SlideShare a Scribd company logo
1 of 4
Download to read offline
1 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023
2 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023
AI & Intelligent Cybersecurity meet 21st
GeoPolitics!
1) Background Brief: In this White Paper we briefly explore the historical development of AI &
Cybersecurity & their impact on national security & international politics. AI was originally conceived
80 years ago way back in 1943 as “Neural Networks” by McCulloch & Pitts, and then further
developed during the 1950s & 60s to become a concrete field of scientific exploration. Cybersecurity
evolved around 40 years during the early 1980s and initially referred to as Information Security
during the early commercial Internet of the 1990s. During these times AI & Cyber research software
was freely available. In comparison, for many years there were strong Export Restrictions on
Computer Hardware graded by the performance parameters such MIPS (Millions of Instructions/Sec).
This included bans on exports of most powerful Western Computers to countries/regions such as
USSR, Libya, Iran & North Vietnam.
2) 21st
C Trends: Whilst the 20th
C was more concerned with Physical Hardware and the colonisation
of “Space”. Now in the 21st
C we are strongly focused on the Virtual or CyberWorld and “Time”.
Events in the Physical Space take place at maximum factors of the “Speed of Sound” – hence our
20th
C obsession with Supersonic Flight & Supersonic Cars! In the 21st
C Events take place along fibre
optics at the “Speed of Light” to provide “Real-Time” Streams, and the evolution of the Metaverse.
So whereas in the 20th
C the key threats were physical nuclear weapons, there is now increasing
concern regarding the weaponisation of Cyber AI for both defensive and offensive missions.
3) Intelligent Convergence: As just mentioned, Cybesecurity and AI have come together
commercially in products such as the DARKTRACE Solution (www.darktrace.com) which pioneered
the application of AI (Recursive Bayesian Estimation – RBE – as well as Deep-Learning Neural Nets) to
Intelligent Cybersecurity around 10 years ago in Cambridge, UK. Since then, most major
Cybersecurity vendors have upgraded their software to provide Intelligent AI-based products which
mitigates against Zero-Day Attack, Custom Malware & Ransomware. Already there are UK
Government Export Controls on Darktrace Products and the US Government also issues regular
updates on new Export Controls on Cybersecurity Software in the: Federal Register :: Information
Security Controls: Cybersecurity Items – May2022 & Sept2022. In the rest of this short white paper
we explore the motivation, risks and future trends of Cyber AI in the context of Geopolitics.
4) Intelligent Integration: We now see the integration & convergence of Physical and Cyber
Solutions within Industrial, Government and National Critical Infrastructure. So whilst in the 20th
C
the major export risks were related to hardware such as computers & jet fighters. Now National
Governments are concerned with the strategic risks of exporting both their CyberAI Software as well
as fully integrated Cyber-Physical Systems which maybe for Healthcare, Smart Cities, Energy
Production, Military Surveillance o r Industrial Process Control. Such Intelligent Integrated systems
now have both commercial and strategic value as National Assets that control and manage their
Critical Infrastructure.
5) National Cyber Assets: Cybersecurity has moved beyond the Phase I physical metaphor based
upon Firewalls & Virus Checks to the Phase 2 Real-Time Virtual Metaphor based upon monitoring &
surveillance of ALL events in the enterprise or government network. In addition, CyberSecurity has
now been developed as a key element of military information warfare and the basis of customised
3 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023
cyber weapons that can survey, monitor & infiltrate the critical network assets of unfriendly states.
The US Government started to include Cyber within the original C4ISR DOD Integrated Architectures
of the 1990s. Most Cyber and AI Software can be interpreted as potentially providing “Dual
Civilian/Military” Applications. Hence Nations will increasingly establish Legal Frameworks of Rules
and Regulations to control the Export of CyberAI within known “Friendly Countries/Regions”.
6) National Export Controls: A useful summary of historical Export Controls in Selected Countries
will be found in : Historical Background of Export Control Development in Selected Countries and
Regions (cistec.or.jp) . You will see that controls on hardware go back many decades. However, for
reasons discussed above, we are sure to see strong rules & regulations established for Intelligent
CyberAI Software and integrated Intelligent Cyber-Physical Solutions during the coming 5 to 10 years.
Whilst working for Digital Equipment Corporation in the 1980s/1990s, I regularly undertook Training
on Export Licensing Controls which were most rigorously enforced by both US/UK/EU Governments.
These mainly concerned the export of Computer Hardware, Networking & Database Systems to
“unfriendly countries”. Now we can expect to see similar Rules to be applied with both mainstream
and start-up businesses concerned with Intelligent CyberAI Software, particularly when it may be
implemented with National Critical and Military Cyber Assets & Infrastructure.
7) Critical Cyber Infrastructure: National Governments are now concerned at the risks related to
both criminal & politically motivated attacks on their critical national infrastructure. This may be for
commercial gain through ransomware or for military & political advantage as an element of 21st
C
Cyberwarfare. The UN/ITU has been implementing a programme for almost 15 years to motivate
National Governments to boost the resilience of their cyber infrastructure. You will find the latest
edition of the UN/ITU Cybersecurity Index @ www.itu.int/en/ITU-D/Cybersecurity/Pages/global-
