HomeBlogEmerging Technology: The Challenging Interplay between National Security and Fundamental Rights in...

Emerging Technology: The Challenging Interplay between National Security and Fundamental Rights in the Future of Intelligence

-

by: Byron Filog Allatog

            Moscow and Beijing’s relationship metamorphosed into becoming rational partners to diminish the Western-dominated international system after it opened its doors to the outside world under a shared geopolitical worldview of multipolarity (Stronski and Ng, 2018). China’s market opening to the global economy drove the country’s tremendous economic growth, and today has emerged as an economic powerhouse pushing its role on the world stage. It brought China’s focus on the positioning to build a strong military by its “quest to become a global ‘science and tech superpower’ on a major process to achieve civil-military integration and develop advanced dual-use technologies” (Nouwens and Legarda, 2018). Its mission has pushed the world further into a more complex setting in which emergent phenomena prompted changes in security posture and geopolitical dynamics in some regions. Countries affected by China’s positioning had focused on establishing their security posture by merging tech advancement and security alliances in their national security framework to advance and protect their values and interests. This paper argues that emerging technologies are creating a complex interplay between national security and fundamental rights, posing a challenging issue for the future of intelligence.

            Security posture and alliances are changing as critical and emerging technologies facilitate military hype, espionage, foreign interference, and cyber threats. Australia acknowledges the potential and risk posed by emerging technologies as it charts its direction in harnessing critical advanced technology to capacitate impact on its national interests: national security, economic prosperity, and social cohesion (DIST, n.d.). At the core of national security, this paper will engulf intelligence or information as a knowledge (Kent, 2016); its relationship to national security on how intelligence is collected, analyzed and disseminated in the context of the national security intelligence activity (Miller, 2022). The paper’s setting will cover Australia, and the relations will be in the country’s experiences and legal machinery, such as the Australian Security Intelligence Organization, ASIO. Further, the paper will discuss how emerging technologies impact the intelligence cycle at the core of Australian national security and fundamental rights and is organized in the following sequence. First, the emerging technology types and capabilities; second, the intelligence collection in countering espionage and foreign interference; and third, the blurring conditions elevating the myriad of ethical and societal questions it raises—ranging from fundamental rights (privacy) to national security.

            The information age embodies technological development’s social and economic transformation in the computing and communications (Degaut, 2016). China’s global push toward a more technologically advanced military is evident, as seen in its “utilization of emerging technologies- artificial intelligence, big data, and cloud computing to enhance the PLA’s C4ISR capabilities” (Kania and Costello, 2017). With this traction, Australia as a middle power and other world superpowers are investing too. It acknowledges that emerging technologies are enduringly changing the intelligence communities (IC) landscape, including military and law enforcement structures, in countering national security threats linked with emerging technologies. Meanwhile, there are nineteen (19) critical and emerging technologies (CET) that are identified and potentially significant in U.S. national security (The White House, 2022). However, in this section, two aspects of critical emerging technologies-Big Data and Artificial Intelligence are specifically covered. The following clarifies the importance of two emerging technologies concerning Australia: Big data is a broad term referring to overwhelmed data produced daily (Chi, 2017). Also, McCarthy (2004) described “AI as the science and engineering of making intelligent machines, especially intelligent computer programs.” AI combines computer science and robust datasets to enable problem-solving (IBM Cloud Education, 2020). In its simplest form, AI is a collection of related techniques and technologies, including machine learning, predictive analytics, natural language processing, and robotics (OVIC, n.d.). Australia underscores the emerging fields and its core to the safety and security of the country, as seen in its effort to boost the CET capability in exploring its standardization by building knowledge locally and regionally to develop an internationally accepted standard (Dunne, 2022).

