Are your risk registers and continuity plans built for this reality?
Read: www.lowyinstitute.org/the-interpre... 8/8
Posts by Dr Miah Hammond-Errey
The CrowdStrike outage showed what happens when this infrastructure fails by accident. The Gulf strikes show what happens when an adversary targets it on purpose. Sovereign AI infrastructure is no longer a long-term aspiration. It's an immediate operational requirement. 7/
🇦🇺 Australia is not watching from a safe distance. Subsea cables connecting us to partners traverse some of the world's most contested waters. 6/
🗺️ Data, connectivity, energy, compute capacity and workforce together form the "architectures of AI" — the underlying infrastructure shaping contemporary security, society and sovereignty. Concentration of this infrastructure creates chokepoints that adversaries can identify, locate and strike. 5/
🏗️ Data centres are easy to locate. They must be near energy and water, making them discoverable even when 'undisclosed'. Cooling units and generators are visible from satellite imagery. Close to urban centres, with populations at risk. 4/
🌊 17 submarine cables pass through the Red Sea—carrying most data traffic between Europe, Asia, and Africa. Both that corridor and the Strait of Hormuz are simultaneously active conflict zones. Indo Pacific cables in contested waters. 3/
Data centres (+ AI infrastructure) are military targets. This isn't a future threat. It's happening now. Things every executive and board should be thinking about:
🎯 The boundary between civilian and military computing has effectively collapsed. Commercial infrastructure is now under threat. 2/
When the war reaches for the cloud, AI becomes a target. Earlier this month, Iran struck three data centres in the UAE and Bahrain with drones—reportedly taking them offline and disrupting banking, apps, and software across the region. What this means, is up on Lowy Institute's Interpreter today! 1/
Shots fired.
“Because, as you can imagine, if by chance the German partner were to call into question the joint aircraft project, we would be forced to call into question the joint tank project.” -
Macron in Le Monde
www.lemonde.fr/economie/art...
The article specifically examines how technology companies can coerce, influence or incentivise the resort-to-force decision making of smaller states, thereby challenging traditional notions of state sovereignty and international security. 6/7
It argues that, as technology companies amass unprecedented control over digital infrastructure and information flows, most nation states – particularly smaller or less technologically advanced ones – experience diminished autonomy in decisions to use force. 5/7
The article identifies three critical factors that collectively alter the calculus of war: (i) the concentration of power across the architectures of AI, (ii) the diffusion of national security decision making, and (iii) the role of AI in shaping public opinion. 4/7
It demonstrates how these architectures concentrate power within a select number of technology companies, which increasingly function as national security actors capable of influencing state decisions on the resort to force. 3/7
Conceptualising AI as part of a broader, interconnected technology ecosystem encompassing data, connectivity, energy, compute capacity and workforce, it introduces the notion of “architectures of AI” to describe the underlying infrastructure shaping contemporary security and sovereignty. 2/7
Read my latest: Architectures of AI: Tech power broking war?This article investigates the profound impact of artificial intelligence (AI) and big data on political and military deliberations concerning the decision to wage war. 1/7
My conversation with @miahhe.bsky.social on how emerging technologies are reshaping war, alliances, and societies at a moment of profound global uncertainty.
ts.transistor.fm/episodes/cha...
Love chatting with you @kcar.me
Discussing #AI, #Cybersecurity and Sovereignty on the Technology & Security Podcast with @miahhe.bsky.social
katecarruthers.com/2025/12/29/a...
Had an interesting recent chat with @miahhe.bsky.social on her podcast: Data Integrity, AI Risk, Cyber Realities & tech leadership
share.transistor.fm/s/4a6e4d6a
Supported by @opentechfund.bsky.social: @chinafile.bsky.social’s Jessica Batke & @whiskeyocelot.bsky.social explain that Chinese censorship isn’t simply a “firewall, but a “locknet” – a multi-level system of socio-technical controls. (1/4)
locknet.chinafile.com/the-locknet/...
Australia is not immune to these global forces. But with (comparatively) robust institutions and willingness to adapt and challenge, we have the potential to forge our own path.
#Democracy #InformationIntegrity #DigitalLiteracy #TechEthics #technology # security #nationalsecurity #information
Why does this matter? * Our democracy depends on the integrity of information. * Algorithmic curation and personalised information feeds are fragmenting our shared understanding and amplifying division. * We have a narrow window to act.
In my latest piece, I examine how the collapse of a common and shared reality is threatening our ability to govern, deliberate, and make informed decisions. From AI-driven disinformation to the concentration of power in a handful of platforms, the stakes have never been higher.
Can We Keep Our Minds—and Democracy? We are living through a profound transformation in how information shapes our world. The shared facts and institutional trust that once underpinned our democracy are being replaced by an environment driven by algorithmic curation, polarisation, and manipulation.
📱If you use technology (social media, AI anything!) can you give me five minutes? 📝 I am working to better understand human-technology interactions to develop resources which increase user wellbeing, brain function and happiness. Can you respond and share this survey? www.surveymonkey.com/r/XJXV3P6
I’ve got an academic piece on this in review. Happy to share/discuss :-) dm if interested..
I’ve got an academic piece in this in review. Happy to share/discuss :-) dm if interested..
This is the core of it. In the 20th century, verification happened inside institutions.
Now, it has to happen in us.
A short thread on what that shift really means, and why it has to start in schools. 🧵