Potential Risks of ChatGPT: Implications for Counterterrorism and International Security

Yaser Esmailzadeh

Abstract


This article explores the potential risks of chatGPT, a language generation model developed by OpenAI, for counterterrorism and international security. With its ability to generate human-like text, chatGPT has rapidly gained popularity and become one of the fastest-growing consumer applications in history, with over 100 million active users. However, practical and ethical concerns regarding its strengths and weaknesses remain under debate. Terrorists' increasing use of modern communication technologies has made the intelligence problem more complex, as access to critical data becomes increasingly challenging for intelligence agencies. Terrorists have also adopted new technologies and implemented operational security measures to evade sophisticated intelligence collection operations. Furthermore, artificial intelligence has enabled individuals and groups to exploit newer technologies, heightening the threat of cyberattacks and espionage. This article analyzes the potential risks of chatGPT in four key areas: the implications of artificial intelligence for future threats and international security, the impact of chatGPT on cyberterrorism and artificial intelligence, the dangers of fragmented and secondary information for violence and sabotage operations, and conducting psychological warfare against targets. By providing insights and recommendations, this study can assist policymakers and researchers in utilizing artificial intelligence technology effectively while mitigating potential risks.


Keywords


Terrorism; Counterterrorism; Cyberterrorism; ChatGPT; Artificial Intelligence; International Security

Full Text:

PDF

References


Ali, S. S. & Shukla, S. (2021). Terrorism and encrypted communication: Issues and challenges for law enforcement. International Journal of Cyber Warfare and Terrorism, 11(1), 45-57.

Berger, J. M. & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Institution.

Bilgen, A. (2012). Terrorism and Media: A Dangerous Symbiosis, E-IR (22 July 2012)http://www.e-ir.info/2012/07/22/terrorism-and-the-media-a-dangerous-symbiosis/

Brundage, M. et al. (2018). The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. Oxford: Oxford University.

Calderaro, A. & Blumfelde, S. (2022). Artificial intelligence and EU security: the false promise of digital sovereignty, European Security. 31(3), 415-434, DOI: 10.1080/09662839.2022.2101885

Celeski, J. D. (2019). Psychological Operations—A Force Multiplier, Alabama: Air University Press.

https://www.jstor.org/stable/resrep19555.19

Collin, B,. (1997). The Future of Cyberterrorism. Crime & Justice International Journal, 13(2), 15-27.

Dheeraj P. C. (2020). India’s PSYWAR Against Islamic Terrorism: A Trident Strategy, Terrorism and Political Violence, 32(3), 558-581.

Esmailzadeh, Y. (2020). Organizing the concept of legitimacy-based political violence by focusing on the views of Habermas and Weber 1. Political Sociology of Iran, 3(1), 347-362. doi: 10.30510/psi.2021.307008.2379

Esmailzadeh, Y. (2023), Towards the emergence of the fifth wave of terrorism in the world. The Iranian Research letter of International Politics 11(2). doi: 10.22067/irlip.2022.71990.1138

Esmaizladeh E.Y., and Tajari, S. (2017). Ethical and Ontological Frameworks in Security Cosmopolitanism. Iranian Research letter of International Politics 5(2), 1-19. doi: 10.22067/jipr.v5i2.52952

Ganor, B. (2017). Terror as a Strategy of PSYWAR, International Institute for Counter-Terrorismhttps://www.ict.org.il/Article/827/Terror%20as%20a%20Strategy%20of%20Psychological%20Warfare

Hu, K. (2023). ChatGPT sets record for fastest-growing user base - analyst note. Reuters. https://www.reuters.com/technology/chatgpt-sets-record-fastest-growinguser-base-analyst-note-2023-02-01/.

Johnson, J. (2019). Artificial intelligence & future warfare: implications for international security. Defense & Security Analysis, 35(2), 147-169, DOI: 10.1080/14751798.2019.1600800

Kshetri, N. (2018). Can blockchain strengthen the internet of things?. IT Professional, 20(4), 68-72.

LaFree G. (2017). Terrorism and the Internet. Criminol Public Policy, 16(1):93–98.

Mueller, J. & Stewart, M. G. (2015). Terrorism, counterterrorism, and the Internet: The American cases. Dynamics of Asymmetric Conflict, 8(2), 176-190. http://dx.doi.org/10.1080/17467586.2015.1065077

Nakashima, E. (2021). U.S. indicts North Koreans, accuses them of stealing millions in cryptocurrency. The Washington Post.

Rudolph J, Tan S, Tan S. (2023). ChatGPT: bullshit spewer or the end of traditional assessments in higher education? J Appl Learn Teach. 6(1): 1–22.

Schindler, H.-J. (2021). Emerging challenges for combating the financing of terrorism in the European Union: financing of violent right-wing extremism and misuse of new technologies. Global Affairs, 7(5), 795-812. doi: 10.1108/JMLC-06-2020-0063

Turing, A.M., (1950). Computing machinery and intelligence. Mind, LIX (236), 433–460.

US Department of Defense. (2015). The Department of Defense Cyberstrategy, https://www.defense.gov/Portals/1/features/2015/0415_cyberstrategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf

Wagner, A R. (2007a). Meeting the terrorist challenge: Coping with failures of leadership and intelligence. New York, NY: Harper-Collins.

Wagner, A. (2007). Intelligence for Counter‐Terrorism: Technology and Methods. Journal of International Affairs, 2(2), 48-61.

Weimann, G. (2010). Terror on the Internet, he New Arena, the New Challenges. United States, United States Institute of Peace Press.




DOI: http://dx.doi.org/10.18415/ijmmu.v10i4.4590

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 International Journal of Multicultural and Multireligious Understanding

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

International Journal of Multicultural and Multireligious Understanding (IJMMU) ISSN 2364-5369
https://ijmmu.com
editor@ijmmu.com
dx.doi.org/10.18415/ijmmu
facebook.com/ijmmu
Copyright © 2014-2018 IJMMU. All rights reserved.