{"id":16739,"date":"2023-09-01T00:00:00","date_gmt":"2023-09-01T00:00:00","guid":{"rendered":"https:\/\/www.nextias.com\/current_affairs\/uncategorized\/01-09-2023\/artificial-intelligence-assisted-terrorism\/"},"modified":"2023-09-01T00:00:00","modified_gmt":"2023-09-01T00:00:00","slug":"artificial-intelligence-assisted-terrorism","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/editorial-analysis\/01-09-2023\/artificial-intelligence-assisted-terrorism","title":{"rendered":"Artificial Intelligence Assisted Terrorism"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h1 style=\"text-align:center\"><span style=\"font-size:20pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><u>Artificial Intelligence Assisted Terrorism\u00a0<\/u><\/span><\/span><\/span><\/h1>\n<p><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Syllabus: <\/strong><\/span><\/span><\/span><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>GS2\/ Government Policies &#038; Interventions; GS3\/ Science &#038; Technology, Challenges to Internal Security<\/strong><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong><u>In Context<\/u><\/strong><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">The utilisation and possession of AI-based technologies by terrorist organisations pose a significant and concerning threat to the stability of States.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong><u>About Artificial Intelligence (AI)<\/u><\/strong><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>About:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">It is the<\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong> science and engineering <\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">of making <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>intelligent machines<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">, especially intelligent computer programs.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">AI encompasses developing computer systems capable of performing tasks that traditionally require human intelligence.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">Breakthroughs in Machine Learning (ML), Natural Language Processing (NLP), computer vision, and robotics have propelled AI to unprecedented heights.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Significance:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">The convergence of enhanced computational power, vast amounts of data, and sophisticated algorithms has unlocked AI\u2019s potential to revolutionise healthcare, finance, transportation, and security.<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">AI would not replace people but create new opportunities in various fields.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">AI is creating new opportunities which could not be achieved by traditional technology.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong><u>AI-assisted Terrorism<\/u><\/strong><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>About:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">As AI technologies continue to advance, terrorist organisations are increasingly utilising these tools to <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>enhance their capabilities<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">, adapt their <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>tactics, techniques<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">, and <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>procedures (TTPs)<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">, and <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>propagate their ideologies<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">The ability of terrorist organisations to employ AI algorithms to evaluate enormous volumes of data and derive essential insights is the most critical feature of AI-assisted terrorism.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Potential challenges:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">These insights can<\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong> help conspire and execute a terrorist attack<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"> by identifying possible targets, vulnerabilities, and security force patterns.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">Terrorist groups may make more<\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong> accurate judgements<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">, <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>alter their methods<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"> in real time, and<\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong> optimise their operations<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"> for maximum impact by leveraging the potential of AI.<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">Moreover,<\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong> emerging advanced and disruptive technologies<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"> will provide more additional capabilities to terrorists for inflicting damage.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Implications:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">This convergence of AI and terrorism has far-reaching implications for security agencies and necessitates a proactive and comprehensive approach to counter this emerging threat.<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">The emergence of AI-assisted terrorism poses a significant and evolving challenge to national security.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong><u>AI Tools Assisting Terrorist Organisations\u00a0<\/u><\/strong><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Deep Fakes:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>About:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Deepfakes (Deep Learning + Fake)<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"> are synthetic media in which a person in an existing image or video is replaced with someone else&#8217;s likeness.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Deepfakes leverage powerful techniques from machine learning (ML) and artificial intelligence (AI) to manipulate or generate <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>visual and audio content<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"> with a<\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong> high potential to deceive<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Challenges:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">As with any technological advancement, deep fakes also bear a darker side that raises concerns regarding their potential exploitation by criminal syndicates, including terrorist organisations.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">In India, terror groups like <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>The Resistance Front (TRF)<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"> and the <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Tehreeki-Milat-i-Islami (TMI)<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"> have already leveraged fake videos and photos to provoke specific groups, especially targeting young individuals more susceptible to manipulation.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>AI-enabled Chat Platforms:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>About:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">AI-enabled communication platforms, mainly chat applications, have the potential to be powerful tools for terrorists aiming to radicalise and recruit individuals.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Challenges:\u00a0<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Using AI algorithms, these platforms may send a tailored and customised message that caters to potential recruits\u2019 interests and vulnerabilities.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">In recent years, <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>\u201cRocket.Chat\u201d <\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">has emerged as a highly reliable online communication platform, adopted by the Islamic State (IS) in December 2018 and later by al-Qaeda.