cybersecurity-index.aspx . The 1st Edition of the Official UN/TU Cybersecurity Guide @
www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-national-cybersecurity-guide.pdf was based largely
upon a 2009/2010 UN/ITU Mission undertaken by myself and Dr Frederick Wamala. During the last
12 years we have seen significant global interest & investment in Government CyberAI Solutions
focused upon defence of Critical National Enterprise & Military Infrastructure.
8) Vertical Cyber Sectors: Most of our discussion has so far been generic with regard to critical
national assets. However, the marketplace for CyberAI is already differentiating and zooming in on
specific market sectors such as Healthcare, Agriculture, Industrial ICS/SCADA Process Control,
Education, Energy Systems, Transportation, Military/Defence, Smart Cities & ICT/ Mobile/
Telecommunications. In each sectors there are specific risks from the free export of software,
patents & intellectual assets & secrets. A key problem & risk is that the export of Physical Products
such as computers, required some finite time, physical controls & shipment logistics. In addition
criminal sippliers of contraband hardware systems in the 1980s/90s were well known to use
Shipment Diversions to “Friendly” 3rd
Countries to hide the true final destination to an “unfriendly”
state such as Iran, Libya or USSR. However, for illegal Software Exports this is far tougher to monitor
and prevent. 128GBytes of Encrypted Software could be transmitted through a network of High-
Speed Proxy Servers in Multiple Countries within just minutes. So new authentication methods will
be required to secure National Critical CyberAI Software such Encrypted Quantum Computer-based
“Dongles” integrated with GPS satellite tracking devices! There will still be risks that CyberAI
Software may be decrypted & reverse engineered. Indeed, computer specialists in the USSR/Warsaw
Pact Countries were experts with reverse engineering IBM/DEC Hardware Mainframe and Mini-
4 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023
Computers throughout the 1970s/1980s! In any case, National Governments will need to give
thought to both Generic CyberAI Export Controls as well as those for each and e very Vertical Cyber
Sector. For example, in Healthcare there is considerable Intellectual Financial Value wraped up in
Genetic Sequencing and Manufacture of mRNA Vaccines such as those for COVID-19. Much of the
R&D effort nowadays is based upon Healthcare Specific CyberAI Software for DNA/RNA Analysis,
Sequencing, Testing and Manufacture. So the mRNA Vaccine Software System will have significant
Commercial Value within the Context of the National Government & State.
9) Investment in 21st
C Cyber AI: In past decades, software developers could be confident that
they could pretty much freely export their products worldwide apart from a few possible exceptions
such as North Korea and Iran. 50 Years ago in Summer 1973 I started work on my Doctorate Degree
on “Self-Organisation & Stochastic Machine Learning – The Evolution of Stochastic Automata” @
Maths Dept, Cambridge University, UK . Download: www.valentina.net/vaza/CyberDocs/Thesis.pdf
Through theoretical research & computer simulations I soon became aware of the eventual
importance and value of AI/ML but during the 1970s – “AI Winter” there was a low level of interest
with all eyes back then on “Optimal Control Systems”! So it is now personally fulfilling to now see the
widespread applications of CyberAI within all spheres of Government and Society. However it is
becoming increasingly clear that groups of “Friendly Countries” such as NATO Members & “The West”
will strongly manage the export of CyberAI Software to the “Unfriendly World” such as BRICS & their
Allies. Conversely countries such as China & Russia who both have strong known CyberAI capabilities
themselves will similarly restrict software & systems exports to the “Western World”. So with
regards to Investment in CyberAI Start-ups & subsequent marketing there needs to be a strategic
framework of countries & vertical sectors as the target market. National Governments in particular
will probably wish some form of exclusive ownership of advanced CyberAI for Cyber Warfare.
10) Summary: Investment on 21st
C CyberAI Start-ups should ideally be targeted & marketed on
specific Verticals or Geographical “Friendly” Regions in contrast to previous decades when
developments were targeted primarily horizontally & globally! Export Controls for all forms of
CyberAI will become “the norm” during the next 5 to 10 years so be prepared! The software business
is likely to become even more customised to specific verticals which will be the location of the bulk
of the “added value”. The generic horizontal CyberAI Platforms will still be generally exportable but
much more “content free” with lower value than previous decades. The next few years to 2030 will
see CyberAI Software Systems mainstream throughout both the “friendly & unfriendly worlds” and
will become key elements within National Critical Assets & Sectors. Protection Mechanisms, Export
Controls & further Rules & Regulations will be implemented and strongly enforced in both East &
West! So whilst Nuclear Weapons were the Military Currency of the 20th
C, so CyberAI will become
the Military Mainstream Currency of the mid to late 21st
C – In addition, the Business Winners of the
mid-21st
C will be those enterprises and industries that fully embrace the benefits and transformation
of Intelligent CyberAI Systems. Every Week we see leading articles and features in practically EVERY
Sector Media Magazine, Newsletter and Social Media Platform on AI Implementations, Smart
ChatBots & CyberSecurity. Such CyberAI Developments will define the Leading GeoPolitical Nations
& Businesses from Start-Ups to Corporations of our coming mid-late 21st
C! Be AI Wise & Be Prepared!
Acknowledgement: Thanks so much to Jake Chasan @ Sapphire Ventures, San Francisco, CA, USA,
for our inspirational online discussion & for originally suggesting research into this compelling topic!

