Kufal Symbiosis: Collaboration of Artificial Intelligence and Terrorist Organizations
DOI:
https://doi.org/10.70710/sitj.v2i1.28Keywords:
AI and Terrorist, Cyber Terrorism, Cyberattacks by Terrorist, Potential ScenariosAbstract
This paper delves into the phenomenon of "kufal symbiosis,” which refers to the collaboration between artificial intelligence (AI) and terrorist organizations. It highlights AI’s potential to enhance the efficiency of terrorist operations. While AI can be used to recruit new members and plan more sophisticated attacks, security agencies face challenges in adapting this technology to counter terrorism effectively. This paper discussed the crucial need to strike a balance between individual privacy and national security, as well as the difficulties of managing large-scale data with limited resources. Additionally, the use of technology such as deepfakes and botnets by terrorist organizations might lead to confusion and intensify the impact of their attacks. The discussion also addresses cyberattacks on smart cities, exposing the vulnerabilities in infrastructure to cyber threats. In conclusion, while AI enhances the efficiency of terrorist operations, it also equips security agencies to prevent such threats despite the ongoing struggle to balance privacy and security.
Downloads
References
Awan, I. (2017). Cyber-Extremism: Isis and the Power of Social Media. Society, 54(2), 138–149. https://doi.org/10.1007/s12115-017-0114-0
Bazarkina, D. Y., & Pashentsev, E. N. (2019). Artificial intelligence and new threats to international psychological security. Russia in Global Affairs, 17(1), 147–170. https://doi.org/10.31278/1810-6374-2019-17-1-147-170
Bazarkina, D. Y., & Pashentsev, E. N. (2020). Malicious use of artificial intelligence: New psychological security risks in BRICS countries. Russia in Global Affairs, 18(4), 154–177. https://doi.org/10.31278/1810-6374-2020-18-4-154-177
Broeders, D., Cristiano, F., & Weggemans, D. (2023). Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy. Studies in Conflict and Terrorism, 46(12), 2426–2453. https://doi.org/10.1080/1057610X.2021.1928887
Campedelli, G. M., Bartulovic, M., & Carley, K. M. (2021). Learning future terrorist targets through temporal meta-graphs. Scientific Reports, 11(1). https://doi.org/10.1038/s41598-021-87709-7
Chalmers, I. (2017). Countering Violent Extremism in Indonesia: Bringing Back the Jihadists. Asian Studies Review, 41(3), 331–351. https://doi.org/10.1080/10357823.2017.1323848
Deslandes-Martineau, D. M., Charland, P., Lapierre, H. G., Arvisais, O., Chamsine, C., Venkatesh, V., & Guidère, M. (2022). The programming curriculum within ISIS. PLoS ONE, 17(4 April). https://doi.org/10.1371/journal.pone.0265721
Ding, J., Qammar, A., Zhang, Z., Karim, A., & Ning, H. (2022). Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions. Energies, 15(18). https://doi.org/10.3390/en15186799
Nugrahajati, S. D. and Suparno, B. A. (2024). Program deradikalisasi dalam perspektif komunikasi politik. Jurnal Ilmu Komunikasi, 21(3), 417. https://doi.org/10.31315/jik.v21i3.11440
Ouedraogo, M., Sanou, D., Kere, I. W. Z., Sankara, S., Thiombiano-Coulibaly, N., Ouedraogo, O., Zoungrana, B., Hama-Ba, F., & Savadogo, A. (2023). Sahel terrorist crisis and development priorities: case of financial allocations for the control of non-communicable diseases in Burkina Faso. Frontiers in Public Health, 11. https://doi.org/10.3389/fpubh.2023.1253123
Papyshev, G., & Yarime, M. (2023). The state’s role in governing artificial intelligence: development, control, and promotion through national strategies. Policy Design and Practice, 6(1), 79–102. https://doi.org/10.1080/25741292.2022.2162252
Prakasa, S. U. W., Al-Fatih, S., & Haqqi, A. R. A. (2021). Terrorism Eradication in ASEAN Countries: Human Rights Perspective. Al-Ihkam: Jurnal Hukum Dan Pranata Sosial, 16(2), 327–361. https://doi.org/10.19105/AL-LHKAM.V16I2.5021
Radil, S. M., & Castan Pinos, J. (2022). Reexamining the Four Waves of Modern Terrorism: A Territorial Interpretation. Studies in Conflict and Terrorism, 45(4), 311–330. https://doi.org/10.1080/1057610X.2019.1657310
Safira, U. M., Pasaribu, F. H., & Bintang, M. (2017). Isolasi bakteri endofit dari tanaman sirih hijau piper betle l.) dan potensinya sebagai penghasil senyawa antibakteri. Current Biochemistry, 1(1), 51-57. https://doi.org/10.29244/cb.1.1.51-57
Saidi, F., & Trabelsi, Z. (2022). A hybrid deep learning-based framework for future terrorist activities modeling and prediction. Egyptian Informatics Journal, 23(3), 437–446. https://doi.org/10.1016/j.eij.2022.04.001
Tehrani, P. M., Abdul Manap, N., & Taji, H. (2013). Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. Computer Law and Security Review, 29(3), 207–215. https://doi.org/10.1016/j.clsr.2013.03.011
Theowidavitya, B., Muttaqin, M., Miftahudin, M., & Tjahjoleksono, A. (2019). Analisis metabolomik pada interaksi padi dan bakteri. Jurnal Sumberdaya Hayati, 5(1), 18-24. https://doi.org/10.29244/jsdh.5.1.18-24
Thineza Ardea Pramesti and Mohammad Mirwan (2023). Penurunan tss, cod, dan total nitrogen air lindi dengan constructed wetland menggunakan melati air (echinodorus palaefolius). Jurnal Pengendalian Pencemaran Lingkungan (JPPL), 5(2), 189-195. https://doi.org/10.35970/jppl.v5i2.2010
Tzezana, R. (2016). Scenarios for crime and terrorist attacks using the internet of things. European Journal of Futures Research, 4(1). https://doi.org/10.1007/s40309-016-0107-z
Tzezana, R. (2017). High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things. Foresight, 19(1), 1–14. https://doi.org/10.1108/FS-11-2016-0056
Uddin, M. I., Zada, N., Aziz, F., Saeed, Y., Zeb, A., Ali Shah, S. A., Al-Khasawneh, M. A., & Mahmoud, M. (2020). Prediction of Future Terrorist Activities Using Deep Neural Networks. Complexity, 2020. https://doi.org/10.1155/2020/1373087
Verhelst, H. M., Stannat, A. W., & Mecacci, G. (2020). Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma. Science and Engineering Ethics, 26(6), 2975–2984. https://doi.org/10.1007/s11948-020-00254-w
Wibowo, R. H., Sembiring, S. R., Sipriyadi, S., Darwis, W., Supriyati, R., Hidayah, T., … & Yudha, S. P. (2022). Kemampuan bakteri endofit pelarut fosfat dari tumbuhan akar kuning (arcangelisia flava (l.) merr) asal pulau enggano, provinsi bengkulu. Al-Kauniyah: Jurnal Biologi, 15(2), 171-181. https://doi.org/10.15408/kauniyah.v15i2.17632
Yaacoub, J. P. A., Noura, H. N., Salman, O., & Chehab, A. (2022). Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 21(1), 115–158. https://doi.org/10.1007/s10207-021-00545-8
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Security Intelligence Terrorism Journal (SITJ)

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.