《凱捷(Capgemini):2025軟件定義國防:人工智能(AI)時代下歐洲安全的戰略保障研究報告(英文版)(47頁).pdf》由會員分享,可在線閱讀,更多相關《凱捷(Capgemini):2025軟件定義國防:人工智能(AI)時代下歐洲安全的戰略保障研究報告(英文版)(47頁).pdf(47頁珍藏版)》請在三個皮匠報告上搜索。
1、Safeguarding Europes Security in the age of AISoftware is eating Defense2Safeguarding Europes Security in the age of AIPublished on the occasion of the Munich Security Conference 2025Disclaimer:This report is not an official publication of the Munich Security Conference(MSC).The contents of this pap
2、er do not purport to reflect the opinions or views of the MSC and is meant to provide input to and stimulate the debate at the MSC.The world is undergoing a profound geopolitical and technological transformation.Artificial Intelligence has changed defense,and post-quantum cryptography will be essent
3、ial to protecting its future.This report provides leaders with a roadmap to navigate this critical juncture and harness the potential of technology to safeguard Europes strategic autonomy and resilience.3Safeguarding Europes Security in the age of AITable of contentsFOREWORD.4EXECUTIVE SUMMARY.5SUMM
4、ARY OF RECOMMENDATIONS.6EUROPE AT A TECHNOLOGICAL CROSSROADS.7INTRODUCTION.8SECURING AI TO SECURE EUROPE.10NATOS VIEW ON ARTIFICIAL INTELLIGENCE.17GLOBAL TRENDS IN AI R&D.18SHAPING SECURITY FOR THE QUANTUM AGE.20SECURITY IN THE QUANTUM AGE.21NATOS VIEW ON QUANTUM TECHNOLOGIES.25GLOBAL TRENDS IN QUAN
5、TUM AND POST-QUANTUM CRYPTOGRAPHY R&D.26AI AND QUANTUM TECHNOLOGIES AT THE SERVICE OF DEMOCRATIC STABILITY AND SECURITY.28STRATEGIC RECOMMENDATIONS.29CONCLUSION.35CONTRIBUTORS.36BIBLIOGRAPHY.41END NOTES.454Safeguarding Europes Security in the age of AISecuring the future of our democracies requires
6、proactive steps,as conflict will persist,adversaries will mobilize,and AI and QC will continue to evolve.To best prepare for future challenges,we can call on the strategic,innovative,and technological excellence available in the industry to:Foreword Andreas Conradi,Head of Defense Europe&Executive V
7、ice President,Capgemini National security and defense have never been more critical in the face of unpredictable,rapidly evolving threats.And it is the role of cutting-edge technologies,seamlessly integrated across every aspect of defense,that is enabling the industry to address emerging challenges
8、with unmatched agility and precision.The concept of software eats defense underscores the growing importance of software and digital solutions as strategic drivers of innovation.Governments and armed forces now face not only traditional weaponry but also the weaponization of technologytools readily
9、exploited by adversaries and increasingly embedded within domestic security infrastructures.Staying ahead and securing the future calls for a forward-looking vision where digital solutions are central to strategic advancements,enhancing capabilities,resilience,and agility in a rapidly evolving lands
10、cape.Nowhere is this more evident than in the emergence of artificial intelligence(AI)and quantum computing(QC).In a relatively short time,the velocity and volume at which AI processes information have become critical to military decision-making,serving as a guiding force in helping armed forces nav
11、igate the fog of war.Meanwhile,QC is a rapidly emerging technology capable of obliterating even the most robust security defenses by todays standards.The convergence of these disruptive yet transformative technologies provide national defense with two invaluable assets.However,it also presents adver
12、saries with two powerful tools for attackattacks that can unfold quickly,are difficult to detect,and can cause widespread damage in an instant.To capitalize on the opportunities presented by AI and QC,while future-proofing defense capabilities,we need to operate with the most stringent security stan
13、dards.Understanding the origins and training of AI,as well as ensuring it remains immune to adversarial influence,is more critical than ever.With the arrival of QC on the horizon,we should confidently act to secure critical and sensitive information.This should not be measured by todays encryption s
14、tandards,but rather with the question:“Is this quantum safe?”Accelerate innovation and embrace transformative technologies like AI and QCStrengthen technology sovereignty to create the right conditions for technology to thriveEnhance trust and interoperability by maintaining the highest security sta
15、ndardsAct with urgency to ensure readiness for the future state of conflictDr.Benjamin Schulte,Strategy&Innovation Lead Defense Europe,CapgeminiThe transformation of defense and security,driven by new software-defined capabilities,is characterized by a critical tension:the imperative for openness an
16、d rapid experimentation with emerging technologies clashes with the necessity of securing these advancements against adversaries,inherent risks,and new occurring vulnerabilities.Proactive adoption and continuous innovation are vital to deter aggression,protect our democracies,and ensure enduring sec
17、urity in an increasingly complex world.While new technologies should be explored and integrated swiftly,safeguarding their integrity and operational security is equally essential.Against this dynamic backdrop,our report examines the transformative potential of AI and quantum technologies in defense,
18、emphasizing how AI can revolutionize decision-making and autonomous operations while quantum advancements promise unbreakable encryption and enhanced secure communications.5Safeguarding Europes Security in the age of AIExecutive summaryOur world is in the midst of profound societal,technological and
19、 geopolitical change.European leaders are being required to rethink their strategy to reflect a shift to a multipolar world,the re-emergence of high-intensity conflict,and the transformative impact of technology on security,strategic autonomy,and European resilience.The stakes are high,with implicat
20、ions ranging from strategic planning and innovation management to battlefield tactics.The notion of“software is eating the world”also holds true for defense and security as the recent events in Ukraine have demonstrated.Thus,it can be said that“software is eating defense”,with a growing appetite and
21、 ever-accelerating pace.Defense innovation historically focused on hardware,especially platform centric capabilities such as tanks,aircraft,and ships.Todays alpha and omega is the interplay of software-defined and hardware-enabled capabilities,shaping future systems,operations,and decision-making.Th
22、is shift unlocks unprecedented opportunities and introduces new vulnerabilities that should be proactively managed.The transformative power of Artificial Intelligence(AI)and the emerging threats from quantum computing demand an urgent,coordinated and strategic response.Without robust defense,societi
23、es face greater risks of manipulation,threatening stability,sovereignty,and democracy.Artificial Intelligence is transforming the operational landscape across critical domains,serving as a catalyst for national security,public safety,infrastructure resilience,and crisis management.It enhances decisi
24、on-making,situational awareness,and predictive capabilities,reshaping how governments,organizations,and industries address security challenges.AI brings with it complex challenges related to data management,supply chains,cybersecurity and human oversight,demanding increasing attention to the secure
25、uses and implementation of the technology.In parallel,post-quantum cryptography(PQC)offers the protection of the digital foundation upon which AI and other critical systems rely.As quantum computing advances,it threatens current cryptographic systems,endangering secure communications,critical infras
26、tructure,and operational continuity.Unlike AI,PQC may not revolutionize security operations but provides the essential backbone for safeguarding their integrity.The interplay between these technologies is clear:while AI catalyses transformative capabilities,its effectiveness depends on the foundatio
27、nal security provided by PQC.Without this protection,AIs power to enhance security and resilience becomes a potential liability.Europes strategic autonomy in a multipolar world will hinge on its ability to navigate the convergence of AIs transformative impact and PQCs protective potential.The secure
28、 integration of these technologies will ensure seamless coordination among allies and fortify Europe against hybrid threats and adversarial capabilities.As digital transformation accelerates,the interplay between AI and PQC should be harnessed to strengthen Europes technological sovereignty and resi
29、lience.This report assesses the security implications of AI integration and PQC adoption in defense and security,emphasizing their interconnected roles in securing Europes strategic future.It concludes with actionable recommendations for Europes political,military,and industrial leaders to:Our world
30、 is in the midst of profound societal,technological and geopolitical change.Accelerate innovation and operational integration.Strengthen technological sovereignty.Enhance trust and interoperability.6Safeguarding Europes Security in the age of AIAccelerate innovation and integrationEnhance trust and
31、interoperabilityStrengthen technological sovereigntyTarget AudiencesTarget AudiencesTarget AudiencesSummary of recommendationsAdopt a balanced approach between risk-tolerance and ethics to testing emerging technological solutionsAdapt procurement procedures to the short development cycle of informat
32、ion technologiesTrain and develop AI systems with realistic,high-quality synthetic dataIncrease domestic production of critical components to reduce external dependenciesTask an EU agency to coordinate and centralize expertise,streamline adoption,and drive standardization in emerging technologiesImp
33、rove the training and anticipate the need for security and defense workforce in line with the requirements of a rapidly evolving technological landscapeDevelop a transatlantic“common data strategy”to facilitate the sharing of AI training dataDevelop a transatlantic shared approach to AI and quantum
34、ethical development and useEstablish a standardized,robust AI development and management framework for interoperability between alliesKeyArmed forcesPolicy-makersDefense industry7Safeguarding Europes Security in the age of AIGeneral(ret.)(OF-9)Eric Autellet Former Major General of the French Defense
35、 StaffWe stand today at a critical juncture,witnessing a convergence of societal transformations,technological breakthroughs and geostrategic changes.Europes strategic context is undergoing a significant transformation and evolving dynamics which require new mindsets,strategies and partnerships.Whil
36、e some principles remain unchanged,tangible aspects like recent technological advances(AI,cloud computing,big data),changing geopolitical context,and societal development are transforming the security and military sphere.Power and interactions are shifting from global to regional scales,redefining i
37、nternational relations and prompting leaders to prioritize regional security,autonomy and resilience.The integration of emerging technologies without strategic foresight risks undermining Europes sovereignty,potentially leading to serious technological and strategic disruption.A balanced and cohesiv
38、e approach to technology deployment is therefore essential.The increasingly widespread use of digital assets is now enabling permanent competition,unexpected confrontations and new ways of fighting.Europe has yet to master the digital domain,which will be the next arena for confrontation and war bet
39、ween states.In the near future,the blocs efforts must focus on on mastering new technologies,in particular the transition to post-quantum cryptography,ensuring that it is not caught off-guard by progress in this domain.It is also urgent to cohesively map European research and development efforts to
40、address these challenges head-on.Europe at a technological crossroads8Safeguarding Europes Security in the age of AIIntroductionIs software eating defense?The world is undergoing a profound transformation driven by rapid technological change.Technology is reshaping society and accelerating change at
41、 an unprecedented pace,bringing both significant benefits and challenges.As global power dynamics shift,nations race to secure an edge in this new context of high intensity and high technology.The military domain is increasingly defined by software.While tanks,aircraft,and ships were once the core f
42、ocus of innovation,software now drives transformation,shaping operational systems,decision-making processes,and overall defense strategies.Where should we focus today to secure our way of life in the future?New challenges arise every day,some of which may not have even been envisaged just a few year
43、s ago.Are we sufficiently aware of these changes,and,more importantly,able to tackle them effectively?What can we do today to mitigate future threats?Time to act This report addresses the strategic,future-defining challenges posed by secure AI and PQC for security and defense,offering a roadmap for
44、political,military,and industrial leaders to act decisively to secure Europes future.It provides a comprehensive understanding of current and emerging challenges and presents actionable recommendations to inspire proactive measures.As Benjamin Franklin aptly noted,“By failing to prepare,you are prep
