Research Article
BibTex RIS Cite

Yarının Tehditleri: Yapay Zekâ-Güçlendirilmiş Siber Saldırıların Uluslararası İlişkiler Üzerindeki Etkileri

Year 2024, Issue: War and International System, 109 - 130, 30.12.2024

Abstract

Yapay zekâ (YZ) gelişimi ile birçok sektörde devrim yaratmıştır, ancak kötü niyetli kullanıldığında yeni tehditler de oluşturması muhtemeldir. Bu çalışmada, yapay zekâ kullanılarak devlet ve devlet dışı aktörlerin daha sofistike siber saldırılar gerçekleştirmesinin nasıl etkiler doğurabileceği ve bu durumun uluslararası ilişkiler ve küresel güvenlik açısından olası sonuçları incelenmektedir. Siber saldırı tespiti, YZ’deki hızlı gelişmeler nedeniyle daha otomatik, daha hedefli ve daha zorlu hale gelmiştir. Yapay zekâ sayesinde, düşmanlar artık insanları taklit edebilmekte, verileri değiştirebilmekte, konuşmaları dinleyebilmekte ve sistem zayıflıklarını daha önce hiç görülmemiş bir ölçekte kullanabilmektedir. Kontrol edilmeyen YZ-destekli siber saldırılar diplomatik ilişkileri baltalama, hükümetler arasında askerî çatışma olasılığını artırma ve ekonomiyi istikrarsızlaştırma kapasitesine sahiptir. Bu riskleri azaltmak için uluslararası toplumun yeni yasal çerçevelere ve teknolojik önlemlere ihtiyacı olacaktır. YZ siber silahlarının gelişimini sınırlandırmak, dirençli sistemler geliştirmek ve siber uzayda sorumlu devlet faaliyeti için kılavuz ilkeler oluşturmak için uluslararası iş birliği gereklidir. İş birliği ve öngörü yoluyla, yoğunlaştırılmış siber savaş olasılığını azaltırken YZ’nin potansiyeline ulaşılabilmesi daha olasıdır. Bu makale, YZ tabanlı siber saldırıların etkilerinin olasılığını azaltmak için geniş bir literatür perspektifi ortaya koymakta ve hem yasal hem de teknolojik çözümler için öneriler sunmaktadır.

Thanks

TÜBİTAK BİDEB 2214-A desteği kapsamında süren araştırmalarım sırasında tamamladığım bu çalışma için TÜBİTAK'a teşekkür ederim.

