• Login
    • University Home
    • Library Home
    • Lib Catalogue
    • Advance Search
    View Item 
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2024 IRC Articles
    • Defence & Stratergic Studies
    • View Item
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2024 IRC Articles
    • Defence & Stratergic Studies
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Islamic State Exploitation of Emerging Web3 and Generative AI Technologies

    Thumbnail
    View/Open
    Islamic State Exploitation of Emerging Web3 and Generative AI.pdf (706.9Kb)
    Date
    2024
    Author
    Rathnayaka, RMTGP
    Metadata
    Show full item record
    Abstract
    Islamic State, being a nefarious global terrorist organization, has showcased its exploitation and adaptability of various online technologies throughout the history. This research investigates its evolving Web3 and Generative AI exploitation tactics by using exploratory qualitative content analysis of discussions on IS-friendly communication platforms, websites and online whistleblowers then triangulated with recognized secondary resources. Pro-IS online entities demonstrate a concerning ability and interest to adapt and exploit emerging technologies like Web3 technologies (including decentralized communication, hosting, finance, and Metaveres) and Artificial Intelligence (including AIgenerated videos, voice cloning, AI images and chatbots) for experimenting new tactics for propaganda, recruitment, and fundraising by evading extreme counter terrorism content moderation and detection mechanisms. It was observed that decentralized chat platforms and cryptocurrency are widely used by pro-IS entities while exploitation of decentralized web and virtual platforms were also susceptible for exploitation. There is a wide use of AI generated images, and textual contents. Exploiting AI audio-visuals and AI chatbots are still on experimental phase but possess an alarming threat. The global threat implied by these exploitations cannot be negated hence early counter terrorism actions must be taken to mitigate this emerging threats. These findings highlight the urgent need for a multi-stakeholder approach to counter this threat. Collaboration between tech companies, governments, counterterrorism agencies and international organizations is crucial to keep emerging online technologies to be safe from terrorist exploitations.
    URI
    http://ir.kdu.ac.lk/handle/345/8381
    Collections
    • Defence & Stratergic Studies [19]

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback
     

     

    Browse

    All of IR@KDUCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsFacultyDocument TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsFacultyDocument Type

    My Account

    LoginRegister

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback