{"id":130,"date":"2020-12-03T10:30:43","date_gmt":"2020-12-03T16:30:43","guid":{"rendered":"https:\/\/dda.ndus.edu\/ddreview\/?p=130"},"modified":"2023-04-18T16:22:50","modified_gmt":"2023-04-18T21:22:50","slug":"artificial-intelligence-cyberattacks-the-next-cold-war","status":"publish","type":"post","link":"https:\/\/dda.ndus.edu\/ddreview\/artificial-intelligence-cyberattacks-the-next-cold-war\/","title":{"rendered":"Artificial Intelligence, Cyberattacks &amp; the Next Cold War"},"content":{"rendered":"\n<p>It\u2019s easy to confuse the current geopolitical situation with the 1980s at the end of the Cold War, when tensions between the Soviet Union and the United States were highest. The Cold War began after World War II and ended with the dissolution of the Soviet Union in the early 1990s.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_1\" class=\"footnote_plugin_tooltip_text\">[1]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_1\" class=\"footnote_tooltip position\" >House, J.M.,<em>\u00a0A Military History of the Cold War, 1962\u20131991<\/em>, University of Oklahoma Press: Norman, OK, 2020.<\/span><\/span> During this period, the Soviets and her allies and the U.S. and our allies built advanced weaponry in anticipation of military conflict and even World War III.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_2\" class=\"footnote_plugin_tooltip_text\">[2]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_2\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> The weapon of choice then was nuclear missiles, while today it\u2019s software, whether it\u2019s used for attacking computer systems or targets in the real world.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_3\" class=\"footnote_plugin_tooltip_text\">[3]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_3\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span><\/p>\n\n\n\n<p>Russian rhetoric about the importance of artificial intelligence (AI) is picking up\u2014and with good reason. As AI software develops, it will be able to make decisions based on more data, more quickly than humans.<\/p>\n\n\n\n<p>The next major cyberattack could involve AI systems. At a 2017 cybersecurity conference, 62 industry professionals (out of 100 questioned) predicted that the first AI-enhanced cyberattack could come in 2018.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_4\" class=\"footnote_plugin_tooltip_text\">[4]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_4\" class=\"footnote_tooltip position\" >\u201cCylance Team Black Hat Attendees See AI as Double- Edged Sword,\u201d available online:\u00a0https:\/\/blogs.blackberry. com\/en\/2017\/08\/black-hat-attendees-see-ai-asdouble- edged-sword\u00a0(accessed on Jan 7,&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> The recent Solar Winds attack demonstrated the use of a commandeered automated delivery system, effectively attacking organizations\u2019 systems from behind their defensive perimeter.<\/p>\n\n\n\n<p>This doesn\u2019t mean robots will be marching down Main Street. Rather, AI will make existing cyberattack efforts\u2014such as identity theft, denial-of-service and password cracking\u2014more powerful and efficient. Larger attacks could turn off power, shut down hospitals and disable weapons systems.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_5\" class=\"footnote_plugin_tooltip_text\">[5]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_5\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/span><\/span> <\/p>\n\n\n\n<p>Interpreting human actions is still difficult for AIs, and humans don\u2019t trust AI systems<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_6\" class=\"footnote_plugin_tooltip_text\">[6]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_6\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/span><\/span> to make major decisions. Unlike movie portrayals, AI offensive and defensive capabilities won\u2019t soon enable computers to choose and attack targets on their own. People must still create AI systems and launch them at particular targets. Nevertheless, adding AI to today\u2019s cybercrime and cybersecurity world will escalate what is already a rapidly changing arms race between attackers and defenders.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_7\" class=\"footnote_plugin_tooltip_text\">[7]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_7\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/span><\/span> <\/p>\n\n\n\n<h1>Modern Cold War<\/h1>\n\n\n\n<p>As in the Cold War, each side fears its opponent gaining a technological advantage. In a recent meeting at the Strategic Missile Academy near Moscow, Russian President Vladmir Putin suggested that AI may enable Russia to rebalance the power shift<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_8\" class=\"footnote_plugin_tooltip_text\">[8]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_8\" class=\"footnote_tooltip position\" >\u201cBrains over bucks: Putin hints AI may be key to Russia beating US in defense despite budget gap,\u201d RT World News 2017.<\/span><\/span>created by the U.S. outspending Russia nearly 10-to-1 yearly on defense. Russia\u2019s state-sponsored RT media reported<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_9\" class=\"footnote_plugin_tooltip_text\">[9]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_9\" class=\"footnote_tooltip position\" >\u201cBrains over bucks: Putin hints AI may be key to Russia beating US in defense despite budget gap,\u201d RT World News 2017.<\/span><\/span> AI is \u201ckey to Russia beating [the] U.S. in defense.\u201d<\/p>\n\n\n\n<p>Putin has said AI is \u201cthe future, not only for Russia, but for all humankind.\u201d<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_10\" class=\"footnote_plugin_tooltip_text\">[10]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_10\" class=\"footnote_tooltip position\" >Meyer, D., \u201cVladimir Putin Says Whoever Leads in Artificial Intelligence Will Rule the World,\u201d available online:\u00a0https:\/\/&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> In September 2017, he told students that the nation that \u201cbecomes the leader in this sphere will become the ruler of the world.