More Related Content

Similar to AI & Cybersecurity meet 21stC GeoPolitics

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Dr David Probert
 
21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma 21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma Mohamed N. El-Guindy
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?Utah Tech Labs
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksBGA Cyber Security
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...TI Safe
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devicesijtsrd
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptjdenbryston
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & BlockchainDr David Probert
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsDr David Probert
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 
Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?Jyrki Kasvi
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...IJNSA Journal
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPERTanvi Jindal
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurityVadimDavydov3
 

Similar to AI & Cybersecurity meet 21stC GeoPolitics (20)

IBM Xforce Q4 2014
IBM Xforce Q4 2014IBM Xforce Q4 2014
IBM Xforce Q4 2014
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!Smart Security Architectures for YOUR Business!
Smart Security Architectures for YOUR Business!
 
21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma 21st Century Threats and Middle East Dilemma
21st Century Threats and Middle East Dilemma
 
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
IoT Devices Security Threats in 2023. How to Protect Your IoT Ecosystem?
 
Critical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
 
P04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdfP04-AIDC-NAM-IDC04.pdf
P04-AIDC-NAM-IDC04.pdf
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e c...
 
Trust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT DevicesTrust Modelling for Security of IoT Devices
Trust Modelling for Security of IoT Devices
 
Cisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.pptCisco Cyber Essentials - Instructor materials.ppt
Cisco Cyber Essentials - Instructor materials.ppt
 
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
21stC Trends in FinTech Security - AI, Deep Learning & Blockchain
 
Integrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of ThingsIntegrated Cybersecurity and the Internet of Things
Integrated Cybersecurity and the Internet of Things
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?Finland, a cyber threat preparedness forerunner?
Finland, a cyber threat preparedness forerunner?
 
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
UNDERSTANDING TRAFFIC PATTERNS OF COVID-19 IOC IN HUGE ACADEMIC BACKBONE NETW...
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Modern technologies and cybersecurity
Modern technologies and cybersecurityModern technologies and cybersecurity
Modern technologies and cybersecurity
 

More from Dr David Probert

From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)Dr David Probert
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC DonetskDr David Probert
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Dr David Probert
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureDr David Probert
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!Dr David Probert
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Dr David Probert
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & PrivacyDr David Probert
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!Dr David Probert
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!Dr David Probert
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Dr David Probert
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureDr David Probert
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... Dr David Probert
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!Dr David Probert
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Dr David Probert
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!Dr David Probert
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Dr David Probert
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!Dr David Probert
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!Dr David Probert
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...Dr David Probert
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsDr David Probert
 

More from Dr David Probert (20)

From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)From Hughesovka to Donetsk (Translated to Russian)
From Hughesovka to Donetsk (Translated to Russian)
 
19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk19thC Hughesovka to 21stC Donetsk
19thC Hughesovka to 21stC Donetsk
 
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
Intelligent, Integrated Cybersecurity - CyberCrime, CyberTerror & CyberWar!
 
