Study of usage of Artificial Intelligence in the context of Cyber Warfare
Keywords:
Inteligência Artificial; Guerra Cibernética; Aplicação., Artificial Intelligence; Cyber War; Application.Abstract
Continuous advances in the Information and
Communication Technology sector imply the
emergence of new challenges for Cyber Warfare.
This article focuses on the application of Artificial
Intelligence (AI) in Cyber Warfare offensive
operations. Through a literature review, the
geopolitical context of the development of
artificial intelligence in countries like China, the
United States, India and Russia was presented
and analyzed. As a result of this research, we
envision the presentation of possible scenarios
of cyber attacks based on AI. Finally, it was
possible to identify evidence of a new posture by
Brazil in the development of AI, as well as
recommendations to guarantee the continuous
progress of the Brazilian government in the use
of AI.
Downloads
References
ALLEN, G.; CHAN, T. Artificial Intelligence and
National Security. Washington, DC:
Congressional Research Service, 2018.
Disponível em: https://thebulletin.org/2018/02/
artificial-intelligence-and-national-security/.
Acesso em: 25 ago. 2020.
ALPAYDIN, E. Introduction to Machine Learning.
2nd. ed. Cambridge: The MIT Press, 2010. Ebook.
ANDERSON, H. Deepdga: adversarially-tuned
domain generation and detection. New York:
ACM, 2016. Disponível em: https://
www.defenseone.com/ideas/2018/04/russiaraces-
forward-ai-development/147178/. Acesso
em: 10 out. 2020.
BENDETT, S. In AI, Russia Is Hustling to Catch
Up. Washington, DC: Defense One, Apr.
2018. Disponível em: https://
www.defenseone.com/ideas/2018/04/russiaraces-
forward-ai-development/147178/. Acesso
em: 10 out. 2020.
BHATIA, R. Can India’s AI Talent Gap Be
Stemmed With Government Initiatives?.
Bengaluru: Analytics India, Feb. 2018.
Disponível em: https://analyticsindiamag.com/
can-indias-ai-talent-gap-stemmed-governmentinitiatives/.
Acesso em: 09 out. 2020.
BOYD, A. White House Announces Select
Committee of Federal AI Experts.
Washington: Nextgov, 2018. Disponível em:
https://bit.ly/3jHtTBX. Acesso em: 07 out 2020.
BRASIL. Manual de Abreviaturas, Siglas,
Símbolos e Convenções Cartográficas das
Forças Armadas. Brasília, Distrito Federal:
Ministério da Defesa, 2008. Disponível em:
https://bit.ly/3oJqoyI. Acesso em: 20 ago.
2020.
BRASIL. Portaria nº 93. Dispõe sobre Glossário
de Segurança da Informação. Brasília, Distrito
Federal: Gabinete de Segurança Institucional da
Presidência da República, set. 2019. Disponível
em: http://www.in.gov.br/en/web/dou/-
/portaria-n-93-de-26-de-setembro-de-2019-
219115663. Acesso em: 20 set. 2020.
BROWNE, R. Weaponized drones: machines that
attack on their own. New Jersey: CNBC, July
2018. Disponível em: https://
www.cnbc.com/2018/07/20/ai-cyberattacksartificial-
intelligence-threatenscybersecurity.
html. Acesso em: 12 out. 2020.
BRUNDAGE, M.; Avin, S.; Clark, J. et al. The
Malicious Use of Artificial Intelligence:
forecasting, prevention, and mitigation.
Disponível em: https://doi.org/10.17863/
CAM.22520. Acesso em: 11 out. 2020.
C4AI. Sobre o C4AI. São Paulo: C4AI - Centro
de Inteligência Artificial, 2020
Disponível em: http://c4ai.inova.usp.br/pt/
sobre/. Acesso em: 25 out. 2020.
CERT. Cartilha de Segurança para Internet. São
Paulo: Comitê Gestor da Internet no Brasil,
2019. Disponível em: https://cartilha.cert.br/
livro/cartilha-segurancainternet.pdf. Acesso em:
26 out. 2019.
