Kufal Symbiosis: Collaboration of Artificial Intelligence and Terrorist Organizations

Authors

  • Wahyu Jati Arya Guna Sekolah Tinggi Intelijen Negara

DOI:

https://doi.org/10.70710/sitj.v2i1.28

Keywords:

AI and Terrorist, Cyber Terrorism, Cyberattacks by Terrorist, Potential Scenarios

Abstract

This paper delves into the phenomenon of "kufal symbiosis,” which refers to the collaboration between artificial intelligence (AI) and terrorist organizations. It highlights AI’s potential to enhance the efficiency of terrorist operations. While AI can be used to recruit new members and plan more sophisticated attacks, security agencies face challenges in adapting this technology to counter terrorism effectively. This paper discussed the crucial need to strike a balance between individual privacy and national security, as well as the difficulties of managing large-scale data with limited resources. Additionally, the use of technology such as deepfakes and botnets by terrorist organizations might lead to confusion and intensify the impact of their attacks. The discussion also addresses cyberattacks on smart cities, exposing the vulnerabilities in infrastructure to cyber threats. In conclusion, while AI enhances the efficiency of terrorist operations, it also equips security agencies to prevent such threats despite the ongoing struggle to balance privacy and security.

Downloads

Download data is not yet available.

References

Awan, I. (2017). Cyber-Extremism: Isis and the Power of Social Media. Society, 54(2), 138–149. https://doi.org/10.1007/s12115-017-0114-0

Bazarkina, D. Y., & Pashentsev, E. N. (2019). Artificial intelligence and new threats to international psychological security. Russia in Global Affairs, 17(1), 147–170. https://doi.org/10.31278/1810-6374-2019-17-1-147-170

Bazarkina, D. Y., & Pashentsev, E. N. (2020). Malicious use of artificial intelligence: New psychological security risks in BRICS countries. Russia in Global Affairs, 18(4), 154–177. https://doi.org/10.31278/1810-6374-2020-18-4-154-177

Broeders, D., Cristiano, F., & Weggemans, D. (2023). Too Close for Comfort: Cyber Terrorism and Information Security across National Policies and International Diplomacy. Studies in Conflict and Terrorism, 46(12), 2426–2453. https://doi.org/10.1080/1057610X.2021.1928887

Campedelli, G. M., Bartulovic, M., & Carley, K. M. (2021). Learning future terrorist targets through temporal meta-graphs. Scientific Reports, 11(1). https://doi.org/10.1038/s41598-021-87709-7

Chalmers, I. (2017). Countering Violent Extremism in Indonesia: Bringing Back the Jihadists. Asian Studies Review, 41(3), 331–351. https://doi.org/10.1080/10357823.2017.1323848

Deslandes-Martineau, D. M., Charland, P., Lapierre, H. G., Arvisais, O., Chamsine, C., Venkatesh, V., & Guidère, M. (2022). The programming curriculum within ISIS. PLoS ONE, 17(4 April). https://doi.org/10.1371/journal.pone.0265721

Ding, J., Qammar, A., Zhang, Z., Karim, A., & Ning, H. (2022). Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and Future Directions. Energies, 15(18). https://doi.org/10.3390/en15186799

Nugrahajati, S. D. and Suparno, B. A. (2024). Program deradikalisasi dalam perspektif komunikasi politik. Jurnal Ilmu Komunikasi, 21(3), 417. https://doi.org/10.31315/jik.v21i3.11440

Ouedraogo, M., Sanou, D., Kere, I. W. Z., Sankara, S., Thiombiano-Coulibaly, N., Ouedraogo, O., Zoungrana, B., Hama-Ba, F., & Savadogo, A. (2023). Sahel terrorist crisis and development priorities: case of financial allocations for the control of non-communicable diseases in Burkina Faso. Frontiers in Public Health, 11. https://doi.org/10.3389/fpubh.2023.1253123

Papyshev, G., & Yarime, M. (2023). The state’s role in governing artificial intelligence: development, control, and promotion through national strategies. Policy Design and Practice, 6(1), 79–102. https://doi.org/10.1080/25741292.2022.2162252

