Skip to main content
Top

2023 | Book

Applications for Artificial Intelligence and Digital Forensics in National Security

insite
SEARCH

About this book

This book delivers insights into how social science and technology might aid new advancements in managing the complexity inherent within national and international security landscape. The digital policing landscape is dynamic and intricate, emanating from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have a significant impact on societies around the world. This necessitates a reassessment of what crime, national security, and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats, and terrorist activities underline vulnerabilities residing in our current security and digital policing posture. As an interdisciplinary collection of studies, this book encapsulates concepts, theories, and technology applications, offering a comprehensive analysis of current and emerging trends and threats within the context of national and international security. Undertaking an evidence-based approach, this book offers an extraordinarily perceptive and detailed account of issues and solutions related to the complex national and international security landscape.

To this end, the book:

presents insights into emerging and potential technological and methodological solutions as well as advancements in relation to integrated computational and analytical solutions that could be deployed for the purposes of national and international security;provides a comprehensive analysis of technical, ethical, legal, privacy, and civil liberty challenges stemming from the aforementioned advancements;and, accordingly, offers detailed recommendations supporting the design and implementation of best practices including technical, ethical, and legal approaches for national and international security uses.

The research contained in the book fits well into the larger body of work on various aspects of AI, cybersecurity, national security, digital forensics, cyberterrorism, ethics, human rights, cybercrime, and law. It provides a valuable reference for LEAs and security organizations, policymakers, cybersecurity experts, digital forensic practitioners, researchers, academicians, graduates and advanced undergraduates, and other stakeholders with an interest in national and global security.