45、aring to fail.”The time to act is now.AI:transformation or upheaval?AI is transforming the operational landscape in numerous areas,acting as a catalyst for innovation.To enable it to continue being driving force for innovation and transformative change in national security,public safety,infrastructu
46、re resilience and crisis management,its uses should be secured in the long term.However,this technological advance also introduces complex challenges ranging from AI-powered cyber-attacks to algorithmic biases,either inherent to the data used to train AI systems or maliciously introduced by adversar
47、ies to“poison”the data and render the AI ineffective.Secure implementation of AI-driven systems is thus fundamental to mitigate associated risks and ensure that AI improves operational efficiency while protecting and being protected against potential vulnerabilities.These foundational transformation
48、s are forcing a profound rethink of our security and defense.The future of European security hinges on our mastery of transformative technologies.AI and quantum innovations hould be deployed with precision and responsibility.”Dr.Cara Antoine Chief Technology,Innovation&Portfolio Officer/Executive Vi
49、ce President|Capgemini It is essential to balance investments in Gen AI with those in cybersecurity and quantum technologies to address current risks effectively.”Patrice Dubo Executive Vice President/Chief Technology&Innovation Officer-Aerospace&Defense,Capgemini9Safeguarding Europes Security in th
50、e age of AIQuantum:the next challenge The evolution of the AI-augmented battlefield makes secure communication essential.PQC will play a pivotal role in securing the digital infrastructure that AI and digital systems rely on against emerging threats posed by quantum capabilities.While these applicat
51、ions for now remain theoretical,they hold the potential to disrupt secure communications on a massive scale,rendering current encryption protocols obsolete and jeopardizing military operations.PQC will provide the necessary foundation for maintaining the integrity the digital backbone of future oper
52、ations.Quantum computing could render secure communication impossible overnight.Command would thus no longer be possible and secure operations would collapse.Such a catastrophic scenario is not inevitable.PQC can be deployed now on IT and communications systems,reducing the threat to data lost now a
53、nd systems in the future.PQC operates on classical rather than quantum computers,and thus provides a practical solution today to address the significant threats posed by tomorrows quantum and computation power advances.This report will examine these two key trends,their potential impact on the futur
54、e of software-defined capabilities,and the strategic responses leaders should consider capitalizing on opportunities while addressing associated risks.Drawing on qualitative research,including expert interviews with distinguished defense professionals from European armed forces,NATO,the European Def
55、ense Agency,and technology and innovation experts at Capgemini,the report will offer actionable recommendations for strengthening AI security and safeguarding quantum technologies in the years to come.10Safeguarding Europes Security in the age of AISecuring AI to secure Europe AI is a catalyst for t
56、ransformation and has led to a revolution in national security,public safety,critical infrastructure,and military operations.It enhances decision-making,situational awareness,and predictive capabilities,enabling proactive responses to evolving threats.AI applications span autonomous systems,targetin
57、g and decision support,predictive analytics,and cyber defense,among others.The conflicts in Ukraine and the Middle East have highlighted the growing pervasivness of AI and its accelerated integration into a variety of systems and platforms,such as Unmanned Aerial Vehicles(UAVs),targeting processes,o
58、r the analysis of satellite imagery.The conflicts in Ukraine and the Middle East have showcased the increasing pervasivness of AI and accelerated integrationinto into a variety of systems and platforms,such as Unmanned Aerial Vehicles(UAVs),weapons targeting systems,or the analysis of satellite imag
59、ery.This chapter looks at current and upcoming applications of AI and focuses on how to ensure safe and secure uses of AI.Four elements of AIHardwareConnectionSoftwareDataDisks,computers,chipsNetworksAlgorithms,modelsText,figures,images etcArtificial Intelligence refers to the ability of machines to
60、 perform tasks traditionally requiring human intelligence,such as recognizing patterns,learning from experience,drawing conclusions,making predictions,or generating recommendations.These applications may guide or alter the behavior of autonomous physical systems(like automated vehicles)or operate en
61、tirely within the digital domain(e.g.ChatGPT),with autonomy ranging from partial human intervention to full independence post-activation.Source:U.S.Department of State(2023)11Safeguarding Europes Security in the age of AIAI applications in security and defenseArtificial intelligence is already a maj
62、or tool in a range of critical security and defense areas.It is already transforming all operational domains(land,sea,air,space,cyber,electromagnetic spectrum)and the way missions are conducted(from anticipation to detection and reaction).By multiplying effects(e.g.swarming)and increasing battlefiel
63、d transparency,AI is offering added value across all functions.Its applications span military operations,military support,disaster prevention and humanitarian aid,intelligence,homeland security and border management.AI will specially improve decision support in all the areas of security and defense.
64、At the strategic level,AI will be able to analyze action plans,issue early warnings and help produce simulations to guide operational planning.At the operational level,it already processes intelligence to prioritize and validate targets.At the tactical level,AI provides real-time data and actionable
65、 intelligence to optimize immediate responses.As AI continues to mature,we can expect further disruptions in military operations.The journey towards AI integration is already well underway.”Dr.Bryan WellsNATO Chief ScientistThe conflict in Ukraine:a testbed for AI AI is playing a central role in sup
66、porting Ukrainian forces in intelligence,operational support and targeting.In the field of counter-espionage,AI systems,in collaboration with companies such as Palantir,analyze vast datasets to identify threats to national security,flagging suspicious behavior of Ukrainian citizens or their potentia
67、l links with Russia.Moreover,AI is integrated with voice translation tools that process intercepted enemy communications,extracting actionable intelligence to anticipate adversary movements.In the field of operational support,the Operations Centre for Threat Assessment(COTA),leveraging AI,integrates
68、 various data streams,providing real-time information to guide logistics and strategy.Finally,AI improves target acquisition,analyzing drone and social media data to locate and neutralize targets of strategic value on a daily basis.12Safeguarding Europes Security in the age of AIOnline threat detect
69、ionOperational simulationsIntelligence processing and analysisAI agentComplex decision supportSupply chain optimizationDrone swarmingPredictive behaviorAutonomous cyber attack responseC2 automationNowNewNextRisks to secure AI uses and mitigation strategiesAI impacts all operational domains,military
70、functions if not the very nature of warfare.Securely implementing and using AI poses specific challenges linked to technology,people and process.This also requires a clear balance between the need to rapidly implement AI in the fields of defense and security while navigating the challenges related t
71、o this implementation.These challenges can be structured in four main categories:cybersecurity,supply chain security,data,as well as expertise and human resources,and require targeted mitigation strategies.Current,emerging,and future AI applications13Safeguarding Europes Security in the age of AICha
72、llenges and mitigation strategies Key challenges to the integration of AI in defense and security can be tackled by a number of mitigation strategies,structured in four main categories:cybersecurity,supply chain security,data,as well as expertise and human resources.DomainChallengeMitigation strateg
73、ySystem securityAI is vulnerable to attack Harmonize security standards to mitigate threats on AI systems,including model poisoning,oracle attacks,and input perturbation Increase collaboration between the public and private sectors to strengthen AI against adversarial attacks and improve the cyber s
74、ecurity of hardware and software from the R&D to the implementation phaseSupply chain securityStrain on the supply chain/disruptions Invest in developing European semiconductor production capabilities to reduce external dependency.Encourage partnerships with European industry,academia,and research i
75、nstitutions to mitigate risks from strategic competitionData Lack of quality and quantity of data Difficulty obtaining and sharing data(encrypted,classified,incomplete)Data requiring advanced storage and processing capabilities Data poisoning Develop a sovereign Cloud for securing sensitive data whi
76、le guaranteeing compliance with national security protocols Integrate,in the future,fully homomorphic encryption,enabling classified data to be shared and processed securely without decrypting Create data centers to meet the sectors growing computing and storage needs.Use synthetic data in situation
77、s where it is impossible to obtain data,in particular to anticipate future scenariosExpertise and human resources Cognitive biases(e.g.automation bias)Excessive reliance on AI outputs Obligation to respect international humanitarian law Maintaining meaningful human control over the use of force Nece
78、ssity to trust the AI systemEnhance human oversight and expertise through:(Re)training programs High-level expertise cultivation Integration of technical specialists into military and security operations14Safeguarding Europes Security in the age of AICyber and supply chain security The secure implem
79、entation of AI for defense and security faces important obstacles in cybersecurity and supply chain security.For instance,hostile actors could exploit vulnerabilities in AI systems through deceptive data inputs(“data poisoning”)during the development stage,or by targeting the model itself.1 Because
80、these techniques are not only persistent and evolving threats,but also highly sophisticated and difficult to detect,NATOs AI Strategy highlights that they put critical infrastructure and sensitive operations at risk.2 Rising global demand for semiconductors and microchips further strains AI supply c
81、hain security,as production is limited by long lead times,complex and capital-intensive design and manufacturing processes,and can be subject to geopolitical tensions.3 The high costs associated with designing new chips mean that economies of scale are essential,leading to the concentration of produ
82、ction between a few leading companies.A few countries dominate these supply chains,raising concerns about reliance,strategic leverage,and espionage.The U.S.,for example,has restricted exports of advanced chips and manufacturing equipment to China,4 highlighting the importance of controlling critical
83、 supply chains for the secure use of AI in security and defense,especially for states without independent supply chains of their own.AI systems security should be strengthened throughout their lifecycle.This includes fortifying AI against hostile actors attacks and improving the(cyber)security of th
84、e associated hardware and software.Governments are investing heavily in domestic semiconductor production to reduce dependence on foreign suppliers.5 The European Unions adoption of the 43 billion European Chips Act,which aims to produce 20%of the worlds semiconductors by 2030 in the EU,is one such
85、example.6Cooperation between the public and private sectors is essential to securing AI for security and defense.NATOs AI strategy highlights partnerships with industry,academia,and research institutions to advance technological capabilities,safeguard intellectual property,and mitigate risks from ad
86、versarial use or strategic competition.7 These efforts,aligned with the Munich Security Conferences call for strengthened semiconductor and AI coordination,aim to foster innovation and ensure Europes access to vital AI components.8 We need to get end users and operators into capability development,f
87、or clearer operational needs and agile capability development with direct feedback from the theater.This means rethinking how we develop software-defined,hardware-enabled capabilities.”Dr.Benjamin SchulteStrategy&Innovation Lead Defense Europe,CapgeminiEurope needs to strengthen its European champio
88、ns to remain digitally sovereign.”Dr.Christian WeberPrincipal,Partner Lead and Client Manager Defense,Capgemini Insights&Data GermanyIntegrating the results of start-ups into the traditional procurement and industrial world remains a major Challenge.”Andreas ConradiHead of Defense Europe/Executive V
89、ice President,Capgemini15Safeguarding Europes Security in the age of AIA commonly used solution to mitigate paucity of data is the use of synthetically generated data.”Dr.Mark DornDirector Defense,Cambridge Consultants Data Data is another major challenge,first and foremost the quantity and quality
