... cybersecurity of relevant NC3 systems. Although the report emphasises the mutual connections between NC3 systems for conventional and nuclear weapons, the real scale of this phenomenon remains under-researched.
Second, the authors note that new technologies could ... ... military purposes. It is quite obvious, among other things, that AI systems constitute a hardware-software complex vulnerable to cyberattacks. Additionally, the
research
showed
that, to provoke AI mistakes, no interference in the learning process is required: ...
... attention to the complex dynamics of military-political relations in the event of a further escalation in rhetoric concerning cyberattacks preventing combat missile launches as part of the so-called “left of launch” concept, which the General Staff ... ...
Strictly speaking, the problem of the “rules of the game” in cyberspace is important in and of itself, without being tied to nuclear weapons. For instance, attempts can be made to train “cyber soldiers” to follow the rules of international humanitarian ...
... in addition to the nuclear weapons themselves — could have catastrophic consequences.
Bilateral and multilateral dialogues should identify cooperative actions and identify norms and rules of the road—for example, agreement to refrain from using cyberattacks against nuclear weapons systems—as well as confidence building and verification measures that could enhance confidence in future agreements.
The nations in the Euro-Atlantic region are confronting a range of significant issues today. But none should distract ...