The Emerging Threat of Unlawful AI Usage: A Comprehensive Content Analysis in ‎Bangladesh and Worldwide

Authors

  • Md. Masud Nabi Postgraduate Student, Department of Criminology and Police Science, Faculty of Life Science, Mawlana ‎Bhashani Science and Technology University, Tangail, Bangladesh https://orcid.org/0009-0008-4862-4695
  • Mahmuda Akter Associate Professor, Department of Criminology and Police Science, Faculty of Life Science, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh. https://orcid.org/0009-0007-6872-7969
  • Mostak Bari Fahim Postgraduate Student, Department of Criminology and Police Science, Faculty of Life Science, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh. https://orcid.org/0000-0001-6992-8606

DOI:

https://doi.org/10.65826/JSAI.1.1.2026.49

Keywords:

Artificial Intelligence (AI), Unlawful usage, AI-driven Crime, Cybercrime, Security Threat‎

Abstract

Artificial Intelligence (AI) has transformed life but raises the issues of misuse. This indicates its ‎duality, particularly in criminal activities. The primary purpose of this study is to provide an ‎understanding of the various dynamics (nature, scope, classifications, threats, vulnerabilities, and ‎explanations) of unlawful use of AI. This study follows qualitative method and uses secondary data. ‎The data are gathered using a systematic approach to the literature and the different sources, like peer-‎reviewed articles, books, reports, websites, newspapers, etc. As AI systems grow more complex and ‎embedded in critical infrastructures, the systems become vulnerable to manipulation and exploitation. ‎Malicious actors, such as cyber criminals, exploit these weaknesses and threaten the reliability and ‎efficiency of AI with employing it as both an intentional and unintentional tool of crime. The illicit ‎use of AI leads to new forms of criminal activity and strengthen existing cybercrimes through ‎deepfakes, deception, manipulation, malware development, and automation of illicit tasks. This study ‎has found various unlawful applications, increase the risks across physical and digital domains and ‎make the user’s information vulnerable.  Initiating proper mitigation strategies, strengthening ‎regulatory frameworks, and international cooperation can be instrumental in strengthening digital ‎ecosystems to prevent misuse of AI.  This measures also can reduce victimization, and can ensure ‎safer integration of AI technologies

References

Abbas, M. (2022, December 18). Cyberbullying increases by 20%. The Daily Star. https://www.thedailystar.net/news/bangladesh/crime-justice/news/cyberbullying-increases-20-3199361

Ajder, H., Patrini, G., Cavalli, F., & Cullen, L. (2019). The State of Deepfakes: Landscape, Threats, and Impact. Deeptrace. https://regmedia.co.uk/2019/10/08/deepfake_report.pdf

Arkin, A. P. (2008). Governing lethal behavior: Embedding ethics in a hybrid deliberative/reactive robot architecture part I: Motivation and philosophy. Human-Robot Interaction, 121–128. http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000006249424

Armin, J. (2023, September). AI MALWARE. Linkedin. Retrieved November 19, 2023, from https://www.linkedin.com/pulse/ai-malware-jart-armin/

Baker, T. (2023, August 14). Understanding AI Harms: An Overview - Center for Security and Emerging Technology. Center for Security and Emerging Technology. https://cset.georgetown.edu/article/understanding-ai-harms-an-overview/

Bangladesh Cyber Security Strategy. (2021). In ICTD. https://ictd.portal.gov.bd/sites/default/files/files/ictd.portal.gov.bd/page/6c9773a2_7556_4395_bbec_f132b9d819f0/nothi_10314_2021_07_30_31627641428.pdf

Bazarkina, D., & Pashentsev, E. (2020). Malicious use of artificial intelligence. Russia in Global Affairs, 18(4). https://doi.org/10.31278/1810-6374-2020-18-4-154-177

Bikeev, I., Kabanov, P. A., Begishev, I., & Khisamova, Z. (2019). Criminological risks and legal aspects of artificial intelligence implementation. ACM Digital Library. https://doi.org/10.1145/3371425.3371476

Blauth, T. F., Gstrein, O. J., & Zwitter, A. (2022). Artificial Intelligence Crime: An overview of Malicious use and abuse of AI. IEEE Access, 10, 77110–77122. https://doi.org/10.1109/access.2022.3191790

Brinkman, R. L., & Brinkman, J. E. (1997). Cultural lag: conception and theory. International Journal of Social Economics, 24(6), 609–627. https://doi.org/10.1108/03068299710179026