90、of available data.Training military AI systems relies on accurate,relevant and AI-ready data for the adequate fulfillment of their functions,but this can be difficult to obtain.9 Furthermore,the vast quantities of data generated(for example by sensors and collaborative combat operations)require adva
91、nced storage and processing capabilities,which are not always available,especially at the edge.These limitations pose significant operational challenges on platforms such as submarines,tanks,and other vehicles where computational resources are highly constrained.Military AI systems depend on access
92、to encrypted or classified data,which adds another layer of complexity and raises the question of who can access and use this sensitive data.Finally,the risks of data poisoning and adversarial manipulationwhere attackers corrupt training or test datasets to reduce the performance of AI modelsfurther
93、 raise the stakes because of the grave consequences that erroneous AI outputs can have in military settings.10 One solution is to develop sovereign cloud infrastructure11 to secure sensitive defense data in compliance with national and regional security protocols.12 The future integration of fully h
94、omomorphic encryption is another significant step,as it will enable classified data to be shared and processed securely without decryption,protecting critical information even in cooperative situations.13 The creation of vast data centers with a capacity in excess of one gigawatt is another crucial
95、milestone towards meeting the sectors growing computing and storage needs.These facilities would make it possible to process operational data at an unprecedented scale,while guaranteeing its security and availability.14 Investing in these strategies could vastly improve data security management and
96、lay a solid foundation for the implementation of secure AI across the defense and security sectors.The use of synthetically generated data effectively addresses many challenges.It can fill the gap where real data is unavailable or provide lower-classification data for initial model development,enabl
97、ing a smoother transition to higher-classification environments.Additionally,synthetic data is often indispensable for preparing AI to handle real-world scenarios that have yet to occur,such as zero-day cybersecurity threats.By simulating battles or unprecedented situations,synthetic data enables tr
98、aining for both AI systems and personnel.To be effective,however,this data should closely mirror real-world conditions,requiring a high degree of“equivalence”to ensure reliability.1516Safeguarding Europes Security in the age of AIExpertise and human resources The integration of AI decision-support s
99、ystems into military and security applications raises issues around human-machine interaction.Secure AI implementation requires high ethical,legal,and human decision-making standards,which should provide the flexibility required to continually incentivize and nourish innovation rather than stifle it
100、.Key concerns center on human control over the use of force and the mitigation of cognitive biases,such as over-reliance on automated systems while disregarding contradictory information(automation basis),which may distort decision-making.16 Operators may inadvertently ignore the legal and strategic
101、 implications of their decisions and cause errors or unintended outcomes.Integrating AI will also expand internal attack surfaces,as personnel may misuse AI.17 On the technology end,AI systems can have difficulty adapting to dynamic wartime conditions.18 The U.S.DoDs Project Maven is a case in point
102、,struggling to independently identify an enemy vehicle under different weather conditions than those it was originally trained on.19 AI adoption in a military context risks contravening international humanitarian law,in particular the principles of distinction,necessity,humanity and proportionality,
103、which underpin the lawful conduct of hostilities.20 Strategies to enhance human oversight and expertise should be developed,complemented by the right skillsets for military and civilian operators to responsibly interact with AI.At the transatlantic level,NATO has,for instance,set up a Data and Artif
104、icial Intelligence Review Board(DARB)to provide common standards for interoperability and principles of responsible use of AI.21 Strategies will also imply implementing retraining programs,cultivating high-level expertise and further integrating technical specialists into military operations to ensu
105、re that AI applications comply with national,international and humanitarian law,and also with specific rules of engagement,22 and developing a global culture of documented research and evidence-based decision-making.23 In defense,the trust factor is crucial.Soldiers and military personnel need to tr
106、ust the AI systems theyre using,just as they would trust any other tool in combat.Thats why its important to invest in AI literacy and ensure users understand how to use these systems responsibly.”Martijn van de Ridder MSc Vice President|Lead Data&AI Defense Europe17Safeguarding Europes Security in
107、the age of AINATOs view on artificial intelligenceIn the continually evolving landscape of modern warfare,operational success hinges on effective connectivity and authoritative data management.Recognizing this imperative,NATO has embarked on a comprehensive Digital Transformation initiative.By 2030,
108、this transformation will empower Multi-Domain Operations through enhanced interoperability,heightened situational awareness,and data-driven decision-making.AI emerges as a critical enabler,ensuring the adaptability and readiness of the Military Instrument of Power in the face of future military chal
109、lenges.One primary objective is the development of new platforms and systems,fostering interoperability,and creating a unified ecosystem where all allies have equitable access to AI capabilities.This will be achieved through expanded AI access,introducing novel services to the existing service catal
110、ogue,including AI-enabling services(data availability,AI Infrastructure as a Service,AI Platform as a Service)and AI services based on Commercial Off-the-Shelf(COTS)AI products and accessible Large Language Models(LLMs).Specific AI/Machine Learning models are being developed for advanced threat dete
111、ction.Concurrently,investments are being made in counter-AI technologies to safeguard the integrity and correctness of AI-supported processes and to counter potential adversary attacks on vulnerable AI methods.The deployment of AI in military warfare presents significant ethical,legal,and moral dile
112、mmas,raising concerns about accountability,responsibility,transparency,and the potential for escalation,miscalculation,and unintended consequences in complex and dynamic environments.To address these challenges,NATO has formulated an AI strategy,outlining six key principles:1.Lawfulness:Adherence to
113、 all applicable laws,regulations,and policies.2.Responsibility and Accountability:Those involved in the design,development,deployment,or operation of AI systems must remain accountable for their functioning and impacts.3.Explainability and traceability:The processes employed in the development and t
114、raining of AI models must be meticulously documented and auditable.4.Reliability:AI systems must consistently produce reliable and robust results,resistant to manipulation or errors.5.Governability:The use of AI must remain under human control,with the capability to intervene in automated processes
115、as necessary.6.Bias mitigation:Rigorous efforts must be undertaken to minimize unwanted bias in the development and deployment of AI systems.The Technology Readiness Level(TRL)of generative artificial intelligence(AI)systems is generally assessed to be between TRL 7 and TRL 8.This assessment indicat
116、es that prototypes of generative AI systems are currently operational and demonstrate their functionality in relevant environments.While significant advancements have been made in areas such as large language models,opportunities remain to further enhance accuracy,coherence,and creativity.The substa
117、ntial computational resources required for the training and deployment of large-scale generative AI models necessitate advancements in both hardware and software infrastructure.Moreover,the quality and quantity of training data significantly impact the performance of these models,highlighting the im
118、portance of access to high-quality datasets for developing robust and reliable systems.As ongoing research addresses these technological challenges,we can anticipate the emergence of more sophisticated and impactful generative AI applications in the few coming years.Major General Dominique Luzeaux,D
119、r.Hab.Digital Transformation Champion and Special Advisor to SACT18Safeguarding Europes Security in the age of AIBreakthroughs in AI have driven innovation across various domains,especially in machine learning(ML),deep learning(DL)or natural language processing(NLP),and automating basic functions(sp
120、eech-to-text tools,contextualized translation,summarization).China China strives for global AI dominance by 2030.28 Chinese sources claim the countrys core AI industry reached a market size of 578.4 billion RMB while growing at 13.9%in 2023.29 Chinas“military-civilian fusion”program drives advances
121、in robotics and autonomous technologies by integrating civilian innovations into military applications.This top-down strategy aligns national security goals with targeted productivity plans at both national and local levels.30 China produced the highest number of publications on AI in 2023,31 narrow
122、ly outpacing the US with 12,450 publications on generative AI compared to the U.S.s 12,030.32 Global trends in AI R&DKey takeaways Market leader in AI R&D Leader in private investment volume in AI Considerable number of start-ups in the field Substantial investment by the government(DoD)Key takeaway
123、s Strong government support Aims to become the dominant power in AI by 2030 Leader in scientific publications on generative AIUnited StatesThe United States is the dominant power in AI R&D,backed by increased AI-related funding from the Department of Defense(DoD),from$190 million in 2022 to$557 mill
124、ion in 2023.24 The DoDs November 2023 AI Adoption Strategy aims to integrate AI across military functions.25 It requires the alignment of strategic objectives with training the workforce for appropriate AI use.26 The synergy between government and the private sector has kept the US at the forefront
125、of technological advancements ahead of China and Russia.Finally,in January 2025,the US government announced“The Stargate Project”,a private joint venture involving OpenAI,Oracle and foreign investment funds,aiming to invest up to$500 billion over the next four years in infrastructure for AI.The obje
126、ctive of this project is to ensure the countrys independence,but also to assert its supremacy in the field of AI,by mastering the necessary physical infrastructures.2719Safeguarding Europes Security in the age of AIEUThe EU is striving to progressively increase AI investment and R&D through the Euro
127、pean Defense Fund(EDF).The EDF supports a 100 million program for an AI-enabled drone equipped with advanced intelligence and 25 million for military 5G networks.37 National initiatives complement EU-level efforts.France,for example,plans to deploy Europes most powerful supercomputer in 2025 to boos
128、t defense AI capabilities.38 Moreover,the French Ministry of Armed Forces allocated 2 billion to the development of AI for national security,39 and created the Agency for Defense Artificial Intelligence(AMIAD)in 2024.However,Europes private sector is much less developed than its American or Chinese
129、counterparts,and relies on a few major start-ups,such as Germanys Helsing which specializes in AI-based defense software.40Key takeaways Priority given to the military sector Strong government coordination of R&D efforts Suffering from insufficient fundings,corruption,and inefficiency Key takeaways
130、Increasing investments from the EU Development of national initiatives to boost R&D An ecosystem hampered by a small number of major start-ups Russia Russia is prioritizing AI investments to accelerate military modernization.The Ministry of Defenses Main Directorate for Innovative Development(GUIR)c
131、oordinates a network of research institutes,techno-parks and innovation centers to promote dual-use technologies.33 Since 2021,GUIR has launched over 500 initiatives in command systems,unmanned vehicles and cyber operations.Russias AI programs are smaller in scale than those of the US or China,and c
132、onstrained by insufficient funding,corruption and inefficiency.34 These structural problems limit Russias ability to take full advantage of emerging technologies,even when there is a focus on specific areas,primarily electronic warfare and psychological operations.35 Since its invasion of Ukraine in
133、 2022,Russia has put its AI capabilities to the test in combat situations,particularly in geospatial intelligence,unmanned missile operations,military training,and cyber warfare.36 20Safeguarding Europes Security in the age of AI1BITOR1QUBITIncreasingly“intelligent”AI-powered systems require more se
134、cure architectures.Post-quantum cryptography(PQC)is emerging as a key protection measure,supporting the ongoing transformation of Europes security and defense.As AI continues to reshape these domains,PQC ensures the security of the digital infrastructure supporting AI and other critical systems.It a