\u201d<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_11\" class=\"footnote_plugin_tooltip_text\">[11]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_11\" class=\"footnote_tooltip position\" >\u201c\u2018Whoever leads in AI will rule the world:\u2019 Putin to Russian children on Knowledge Day,\u201d available online:\u00a0<a href=\"https:\/\/www.%20rt.com\/news\/401731-ai-rule-world-putin\/\"><span class=\"footnote_url_wrap\">https:\/\/www.<\/span> rt.com\/news\/401731-ai-rule-world-putin\/<\/a>\u00a0(accessed on Jan 7, 2021).<\/span><\/span><a href=\"#one\"><sup> <\/sup><\/a>Putin isn\u2019t saying he\u2019ll hand over the nuclear launch codes to a computer; he\u2019s talking about many other uses for AI.<\/p>\n\n\n\n<p>This sounds remarkably like Cold War rhetoric, when Americans and the Soviets built up enough nuclear weapons to kill everyone on Earth many times over.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_12\" class=\"footnote_plugin_tooltip_text\">[12]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_12\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> This arms race led to the concept of mutual assured destruction (MAD). Instead of attacking, both sides stockpiled weapons and dueled indirectly via smaller armed conflicts and political disputes.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_13\" class=\"footnote_plugin_tooltip_text\">[13]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_13\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> <\/p>\n\n\n\n<p>Since then, both sides have decommissioned tens of thousands of nuclear weapons.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_14\" class=\"footnote_plugin_tooltip_text\">[14]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_14\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> However, tensions are growing again. Both countries have expelled the other\u2019s diplomats on multiple occasions. Russia annexed Crimea in 2014. The Turkey-Syria border war has been called a \u201cproxy war\u201d between the U.S. and Russia.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_15\" class=\"footnote_plugin_tooltip_text\">[15]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_15\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> <\/p>\n\n\n\n<p>Hopefully, MAD will continue to prevent nuclear war. However, conflicts enhanced by AI are likely to begin.<\/p>\n\n\n\n<h1>A World of Cyberconflict<\/h1>\n\n\n\n<p>Cyberweapons, including those powered by AI, are considered fair game by both sides.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_16\" class=\"footnote_plugin_tooltip_text\">[16]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_16\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span><\/p>\n\n\n\n<p>Russia and Russian-supporting hackers have spied electronically, launched cyberattacks against power plants, banks, hospitals and transportation systems in the U.S., Ukraine and elsewhere\u2014and even against American elections.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_17\" class=\"footnote_plugin_tooltip_text\">[17]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_17\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> Russian cyberattackers have also targeted U.S. allies such as Britain and Germany.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_18\" class=\"footnote_plugin_tooltip_text\">[18]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_18\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span><\/p>\n\n\n\n<p>The U.S. is certainly capable of responding and might have already done so.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_19\" class=\"footnote_plugin_tooltip_text\">[19]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_19\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span><\/p>\n\n\n\n<h1>Use of AI for Weapons Control<\/h1>\n\n\n\n<p>Threats posed by surprise attacks from ship- and submarine-based nuclear weapons and conventional weapons placed near national borders might lead some countries to entrust self-defense tactics\u2014 including launching counterattacks\u2014to the rapid decision-making capabilities of an AI system.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_20\" class=\"footnote_plugin_tooltip_text\">[20]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_20\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span><\/p>\n\n\n\n<p>In case of an attack, AI can act and react more quickly and without the potential hesitation or dissent of a human operator.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_21\" class=\"footnote_plugin_tooltip_text\">[21]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_21\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> There is also an inherent economic aspect to AI operations: Once AIs are developed, they can be used over and over, replacing the need for numerous human hackers while delivering the same or superior effect. AI attackers can even reside on compromised systems, thus attacking from behind enemy lines.<\/p>\n\n\n\n<p>A fast, automated response capability could alert potential adversaries that a nation is ready and willing to launch, which is key to MAD\u2019s deterrent effectiveness.<\/p>\n\n\n\n<p>AI can also be used to control non-nuclear weapons, including unmanned vehicles such as drones and cyberweapons. Unmanned vehicles must be able to operate while their communications are jammed, otherwise impaired or out of range. This requires onboard AI control, which also thwarts a targeted group from preventing or stopping a drone attack by destroying its control facility, because control is distributed, both physically and electronically.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_22\" class=\"footnote_plugin_tooltip_text\">[22]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_22\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> As well, reacting to cyberweapons might require such rapid responses that they would be best launched and controlled by AI systems.