CHINA. New Generation of Artificial Intelligence
Development Plan. State Council, 2017.
Disponível em: https://flia.org/wp-content/
uploads/2017/07/A-New-Generation-of-Artificial-
Intelligence-Development-Plan-1.pdf Acesso em:
08 out. 2020.
COMITER, M. Attacking Artificial Intelligence:
AI’s security vulnerability and What
Policymakers Can Do About It. Cambridge:
Belfer Center for Science and International
Affairs, Aug. 2019. Disponível em: https://
www.belfercenter.org/publication/AttackingAI.
Acesso em: 20 out. 2020.
CYXTERA, T. DeepPhish: simulating malicious AI.
Flórida: Cyber Threat Analytics, 2018. Disponível
em: https://
albahnsen.files.wordpress.com/2018/05/
deepphish-simulating-maliciousai_
submitted.pdf Acesso em: 08 out. 2020.
FINNIE, S. Cyber threats fuelled by AI: security’s
next big challenge. Framingham: CSO, Oct.
2018. Disponível em: https://bit.ly/34K3qj1.
Acesso em: 15 out. 2020.
HANDA, U. How AI is making organizations more
resilient to cybercrime. London: PWC, Aug.
2020. Disponível em: https://
www.digitalpulse.pwc.com.au/ai-cybersecurityresilience/.
Acesso em: 20 ago. 2020.
INDIA. National Strategy for Artificial
Intelligence. Mumbai: June, 2018.
Disponível em: http://www.niti.gov.in/
writereaddata/files/document_publication/
NationalStrategy-for-AI-Discussion-Paper.pdf.
Acesso em: 10 out. 2020.
JIA, K.; KENNEY, M.; MATTILA, J. et al. The
Application of Artificial Intelligence at
Chinese Digital Platform Giants: Baidu,
Alibaba and Tencent. Berkeley: Berkeley
Roundtable On The International Economy, Nov.
2018. Disponível em: https://bit.ly/35Pd2sg.
Acesso em: 08 out. 2020.
KAI-FU, L. AI Superpowers: China, Silicon
Valley, and the New World Order. Boston:
Houghton Mifflin Harcourt, 2018. E-book.
KUBOVIČ, O. Can Artificial Intelligence Power
Future Malware?. San diego: ESET White
Paper, 2018. Disponível em: https://
www.welivesecurity.com/wp-content/
uploads/2018/08/
Can_AI_Power_Future_Malware.pdf. Acesso em:
11 out. 2020.
MEINERT, M. C. Artificial Intelligence: the next
frontier of cyber warfare?. Washington, DC:
American Bankers Association Banking Journal,
2018. Disponível em: https://
www.semanticscholar.org/paper/Artificial-
Intelligence%3A-The-Next-Frontier-of-Cyber-
Meinert/. Acesso em: 9 out. 2020.
MENON, R. M.; VAZIRANI, M. Rewire for
Growth: accelerating India’s economic
growth with Artificial Intelligence. Dublin:
Accenture, Dec. 2017. Disponível em: https://
www.accenture.com/
t20171220T030619Z__w__/in-en/_acnmedia/
PDF-68/Accenture-ReWire-For-Growth-POV-19-
12-Final.pdf. Acesso em: 9 out. 2020.
METZ, C. As China Marches Foward on A.I: the
White House is silent. New York: The New York
Times, Feb. 2018. Disponível em: https://
www.nytimes.com/2018/02/12/technology/
china-trump-artificial-intelligence.html. Acesso
em: 9 out. 2020.
MORGAN, F.; BOUDREAUX, B.; LOHN, A. et al.
Military Applications of Artificial
Intelligence: ethical concerns in an
uncertain world. Santa Monica: RAND
Corporation, 2020. Disponível em: https://
www.rand.org/pubs/research_reports/RR3139-
1.html. Acesso em: 12 out. 2020.