135、ddresses the risks posed by advances in computational power,including quantum computing,protecting sensitive communications and systems from future threats.While AI is already a key enabler in security and defense,quantum computing remains in its early stages,with practical applications only beginni
136、ng to emerge.The evolution of quantum computing underscores the urgency of adopting PQC to guarantee the long-term protection of key digital systems and communications.Quantum computing leverages principles from quantum mechanics(a branch of physics),notably the unique behaviors of subatomic particl
137、es such as electrons and photons,to enable new,extremely powerful computing architectures.Source:Information Technology and Innovation FoundationSource:Information Technology and Innovation FoundationShaping security for the quantum age Instead of processing information using binary bits of ones and
138、 zeros,quantum computers use“quantum bits”(qubits)which utilize superposition and entanglement to operate in multiple states at once.This allows quantum computers to store vastly more information than binary systems.21Safeguarding Europes Security in the age of AISecurity in the quantum ageQuantum c
139、omputing(QC),41 with its enhanced computational power far exceeding that of classical computers,promises to solve complex problems in unprecedented ways.42 Its anticipated uses range from the creation of new materials,pharmaceuticals,precise financial predictions,43 traffic optimization or energy tr
140、ansport,to name but a few.Quantum technology could also help secure cyberspace by creating theoretically unbreakable exchange networks.Conversely,cybercriminals using quantum algorithms could break current encryption systems in just a few hours.QC is expected to see initial applications by 2030-2035
141、.As quantum computation capabilities progress,post-quantum cryptography(PQC)has emerged as the primary solution to secure digital infrastructure against quantum threats.PQC,44 also known as quantum-resistant cryptography,will be essential to protect against quantum threats that could compromise exis
142、ting cryptographic methods.45 Unlike quantum key distribution(QKD),46 PQC does not rely on quantum mechanics,making it well-developed,commercially available,and already undergoing standardization in the U.S.Todays main concern is“harvest now,decrypt later”attacks,where encrypted data is captured and
143、 stored today in the hope of decrypting it once quantum computers are powerful enough.47 With the looming threat of all encryption methods becoming obsolete,48 it is vital to prioritize the development and integration of PQC to secure Europes sensitive data and communications.As quantum technology p
144、rogresses,its applications become increasingly tangible across various sub-domains.There remain significant challenges in transitioning from research to practical deployment.Quantum computing,while demonstrating specific advantages,faces major obstacles in error correction and scalability,49 delayin
145、g breakthroughs critical for military and cryptographic implications50 by at least a decade.Military applications of quantum technologies remain speculative,requiring further maturation and analysis of their operational potential.As a 2020 RAND report concluded,“some niche applications of quantum co
146、mputers are being explored that may become useful within the next few years,but the most important applications(such as breaking decryption)are likely at least ten years away.”51“NATO is spending a lot of time raising awareness among Allies on the consequences of having part of their cryptography ob
147、solete for command and control.”Dr James AppathuraiAssistant Secretary General for Innovation,Hybrid and Cyber,NATOPQC is a priority today,and after the standards are released by NIST this summer,there is no good reason to delay migration any longer.”Julian van VelzenHead of Capgeminis Quantum Lab22
148、Safeguarding Europes Security in the age of AITechnologyTRLHorizonSensing&imagingQuantum inertial navigation4-52025-2030Quantum clocks4-62030Quantum radar1-2NoneQuantum RF antenna42025-2030Quantum magnetic and gravity sensing5-62025Quantum imaging52025-2030Communication&cryptographyQuantum key distr
149、ibution7-82025Post-quantum cryptography7-82025Quantum communication network1-32030-2035Computing&simulationQuantum computer4-52030Technology Readiness Level(TRL)and time horizon expectationsSource:Krelina(2021)Quantum memory The number of qubits of memory computers have.Critical factors in quantum c
150、omputing advancements Information loss The extent of“noise”during operations,understood as the information loss that increases computational errors.Quantum stabilization The measure of how long qubits maintain their state before losing information.The following table presents a broad overview of the
151、 sub-areas of quantum technology,with Technology Readiness Level(TRL)52 and time horizons,for context:23Safeguarding Europes Security in the age of AIChallenges and mitigation strategies Key challenges to the integration of PQC and quantum technologies development in defense and security can be tack
152、led by a number of mitigation strategies,structured in four main categories:cybersecurity and supply chains,data,and expertise and human resources.DomainChallengeMitigation strategyCyber securityUncertainty of adversary quantum masteryPrevalence of asymmetric cryptographyUncertainty about the impact
153、 of quantum technologies on the security and defense industries PQC adoption in governmental and strategic industries systems Standardization efforts to safeguard cybersecurity standards overtime Development of transition roadmaps for PQC adoption Impact assessment on strategic industries/infrastruc
154、turesSupply chain securitySafeguard strategic subcomponent providers Support strategic industries that are technological enablers for quantum technology development Increase domestic capacity in providing these strategic componentsOperationalizationIntegration with legacy military systemsRisk of ope
155、rational disruption Assessment of potential impact and vulnerabilities Assessment of adversaries technological developmentExpertise and Human Resources The number of researchers or publications does not directly lead to more patents or reflect a thriving start-up ecosystem Maintain high degree of pu
156、blic support Centralization effort to avoid duplications in quantum computing R&D Support private investment Have a patent strategy Support domestic research24Safeguarding Europes Security in the age of AIQuantum computing faces critical challenges which require timely and strategic mitigation to en
157、sure secure and seamless adoption.An important concern is the cybersecurity threat it poses.While quantum computing is still in its infancy,as is mastering millions of logical qubits,the threat of“harvest now,decrypt later”is of urgent concern.Most modern cryptographic algorithms,which rely on the c
158、omplexity of mathematical problems(public-key,asymmetric cryptography)or the obstacle of finding the exact private key(symmetric cryptography),are vulnerable to attacks by quantum computers.53 Asymmetric cryptography,widely employed in applications such as VPNs,email encryption,digital signatures,an
159、d online communications,will be particularly vulnerable to quantum attacks as quantum computers are expected to solve complex mathematical problems within the next decade.54 As the threat grows,calls for immediate PQC adoption are increasing,and the U.S.is already taking the lead through NIST.Specia
160、lists express concern about the lack of standardization cooperation within NATO and between the EU and the US,especially for industries requiring secure long-term data storage.As in the case of AI,supply chain security is a critical issue which should urgently be addressed.55 Europe is an important
161、producer of key technological components such as lasers,which are foundational to quantum computing.To secure Europes supply chains,strategic industries(semi-conductors,photonics,cryogenics,precision sensing)which are technological enablers for quantum technology should be supported.An EU-wide quant
162、um industry strategy aiming to increase domestic capacity in the production of critical components would reduce dependency on external suppliers,strengthen Europes position in the quantum technology ecosystem.Safeguarding key production capabilities could strengthen transatlantic quantum cooperation
163、,promoting greater innovation.The operationalization of quantum technologies is uniquely challenging because their practical applications in defense are yet to be fully characterized.Integrating these emerging capabilities with legacy military systems is a complex process fraud with vulnerabilities
164、and risks operational disruption.To address these challenges,a rigorous assessment of potential impacts and vulnerabilities is essential.Fostering research collaboration at NATO level could enhance efficiency,while monitoring and evaluating the technological advancements of adversaries will help ant
165、icipate risks and inform strategic decision-making.By proactively addressing uncertainties,defense stakeholders can ensure that quantum technologies are integrated effectively when they mature,while maintaining operational readiness and resilience.Building expertise and human resources in quantum te
166、chnologies will require more than simply increasing the number of researchers or publications.After all,these metrics do not necessarily translate into patents or a thriving start-up ecosystem.To address this,it is vital to maintain strong public support for quantum R&D,combined with efforts to cent
167、ralize R&D and minimize duplication.Expanding industry-led internship and professional development programs,and ensuring more efficient and rapid patent applications,could further foster innovation and protect intellectual property.Strengthening transatlantic collaboration in workforce development c
168、an help address the talent gap and create a stronger,interconnected quantum ecosystem.56 Additionally,sustained support for domestic research is essential to develop a skilled workforce and establish a dynamic quantum start-up ecosystem which can serve as an incubator for long-term growth and techno
169、logical leadership.NATO has established the ransatlantic Quantum Community,a unique and innovative structure that brings together academics,industry,and government representatives to foster quantum technologies development.”Dr James AppathuraiAssistant Secretary General for Innovation,Hybrid and Cyb
170、er,NATOWe need to align academic research with defense priorities and create better incentives for talent to contribute to the military sector.Partnerships with startups and academic institutions could help bridge this gap.”Julian van VelzenHead of Capgeminis Quantum Lab25Safeguarding Europes Securi
171、ty in the age of AINATOs view on quantum technologiesIn late 2023,NATO ratified a Quantum Strategy that establishes a framework to position the Alliance as quantum-ready.Current endeavors are centered on forming a quantum community.The overarching objective is to harness the potential of quantum tec
172、hnologies while mitigating associated risks.The strategy underscores the transformative and disruptive implications of quantum technologies,with a particular emphasis on:1.Quantum Sensing for Positioning,Navigation,and Detection:Quantum sensors,distinguished by their exceptional precision,resolution
173、,and sensitivity,have the potential to revolutionize future battlefields.By enabling sensing and surveillance capabilities across various domains and conditions(day/night,adverse weather,GNSS outages),they offer a significant advantage.Additionally,techniques such as ghost spectroscopy,which leverag
174、es quantum principles to extract spectral information without direct light interaction,are particularly valuable for detecting faint or elusive objects,such as CBRN materials.2.Quantum-Safe Communications and Networking:The integration of Quantum Key Distribution(QKD)and post-quantum encryption offe
175、rs robust security for communications and networks.QKD,along with complementary technologies like Quantum Random Number Generators(QRNG),and potentially future entanglement-based networks,can underpin secure communications,facilitate interconnections between quantum computing centers,and enable adva
176、nced networking capabilities.3.Quantum Information Science(QIS):QIS encompasses the research and development of quantum computers(QCs)and their associated software ecosystem,including algorithms,cryptography,programming languages,modeling,simulation,and diverse knowledge applications.Quantum compute
177、rs are designed to tackle computationally intensive problems,excel in modeling and simulation,and significantly enhance decision-making and operational effectiveness within NATO operations.Future advancements in quantum computing may lead to the development of a Cryptographically Relevant Quantum Co
178、mputer(CRQC),capable of compromising current public-key cryptography and more efficiently attacking systems reliant on short symmetric keys.The Technology Readiness Level(TRL)of quantum technologies varies depending on the specific application.Most are currently considered to be at TRL 3(proof of co
179、ncept)to 6(system/subsystem model or prototype demonstration in a relevant environment).While significant strides have been made in quantum computing,a fully functional,universal quantum computer that can solve complex problems beyond the reach of classical computers is not yet available.Noisy inter