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., Dafoe, A., Scharre, P., Zeitzoff, T., Filar, B., Anderson, H. S., Roff, H. M., Allen, G. C., Steinhardt, J., Flynn, C., Héigeartaigh, S. Ó., Beard, S., Belfield, H., Farquhar, S., . . . Amodei, D. (2018). The Malicious Use of Artificial intelligence: Forecasting, Prevention, and Mitigation. arXiv (Cornell University). https://doi.org/10.17863/cam.22520

Bryson, J. J. (2019, January). AI Ethics: Artificial intelligence, robots, and society. http://www.cs.bath.ac.uk/~jjb/web/ai.html

Cahill, E. (2022, March 20). What’s the Difference Between Phishing, Smishing and Vishing? https://www.experian.com/blogs/ask-experian/phishing-smishing-vishing/

Caldwell, M. L., Andrews, J. T. A., Tanay, T., & Griffin, L. D. (2020). AI-enabled future crime. Crime Science, 9(1). https://doi.org/10.1186/s40163-020-00123-8.

Ciancaglini, V., Gibson, C., & Sancho, D. (2020). Malicious Uses and Abuses of Artificial Intelligence. In UNICRI. Trend Micro Research. Retrieved November 7, 2023, from https://unicri.it/sites/default/files/2020-11/Abuse_ai.pdf

Claussén Karlsson, M. (2017). Artificial Intelligence and the External Element of the Crime. Orebro University. http://www.diva-portal.org/smash/get/diva2:1115160/FULLTEXT01.pdf

Cloudflare. (n.d.). What is a phishing attack? Retrieved November 23, 2023, from https://www.cloudflare.com/en-gb/learning/access-management/phishing-attack/

Crane, C. (2023, November 6). 6 Dangers of generative AI and what’s being done to address them. Hashed Out by the SSL StoreTM. https://www.thesslstore.com/blog/dangers-of-generative-ai-whats-being-done-to-address-them/

Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: a systematic review of data availability. The Geneva Papers on Risk and Insurance - Issues and Practice, 47(3). https://doi.org/10.1057/s41288-022-00266-6

Dunne, M. (2023, November 9). Data Dive: Fake news in the age of AI. Ipsos. https://www.ipsos.com/en/data-dive-fake-news-age-ai

Durbin, S. (2020, October 13). How Criminals Use Artificial Intelligence To Fuel Cyber Attacks. Forbes. https://www.forbes.com/sites/forbesbusinesscouncil/2020/10/13/how-criminals-use-artificial-intelligence-to-fuel-cyber-attacks/?sh=7b044b695012

F. N. Sibai, "AI Crimes: A Classification," 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 2020, https://doi.org/10.1109/CyberSecurity49315.2020.9138891.

Gemmo. (2023, September 27). The 3 stages of AI. Gemmo.AI. https://gemmo.ai/the-3-stages-of-ai/

Google AI. (n.d.). Google AI Principles – Google AI. https://ai.google/responsibility/principles/

Google. (n.d.). What is Artificial Intelligence (AI)? Google Cloud. Retrieved August 14, 2023, from https://cloud.google.com/learn/what-is-artificial-intelligence

Hamilton, M. (2023, July). A ‘black box’ AI system has been influencing criminal justice decisions for over two decades – it’s time to open it up. The Conversation. Retrieved November 27, 2023, from https://theconversation.com/a-black-box-ai-system-has-been-influencing-criminal-justice-decisions-for-over-two-decades-its-time-to-open-it-up-200594

Hayward, K., & Maas, M. M. (2020). Artificial intelligence and crime: A primer for criminologists. Crime, Media, Culture, 17(2). https://doi.org/10.1177/1741659020917434

Huelss, I. B. a. H. (2021, February 16). Artificial intelligence, weapons systems and human control. E-International Relations. https://www.e-ir.info/2021/02/16/artificial-intelligence-weapons-systems-and-human-control/

IBM. (n.d.). What is artificial intelligence? Retrieved August 14, 2023, from https://www.ibm.com/topics/artificial-intelligence

IEEE SA. (2023, October 4). The IEEE Global Initiative on Ethics of Autonomous and Intelligent Systems - IEEE Standards Association. IEEE Standards Association. https://standards.ieee.org/industry-connections/ec/autonomous-systems/

Imber, D. (2023, October 6). The Latest Cyber Crime Statistics (updated October 2023) | AAG IT Support. AAG IT Services. https://aag-it.com/the-latest-cyber-crime-statistics/

Jaishankar, K. (2007). Establishing a Theory of Cyber Crimes. International Journal of Cyber Criminology, 1(2), 7–8. https://www.cybercrimejournal.com/pdf/Editoriaijccjuly.pdf

Jeong, D. (2020). Artificial Intelligence Security Threat, Crime, and Forensics: Taxonomy and open issues. IEEE Access, 8, 184560–184574. https://doi.org/10.1109/access.2020.3029280

Johnson, M., & Smith, L. (2018). The Art of Data Nudging: A Comprehensive Analysis of AI-Driven Manipulation Techniques. Journal of Data Privacy, 25(3).

