The Internet of Military Things & Machine Intelligence: A Winning Edge or Security Nightmare?
Army finds itself at the dawn of the Fourth Industrial Revolution (4IR) where rapid technological advancements seem to be revealed on a regular basis. 4IR is comprised of new technologies, including but not limited to, machine intelligence, robotics and autonomous systems. However a central feature of 4IR is emergence of the Internet of Things (IoT), which is essentially a global network of objects connected via the internet. Initially intended to link everyday household items to the internet for control and monitoring purposes (ie smart homes), the IoT is now connecting digital devices at an exponential rate. The Internet of Industrial Things (IIoT) has also arrived for purposes such as, transport management, robotic manufacturing control or via autonomous mining operations orchestrated from distant locations. The IoT continues to evolve with new applications, such as the Internet of Space Things and the Internet of Nano Things.
With enhanced connectivity comes greater utility and disruption of traditional industries, such as Tesla’s networked power walls and autonomous electric vehicles impacting the car and energy industry. However, every smart device that fuses with the network could potentially be controlled by malicious software, thereby creating another point of access to exploit or disrupt that network. So with more IoT digital portals opening across the globe, the massive growth of network active devices may generate both a growing security risk and network latency challenge. What then of the digitisation concept currently being implemented across Army via LAND 200? This process could also be considered as development of an Internet of Military Things (IoMT), which is akin to everyday objects IoT interface, but replicated within the boundaries of a military environment. The IoMT might also be considered as a Local Area Network within the IoT Global Area Network. So considering IoMT in this network configuration may initially be useful in designing robust safeguards in context of global digitisation threats.
So what is the big deal in terms of cyber security? Can’t Army just rely on proxy server chains, multiple fire walls, security patches and sophisticated encryption to protect its data integrity? Yes it can, but extant network protection technologies could conceivably be bypassed in the future due to ongoing advancements in software engineering, quantum computing and machine intelligence now passing ‘Turing’s Test’. Hacking and cyber espionage has also become a popular tactic due to potentially high pay-off results and plausible deniability benefits. In fact cyber probing has now become so easy that even small nations with limited resources are doing it. The risk now is that cyber threat actors are successfully merging machine intelligence with hacking methodologies, which (worst case with quantum speed processing) might realise undetectable network infiltrations via IoMT and IoT interfaces. Own force autonomous drones could also be hijacked and used offensively against Army with disastrous consequences. Therefore, the implications of machine learning enabled hacking on the effective conduct of future military operations are significant and manifest as a potential security nightmare.
So how does Army respond to emerging cyber security threats? One school of thought is to assume our networks are already compromised and we have no reliable way of knowing for certain. Alternatively, we may still have time to prepare for covert machine intelligence optimised cyber intrusions. With more time, options such as air gapping sensitive data could reduce the risk of IoMT inadvertently providing digital corridors for machine intelligence attacks. Counter-machine intelligence as a variant of software defined security might also be considered. This includes secure machine intelligence software to provide advice to ADF commanders, including probabilities of tactical event outcomes ie a Combat Watson. Moreover, new cyber deception techniques could be developed; the recent 'fake news' misinformation scandal is instructive in that regard. Thus fake data stored or deliberately leaked from a taxonomy of dummy networks might disrupt threat machine intelligence data analytics. It’s worth noting that dummy radio networks helped the Allies confuse German forces prior to the D-Day landings in 1944, so a similar concept might work for cyberspace threat mitigation.
In summary, the 4IR digital renaissance will bring a wide range of technology opportunities for Army modernisation. However, 4IR may also realise threats to the enterprise due to a proliferation of connected digital objects and IoMT interfaces. The concept of Turing-like machine intelligence hacking with super fast quantum computing, once science fiction, is now an evolving threat poised to transform the security landscape. So efforts to develop a counter-machine intelligence digital resilience strategy may ensure Army can continue to effectively prepare for land combat and maintain a winning edge.
 Machine intelligence is comprised of algorithms that perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making and language translation. Machine learning develops programs that can teach themselves to learn, understand and act (ie become more intelligent and increasingly more capable).
 For example: Household alarm systems, climate control panels, watering systems, televisions and home desktop computers.
 There are almost 5 billion internet connected devices being used today, and according to Gartner Research, that number is expected to grow by 500% in the next 5 years. http://internetofthingsrecruiting.com/how-secure-are-home-iot-devices/
 https://futurism.com/china-develops-a-quantum-computer-that-could-eclipse-all-others/ Accelerated computer processing power.
 The Turing test, developed by Alan Turing in 1950, is a test of a machine’s ability to exhibit intelligent behaviour equivalent to, or indistinguishable from, that of a human (Wikipedia). https://www.google.com.au/amp/s/amp.theguardian.com/technology/2014/jun/09/what-is-the-alan-turing-test
 https://hbr.org/2016/01/your-algorithms-are-not-safe-from-hackers hacking methods combined with machine learning may realise rapid code breaking ‘Turing-like’ results and data security breaches that facilitate taking control of network devices or autonomous systems.
 ADF members’ personnel data could be accessed and dossiers on senior commanders developed over many years by foreign intelligence. Voice recognition during field exercise radio transmissions, monitoring an individual’s performance during virtual simulations or papers they wrote during officer training could generate a detailed picture of how that member might operate in a combat situation. This data could be ‘sold’ or freely provided to adversary intelligence services during or prior to a conflict.
 A friendly remote surveillance drone might have its downlink data modified to present false images following a machine intelligence cyber attack. The drone might also be used to collide with and destroy another friendly drone kamikaze style. ADF drones equipped with missiles could be ‘compelled’ to use those weapons against ADF force elements realising a form of forced autonomous fratricide. https://www.google.com.au/amp/thehackernews.com/2016/10/how-to-hack-drone.html%3Famp%3D1
 http://www.cnbc.com/2017/04/17/darktrace-on-why-artificial-intelligence-is-key-in-cybersecurity.html A recent cyber security report showed it took organisations an average of 99 days to realise their digital security protocols had been breached.
 https://en.m.wikipedia.org/wiki/Operation_Bodyguard This was underpinned by Alan Turing cracking the ‘Enigma Code’.
 This includes Army’s joint warfighting contribution in contested domains via the conduct of joint land combat.
The views expressed in this article and subsequent comments are those of the author(s) and do not necessarily reflect the official policy or position of the Australian Army, the Department of Defence or the Australian Government.
Using the Contribute page you can either submit an article in response to this or register/login to make comments.