Counterintelligence, Artificial Intelligence and National Security: Synergy and Challenges


Published: Feb 9, 2024
Keywords:
Counterintelligence Artificial Intelligence National Security Ethics International Relations
Anastasios Nikolaos Kanellopoulos
Abstract

Counterintelligence (CI) and Artificial Intelligence (AI) represent two distinct yet interconnected domains that play pivotal roles in safeguarding National and International Security. On the first hand, CI involves activities and measures taken to identify, prevent and counter any Intelligence activities of hostile entities, such as spying, sabotage and information gathering. On the other hand, AI refers to the development and use of computer systems that can perform tasks that typically require human intelligence, such as learning, reasoning and problem-solving. Subsequently, in the ever-evolving landscape of global security, the rise of AI has ushered in a new era of CI practices. The present paper delves into the intersection of CI and AI, exploring the profound impact of AI on the CI processes and how it is transforming National Security strategies, highlighting at the same time the fields of mutually influence. Ultimately, underscores the imperative of harnessing AI's potential to strengthen CI efforts in an ever-evolving threat landscape. Plus, it investigates the ethical concerns and privacy implications associated with AI in CI emphasizing the imperative of responsible AI development and deployment. Finally, through comprehensive international case studies, offers insights into how United States, China, Russia and Israel have integrated AI into their Intelligence and CI strategies, shedding light on the diverse approaches and challenges faced by different countries. Summarizing, the paper underscores the potential synergy between AI and CI, while also acknowledging the formidable challenges it presents, such as privacy concerns and adversarial AI. Striking a balance between harnessing AI's power and safeguarding national interests remains a pivotal task for policymakers and intelligence agencies in the ever-evolving landscape of national security.

Article Details
  • Section
  • Research Articles
Downloads
Download data is not yet available.
References
Barnea, A. (2019). Big Data and counterintelligence in western countries. International Journal of Intelligence and CounterIntelligence, 32(3), 433–447. 10.1080/08850607.2019.1605804.
Barnea, A. and Meshulach, A. (2020). Forecasting for Intelligence Analysis: Scenarios to abort strategic surprise. International Journal of Intelligence and CounterIntelligence, 34(1), 106–133. doi:10.1080/08850607.2020.1793600.
Blackman, R. (2020). A practical guide to building ethical AI. Harvard Business Review. Available at: https://hbr.org/2020/10/a-practical-guide-to-building-ethical-ai (Accessed: 02 October 2023).
Briscoe, A. (2011). History - elizabeth’s spy network. BBC. Available at: https://www.bbc.co.uk/history/british/tudors/spying_01.shtml (Accessed: 02 October 2023).
Burrows, L. (2019). Researchers propose ‘machine behavior’ field could blend AI. Social Sciences, Harvard Gazette. Available at: https://news.harvard.edu/gazette/story/2019/06/researchers-propose-machine-behavior-field-could-blend-ai-social-sciences/ (Accessed: 02 October 2023).
Clark, R. M. and Mitchell, W. L. (2019). Deception: Counterdeception and counterintelligence. Washington, DC: CQ Press.
Dempsey, K., Yan Pillitteri, V. and Regenscheid, A., (2021). Managing the Security of Information Exchanges. Publication 800-47. National Institute of Standards and Technology - U.S. Department of Commerce.
Dise, R.L. (2004). Espionage in the ancient world: An annotated bibliography (review). The Journal of Military History, 68(2), 577–578. 10.1353/jmh.2004.0035.
Dubow, B. (2023). Russia’s new underpowered weapon – artificial intelligence. CEPA. Available at: https://cepa.org/article/russias-new-underpowered-weapon-ai/ (Accessed: 02 October 2023).
Fabre, C. (2020). The morality of treason. Law and Philosophy, 39(4), 427–461. 10.1007/s10982-020-09392-5.
Gruetzemacher, R. (2022). The power of Natural Language Processing. Harvard Business Review. Available at: https://hbr.org/2022/04/the-power-of-natural-language-processing (Accessed: 02 October 2023).
Guitton, M. J. and Fréchette, J. (2023). Facing cyberthreats in a crisis and post-crisis ERA: Rethinking Security Services Response Strategy. Computers in Human Behavior Reports, 10, 100282. 10.1016/j.chbr.2023.100282.
