AI and IoT Mapping and the Transition to an Interconnected Cyber Defence and Intelligence Capabilities
Downloads
This paper brings together authors from a diverse range of technical areas to discuss the evolving cyber threat landscape and how military forces, have transformed their capabilities to meet present-day operational challenges in cyberspace. The Internet of Things (IoT) is based on the premise that enough data can lead to new perspectives on processes and systems. With over 7 billion IoT devices connected today, experts expect that number to increase to 22 billion by 2025. They can be used to support decisions and new products and services, or they can lead to internal savings and new external revenue streams. Despite countless discussions and opinions on the definition of AI in its various facets, successful IoT implementation projects require major actors to play their part, but in conjunction with human experts to work with to make better decisions in cyberspace, improving the quality of human-machine team’s actions in asymmetric operations. The Defence domain already looking at ways to organize better human-machine teams, which promise to boost individual and team performance, reduce threats to humans, enable new operating concepts, and ultimately boost national power.
Downloads
Baber, C., Cook, K., Attfield, S., Blaha, L. M., Endert, A., & Franklin, L., 2018, A conceptual model for mixed-initiative sensemaking. ACM SIGCHI Sensemaking Workshop
Bainbridge, L., 1983, Ironies of automation. Automatica, 19(6), 775-779
Ben-Asher, N., Oltramari, A., Erbacher, R., & Gonzalez, C., 2015, Ontology-based Adaptive Systems of Cyber Defense. International Conference on Semantic Technology for Intelligence, Defense, and Security, 34-41
Blaha, L. M., 2018, Interactive OODA processes for operational joint human-machine intelligence. NATO IST-160 Specialist’s Meeting: Big Data and Military Decision Making. Bordeaux, France
Blaha, L. M., Fisher, C. R., Walsh, M. W., Veksler, B. Z., & Gunzelmann, G., 2016, Real-time fatigue monitoring with computational cognitive models. International Conference on Augmented Cognition, 299-310
Bognár E. K., 2018, Possibilities and security challenges of using IoT for military purposes, Hadmérnök (XIII) 1II (2018), https://www.researchgate.net/publica tion/33625 3176_Possibilities_and_security_challenges_of_using_IoT_for_militar y_purposes, accessed on April 30, 2021
GovTribe, 2017, "Internet of Battlefield Things (IoBT) Collaborative Research Alliance (CRA)". . April 5, 2017.
Davison, Neil, 2018, "Autonomous weapon systems under international humanitarian law", https://www.icrc.org/en/document/autonomous-weapon-systems-under-inter national -humanitarian-law, accessed on April 15, 2021
Dear, Keith, 2019, Artificial Intelligence and Decision-Making, RUSI Journal, 29 November 2019Emmitt, John, 2021, The Evolution of Automation Technologies, https://www.kaseya.com/blog/2021/02/16/the-evolution-of-automation-technologies/, accessed on April 15, 2021
Emmitt, John, 2021, The Evolution of Automation Technologies, https://www.kaseya.com/blog/2021/02/16/the-evolution-of-automation-technologi es/, accessed on April 14, 2021
Evans, J. B. & Stanovich, K. E. (2013). Dual-process theories of higher cognition: Advancing the debate. Perspectives on Psychological Science, 8, 223-241
Franklin, L., Pirrung, M., Blaha, L., Dowling, M., & Feng, M., 2017. Toward a visualization-supported workflow for cyber alert management using threat models and human-centered design. IEEE Symposium on Visualization for Cyber Security, 1-8
Freedberg Jr., Sydney J., 2017, “War without Fear: DepSecDef Work on How AI Changes Conflict,” Breaking Defense, May 31, 2017
Gutzwiller, R. S., Clegg, B. A., & Blitch, J. G., 2013, Part-task training in the context of automation: Current and future directions. American Journal of Psychology, 126(4), 417-432
Haimson, C., Paul, C. L., Nebesh, B., Joseph, S., & Rohrer, R., 2019, Do we need “teaming” to team with a Machine? HCI International Workshop on Human-Machine Teaming
Hancock, P., Mouloua, M., Gilson, R., Szalma, J., and Oron-Gilad, T., 2007, Provocation: Is the UAV Control Ratio the Right Question? Ergonomics in Design, 7, 30-31
Hoffman, F. G., 2017, Will War’s Nature Change in the Seventh Military Revolution?, Parameters 47(4) Winter 2017–18Kott, Alexander; Swami, Ananthram; West, Bruce (December 25, 2017). "The Internet of Battle Things". Computer. 49 (12): 70–75