Prakasa, S. U. W., Al-Fatih, S., & Haqqi, A. R. A. (2021). Terrorism Eradication in ASEAN Countries: Human Rights Perspective. Al-Ihkam: Jurnal Hukum Dan Pranata Sosial, 16(2), 327–361. https://doi.org/10.19105/AL-LHKAM.V16I2.5021

Radil, S. M., & Castan Pinos, J. (2022). Reexamining the Four Waves of Modern Terrorism: A Territorial Interpretation. Studies in Conflict and Terrorism, 45(4), 311–330. https://doi.org/10.1080/1057610X.2019.1657310

Safira, U. M., Pasaribu, F. H., & Bintang, M. (2017). Isolasi bakteri endofit dari tanaman sirih hijau piper betle l.) dan potensinya sebagai penghasil senyawa antibakteri. Current Biochemistry, 1(1), 51-57. https://doi.org/10.29244/cb.1.1.51-57

Saidi, F., & Trabelsi, Z. (2022). A hybrid deep learning-based framework for future terrorist activities modeling and prediction. Egyptian Informatics Journal, 23(3), 437–446. https://doi.org/10.1016/j.eij.2022.04.001

Tehrani, P. M., Abdul Manap, N., & Taji, H. (2013). Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime. Computer Law and Security Review, 29(3), 207–215. https://doi.org/10.1016/j.clsr.2013.03.011

Theowidavitya, B., Muttaqin, M., Miftahudin, M., & Tjahjoleksono, A. (2019). Analisis metabolomik pada interaksi padi dan bakteri. Jurnal Sumberdaya Hayati, 5(1), 18-24. https://doi.org/10.29244/jsdh.5.1.18-24

Thineza Ardea Pramesti and Mohammad Mirwan (2023). Penurunan tss, cod, dan total nitrogen air lindi dengan constructed wetland menggunakan melati air (echinodorus palaefolius). Jurnal Pengendalian Pencemaran Lingkungan (JPPL), 5(2), 189-195. https://doi.org/10.35970/jppl.v5i2.2010

Tzezana, R. (2016). Scenarios for crime and terrorist attacks using the internet of things. European Journal of Futures Research, 4(1). https://doi.org/10.1007/s40309-016-0107-z

Tzezana, R. (2017). High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things. Foresight, 19(1), 1–14. https://doi.org/10.1108/FS-11-2016-0056

Uddin, M. I., Zada, N., Aziz, F., Saeed, Y., Zeb, A., Ali Shah, S. A., Al-Khasawneh, M. A., & Mahmoud, M. (2020). Prediction of Future Terrorist Activities Using Deep Neural Networks. Complexity, 2020. https://doi.org/10.1155/2020/1373087

Verhelst, H. M., Stannat, A. W., & Mecacci, G. (2020). Machine Learning Against Terrorism: How Big Data Collection and Analysis Influences the Privacy-Security Dilemma. Science and Engineering Ethics, 26(6), 2975–2984. https://doi.org/10.1007/s11948-020-00254-w

Wibowo, R. H., Sembiring, S. R., Sipriyadi, S., Darwis, W., Supriyati, R., Hidayah, T., … & Yudha, S. P. (2022). Kemampuan bakteri endofit pelarut fosfat dari tumbuhan akar kuning (arcangelisia flava (l.) merr) asal pulau enggano, provinsi bengkulu. Al-Kauniyah: Jurnal Biologi, 15(2), 171-181. https://doi.org/10.15408/kauniyah.v15i2.17632

Yaacoub, J. P. A., Noura, H. N., Salman, O., & Chehab, A. (2022). Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 21(1), 115–158. https://doi.org/10.1007/s10207-021-00545-8

Downloads

Published

2025-03-07

How to Cite

Guna, W. J. A. (2025). Kufal Symbiosis: Collaboration of Artificial Intelligence and Terrorist Organizations. Security Intelligence Terrorism Journal (SITJ), 2(1), 20–26. https://doi.org/10.70710/sitj.v2i1.28

Issue

Section

Articles

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.