Armas inteligentes no ciberespaço: oportunidades inovadoras e desafios prementes

Ana Carolina de Oliveira Assis, Nathalia Viviani Bittencourt, Sandra Maria Becker Tavares

Resumo


A característica disruptiva e inovadora da Inteligência Artificial (IA) tem provo- cado uma miríade de benefícios e especulações em múltiplos setores da sociedade, em especial no militar. O presente artigo busca trazer à tona o debate das opor- tunidades e desafios que a IA pode promover em relação a ataques e à segurança no espaço cibernético. Com efeito, argumenta-se que essa nova modalidade de capacidade cibernética possui a característica de faca de dois gumes: se, por um la- do, o processamento rápido de grande volume de dados e o reconhecimento de pa- drões pela programação computacional podem ser grandes aliados na antecipação e combate de ameaças a redes, por outro, novas vulnerabilidades exigem cautela em sua operacionalização. Em termos metodológicos, foi realizada revisão biblio- gráfica e documental de abordagens sobre a interseção da inteligência artificial no ramo da segurança e defesa cibernética. Além disso, nosso arcabouço teórico debruça-se sobre alguns conceitos das Relações Internacionais, em especial o da Teoria da Balança Ofensiva-Defensiva Cibernética para elucidar como as capaci- dades dessa tecnologia podem influenciar na dissuasão e favorecimento da defesa em detrimento da primazia do ataque.


Palavras-chave


Ciberataque; Defesa Cibernética; Vulnerabilidade Cibernética; Inteligência Artificial

Texto completo:

PDF

Referências


Babuta, Alexander, Marion Oswald, and Ardi Janjeva. 2020. “Artificial Intelligence and UK National Security”. RUSI Occasional Paper. Royal United Services Institute.

Bastian, Nathaniel D., and Matthew Easley. 2018. “Artificial Intelligence in Cyber Security”. Filmed 2018 at CyCON US, Army Cyber Institute. Vídeo, 1:14:22. ht- tps://www.youtube.com/watch?v=YEejuT2s5QQ&t=2582s

Battaglia, Rafael. 2020. “Afinal, o que são deepfakes?”. Revista Superinteressante. ht- tps://super.abril.com.br/tecnologia/afinal-o-que-sao-deepfakes/.

Boulanin, Vincent, Lora Saalman, Petr Topychkanov, Fei Su, and Moa Carlsson. 2019. Artificial Intelligence, Strategic Stability and Nuclear Risk. Solna: SIPRI Publications.

Boulanin, Vincent, and Maaike Verbruggen. 2017. Mapping the Development of Autonomy in Weapon Systems. Solna: SIPRI Publications.

Boulanin, Vincent, Neil Davison, Netta Goussac, and Moa Carlsson. 2020. Limits on Autonomy in Weapon Systems: Identifying Practical Elements of Human Control. Solna: SIPRI Publications.

Brasil. Ministério da Ciência, Tecnologia e Inovações. 2019. “Estratégia Brasileira de Inteligência Artificial”. www.mctic.gov.br/mctic/opencms/inovacao/paginas/ politicasDigitais/Inteligencia/Artificial.html.

_____. 2020. “Decreto nº 10.222, de 5 de fevereiro de 2020”. Diário Oficial da União (DOU). http://www.in.gov.br/web/dou.

Brundage, Miles, et al. 2018. The Malicious Use February 2018 of Artificial Intelligence: Forecasting, Prevention, and Mitigation. https://maliciousaireport.com/.

Buchanan, Ben. 2017. The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. New York: Oxford University Press.

Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner.

Cavelty, Myriam Dunn. 2008. Cyber-Security and Threat Politics: US Efforts to Secure the Information Age. London: Routledge.

_____. 2012. “The Militarization of Cyber Security as a Source of Global Tension”. Cyber Security 22: 103–24.

Coady, C.A.J. 2012. The Jus Post Bellum. In New wars and new soldiers: military ethics in the contemporary world, edited by P. Tripodi, and J. Wolfendale. Farnham: Ashgate

Ferdinando, Lisa. 2018. “Cybercom to Elevate to Combatant Command”.

U.S. Department of Defense. www.defense.gov/Explore/News/Article/ Article/1511959/cybercom-to-elevate-to-combatant-command/.

Future of Life Institute. 2020. “National and International AI Strategies”. Future of Life Institute Organization. https://futureoflife.org/national-international-ai-s- trategies/.

Garfinkel, Ben, and Allan Dafoe. 2019. “How does the offense-defense balance scale?”. Journal Of Strategic Studies 42, no. 6: 736–63. http://dx.doi.org/10.1080

/01402390.2019.1631810.

Glaser, Charles L., and Chaim Kaufmann. 1998. “What is the Offense-Defense Balance, and Can We Measure it?”. International Security 22, no. 4: 44–82.

Hansen, Lene, and Helen Nissenbaum. 2009. “Digital Disaster, Cyber Security, and the Copenhagen School”. International Studies Quarterly 53, no. 4: 1155–75.

Jervis, Robert. 1978. “Cooperation under the Security Dilemma”. World Politics 30, no. 2: 167–214.

Johnson, James. 2019. “The AI-Cyber Nexus: Implications for Military Escalation, Deterrence and Strategic Stability”. Journal of Cyber Policy 4, no. 3: 442–60.

Kania, Elsa B. 2019. “Chinese Military Innovation in the AI Revolution”. The RUSI Journal 164, no. 5–6: 26–34.

Kania, Elza, Dahlia Peterson, Lorand Laskai, and Graham Webster. 2019. “Translation: Key Chinese Think Tank’s ‘AI Security White Paper’ (Excerpts)”. New America. http://newamerica.org/cybersecurity-initiative/digichina/blog/ translation-key-chinese-think-tanks-ai-security-white-paper-excerpts/.

