Abstract
This article addresses two fundamental inquiries: can AI engage in acts of terrorism? If so, how might such a phenomenon occur? My hypothesis posits that AI is capable of independently committing acts of terrorism, a classification derived from the study of terrorism known as lone-wolf terrorism. To address these dual issues, this article adopts a criminological approach, which is further elaborated through an examination of lone-wolf terrorism and the advancement of artificial intelligence. As is widely recognized, contemporary terrorist organizations have harnessed technological advancements in the realm of information and communication to perpetrate acts of terrorism within the digital sphere. Within the realm of terrorism studies, such activities are categorized as cyber-terrorism, while criminological investigations refer to them as cybercrime. Nonetheless, these forms of criminality are generally carried out by individuals and/or groups (users) who manipulate information and communication systems. Through these channels, content laden with radical-terrorism ideologies is disseminated via social media platforms to facilitate online radicalization and propagate terror campaigns. Ultimately, both endeavors share the objective of recruiting new members who will be assigned tasks or sympathizers who may willingly commit acts of terrorism, whether in the online or offline domains. Drawing upon routine activity theory, the presence and evolution of AI could introduce a novel actor into the sphere of cyber-terrorism, one executed by AI itself. As postulated by routine activity theory, criminal incidents transpire when three elements converge: a motivated offender, a suitable target, and a lack of capable guardianship. While AI possesses cognitive and learning abilities, albeit not yet at the level of human cognition, in the context of cyber-terrorism, the convergence of AI with the elements of a motivated offender, suitable target, and lack of capable guardianship could position it as a novel actor.
References
Ancel, M. (1998). Social Defence. Psychology Press.
Arief, B. N. (2011). Bunga Rampai Kebijakan Hukum Pidana: Perkembangan Penyusunan Konsep KUHP Baru. Kencana.
Banks, D., & London, A. J. (2017). Algorithmic Bias in Autonomous Systems. Proceedings of the 26th International Joint Conference on Artificial Intelligence (IJCAI 2017), 1–7.
Barrett, A. M., & Baum, S. D. (2017). A Model of Pathways to Artificial Superintelligence Catastrophe for Risk and Decision Analysis. Journal of Experimental & Theoretical Artificial Intelligence, 29(2), 397–414. https://doi.org/10.1080/0952813X.2016.1186228.
Bieda, D., & Halawi, L. (2015). Cyberspace: A Venue for Terrorism. Issues in Information Systems, 16(3), 33–42.
Blauth, T. F., Gstrein, O. J., & Zwitter, A. (2022). Artificial Intelligence Crime: An Overview of Malicious Use and Abuse of AI. IEEE Access, 10, 77110–77122. https://doi.org/10.1109/ACCESS.2022.3191790
Bontridder, N., & Poullet, Y. (2021). The role of artificial intelligence in disinformation. Data & Policy, 3, e32. https://doi.org/10.1017/dap.2021.20.
Cohen, L. E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588. https://doi.org/10.2307/2094589.
Collin, B. C. (1997). Future of Cyberterrorism: The Physical and Virtual Worlds Converge. Crime and Justice, 13(12), 15–18.
Daley, S. (n.d.). Robotics: What Are Robots? Robotics Definition & Uses. Retrieved October 3, 2023, from https://builtin.com/robotics.
Esmailzadeh, Y., & Motaghi, E. (2024). International Terrorism and Social Threats of Artificial Intelligence. Journal of Globalization Studies, 15(1), 168–179. https://doi.org/10.30884/jogs/2024.01.09
Fitrah, E. (2015). Gagasan Human Security Dan Kebijakan Keamanan Nasional Indonesia. INSIGNIA: Journal of International Relations, 2(1), 27–41.
Ganor, B. (2021). Understanding the Motivations of “Lone Wolf” Terrorists: The “Bathtub” Model. Perspectives on Terrorism, 15(2), 23–32.
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.
Grabosky, P. N. (2003). Virtual Criminality: Old Wine in New Bottles? In D. S. Wall (Ed.), Cyberspace Crime (p. 7). Routledge. https://doi.org/doi.org/10.4324/9781315199627.