            Big data and AI are the essentials of this paper’s emerging technologies not only it is interlinked “where AI is useless without data, and mastering data is insurmountable without AI” (Maryville University, n.d.). Likewise, it is directly connected with intelligence confronting Australia’s security threat of espionage and foreign interference (ASIO, n.d.). In the age of Big Data, the potential value of open-source information for intelligence (OSINT)-related purposes and other investigative research is widely established; “intelligence work has long relied on a combination of secrets and publicly-available information” (Bunnik et al., 2016). However, with much big data potential, three emerging threats confront Australia. Errey (2022) identified three emerging threats to Australia’s national security and nation-state power: “First, big data can confer a strategic advantage by enabling information dominance and improving kinetic targeting capability — the application of active military force; second, big data enables and “democratizes” targeting and surveillance; third, big data drives information warfare as well as social and political interference.” The political and social interference experienced by Australia in the form of foreign interference was eminent in an unmatched scale of activity against Australia’s interests that explicitly undermined the country’s national security, open system of government, and sovereignty (DHA, n.d.). For example, Australia’s open democratic system of government in advancing research studies was assaulted where research outputs were used to oppress religious and ethnic minorities across China, particularly Xinjiang, in algorithms and app-based surveillance systems (Joske, 2019). A form of targeting and surveillance, a perceived threat to Australia. Likewise, this specific case was an application of the deployment of Information Warfare (IW) in Xinjiang, which demonstrates that China perceives IW as achieving not only deterrent but also preventive or prophylactic effects, whereby IW is seen as an adjunct to more kinetic strategies in conflict (Clarke, 2019). A form of information dominance, a perceived threat to Australia. Furthermore, the development of China’s military technology, particularly on research in supercomputing which was labeled as core to the advancement of combat aircraft and tactical nuclear weapons in the course of collaboration among Australia and Chinese scientists, adds to the attack on the open government system (Pearlman, 2017). On the other hand, AI and machine learning offer great potential as valuable solutions for processing big and live data in government and business sectors. Policing agencies consider AI as a force multiplier that can process large amounts of data in a timely manner and supplement human teams’ efforts in resolving complex analytical problems. (Westendorf, 2022). The pieces of evidence highlight that despite the many potentials in emerging technologies to advance Australia’s interests and way of life, promising risks and threats are upfront impacting intelligence communities and law enforcement’s capabilities to protect Australia.

            Having established the triggers, espionage and foreign Interference associated with and enabled by these triggers (AI and Big Data) are Australia’s two active threats today. It is evident in the four laws legislated to deter and counter these national security threats and, as officially claimed by the ASIO chief, a foiled foreign interference (Westcott, 2022). These threats extended to Australian universities, too; data breaches and information theft extended to a high degree. The universities’ talent-recruitment programs in research and science were used as covert actions for data breaches and information theft (APH, n.d.). Searight (2020) settled “that the growing financial dependence of Australian universities on tuition revenue from Chinese students and research funding created a base of support within the upper echelons of academia.” Tracing back, espionage and foreign interference are not new to Australia. ASIO’s origins lie during the Cold War global espionage, which put Soviet spy rings active in Australia. However, the end of the Cold War did not cease using foreign powers’ espionage and foreign interference techniques (ASIO, n.d.). On the contrary to leveraging the existing threats, the big data landscape is changing the future Australian government as it creates new power dynamics between governments, citizens, companies, and nation-states, particularly in national security. According to ASD (n.d.), AI has the potential to provide critical support for intelligence collection in countering espionage and foreign interference. Firstly, AI can help prioritize tasks, allowing people to better address challenges and adapt to complex problems in the face of big data, advanced threats, and adversaries. Secondly, AI-powered computers can offer relevant and timely decision-making support to analysts. Thirdly, machine learning software can detect network data anomalies more effectively than humans due to the vast amount of data involved. Finally, AI can assist in protecting against data theft, ensuring the integrity and availability of both state and individual data.