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_23\" class=\"footnote_plugin_tooltip_text\">[23]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_23\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span><\/p>\n\n\n\n<p>AI-coordinated attacks can launch cyber or real-world weapons almost instantly, making the decision to defend or counterattack necessary before a human operator would even be able to notice the incursion. AI systems can change targets and techniques faster than humans can comprehend, much less analyze. For instance, an AI system might launch a drone to attack a factory, observe drones responding to defend and launch a cyberattack on those drones, with no noticeable pause.<\/p>\n\n\n\n<h1>The Impact of Cyberattacks<\/h1>\n\n\n\n<p>So far, most of the well-known hacking incidents, even those with foreign government backing, have done little more than steal data.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_24\" class=\"footnote_plugin_tooltip_text\">[24]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_24\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> Unfortunately, there are signs that hackers have placed malicious software inside U.S. power and water systems, where it lies in wait, ready to be triggered.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_25\" class=\"footnote_plugin_tooltip_text\">[25]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_25\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span><a href=\"#one\"><sup> <\/sup><\/a>The U.S. military has also reportedly penetrated the computers that control the Russian electrical grid.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_26\" class=\"footnote_plugin_tooltip_text\">[26]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_26\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span><\/p>\n\n\n\n<p>A cyberattack with widespread impact, an intrusion in one area that spreads to others, or a combination of many smaller attacks could cause significant damage, including mass injury and mortality rivaling the death toll of a nuclear weapon.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_27\" class=\"footnote_plugin_tooltip_text\">[27]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_27\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span><\/p>\n\n\n\n<p>Unlike a nuclear weapon, which would vaporize people within 100 feet and kill almost everyone within a half-mile,<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_28\" class=\"footnote_plugin_tooltip_text\">[28]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_28\" class=\"footnote_tooltip position\" >Jabr, F., \u201cWhat a Nuclear Attack in New York Would Look Like,\u201d New York Magazine, 2018.<\/span><\/span> the death toll from most cyberattacks would be slower. People might die from a lack of food, power or gas for heat, or from car crashes resulting from a corrupted traffic light system.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_29\" class=\"footnote_plugin_tooltip_text\">[29]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_29\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span><a href=\"#one\"><sup> <\/sup><\/a>This could happen over a wide area, resulting in mass injury and even deaths.<\/p>\n\n\n\n<p>This might sound alarmist, but consider what has been happening in recent years in the U.S. and around the world. In early 2016, hackers took control of a U.S. treatment plant for drinking water and changed the chemical mixture used to purify water.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_30\" class=\"footnote_plugin_tooltip_text\">[30]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_30\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> If the changes had not been detected, there might have been poisonings and an unusable water supply.<\/p>\n\n\n\n<p>In 2016 and 2017, hackers shut down major sections of the Ukraine power grid.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_31\" class=\"footnote_plugin_tooltip_text\">[31]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_31\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span><a href=\"#one\"><sup> <\/sup><\/a>The attack was mild, since no equipment was destroyed despite the ability to do so. Ukrainian officials think it was designed to send a message, possibly from the Russians.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_32\" class=\"footnote_plugin_tooltip_text\">[32]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_32\" class=\"footnote_tooltip position\" >Zetter, K., \u201cInside the Cunning, Unprecedented Hack of Ukraine\u2019s Power Grid,\u201d WIRED, 2016.<\/span><\/span> In 2018, unknown cybercriminals gained access to the United Kingdom\u2019s entire electricity system; in 2019, a similar incursion may have penetrated the U.S. grid.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_33\" class=\"footnote_plugin_tooltip_text\">[33]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_33\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> <\/p>\n\n\n\n<p>In August 2017, a Saudi Arabian petrochemical plant was hit by hackers who tried to blow up equipment by taking control of the same types of electronics used in industrial facilities of all kinds throughout the world.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_34\" class=\"footnote_plugin_tooltip_text\">[34]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_34\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> Just a few months later, hackers shut down monitoring systems for oil and gas pipelines across the U.S.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_35\" class=\"footnote_plugin_tooltip_text\">[35]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_35\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> This only caused logistical problems, but it showed how an insecure contractor\u2019s systems could potentially cause problems for primary systems.<\/p>\n\n\n\n<p>The FBI has even warned that hackers are targeting nuclear power facilities.