Hunter, L.Y. et al. (2023). The military application of Artificial Intelligence Technology in the United States, China, and Russia and the implications for global security. Defense & Security Analysis, 39(2), 207–232. 10.1080/14751798.2023.2210367.
Hynek, N. and Solovyeva, A. (2022). Militarizing Artificial Intelligence in the US, Russia, and China. In Militarizing Artificial Intelligence, pp. 49–83. 10.4324/9781003045489-5.
Inkster, N. (2013). Chinese intelligence in the Cyber Age. Survival, 55(1), 45–66. 10.1080/00396338.2013.767405.
Jackson, M. (2018). FBI employs AI, Big Data Analytics Systems to identify insider threats. Executive Gov. Available at: https://executivegov.com/2018/08/fbi-employs-ai-big-data-analytics-systems-to-identify-insider-threats/ (Accessed: 02 October 2023).
Johnson, J. (2019). Artificial Intelligence & Future warfare: Implications for international security. Defense & Security Analysis, 35(2), 147–169. 10.1080/14751798.2019.1600800.
Johnson, J. (2021). “catalytic nuclear war” in the age of Artificial Intelligence & Autonomy: Emerging Military Technology and escalation risk between nuclear-armed states. Journal of Strategic Studies, 1–41. 10.1080/01402390.2020.1867541.
Johnson, L.K. (2010). Handbook of Intelligence Studies. London: Routledge.
Kreuzer, M.P. (2015). Professionalizing Intelligence Analysis: An expertise and responsibility centered approach. Intelligence and National Security, 31(4), 579–597. 10.1080/02684527.2015.1039228.
Layton, P. (2020). Artificial Intelligence, Big Data and autonomous systems along the belt and road: Towards private security companies with Chinese characteristics?. Small Wars & Insurgencies, 31(4), 874–897. 10.1080/09592318.2020.1743483.
Lazzeretti, L. et al. (2023). Artificial Intelligence, Big Data, algorithms and Industry 4.0 in firms and Clusters. European Planning Studies, 31(7), 1297–1303. 10.1080/09654313.2023.2220490.
Leibold, J. (2019). Surveillance in China’s Xinjiang region: Ethnic sorting, coercion, and inducement’, Journal of Contemporary China, 29(121), 46–60. 10.1080/10670564.2019.1621529.
Lowenthal, M. (2009) Intelligence: From secrets to policy. Washington, DC: CQ Press.
Lustick, I. S. (2022). Geopolitical forecasting and Actionable Intelligence. Survival, 64(1), 51–56. 10.1080/00396338.2022.2032959.
Martin, P. and Manson, K. (2023). CIA builds own chaptgpt style ai tool in rivalry with China. Bloomberg.com. Available at: https://www.bloomberg.com/news/articles/2023-09-26/cia-builds-its-own-artificial-intelligence-tool-in-rivalry-with-china (Accessed: 02 October 2023).
Mazurek, G. and Małagocka, K. (2019). Perception of privacy and data protection in the context of the development of Artificial Intelligence. Journal of Management Analytics, 6(4), 344–364. 10.1080/23270012.2019.1671243.
Melendez, V.M. (2019). Counterintelligence: An asymmetric warfighting tool for the U.S. navy. International Journal of Intelligence and CounterIntelligence, 32(4), 737–769. 10.1080/08850607.2019.1621108.
Mobley, B.W. and Wege, C.A. (2021a). Counterintelligence vetting techniques compared across multiple domains. International Journal of Intelligence and CounterIntelligence, 34(4), 663–693. 10.1080/08850607.2020.1836603.
Mobley, B. W. and Wege, C.A. (2021b). Evading secret police: Counterintelligence vulnerabilities in authoritarian states. International Journal of Intelligence and CounterIntelligence, 36(1), 179–198. 10.1080/08850607.2021.1937781.
Neuman, S. (2012). Britain releases World War II code-breaking papers. NPR. Available at: https://www.npr.org/sections/thetwo-way/2012/04/19/150977857/british-releases-world-war-ii-codebreaking-papers (Accessed: 02 October 2023).
