Tanja Milošević

  • Address: /
  • Email: /
  • Telephone: /
  • LinkedIn: /

Faculty of Political Sciences, University of Belgrade

PERIODICS

ABUSE OF ARTIFICIAL INTELLIGENCE FOR EXTREMIST AND TERRORIST PURPOSES

In this paper, the authors research possible abuse of artificial intelligence for extremist and terrorist purposes. Having the growing digitalization and robotization of the society in mind, it is completely realistic to be expecting a growing abuse of artificial intelligence in the security context, which will definitely be abused by extremist and terrorist groups. Artificial intelligence (AI) can be divided into five basic categories: 1) interactive AI (example: personal assistants such as Siri, Cortana and Alexa); 2) functional AI (robots); 3) analytical AI (data analysis, machine learning); 4) textual AI (text recognition, conversion of speech into textual form); 5) visual AI (augmented reality technology). However, IT experts, engineers, and analysts all agree that, in the contemporary times, not a single researcher acts only within one of the previously mentioned fields, but conducts research and bases their products on an interdisciplinary approach to the said types of AI. Throughout a series of case studies, the authors analyse numerous ways in which terrorists might abuse artificial intelligence, with a special emphasis on the use of unmanned aerial vehicles, that is, drones. Drones have stepped out of the phase of experimental models for conducting reconnaissance missions and entered the historical stage as a weapon on February 04, 2002, when a Predator, piloted by the hand of a member of the Central Intelligence Agency (CIA) conducted the first airstrike in Khost in Afghanistan, with the goal of eliminating Usama bin Laden. Since that moment, UAVs are present as a method of eliminating the enemy in the majority of conflicts. In this paper are contemporary trends regarding the definition of extremism and terrorism elaborated, the points of contact and the points of distancing between them are determined, followed by a detailed analysis of examples of abuse of drones by terrorist organizations, such as the so-called “Islamic State” and “Hezbollah”, as well as the Houthi rebel group in Yemen. The main purpose of the paper is to estimate the danger extremists and terrorists pose to the contemporary society in the context of abuse of artificial intelligence. The conclusion is that, in the coming future, extremists will more and more use artificial intelligence for conducting their activities, including terrorist attacks.

PERIODICS

IMPACT OF SAUDI COALITION ON THE NATIONAL SECURITY OF YEMEN

In this paper, the authors analyzed the extent of impact of the Saudi Coalition on the internal political, and consequentally the national security of Yemen. The innitial goal of this research is the analysis of motives of Saudi Arabia for engaging in the civil war in Yemen, with the final goal of identifying the results of interventionist activities of the Saudi Coalition in the field, as well as the unforeseeable negative changes in the political and security situation in this country. With the use of content analysis, the autors expressed the discourse propagated by all actor included in the Yemeni conflict – the internationally recognized government, the Southern Transitional Council and the Houthis, as well as the official discourse of the Saudi Coalition, with the goal of expressing the extent of the significance of foreign medling, as well as its impact on the Yemeni national security. By presenting the active actors, as well as the well-hidden ones, such as Iran, the authors tracked the roots of the idea of a foreign military intervention in Yemen, as well as the consequences it had for the Yemeni people.In the end, the authors confirmed that not only that the intervention impacted human security in the country, but also that the support given to the STC, as well as ignoring the political context of the problem, caused a rebirth of ethno-separatist aspirations, which might further hinder the Yemeni national security.

ç