References

  • AJDER Henry PATRINI Giorgio CAVALLI Francesco and CULLEN Laurence (2019). “The State of Deepfakes: Landscape, Threats, and Impact”, Deeptrace, 1-28. BIBI Iram and
  • AKHUNZADA Adnan (2022). “Deep AI-powered Cyber Threat Analysis in IIoT”, IEEE Internet of Things Journal, 9:10, 7748-7763.
  • BIMANTARA Azza (2022). “The Normative Enactment of International Cybersecurity Capacity Building Assistance: A Comparative Analysis on Japanese and South Korean Practices”, Global: Jurnal Politik Internasional, 24:1, 109-138.
  • BUCHANAN Ben (2020). The Cybersecurity Dilemma, Oxford University Press, Oxford.
  • CAVELTY Myriam Dunn and WENGER Andreas (2022). Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, 1st Edition, Routledge, New York.
  • CAVES John P. Jr. and CARUS W. Seth (2021). The Future of Weapons of Mass Destruction: Their Nature and Role in 2030, Occasional Paper 10, National Defense University Press, Washington.
  • CRESWELL John W. and CRESWELL David (2022). Research Design: Qualitative, Quantitative and Mixed Methods Approaches, SAGE Publications, California.
  • DAVIS Paul K. (2014). “Deterrence, Influence, Cyber-attack, and Cyberwar”, New York University Journal of International Law and Politics, 47:2, 327-355.
  • DiRESTA Renee (2018). “Computational Propaganda: If You Make It Trend, You Make It True”, Yale Law Journal, 127:7, 2460-2483.
  • FARWELL James P. and ROHOZINSKI Rafal (2011). “Stuxnet and the Future of Cyber War”, Survival: Global Politics and Strategy, 53:1, 23-40.
  • FOURNIER-TOMBS Eleonore BRUBAKER Rebecca and ALBRECHT Eduardo. (2023). “Artificial Intelligence-Powered Disinformation and Conflict”, United Nations University Centre for Policy Research, Policy Brief, 1-12.
  • GARTZKE Erik (2019). “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth”, International Security, 43:2, 41-73.
  • GARTZKE Erik and LINDSAY Jon R. (2015). “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace”, Security Studies, 24:2, 316-348.
  • GEORGE Shaji BASKAR Dr T and SRİKAANTH Balaji. (2024). “Cyber Threats to Critical Infrastructure: Assessing Vulnerabilities Across Key Sectors”, Partners Universal International Innovation Journal, 2:1, 54-63.
  • GUEMBE Blessing AZETA Ambrose and MISRA Sanjay. (2022). “The Emerging Threat of AI-driven Cyberattacks: A Review”, Applied Artificial Intelligence, 36:1, 1-23.
  • ILLIASHENKO Olga VYACHESLAV Kharchenko IEVGEN Babeshko FESENKO Herman and GIANDOMENICO Felicita Di. (2023). “Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyber-attacks and Protection”, Entropy, 25:8, 1123-1145.
  • JADA Irshaad and MAYAYISE Thembekile O. (2024). “The Impact of Artificial Intelligence on Organisational Cyber Security: An Outcome of a Systematic Literature Review”, Data and Information Management, 8:2, 100063.
  • JOHNSON James (2019). “Artificial Intelligence & Future Warfare: Implications for International Security”, Defense and Security Analysis, 35:2, 147-169.
  • JORDAN Charles A. (2022). Exploring the Cybersecurity Skills Gap: A Qualitative Study of Recruitment and Retention from a Human Resource Management Perspective, Northcentral University ProQuest Dissertation & Theses, 29320493.
  • KAUR Ramanpreet, GABRIJELČIČ Dušan and KLOBUČAR Tomaž (2023). “Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions”, Information Fusion, 97, 1-15.
  • KELLO Lucas (2017). The Virtual Weapon and International Order, Yale University Press, New Haven. KSHETRI Nir (2013). Cybercrime and Cybersecurity in the Global South, Palgrave Macmillan, London.
  • LeCUN Yann BENGIO Yoshua and HINTON Geoffrey (2015). “Deep Learning”, Nature, 521:7553, 436-444.
  • LINDSAY John R. (2013). “Stuxnet and the Limits of Cyber Warfare”, Security Studies, 22:3, 365-404.
  • LINDSAY John R. (2015). “The Impact of China on Cybersecurity: Fiction and Friction”, International Security, 39:3, 7-47.
  • MORGAN Susan (2018). “Fake News, Disinformation, Manipulation and Online Tactics to Undermine Democracy”, Journal of Cyber Policy, 3:1, 39-43.
  • NEUENDORF Kimberly A. (2020). “Content Analysis and Thematic Analysis”, Advanced Research Methods for Applied Psychology, 1:2, 211-223.
  • NOCETTI Julien (2015). “Contest and Conquest: Russia and Global Internet Governance”, International Affairs, 91:1, 111-130.
  • NYE Joseph (2017). “Deterrence and Dissuasion in Cyberspace”, International Security, 41:3, 44-71.
  • ROUHOLLAHI Zeinab (2021). “Towards artificial intelligence enabled financial crime detection”, arXiv preprint arXiv:2105.10866, 1-15.
  • SCHARRE Paul (2018). Army of None: Autonomous Weapons and the Future of War, WW Norton & Company, New York.
  • SEGAL Adam (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age, PublicAffairs, New York.
  • SINGER P. W. and FRIEDMAN Allan (2014). Cybersecurity: What Everyone Needs to Know, Oxford University Press, Oxford.