Khan, S. (2023, November). The Imperative of Prioritizing AI Ethics in Bangladesh. Linkedin. Retrieved November 27, 2023, from https://www.linkedin.com/pulse/imperative-prioritizing-ai-ethics-bangladesh-shakil-khan-i9rse/?trk=article-ssr-frontend-pulse_more-articles_related-content-card

King, T. C., Aggarwal, N., Taddeo, M., & Floridi, L. (2020). Artificial intelligence crime: An interdisciplinary analysis of foreseeable threats and solutions. Science and engineering ethics, 26. https://link.springer.com/article/10.1007/s11948-018-00081-0

Kl, A. (2023, October 29). FraudGPT – The Emergence of Malicious Generative AI. The Sec Master. https://thesecmaster.com/fraudgpt-the-emergence-of-malicious-generative-ai/

Mascellino, A. (2023, August 23). Artificial intelligence and USBs drive 8% rise in Cyber-Attacks. Infosecurity Magazine. https://www.infosecurity-magazine.com/news/ai-usbs-drive-rise-cyber-attacks/

Matchin, L. (2016, April 28). What is the Difference between General Intent and Specific Intent? - Leon Matchin Attorney at Law. Leon Matchin Attorney at Law. https://attorneyleonmatchin.com/difference-general-intent-specific-intent/

McCarthy, J. (2004). What is Artificial Intelligence? ResearchGate. https://www.researchgate.net/publication/28762490_What_is_Artificial_Intelligence

McKeever, G. (2020, June 17). Phishing attacks. Learning Center. https://www.imperva.com/learn/application-security/phishing-attack-scam/

Microsoft. (n.d.). Empowering responsible AI practices. Retrieved October 31, 2023, from https://www.microsoft.com/en-us/ai/responsible-ai

Milmo, D., & Farah, H. (2023, October 25). Malicious use of AI could cause ‘unimaginable’ damage, says UN boss. The Guardian. https://www.theguardian.com/technology/2023/jul/18/malicious-use-of-ai-could-cause-huge-damage-says-un-boss

Mohammad, S. (2023, September 25). Deepfakes and Bangladesh general election 2024. Dhaka Tribune. https://www.dhakatribune.com/opinion/326286/deepfakes-and-bangladesh-general-election-2024

Nafis, Md. Z. (2013). Cyber Security in Bangladesh: An Overview of Threats and Prospects. Addaiyan Journal of Arts, Humanities and Social Sciences, 2581–8783. https://doi.org/10.36099/ajahss.5.1.1

Orne, I. J. (2023, October 4). Deepfakes and AI: Addressing the potency of artificial intelligence in online harassment. Dhaka Tribune. https://www.dhakatribune.com/opinion/op-ed/327015/deepfakes-and-ai-addressing-the-potency-of

Poulis, A. (2023, May). How to Prevent the Use of Generative AI for Malicious Purposes. Dataforce. Retrieved November 27, 2023, from https://www.transperfect.com/dataforce/blog/how-to-prevent-use-of-generative-ai-for-malicious-purposes

Roller, J. (2023, September 6). AI for Cybersecurity and Cybercrime: How Artificial Intelligence Is Battling Itself. IEEE Computer Society. https://www.computer.org/publications/tech-news/trends/ai-fighting-ai

Rushton, J. (2023, July 3). 50+ Phishing Statistics You Need to Know – Where, Who & What is Targeted. Techopedia. https://www.techopedia.com/phishing-statistics

Ryan-Mosley, T. (2023, October 3). How generative AI is boosting the spread of disinformation and propaganda. MIT Technology Review. https://www.technologyreview.com/2023/10/04/1080801/generative-ai-boosting-disinformation-and-propaganda-freedom-house/

Salmanowitz, N. (2018, November). Explainable AI and the Legality of Autonomous Weapon Systems. Lawfare. Retrieved November 10, 2023, from https://www.lawfaremedia.org/article/explainable-ai-and-legality-autonomous-weapon-systems

Scharre, P. (2021, August 18). Debunking the AI arms race theory. Texas National Security Review. https://tnsr.org/2021/06/debunking-the-ai-arms-race-theory/

