., Buczak, A.L., Chavis, J.S., Corbett, C.L.: A survey of deep learning methods for cyber security. Information 10(4), 122 (2019). https://doi.org/10.3390/info10040122
Buchanan, B.: The Hacker and the State. Harvard University Press, Cambridge, MA (2020). https://doi.org/10.4159/9780674246010-004
Comiter, M.: Attacking Artificial Intelligence-AI’s Security Vulnerability and What Policymakers Can Do About It. Belfer Center for Science and International Affairs (2019). https://www.belfercenter.org/publication/AttackingAI. Cited 3 May 2021
Council on Foreign Relations: Ctrl + Shift + Delete: The GDPR’s Influence on National Security Posture. Net Politics (2019). https://www.cfr.org/blog/gdpr-influence-national-security-posture
Crootof, R.: War Torts: Accountability for Autonomous Weapons. 164 University of Pennsylvania Law Review 1347 (2016)
ENISA ad hoc Working Group on Artificial Intelligence: AI CYBERSECURITY CHALLENGES-Threat Landscape for Artificial Intelligence (2020). https://www.enisa.europa.eu/publications/artificial-intelligence-cybersecurity-challenges
EU High-Level Expert Group on Artificial Intelligence: A Definition of AI: Main Capabilities and Disciplines (2019). https://ec.europa.eu/digital-single-market/en/news/definition-artificial-intelligence-main-capabilities-and-scientific-disciplines
European Commission: General Data Protection Regulation (GDPR) (2018)
Gilli, A., Gilli, M., Leonard, A.S., Stanley-Lockman, Z.: ”NATO-Mation”: Strategies for Leading in the Age of Artificial Intelligence. NDC Research Paper 15 in NATO Defense College ”NDC Research Papers Series” (2020)
Global partnership of artificial intelligence (GPAI): Working group on responsible AI (2020). https://gpai.ai/projects/responsible-ai/. Cited by 26 May 2021
Harley, N.: North Korea behind WannaCry attack which crippled the NHS after stealing US cyber weapons, Microsoft chief claims. The Telegraph (2017). Cited 3 May 2021
Hartmann, K., Steup, C.: Hacking the AI-the next generation of hijacked systems. In: 12th International Conference on Cyber Conflict (CyCon), Estonia, pp. 327–349 (2020). https://doi.org/10.23919/CyCon49761.2020.9131724
Human Rights Watch (HRW): China: Big Data Fuels Crackdown in Minority Region (2018). https://www.hrw.org/news/2018/02/26/china-big-data-fuels-crackdown-minority-region. Cited 8 May 2021
Jackson, B.W.: Cybersecurity, Privacy, and artificial intelligence: an examination of legal issues surrounding the european union general data protection regulation and autonomous network defense. Minnesota J. Law Sci. Technol. 21(1), 169 (2020)
Jobin, A., Ienca, M., Vayena, E.: The global landscape of AI ethics guidelines. Nat. Mach. Intell. 1(9), 389–399 (2019). https://doi.org/10.1038/s42256-019-0088-2
Joint Artificial Intelligence Center (JAIC) (2018). https://www.ai.mil/about.html
Joint Artificial Intelligence Center (JAIC): Integrating AI and Cyber into the DoD (2019). https://www.ai.mil/blog.html. Cited 3 May 2021
Kaloudi, N., Li, J.: The AI-based cyber threat landscape: a survey. ACM Comput. Surv. 53(1) (2020). https://doi.org/10.1145/3372823
Kawamoto, D.: Will GDPR Rules Impact States and Localities? Government Technology (2018). https://www.govtech.com/data/Will-GDPR-Rules-Impact-States-and-Localities.html. Cited 3 May 2021
Kehler, C.R., Lin, H., Sulmeyer, M.: Rules of engagement for cyberspace operations: a view from the USA. J. Cybersecur. 3(1) (2017). https://doi.org/10.1093/cybsec/tyx003