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National InfrastructureUpgrading Industrial CyberSecurity & Security Critical National Infrastructure
Upgrading Industrial CyberSecurity & Security Critical National Infrastructure
 
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!21stC Trends in CyberSecurity in the Finance & Banking Sectors  Security!
21stC Trends in CyberSecurity in the Finance & Banking Sectors Security!
 
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
Effective CyberSecurity for the 2020s - Intelligent Analytics & Modelling
 
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
24/7 Intelligent Video Surveillance: Securing Your Business Data & Privacy
 
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
KolaNet 1992-1999 and Beyond! Arctic Environmental Monitoring Networks!
 
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
CyberVision: 2020 to 2030 - Your 21stC Cybersecurity Toolkit!
 
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
Intelligent Cyber Surveillance: AI Video Analytics & Biometrics!
 
Cybersecurity for Critical National Infrastructure
Cybersecurity for Critical National InfrastructureCybersecurity for Critical National Infrastructure
Cybersecurity for Critical National Infrastructure
 
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!... 21stC Cybersecurity Trends: 2018-2025 & Beyond!...
21stC Cybersecurity Trends: 2018-2025 & Beyond!...
 
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
CyberSecurity Futures: 2018 - 2025+ - Technology, Tools & Trends!
 
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!Cyber Threats & Defence! - "Intelligent CyberSecurity"!
Cyber Threats & Defence! - "Intelligent CyberSecurity"!
 
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
21stC CyberSecurity Defence: Next 7 Years - 2018 to 2025!
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!YOUR Defence for the TOP 10 Cyber Threats!
YOUR Defence for the TOP 10 Cyber Threats!
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
CyberTerror-CyberCrime-CyberWar! - Crucial Role of CyberSecurity in "War on T...
 
Energising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital ForensicsEnergising Cybersecurity with Biometrics & Digital Forensics
Energising Cybersecurity with Biometrics & Digital Forensics
 