Table of Contents

Frontmatter
Bias, Privacy and Mistrust: Considering the Ethical Challenges of Artificial Intelligence
Abstract
The current landscape of artificial intelligence (AI) is complex, and is a source of hope and fear alike. It is a field which is constantly progressing, whilst demonstrating unforeseen challenges for creators and users. The benefits of using AI tools are clear, given it is now commonplace across the globe, finding its way into homes, schools, and workplaces alike. However, as reliant as society has become on advancing technologies, an increasing number of ethical challenges have been emerging, including bias, privacy violations, both leading to lack of trust. This chapter contextualises these issues by first presenting a short history of AI, including some challenges to its development. Following this, bias, privacy and mistrust are discussed, before solutions are suggested for future development and mitigating the stated troubling areas.
Annie Benzie, Reza Montasari
A Balance of Power: Exploring the Opportunities and Challenges of AI for a Nation
Abstract
Artificial intelligence is having a profound impact on the development of human society. It is improving—in some case, re-inventing—our economic, political, cultural, educational and medical sectors, to name a few. For many it is a cost effective solution that makes processes more effective, more intelligent and often more independent. However, in doing this, it is also having a deterministic influence on the dynamics of our societies. From an economic perspective, AI technology could be a game-changer, giving emerging markets the opportunity to outpace more developed markets. In fact, it has the ability to change the balance of global power, so much so that many countries are now striving for a national strategy on AI. And this goes to the very heart of a nation’s security where AI can also create significant implications for the protection and defence of it’s citizens, and economy. This chapter presents how Artificial Intelligence technology is extremely important in how it can shape the strength and power of a nation. Moreover, it highlights how AI can both positively and negatively impact a nation’s security. In summary, the chapter will provide a detailed overview of AI, it will analyse the direct and indirect effects of AI on national security and will present some potential solutions.
Shasha Yu, Fiona Carroll
Facial Recognition Technology, Drones, and Digital Policing: Compatible with the Fundamental Right to Privacy?
Abstract
Drones are the new gadget law enforcement agencies cannot get enough of. These agencies widely deploy drones, amongst others, for search and rescue operations or in response to a natural disaster. The benefits these drones offer are unquestionable. However, these drones are increasingly being deployed for a less self-evident and legitimate purpose: surveillance. The recourse to drones for surveillance operations is highly problematic, given its intrusiveness on citizens’ fundamental right to privacy. Furthermore, this intrusiveness becomes even more worrisome when these drones are equipped with facial recognition technology. Consequently, this paper will critically examine law enforcement’s recourse to facial recognition technology in drones and the worrying consequences of such deployment on citizens’ fundamental right to privacy.
Océane Dieu
The Use of the Internet for Terrorist Purposes: Investigating the Growth of Online Terrorism and Extremism
Abstract
The twenty-first century’s development of the Internet has led to a significant shift in contemporary communication (Zelin in The state of global jihad online: a qualitative, guantitative, and cross-lingual analysis. New America Foundation, 2013). While the Internet is widely utilised in everyday life to distribute and share information, it has also created an environment in which virtual societies have become a breeding ground for new risks and threats (Hawdon et al. in NORDICOM 3:29–37, 2015). Consequently, terrorist and extremist organisations exploit the accessibility of the Internet to facilitate their violent activities and spread their extremist ideology (Montasari et al. in Privacy, Security and Forensics in the Internet of Things (IoT). Springer International Publishing AG, 2022). This chapter aims to analyse the impact of the Internet on the rise of extremism and terrorism. To this end, the chapter will first investigate the role of the Internet in promoting the online radicalisation process, which leads to participation in terrorist acts. It will then critically examine how the Internet alters the nature of violent extremism, including its fatal consequences in the real world. Finally, the chapter will explore how and for what purposes violent extremists use the Internet, focusing on recruitment through propaganda, training and planning by sharing information, psychological warfare and fundraising.
Zainab Al-Sabahi, Reza Montasari
Cyber-Security and the Changing Landscape of Critical National Infrastructure: State and Non-state Cyber-Attacks on Organisations, Systems and Services
Abstract
The main aim of this chapter is to identify and explore key issues relating to cyber-attacks on critical national infrastructure. The chapter commences by clarifying the term critical national infrastructure. It then proceeds to highlight the rise in international incidents of cyber-attacks on critical national infrastructure. Vignette case studies, drawn from countries such Australia, USA, Ukraine and the UK are integrated into the analysis for illustrative purposes. The chapter emphasises the need for more attention to be placed on the vulnerabilities of critical national infrastructure in the light of trends such as the convergence of Information Technology and Operational Technology systems and the increasing use of Internet of Things (IoT) devices as a means of bringing systems online. Further, the chapter draws attention to the relatively low entry cost of engaging in cyber-attacks using malware, in contrast to the relatively high cost and logistical complexity of mounting physical attacks on well protected critical national infrastructure sites. One of the main conclusions drawn from the analysis is the extent to which addressing vulnerabilities in critical national infrastructure cyber-systems is likely to involve a wide range of actors, such as State-level emergency planners, manufacturers of IoT devices, and white hat hackers.