Pazzanese, C. (2020). Ethical concerns mount as AI takes bigger decision-making role. Harvard Gazette. Available at: https://news.harvard.edu/gazette/story/2020/10/ethical-concerns-mount-as-ai-takes-bigger-decision-making-role/ (Accessed: 02 October 2023).
Piffer, T. (2015). Office of Strategic Services Versus Special Operations Executive: Competition for the italian resistance, 1943–1945. Journal of Cold War Studies, 17(4), 41–58. 10.1162/jcws_a_00596.
Prunckun, H.W. (2019). Counterintelligence theory and practice. London: Rowman et Littlefield.
Putter, D. and Dov Bachmann, S.-D. (2022). Scoping the future counterintelligence focus. International Journal of Intelligence and CounterIntelligence, 36(2), 358–385. 10.1080/08850607.2022.2091414.
Richelson, J.T. (1997). A century of spies: Intelligence in the Twentieth Century. New York: Oxford University Press.
Riehle, K., (2015). A Counterintelligence Analysis Typology. American Intelligence Journal, 32(1), 55-60.
Shapira, I. and Siman-Tov, D. (2022). Israeli Defense Intelligence (IDI): Adaptive evolution in the interaction between collection and analysis. Intelligence and National Security, 38(3), 407–426. 10.1080/02684527.2022.2110652.
Shaw, J. (2019). Confronting pitfalls of Machine Learning, artificial intelligence. Harvard Magazine. Available at: https://www.harvardmagazine.com/2018/12/artificial-intelligence-limitations (Accessed: 02 October 2023).
Shehab, M. et al. (2020). (AIAM2019) artificial intelligence in software engineering and inverse: Review. International Journal of Computer Integrated Manufacturing, 33(10–11), 1129–1144. 10.1080/0951192x.2020.1780320.
Sims, J.E. and Gerber, B.L. (2009). Vaults, mirrors, and masks: Rediscovering U.S. counterintelligence. Washington, D.C.: Georgetown University Press.
Sison, A.J. et al. (2023). CHATGPT: More than a “weapon of mass deception” ethical challenges and responses from the human-centered artificial intelligence (HCAI) perspective. International Journal of Human–Computer Interaction, pp. 1–20. 10.1080/10447318.2023.2225931.
Solomon, S. (2023). As Ai Rides Global Wave, troubled Israel risks missing the splash. The Times of Israel. Available at: https://www.timesofisrael.com/as-ai-rides-global-wave-troubled-israel-risks-missing-the-splash/ (Accessed: 02 October 2023).
Spielmann, K. (2012). Strengthening intelligence threat analysis. International Journal of Intelligence and CounterIntelligence, 25(1), 19–43. 10.1080/08850607.2012.623035.
Stouder, M.D. and Gallagher, S. (2013). Crafting Operational Counterintelligence Strategy: A guide for managers. International Journal of Intelligence and CounterIntelligence, 26(3), 583–596. 10.1080/08850607.2013.780560.
Strout, N. (2022). Intelligence Agency takes over Project Maven, the Pentagon’s signature AI scheme. C4ISRNet. Available at: https://www.c4isrnet.com/intel-geoint/2022/04/27/intelligence-agency-takes-over-project-maven-the-pentagons-signature-ai-scheme/ (Accessed: 02 October 2023).
Van Cleave, M.K. (2007). Counterintelligence and national strategy. 10.21236/ada471485.
Zarkadakis, G. (2021). ‘data trusts’ could be the key to better AI. Harvard Business Review. Available at: https://hbr.org/2020/11/data-trusts-could-be-the-key-to-better-ai (Accessed: 02 October 2023).
Zhang, C. (2020) ‘Governing (through) trustworthiness: Technologies of power and subjectification in China’s Social Credit System’, Critical Asian Studies, 52(4), pp. 565–588. 10.1080/14672715.2020.1822194.
Zhao, H. et al. (2022). Working with artificial intelligence surveillance during the COVID-19 pandemic: A mixed investigation of the influence mechanism on job engagement in Hospitality Industry. Current Issues in Tourism, 26(20), 3318–3335. 10.1080/13683500.2022.2117593.