Recently uploaded

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

AI & Cybersecurity meet 21stC GeoPolitics

  • 1. 1 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023
  • 2. 2 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023 AI & Intelligent Cybersecurity meet 21st GeoPolitics! 1) Background Brief: In this White Paper we briefly explore the historical development of AI & Cybersecurity & their impact on national security & international politics. AI was originally conceived 80 years ago way back in 1943 as “Neural Networks” by McCulloch & Pitts, and then further developed during the 1950s & 60s to become a concrete field of scientific exploration. Cybersecurity evolved around 40 years during the early 1980s and initially referred to as Information Security during the early commercial Internet of the 1990s. During these times AI & Cyber research software was freely available. In comparison, for many years there were strong Export Restrictions on Computer Hardware graded by the performance parameters such MIPS (Millions of Instructions/Sec). This included bans on exports of most powerful Western Computers to countries/regions such as USSR, Libya, Iran & North Vietnam. 2) 21st C Trends: Whilst the 20th C was more concerned with Physical Hardware and the colonisation of “Space”. Now in the 21st C we are strongly focused on the Virtual or CyberWorld and “Time”. Events in the Physical Space take place at maximum factors of the “Speed of Sound” – hence our 20th C obsession with Supersonic Flight & Supersonic Cars! In the 21st C Events take place along fibre optics at the “Speed of Light” to provide “Real-Time” Streams, and the evolution of the Metaverse. So whereas in the 20th C the key threats were physical nuclear weapons, there is now increasing concern regarding the weaponisation of Cyber AI for both defensive and offensive missions. 3) Intelligent Convergence: As just mentioned, Cybesecurity and AI have come together commercially in products such as the DARKTRACE Solution (www.darktrace.com) which pioneered the application of AI (Recursive Bayesian Estimation – RBE – as well as Deep-Learning Neural Nets) to Intelligent Cybersecurity around 10 years ago in Cambridge, UK. Since then, most major Cybersecurity vendors have upgraded their software to provide Intelligent AI-based products which mitigates against Zero-Day Attack, Custom Malware & Ransomware. Already there are UK Government Export Controls on Darktrace Products and the US Government also issues regular updates on new Export Controls on Cybersecurity Software in the: Federal Register :: Information Security Controls: Cybersecurity Items – May2022 & Sept2022. In the rest of this short white paper we explore the motivation, risks and future trends of Cyber AI in the context of Geopolitics. 4) Intelligent Integration: We now see the integration & convergence of Physical and Cyber Solutions within Industrial, Government and National Critical Infrastructure. So whilst in the 20th C the major export risks were related to hardware such as computers & jet fighters. Now National Governments are concerned with the strategic risks of exporting both their CyberAI Software as well as fully integrated Cyber-Physical Systems which maybe for Healthcare, Smart Cities, Energy Production, Military Surveillance o r Industrial Process Control. Such Intelligent Integrated systems now have both commercial and strategic value as National Assets that control and manage their Critical Infrastructure. 5) National Cyber Assets: Cybersecurity has moved beyond the Phase I physical metaphor based upon Firewalls & Virus Checks to the Phase 2 Real-Time Virtual Metaphor based upon monitoring & surveillance of ALL events in the enterprise or government network. In addition, CyberSecurity has now been developed as a key element of military information warfare and the basis of customised
  • 3. 3 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023 cyber weapons that can survey, monitor & infiltrate the critical network assets of unfriendly states. The US Government started to include Cyber within the original C4ISR DOD Integrated Architectures of the 1990s. Most Cyber and AI Software can be interpreted as potentially providing “Dual Civilian/Military” Applications. Hence Nations will increasingly establish Legal Frameworks of Rules and Regulations to control the Export of CyberAI within known “Friendly Countries/Regions”. 6) National Export Controls: A useful summary of historical Export Controls in Selected Countries will be found in : Historical Background of Export Control Development in Selected Countries and Regions (cistec.or.jp) . You will see that controls on hardware go back many decades. However, for reasons discussed above, we are sure to see strong rules & regulations established for Intelligent CyberAI Software and integrated Intelligent Cyber-Physical Solutions during the coming 5 to 10 years. Whilst working for Digital Equipment Corporation in the 1980s/1990s, I regularly undertook Training on Export Licensing Controls which were most rigorously enforced by both US/UK/EU Governments. These mainly concerned the export of Computer Hardware, Networking & Database Systems to “unfriendly countries”. Now we can expect to see similar Rules to be applied with both mainstream and start-up businesses concerned with Intelligent CyberAI Software, particularly when it may be implemented with National Critical and Military Cyber Assets & Infrastructure. 7) Critical Cyber Infrastructure: National Governments are now concerned at the risks related to both criminal & politically motivated attacks on their critical national infrastructure. This may be for commercial gain through ransomware or for military & political advantage as an element of 21st C Cyberwarfare. The UN/ITU has been implementing a programme for almost 15 years to motivate National Governments to boost the resilience of their cyber infrastructure. You will find the latest edition of the UN/ITU Cybersecurity Index @ www.itu.int/en/ITU-D/Cybersecurity/Pages/global- cybersecurity-index.aspx . The 1st Edition of the Official UN/TU Cybersecurity Guide @ www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-national-cybersecurity-guide.pdf was based largely upon a 2009/2010 UN/ITU Mission undertaken by myself and Dr Frederick Wamala. During the last 12 years we have seen significant global interest & investment in Government CyberAI Solutions focused upon defence of Critical National Enterprise & Military Infrastructure. 