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Its Slack-like interface facilitates seamless and encrypted conversations <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>between jihadist groups <\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">and their supporters, enabling the dissemination of official and unofficial propaganda through privately-operated servers.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong><u>Weaponization of Unmanned Aerial Systems (UASs):<\/u><\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>About:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Unmanned Aerial Systems (UASs)<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">, commonly called <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>drones<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">, have experienced significant growth and utilisation across various industries.<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">With technological advancements, drones have become more <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>affordable, accessible, and sophisticated<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">, offering numerous benefits and applications in<\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong> agriculture, photography, and courier services<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">.\u00a0<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Challenges:<\/strong><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">Alongside their legal applications, there remains a growing concern regarding the potential misuse of drones by terrorist organisations.\u00a0<\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:square\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">In 2021, <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>twin explosions assisted by drones occurred in the Indian Air Force\u2019s base in Jammu,<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"> which pointed to the involvement of the Pakistan-based terror outfit <\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong>Lashkar-e-Taiba<\/strong><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\">.<\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong><u>Suggestions<\/u><\/strong><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Implementing partial bans:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">A total ban on AI proliferation is impossible as AI is developed primarily by the commercial sector rather than the governments. AI applications, such as writing-digital assistants for commercial use, cannot be banned altogether.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">However, bans on technologies that threaten people&#8217;s livelihood are possible and likely.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Deep Fakes to counter deep fakes:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">Developing and deploying automated algorithms for detecting deepfakes is a significant step towards mitigating the rise of deepfakes.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">Several countries, like India and China have recently criminalised using deepfakes for malicious purposes.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>India <\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">has also introduced <\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>draft legislation to amend its Information Technology Act<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">, aiming to criminalise the creation and distribution of harmful deepfake content.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Geofencing:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">When it comes to countering the hostile use of drones by terrorist organisations, there are no single countermeasures. One of the countermeasures would be geofencing critical infrastructure and military bases.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">Geofencing is a system that creates virtual boundaries around a physical location using GPS or Radio Frequency Identification (RFID).<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">This measure prevents GPS-enabled drones from entering such areas.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>Deployment of Anti-Drone System (ADS):\u00a0<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">ADS can quickly identify and jam micro drones and use a laser-based kill mechanism to destroy the target.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>High-power microwave counter-drone systems:<\/strong><\/span><\/span><\/span><\/span>\n<ul>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">Technologies like high-power microwave counter-drone systems are being developed, demonstrating taking down multiple drones.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:circle\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">It uses electromagnetic radiation to destroy the internal electronics of drones within seconds.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong><u>Way Ahead<\/u><\/strong><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">While the possibility of exploitation of AI-enabled capabilities by terrorist groups is still in its infancy, it is critical to be aware of developments in this field.<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">To prevent a dystopian future and ensure a collaborative approach, it is essential to have international agreements and standards for AI development and use.\u00a0<\/span><\/span><\/span><\/span><\/li>\n<li style=\"list-style-type:disc\"><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\">As AI continues to evolve rapidly, it is imperative to strike a balance between fostering innovation and ensuring ethical use.<\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<div>\n<table cellspacing=\"0\" style=\"border-collapse:collapse; border:none; table-layout:fixed; width:624px\">\n<tbody>\n<tr>\n<td style=\"border-bottom:1px solid #000000; border-left:1px solid #000000; border-right:1px solid #000000; border-top:1px solid #000000; vertical-align:top\">\n<p style=\"text-align:center\"><span style=\"font-size:13pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><strong><u>Daily Mains Question<\/u><\/strong><\/span><\/span><\/span><\/p>\n<p><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"><strong>[Q]<\/strong><\/span><\/span><\/span><\/span><span style=\"font-size:12pt\"><span style=\"font-family:'Book Antiqua',serif\"><span style=\"color:#000000\"><span style=\"background-color:#ffffff\"> The emergence of AI-assisted terrorism poses a significant and evolving challenge to national security. Examine. Suggest ways to effectively control &#038; counter AI proliferation.<\/span><\/span><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial Intelligence Assisted Terrorism\u00a0 Syllabus: GS2\/ Government Policies &#038; Interventions; GS3\/ Science &#038; Technology, Challenges to Internal Security In Context The utilisation and possession of AI-based technologies by terrorist organisations pose a significant and concerning threat to the stability of States. About Artificial Intelligence (AI) About: It is the science and engineering of making intelligent [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16153,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[22],"tags":[76],"class_list":["post-16739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial-analysis","tag-gs"],"acf":[],"jetpack_featured_media_url":"https:\/\/wp-images.nextias.com\/cdn-cgi\/image\/format=auto\/ca\/uploads\/2023\/09\/4600548images.jpg","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/16739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=16739"}],"version-history":[{"count":0,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/16739\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media\/16153"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=16739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=16739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=16739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}