Hoefnagels, G. P. (1973). The Other Side of Criminology. Springer Netherlands. https://doi.org/10.1007/978-94-017-4495-9.
Holdsworth, J. (n.d.). What is Natural Language Processing? IBM. https://www.ibm.com/topics/natural-language-processing.
HukumOnline. (n.d.). Arti Landasan Filosofis, Sosiologis, dan Yuridis. HukumOnline. Retrieved November 1, 2023, from https://www.hukumonline.com/klinik/a/arti-landasan-filosofis--sosiologis--dan-yuridis-lt59394de7562ff.
IBM. (n.d.). What is Computer Vision? IBM. Retrieved October 3, 2023, from https://www.ibm.com/topics/computer-vision.
Kaplan, A., & Haenlein, M. (2019). Siri, Siri, in my hand: Who’s the Fairest in the Land? On the Interpretations, Illustrations, and Implications of Artificial Intelligence. Business Horizons, 62(1), 15–25. https://doi.org/10.1016/j.bushor.2018.08.004.
Kerrigan, C. (2022). Artificial Intelligence: Law and Regulation (C. Kerrigan (ed.)). Edward Elgar Publishing Limited.
Khayyam, H., Javadi, B., Jalili, M., & Jasar, R. N. (2012). Artificial Intelligence and Internet of Things for Autonomous Vehicles. In Nonlinear Approaches in Engineering Applications: Automotive Applications of Engineering Problems.
Lakomy, M. (2023). Artificial Intelligence as a Terrorism Enabler? Understanding the Potential Impact of Chatbots and Image Generators on Online Terrorist Activities. Studies in Conflict & Terrorism, 1–21. https://doi.org/10.1080/1057610X.2023.2259195.
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep Learning. Nature, 521(7553), 436–444. https://doi.org/10.1038/nature14539
Legg, S., & Hutter, M. (2006). A Formal Measure of Machine Intelligence. https://www.idsia.usi-supsi.ch/home.
Marcu, M., & Balteanu, C. (2014). Social Media Real Source of Proliferation of International Terrorism. Annales Universitatis Apulensis: Series Oeconomica, 16(1). http://193.231.35.170/index.php/oeconomica/article/view/248.
Marr, B. (2023). The 15 Biggest Risks Of Artificial Intelligence. Forbes. https://www.forbes.com/sites/bernardmarr/2023/06/02/the-15-biggest-risks-of-artificial-intelligence/?sh=2e8457792706.
Matusitz, J. (2014). The Role of Intercultural Communication in Cyberterrorism. Journal of Human Behavior in the Social Environment, 24(7), 775–790. https://doi.org/10.1080/10911359.2013.876375.
McCarthy, J. (2007). What is Artificial Intelligence? http://www-formal.stanford.edu/jmc/.
McLean, S., Read, G. J. M., Thompson, J., Baber, C., Stanton, N. A., & Salmon, P. M. (2023). The Risks Associated with Artificial General Intelligence: A Systematic Review. Journal of Experimental & Theoretical Artificial Intelligence, 35(5), 649–663. https://doi.org/10.1080/0952813X.2021.1964003.
Menish-Geryk, S. (2019). The Evolution of Terrorism Through the Use of Technology: al-Qaeda and ISIS. Idaho State University.
Metz, C. (2023). What Exactly are the Dangers Posed by A.I.? New York Times. New York Times.
Mielach, D. (2012). Terrorists Seek Out ‘Friends’ on Facebook. Yahoo! News. https://news.yahoo.com/news/terrorists-seek-friends-facebook-184606693.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuYmluZy5jb20v&guce_referrer_sig=AQAAAFu5WQi7BsWAniu6wxZrBTW6WfGakNNpfg8WOAo3ewTf6fuOleyCqXwThf-SqzxW6hAySN5MB3di4jvsWbbo7SJT1BGaEIPWQuS_A.
Miller, S., & Bossomaier, T. (2021). Privacy, Encryption and Counter-Terrorism. In A. Henschke & S. Robbins (Eds.), Counter-Terrorism, Ethics and Technology (p. 139). Springer. https://doi.org/10.1007/978-3-030-90221-6.
