The Emerging Threat of Unlawful AI Usage: A Comprehensive Content Analysis in Bangladesh and Worldwide
DOI:
https://doi.org/10.65826/JSAI.1.1.2026.49Keywords:
Artificial Intelligence (AI), Unlawful usage, AI-driven Crime, Cybercrime, Security ThreatAbstract
Artificial Intelligence (AI) has transformed life but raises the issues of misuse. This indicates its duality, particularly in criminal activities. The primary purpose of this study is to provide an understanding of the various dynamics (nature, scope, classifications, threats, vulnerabilities, and explanations) of unlawful use of AI. This study follows qualitative method and uses secondary data. The data are gathered using a systematic approach to the literature and the different sources, like peer-reviewed articles, books, reports, websites, newspapers, etc. As AI systems grow more complex and embedded in critical infrastructures, the systems become vulnerable to manipulation and exploitation. Malicious actors, such as cyber criminals, exploit these weaknesses and threaten the reliability and efficiency of AI with employing it as both an intentional and unintentional tool of crime. The illicit use of AI leads to new forms of criminal activity and strengthen existing cybercrimes through deepfakes, deception, manipulation, malware development, and automation of illicit tasks. This study has found various unlawful applications, increase the risks across physical and digital domains and make the user’s information vulnerable. Initiating proper mitigation strategies, strengthening regulatory frameworks, and international cooperation can be instrumental in strengthening digital ecosystems to prevent misuse of AI. This measures also can reduce victimization, and can ensure safer integration of AI technologies
References
Abbas, M. (2022, December 18). Cyberbullying increases by 20%. The Daily Star. https://www.thedailystar.net/news/bangladesh/crime-justice/news/cyberbullying-increases-20-3199361
Ajder, H., Patrini, G., Cavalli, F., & Cullen, L. (2019). The State of Deepfakes: Landscape, Threats, and Impact. Deeptrace. https://regmedia.co.uk/2019/10/08/deepfake_report.pdf
Arkin, A. P. (2008). Governing lethal behavior: Embedding ethics in a hybrid deliberative/reactive robot architecture part I: Motivation and philosophy. Human-Robot Interaction, 121–128. http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006249424
Armin, J. (2023, September). AI MALWARE. Linkedin. Retrieved November 19, 2023, from https://www.linkedin.com/pulse/ai-malware-jart-armin/
Baker, T. (2023, August 14). Understanding AI Harms: An Overview - Center for Security and Emerging Technology. Center for Security and Emerging Technology. https://cset.georgetown.edu/article/understanding-ai-harms-an-overview/
Bangladesh Cyber Security Strategy. (2021). In ICTD. https://ictd.portal.gov.bd/sites/default/files/files/ictd.portal.gov.bd/page/6c9773a2_7556_4395_bbec_f132b9d819f0/nothi_10314_2021_07_30_31627641428.pdf
Bazarkina, D., & Pashentsev, E. (2020). Malicious use of artificial intelligence. Russia in Global Affairs, 18(4). https://doi.org/10.31278/1810-6374-2020-18-4-154-177
Bikeev, I., Kabanov, P. A., Begishev, I., & Khisamova, Z. (2019). Criminological risks and legal aspects of artificial intelligence implementation. ACM Digital Library. https://doi.org/10.1145/3371425.3371476
Blauth, T. F., Gstrein, O. J., & Zwitter, A. (2022). Artificial Intelligence Crime: An overview of Malicious use and abuse of AI. IEEE Access, 10, 77110–77122. https://doi.org/10.1109/access.2022.3191790
Brinkman, R. L., & Brinkman, J. E. (1997). Cultural lag: conception and theory. International Journal of Social Economics, 24(6), 609–627. https://doi.org/10.1108/03068299710179026
Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B., Anderson, H. S., Roff, H. M., Allen, G. C., Steinhardt, J., Flynn, C., Héigeartaigh, S. Ó., Beard, S., Belfield, H., Farquhar, S., . . . Amodei, D. (2018). The Malicious Use of Artificial intelligence: Forecasting, Prevention, and Mitigation. arXiv (Cornell University). https://doi.org/10.17863/cam.22520
Bryson, J. J. (2019, January). AI Ethics: Artificial intelligence, robots, and society. http://www.cs.bath.ac.uk/~jjb/web/ai.html
Cahill, E. (2022, March 20). What’s the Difference Between Phishing, Smishing and Vishing? https://www.experian.com/blogs/ask-experian/phishing-smishing-vishing/
Caldwell, M. L., Andrews, J. T. A., Tanay, T., & Griffin, L. D. (2020). AI-enabled future crime. Crime Science, 9(1). https://doi.org/10.1186/s40163-020-00123-8.