8) Vertical Cyber Sectors: Most of our discussion has so far been generic with regard to critical national assets. However, the marketplace for CyberAI is already differentiating and zooming in on specific market sectors such as Healthcare, Agriculture, Industrial ICS/SCADA Process Control, Education, Energy Systems, Transportation, Military/Defence, Smart Cities & ICT/ Mobile/ Telecommunications. In each sectors there are specific risks from the free export of software, patents & intellectual assets & secrets. A key problem & risk is that the export of Physical Products such as computers, required some finite time, physical controls & shipment logistics. In addition criminal sippliers of contraband hardware systems in the 1980s/90s were well known to use Shipment Diversions to “Friendly” 3rd Countries to hide the true final destination to an “unfriendly” state such as Iran, Libya or USSR. However, for illegal Software Exports this is far tougher to monitor and prevent. 128GBytes of Encrypted Software could be transmitted through a network of High- Speed Proxy Servers in Multiple Countries within just minutes. So new authentication methods will be required to secure National Critical CyberAI Software such Encrypted Quantum Computer-based “Dongles” integrated with GPS satellite tracking devices! There will still be risks that CyberAI Software may be decrypted & reverse engineered. Indeed, computer specialists in the USSR/Warsaw Pact Countries were experts with reverse engineering IBM/DEC Hardware Mainframe and Mini-
  • 4. 4 AI & Cybersecurity meets 21stC Geopolitics – Dr David E Probert – VAZA – 21st Feb 2023 Computers throughout the 1970s/1980s! In any case, National Governments will need to give thought to both Generic CyberAI Export Controls as well as those for each and e very Vertical Cyber Sector. For example, in Healthcare there is considerable Intellectual Financial Value wraped up in Genetic Sequencing and Manufacture of mRNA Vaccines such as those for COVID-19. Much of the R&D effort nowadays is based upon Healthcare Specific CyberAI Software for DNA/RNA Analysis, Sequencing, Testing and Manufacture. So the mRNA Vaccine Software System will have significant Commercial Value within the Context of the National Government & State. 9) Investment in 21st C Cyber AI: In past decades, software developers could be confident that they could pretty much freely export their products worldwide apart from a few possible exceptions such as North Korea and Iran. 50 Years ago in Summer 1973 I started work on my Doctorate Degree on “Self-Organisation & Stochastic Machine Learning – The Evolution of Stochastic Automata” @ Maths Dept, Cambridge University, UK . Download: www.valentina.net/vaza/CyberDocs/Thesis.pdf Through theoretical research & computer simulations I soon became aware of the eventual importance and value of AI/ML but during the 1970s – “AI Winter” there was a low level of interest with all eyes back then on “Optimal Control Systems”! So it is now personally fulfilling to now see the widespread applications of CyberAI within all spheres of Government and Society. However it is becoming increasingly clear that groups of “Friendly Countries” such as NATO Members & “The West” will strongly manage the export of CyberAI Software to the “Unfriendly World” such as BRICS & their Allies. Conversely countries such as China & Russia who both have strong known CyberAI capabilities themselves will similarly restrict software & systems exports to the “Western World”. So with regards to Investment in CyberAI Start-ups & subsequent marketing there needs to be a strategic framework of countries & vertical sectors as the target market. National Governments in particular will probably wish some form of exclusive ownership of advanced CyberAI for Cyber Warfare. 10) Summary: Investment on 21st C CyberAI Start-ups should ideally be targeted & marketed on specific Verticals or Geographical “Friendly” Regions in contrast to previous decades when developments were targeted primarily horizontally & globally! Export Controls for all forms of CyberAI will become “the norm” during the next 5 to 10 years so be prepared! The software business is likely to become even more customised to specific verticals which will be the location of the bulk of the “added value”. The generic horizontal CyberAI Platforms will still be generally exportable but much more “content free” with lower value than previous decades. The next few years to 2030 will see CyberAI Software Systems mainstream throughout both the “friendly & unfriendly worlds” and will become key elements within National Critical Assets & Sectors. Protection Mechanisms, Export Controls & further Rules & Regulations will be implemented and strongly enforced in both East & West! So whilst Nuclear Weapons were the Military Currency of the 20th C, so CyberAI will become the Military Mainstream Currency of the mid to late 21st C – In addition, the Business Winners of the mid-21st C will be those enterprises and industries that fully embrace the benefits and transformation of Intelligent CyberAI Systems. Every Week we see leading articles and features in practically EVERY Sector Media Magazine, Newsletter and Social Media Platform on AI Implementations, Smart ChatBots & CyberSecurity. Such CyberAI Developments will define the Leading GeoPolitical Nations & Businesses from Start-Ups to Corporations of our coming mid-late 21st C! Be AI Wise & Be Prepared! Acknowledgement: Thanks so much to Jake Chasan @ Sapphire Ventures, San Francisco, CA, USA, for our inspirational online discussion & for originally suggesting research into this compelling topic!