Miró, F. (2014). Routine Activity Theory. In The Encyclopedia of Theoretical Criminology (pp. 1–7). Wiley. https://doi.org/10.1002/9781118517390.wbetc198.
Müller, V. C., & Bostrom, N. (2014). Future Progress in Artificial Intelligence. AI Matters, 1(1), 9–11. https://doi.org/10.1145/2639475.2639478.
Musa, Z. (2024). Implication of Artificial Intelligence on National Security for the Nigeria Agencies. Journal of Terrorism Studies, 6(1). https://doi.org/10.7454/jts.v6i1.1075.
Naudé, W., & Dimitri, N. (2020). The Race for An Artificial General Intelligence: Implications for Public Policy. AI & SOCIETY, 35(2), 367–379. https://doi.org/10.1007/s00146-019-00887-x.
Rapoport, D. C. (2002). The Four Waves of Rebel Terror and September 11. Anthropoetics, 8(1), 1–14.
Russell, S., & Norvig, P. (2020). Artificial Intelligence: A Modern Approach. In Pearson (4th ed., Vol. 3). Pearson Education Limited. https://thuvienso.hoasen.edu.vn/handle/123456789/8967.
Simon, J. D. (2011). Technological and Lone Operator Terrorism. In J. E. Rosenfeld (Ed.), Terrorism, Identity and Legitimacy. Taylor & Francis e-Library.
Simon, J. D. (2013). Lone Wolf Terrorism: Understanding the Growing Threat. Prometheus.
Spaaij, R. (2010). The Enigma of Lone Wolf Terrorism: An Assessment. Studies in Conflict & Terrorism, 33(9), 854–870. https://doi.org/10.1080/1057610X.2010.501426.
Surden, H. (2014). Machine Learning and Law. Wash Law Review, 89(87).
Thorn, P. D. (2015). Nick Bostrom: Superintelligence: Paths, Dangers, Strategies. Minds and Machines, 25(3), 285–289. https://doi.org/10.1007/s11023-015-9377-7.
Torres, P. (2019). The Possibility and Risks of Artificial General Intelligence. Bulletin of the Atomic Scientists, 75(3), 105–108. https://doi.org/10.1080/00963402.2019.1604873.
Tulga, A. Y., & Effendi, T. D. (2022). Terrorism-Related Topic In The Language Of Fake News In Indonesia. MANDALA: Jurnal Ilmu Hubungan Internasional, 5(2), 134–151.
Tyagi, M. (2016). HOG (Histogram of Oriented Gradients): An Overview. https://towardsdatascience.com/hog-histogram-of-oriented-gradients-67ecd887675f.
Vashishtha, N. (2023). Artificial Intelligence – assisted Terrorism: A New Era of Conflict. Vivekanda International Foundation. https://www.vifindia.org/article/2023/august/29/Artificial-Intelligence-assisted-Terrorism-A-New-Era-of-Conflict?slide=$slideshow$.
Weimann, G. (2012). Lone Wolves in Cyberspace. Journal of Terrorism Research, 3(2), 75–90.
Weimann, G. (2014). New Terrorism and New Media (2).
Weimann, G. (2015). Lone Wolves in Cyberspace. In G. Weimann (Ed.), Terrorism in Cyberspace: The Next Generation (p. 296). Woodrow Wilson Center Press.
Zeman, T., Břeň, J., & Urban, R. (2017). Role of Internet in Lone Wolf Terrorism. Journal of Security and Sustainability Issues, 7(2). https://doi.org/10.9770/jssi.2017.7.2(1).
Recommended Citation
Anakotta, Marthsian Yeksi MYA
(2024)
"AI: A NEW LONE-WOLF TERRORISM IN THE DIGITAL ERA (PRELIMINARY ANALYSIS),"
Journal of Terrorism Studies: Vol. 6:
No.
2, Article 7.
DOI: 10.7454/jts.v6i2.1083
Available at:
https://scholarhub.ui.ac.id/jts/vol6/iss2/7