            Meanwhile, as the spycraft counterintelligence endures and potentially thrives lies risk; the ASIO spy chief stated that encryption ‘damages intelligence coverage’ in 97% of ASIO’s priority counterintelligence cases” in Australia (Uren, 2022). Similarly, technological advancement strictly constrained information collection and dominance leveraging activities for the U.S. and other allies in the streets of China and Russia. Both countries increased the use of AI-biometric systems in port checkpoints and secondary screening efforts (Cunliffe, 2021). China’s counterintelligence efforts have employed an AI-aided fingerprint (Reuters, 2017) and an AI-aided facial recognition (NPR, 2021). Similarly, Russia employed both AI biometrics systems (The Moscow Times, 2021). In the world of spies, emerging technologies can be both denying and assuring, significantly revealing a challenging range for the intelligence communities.

            Another line of thought in the future of intelligence as technology emerges is that “there has always been a delicate balance between security and privacy concerning intelligence collection” (Pulver and Medina, 2018). AI is evolving and is all around us. It can be used for both noble and immoral. It has many benefits but raises many anxieties and concerns that adversely affect fundamental rights-privacy. For example, in a study made, Rodrigues (2020) argued that “the myriad legal issues affecting human rights principles connected to AI include: data protection, equality, freedoms, human autonomy and self-determination of the individual, human dignity, human safety, informed consent, integrity, justice and equity, non-discrimination, privacy, and self-determination.” Thus, the balance between upholding the fundamental values and securing Australia and its national interest using AI and big data in intelligence is unclear. It is then imperative to examine the potential impact on individuals and society, not solely on privacy-related issues but on biases against groups of individuals and varying fundamental rights (Mantelero, 2018). This conclusion examining the importance of emerging technology’s impact on national security and fundamental rights-privacy as “not solely restricted to privacy-related issues” strikes a balance between the two domains. It is argued that the two are equally essential icons in a democratic country; thus, upholding both is paramount, and not one is trumping the other, as in the case of data collection in OSINT is restricted because of the privacy rule. Etzioni (2015) argued that the state faces legitimate normative and legal claims, and one-sided attention cannot reconcile both intentions; thus, attention to none is an option; striking a balance is argued from this point in the context of “public interest” distinguished from the “common good” as it weighs the core values of both national security and fundamental rights-privacy. Thus, a balance works in conflicting claims of national security and fundamental rights, as the world has evolved with complexities sprouting and persistent.

            As has been shown, national security in the context of intelligence will continue to be an uphill challenge as technological tools are continuously emerging. Likewise, a constant engagement with the communities focusing on situation awareness is needed to seal the importance of striking a balance of national security and fundamental rights in the concept of public interest. The reason is that the world has evolved in its nature with the existence of the so-called virtual world, which is technologically connected and powered that never existed decades ago. For Australia, evidence highlights that despite the many potentials of emerging technologies in advancing its interests and way of life, assuring risks and threats are upfront for intelligence communities and law enforcement. In the world of spies, emerging technologies can be both denying and assuring, which significantly reveals a challenging range for the intelligence communities in Australia, and espionage and foreign interference are the prevalent threats. Moreover, keeping Australia safe surmounts a striking balance of national security and fundamental rights to preserve Australia’s way of life, integrity, and security, because fundamental rights are the building blocks of Australian democracy. For the future of intelligence in Australia, IC needs to be robust to adapt to the changing environment filled with emerging technologies.

References:

                  APH. (n.d.). The Sector’s awareness of national security risks [Government website]. Parliament of Australia. Retrieved      September 25, 2022, from https://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Intelligence_and_Security/NationalSecurityRisks/Repo rt/section?id=committees%2Freportjnt%2F024611%2F75621#footnote54target

                  ASD. (n.d.). Director-General ASD speech to ASPI Artificial Intelligence Master Class [Government website]. ASD Australian Signals Directorate. https://www.asd.gov.au/publications/director-general-asd-speech-aspi-artificial-intelligence- master-class

                  ASIO. (n.d.). Counter-espionage and foreign interference [Government website]. Australian Secuirity and Intelligence          Organisation. Retrieved September 19, 2022, from https://www.asio.gov.au/about/what-we-do/counter-espionage

                  Bunnik, A., Cawley, A., Mulqueen, M., & Zwitter, A. (2016). Big Data Challenges: Society, Security, Innovation and Ethics. Palgrave Macmillan UK. https://books.google.com.au/books?id=qN74DAEACAAJ

                  Chi, Michael. (2017). Big data in national security.

