{"id":27344,"date":"2024-08-13T17:17:06","date_gmt":"2024-08-13T11:47:06","guid":{"rendered":"https:\/\/www.nextias.com\/ca\/?p=27344"},"modified":"2024-08-13T18:46:35","modified_gmt":"2024-08-13T13:16:35","slug":"disinformation-ai-and-the-digital-battlefield","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/editorial-analysis\/13-08-2024\/disinformation-ai-and-the-digital-battlefield","title":{"rendered":"Disinformation, AI, and the Digital Battlefield"},"content":{"rendered":"\n<p><strong>Syllabus: GS3\/Cyber Security; Challenges of Emerging Technologies<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-0cb2d8d8970fcc76e5fb15bd21ee6252\" style=\"color:#015aa7\"><strong>Context<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The expanding horizons of disinformation, ever-evolving landscape of cyber threats, <a href=\"https:\/\/www.nextias.com\/ca\/editorial-analysis\/06-01-2024\/artificial-intelligence-and-the-future\">Artificial Intelligence (AI)<\/a> and its different manifestations, including <a href=\"https:\/\/www.nextias.com\/ca\/current-affairs\/09-01-2023\/generative-artificial-intelligence-ai\">Generative AI<\/a> and <a href=\"https:\/\/www.nextias.com\/ca\/editorial-analysis\/13-06-2024\/rebooting-indias-prospects-through-artificial-general-intelligence-agi\">Artificial General Intelligence (AGI)<\/a> create new waves of security threats and concerns over the security specialists the world over.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-7b8b4aefd3d18a4a26d2e590e5f861b3\" style=\"color:#015aa7\"><strong>About<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The year 2024 arrived with a sense of foreboding\u2014a harbinger of new security threats that would test the resilience of nations and organisations worldwide. Among these threats, <strong>two stood out prominently<\/strong>: the<strong> rise of AI and the expanding horizons of disinformation campaigns<\/strong>. Together, they wove a complex web\u2014a <strong>\u2018Cyber Chakravyuh\u2019<\/strong>\u2014that security experts grappled with.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-8143665840ace66a148f15111b4730f3\" style=\"color:#015aa7\"><strong>Rise of Generative AI in Disinformation<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Artificial Intelligence, in its various forms, has become both a <strong>boon and a bane. Generative AI and Artificial General Intelligence (AGI)<\/strong> promise incredible advancements, but they also <strong>open Pandora\u2019s box.<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Spreading disinformation<\/strong> has become disturbingly easy with AI. <strong>Deep fakes<\/strong>\u2014digitally manipulated videos, audios, or images\u2014now flood our digital landscape.<\/li>\n\n\n\n<li>These deceptive creations blur the line between reality and fabrication, causing confusion and chaos. The truth often emerges only after the damage is done.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>In recent years, generative AI has turbocharged state efforts<strong> to manipulate public opinion and suppress dissent<\/strong>. Governments and political actors worldwide, regardless of their democratic or autocratic leanings, have harnessed AI to create and disseminate deceptive content.<\/li>\n\n\n\n<li><strong>Accessibility and Affordability:<\/strong> Generative AI tools have become more accessible and affordable. This democratisation of technology lowers the barrier for entry into disinformation campaigns.\n<ul class=\"wp-block-list\">\n<li>No longer the exclusive domain of well-funded state actors, these tools are now within reach for various entities, including non-state actors and even individuals.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Automated Censorship:<\/strong> AI enables governments to conduct more precise and subtle forms of online censorship. Automated systems can swiftly identify and suppress critical content, making it harder for dissenting voices to be heard.\n<ul class=\"wp-block-list\">\n<li>As a result, internet freedom has declined globally, with the 2023 Freedom on the Net report highlighting the 13th consecutive year of such decline.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Deep Fakes and Manipulated Content:<\/strong> AI-generated deep fakes\u2014realistic but fabricated videos or images\u2014have been used to spread disinformation. For instance:\n<ul class=\"wp-block-list\">\n<li><strong>Venezuelan<\/strong> state media used AI-generated videos of nonexistent news anchors to promote pro-government narratives.<\/li>\n\n\n\n<li>In the<strong> United States,<\/strong> manipulated videos and images of political leaders have circulated on social media, further blurring the line between truth and fiction.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Old Tactics Persist:<\/strong> While generative AI is a powerful tool, governments continue to employ older tactics. A combination of human and bot campaigns is still effective in shaping online discussions.\n<ul class=\"wp-block-list\">\n<li>In 2023, at least 47 governments deployed commentators to spread propaganda, doubling the number from a decade ago.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-c8b1afda0608401aff8033e3c97b673b\" style=\"color:#015aa7\"><strong>AI\u2019s Role in Defense and Deception<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Beyond disinformation campaigns, AI plays a critical role in defence and warfare.