Kittrie, O.F.: Lawfare. Oxford University Press, Oxford (2016)
Knight, W.: The Dark Secret at the Heart of AI (2017). https://www.technologyreview.com/2017/04/11/5113/the-dark-secret-at-the-heart-of-ai/. Cited by 8 May 2021
Kontzer, T.: What Does the Near Future of Cyber Security Look Like? A Roomful of RSAC Attendees Considered That, and Here Are the Takeaways. In: RSA Conference Blog (2019). https://www.rsaconference.com/library/blog/what-does-the-near-future-of-cyber-security-look-like-a-roomful-of-rsac-attendees. Cited 25 May 2021
Leveson, N.G.: Engineering a Safer World. MIT Press, Cambridge, MA (2011)
Lucas, G.: Ethics and Cyber Warfare: The Quest for Responsible Security in the Age of Digital Warfare. Oxford University Press, New York (2017)
MITRE: Verification and Validation, Systems Engineering Guide (2013). https://www.mitre.org/publications/systems-engineering-guide/se-lifecycle-building-blocks/test-and-evaluation/verification-and-validation
NATO: Allied Joint Doctrine for Cyberspace Operations AJP-3.20 (2020)
Nilsson, N.J.: The Quest for Artificial Intelligence. Cambridge University Press, Cambridge (2010)
Pattison, J.: From defence to offence: The ethics of private cybersecurity. Eur. J. Int. Secur. 5(2), 233–254 (2020). https://doi.org/10.1017/eis.2020.6
Phillips, P.J., Hahn, C.A., Fontana, P.C., Broniatowski, D.A., Przybock, M.A.: Four Principles of Explainable Artificial Intelligence, NISTIR 8312 (2020). https://doi.org/10.6028/NIST.IR.8312-draft
Pozen, D.E.: Transparency’s ideological drift. Yale Law J. 128, 100 (2018)
Ryan, M., Stahl, B.C.: Artificial intelligence ethics guidelines for developers and users: clarifying their content and normative implications. J. Inform. Commun. Ethics Soc. (2020). https://doi.org/10.1108/JICES-12-2019-0138/full/html
San Remo Manual on International Law Applicable to Armed Conflicts at Sea, 12 June 1994 (1994). https://ihl-databases.icrc.org/ihl/INTRO/560
Sanger, D.E., Perlroth, N., Barnes, J.E.: As Understanding of Russian Hacking Grows, So Does Alarm, New York Times. New York Times (2021). https://www.nytimes.com/2021/01/02/us/politics/russian-hacking-government.html. Cited by 26 May 2021
Schmitt, M.N. (ed.): Tallinn Manual 1.0-On the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)
Schmitt, M.N., Vihul, L. (eds.): Tallinn Manual 2.0—On the International Law Applicable to Cyber Operations, 2nd edn. Cambridge University Press, Cambridge (2017)
Truong, T.C., Diep, Q.B., Zelinka, I.: Artificial intelligence in the cyber domain: offense and defense. Symmetry 12(3), 410 (2020). https://doi.org/10.3390/sym12030410
Vaccaro, L., Sansonetti, G., Micarelli, A.: An empirical review of automated machine learning. Computers 10(1:11) (2021). https://doi.org/10.3390/computers10010011
Wolford, B.: What is GDPR, the EU’s new data protection law? GDPR.EU (2019). https://gdpr.eu/what-is-gdpr/. Cited 26 May 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Helkala, K., Cook, J., Lucas, G., Pasquale, F., Reichberg, G., Syse, H. (2023). AI in Cyber Operations: Ethical and Legal Considerations for End-Users. In: Sipola, T., Kokkonen, T., Karjalainen, M. (eds) Artificial Intelligence and Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-031-15030-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-15030-2_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15029-6
Online ISBN: 978-3-031-15030-2
eBook Packages: Computer ScienceComputer Science (R0)