ESSAYS AND STUDIES
ABUSE OF ARTIFICIAL INTELLIGENCE FOR EXTREMIST AND TERRORIST PURPOSES
In this paper, the authors research possible abuse of artificial intelligence for extremist and terrorist purposes. Having the growing digitalization and robotization of the society in mind, it is completely realistic to be expecting a growing abuse of artificial intelligence in the security context, which will definitely be abused by extremist and terrorist groups. Artificial intelligence (AI) can be divided into five basic categories: 1) interactive AI (example: personal assistants such as Siri, Cortana and Alexa); 2) functional AI (robots); 3) analytical AI (data analysis, machine learning); 4) textual AI (text recognition, conversion of speech into textual form); 5) visual AI (augmented reality technology).
However, IT experts, engineers, and analysts all agree that, in the contemporary times, not a single researcher acts only within one of the previously mentioned fields, but conducts research and bases their products on an interdisciplinary approach to the said types of AI. Throughout a series of case studies, the authors analyse numerous ways in which terrorists might abuse artificial intelligence, with a special emphasis on the use of unmanned aerial vehicles, that is, drones. Drones have stepped out of the phase of experimental models for conducting reconnaissance missions and entered the historical stage as a weapon on February 04, 2002, when a Predator, piloted by the hand of a member of the Central Intelligence Agency (CIA) conducted the first airstrike in Khost in Afghanistan, with the goal of eliminating Usama bin Laden. Since that moment, UAVs are present as a method of eliminating the enemy in the majority of conflicts. In this paper are contemporary trends regarding the definition of extremism and terrorism elaborated, the points of contact and the points of distancing between them are determined, followed by a detailed analysis of examples of abuse of drones by terrorist organizations, such as the so-called “Islamic State” and “Hezbollah”, as well as the Houthi rebel group in Yemen.
The main purpose of the paper is to estimate the danger extremists and terrorists pose to the contemporary society in the context of abuse of artificial intelligence. The conclusion is that, in the coming future, extremists will more and more use artificial intelligence for conducting their activities, including terrorist attacks.
- Abaad Studies & Research Center. January 2019. Suicide Drones… Houthi Strategic Weapon.
- Special File: Strategy Unit. Last access: February 13, 2020. https://abaadstudies.org/pdf-37.pdf
- Balkan, Serkan. 2017. Daesh’s Drone Strategy: Technology and Rise of Innovative Terrorism.
- SETA – Foundation for Political, Economic and Social Research, Istanbul, Turkey.
- Bekker, Alex. 2019. 5 Types of AI to Propel Your Business. Poslednji pristup 29. avgust 2020.
- Boden, Margaret. 2018. Artificial Intelligence: A Very Short Introduction. Oxford: Oxford
- University Press.
- Blic. 2017. “Albanac koji je pustio dron u Beogradu zatražio azil u Hrvatskoj.” 28. avgust 2020.
- Conflict Armament Research. March 2017. Iranian Technology Transfers to Yemen:
- ’Kamikaze’ drones used by Houthi forces to attack Coalition missile defence systems. Poslednji pristup13. februar 2020. https://www.conflictarm.com/wp-content/uploads/2017/03/Iranian-Technology Transfers-to-Yemen.pdf.
- Djoric, Marija. 2018. „On Violence and Nonviolence in Political Theory: Some Conceptual
- Dilemmas“ Serbian Political Thought 18 (2): 127-140. doi.org/10.22182/spt.18212018.8.
- Đorić, Marija. 2014. Ekstremna desnica: međunarodni aspekti desničarskog ekstremizma.
- Beograd: Nauka i društvo Srbije.
- Đorić, Marija а. 2020. Nasilni ekstremizam: multidisciplinarni pristup. Beograd: Institut za
- političke studije.
- Đorić, Marija b. 2020. Priručnik za prepoznavanje, prevenciju i suzbijanje radikalizacije i
- nasilog ekstremizma kod učenika. Podgorica: Biro za operativnu koordinaciju – Nacionalni operativni tim
- El-Nashar, M & Nayef, H. 2019. ’Cooking the Meal of Terror’. Manipulative Strategies in
- Terrorist Discourse: A Critical Discourse Analysis of ISIS Statements. Terrorism and Political Violence.
- Fujita, Hamido et. al. 2020. Trends in Machine Learning Theory and Applications Machine
- Learning, “ A model for Predicting Terrorist Network Lethality and Cohesiveness”, 33rd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2020, Kitakyushu, Japan, September 22-25, 2020, Proceedings, Springer.
- Greenley, Heather L. et al. October 1, 2019. Attacks on Saudi Oil Facilities: Effects and
- Responses. Congressional Research Service, Insight.
- Gross, Judah Ari. (11 August 2016). Video appears to confirm use of attack drones by
- Hezbollah. https://www.timesofisrael.com/video-appears-to-confirm-use-of-attack-drones-by-hezbollah-in-syria/
- Grossman, Nicholas. 2018. Drones and Terrorism: Asymmetric Warfare and the Threat to
- Global Security. I. B. Tauris, Bloomsbury
- Hilt, S. et al. 2019. The Internet of Things in the Cybercrime Underground.
- Laqueur Walter i Wall Christopher. 2018. The future of terrorism: ISIS, Al-Qaeda, and the alt
- right. New York: Thomas Dunne Books/St. Martin’s Press.
- Lock, James. 2019. Saudi-Coalition Intercepts Houthi Unmanned Explosives-Laden
- Boats. Maritime Security Review. https://www.marsecreview.com/2019/10/saudi-coalition-intercepts-houthi-unmanned-explosives-laden-boats/.
- McKendrick, Kathleen. 2019. Artificial Intelligence Prediction and Counterterrorism. Chatham House, The Royal Institute of International Affairs. Research Paper.
- Michel, Arthur Holland. 2013. Drones in Bosnia. https://dronecenter.bard.edu/drones-in-bosnia/.
- Moltzau, Alex. 2019. How Does Facebook define Terrorism in Relation to Artificial
- Intelligence? https://towardsdatascience.com/artificial-intelligence-and-terrorism-in-social-media-cf166adaf78e.
- Neumann, Peter. 2017. Countering Violent Extremism and Radicalisation that
- Lead to Terrorism: Ideas, Recommendations, and Good Practices from the OSCE Region, https://www.osce.org/chairmanship/346841?download=true.
- Rassler, Don et al. 2017. The Islamic State’s Drone Documents: Management, Acquisitions and
- DIZ Tradecraft. CTC Perspectives – West Point Combatting Terrorism Center.
- Schmid, Alex. 2014. Violent and Non-Violent Extremism: Two Sides of the Same Coin?,
- Sifton, John. 2012. A Brief History of Drones. https://www.thenation.com/article/archive/brief-history-drones/.
- Smith, Craig S. May 10, 2018. Alexa and Siri Can Hear This hidden Command. You Can’t.
- NATO. 2015. Terrorist use of cyberspace and cyber terrorism: new challenges and reponses.
- Amsterdam: NATO, IOS Press.
- Vincent, James. May 20, 2019. Using AI to screen live video of terrorism is ‘very far from
- being solved’, says Facebook AI chief. https://www.theverge.com/2019/5/20/18632260/facebook-ai-spot-terrorist-content-live-stream-far-from-solved-yann-lecun.
- Wagner, Kurt. May 23,2019. Facebook Removes a Record 2.2 Billion Fake Accounts.