AGENTIC AI FOR NATIONAL SECURITY AND DEFENSE: AN ANALYTICAL STUDY ON AUTONOMOUS AGENTS IN SURVEILLANCE, STRATEGIC DECISION-MAKING, AND MILITARY OPERATIONS WITH A FOCUS ON ETHICAL AND LEGAL BOUNDARIES

Authors

  • Aashay Gupta Senior Manager - Security Risk Management (Product Security /BISO Delegate) CVS Health, New York-New Jersey, USA

DOI:

https://doi.org/10.29121/digisecforensics.v2.i1.2025.84

Keywords:

Agentic Artificial Intelligence, Autonomous Decision-Making, Explainability, Multi-Agent Systems, Cybersecurity Resilience, Post-Quantum Cryptography, Ethical Governance, Human-AI Collaboration

Abstract

This analytical study explores the integration of agentic artificial intelligence (AI) systems autonomous agents capable of independent decision-making into national security and defense domains, with particular emphasis on surveillance, strategic decision-making, and military operations. Employing a mixed-methods approach, including systematic literature review, secondary data analysis from defense reports, and hypothetical simulations grounded in real-world datasets, the study examines the transformative potential of these technologies while scrutinizing ethical dilemmas such as accountability, bias, and lethal autonomy, alongside legal frameworks like international humanitarian law. Key findings reveal a 45% increase in AI adoption for surveillance between 2020 and 2024 across major powers, yet highlight persistent gaps in regulatory oversight, with 68% of surveyed experts citing accountability as a primary concern. The analysis underscores the need for robust ethical guidelines and adaptive legal structures to mitigate risks. Conclusions advocate for interdisciplinary policy reforms to harness agentic AI's benefits while safeguarding human rights and global stability, contributing to theoretical advancements in AI governance within security contexts.

References

Allen, G. C., and Chan, T. (2017). Artificial Intelligence and National Security. Belfer Center for Science and International Affairs. https://doi.org/10.2139/ssrn.3176853 DOI: https://doi.org/10.2139/ssrn.3176853

Arora, P., and Bhardwaj, S. (2024). Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 7(7).

Arora, P., and Bhardwaj, S. (2024). Research on Various Security Techniques for Data Protection in Cloud Computing with Cryptography Structures. International Journal of Innovative Research in Computer and Communication Engineering, 12(1).

Brundage, M., Avin, S., Wang, J., Belfield, H., Krueger, G., Hadfield, G., Khlaaf, H., Plutowski, A., Amodei, D., Clark, J., Dafoe, A., Bachrach, Y., Chen, A., Flajolet, M., Hendrickx, S., Brundage, M., and Garfinkel, B. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. arXiv preprint. https://doi.org/10.48550/arXiv.1802.07228

Buolamwini, J., and Gebru, T. (2018). Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification. Proceedings of the 1st Conference on Fairness, Accountability and Transparency, 77–91.

Chesney, R., and Citron, D. (2019). Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. California Law Review, 107(6), 1753–1820. https://doi.org/10.15779/Z38G44J DOI: https://doi.org/10.2139/ssrn.3213954

Dafoe, A., Bachrach, Y., Hadfield, G., Horvitz, E., Larson, K., and Graaf, M. (2020). Cooperating with Machines. Nature Communications, 11(1), 233. https://doi.org/10.1038/s41467-019-13962-0 DOI: https://doi.org/10.1038/s41467-019-13962-0

Horowitz, M. C. (2019). When Speed Kills: Lethal Autonomous Weapon Systems, Deterrence and Stability. Journal of Strategic Studies, 42(6), 764–788. https://doi.org/10.1080/01402390.2019.1604986 DOI: https://doi.org/10.1080/01402390.2019.1621174

Kania, E. B. (2021). Battlefield Singularity: Artificial Intelligence, Military Revolution, and China’s Future Military Power. International Security, 46(2), 7–43. https://doi.org/10.1162/isec_a_00421 DOI: https://doi.org/10.1162/isec_a_00421

Kumar, V. A., Bhardwaj, S., and Lather, M. (2024). Cybersecurity and Safeguarding Digital Assets: An Analysis of Regulatory Frameworks, Legal Liability and Enforcement Mechanisms. Productivity, 65(1). DOI: https://doi.org/10.32381/PROD.2024.65.01.1

Muggah, R., and Szabo de Carvalho, I. (2021). AI and the Weaponization of Everything: Implications for Global Security. Igarapé Institute.

Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press. https://doi.org/10.1017/9781316822524 DOI: https://doi.org/10.1017/9781316822524

Sharma, S. (2022). Enhancing Generative AI Models for Secure and Private Data Synthesis.

Sharma, S. (2023). AI-Driven Anomaly Detection for Advanced Threat Detection.

Sharma, S. (2023). Homomorphic Encryption: Enabling Secure Cloud Data Processing.

Sharma, S. (2024). Strengthening Cloud Security with AI-Based Intrusion Detection Systems.

Tambi, V. K. (2023). Efficient Message Queue Prioritization in Kafka for Critical Systems. The Research Journal (TRJ), 9(1), 1–16.

Tambi, V. K. (2023). Real-Time Data Stream Processing with Kafka-Driven AI Models. International Journal of Current Engineering and Scientific Research (IJCESR).

Tambi, V. K. (2024). Cloud-Native Model Deployment for Financial Applications. International Journal of Current Engineering and Scientific Research (IJCESR), 11(2), 36–45.

Tambi, V. K. (2024). Enhanced Kubernetes Monitoring Through Distributed Event Processing. International Journal of Research in Electronics and Computer Engineering, 12(3), 1–16.

Tambi, V. K., and Singh, N. (2023). Developments and Uses of Generative Artificial Intelligence and Present Experimental Data on the Impact on Productivity Applying Artificial Intelligence That Is Generative. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 12(10).

Tambi, V. K., and Singh, N. (2023). Evaluation of Web Services Using Various Metrics for Mobile Environments and Multimedia Conferences Based on SOAP and REST Principles. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 6(2).

Tambi, V. K., and Singh, N. (2024). A Comparison of SQL and No-SQL Database Management Systems for Unstructured Data. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 13(7).

Tambi, V. K., and Singh, N. (2024). A Comprehensive Empirical Study Determining Practitioners' Views on Docker Development Difficulties: Stack Overflow Analysis. International Journal of Innovative Research in Computer and Communication Engineering, 12(1).

Yadav, P. K., Debnath, S., Srivastava, S., Srivastava, R. R., Bhardwaj, S., and Perwej, Y. (2024). An Efficient Approach for Balancing of Load in Cloud Environment. In Emerging Trends in IoT and Computing Technologies. CRC Press.

Downloads

Published

2026-03-31

How to Cite

Gupta, A. (2026). AGENTIC AI FOR NATIONAL SECURITY AND DEFENSE: AN ANALYTICAL STUDY ON AUTONOMOUS AGENTS IN SURVEILLANCE, STRATEGIC DECISION-MAKING, AND MILITARY OPERATIONS WITH A FOCUS ON ETHICAL AND LEGAL BOUNDARIES. Journal of Digital Security and Forensics, 2(1), 163–175. https://doi.org/10.29121/digisecforensics.v2.i1.2025.84