  • SMEETS Max (2018). “A Matter of Time: On the Transitory Nature of Cyberweapons”, Journal of Strategic Studies, 41:1-2, 6-32.
  • TADDEO Mariarosaria McCUTCHEON Tom and FLORIDI Luciano (2019). “Trusting Artificial Intelligence in Cybersecurity Is a Double-Edged Sword”, Nature Machine Intelligence, 1:12, 557-560.
  • TKACHEVA Olesya vd. (2013). “Internet Freedom and Political Space”, RAND Corporation, Santa Monica.
  • VALERIANO Brandon JENSEN Benjamin M. and MANESS Ryan C. (2020). Cyber Strategy: The Evolving Character of Power and Coercion, Oxford University Press, New York.
  • ZEADALLY Sherali vd. (2020). “Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity”, IEEE Access, 8, 23817-23837.
  • ZEGART Amy (2018). “Cheap Fights, Credible Threats: The Future of Armed Drones and Coercion”, Journal of Strategic Studies, 41:1-2, 6-48.
  • “About DARPA”, https://www.darpa.mil/about-us/about-darpa, accessed 11.07.2024.
  • BOUVERET Antoine (2018). Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment, IMF Working Paper No. 2018/143, International Monetary Fund, Washington. https://www.imf.org/ en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for- Quantitative-Assessment-45924 accessed 11.07.2024.
  • “Cyber Defence”, https://www.nato.int/cps/en/natohq/topics_78170.htm, accessed 20.06.2024.
  • “Convention on Cybercrime”, European Treaty Series - No. 185, Council of Europe, https://rm.coe. int/1680081561, accessed 20.06.2024. “
  • Cyber Capabilities and National Power Volume 2”, The International Institute For Strategic Studies, https://www.iiss.org/globalassets/media-library---content--migration/files/research-papers/2023/09/ cyber-capabilities-and-national-power-vol-2/cyber-capabilities-and-national-power_volume-2.pdf, accessed 20.06.2024.
  • HOGEVEEN Bart (2022). “The UN norms of responsible state behaviour in cyberspace”, International Cyber Policy Center, https://documents.unoda.org/wp-content/uploads/2022/03/The-UN-norms-ofresponsible- state-behaviour-in-cyberspace.pdf, accessed 20.06.2024.
  • HUANG Terence (2024). “The Dark Alliance: Addressing the Rise of AI Financial Frauds and Cyber Scams”, https://sites.lsa.umich.edu/mje/2024/02/14/the-dark-alliance-addressing-the-rise-of-ai-financialfrauds- and-cyber-scams/, accessed 31.08.2024.
  • KENNEDY Allan (2023). “Ranked: Artificial Intelligence Startups, by Country”, https://www.visualcapitalist. com/sp/global-ai-investment/, accessed 26.05.2024.
  • KERNER Sean Micheal (2022). “Colonial Pipline Hack Explained: Everything You Need to Know”, https://www.techtarget.com/whatis/feature/Colonial-Pipeline-hack-explained-Everything-you-needto- know, accessed 31.08.2024.
  • MILMO Dan (2024). “Iran-backed hackers interrupt UAE TV streaming services with deepfake news”, https://www.theguardian.com/technology/2024/feb/08/iran-backed-hackers-interrupt-uae-tvstreaming- services-with-deepfake-news, accessed 26.05.2024.
  • MORGAN Steve (2020). “Cyberwarfare in C-Suite”, https://cybersecurityventures.com/hackerpocalypsecybercrime- report-2016/, accessed 31.08.2024.
  • “Net Losses: Estimating the Global Cost of Cybercrime”, Center for Strategic and International Studies, https://csiswebsiteprod.s3.amazonaws.com/s3fspublic/publication/140609_rp_economic_impact_ cybercrime_report.pdf, accessed 20.06.2024.
  • OTTO Emily (2024). “Be-aware of AI-Enhanced Cyber-attacks”, https://cepa.org/article/beware-of-aienhanced- cyber-attacks/, accessed 17.07.2024.
  • “Securing Our Common Future”, Office for Disarmament Affairs New York, 2018, www.un.org/disarmament/ sg-agenda, accessed 20.06.2024.
  • “Shanghai Cooperation Organisation”, https://ccdcoe.org/organisations/sco/, accessed 20.06.2024.
  • “Statista - Possible usage of ChatGPT for Cyber Crime Purposes”, https://www-statista-com.eu1.proxy. openathens.net/statistics/1378211/chatgpt-usage-cyber-crime-global/, accessed 17.07.2024.
  • “Treaty on the Non-Proliferation of Nuclear Weapons (NPT)”, https://disarmament.unoda.org/wmd/nuclear/ npt/, accessed 20.06.2024.
  • TZIAKOURIS Giannis (2023). “The rise of AI-powered criminals: Identifying threats and opportunities”, https://blog.talosintelligence.com/the-rise-of-ai-powered-criminals/, accessed 26.05.2024.
  • United Nations Meeting Coverages, Seventy-Eighth Session, 20th & 21st Meeting, https://press.un.org/ en/2023/gadis3725.doc.htm, accessed 20.06.2024.
  • WEBSTER Graham CREEMERS Rogier KANİA Elsa and TRİOLO Paul (2017). “China’s ‘New Generation Artificial Intelligence Development Plan’“, https://digichina.stanford.edu/work/full-translationchinas- new-generation-artificial-intelligence-development-plan-2017/, accessed 29.07.2024.
  • ZAKI Adam (2024). “85% of Cybersecurity Leaders Say Recent Attacks Powered by AI: Weekly Stat”, https://www.cfo.com/news/cybersecurity-attacks-generative-ai-security-ransom/692176/, accessed 17.07.2024.