                  Cunliffe, K. S. (2021). Hard target espionage in the information era: New challenges for the second oldest profession. Intelligence and National Security36(7), 1018–1034. https://doi.org/10.1080/02684527.2021.1947555

                  Degaut, M. (2016). Spies and Policymakers: Intelligence in the Information Age. Intelligence and National Security31(4), 509–531. https://doi.org/10.1080/02684527.2015.1017931

                  DHA. (n.d.). Countering foreign interference [Government website]. Department of Home Affairs.          https://www.homeaffairs.gov.au/about-us/our-portfolios/national-security/countering-foreign-interference/resources-and-related-links

                  DIST. (n.d.). Blueprint for Critical Technologies [Government website]. Department of Industry, Science and Resources.     Retrieved September 23, 2022, from https://www.industry.gov.au/sites/default/files/2022-08/ctpco-blueprint-critical-technology.pdf

                  Dunne, J. (2022, August 18). Standards Australia Launches 2022 Critical and Emerging Technologies Program in South    East Asia [Non-Government]. Standards Australia. https://www.standards.org.au/news/standards-australia-launches-          2022-critical-and-emerging-technologies-program-in-south-east-asia

                  Etzioni, A. (2015). NSA: National Security vs. Individual Rights. Intelligence and National Security30(1), 100–136.              https://doi.org/10.1080/02684527.2013.867221

                  Hammond-Errey, M. (2022). Big data and national security: A guide for Australian policymakers.

                  IBM Cloud Education. (June 3, 2020). Artificial Intelligence (AI) [Coporate]. IBM. https://www.ibm.com/cloud/learn/what-is-  artificial-intelligence

                  Joske, A. (August 26, 2019). The company with Aussie roots that’s helping build China’s surveillance state [Think Tank]. ASPI Australian Strategic Policy Institute. https://www.aspistrategist.org.au/the-company-with-aussie-roots-thats-helping-     build-chinas-surveillance-state/

                  Kania, E., & Costello, J. (March 4, 2017). China’s Quest for Informatization Drives PLA Reforms. The Diplomat. https://thediplomat.com/2017/03/chinas-quest-for-informatization-drives-pla-reforms/

                  Kent, S. (2016). Index. In Strategic Intelligence for American World Policy (pp. 221–228). Princeton University Press.          https://doi.org/10.1515/9781400879151-016

                  Mantelero, A. (2018). AI and Big Data: A blueprint for a human rights, social and ethical impact assessment. Computer       Law & Security Review34(4), 754–772. https://doi.org/10.1016/j.clsr.2018.05.017

                  Maryville University. (n.d.). Big Data and Artificial Intelligence: How They Work Together. Maryville University.     https://online.maryville.edu/blog/big-data-is-too-big-without-ai/

                  McCarthy, J. (2004). What is Artificial Intelligence?

                  Michael Clarke. (2019). China’s Application of the ‘Three Warfares’ in the South China Sea and Xinjiang. Orbis   (Philadelphia)63(2), 187–208. https://doi.org/10.1016/j.orbis.2019.02.007

                  Miller, S. (2022). National security intelligence activity: A Philosophical analysis. Intelligence and National Security, 1–18.   https://doi.org/10.1080/02684527.2022.2076329

                  Nouwens, M., & Legarda, H. (2018, December 18). China’s pursuit of advanced dual-use technologies [Blog Website]. I     ISS. https://www.iiss.org/blogs/research-paper/2018/12/emerging-technology-dominance

                  NPR. (2021, January 5). Facial Recognition And Beyond: Journalist Ventures Inside China’s “Surveillance State” [News]. NPR. https://www.npr.org/2021/01/05/953515627/facial-recognition-and-beyond-journalist-ventures-inside-chinas- surveillance-sta

                  OVIC. (n.d.). Artificial Intelligence and Privacy-Issues and Chanllenges [Government website]. Office of the Victorian           Commissioner.