180、mediate-scale quantum computers could be available by 2030,optimized for specific classes of algorithms.Full-scale fault tolerant computing should not be achieved before 2040.Major General Dominique Luzeaux,Dr.Hab.Digital Transformation Champion and Special Advisor to SACT26Safeguarding Europes Secu
181、rity in the age of AIGlobal trends in quantum and post-quantum cryptography R&DKey takeaways Market leaders in quantum computer development Leader in private investment Strong push for PQC standardization PQC migration plan incentives for government systems and critical infrastructuresUnited StatesT
182、he United States currently leads the pack in quantum computing and sensing.57 Progress is primarily driven by collaboration among academic institutions,private enterprise,and government under the National Quantum Initiative Act(2018).The largest quantum computers have been built in the U.S.by leadin
183、g companies such as Google,IBM,Honeywell,Microsoft,and heavyweights in a thriving start-up scene(IonQ,Rigetti,ColdQuanta,PsiQuantum).Through its active engagement in quantum standards development,the U.S.is able to influence global practices via the National Institute of Standards and Technology(NIS
184、T),which released the first three post-quantum encryption standards in August 2024.58 In November 2024,NIST published an initial roadmap for PQC transition,which evaluates the long-term viability of existing cryptographic algorithms.The roadmap clarifies that many current algorithms will be deemed d
185、eprecated after 2030 and be disallowed by 2035 for national security reasons.59 While the U.S.excels in quantum computing,its development of quantum communication systems lags behind China due to lower prioritization and market interest.60 27Safeguarding Europes Security in the age of AIKey takeaway
186、s Leader in research publications Important subcomponents provider Strong government support Decentralized approach risking duplication of effortsEUAlongside AI,biotechnology and advanced chips,the European Union recognized,in 2023,the critical character of quantum technologies.67 The EUs approach t
187、o funding quantum technologies is decentralized,68 with investment stemming from national governments,the European Commission,and public-private partnerships.This collaborative strategy encourages Member States to engage in quantum research and innovation but risks duplication of efforts.The EU lead
188、s in public funding with nearly 10 billion announced as of 2023.69 The focus is on supporting start-ups,establishing a federated quantum infrastructure,and creating a coordinated action plan to prevent cybersecurity loopholes.The EU leverages its strong research capability70 and state-of-the-art tec
189、hnology capabilities.Indeed,the Union accounts for 44%of total patents granted in quantum computing and provides the U.S.with specialized components(e.g.lasers and electronics)mainly from Germany,France,Italy,Finland and Sweden.71 The EU however lags behind its global competitors in private investme
190、nt,with$548 million recorded for the period 2001-2023,compared to$3.58 billion in the U.S.and$745 million in the UK.72 EU Member States have recently acknowledged the importance of transitioning to PQC in a joint statement of 18 national cyber security agencies.73China China has prioritized quantum
191、communication61 and computing among its top three national research goals since 2016.62 China leads the world in quantum communication with over$15 billion in government funding,surpassing other countries despite lower private sector investment.63 In 2016,it launched the Micius satellite,the first t
192、o enable quantum communication with the ground,and established a vast fibre-optic network for QKD in what is considered a step towards advancing a large-scale quantum network.64 Micius served as a relay for a first-ever quantum encrypted intercontinental video conference between Vienna and Beijing i
193、n 2017,demonstrating a major milestone in the development of a global satellite-based quantum internet.65 While Chinas quantum ecosystem is dominated by state-owned companies and large technology firms such as Huawei and Tencent,the number of Chinese start-ups in the quantum field has gradually incr
194、eased as well.66Key takeaways Leaders in quantum communication development and testing Strong government support Highly concentrated technological ecosystem28Safeguarding Europes Security in the age of AILt.General Stefano Cont Capability,Armament and Planning Director,European Defence AgencyAcceler
195、ating innovation:a blueprint for transformative technologiesThe European Defence Agency provides support to Member States to enable collaborative capability development as well as defense research,technology,and innovation to prepare the future of EU defense.EU capability development tools include p
196、roposals for next generation capabilities,for instance via the Capability Development Plan(CDP)and the Coordinated Annual Review on Defense(CARD,)and leverage work related to the Action Plan on emerging and disruptive technologies(EDTs)for defense applications linked with AI and PQC.The successful d
197、evelopment of the Hub for EU Defence Innovation(HEDI)to develop demonstrators and experimentation could be further enhanced by promoting a risk-tolerant strategy designed to push the boundaries of technology and foster groundbreaking advancements.It could operate by funding high-risk,high-reward pro
198、jects which traditional funding mechanisms may avoid,emphasizing the pursuit of transformative rather than incremental innovation(DARPA-like approach).A combination of visionary ambition,the freedom to explore unconventional ideas and an adaptive funding mechanism may better position EDA to tap into
199、 the innovation potential that exists in the European Defence Technological and Industrial Base(EDTIB)and beyond,thus driving technological breakthroughs,with greater expected impact on defence capabilities,closer and faster to the military end-user.AI and quantum technologies at the service of demo
200、cratic stability and securityFrom neutral to purposeful:application defines dual-use technologiesThe concept of dual-use technologies refers to innovations which can be applied for both civilian and military purposes.A dual-use technological approach demonstrates how a fundamentally neutral innovati
201、on can take on different characteristics depending on its application.Such technologies,agnostic in their essence,can be employed in civilian contexts then adapted to military uses.The key to their characterization lies not in the technology itself but in the intent and purpose of its application.Th
202、is underscores the necessity for the Agency to continue cooperating with other EU institutions,bodies,and agencies in all relevant activities related to dual-use technologies.These two reflections may be instrumental for the preparation of the EU White Paper on the Future of European Defence.29Safeg
203、uarding Europes Security in the age of AIStrategic recommendationsThe challenges linked to secure building blocks and uses of AI and quantum computing are substantial and far-reaching.Transversal and multi-dimensional by nature,they cannot be effectively addressed in isolation,but require a whole-of
204、-government,whole-of-society approach.Political and regulatory action will be essential to develop a solid,reliable framework to drive innovation while safeguarding the future.With the advent of software-defined defense the military will have to rethink doctrine,execution of operations and adapt pro
205、curement strategies to evolving realities.The industrial sector has an equally pivotal role to play in providing expertise,working hand-in-hand with end users to provide them with the platforms and systems needed in an AI-driven,post-quantum setting.Charting a secure path to the future,the following
206、 recommendations are aimed at Europes political,military,and industry leaders and span key areas such as data management,training,testing,expertise,and procurement.Recommendations are structured according to three overarching objectives:Enhance trust and interoperabilityStrengthen technological sove
207、reigntyAccelerate innovation and integration30Safeguarding Europes Security in the age of AIStrengthen technological sovereigntyAccelerate innovation and integrationTarget AudiencesTarget AudiencesIncrease domestic production of critical components to reduce external dependenciesTask an EU agency to
208、 coordinate and centralize expertise,streamline adoption,and drive standardization in emerging technologiesImprove the training and anticipate the need for security and defense workforce in line with the requirements of a rapidly evolving technological landscapeAdopt a balanced approach between risk
209、-tolerance and ethics to testing and integrating emerging technological solutionsAdapt procurement procedures and design and manufacturing processes aligned to the short development cycle of software and AI-defined capabilitiesTrain and develop AI systems with realistic,high-quality synthetic dataEn
210、hance trust and interoperabilityTarget AudiencesDevelop a transatlantic“common data strategy”to facilitate the sharing of AI training dataDevelop a Transatlantic shared approach to AI and quantum ethical development and useEstablish a standardized,robust AI development and management framework for i
211、nteroperability between partner countriesKeyArmed forcesPolicy-makersDefense industry31Safeguarding Europes Security in the age of AIFor NATO,this is a once in a generation chance to address one of its top priorities:accelerating the adoption of new technologies.NATO is leaning in hard,engaging with
212、 industry and innovation leaders,to develop a set of proposals that will substantially enhance the speed of adoption.”Dr James Appathurai Assistant Secretary General for Innovation,Hybrid and Cyber,NATOAccelerate innovation and integrationHOWAdopt a balanced approach between risk-tolerance and ethic
213、s to testing emerging technological solutions.European military forces should embrace the testing of emerging technological solutions that are not yet fully matured.This willingness to experiment with“imperfect”solutions can provide valuable operational insights which will likely better guide furthe
214、r R&D efforts,and thus accelerate the adaptation of cutting-edge technologies to meet operational needs.AI and software factoriesa framework designed to efficiently develop,scale,and operationalize AI use cases while enabling the agile creation of new AI applicationscould offer a way forward for def
215、ense organizations.END GOALSpeed up development processes32Safeguarding Europes Security in the age of AIHOWDecentralize innovation and put the end-user front and centerMilitary stakeholders,such as battalion and brigade commanders,should be encouraged to engage directly with industry,including star
216、t-ups and non-traditional defense players,to generate a direct feedback loop.The Ukrainian army exemplifies how enabling local commanders to directly work with innovators in real-time can lead to quick integration of technology and deployment in the field,showcased by Ukraines use of autonomous dron
217、e swarm operations,open-source intelligence,battlefield and intelligence data analysis and AI-driven training simulations.74Another advantage would be to familiarize the military with the economic realities of industry.Adopting iterative development and testing encourages active involvement of the m
218、ilitary sector in the crucial early innovation stages.This way,user requirements can be fine-tuned according to the militarys experience in the theatre of operations,which greatly increases the chances of a capability development program being brought to high maturity.HOWTrain and develop AI systems
219、 with realistic,high-quality synthetic data.Synthetic data sets replicate real-life data without compromising sensitive information.It offers a solution to the lack of structured classified data for specific military operational scenarios.For certain operational scenarios,no real-life data exists(ye
220、t),and synthetic data could bridge the gap.Using synthetic data would allow continuous,tailored AI training and testing.By leveraging synthetic data,armed forces can accelerate innovation,overcome data scarcity,and maintain a technological edge while safeguarding interoperability.END GOALImprove AI
221、defense systems efficiencyHOWAdapt procurement procedures to the short development cycle of information technologies.The speed of innovation cycles,particularly in AI and software development,has outpaced current procurement proceduresshifting from decades to just a few years.This mismatch poses a r
222、isk to Europes operational readiness and effectiveness in an increasingly fragile world.END GOALSpeed up procurement processesThe conflict in Ukraine has shown that technological innovations can be adopted within six to twelve weeks,highlighting the need for faster adoption cycles.”Dr James Appathur
223、ai Assistant Secretary General for Innovation,Hybrid and Cyber,NATO33Safeguarding Europes Security in the age of AIStrengthen technological sovereigntyHOWIncrease domestic production of critical components to reduce external dependencies.The EU should invest in manufacturing capacity of essential co
224、mponents,such as quantum processors,semiconductors,and data infrastructure to reduce its dependence on overseas manufacturing hubs.The conflict in Ukraine laid bare the vulnerabilities of supply chains.These threaten Europes high-tech industry and the very development of AI and quantum technologies.