The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-attacks on International Relations

Year 2024, Issue: War and International System, 109 - 130, 30.12.2024

Abstract

Artificial intelligence (AI) has revolutionized many sectors with its development, but it is also likely to pose new threats when used maliciously. This study examines the implications of state and nonstate actors using AI to conduct more sophisticated cyber-attacks and their potential consequences for international relations and global security. Cyber-attack detection has become more automated, targeted, and challenging due to rapid advances in AI. Thanks to AI, adversaries can now impersonate humans, manipulate data, eavesdrop on conversations, and exploit system weaknesses on an unprecedented scale. Unchecked, AI-enabled cyber-attacks can undermine diplomatic relations, increase the likelihood of military conflict between governments, and destabilize the economy. The international community will need new legal frameworks and technological measures to mitigate these risks. International cooperation is necessary to limit the development of AI cyber weapons, develop robust systems, and establish guidelines for responsible state activity in cyberspace. Through cooperation and foresight, the potential of AI is more likely to be achieved while reducing the likelihood of intensified cyber warfare. This paper provides a broad literature perspective and offers recommendations for both legal and technological solutions to reduce the likelihood of the effects of AI-based cyber-attacks.

References

  • AJDER Henry PATRINI Giorgio CAVALLI Francesco and CULLEN Laurence (2019). “The State of Deepfakes: Landscape, Threats, and Impact”, Deeptrace, 1-28. BIBI Iram and
  • AKHUNZADA Adnan (2022). “Deep AI-powered Cyber Threat Analysis in IIoT”, IEEE Internet of Things Journal, 9:10, 7748-7763.
  • BIMANTARA Azza (2022). “The Normative Enactment of International Cybersecurity Capacity Building Assistance: A Comparative Analysis on Japanese and South Korean Practices”, Global: Jurnal Politik Internasional, 24:1, 109-138.
  • BUCHANAN Ben (2020). The Cybersecurity Dilemma, Oxford University Press, Oxford.
  • CAVELTY Myriam Dunn and WENGER Andreas (2022). Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, 1st Edition, Routledge, New York.
  • CAVES John P. Jr. and CARUS W. Seth (2021). The Future of Weapons of Mass Destruction: Their Nature and Role in 2030, Occasional Paper 10, National Defense University Press, Washington.
  • CRESWELL John W. and CRESWELL David (2022). Research Design: Qualitative, Quantitative and Mixed Methods Approaches, SAGE Publications, California.
  • DAVIS Paul K. (2014). “Deterrence, Influence, Cyber-attack, and Cyberwar”, New York University Journal of International Law and Politics, 47:2, 327-355.
  • DiRESTA Renee (2018). “Computational Propaganda: If You Make It Trend, You Make It True”, Yale Law Journal, 127:7, 2460-2483.
  • FARWELL James P. and ROHOZINSKI Rafal (2011). “Stuxnet and the Future of Cyber War”, Survival: Global Politics and Strategy, 53:1, 23-40.
  • FOURNIER-TOMBS Eleonore BRUBAKER Rebecca and ALBRECHT Eduardo. (2023). “Artificial Intelligence-Powered Disinformation and Conflict”, United Nations University Centre for Policy Research, Policy Brief, 1-12.
  • GARTZKE Erik (2019). “The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth”, International Security, 43:2, 41-73.
  • GARTZKE Erik and LINDSAY Jon R. (2015). “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace”, Security Studies, 24:2, 316-348.
  • GEORGE Shaji BASKAR Dr T and SRİKAANTH Balaji. (2024). “Cyber Threats to Critical Infrastructure: Assessing Vulnerabilities Across Key Sectors”, Partners Universal International Innovation Journal, 2:1, 54-63.
  • GUEMBE Blessing AZETA Ambrose and MISRA Sanjay. (2022). “The Emerging Threat of AI-driven Cyberattacks: A Review”, Applied Artificial Intelligence, 36:1, 1-23.