<\/li>\n\n\n\n<li><strong>Battlefield Deception:<\/strong> AI can be weaponized for battlefield deception. To counter this threat, advanced AI-based detection tools are essential.\n<ul class=\"wp-block-list\">\n<li>Machine learning algorithms can identify patterns indicative of AI-generated deception, preempting cyberattacks or disinformation campaigns.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Nonstate Actors and AI:<\/strong> The use of AI-enabled technologies by both state and nonstate actors offers important insights. Drones, cyberspace, and large-scale mis- and disinformation campaigns all fall within this purview.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-ff500fb06993f0d72b2f5897fe0e08b6\" style=\"color:#015aa7\"><strong>Case Studies<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Taiwan Elections and the Disinformation Storm: <\/strong>In early 2024, as Taiwan prepared for its elections, disinformation was already rampant. Fake posts and manipulated videos swirled around, creating an atmosphere of uncertainty. While some attributed this to China, the reality was murkier.\n<ul class=\"wp-block-list\">\n<li>AI-powered disinformation campaigns had found fertile ground. The cloak of authenticity made it harder to discern fact from fiction. As we navigate this digital age, we must recognize that disinformation, fueled by AI, poses a significant threat to our societies.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Ukrainian Conflict:<\/strong> Ukraine serves as a stark case study. In the ongoing conflict, both sides employ disinformation\u2014including AI-enabled disruption\u2014against each other. The consequences are dire. Misleading narratives, fabricated evidence, and manipulated media fan the flames of discord.\n<ul class=\"wp-block-list\">\n<li>The digital battlefield amplifies the physical one, and truth becomes elusive. It\u2019s a cautionary tale for the world: disinformation, when combined with AI, can wreak havoc on stability and security.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Eternal Vigilance:<\/strong> The <strong>33rd Summer Olympic Games<\/strong> in France, held during July-August 2024, were a prime target for digital attacks. Security experts braced themselves for unprecedented threats. Fortunately, the Games concluded without major incidents, a testament to their vigilance.\n<ul class=\"wp-block-list\">\n<li>But complacency is not an option. Newer variations of digital threats will emerge, demanding constant watchfulness. National security hangs in the balance, and our defences must adapt accordingly.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-c956dddc896a2d7307cc2fe45b90d15d\" style=\"color:#015aa7\"><strong>A Preview of Cyber Chaos<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Recently, the world witnessed a glimpse of what could unfold during a massive cyberattack. Although not a deliberate attack, a software glitch related to a <strong>Microsoft Windows update<\/strong> caused a widespread outage.\n<ul class=\"wp-block-list\">\n<li>Initially affecting parts of the United States, the glitch quickly spread globally, including India. Flight operations, air traffic control, stock exchanges, and other critical services were disrupted. The <strong>Indian Computer Emergency Response Team (CERT-IN)<\/strong> classified it as a<strong> \u201ccritical\u201d <\/strong>incident.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>WannaCry Ransomware (2017):<\/strong> Infected over 230,000 computers in 150 countries; Resulted in billions of dollars in damages.<\/li>\n\n\n\n<li><strong>Shamoon Computer Virus (2017):<\/strong> Targeted oil companies like SA ARAMCO (Saudi Arabia) and RasGas (Qatar); Labelled the \u2018biggest hack in history\u2019; Demonstrated the potential impact on critical infrastructure.<\/li>\n\n\n\n<li><strong>Petya Malware (2017):<\/strong> Severely affected banks, electricity grids, and institutions across Europe, the UK, the US, and Australia; Highlighted the interconnectedness of global systems.<\/li>\n\n\n\n<li><strong>Stuxnet (2010):<\/strong> A state-sponsored worm targeting Iran\u2019s nuclear program; Physically degraded over 200,000 computers; Showcased the power of targeted cyber weapons.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-bee30241b8fd085733bbc9d3515c72a3\" style=\"color:#015aa7\"><strong>Related Global Efforts&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cybersecurity and Infrastructure Security Agency (CISA):<\/strong> It plays a critical role in strengthening global cybersecurity. Their international strategy, \u201cCISA Global,\u201d focuses on several key areas:\n<ul class=\"wp-block-list\">\n<li><strong>Operational Cooperation:<\/strong> Collaborating with like-minded partners to share best practices, engage in information exchanges, and issue joint products for global distribution.<\/li>\n\n\n\n<li><strong>Capacity Building:<\/strong> Building both U.S. and global capacity to defend against cyber incidents and enhance critical infrastructure security.<\/li>\n\n\n\n<li><strong>Stakeholder Engagement:<\/strong> Strengthening collaboration through outreach and engagement with various stakeholders.