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_36\" class=\"footnote_plugin_tooltip_text\">[36]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_36\" class=\"footnote_tooltip position\" >Perlroth, N., \u201cHackers Are Targeting Nuclear Facilities, Homeland Security Dept. and F.B.I. Say,\u201d New York Times, 2017.<\/span><\/span> A compromised nuclear facility could result in the discharge of radioactive material, chemicals or even possibly a reactor meltdown.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_37\" class=\"footnote_plugin_tooltip_text\">[37]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_37\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span><a href=\"#one\"><sup> <\/sup><\/a>A cyberattack could cause an event similar to the incident in Chernobyl.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_38\" class=\"footnote_plugin_tooltip_text\">[38]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_38\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> That explosion, caused by human error, resulted in 50 deaths, the evacuation of 120,000 people and elevated birth defects for years afterwards.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_39\" class=\"footnote_plugin_tooltip_text\">[39]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_39\" class=\"footnote_tooltip position\" >Taylor, A., \u201cStill Cleaning Up: 30 Years After the Chernobyl Disaster,\u201d The Atlantic, 2016.<\/span><\/span> Parts of the region will remain uninhabitable for thousands of years.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_40\" class=\"footnote_plugin_tooltip_text\">[40]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_40\" class=\"footnote_tooltip position\" >Taylor, A., \u201cStill Cleaning Up: 30 Years After the Chernobyl Disaster,\u201d The Atlantic, 2016.<\/span><\/span> <\/p>\n\n\n\n<h1>Few Deterrents to Cyberattacks<\/h1>\n\n\n\n<p>The point here is not to downplay the devastating effects of a nuclear attack, but rather to highlight that the inhibitions against nuclear conflicts aren\u2019t as strong for cyberattacks.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_41\" class=\"footnote_plugin_tooltip_text\">[41]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_41\" class=\"footnote_tooltip position\" >Straub, J., \u201cMutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios,\u201d Technology in Society, 2019, 59, 101177.<\/span><\/span> For instance, MAD deters a country from launching nuclear weapons at another nuclear-armed nation. The launch would likely be detected, and the targeted nation would launch its weapons in response. Both nations would be obliterated.<\/p>\n\n\n\n<p>Cyberattackers have far fewer inhibitions. It\u2019s much easier to disguise the origin of a digital incursion than conceal the source of a missile launch. Further, cyberwarfare can start small, targeting even a single phone or laptop.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_42\" class=\"footnote_plugin_tooltip_text\">[42]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_42\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> Larger attacks might target businesses, such as banks and hotels, or a government agency.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_43\" class=\"footnote_plugin_tooltip_text\">[43]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_43\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> But those incursions typically wouldn\u2019t escalate a conflict to the nuclear level.<\/p>\n\n\n\n<h1>Nuclear-Grade Cyberattacks<\/h1>\n\n\n\n<p>There are three basic scenarios for how a nuclear-grade cyberattack might develop.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_44\" class=\"footnote_plugin_tooltip_text\">[44]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_44\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/span><\/span> It could start modestly, with one country\u2019s intelligence service stealing, deleting or compromising another nation\u2019s military data. Successive rounds of retaliation could expand the scope of attacks and the severity of damage to civilian life.<\/p>\n\n\n\n<p>In another situation, a nation or a terrorist organization could unleash a massively destructive cyberattack\u2014targeting several electricity utilities, water treatment facilities or industrial plants or a combination to compound the damage.<\/p>\n\n\n\n<p>Perhaps the most concerning possibility is that this might happen by mistake. On several occasions, human and mechanical errors very nearly destroyed the world<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_45\" class=\"footnote_plugin_tooltip_text\">[45]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_45\" class=\"footnote_tooltip position\" >Clark, J., \u201c5 Cold War Mistakes That Nearly Killed Us All,\u201d Task &amp; Purpose, 2016.<\/span><\/span> during the Cold War, as illustrated in the movie \u201cWarGames.\u201d<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_46\" class=\"footnote_plugin_tooltip_text\">[46]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_46\" class=\"footnote_tooltip position\" >\u201cWarGames\u201d (1983). available online:\u00a0<a href=\"https:\/\/www.imdb.%20com\/title\/tt0086567\/\"><span class=\"footnote_url_wrap\">https:\/\/www.imdb.<\/span> com\/title\/tt0086567\/<\/a>\u00a0(accessed on Jan 7, 2021).<\/span><\/span> Something analogous could happen in the software and hardware of the digital realm.<\/p>\n\n\n\n<h1>The Importance of AI Development<\/h1>\n\n\n\n<p>Widespread use of AI-powered cyberattacks<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_47\" class=\"footnote_plugin_tooltip_text\">[47]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_47\" class=\"footnote_tooltip position\" >\u00a0Welsh, S., \u201cAI researchers should not retreat from battlefield robots, they should engage them head-on,\u201d The Conversation, 2015.<\/span><\/span> may still be some time away, but a nation that thinks its adversaries have or will get AI weapons will want to get them too.