Joseph Rees, Christopher J. Rees
Police and Cybercrime: Evaluating Law Enforcement’s Cyber Capacity and Capability
Abstract
The COVID-19 pandemic has thrown the international community into disarray, resulting in a significant impact both on the rate at which digital technologies are incorporated into organisations’ processes and on the cyber threat landscape. The pandemic led society and institutions to a global accelerated digitalisation, and in doing so reshaped the landscape in which cybercrime and cybersecurity operate (Horgan et al. in J Crim Psychol 11:222–239, 2020). Furthermore, Russia’s recent invasion of Ukraine has had significant impact on the cyber threat landscape. Therefore, threats posed by cybercrime should be considered as the top priority for research attention, which is foundational to broader research in other fields such as Cyber Security, National and International Security, and Foreign Policy. To this end, this chapter aims to provide a critical analysis of the challenges that police and the wider law enforcement community encounter when responding to cybercrime. In view of this, the chapter also aims to assess law enforcement’s cyber capacity and capability concerning their fight against cybercrime.
Nina Kelly, Reza Montasari
Law Enforcement and Digital Policing of the Dark Web: An Assessment of the Technical, Ethical and Legal Issues
Abstract
This chapter aims to investigate the challenges that law enforcement agencies (LEAs) face in policing the dark web and explore ways in which these challenges impact the effectiveness of law enforcement responses to crime. Following a comprehensive review of the literature, the main trend discovered is that these challenges arise especially due to the anonymous profile of the dark web and the ethics involved in detecting criminal activity. The issues examined have led to recommendations for reducing the negative impact of the Dark Web on policing activities. Conclusions drawn from the analysis support the recommendations in the need for increased cyber threat intelligence, the need for new regulations and a deeper concern for ethics. The findings also reveal the importance of ensuring a right balance between policing the Dark Web and respecting individuals’ civil liberties. In order to achieve a common objective, cross-jurisdictional law enforcement co-ordination and international co-operation are essential. In addition, the results suggest that in order for digital policing to be effective, the techniques used must also be unpredictable to criminals.
Charlotte Warner
Assessing Current and Emerging Challenges in the Field of Digital Forensics
Abstract
This paper critically assesses the current and emerging challenges encountered in the field of Digital Forensics (DF) with reference to Cloud Forensics, the Internet of Things (IoT) Forensics, admissibility of digital evidence, lack of standardisation, limitations of tools in the field, as well as the significant problems associated with case backlogs within DF. Following the evaluation, the paper offers a set of recommendations that can be adopted to address or mitigate the stated challenges. To this end, a particular focus will be placed on the analysis of the recent report by His Majesty’s Inspectorate of Constabulary and Fire & Rescue Services (His Majesty’s Inspectorate of Constabulary and Fire and Rescue Services in Digital forensics: an inspection into how well the police and other agencies use digital forensics in their investigations, 2022) and applications of the recommendations discussed therein. This chapter contributes to the existing body of research with the inclusion of the recent recommendations made by the HMICFRS (His Majesty’s Inspectorate of Constabulary and Fire and Rescue Services in Digital forensics: an inspection into how well the police and other agencies use digital forensics in their investigations, 2022) report, making this research relevant in relation to the current and emerging challenges faced in the field of DF.
Zaryab Baig, Reza Montasari
A Critical Analysis: Key Strategies of Far-Right Online Visual Propaganda
Abstract
The approach from the far-right in producing and disseminating visual propaganda has allowed for a persistent online presence to be maintained, despite efforts to remove extremist and hateful content. This chapter will critically explore the academic literature which considers how far-right actors are taking advantages of the affordances of online communication routes to spread visual propaganda. Three key strategies which emerge from the literature will be critically discussed to understand the role of visual imagery in facilitating and maintaining far-right online discourse. Firstly, the use of imagery to other out-groups through boundary construction will be considered. From understanding how such representations drive online engagement, the second strategy of image and information manipulation will be discussed. This strategy will consider how the far-right take advantage of social media systems to garner more visibility through manipulating and framing imagery. Lastly, considerations will be made towards how humour through meme images and board subculture have been used as a strategy to lower the boundary for the participation in extremist ideology.
Nina Kelly
Investigating Online Propaganda Strategies Employed by Extremist Groups Through Visual Propaganda
Abstract
This chapter aims to assess the key online propaganda strategies employed by extremist groups through visual propaganda. To this end, the chapter discusses visual propaganda as a growing phenomenon within these extremist groups, whilst considering the comparison with textual propaganda and why extremist groups such as ISIS have increased their use of visual content. In terms of the key online strategies, the chapter specifically focuses on investigating the use of video games to radicalize and recruit individuals into extremist groups’ organizations. This use of visual propaganda is altering the ways in which these groups approach the radicalization process as well as changing how law enforcement and governments attempt to control it.
Georgina Butler
Metadata
Title
Applications for Artificial Intelligence and Digital Forensics in National Security
Editor
Reza Montasari
Copyright Year
2023
Electronic ISBN
978-3-031-40118-3
Print ISBN
978-3-031-40117-6
DOI
https://doi.org/10.1007/978-3-031-40118-3

Premium Partner