225、Italys strategy of offering billions in incentives to attract foreign high-tech manufacturers is paying off,with Singapores Silicon Box setting up a factory in Piedmont.This approach could inspire similar efforts in other EU countries in a crucial step towards more European technological sovereignty
226、.END GOALSecure strategic productionsHOWTask an EU agency to coordinate and centralize expertise,streamline adoption,and drive standardization in emerging technologies.This new or readily existing agency could provide clear guidelines,milestones,and timelinessuch as preparing for critical transition
227、s like the migration of security systems to PQR as in the USalong with certifications and training.The agency could help consolidate and effectively distribute financial resources towards AI and quantum R&D.This would make European funding more effective by shifting from many small programs to fewer
228、,more focused initiatives,leveraging the EUs extensive expertise and helping improve its global standing in the AI and quantum fields.END GOALSpeed up EU-wide technological adoption and PQC migrationHOW Improve the training and anticipate the need for security and defense workforce in line with the
229、requirements of a rapidly evolving technological landscape.Security and defense personnel should be provided with rigorous and continually updated specialized training.Besides the traditional military field craft of maneuver and tactics and new dimension of so-called tech craft,the knowledge about e
230、merging and digital technologies and the ability to leverage them and impact operations becomes equally important.Upskilling programs and academy approaches as well as new ways for strategic personnel planning can help close the skill gap in defense organizations.Establishing dedicated units and rol
231、es to oversee the use of emerging technologies like AI and quantum computing could furthermore help in providing staff with guidance and accountability.END GOALReduce dependency on foreign specialists,minimize operational errors,and mitigate potential risks 34Safeguarding Europes Security in the age
232、 of AIEnhance trust and interoperabilityHOW Develop a transatlantic“common data strategy”to facilitate the sharing of AI training data.NATO allies should adopt a common transatlantic training data strategy to address critical barriers like classified data access and the overall quality of available
233、data for training AI models,while also embracing new cryptography solutions based on homomorphic encryption and data sharing.As nations advance their own capabilities,ensuring seamless communication and interoperability between systems is essential to sustain operational cohesion and effectiveness”D
234、r Bryan Wells NATO Chief ScientistEND GOALStrengthen“AI assurance”within the AllianceHOW Establish a standardized,robust AI development and management framework for interoperability between partner countries.European defense stakeholders should ensure that AI models can be explained to politicians a
235、nd citizens.The framework should include a thorough threat assessment early in the process to identify risks,mitigation needs,and project viability while guiding subsequent steps like testing and data security.The model should be regularly monitored and adapted to changing conditions or adversarial
236、responses for continuous improvement.Together,these practices will ensure AI systems remain effective,secure,and reliable throughout their lifecycle.END GOALEnsure interoperable AI defense systems at NATO level HOW Develop a transatlantic shared approach to AI and quantum ethical development and use
237、.Transparency is the bedrock upon which to build trust in new technologies.European leaders should ensure that the permissible use cases and the ways new technologies are integrated into military systems are clearly communicated.In the case of AI,for example,this requires AI systems to be trained ac
238、cording to clearly established rules,regulations,and ethical considerations.This ensures political accountability in democratic systems,allowing verification that armed forces and their use of AI align with established principles,which in turn can help boost trust in the AI models used.END GOALEstab
239、lish harmonized guidelines on the use of AI in security and defense35Safeguarding Europes Security in the age of AIConclusion:software eats defense is the new realityAs software and AI increasingly drive innovation in defense and permeate military capabilities,creating intelligent and secure defense
240、 systems becomes a critical priority for a robust digital backbone.Against this backdrop,this report focuses on two interconnected challenges of this paradigm shift:the need to enhance AI security while simultaneously strengthening quantum-secure communication,in order to unlock the potential and tr
241、ansformative power of increasingly software-defined capabilities.Indeed,NATO has called this a“once-in-a-generation chance”to accelerate the adoption of transformative technologies.By reimagining how defense organizations operate,innovate,design,and integrate novel technologies,new capabilities can
242、be deployed swiftly,making a significant impact on the operational environment.However,AI systems should be secured against emerging vulnerabilities,while communication networks and the entire technology stack should be made quantum-secure now.Meeting these needs,however,requires a holistic approach
243、,from strategy and design through testing,training and full end-to-end transformation.Capgeminis deep expertise in both digital technology and physical engineering,strengthens the design,development,and implementation of intelligent and secure solutions across the whole defense value chain;from the
244、theatre to the production shop floor.A safer world cannot rely on the efforts of a single government,defense supplier or technology company.It demands an ecosystem approach where each stakeholder contributes to innovation and progress.By collaborating with a broad network of defense organizations,st
245、artups and leading technology firms,Capgemini offers a cohesive platform for transformation.This interface simplifies solution delivery,speeds up deployment and supports the rapid development and secure integration of software-and AI-defined capabilities,ensuring maximum impact where it matters most
246、.To address our new reality of software-defined defense,we believe in adopting an approach that seamlessly integrates the digital and physical worlds,building smart,intelligent capabilities to safeguard our way of life and deter future conflicts.This is not a challenge for the futureit requires our
247、attention and action today.We are dedicated to supporting the defense sector in its mission to adapt,innovate and create a safer,more resilient future.Our European heritage also drives our strong commitment to the defense of the continent we share.36Safeguarding Europes Security in the age of AICont
248、ributorsThe report is based on in-depth desk research and qualitative interviews with defense,AI and quantum experts,including from Capgemini.James Appathurai Acting Assistant Secretary General for Innovation,Hybrid,and CyberJames Appathurai is NATOs Acting Assistant Secretary General for Innovation
249、,Hybrid,and Cyber,leading a global team addressing critical areas such as cyber defense,emerging technologies,and hybrid threats.His division focuses on safeguarding NATOs innovative edge by fostering advancements in artificial intelligence,quantum computing,biotechnology,and other disruptive techno
250、logies to tackle security challenges that were previously insurmountable.Jamess extensive career at NATO includes serving as Deputy Assistant Secretary General for Political Affairs and Security Policy,Special Representative to Central Asia and the Caucasus,and NATO Spokesperson from 2004 to 2010.Pr
251、ior to joining NATO,he worked in Canadas Defense Department.General(ret.)(OF-9)Eric Autellet Former Major General of the French Defense StaffEric Autellet has over 30 years of experience in the French Armed Forces,excelling in operational leadership,international collaboration,and strategic planning
252、.His career includes serving as Major General of the Armed Forces(2021),overseeing inter-branch coordination and military readiness,and playing a critical role in key international operations,such as Operation Inherent Resolve in Iraq and Kuwait.Erics academic accomplishments include graduating from
253、 cole de lAir and advanced studies at the Centre des Hautes tudes Militaires(CHEM)and the Institut des Hautes tudes de la Dfense Nationale(IHEDN).His expertise in defense strategy and his operational excellence have earned him recognition as a Commander of the National Order of Merit and an Officer
254、of the Legion of Honor.37Safeguarding Europes Security in the age of AIDr.Cara Antoine Executive Vice President|Chief Technology,Innovation&Portfolio OfficerDr Cara Lenore Antoine is a renowned global leader,innovative speaker,and bestselling author,who is passionate about creating positive change i
255、n society,the economy and our planet.A technology advocate,education champion and empowering executive,Dr.Antoine enables people and organizations to achieve their full potential in the digital era.With three decades of dedicated experience,Dr.Antoine is a powerful agent of growth and transformation
256、,driving impact at the intersection of technology and humanity.As the Executive Vice President and Chief Technology,Innovation&Portfolio Officer of Capgemini Europe,Dr.Antoine strategically advises global corporations in the C-Suite across industries on applying innovation to drive and accelerate di
257、gital and cultural transformation.Andreas Conradi Executive Vice President|Head of Defense EuropeSince March 2023 Andreas has been Executive Vice President and Head of Defense Europe at Capgemini.As such,he is responsible for Capgeminis business with the Defense Industry as well as Defense Ministrie
258、s and Armed forces in Europe and NATO.Andreas is a proven defense sector expert with sustained successful track record as top official at the helm of the German Ministry of Defense including as Chief of Staff to Defense Minister Ursula von der Leyen.Based on more than two decades of experience,he ha
259、s a deep understanding of the structure and function of the public and private defense sector in Europe including the set-up and management of national and international armament programs.Lt.General Stefano Cont Capability,Armament and Planning Director,European Defence AgencyLt.General Stefano Cont
260、 is the European Defence Agencys Capability,Armament,and Planning Director,leading efforts to enhance Europes defense capabilities and technological edge.His leadership spans critical domains,including strategic planning,capability development,and international defense cooperation,ensuring the resil
