AGENTIC AI FOR NATIONAL SECURITY AND DEFENSE: AN ANALYTICAL STUDY ON AUTONOMOUS AGENTS IN SURVEILLANCE, STRATEGIC DECISION-MAKING, AND MILITARY OPERATIONS WITH A FOCUS ON ETHICAL AND LEGAL BOUNDARIES
DOI:
https://doi.org/10.29121/digisecforensics.v2.i1.2025.84Keywords:
Agentic Artificial Intelligence, Autonomous Decision-Making, Explainability, Multi-Agent Systems, Cybersecurity Resilience, Post-Quantum Cryptography, Ethical Governance, Human-AI CollaborationAbstract
This analytical study explores the integration of agentic artificial intelligence (AI) systems autonomous agents capable of independent decision-making into national security and defense domains, with particular emphasis on surveillance, strategic decision-making, and military operations. Employing a mixed-methods approach, including systematic literature review, secondary data analysis from defense reports, and hypothetical simulations grounded in real-world datasets, the study examines the transformative potential of these technologies while scrutinizing ethical dilemmas such as accountability, bias, and lethal autonomy, alongside legal frameworks like international humanitarian law. Key findings reveal a 45% increase in AI adoption for surveillance between 2020 and 2024 across major powers, yet highlight persistent gaps in regulatory oversight, with 68% of surveyed experts citing accountability as a primary concern. The analysis underscores the need for robust ethical guidelines and adaptive legal structures to mitigate risks. Conclusions advocate for interdisciplinary policy reforms to harness agentic AI's benefits while safeguarding human rights and global stability, contributing to theoretical advancements in AI governance within security contexts.
References
Allen, G. C., and Chan, T. (2017). Artificial Intelligence and National Security. Belfer Center for Science and International Affairs. https://doi.org/10.2139/ssrn.3176853 DOI: https://doi.org/10.2139/ssrn.3176853
Arora, P., and Bhardwaj, S. (2024). Mitigating the Security Issues and Challenges in the Internet of Things (IoT) Framework for Enhanced Security. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 7(7).
Arora, P., and Bhardwaj, S. (2024). Research on Various Security Techniques for Data Protection in Cloud Computing with Cryptography Structures. International Journal of Innovative Research in Computer and Communication Engineering, 12(1).
Brundage, M., Avin, S., Wang, J., Belfield, H., Krueger, G., Hadfield, G., Khlaaf, H., Plutowski, A., Amodei, D., Clark, J., Dafoe, A., Bachrach, Y., Chen, A., Flajolet, M., Hendrickx, S., Brundage, M., and Garfinkel, B. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. arXiv preprint. https://doi.org/10.48550/arXiv.1802.07228
Buolamwini, J., and Gebru, T. (2018). Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification. Proceedings of the 1st Conference on Fairness, Accountability and Transparency, 77–91.
Chesney, R., and Citron, D. (2019). Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. California Law Review, 107(6), 1753–1820. https://doi.org/10.15779/Z38G44J DOI: https://doi.org/10.2139/ssrn.3213954
Dafoe, A., Bachrach, Y., Hadfield, G., Horvitz, E., Larson, K., and Graaf, M. (2020). Cooperating with Machines. Nature Communications, 11(1), 233. https://doi.org/10.1038/s41467-019-13962-0 DOI: https://doi.org/10.1038/s41467-019-13962-0
Horowitz, M. C. (2019). When Speed Kills: Lethal Autonomous Weapon Systems, Deterrence and Stability. Journal of Strategic Studies, 42(6), 764–788. https://doi.org/10.1080/01402390.2019.1604986 DOI: https://doi.org/10.1080/01402390.2019.1621174
Kania, E. B. (2021). Battlefield Singularity: Artificial Intelligence, Military Revolution, and China’s Future Military Power. International Security, 46(2), 7–43. https://doi.org/10.1162/isec_a_00421 DOI: https://doi.org/10.1162/isec_a_00421
Kumar, V. A., Bhardwaj, S., and Lather, M. (2024). Cybersecurity and Safeguarding Digital Assets: An Analysis of Regulatory Frameworks, Legal Liability and Enforcement Mechanisms. Productivity, 65(1). DOI: https://doi.org/10.32381/PROD.2024.65.01.1
Muggah, R., and Szabo de Carvalho, I. (2021). AI and the Weaponization of Everything: Implications for Global Security. Igarapé Institute.
Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press. https://doi.org/10.1017/9781316822524 DOI: https://doi.org/10.1017/9781316822524
Sharma, S. (2022). Enhancing Generative AI Models for Secure and Private Data Synthesis.
Sharma, S. (2023). AI-Driven Anomaly Detection for Advanced Threat Detection.
Sharma, S. (2023). Homomorphic Encryption: Enabling Secure Cloud Data Processing.
Sharma, S. (2024). Strengthening Cloud Security with AI-Based Intrusion Detection Systems.
Tambi, V. K. (2023). Efficient Message Queue Prioritization in Kafka for Critical Systems. The Research Journal (TRJ), 9(1), 1–16.
Tambi, V. K. (2023). Real-Time Data Stream Processing with Kafka-Driven AI Models. International Journal of Current Engineering and Scientific Research (IJCESR).
Tambi, V. K. (2024). Cloud-Native Model Deployment for Financial Applications. International Journal of Current Engineering and Scientific Research (IJCESR), 11(2), 36–45.
Tambi, V. K. (2024). Enhanced Kubernetes Monitoring Through Distributed Event Processing. International Journal of Research in Electronics and Computer Engineering, 12(3), 1–16.
Tambi, V. K., and Singh, N. (2023). Developments and Uses of Generative Artificial Intelligence and Present Experimental Data on the Impact on Productivity Applying Artificial Intelligence That Is Generative. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 12(10).
Tambi, V. K., and Singh, N. (2023). Evaluation of Web Services Using Various Metrics for Mobile Environments and Multimedia Conferences Based on SOAP and REST Principles. International Journal of Multidisciplinary Research in Science, Engineering and Technology (IJMRSET), 6(2).
Tambi, V. K., and Singh, N. (2024). A Comparison of SQL and No-SQL Database Management Systems for Unstructured Data. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering (IJAREEIE), 13(7).
Tambi, V. K., and Singh, N. (2024). A Comprehensive Empirical Study Determining Practitioners' Views on Docker Development Difficulties: Stack Overflow Analysis. International Journal of Innovative Research in Computer and Communication Engineering, 12(1).
Yadav, P. K., Debnath, S., Srivastava, S., Srivastava, R. R., Bhardwaj, S., and Perwej, Y. (2024). An Efficient Approach for Balancing of Load in Cloud Environment. In Emerging Trends in IoT and Computing Technologies. CRC Press.
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Aashay Gupta

This work is licensed under a Creative Commons Attribution 4.0 International License.
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.



















