Egypt's security with military artificial intelligence is not a technical luxury - Beacon

Latest

Tuesday, July 15, 2025

Egypt's security with military artificial intelligence is not a technical luxury

Egypt's security with military artificial intelligence is not a technical luxury
Egypt's military AI security is not a technical luxury.


From the Field to Servers: New Wars with Artificial Intelligence


Modern wars are no longer waged solely with missiles and tanks. They are now being led from within server rooms and by artificial intelligence algorithms. In an era where armies rely on intelligent systems for decision-making, the security of these systems has become a matter of "life or destruction." Have hackers become the soldiers on the battlefield?


What if AI systems fall into enemy hands?


Dr. Mohamed Mohsen Ramadan, a lecturer in cybersecurity at the Egyptian Military Academy, says that major armies today use AI to analyze intelligence data, guide drones, operate missile defense systems, manage combat robots, and even make autonomous combat decisions without direct human intervention. This digital transformation in the military field has given armies unprecedented superiority in speed and accuracy, but at the same time, it has created a serious security vulnerability: What if these systems fall into enemy hands?


He continued: "Artificial intelligence in armies is a completely vulnerable force. Despite the extraordinary capabilities these systems offer, their reliance on algorithms and digital technologies makes them vulnerable to cyberattacks. Communication networks, data centers, satellites, and even the software itself may be targeted by professional hackers or hostile intelligence agencies.


If any such hacking is successful, the consequences could be catastrophic. Drones could be taken over and turned into lethal tools directed at civilian or friendly targets, air defense systems could be disabled at critical times, opening the way for devastating attacks, and the manipulation of the decisions of autonomous systems such as combat robots, allowing them to attack their own forces instead of the enemy. Sensitive intelligence data could also be leaked, or AI itself could be exploited to gather information for the enemy.


A Weakness in Some Cases


Mohammed Mohsen Ramadan pointed out that what was once thought to be a fantasy scenario has become a reality. In 2011, Iran announced the downing of a US RQ-170 drone using a cyberattack. In 2021, cyberattacks targeting military systems in the Middle East were recorded, while US defense systems were subjected to failed tests in 2020 due to a cyberattack during combat simulations. These incidents clearly demonstrate that military artificial intelligence is not immune; in some cases, it represents more of a weakness than an advantage.


How are these attacks carried out?


The spokesman revealed that cyberattacks on smart military systems rely on a variety of methods, including attacks over open or insecure networks, implanting malware within software or equipment supplied to the military, social engineering to lure human elements into the military establishment, exploiting supply chains, and hacking suppliers before the systems reach the military.


Regarding solutions to address vulnerabilities, former First Assistant Minister of Interior, Major General Abu Bakr Abdul Karim, said: "Cybersecurity must be equal in strength to artificial intelligence to protect these systems. Cybersecurity must be integrated into the core of military design. Among the most important measures are relying on closed networks not connected to the internet to reduce the risk of external hacking, developing self-defense AI systems capable of detecting and responding to attacks in real-time, and training officers and soldiers in cybersecurity and social engineering techniques."


"Military AI security is not a luxury."


He continued: "In addition to establishing security operations centers (SOCs) dedicated to the military domain, capable of immediate monitoring and response, and international cooperation to establish ethical and technical standards for protecting military AI and preventing its use in hostile cyber warfare, military AI security is not a technical luxury, but a national necessity to protect sovereignty and defend the land and humanity. In a battle now being fought using algorithms, a state's true shield is its cybersecurity."

No comments:

Post a Comment