Science, O.-. O. D. (2021, December 9). How will AI nudging affect our privacy? - ODSC - Open Data Science - Medium. Medium. https://odsc.medium.com/how-will-ai-nudging-affect-our-privacy-86d349677f44

Smith, B. a. C. a. T. (2023, June 28). Illegal trade in AI child sex abuse images exposed. BBC News. https://www.bbc.com/news/uk-65932372

Spyropoulos, F. (2024). New Approaches to Researching AI Crime: Institutionalization of Digital Criminology. Journal of Digital Technologies and Law, 2(3), 636–656. https://doi.org/10.21202/jdtl.2024.32

Stevens, L. (2023, June). Generative AI and Fraud – What are the risks that firms face? Deloitte. Retrieved November 18, 2023, from https://www2.deloitte.com/uk/en/blog/auditandassurance/2023/generative-ai-and-fraud-what-are-the-risks-that-firms-face.html

Taddeo, M., McCutcheon, T., & Floridi, L. (2019). Trusting artificial intelligence in cybersecurity is a double-edged sword. Nature Machine Intelligence, 1(12). https://doi.org/10.1038/s42256-019-0109-1

Taiyeb, F. A. (2023, February 6). What threats does ChatGPT pose to academia? The Daily Star. https://www.thedailystar.net/opinion/views/news/what-threats-does-chatgpt-pose-academia-3239911

Team, C. (n.d.). Common vulnerabilities in cyber space of Bangladesh. BGD e-GOV CIRT | Bangladesh e-Government Computer Incident Response Team. https://www.cirt.gov.bd/common-vulnerabilities-in-cyber-space-of-bangladesh/

The Business Standard. (2020, February 13). Artificial Intelligence: Bangladesh Perspective. The Business Standard. https://www.tbsnews.net/tech/artificial-intelligence-bangladesh-perspective-44017

The Business Standard. (2022, June 13). Majority of banks at high cyber risks: BIBM study. The Business Standard. https://www.tbsnews.net/economy/banking/majority-banks-high-cyber-risks-bibm-study-438594

Thompson, R., & Brown, M. (2019). Privacy Concerns in Illicit Data Nudging: A Critical Analysis. Journal of Internet Privacy, 12(1).

Tomasik, B. (2013). International Cooperation vs. AI Arms Race. Longtermrisk. Retrieved November 10, 2023, from https://longtermrisk.org/files/international-cooperation-ai-arms-race.pdf

Trieu, K. (2018). Artificial Intelligence-Based password brute force attacks. https://www.semanticscholar.org/paper/Artificial-Intelligence-Based-Password-Brute-Force-Trieu-Yang/eae0dc046b05e603d438efbaebccbf3ce622a2c6

Wang, J., Wang, C., Lin, Q., Luo, C., Wu, C., & Li, J. (2022). Adversarial attacks and defenses in deep learning for image recognition: A survey. Neurocomputing, 514. https://doi.org/10.1016/j.neucom.2022.09.004

Westerlund, M. (2019). The Emergence of Deepfake Technology: A review. Technology Innovation Management Review, 9(11), 39–52. https://doi.org/10.22215/timreview/1282

Wilson, S. (2023, April). Cybersecurity and Artificial Intelligence: Threats and Opportunities. Contrast Security. Retrieved October 30, 2023, from https://www.contrastsecurity.com/hubfs/Cybersecurity%20and%20Artificial%20Intelligence%20Threats%20and%20Opportunities.pdf?hsLang=en-us

Yamin, M. M., Ullah, M., Ullah, H., & Katt, B. (2021). Weaponized AI for cyber attacks. Journal of Information Security and Applications, 57, 102722. https://doi.org/10.1016/j.jisa.2020.102722

Zetter, K. (2010, November 19). Wiseguys plead guilty in Ticketmaster Captcha case. WIRED. https://www.wired.com/2010/11/wiseguys-plead-guilty/

Zvelo. (2023, November 8). AI-Powered Malware Holds Potential For Extreme Consequences. Zvelo, Inc. https://zvelo.com/ai-powered-malware-holds-potential-for-extreme-consequences/

Downloads

Published

2026-01-15

How to Cite

Nabi, M. M., Akter, M., & Fahim, M. B. (2026). The Emerging Threat of Unlawful AI Usage: A Comprehensive Content Analysis in ‎Bangladesh and Worldwide. Journal of South Asian Issues (JSAI), 1(1), 140–162. https://doi.org/10.65826/JSAI.1.1.2026.49

Issue

Section

Articles