<\/p>\n\n\n\n<p>Countries might agree to a proposed Digital Geneva Convention to limit AI conflict.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_48\" class=\"footnote_plugin_tooltip_text\">[48]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_48\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> But that won\u2019t stop AI attacks by independent nationalist groups, militias, criminal organizations, terrorists and others.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_49\" class=\"footnote_plugin_tooltip_text\">[49]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_49\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> As well, countries can back out of treaties. It\u2019s almost certain, therefore, that someone will turn AI into a weapon and then everyone else will do so at least to defend themselves.<\/p>\n\n\n\n<p>Nations that don\u2019t embrace AI or restrict its development risk becoming unable to compete, economically or militarily, with countries wielding developed AIs, such as Russia or the U.S.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_50\" class=\"footnote_plugin_tooltip_text\">[50]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_50\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/span><\/span> Advanced AIs create massive advantages for a nation\u2019s industrial and business sectors, as well as its military. Perhaps most importantly, the development of sophisticated AIs in multiple countries could provide a deterrent against attacks,<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_51\" class=\"footnote_plugin_tooltip_text\">[51]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_51\" class=\"footnote_tooltip position\" >Straub, J., \u201cConsideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others,\u201d Technology in Society, 2016, 44.<\/span><\/span> similar to MAD\u2019s success.<\/p>\n\n\n\n<h1>Faster Attacks<\/h1>\n\n\n\n<p>Beyond computers\u2019 lack of need for food and sleep, which limit human hackers even when working in teams, automation can make complex attacks much faster and more effective.<\/p>\n\n\n\n<p>To date, the effects of automation have been limited. Very rudimentary AI-like capabilities have for decades given virus programs the ability to self-replicate, spreading from computer to computer without specific human instructions.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_52\" class=\"footnote_plugin_tooltip_text\">[52]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_52\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/span><\/span> In addition, programmers have used their skills to automate different elements of hacking efforts. Distributed attacks, for example, involve triggering a remote program on several computers or devices to overwhelm servers. The attack that shut down large sections of the internet in October 2016<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_53\" class=\"footnote_plugin_tooltip_text\">[53]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_53\" class=\"footnote_tooltip position\" >Cobb, S. \u201c10 things to know about the October 21 IoT DDoS attacks,\u201d available online:\u00a0https:\/\/www.welivesecurity. com\/2016\/10\/24\/10-things-know-october-21-iot-ddosattacks\/\u00a0(accessed on Jan 7,&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> used this type of approach. In some cases, attacks are made available as a script that allows an unsophisticated user to choose a target and launch an attack.<\/p>\n\n\n\n<p>AI, however, could help human cybercriminals customize attacks. Spearphishing attacks, for instance, require perpetrators to have personal information about prospective targets, such as where they bank or what medical insurance company they use.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_54\" class=\"footnote_plugin_tooltip_text\">[54]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_54\" class=\"footnote_tooltip position\" >For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/span><\/span> AI systems can help gather, organize and process large databases to connect identifying information, making this type of attack easier and faster to carry out. That reduced workload may drive thieves to launch many smaller attacks that go unnoticed for long periods of time\u2014if detected at all\u2014due to their more limited impact.<\/p>\n\n\n\n<p>AI systems could even be used to pull information together from multiple sources to identify people who would be particularly vulnerable to attack. Someone who is hospitalized or in a nursing home, for example, might not notice money missing from a bank account until long after the cyberthief has gotten away.<\/p>\n\n\n\n<h1>Improved Adaptation<\/h1>\n\n\n\n<p>AI-enabled attackers will also be much faster to react when they encounter resistance, or when cybersecurity experts fix weaknesses that had previously allowed entry by unauthorized users. AI may be able to exploit another vulnerability or start scanning for new ways into the system without waiting for human instructions.<\/p>\n\n\n\n<p>This could mean that human defenders find themselves unable to keep up with the speed of incoming attacks. It may result in a programming and technological arms race<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_55\" class=\"footnote_plugin_tooltip_text\">[55]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_55\" class=\"footnote_tooltip position\" >Straub, J., \u201cConsideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others,\u201d Technology in Society, 2016, 44.<\/span><\/span>, with defenders developing AI assistants to identify and protect against attacks\u2014and perhaps adopting AI with retaliatory attack capabilities.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_56\" class=\"footnote_plugin_tooltip_text\">[56]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_56\" class=\"footnote_tooltip position\" >Denning, D., \u201cCybersecurity\u2019s next phase: Cyber-deterrence,\u201d The Conversation, 2016.<\/span><\/span> <\/p>\n\n\n\n<h1>Avoiding the Dangers<\/h1>\n\n\n\n<p>Operating autonomously could lead AI systems to attack a system it shouldn\u2019t or cause unexpected damage.