Hutchins, E., Cloppert, M., and Amin, R., 2011, Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. International Conference on Information Warfare & Security, 113–125
Kaber, David B., 2018, A conceptual framework of autonomous and automated agents, Theoretical Issues in Ergonomics Science, 19(4), 406-430
Kott, Alexander; Swami, Ananthram; West, Bruce, 2017, "The Internet of Battle Things". Computer. 49 (12): 70–75, December 25, 2017
Lebiere, C., Jentsch, F., and Ososky, S., 2013, Cognitive models of decision-making processes for human-robot interaction. International Conference on Virtual, Augmented and Mixed Reality, 285-294
Liebermann, Oren, 2021, Lloyd Austin, Defense secretary lays out vision of future in first major speech, CNN Updated 0049 GMT (0849 HKT) May 1, 2021, https://edition.cnn.com/2021/04/30/politics/defense-secretary-lloyd-austin-speech /index.html, accessed on May 1, 2021
Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions), https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worl dwide/
Mallick, P. K., 2019, Is AI Changing the nature of War?, https://www.v ifindia.org/article/2019/ja nuary/18/is-artificial-intelligence-changing-the-nature-of-war , accessed on April 200, 2021
McFadden, C., 2018, A Brief History of Military Robots Including Autonomous Systems, https://interestingengineering.com/a-brief-history-of-military-robots-including-au tonomou s-systems, accessed on April 20, 2021
McMillan, Rob, “Definition: Threat Intelligence”, Technology Research, May 16, 2013, accessed April 29, 2021.
Parasuraman, R., Sheridan, T.B. and Wickens, C.D., 2000, A model for types and levels of human interaction with automation. IEEE Transactions on Systems, Man, and Cybernetics – Part A: Systems and Humans, 30(3), 286-297
Paul, Celeste Lyn, Leslie Blaha, Nathan Bos, Robert S. Gutzwiller, 2019, Opportunities and Challenges for Human-Machine Teaming in Cybersecurity Operations, Proceedings of the Human Factors and Ergonomics Society 2019 Annual, available at: https://www.rese archgate.net/publication/334836878_Opportunities _and_Challenges_for_Human-Machine_Teaming_in_Cybersecurity_Operations, accessed on April 15, 2021
Paul, C. L., 2014, Human-centered study of a Network Operations Center: Experience report and lessons learned. ACM CCS Workshop on Security Information Workers, 39-42
Pégulu, Marc, 2021, How the Internet of Things is Shifting the Digital Age, https:// www.rtinsights.com/how-the-internet-of-things-is-shifting-the-digital-age/, accessed on April 21, 2021
Pirolli, P. and Card, S., 1999, Information foraging, Psychological Review, 106(4), 643-6
Ryan, Mick, 2018, Human-Machine Teaming for Future Ground Forces, https://csbaon line.org/research/publications/human-machine-teaming-for-future-ground-forces, accessed on April 29, 2021
Scerbo, M. W., 1996, Theoretical perspectives on adaptive automation. In R. Parasuraman & M. Mouloua (Eds.), Automation and Human Performance: Theory and Applications. Mahwah, NJ: Erlbaum, 37-63
Sheridan, T. B., 2017, Comments on “Issues in human-automation interaction modeling: Presumptive aspects of frameworks of types and levels of automation” by David B. Kaber. Journal of Cognitive Engineering and Decision Making, 12(1), 25-28
Strauch, B., 2017, Ironies of automation: Still unresolved after all these years. IEEE Transactions on Human-Machine Systems, 48(5), 419-433
CRS Report R45178, Artificial Intelligence and National Security, by Daniel S. Hoadley and Nathan J. Lucas and Peter Singer; “Getting to Grips with Military Robots,” The Economist, January 25, 2018; and Aaron Mehta, “AI Makes Mattis Question Fundamental Beliefs About War,” C4ISRnet.com, February 17, 2018
Gartner Top Strategic Technology Trends for 2021, https://www.gartner.com/ smarterwithgartner/gartner-top-strategic-technology-tren ds- for- 2021/
Gartner Identifies the Top 10 Strategic Technology Trends for 2020, https://w ww.gartner.com/en/newsroom/press-releases/2019-10-21-gartner-identifies-the-top -10-stra tegic-technology-trends-for-2020)
Gartner Says AI Augmentation Will Create $2.9 Trillion of Business Value in 2021, https://www.gartner.com/newsroom/press-releases/2019-08-05-gartner-says-ai-au gmentation-will-create-2point9-trillion-of-business-value-in-2021.