261、ience of European defense systems in the face of evolving challenges.Lt.General Conts distinguished military career includes commanding fighter and fighter training squadrons in both Italy and the United States,with over 3,400 flying hours as a command and instructor pilot.He served as the Commander
262、 of the 61st Flight Training Wing and Lecce Air Base from 2006 to 2008.He held key positions such as Defense Attach to the United States,Mexico,and Canada,where he advanced international military collaboration and defense procurement.His expertise extends to strategic advisory roles,including Head o
263、f the Political-Military Office in the Italian Ministry of Defense,where he shaped national defense strategy,industrial policy,and international relations.His academic accomplishments include advanced degrees in Aeronautical Sciences,Political and Military Sciences,International Strategic Studies,an
264、d National Security Strategy,complemented by a doctorate in International and Diplomatic Sciences.38Safeguarding Europes Security in the age of AIDr.Mark Dorn Director Defense|Cambridge Consultants Mark has worked for 30 years providing technology and advice to clients within the defense research,pr
265、ocurement and the industrial supply chain.His focus in recent years has been leading research on the application of AI,to aid military operations.He has also led the development of leading-edge AI solutions to applications such as cybersecurity and autonomy.He recognizes the need to engender Trust i
266、n AI and has delivered projects advising clients on approaches to understand the risk to AI,demonstrate technology to monitor and explain AI and develop tests for the algorithms.Patrice Dubo Executive Vice President|Chief Technology&Innovation Officer-Aerospace&DefensePatrice Dubo has been working i
267、n Innovation&Technology for more than 30 years in multicultural environments.After leading the Global Capgemini Architects Community,he is now Innovation Executive Vice President and CTIO for Capgemini S&C Europe and for the Global AeroSpace&Defense Industry.He is leading Innovation&Technology teams
268、 to deploy Innovation at scale for global corporation&clients with key partners and emerging startups.Being passionate about sustainable Innovation,IOT,Telecom and Smart Energy,he has also founded a startup,to deliver autonomous telecom stations providing solar energy&data connections for isolated t
269、erritories.Major General Dominique Luzeaux,Dr.Hab.Digital Transformation Champion and Special Advisor to SACTDominique Luzeaux has over 30 years of experience in defense engineering,focusing on complex systems,digital transformation,and advanced technologies.His career spans leadership roles in mili
270、tary acquisition,system engineering,and digital strategy,including serving as Director of the Digital Defense Agency from 2021 to 2023,overseeing key defense digital projects.Dominique Luzeauxs academic achievements include degrees from cole Polytechnique and cole Nationale Suprieure des Techniques
271、Avances,alongside a PhD in artificial intelligence.He has also published extensively,with nine books and over 100 articles on topics such as nanotechnology and systems engineering.39Safeguarding Europes Security in the age of AIMartijn van de Ridder MSc Vice President|Lead Data&AI Defense EuropeWith
272、 more than 2 decades of experience in data and AI and more than a decade experience in public security and defense,Martijn is dedicated to help public sector organizations maximize the value of data and AI and transform into data-driven organizations.Amongst others,he advises Chief Data Officers on
273、data&AI strategy definition,implementation and execution driving innovation and growth to data mastery through cutting-edge data and AI solutions.Martijns mission is to leverage data and AI to improve decision-making,operational readiness,and overall information position for defense organizations ac
274、ross Europe.Dr.Benjamin Schulte Strategy&Innovation Lead|Defense EuropeWith over 19 years of experience in the defense sector and a PhD in Innovation&Technology Management,Benjamin is a seasoned expert dedicated to driving innovation in defense.After serving as an army officer for 15 years in the Ge
275、rman Federal Armed Forces,he now directs the Strategy and Innovation stream in Defense Europe.In this role,he leads the defense innovation ecosystem in Europe,connecting the innovation power of Capgemini and its technology partners with defense clients.His expertise includes developing innovation an
276、d technology strategies,conceptualizing and designing new solutions and ventures,and integrating new technologies into operational capabilities,ensuring impactful advancements in defense.Julian van Velzen Head of Capgeminis Quantum Lab Julian is the Head of the Capgemini quantum lab;a global network
277、 of quantum experts,partners and facilities focused on three key areas:Sensing,Communication and Computing.From this Lab,Capgemini is exploring and building the path towards a quantum advantage with its clients for business and societal problems that,up until now,are seemingly intractable.Julian has
278、 a background in condensed matter physics from the University of Amsterdam,he is part of the group CTIO community,he is the Dutch representative of the European quantum consortium(QuIC),and member of the Forbes Technology Council.40Safeguarding Europes Security in the age of AIDr.Bryan Wells NATO Ch
279、ief ScientistBryan Wells is NATOs Chief Scientist,leading the organizations efforts in science and technology innovation and policy.In this role,he chairs the NATO Science and Technology Board,advises NATO leadership on scientific advancements and their strategic implications,and oversees the Office
280、 of the Chief Scientist at NATO Headquarters.His work is critical in ensuring NATO remains at the forefront of technological innovation to address modern security challenges.Dr.Wells joined NATO in 2019 following an accomplished career in the UK Ministry of Defense,where he served as Head of Science
281、 and Technology Policy,Strategic Research,and International Engagement.He has also held prominent roles such as Chair of the European Defense Agencys Research and Technology Steering Board,Deputy Director of NATO Policy,and Director of Counter-Proliferation and Arms Control.Dr.Wells is an Oxford-edu
282、cated chemist,with a DPhil and postdoctoral research at Merton College.Dr.Christian Weber Principal|Partner Lead and Client Manager Defense,Capgemini Insights&Data Germany Christian is an expert in digital innovation and generative AI,specializing in critical application areas within the public sect
283、or and industry.These sectors face particularly high demands for IT security and digital sovereignty.His work focuses on ensuring the safe and trustworthy application of the latest AI technologies.Christian draws on his extensive and long-standing experience across military,political,academic,and in
284、dustrial domains to achieve these goals.Leveraging the expertise from Cambridge Consultants,the deep tech powerhouse of CThis report has been developed in collaboration with ForwardGlobal.Axel Dyvre,Senior PartnerPauline Massard,PartnerJohannes Feige,Senior ConsultantMaxime Huilliard,ConsultantLucas
285、 Keller,C41Safeguarding Europes Security in the age of AIBibliographyAnderjung,M.,et al.(2024).Computing Power and the Governance of AI,Center for the Governance of AI,https:/www.governance.ai/post/computing-power-and-the-governance-of-aiAraya,D.(2022).Artificial intelligence for Defense and Securit
286、y,Center for International innovation,https:/www.cigionline.org/static/documents/Araya_AI-for-Defence_SpecialReport_Q4fjNfp.pdfAraya,D.,King,M.(2022).The Impact of Artificial Intelligence on Military Defense and Security,Center for International innovation,https:/www.cigionline.org/static/documents/
287、no.263.pdfAustralian Army(2021),Army Quantum Technology Roadmap,https:/researchcentre.army.gov.au/sites/default/files/RD5734_Quantum%20Roadmap%20WEB.pdfAustrian Academy of Sciences(2018),Secure quauntum communication over 7,600 kilometers,https:/www.oeaw.ac.at/en/news-1/secure-quantum-communication-
288、over-7600-kilometers-2Avalos,R.,S.,Gonzales,F.,Ortiz,T.,Responsible use of AI for public policy:Data science toolkit,IADB,https:/publications.iadb.org/en/responsible-use-ai-public-policy-data-science-toolkitAmazon Web Services(date NA).,What is Deep Learning?,https:/ Bang,A.,Kamal,K.K.,Joshi,P.,Bhat
289、ia,K.(2023).6G:The Next Giant Leap for AI and ML,Procedia Computer Science,Volume 218,pp.310-317,https:/doi.org/10.1016/j.procs.2023.01.013 Bode,I.,Nadibaidze,A.,Zhang,Q.(2024),AI in Military Decision Support Systems,Center for War Studies,https:/usercontent.one/wp/www.autonorms.eu/wp-content/upload
290、s/2024/11/AI-DSS-report-WEB.pdf Bondar,K.(2024).Understanding the Military AI Ecosystem of Ukraine,Center for Strategic and International Studies(CSIS),https:/www.csis.org/analysis/understanding-military-ai-ecosystem-ukraine Bradshaw,T.,Kinder,T.and Pfeifer,S.(2024).German AI defense start-up Helsin
291、g poised to triple valuation to$4.5bn,FT,https:/ fr Sicherheit in der Informationstechnik,et al.(2024),Securing Tomorrow,Today:Transitioning to Post-Quantum Cryptography,https:/www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Crypto/PQC-joint-statement.pdf?_blob=publicationFile&v=5Calais,S.,Tay,J.(2024).
292、Generative AI hardware-the other arms race,A&O Shearman,https:/ AI disinformation:Protecting truth in the digital world,WEF,https:/www.weforum.org/stories/2024/06/ai-combat-online-misinformation-disinformation/Cambridge Consultants,Pioneering AI cyberattack response for the UK military,https:/ 5 Tec
293、h Trends to Watch in 2025,https:/ Chen,C.(2021),The future is now:artificial intelligence and anticipatory humanitarian action,ICRC,https:/blogs.icrc.org/law-and-policy/2021/08/19/artificial-intelligence-anticipatory-humanitarian/China Industrial Daily(2024).人工智能發展持續蓬勃向前 AI大模型成為未來產業新賽道(The developme
294、nt of artificial intelligence continues to thrive,with AI large models emerging as a new frontier in future industries),http:/ Cohen,R.and Mihalka,M.(2001).Cooperative security:New horizons for international order.The Marshall Center Papers,Number 3,https:/www.marshallcenter.org/sites/default/files/
295、files/2020-04/mc-paper_3-en.pdf Dickson,J.and Harding,E.(2024),Unleashing Quantums Potential,Center for Strategic and International Studies,https:/www.csis.org/analysis/unleashing-quantums-potentialDijkstra,E.(2024),Quantum and Military Communication Security:An Analysis of the Opportunities,Risks,I
296、mplementation Challenges,and Prospects of Quantum Computing in Military Communication,http:/essay.utwente.nl/103094/42Safeguarding Europes Security in the age of AIDrent,M.(2011).The EUs Comprehensive Approach to Security:A Culture of Co-ordination?,Studia Diplomatica,STUDIA DIPLOMATICA LXIV(2),http
297、s:/www.clingendael.org/sites/default/files/pdfs/20111000_sd_drent_approach.pdf EEAS(2020).A strategic compass for Security and Defense,https:/www.eeas.europa.eu/sites/default/files/documents/strategic_compass_en3_web.pdf Engels,R.(2024),Breaking free from confirmation bias in AI:A call for a better