Ciancaglini, V., Gibson, C., & Sancho, D. (2020). Malicious Uses and Abuses of Artificial Intelligence. In UNICRI. Trend Micro Research. Retrieved November 7, 2023, from https://unicri.it/sites/default/files/2020-11/Abuse_ai.pdf
Claussén Karlsson, M. (2017). Artificial Intelligence and the External Element of the Crime. Orebro University. http://www.diva-portal.org/smash/get/diva2:1115160/FULLTEXT01.pdf
Cloudflare. (n.d.). What is a phishing attack? Retrieved November 23, 2023, from https://www.cloudflare.com/en-gb/learning/access-management/phishing-attack/
Crane, C. (2023, November 6). 6 Dangers of generative AI and what’s being done to address them. Hashed Out by the SSL StoreTM. https://www.thesslstore.com/blog/dangers-of-generative-ai-whats-being-done-to-address-them/
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance - Issues and Practice, 47(3). https://doi.org/10.1057/s41288-022-00266-6
Dunne, M. (2023, November 9). Data Dive: Fake news in the age of AI. Ipsos. https://www.ipsos.com/en/data-dive-fake-news-age-ai
Durbin, S. (2020, October 13). How Criminals Use Artificial Intelligence To Fuel Cyber Attacks. Forbes. https://www.forbes.com/sites/forbesbusinesscouncil/2020/10/13/how-criminals-use-artificial-intelligence-to-fuel-cyber-attacks/?sh=7b044b695012
F. N. Sibai, "AI Crimes: A Classification," 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 2020, https://doi.org/10.1109/CyberSecurity49315.2020.9138891.
Gemmo. (2023, September 27). The 3 stages of AI. Gemmo.AI. https://gemmo.ai/the-3-stages-of-ai/
Google AI. (n.d.). Google AI Principles – Google AI. https://ai.google/responsibility/principles/
Google. (n.d.). What is Artificial Intelligence (AI)? Google Cloud. Retrieved August 14, 2023, from https://cloud.google.com/learn/what-is-artificial-intelligence
Hamilton, M. (2023, July). A ‘black box’ AI system has been influencing criminal justice decisions for over two decades – it’s time to open it up. The Conversation. Retrieved November 27, 2023, from https://theconversation.com/a-black-box-ai-system-has-been-influencing-criminal-justice-decisions-for-over-two-decades-its-time-to-open-it-up-200594
Hayward, K., & Maas, M. M. (2020). Artificial intelligence and crime: A primer for criminologists. Crime, Media, Culture, 17(2). https://doi.org/10.1177/1741659020917434
Huelss, I. B. a. H. (2021, February 16). Artificial intelligence, weapons systems and human control. E-International Relations. https://www.e-ir.info/2021/02/16/artificial-intelligence-weapons-systems-and-human-control/
IBM. (n.d.). What is artificial intelligence? Retrieved August 14, 2023, from https://www.ibm.com/topics/artificial-intelligence
IEEE SA. (2023, October 4). The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems - IEEE Standards Association. IEEE Standards Association. https://standards.ieee.org/industry-connections/ec/autonomous-systems/
Imber, D. (2023, October 6). The Latest Cyber Crime Statistics (updated October 2023) | AAG IT Support. AAG IT Services. https://aag-it.com/the-latest-cyber-crime-statistics/
Jaishankar, K. (2007). Establishing a Theory of Cyber Crimes. International Journal of Cyber Criminology, 1(2), 7–8. https://www.cybercrimejournal.com/pdf/Editoriaijccjuly.pdf
Jeong, D. (2020). Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and open issues. IEEE Access, 8, 184560–184574. https://doi.org/10.1109/access.2020.3029280
Johnson, M., & Smith, L. (2018). The Art of Data Nudging: A Comprehensive Analysis of AI-Driven Manipulation Techniques. Journal of Data Privacy, 25(3).