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_57\" class=\"footnote_plugin_tooltip_text\">[57]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_57\" class=\"footnote_tooltip position\" >\u00a0For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/span><\/span> For example, software started by an attacker intending only to steal money might decide to target a hospital computer in a way that causes human injury or death. The potential for unmanned aerial vehicles to operate autonomously<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_58\" class=\"footnote_plugin_tooltip_text\">[58]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_58\" class=\"footnote_tooltip position\" >Prescott, J.M., \u201cAutonomous decision-making processes and the responsible cyber commander,\u201d in Proceedings of the 2013 5th International Conference on Cyber Conflict (CyCon), IEEE, 2013, pp.&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> has raised similar questions of the need for humans to make the decisions about targets.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_59\" class=\"footnote_plugin_tooltip_text\">[59]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_59\" class=\"footnote_tooltip position\" >Docherty, B., \u201cLosing control: The dangers of killer robots,\u201d The Conversation, 2016.<\/span><\/span> <\/p>\n\n\n\n<p>The consequences and implications are significant, but most people won\u2019t notice a big change from a conventional cyberattack when the first AI attack is unleashed. For most of those affected, the outcome will be the same as human-triggered attacks. But as we continue to fill our homes, factories, offices and roads with internet-connected robotic systems, the potential effects of an attack by artificial intelligence only grows.<\/p>\n\n\n\n<p><em>This article is based on three articles<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_130_1_60\" class=\"footnote_plugin_tooltip_text\">[60]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_130_1_60\" class=\"footnote_tooltip position\" >Straub, J., \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018; Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming\u2014but What Does That Mean?\u201d The&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> <em>that were originally published by The Conversation.<\/em><\/p>\n<div class=\"speaker-mute footnotes_reference_container\"> <div class=\"footnote_container_prepare\"><p><span role=\"button\" tabindex=\"0\" id=\"footnotes_container_label_expand_130_1\" class=\"footnote_reference_container_label pointer\" on=\"tap:footnote_references_container_130_1.toggleClass(class=collapsed)\">References<\/span><\/p><\/div> <div id=\"footnote_references_container_130_1\"><table class=\"footnotes_table footnote-reference-container\"><caption class=\"accessibility\">References<\/caption> <tbody> \r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_1\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>1<\/a><\/th> <td class=\"footnote_plugin_text\">House, J.M.,<em>\u00a0A Military History of the Cold War, 1962\u20131991<\/em>, University of Oklahoma Press: Norman, OK, 2020.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi\"><a id=\"footnote_plugin_reference_130_1_2\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_2');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>2,<\/a> <a id=\"footnote_plugin_reference_130_1_3\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_3');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>3,<\/a> <a id=\"footnote_plugin_reference_130_1_12\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_12');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>12,<\/a> <a id=\"footnote_plugin_reference_130_1_13\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_13');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>13,<\/a> <a id=\"footnote_plugin_reference_130_1_14\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_14');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>14,<\/a> <a id=\"footnote_plugin_reference_130_1_15\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_15');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>15,<\/a> <a id=\"footnote_plugin_reference_130_1_16\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_16');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>16,<\/a> <a id=\"footnote_plugin_reference_130_1_17\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_17');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>17,<\/a> <a id=\"footnote_plugin_reference_130_1_18\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_18');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>18,<\/a> <a id=\"footnote_plugin_reference_130_1_19\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_19');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>19,<\/a> <a id=\"footnote_plugin_reference_130_1_20\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_20');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>20,<\/a> <a id=\"footnote_plugin_reference_130_1_21\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_21');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>21,<\/a> <a id=\"footnote_plugin_reference_130_1_22\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_22');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>22,<\/a> <a id=\"footnote_plugin_reference_130_1_23\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_23');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>23,<\/a> <a id=\"footnote_plugin_reference_130_1_48\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_48');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>48,<\/a> <a id=\"footnote_plugin_reference_130_1_49\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_49');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>49,<\/a> <a id=\"footnote_plugin_reference_130_1_50\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_50');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>50<\/a><\/th> <td class=\"footnote_plugin_text\">For a discussion of this topic and reference material, see: Straub, J. \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_4\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>4<\/a><\/th> <td class=\"footnote_plugin_text\">\u201cCylance Team Black Hat Attendees See AI as Double- Edged Sword,\u201d available online:\u00a0<a href=\"https:\/\/blogs.blackberry.