298、approach to all things AI,Capgemini,https:/ intelligence and predictive policing:risks and challenges,https:/eucpn.org/sites/default/files/document/files/PP(2).pdfEuropean Commission(2023),Commission recommends carrying out risk assessments on four critical technology areas:advanced semiconductors,a
299、rtificial intelligence,quantum,biotechnologies,press release,https:/ec.europa.eu/commission/presscorner/detail/en/ip_23_4735Everett,M.(2021).EUUS collaboration on quantum technologies,Chatham House,https:/www.chathamhouse.org/sites/default/files/2021-01/2021-01-28-eu-us-quantum-tech-everett.pdf Fras
300、er,C.(2024).AIs baptism by fire in Ukraine and Gaza offers wider lessons,International Institute for Strategic Studies(IISS),https:/www.iiss.org/online-analysis/military-balance/2024/04/analysis-ais-baptism-by-fire-in-ukraine-and-gaza-offer-wider-lessons/Garisto,D.(2024),How cutting-edge computer ch
301、ips are speeding up the AI revolution,Nature,https:/ New Future for Military Security Using Fully Homomorphic Encryption,Royal Military Academy,https:/ Eker,M.(2021),How to factor 2048-bit RSA integers in 8 hours using 20 million noisy qubits,Quantum,5,https:/quantum-journal.org/papers/q-2021-04-15-
302、433/pdf/Goncharuk,V.(2024),Russias War in Ukraine:Artificial Intelligence in Defense of Ukraine,ICDS Brief,https:/icds.ee/wp-content/uploads/dlm_uploads/2024/09/Layout-AI-in-Defense-of-Ukraine.pdfGrand-Clment,S.(2023),Artificial Intelligence Beyond Weapons,United Nations Institute for Disarmament Re
303、search(UNIDIR),https:/unidir.org/wp-content/uploads/2023/10/UNIDIR_AI_Beyond_Weapons_Application_Impact_AI_in_the_Military_Domain.pdfHammond,S.(2024),The Scramble for AI Computing Power,American Affairs,https:/americanaffairsjournal.org/2024/05/the-scramble-for-ai-computing-power/Henshall,W.(2024),T
304、he U.S.Militarys Investments Into Artificial Intelligence Are Skyrocketing,Time,https:/ al.(2022),Long-range QKD without trusted nodes is not possible with current technology,NPJ Quantum Information,8(108)IBM(2021),IBM Quantum breaks the 100-qubit processor barrier,https:/ IBM error correction paper
305、 published on the cover of Nature,https:/ are large language models(LLMs)?,https:/ is sovereign cloud?https:/ Intelligence(AI)Hardware,Intel,https:/ Surge Could Trigger Global Chip Shortage by 2026,Research Finds,TechRepublic,https:/ rve quantique chinois:les aspirations dun gant dans linfiniment pe
306、tit,Etudes de lIFRI,https:/www.ifri.org/fr/etudes/le-reve-quantique-chinois-les-aspirations-dun-geant-dans-linfiniment-petitKpke J.and Ksters A.(2023),Vorteil Ukraine:Wie KI die Krfteverhltnisse im Krieg verndert,CEP,https:/www.cep.eu/de/eu-themen/details/vorteil-ukraine-wie-ki-die-kraefteverhaeltni
307、sse-im-krieg-veraendert-cepadhoc.html Krelina,M.(2021).Quantum technology for military applications,EPJ Quantum Technology Vol.8(24),https:/doi.org/10.1140/epjqt/s40507-021-00113-y43Safeguarding Europes Security in the age of AIJulienne,M.(2022),Le rve quantique chinois:les aspirations dun gant dans
308、 linfiniment petit,Etudes de lIFRI,https:/www.ifri.org/fr/etudes/le-reve-quantique-chinois-les-aspirations-dun-geant-dans-linfiniment-petitKpke J.and Ksters A.(2023),Vorteil Ukraine:Wie KI die Krfteverhltnisse im Krieg verndert,CEP,https:/www.cep.eu/de/eu-themen/details/vorteil-ukraine-wie-ki-die-kr
309、aefteverhaeltnisse-im-krieg-veraendert-cepadhoc.html Krelina,M.(2021).Quantum technology for military applications,EPJ Quantum Technology Vol.8(24),https:/doi.org/10.1140/epjqt/s40507-021-00113-y Kumar,M.(2022),Post-quantum cryptography Algorithms standardization and performance analysis,ArrayLegard
310、a,H.and Nouwens,M.(2018),Chinas pursuit of advanced dual-use technologies,International Institute for Strategic Studies,https:/www.iiss.org/research-paper/2018/12/emerging-technology-dominance/Li,S.(2023),Post-Quantum Security:Opportunities and Challenges,Sensors 23,https:/ radar:A stealth buster or
311、 a bluff?,Asia Times,https:/ Digital(2024),Quantum Technology Monitor,https:/ Piani,M.(2023),Quantum threat timeline report,Global Risk Institute,https:/globalriskinstitute.org/publication/2023-quantum-threat-timeline-report/MRL(2023),How AI and 5G will power the next wave of Innovation,https:/ Secu
312、rity Conference(2024),Lose-Lose?Munich Security Conference Report 2024,https:/securityconference.org/assets/01_Bilder_Inhalte/03_Medien/02_Publikationen/2024/MSR_2024/MSC_Report_2024_190 x250mm_EN_final_240507_DIGITAL.pdfMunich Security Conference(2022),Transatlantic To-Do List,https:/securityconfer
313、ence.org/transatlantic-to-do-list/#c6870 Muralidharan,S.,et al.(2016).Optimal architectures for long distance quantum communication.Nature Magazine Scientific Reports,6,https:/doi.org/10.1038/srep20463 NASA(2023),Technology Readiness Levels,https:/www.nasa.gov/directorates/somd/space-communications-
314、navigation-program/technology-readiness-levels/NATO(2022),NATOs Data and Artificial Intelligence Review Board,https:/www.nato.int/cps/su/natohq/official_texts_208374.htmNATO(2024),Summary of NATOs revised Artificial Intelligence(AI)strategy,https:/www.nato.int/cps/en/natohq/official_texts_227237.htm
315、NIST(2009),NIST Demonstrates Universal Programmable Quantum Processor for Quantum Computers,https:/www.nist.gov/news-events/news/2009/11/nist-demonstrates-universal-programmable-quantum-processor-quantumNIST(2024),NIST Releases First 3 Finalized Post-Quantum Encryption Standards,https:/www.nist.gov/
316、news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standardsNIST(2024),Transition to Post-Quantum Cryptography Standards,NIST Internal Report,NIST IR 8547 ipd,https:/nvlpubs.nist.gov/nistpubs/ir/2024/NIST.IR.8547.ipd.pdfOBrien,M.(2024),U.S.ahead in AI innovation,easily
317、surpassing China in Stanfords new ranking,AP News,https:/ OpenAIs new model is such a big deal,MIT Technology Review,https:/ Library,AI language models,OECD Digital Economy Papers,https:/www.oecd-ilibrary.org/science-and-technology/ai-language-models_13d38f92-enOmaar,H.(2024),How Innovative Is China
318、 in AI?,Information Technology&Innovation Foundation,https:/itif.org/publications/2024/08/26/how-innovative-is-china-in-ai/Omaar,H.and Makaryan,M.(2024),How Innovative Is China in Quantum?,Information Technology&Innovation Foundation,https:/itif.org/publications/2024/09/09/how-innovative-is-china-in
319、-quantum/Parker,E.(2022),An Assessment of the U.S.and Chinese Industrial Bases in Quantum Technology,RAND Corporation Research Report,https:/www.rand.org/pubs/research_reports/RRA869-1.html44Safeguarding Europes Security in the age of AIOmaar,H.and Makaryan,M.(2024),How Innovative Is China in Quantu
320、m?,Information Technology&Innovation Foundation,https:/itif.org/publications/2024/09/09/how-innovative-is-china-in-quantum/Parker,E.(2022),An Assessment of the U.S.and Chinese Industrial Bases in Quantum Technology,RAND Corporation Research Report,https:/www.rand.org/pubs/research_reports/RRA869-1.h
321、tmlParker,E.(2021),Commercial and Military Applications and Timelines for Quantum Technology,RAND Corporation Research Report,https:/www.rand.org/pubs/research_reports/RRA1482-4.htmlPupillo,L.,et al.(2023),Quantum Technologies and Cybersecurity:Technology,governance and policy challenges,Centre for
322、European Policy Studies,https:/cdn.ceps.eu/wp-content/uploads/2023/12/CEPS-TFR-Quantum-Technologies-and-Cybersecurity.pdfPerez,L.(2024),CDAO Enabling Workforce to Harness Data Analytics,AI,MeriTalk,https:/ cloud opens the door to transformation in the public sector,Capgemini,https:/ Hat(2021).What i
323、s edge computing?,https:/ Box picks Italys Piedmont region for$3.4 bln chip plant,June 28,2024,https:/ Zhang,L(2022),Network artificial intelligence,fast and slow,https:/dl.acm.org/doi/10.1145/3565009.3569521Ruitenberg,R.(2024),France preps Europes fastest classified supercomputer for defense AI,Def
324、enseNews,https:/ develop their own understanding of reality as their language abilities improve,MIT News,https:/news.mit.edu/2024/llms-develop-own-understanding-of-reality-as-language-abilities-improve-0814Sparks,L.(2024),New supercomputing network could lead to AGI,scientists hope,with 1st node com
325、ing online within weeks,Live Science,https:/ al.(2023),The Potential of Quantum Techniques for Stock Price Prediction,https:/arxiv.org/pdf/2308.13642Swayne,M.(2024).Report:China And Russia Test Quantum Communication Link,Quantum Insider,(2 January 2024)https:/ Scientists Report Using Quantum Compute
326、r To Hack Military-Grade Encryption,Quantum Insider(11 October 2024),https:/ Economist(2024),How Ukraine is using AI to fight Russia,https:/ A.(2024).Kendall:In US-China Race for Technological Superiority,AI May Be the Key,Air&Space Forces Magazine(29 October 2024),https:/ al.(2023),Post-Quantum Cry
327、ptography,Technology Primers for Policymakers,https:/www.belfercenter.org/sites/default/files/2024-10/Post%20Quantum%20Cryptography_Tech%20Primer.pdfU.S.Department of State(2023),Political Declaration on Responsible Military Use of Artificial Intelligence and Autonomy,https:/www.state.gov/political-
328、declaration-on-responsible-military-use-of-artificial-intelligence-and-autonomy-2/Vallance,C(2024).Google unveils mind-boggling quantum computing chip,BBC,https:/ of the current status of quantum computing development in China and the United States),Shanghai Institute of Scientific and Technical Inf
329、ormation,https:/ Wilkins,A.(2023),Record-breaking quantum computer has more than 1000 qubits,News Scientist,https:/ Is Pumping Billions Into New Military Tech,Wired,https:/ Crumbling:Russian Defense AI in a Time of War,Royal United Services Institute,https:/rusi.org/explore-our-research/publications
330、/commentary/struggling-not-crumbling-russian-defence-ai-time-war45Safeguarding Europes Security in the age of AI1.Araya,D.,King,M.(2022),The Impact of Artificial Intelligence on Military Defense and Security,Center for International innovation,https:/www.cigionline.org/static/documents/no.263.pdf p.
331、112.NATO(2024),Summary of NATOs revised Artificial Intelligence(AI)strategy,https:/www.nato.int/cps/en/natohq/official_texts_227237.htm 3.Calais,S.,Tay,J.(2024),Generative AI hardware-the other arms race,A&O Shearman,https:/ 4.Jackson,F.(2024),AI Surge Could Trigger Global Chip Shortage by 2026,Rese
332、arch Finds,TechRepublic,https:/ cit.7.Munich Security Conference(2022),Transatlantic To-Do List,https:/securityconference.org/en/transatlantic-to-do-list/8.Bode,I.,Nadibaidze,A.,Zhang,Q.(2024),AI in Military Decision Support Systems,Center for War Studies,https:/usercontent.one/wp/www.autonorms.eu/w
333、p-content/uploads/2024/11/AI-DSS-report-WEB.pdf p.369.Ibid.,p.1110.Sovereign cloud is a type of cloud computing that complies with laws and regulations from the country or region where it operates.See IBM(2024),What is sovereign cloud?,https:/ cloud opens the door to transformation in the public sector,Capgemini,https:/ New Future for Military Security Using Fully Homomorphic Encryption,Royal Mil