<\/li>\n\n\n\n<li><strong>Policy Advocacy:<\/strong> Shaping the global policy ecosystem to enhance cyber and infrastructure security.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Global Collaborations and Norms:<\/strong> Beyond specific agencies, international organisations like the<strong> World Economic Forum (WEF)<\/strong> also contribute to global cybersecurity efforts. The WEF hosts discussions, shares best practices, and encourages cooperation among governments, businesses, and civil society.\n<ul class=\"wp-block-list\">\n<li>Norms of responsible behaviour in cyberspace are being developed globally. These norms aim to establish guidelines for state behaviour in the digital realm, emphasising responsible conduct and deterring malicious actions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-2734f1c80c44f4af3a36293d8b414e61\" style=\"color:#015aa7\"><strong>Related India\u2019s Efforts<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Indian Cyber Crime Coordination Centre (I4C):<\/strong> The Ministry of Home Affairs (MHA) established the<strong> Indian Cyber Crime Coordination Centre (I4C)<\/strong> to provide a framework and ecosystem for <strong>law enforcement agencies (LEAs)<\/strong> to deal with cybercrimes comprehensively and in a coordinated manner.\n<ul class=\"wp-block-list\">\n<li>The I4C plays a crucial role in preventing and investigating cyber offences.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Indian Computer Emergency Response Team (CERT-In): <\/strong>CERT-In is the national nodal agency responsible for coordinating responses to cybersecurity incidents, providing early warning and advisories, and promoting cybersecurity awareness and capacity building initiatives across various sectors.<\/li>\n\n\n\n<li><strong>Cyber Swachhta Kendra (Botnet Cleaning and Malware Analysis Centre): <\/strong>Launched by CERT-In, the Cyber Swachhta Kendra aims to detect and remove botnets and malware infections from computers and devices across the country.\n<ul class=\"wp-block-list\">\n<li>It provides free tools and services to users for securing their systems against cyber threats.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improving Cyber Forensic Facilities: <\/strong>The government recognizes the importance of robust cyber forensic capabilities. Investments have been made to improve forensic facilities, which aid in analysing digital evidence during investigations.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-13bd26f269d4aba21a5832038af167cc\" style=\"color:#015aa7\"><strong>Conclusion and Way Forward<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As AI continues to evolve, so does its impact on information warfare. While it presents challenges, it also offers opportunities for scalable solutions. Striking the right balance\u2014leveraging AI for societal benefit while safeguarding against its misuse\u2014is crucial in this digital battlefield.<\/li>\n\n\n\n<li>Our interconnected world demands coordinated efforts to safeguard truth, trust, and stability. And remember, even in the digital realm, eternal vigilance remains the price we pay for safety.<\/li>\n\n\n\n<li>It is crucial to be informed, vigilant, and collaborative to navigate this \u2018Cyber Chakravyuh\u2019 by <strong>strengthening cybersecurity measures<\/strong>, and fostering <strong>international cooperation against cyber threats<\/strong>.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-background has-fixed-layout\" style=\"background-color:#fff2cc\"><tbody><tr><td><strong>Daily Mains Practice Question<\/strong><br><strong>[Q]<\/strong> To what extent do you think the increasing sophistication of Artificial Intelligence (AI) is exacerbating the spread of disinformation, and how effectively can governments and societies counter this growing threat?<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.thehindu.com\/opinion\/lead\/disinformation-ai-and-cyber-chakravyuh\/article68517429.ece\" target=\"_blank\" rel=\"noopener\">Source: TH<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-round\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.nextias.com\/ca\/wp-content\/uploads\/2024\/08\/Daily-Editorial-Analysis-13-08-2024.pdf\">Download PDF<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The expanding horizons of disinformation, ever-evolving landscape of cyber threats, Artificial Intelligence (AI) and its different manifestations, including Generative AI and Artificial General Intelligence (AGI) create new waves of security threats and concerns over the security specialists the world over.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[],"class_list":["post-27344","post","type-post","status-publish","format-standard","hentry","category-editorial-analysis"],"acf":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/27344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=27344"}],"version-history":[{"count":3,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/27344\/revisions"}],"predecessor-version":[{"id":27354,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/27344\/revisions\/27354"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=27344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=27344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=27344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}