Image courtesy of MichaelWuensch/Pixabay
This article was originally published by the S. Rajaratnam School of International Studies (RSIS) on 30 April 2018.
Given their transaction anonymity and user-friendliness, cryptocurrencies appeal to extremist groups as they offer a viable alternative to the mainstream financial system and fiat money which are perceived as ‘kafir’ (infidel) currencies. The threat of cyber-driven terrorist financing is expected to grow.
This graphic maps the various landing stations of submarine cables in both the US and China. To find out about cybersecurity in Sino-American relations, see Marie Baezner’s recent addition to the CSS’ Analyses in Security Policy series here. For more CSS charts and graphs on defense policy, click here.
This article was originally published in Volume 2, Issue 2 of Age of Robots magazine on 6 March 2018.
IBM’s Deep Blue was a chess-playing computer that achieved remarkable success in 1997 when it defeated the world champion Gary Kasparov in 19 moves. Kasparov had never lost a match to a human in under 20 moves. He managed to beat Deep Blue in the next games but was again defeated the following year after Deep Blue received an upgrade—and the unofficial nickname “Deeper Blue”. This was a landmark moment in artificial intelligence, but at no point was the genius chess machine deemed worthy of “rights”. Although theoretically able to visualize 200 million chess positions per second, Deep Blue had limited general abilities and could not work on other tasks beyond what it was programmed to do—such as playing chess, in this case.
This article was originally published by the Council on Foreign Relations (CFR) on 23 February 2018.
Without increased cooperation, the global digital economy is vulnerable to catastrophic cyberattack.
Information and communications technology (ICT) presents one of the most critical modern challenges to global security. Threat assessments predict that the next major international crisis could be due to a state or terrorist group weaponizing ICTs to devastate critical infrastructure or military logistics networks. The proliferation of asymmetric warfare (i.e., conflicts between nations or groups that have disparate military capabilities) has increased states’ use of ICTs, which necessitates the development of an international code of cyber conduct.