%20com\/en\/2017\/08\/black-hat-attendees-see-ai-asdouble-%20edged-sword\"><span class=\"footnote_url_wrap\">https:\/\/blogs.blackberry.<\/span> com\/en\/2017\/08\/black-hat-attendees-see-ai-asdouble- edged-sword<\/a>\u00a0(accessed on Jan 7, 2021).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi\"><a id=\"footnote_plugin_reference_130_1_5\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_5');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>5,<\/a> <a id=\"footnote_plugin_reference_130_1_6\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_6');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>6,<\/a> <a id=\"footnote_plugin_reference_130_1_7\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_7');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>7,<\/a> <a id=\"footnote_plugin_reference_130_1_52\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_52');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>52,<\/a> <a id=\"footnote_plugin_reference_130_1_54\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_54');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>54<\/a><\/th> <td class=\"footnote_plugin_text\">For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi\"><a id=\"footnote_plugin_reference_130_1_8\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_8');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>8,<\/a> <a id=\"footnote_plugin_reference_130_1_9\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_9');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>9<\/a><\/th> <td class=\"footnote_plugin_text\">\u201cBrains over bucks: Putin hints AI may be key to Russia beating US in defense despite budget gap,\u201d RT World News 2017.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_10\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>10<\/a><\/th> <td class=\"footnote_plugin_text\">Meyer, D., \u201cVladimir Putin Says Whoever Leads in Artificial Intelligence Will Rule the World,\u201d available online:\u00a0<a href=\"https:\/\/%20fortune.com\/2017\/09\/04\/ai-artificial-intelligence-putin-ruleworld\/\">https:\/\/ fortune.com\/2017\/09\/04\/ai-artificial-intelligence-putin-ruleworld\/<\/a>\u00a0(accessed on Jan 7, 2021).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_11\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>11<\/a><\/th> <td class=\"footnote_plugin_text\">\u201c\u2018Whoever leads in AI will rule the world:\u2019 Putin to Russian children on Knowledge Day,\u201d available online:\u00a0<a href=\"https:\/\/www.%20rt.com\/news\/401731-ai-rule-world-putin\/\"><span class=\"footnote_url_wrap\">https:\/\/www.<\/span> rt.com\/news\/401731-ai-rule-world-putin\/<\/a>\u00a0(accessed on Jan 7, 2021).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi\"><a id=\"footnote_plugin_reference_130_1_24\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_24');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>24,<\/a> <a id=\"footnote_plugin_reference_130_1_25\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_25');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>25,<\/a> <a id=\"footnote_plugin_reference_130_1_26\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_26');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>26,<\/a> <a id=\"footnote_plugin_reference_130_1_27\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_27');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>27,<\/a> <a id=\"footnote_plugin_reference_130_1_29\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_29');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>29,<\/a> <a id=\"footnote_plugin_reference_130_1_30\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_30');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>30,<\/a> <a id=\"footnote_plugin_reference_130_1_31\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_31');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>31,<\/a> <a id=\"footnote_plugin_reference_130_1_33\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_33');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>33,<\/a> <a id=\"footnote_plugin_reference_130_1_34\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_34');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>34,<\/a> <a id=\"footnote_plugin_reference_130_1_35\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_35');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>35,<\/a> <a id=\"footnote_plugin_reference_130_1_37\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_37');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>37,<\/a> <a id=\"footnote_plugin_reference_130_1_38\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_38');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>38,<\/a> <a id=\"footnote_plugin_reference_130_1_42\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_42');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>42,<\/a> <a id=\"footnote_plugin_reference_130_1_43\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_43');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>43,<\/a> <a id=\"footnote_plugin_reference_130_1_44\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_44');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>44<\/a><\/th> <td class=\"footnote_plugin_text\">For a discussion of this topic and reference material, see: Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_28\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>28<\/a><\/th> <td class=\"footnote_plugin_text\">Jabr, F., \u201cWhat a Nuclear Attack in New York Would Look Like,\u201d New York Magazine, 2018.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_32\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>32<\/a><\/th> <td class=\"footnote_plugin_text\">Zetter, K., \u201cInside the Cunning, Unprecedented Hack of Ukraine\u2019s Power Grid,\u201d WIRED, 2016.