Kaseya® is the leading provider of IT and security management solutions for managed service providers (MSPs) and small to medium sized businesses (SMBs), www.kaseya.com
Gartner Top Strategic Technology Trends for 2021, https://youtu. be/s3rlYWcwdDY
CTIPs: What is Cyber Threat Intelligence and how is it used? (https://www.crest-approved.org/wp-content/uploads/CREST-Cyber-Threat-Intellig ence.pdf, accessed on April 28, 2021
The Recorded Future Team, September 13, 2018, How Strategic Threat Intelligence Informs Better Security Decisions, https://www.recordedfuture.com/strategic-threat-intelligence/
The Recorded Future Team, September 19, 2018, How Tactical Threat Intelligence Helps Identify the Enemy, https://www.recordedfuture.com/tactical-threat-intelligence/
The Recorded Future Team, September 25, 2018, How Operational Threat Intelligence Blocks Attacks Before They Happen, https://www.recordedfuture.com/operational-threat-intelligence/
Artificial Intelligence Market Statistics: 2025, www://www.alliedmar ketresearch.com/arti ficial-intelligence-market
Ben Dickson, 2020, What is artificial narrow intelligence (Narrow AI)?, https://bdtechtalks.com/2020/04/09/what-is-narrow-artificial-intelligence-ani/#:~ :text=Narrow%20AI%20is%20the%20umbrella%20term%20that%20encompasses,that%20falls%20outside%20their%20problem%20space%2C%20they%20fail.
Ministry of Defence (MOD) UK, Global Strategic Trends—Out to 2045 (Shrivenham, UK: Development, Concepts and Doctrine Centre, June 30, 2014);
MOD UK, Future Operating Environment 2035 (Shrivenham, UK: Development, Concepts and Doctrine Centre [DCDC], December 14, 2015);
David T. Miller, Defense 2045: Assessing the Future Security Environment and Implications for Defense Policy Makers (Washington, DC: Center for Strategic and International Studies, November 2015);
Directorate of Future Land Warfare, Future Land Warfare Report (Canberra: Australian Army Headquarters, 2014);
Army General Staff, Future Land Operating Concept 2035: Integrated Land Missions (Wellington, NZ: Headquarters New Zealand Defence Force, 2017);
Vice Chief of Defence Force, Australia, Future Operating Environment 2035 (Canberra: Commonwealth of Australia, 2016);
Canadian Department of National Defence, Designing Canada’s Army of Tomorrow: A Land Operations 2021 Publication (Kingston, Canada: Directorate of Land Concepts and Designs, 2011)
Cybersecurity in the EU Common Security and Defence Policy (CSDP). Challenges and risks for the EU., 2017, European Parliamentary Research Service Scientific Foresight Unit (STOA) PE, ISBN 978-92-846-1058-7