Machine learning may provide cyber attackers with the means to execute more effective and more destructive attacks against industrial control systems. As new ML tools are developed, CSET discusses the ways in which attackers may deploy these tools and the most effective avenues for industrial system defenders to respond.
The resizing of images, which is typically a required part of preprocessing for computer vision systems, is vulnerable to attack. Images can be created such that the image is completely different at machine-vision scales than at other scales and the default settings for some common computer vision and machine learning systems are vulnerable.
One sentence summarizes the complexities of modern artificial intelligence: Machine learning systems use computing power to execute algorithms that learn from data. This AI triad of computing power, algorithms, and data offers a framework for decision-making in national security policy.
AI competition among nations comes down to a technical triad: data, algorithms and computing power. While the first two elements receive an enormous amount of policy attention, compute is often overlooked. CSET's Ben Buchanan explores its potential in Foreign Affairs.
The rise of deepfakes could enhance the effectiveness of disinformation efforts by states, political parties and adversarial actors. How rapidly is this technology advancing, and who in reality might adopt it for malicious ends? This report offers a comprehensive deepfake threat assessment grounded in the latest machine learning research on generative models.
AI will alter the nature of cybersecurity in unanticipated ways. CSET's CyberAI Director, Ben Buchanan, wrote a research agenda for understanding these changes, including “how AI & machine learning can be used to detect malicious code.”
"Does machine learning get offensive actors anything they don't already have?" asks Ben Buchanan, Director of CSET's CyberAI program. He joined the CyberLaw podcast to discuss the impacts of AI on offensive and defensive cyber operations.
Geographical, the magazine of the Royal Geographical Society, reviews CSET Senior Faculty Fellow Ben Buchanan's latest book, which highlights the landscape of subtle but persistent cyber attacks that are changing statecraft.
CSET's CyberAI project released an issue brief, "A National Security Research Agenda for Cybersecurity and Artificial Intelligence," to chart the path for national security policymakers in cybersecurity and AI.
"Technology is fundamental to cyber operations on offense and defense," said CSET's Ben Buchanan on the question of AI and cybersecurity. "The reason why AI is important is that there’s just so much data that you need a machine to be able to do the first pass through the data [during offensive and defensive operations]."
This website uses cookies.
To learn more, please review this policy. By continuing to browse the site, you agree to these terms.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.