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_36\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>36<\/a><\/th> <td class=\"footnote_plugin_text\">Perlroth, N., \u201cHackers Are Targeting Nuclear Facilities, Homeland Security Dept. and F.B.I. Say,\u201d New York Times, 2017.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi\"><a id=\"footnote_plugin_reference_130_1_39\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_39');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>39,<\/a> <a id=\"footnote_plugin_reference_130_1_40\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_40');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>40<\/a><\/th> <td class=\"footnote_plugin_text\">Taylor, A., \u201cStill Cleaning Up: 30 Years After the Chernobyl Disaster,\u201d The Atlantic, 2016.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_41\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>41<\/a><\/th> <td class=\"footnote_plugin_text\">Straub, J., \u201cMutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios,\u201d Technology in Society, 2019, 59, 101177.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_45\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>45<\/a><\/th> <td class=\"footnote_plugin_text\">Clark, J., \u201c5 Cold War Mistakes That Nearly Killed Us All,\u201d Task &amp; Purpose, 2016.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_46\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>46<\/a><\/th> <td class=\"footnote_plugin_text\">\u201cWarGames\u201d (1983). available online:\u00a0<a href=\"https:\/\/www.imdb.%20com\/title\/tt0086567\/\"><span class=\"footnote_url_wrap\">https:\/\/www.imdb.<\/span> com\/title\/tt0086567\/<\/a>\u00a0(accessed on Jan 7, 2021).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_47\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>47<\/a><\/th> <td class=\"footnote_plugin_text\">\u00a0Welsh, S., \u201cAI researchers should not retreat from battlefield robots, they should engage them head-on,\u201d The Conversation, 2015.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi\"><a id=\"footnote_plugin_reference_130_1_51\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_51');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>51,<\/a> <a id=\"footnote_plugin_reference_130_1_55\" class=\"footnote_backlink\" onclick=\"footnote_moveToAnchor_130_1('footnote_plugin_tooltip_130_1_55');\"><span class=\"footnote_index_arrow\">&#8593;<\/span>55<\/a><\/th> <td class=\"footnote_plugin_text\">Straub, J., \u201cConsideration of the use of autonomous, non-recallable unmanned vehicles and programs as a deterrent or threat by state actors and others,\u201d Technology in Society, 2016, 44.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_53\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>53<\/a><\/th> <td class=\"footnote_plugin_text\">Cobb, S. \u201c10 things to know about the October 21 IoT DDoS attacks,\u201d available online:\u00a0<a href=\"https:\/\/www.welivesecurity.%20com\/2016\/10\/24\/10-things-know-october-21-iot-ddosattacks\/\"><span class=\"footnote_url_wrap\">https:\/\/www.welivesecurity.<\/span> com\/2016\/10\/24\/10-things-know-october-21-iot-ddosattacks\/<\/a>\u00a0(accessed on Jan 7, 2021).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_56\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>56<\/a><\/th> <td class=\"footnote_plugin_text\">Denning, D., \u201cCybersecurity\u2019s next phase: Cyber-deterrence,\u201d The Conversation, 2016.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_57\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>57<\/a><\/th> <td class=\"footnote_plugin_text\">\u00a0For a discussion of this topic and reference material, see: Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming \u2014but What Does That Mean?\u201d The Conversation, 2017.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_58\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>58<\/a><\/th> <td class=\"footnote_plugin_text\">Prescott, J.M., \u201cAutonomous decision-making processes and the responsible cyber commander,\u201d in Proceedings of the 2013 5th International Conference on Cyber Conflict (CyCon), IEEE, 2013, pp. 1\u201318.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_59\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>59<\/a><\/th> <td class=\"footnote_plugin_text\">Docherty, B., \u201cLosing control: The dangers of killer robots,\u201d The Conversation, 2016.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_130_1_60\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>60<\/a><\/th> <td class=\"footnote_plugin_text\">Straub, J., \u201cArtificial Intelligence is the Weapon of the Next Cold War,\u201d The Conversation, 2018; Straub, J., \u201cArtificial Intelligence Cyber Attacks are Coming\u2014but What Does That Mean?\u201d The Conversation, 2017; Straub, J., \u201cA Cyberattack Could Wreak Destruction Comparable to a Nuclear Weapon,\u201d The Conversation, 2019.<\/em><\/td><\/tr>\r\n\r\n <\/tbody> <\/table> <\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>It\u2019s easy to confuse the current geopolitical situation with the 1980s at the end of the Cold War, when tensions between the Soviet Union and the United States were highest. [&hellip;]<\/p>\n","protected":false},"author":73,"featured_media":650,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[21,20,156],"tags":[48,122,123,51,124,125,126,127,128,129,130,131,132,133,134,135,136],"_links":{"self":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts\/130"}],"collection":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/users\/73"}],"replies":[{"embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":14,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"predecessor-version":[{"id":1472,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts\/130\/revisions\/1472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/media\/650"}],"wp:attachment":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}