PEREIRA, M. Representação Semântica de Perfil
Dinâmico de Usuários em Comunidades de
Prática. Dissertação (Mestrado em
Computação) – Universidade Federal do Rio
Grande do Sul, Porto Alegre, 2018. Disponível
em: https://www.lume.ufrgs.br/bitstream/
handle/10183/177588/001065807.pdf. Acesso
em: 12 out. 2020.
PONEMON, I. The Value of Artificial Intelligence
in Cybersecurity. Traverse City: Ponemon
Institute, July 2018. Disponível em: https://
public.dhe.ibm. com/common/ssi/ecm/41/
en/41017541usen/ibm-ai-report-final-
1_41017541USEN.pdf. Acesso em: 15 out.
2020.
PWC. Annual Review Predictions AI 2020.
London: PWC, Aug. 2020. Disponível em:
https://www.pwc.com/us/en/services/
consulting/library/artificial-intelligencepredictions-
2020.html Acesso em: 25 ago.
2020.
RAFIQ, A. Indian cyber posture: implications for
Pakistan. Islamabad: Institute of Strategic
Studies, 2019. Disponível em: https://
bit.ly/3edVKZv. Acesso em: 10 out. 2020.
SENADO, A. Styvenson defende princípios para
uso de inteligência artificial no Brasil.
Brasília, Distrito Federal: Agência Senado, 2020
Disponível em: https://bit.ly/34Nnf9k. Acesso
em: 25 out. 2020.
SIMONITE, T. For Superpowers: Artificial
Intelligence fuels new global arms Race. Boone:
Wire, Sept. 2017. Disponível em: https://
www.wired.com/story/for-superpowers-artificialintelligence-
fuels-new-global-arms-race. Acesso
em: 8 out. 2020.
SYMANTEC. Cyber Security Predictions: 2019
and beyond. Tempe: Symantec, Nov. 2018.
Disponível em: https://www.symantec. com/
blogs/feature-stories/cyber-security-predictions-
2019-and-beyond. Acesso em: 10 out. 2020.
TAKANEN, A.; DEMOTT, J.; MILLER, C. Fuzzing
for Software Security Testing and Quality
Assurance. Boston: Artech House, 2008. Ebook
TRIOLO, P.; KANIA, E. Chinese government
outlines AI ambitions through. Washington,
DC: New America, Jan. 2018. Disponível em:
https://bit.ly/2GgfkHY. Acesso em: 10 out.
2020.
TYUGU, E. Algorithms and Architectures of
Artificial Intelligence. Amsterdam: IOS
Press, 2007. E-book.
VASUDEVAN, V. How AI Is Transforming Cyber
Defense. New Jersey: Forbes, July 2018.
Disponível em: https://www.forbes.com/sites/
forbestechcouncil/2018/07/24/how-ai-istransforming-
cyber-defense/. Acesso em: 10
out. 2020.
VEMPATI, S. India and the Artificial Intelligence
Revolution. Carnegie India, Aug. 2016.
Disponível em: http://www.jstor.org/
stable/10.2307/resrep12855. Acesso em: 10
out. 2020.
WHYTE, C. Problems of Poison: new paradigms
and "agreed" competition in the era of AIenabled
cyber pperations. 2020 12th
International Conference on Cyber Conflict
(CyCon), 2020. Disponível em: http://
carnegieindia.org/2016/08/11/india-andartificial-
intelligence-revolution-pub-64299.
Acesso em: 21 out. 2020
*Artigo apresentado como trabalho de conclusão
do Curso de Pós-graduação em Guerra
Cibernética do Centro de Guerra Eletrônica do
Exército Brasileiro em 2020 pelo então 1º
Tenente Taffarel orientado pelo Primeiro-
Sargento Comunicante Adão dos Santos, pelo
Capitão-Tenente (AFN) Vanderlan Silva da Costa
e pelo Prof. MSc. José Barbosa da Silva Filho.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Data & Hertz

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
- Attribution (BY): Appropriate credit must be given to the author.
- NonCommercial (NC): The work may not be used for commercial purposes.
- ShareAlike (SA): Derivative works must be licensed under the same terms.