Khan, S. (2023, November). The Imperative of Prioritizing AI Ethics in Bangladesh. Linkedin. Retrieved November 27, 2023, from https://www.linkedin.com/pulse/imperative-prioritizing-ai-ethics-bangladesh-shakil-khan-i9rse/?trk=article-ssr-frontend-pulse_more-articles_related-content-card
King, T. C., Aggarwal, N., Taddeo, M., & Floridi, L. (2020). Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions. Science and engineering ethics, 26. https://link.springer.com/article/10.1007/s11948-018-00081-0
Kl, A. (2023, October 29). FraudGPT – The Emergence of Malicious Generative AI. The Sec Master. https://thesecmaster.com/fraudgpt-the-emergence-of-malicious-generative-ai/
Mascellino, A. (2023, August 23). Artificial intelligence and USBs drive 8% rise in Cyber-Attacks. Infosecurity Magazine. https://www.infosecurity-magazine.com/news/ai-usbs-drive-rise-cyber-attacks/
Matchin, L. (2016, April 28). What is the Difference between General Intent and Specific Intent? - Leon Matchin Attorney at Law. Leon Matchin Attorney at Law. https://attorneyleonmatchin.com/difference-general-intent-specific-intent/
McCarthy, J. (2004). What is Artificial Intelligence? ResearchGate. https://www.researchgate.net/publication/28762490_What_is_Artificial_Intelligence
McKeever, G. (2020, June 17). Phishing attacks. Learning Center. https://www.imperva.com/learn/application-security/phishing-attack-scam/
Microsoft. (n.d.). Empowering responsible AI practices. Retrieved October 31, 2023, from https://www.microsoft.com/en-us/ai/responsible-ai
Milmo, D., & Farah, H. (2023, October 25). Malicious use of AI could cause ‘unimaginable’ damage, says UN boss. The Guardian. https://www.theguardian.com/technology/2023/jul/18/malicious-use-of-ai-could-cause-huge-damage-says-un-boss
Mohammad, S. (2023, September 25). Deepfakes and Bangladesh general election 2024. Dhaka Tribune. https://www.dhakatribune.com/opinion/326286/deepfakes-and-bangladesh-general-election-2024
Nafis, Md. Z. (2013). Cyber Security in Bangladesh: An Overview of Threats and Prospects. Addaiyan Journal of Arts, Humanities and Social Sciences, 2581–8783. https://doi.org/10.36099/ajahss.5.1.1
Orne, I. J. (2023, October 4). Deepfakes and AI: Addressing the potency of artificial intelligence in online harassment. Dhaka Tribune. https://www.dhakatribune.com/opinion/op-ed/327015/deepfakes-and-ai-addressing-the-potency-of
Poulis, A. (2023, May). How to Prevent the Use of Generative AI for Malicious Purposes. Dataforce. Retrieved November 27, 2023, from https://www.transperfect.com/dataforce/blog/how-to-prevent-use-of-generative-ai-for-malicious-purposes
Roller, J. (2023, September 6). AI for Cybersecurity and Cybercrime: How Artificial Intelligence Is Battling Itself. IEEE Computer Society. https://www.computer.org/publications/tech-news/trends/ai-fighting-ai
Rushton, J. (2023, July 3). 50+ Phishing Statistics You Need to Know – Where, Who & What is Targeted. Techopedia. https://www.techopedia.com/phishing-statistics
Ryan-Mosley, T. (2023, October 3). How generative AI is boosting the spread of disinformation and propaganda. MIT Technology Review. https://www.technologyreview.com/2023/10/04/1080801/generative-ai-boosting-disinformation-and-propaganda-freedom-house/
Salmanowitz, N. (2018, November). Explainable AI and the Legality of Autonomous Weapon Systems. Lawfare. Retrieved November 10, 2023, from https://www.lawfaremedia.org/article/explainable-ai-and-legality-autonomous-weapon-systems
Scharre, P. (2021, August 18). Debunking the AI arms race theory. Texas National Security Review. https://tnsr.org/2021/06/debunking-the-ai-arms-race-theory/