                  Pearlman, J. (2017, November 9). Growing unease in Australia over research partnerships with Chinese scientists [News]. The Straits Times. https://www.straitstimes.com/asia/australianz/growing-unease-in-australia-over-research-partnerships-between-chinese-scientists

                  Pulver, A., & Medina, R. M. (2018). A review of security and privacy concerns in digital intelligence collection. Intelligence and National Security33(2), 241–256. https://doi.org/10.1080/02684527.2017.1342929

                  Reuters. (2017, February 9). China to take fingerprints of foreign visitors as security step [News]. Reuters.           https://www.reuters.com/article/us-china-security-idUSKBN15O0EO

                  Rodrigues, R. (2020). Legal and human rights issues of AI: Gaps, challenges and vulnerabilities. Journal of Responsible    Technology4, 100005. https://doi.org/10.1016/j.jrt.2020.100005

                  Searight, A. (2020, May 8). Countering China’s Influence Operations: Lessons from Australia [Think Tank]. CSIS Center for Stratetic and International Studies. https://www.csis.org/analysis/countering-chinas-influence-operations-lessons-       australia

                  Stronski, P., & Ng, N. (2018, February 28). Cooperation and Competition: Russia and China in Central Asia, the Russian Far East, and the Arctic. CARNEGIE Endowment for International Peace.      https://carnegieendowment.org/2018/02/28/cooperation-and-competition-russia-and-china-in-central-asia-russian-far-east- and-arctic-pub-75673

                  The Moscow Times. (2021, July 21). Russia Imposes Biometric, Drug Screening for Foreigners [News]. The Moscow Times. https://www.themoscowtimes.com/2021/07/01/russia-imposes-biometric-drug-screening-for-foreigners-a74398

                  The White House. (2022, February 7). Technologies for American Innovation and National Security [Government website]. The Whitehouse. https://www.whitehouse.gov/wp content/uploads/2022/02/02-2022-Critical-and-Emerging-Technologies-List-Update.pdf

                  Uren, T. (2022, February 23). The future of assistance to law enforcement in an end-to-end encrypted world. ASPI Australian Strategic Policy Institute. https://www.aspi.org.au/report/future-assistance-law-enforcement-end-end-encrypted-world

                  Westcott, B. (2022, February 10). Australia Foiled Foreign Election Interference, Says Spy Chief [News]. Bloomberg.          https://www.bloomberg.com/news/articles/2022-02-10/australia-foiled-foreign-election-interference-says-spy-chief

                  Westendorf, T. (2022, April 8). Artificial intelligence and policing in Australia [Think Tank]. ASPI Australian Strategic Policy Institute. https://ad-aspi.s3.ap-southeast2.amazonaws.com/2022-          04/AI%20and%20policing%20in%20Australia_0.pdf?VersionId=1jIN6j1gQl1RQYBsuids2QePxz_hjFNP

Source: csop101.com

LEAVE A REPLY

Please enter your comment!
Please enter your name here

LATEST POSTS

A mother and father to her children, the strength of a strong willed woman

Written by: NUP Merlie A. Dacunos This week we will feature another empowered woman whose life was not a bed of roses. She initially faced many...

THE EMPOWERED AND INDEPENDENT WOMAN, RISING TO THE OCCASION TO BECOME A POLICE OFFICER

This month we will feature women of strength behind all the insurmountable obstacles they have faced, yet they came out successful and victorious in the...

A critical moment, how a woman took charge of her life

This week we will feature one admirable police officer who despite life’s downturn she decided to take charge of her life. She got pregnant at...

A FINE YOUNG LADY, SONGSTRESS AND A YOUNG LEADER, A BUDDING PUBLIC SERVANT

This week we will feature the life story of a Non-Uniformed Personnel who conquered politics at a young age and made ground breaking accomplishments while...

Most Popular

Sponsored Advertisement

spot_img