AI Accelerates State Cybersecurity Threats
Cyber Operations Evolve with AI Enablement
Cyber operations have become a cornerstone of state power, embedded in national security strategies and defense planning.
State Cyber Programs Undergo Significant Changes
Over the past three years, state cyber programs have undergone significant changes, driven by the integration of cyber with other instruments of power and the increasing use of automation and artificial intelligence (AI)-enabled tooling.
- This has led to a shift towards more persistent and scalable operations, making it challenging for defenders to keep pace.
- The North Korean cyber program has emerged as a key player, with its operations now functioning as a sanctions-evasion mechanism.
- The country’s cyber activities have blurred the lines between espionage, warfare, and organized crime, with cryptocurrency theft, supply-chain compromise, and illicit IT worker schemes directly funding state priorities.
Policymakers Reach for Traditional Tools
In response to high-profile incidents such as SolarWinds, Colonial Pipeline, and Exchange, policymakers have reached for traditional tools like sanctions and indictments.
However, these measures are insufficient to address the evolving threat landscape.
A New Approach to Deterrence
A conditional economic pressure and state accountability for ransomware havens are crucial components of this approach.
Designating state sponsors of cybercrime, similar to state sponsors of terrorism, could help draw attention to these safe havens and open up new avenues of accountability, prompting states to exercise necessary due diligence.
NATO’s Article 5 Ambiguity
NATO’s Article 5 ambiguity surrounding cyber operations remains a topic of debate, with some viewing it as an asset and others seeing it as a liability.
To mitigate this risk, strengthening collective resilience, attribution, and response coordination is essential.
Redesigning Cyber Policy Coordination
Prioritizing standing, operational cyber coordination mechanisms that connect governments and trusted private-sector operators before crises occur is vital.
Trust is the biggest obstacle to achieving this goal, with legal, cultural, and political hurdles hindering the sharing of sensitive information across borders and sectors.