You are on page 1of 2

FMUN 2022 CONFERENCE

Committee- General Assembly

Topic- Weaponization of AI With


Reference to Cyber Warfare

Country- The Arab Republic of Egypt

We Egypt, consider weaponization of Artificial Intelligence (AI) as a potential to change the


nature and the character of warfare. As seen in cyber warfare, AI is expected to be the future
battlefield of warfare since it can be used as an enabler of a weapon or it could be
weaponized as it was the case with nuclear and radioactive capabilities. To put it simple, it
would allow states to employ both kinetic and non-kinetic capabilities, separately or
altogether. There is an excessive use of Artificial Intelligence-enabled applications in the
military realm coupled with the unprecedented advancement in killer robots and the massive
production of drones. This mirrors the hasty inclination to possess the most advanced AI
military applications, so as to intensify AI race. AI has a wide range of applications in the
military, from data processing to battle simulation. The use of autonomous weapons and
vehicles is another domain in which AI is put to use. Military systems that use AI have shown
to manage the massive amount of data more effectively. Lethal autonomous weapons
(LAWs) are a domain of autonomous weapons tech that does independently locate and
conducts operations based on specified restrictions and characterizations.

Egypt considers that international community should also accept the fact that AI race is
irreversible, but regulating it is the best possible choice. AI could exacerbate the security
dilemma, thus the strategy of deterrence which has gained momentum among IR scholars
during the Cold War era, reintroduces itself as a possible solution for the underlying
dilemma. Security threats springing up from cyberspace and outer space alongside the
weaponization of synthetic intelligence is because of the misguided belief by means
of some States that their absolute dominance in such domains may be maintained
The Egyptian Supreme Cybersecurity Council (ESCC) endeavour to determine the technical
level of personnel working in those entities, assess the readiness and response to confront
cyber incidents at the national level, and address various electronic attacks in implementation
of the National Cyber Security Council which aims to raise the technical level of cadres
working in the field of critical infrastructure of communications and information
technology.” We Egypt contemplate that Human out of the loop with respect to scale of
destruction can be highly destructive and perception of threats can be very high.
Weaponization of AI could create a situation similar to mutually assured destruction.
• Agencies within the Egyptian government are working together to prepare for
upcoming cyberattacks, as Egypt has been listed among the 20 countries in the
world most susceptible to cyberattacks, according to the National Telecom
Regulatory Authority (NTRA).

• By 2030 Egypt plans on to be one of the major contributors in the field of AI

• There should mainly be a focus on boosting the skills and competitiveness of


developing countries in these fields, in order to reap the multiple benefits of this
emerging technology.

• Promoting the usage of SAFE AI and hence developing the usage of AI in cyber
warfare

• The EPE framework is a functional approach for implementing. The EPE follows
three main theme’s- Explore, Plan and Execute. Egypt has started to implement the
EPE framework and is on its path to become a contributor to the world of AI in cyber
warfare by 2023-24.

• A treaty to be signed which ensures the safety of AI in the hands of countries.

Bibliography:

https://fount.aucegypt.edu/cgi/viewcontent.cgi?article=1807&context=etds
https://mcit.gov.eg/Upcont/Documents/Publications_672021000_Egypt-National-AI-
Strategy-English.pdf
https://mcit.gov.eg/en/Artificial_Intelligence
https://press.un.org/en/2019/gadis3636.doc.htm
https://www.politico.eu/article/cop-27-climate-change-app-cybersecurity-weapon-risks/
https://fastcompanyme.com/news/egypt-ramping-up-data-and-cybersecurity-
capabilities/

You might also like