  • ILLIASHENKO Olga VYACHESLAV Kharchenko IEVGEN Babeshko FESENKO Herman and GIANDOMENICO Felicita Di. (2023). “Security-Informed Safety Analysis of Autonomous Transport Systems Considering AI-Powered Cyber-attacks and Protection”, Entropy, 25:8, 1123-1145.
  • JADA Irshaad and MAYAYISE Thembekile O. (2024). “The Impact of Artificial Intelligence on Organisational Cyber Security: An Outcome of a Systematic Literature Review”, Data and Information Management, 8:2, 100063.
  • JOHNSON James (2019). “Artificial Intelligence & Future Warfare: Implications for International Security”, Defense and Security Analysis, 35:2, 147-169.
  • JORDAN Charles A. (2022). Exploring the Cybersecurity Skills Gap: A Qualitative Study of Recruitment and Retention from a Human Resource Management Perspective, Northcentral University ProQuest Dissertation & Theses, 29320493.
  • KAUR Ramanpreet, GABRIJELČIČ Dušan and KLOBUČAR Tomaž (2023). “Artificial Intelligence for Cybersecurity: Literature Review and Future Research Directions”, Information Fusion, 97, 1-15.
  • KELLO Lucas (2017). The Virtual Weapon and International Order, Yale University Press, New Haven. KSHETRI Nir (2013). Cybercrime and Cybersecurity in the Global South, Palgrave Macmillan, London.
  • LeCUN Yann BENGIO Yoshua and HINTON Geoffrey (2015). “Deep Learning”, Nature, 521:7553, 436-444.
  • LINDSAY John R. (2013). “Stuxnet and the Limits of Cyber Warfare”, Security Studies, 22:3, 365-404.
  • LINDSAY John R. (2015). “The Impact of China on Cybersecurity: Fiction and Friction”, International Security, 39:3, 7-47.
  • MORGAN Susan (2018). “Fake News, Disinformation, Manipulation and Online Tactics to Undermine Democracy”, Journal of Cyber Policy, 3:1, 39-43.
  • NEUENDORF Kimberly A. (2020). “Content Analysis and Thematic Analysis”, Advanced Research Methods for Applied Psychology, 1:2, 211-223.
  • NOCETTI Julien (2015). “Contest and Conquest: Russia and Global Internet Governance”, International Affairs, 91:1, 111-130.
  • NYE Joseph (2017). “Deterrence and Dissuasion in Cyberspace”, International Security, 41:3, 44-71.
  • ROUHOLLAHI Zeinab (2021). “Towards artificial intelligence enabled financial crime detection”, arXiv preprint arXiv:2105.10866, 1-15.
  • SCHARRE Paul (2018). Army of None: Autonomous Weapons and the Future of War, WW Norton & Company, New York.
  • SEGAL Adam (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age, PublicAffairs, New York.
  • SINGER P. W. and FRIEDMAN Allan (2014). Cybersecurity: What Everyone Needs to Know, Oxford University Press, Oxford.
  • SMEETS Max (2018). “A Matter of Time: On the Transitory Nature of Cyberweapons”, Journal of Strategic Studies, 41:1-2, 6-32.
  • TADDEO Mariarosaria McCUTCHEON Tom and FLORIDI Luciano (2019). “Trusting Artificial Intelligence in Cybersecurity Is a Double-Edged Sword”, Nature Machine Intelligence, 1:12, 557-560.
  • TKACHEVA Olesya vd. (2013). “Internet Freedom and Political Space”, RAND Corporation, Santa Monica.
  • VALERIANO Brandon JENSEN Benjamin M. and MANESS Ryan C. (2020). Cyber Strategy: The Evolving Character of Power and Coercion, Oxford University Press, New York.
  • ZEADALLY Sherali vd. (2020). “Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity”, IEEE Access, 8, 23817-23837.
  • ZEGART Amy (2018). “Cheap Fights, Credible Threats: The Future of Armed Drones and Coercion”, Journal of Strategic Studies, 41:1-2, 6-48.
  • “About DARPA”, https://www.darpa.mil/about-us/about-darpa, accessed 11.07.2024.
  • BOUVERET Antoine (2018). Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment, IMF Working Paper No. 2018/143, International Monetary Fund, Washington. https://www.imf.org/ en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for- Quantitative-Assessment-45924 accessed 11.07.2024.
  • “Cyber Defence”, https://www.nato.int/cps/en/natohq/topics_78170.htm, accessed 20.06.2024.
  • “Convention on Cybercrime”, European Treaty Series - No. 185, Council of Europe, https://rm.coe. int/1680081561, accessed 20.06.2024. “
