... III ICBMs. In view of this, the authors could have recommended that nuclear powers assume the principal responsibility for the cybersecurity of relevant NC3 systems. Although the report emphasises the mutual connections between NC3 systems for conventional and nuclear weapons, the real scale of this phenomenon remains under-researched.
Second, the authors note that new technologies could ... ... military purposes. It is quite obvious, among other things, that AI systems constitute a hardware-software complex vulnerable to cyberattacks. Additionally, the
research
showed
that, to provoke AI mistakes, no interference in the learning process is required: ...
Review of the NTI report “Nuclear Weapons in the New Cyber Age”
The subject of the interrelation of threats in the fields of information and communication ... ... agreements to the rapidly changing reality against the backdrop of the scientific and technological progress.
As for deliberate cyberattacks that may be of interest to states that have the requisite capabilities, we should take note of the
opinion
of the ...
... have crossed over to a new nuclear era in which cyber capabilities transform the nuclear risks. A successful cyberattack on nuclear weapons or related systems—including nuclear planning systems, early warning systems, communication systems, and delivery ... ... should identify cooperative actions and identify norms and rules of the road—for example, agreement to refrain from using cyberattacks against nuclear weapons systems—as well as confidence building and verification measures that could enhance confidence ...