Science, O.-. O. D. (2021, December 9). How will AI nudging affect our privacy? - ODSC - Open Data Science - Medium. Medium. https://odsc.medium.com/how-will-ai-nudging-affect-our-privacy-86d349677f44
Smith, B. a. C. a. T. (2023, June 28). Illegal trade in AI child sex abuse images exposed. BBC News. https://www.bbc.com/news/uk-65932372
Spyropoulos, F. (2024). New Approaches to Researching AI Crime: Institutionalization of Digital Criminology. Journal of Digital Technologies and Law, 2(3), 636–656. https://doi.org/10.21202/jdtl.2024.32
Stevens, L. (2023, June). Generative AI and Fraud – What are the risks that firms face? Deloitte. Retrieved November 18, 2023, from https://www2.deloitte.com/uk/en/blog/auditandassurance/2023/generative-ai-and-fraud-what-are-the-risks-that-firms-face.html
Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12). https://doi.org/10.1038/s42256-019-0109-1
Taiyeb, F. A. (2023, February 6). What threats does ChatGPT pose to academia? The Daily Star. https://www.thedailystar.net/opinion/views/news/what-threats-does-chatgpt-pose-academia-3239911
Team, C. (n.d.). Common vulnerabilities in cyber space of Bangladesh. BGD e-GOV CIRT | Bangladesh e-Government Computer Incident Response Team. https://www.cirt.gov.bd/common-vulnerabilities-in-cyber-space-of-bangladesh/
The Business Standard. (2020, February 13). Artificial Intelligence: Bangladesh Perspective. The Business Standard. https://www.tbsnews.net/tech/artificial-intelligence-bangladesh-perspective-44017
The Business Standard. (2022, June 13). Majority of banks at high cyber risks: BIBM study. The Business Standard. https://www.tbsnews.net/economy/banking/majority-banks-high-cyber-risks-bibm-study-438594
Thompson, R., & Brown, M. (2019). Privacy Concerns in Illicit Data Nudging: A Critical Analysis. Journal of Internet Privacy, 12(1).
Tomasik, B. (2013). International Cooperation vs. AI Arms Race. Longtermrisk. Retrieved November 10, 2023, from https://longtermrisk.org/files/international-cooperation-ai-arms-race.pdf
Trieu, K. (2018). Artificial Intelligence-Based password brute force attacks. https://www.semanticscholar.org/paper/Artificial-Intelligence-Based-Password-Brute-Force-Trieu-Yang/eae0dc046b05e603d438efbaebccbf3ce622a2c6
Wang, J., Wang, C., Lin, Q., Luo, C., Wu, C., & Li, J. (2022). Adversarial attacks and defenses in deep learning for image recognition: A survey. Neurocomputing, 514. https://doi.org/10.1016/j.neucom.2022.09.004
Westerlund, M. (2019). The Emergence of Deepfake Technology: A review. Technology Innovation Management Review, 9(11), 39–52. https://doi.org/10.22215/timreview/1282
Wilson, S. (2023, April). Cybersecurity and Artificial Intelligence: Threats and Opportunities. Contrast Security. Retrieved October 30, 2023, from https://www.contrastsecurity.com/hubfs/Cybersecurity%20and%20Artificial%20Intelligence%20Threats%20and%20Opportunities.pdf?hsLang=en-us
Yamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyber attacks. Journal of Information Security and Applications, 57, 102722. https://doi.org/10.1016/j.jisa.2020.102722
Zetter, K. (2010, November 19). Wiseguys plead guilty in Ticketmaster Captcha case. WIRED. https://www.wired.com/2010/11/wiseguys-plead-guilty/
Zvelo. (2023, November 8). AI-Powered Malware Holds Potential For Extreme Consequences. Zvelo, Inc. https://zvelo.com/ai-powered-malware-holds-potential-for-extreme-consequences/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Md. Masud Nabi, Mahmuda Akter, Mostak Bari Fahim

This work is licensed under a Creative Commons Attribution 4.0 International License.