  • Cyber Capabilities and National Power Volume 2”, The International Institute For Strategic Studies, https://www.iiss.org/globalassets/media-library---content--migration/files/research-papers/2023/09/ cyber-capabilities-and-national-power-vol-2/cyber-capabilities-and-national-power_volume-2.pdf, accessed 20.06.2024.
  • HOGEVEEN Bart (2022). “The UN norms of responsible state behaviour in cyberspace”, International Cyber Policy Center, https://documents.unoda.org/wp-content/uploads/2022/03/The-UN-norms-ofresponsible- state-behaviour-in-cyberspace.pdf, accessed 20.06.2024.
  • HUANG Terence (2024). “The Dark Alliance: Addressing the Rise of AI Financial Frauds and Cyber Scams”, https://sites.lsa.umich.edu/mje/2024/02/14/the-dark-alliance-addressing-the-rise-of-ai-financialfrauds- and-cyber-scams/, accessed 31.08.2024.
  • KENNEDY Allan (2023). “Ranked: Artificial Intelligence Startups, by Country”, https://www.visualcapitalist. com/sp/global-ai-investment/, accessed 26.05.2024.
  • KERNER Sean Micheal (2022). “Colonial Pipline Hack Explained: Everything You Need to Know”, https://www.techtarget.com/whatis/feature/Colonial-Pipeline-hack-explained-Everything-you-needto- know, accessed 31.08.2024.
  • MILMO Dan (2024). “Iran-backed hackers interrupt UAE TV streaming services with deepfake news”, https://www.theguardian.com/technology/2024/feb/08/iran-backed-hackers-interrupt-uae-tvstreaming- services-with-deepfake-news, accessed 26.05.2024.
  • MORGAN Steve (2020). “Cyberwarfare in C-Suite”, https://cybersecurityventures.com/hackerpocalypsecybercrime- report-2016/, accessed 31.08.2024.
  • “Net Losses: Estimating the Global Cost of Cybercrime”, Center for Strategic and International Studies, https://csiswebsiteprod.s3.amazonaws.com/s3fspublic/publication/140609_rp_economic_impact_ cybercrime_report.pdf, accessed 20.06.2024.
  • OTTO Emily (2024). “Be-aware of AI-Enhanced Cyber-attacks”, https://cepa.org/article/beware-of-aienhanced- cyber-attacks/, accessed 17.07.2024.
  • “Securing Our Common Future”, Office for Disarmament Affairs New York, 2018, www.un.org/disarmament/ sg-agenda, accessed 20.06.2024.
  • “Shanghai Cooperation Organisation”, https://ccdcoe.org/organisations/sco/, accessed 20.06.2024.
  • “Statista - Possible usage of ChatGPT for Cyber Crime Purposes”, https://www-statista-com.eu1.proxy. openathens.net/statistics/1378211/chatgpt-usage-cyber-crime-global/, accessed 17.07.2024.
  • “Treaty on the Non-Proliferation of Nuclear Weapons (NPT)”, https://disarmament.unoda.org/wmd/nuclear/ npt/, accessed 20.06.2024.
  • TZIAKOURIS Giannis (2023). “The rise of AI-powered criminals: Identifying threats and opportunities”, https://blog.talosintelligence.com/the-rise-of-ai-powered-criminals/, accessed 26.05.2024.
  • United Nations Meeting Coverages, Seventy-Eighth Session, 20th & 21st Meeting, https://press.un.org/ en/2023/gadis3725.doc.htm, accessed 20.06.2024.
  • WEBSTER Graham CREEMERS Rogier KANİA Elsa and TRİOLO Paul (2017). “China’s ‘New Generation Artificial Intelligence Development Plan’“, https://digichina.stanford.edu/work/full-translationchinas- new-generation-artificial-intelligence-development-plan-2017/, accessed 29.07.2024.
  • ZAKI Adam (2024). “85% of Cybersecurity Leaders Say Recent Attacks Powered by AI: Weekly Stat”, https://www.cfo.com/news/cybersecurity-attacks-generative-ai-security-ransom/692176/, accessed 17.07.2024.
There are 59 citations in total.

Details

Primary Language English
Subjects International Security
Journal Section Articles
Authors

Esra Merve Çalışkan 0000-0001-5226-3177

Publication Date December 30, 2024
Submission Date May 28, 2024
Acceptance Date July 31, 2024
Published in Issue Year 2024 Issue: War and International System

Cite

Chicago Çalışkan, Esra Merve. “The Threat of Tomorrow: Impacts of Artificial Intelligence-Enhanced Cyber-Attacks on International Relations”. Güvenlik Stratejileri Dergisi, no. War and International System (December 2024): 109-30. https://doi.org/10.17752/guvenlikstrtj.1491683.