Kello, Lucas. 2013. “The Meaning of Cyber Revolution. Perils to Theory and StateCraft”. International Security 38, no. 2: 7–40.

Krepinevich, Andrew. 1994. “Cavalry to Computer: The Pattern of Military Revolutions”. National Interest 37: 29–40. https://nationalinterest.org/article/ca- valry-to-computer-the-pattern-of-military-revolutions-848?page=0%2C2.

Kuehl, Dan. 2009. “From Cyberspace to Cyberpower: Defining the Problem”. In: Cyberpower and National Security, edited by Franklin D. Kramer, Stuart H. Starr, and Larry Wentz: 24–42. Washington D.C.: National Defense University Press.

Lacy, Mark, and Daniel Prince. 2018. “Securitization and the global politics of cybersecurity”. Global Discurse 8, no. 1: 101–15.

Libicki, Martin C. 2009. Cyberdeterrence and Cyberwar. Santa Monica, CA: RAND

Liff, Adam. 2012. “Cyberwar: A New ‘Absolute Weapon’? The Proliferation of Cyberwarfare Capabilities and Interstate War”. Journal of Strategic Studies 35, no. 3: 401–28.

Liivoja, Rain, Maarja Naagel, and Ann Väljataga. 2019. “Autonomous Cyber Capabilities Under International Law”. NATO CCDCOE Publications. https:// ccdcoe.org/library/publications/autonomous-cyber-capabilities-under-interna- tional-law/

Lin, Herbert. 2016. “Governance of Information Technology and Cyber Weapons”. Governance of Dual-Use Technologies: Theory and Practice, edited by Elisa D. Harris: 112–58. American Academy of Arts & Sciences.

Lynn, William J. 2010. “Defending a New Domain: The Pentagon’s Cyberstrategy”.

Foreign Affairs 89, no. 5: 97–108.

Maness, Ryan C., and Brandon Valeriano. 2016. “The Impact of Cyber Conflict on International Interactions”. Armed Forces & Society 42, no. 2: 301–23.

Medeiros, Breno P., Alessandra C. Carvalho, and Luiz R. F. Goldoni. 2019. “Uma análise sobre o processo de securitização do ciberespaço”. Coleção Meira Mattos 13, no. 46: 45–66.

Morgan, Forrest E., Benjamin Boudreaux, Andrew J. Lohn, Mark Ashby, Christian Curriden, Kelly Klima, and Derek Grossman. 2020. Military Applications of Artificial Intelligence: Ethical Concerns in an Uncertain World. Santa Monica: Rand Corporation.

Muggah, Robert, Misha Glenn, and Gustavo Diniz. 2014. “Securitização da ciber- segurança no Brasil”. Cadernos Adenauer 15, no. 4: 69–109.

Nye, Joseph S. 2010. Cyber Power. Cambrige: Belfer Center for Science and International Affairs.

_____. 2017. “Deterrence and Dissuasion in Cyberspace”. International Security 41, no. 3: 44–71.

Rid, Thomas. 2012. “Cyber War Will Not Take Place”. Journal of Strategic Studies

, no. 1: 5–31.

Schneider, Jacquelyn. 2019. “The Capability/Vulnerability Paradox and Military Revolutions: Implications for Computing, Cyber, and the Onset of War”. Journal of Strategic Studies 42, no. 6: 841–63.

Schneier, Bruce. 2018. “Artificial Intelligence and the Attack/Defense Balance”. IEEE Security & Privacy 16, no. 2: 96-96. Institute of Electrical and Electronics Engineers (IEEE).

Shires, James, and Max Smeets. 2017. Contesting “Cyber”. Washington: New America.

Slayton, Rebecca. 2017. “What is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment”. International Security 41, no. 3: 72–109.

Stone, John. 2013. “Cyber War Will Take Place!”. Journal of Strategic Studies 36, no. 1: 101–8.

Taddeo, Mariarosaria. 2018, “How to Deter in Cyberspace”. The European Centre of Excellence for Countering Hybrid Threats 6: 1–10.

Taddeo, Mariarosaria, Tom Mcctcheon, and Luciano Floridi. 2019. “Trusting artificial intelligence in cybersecurity is a double-edged sword”. Nature Machine Intelligence 1, no. 12: 557–60.

Teixeira Júnior, Augusto, Gills Villar-Lopes, and Marco T. Freitas. 2017. “As três tendências da guerra cibernética: novo domínio, arma combinada e arma estraté- gica”. Revista Carta Internacional 12, no. 3: 30–53.

Thornton, Rod, and Marina Miron. 2020. “Towards the ‘Third Revolution in Military Affairs’: The Russian Military’s Use of AI-Enabled Cyber Warfare”. The RUSI Journal: 1–10 (Maio).

Turing, A. 1950. “Computing Machinery and Intelligence”. Mind, New Series 59, no. 236: 433–60.

Wæver, Ole. 1995. “Securitization and Desecuritization”. In On Security, edited by Ronnie Lipschutz. New York: Columbia University Press.

Wæver, Ole, Barry Buzan, Morten Kelstrup, and Pierre Lemaitre. 1993. Identity, Migration and the New Security Agenda in Europe. London: Pinter.

Whyte, Christopher. 2020. “Problems of Poison: New Paradigms and ‘Agreed’ Competition in the Era of AI-Enabled”. 12th International Conference on Cyber Conflict. NATO CCDCOE Publications.




DOI: https://doi.org/10.26792/rbed.v7n2.2020.75211

Apontamentos

  • Não há apontamentos.


INDEXADORES