The Potential Growth of Terrorism in the Age of Artificial Intelligence and The Quranic Response to Counteraction Scenarios

Habib Maulana Maslahul Adi(1*), Afifah Ikram Mufidah(2),

(1) Pendidikan Kader Ulama Masjid Istiqlal
(2) Sunan Kudus State Islamic University
(*) Corresponding Author

Abstract


The sophistication of Artificial Intelligence (AI) has the potential to increase the complexity of terrorism, although AI can also facilitate counter-terrorism efforts. On the other hand, the Quran, as a source of inspiration and guidance for Muslims, encourages Muslim intellectuals to actualize its teachings in response to emerging issues. This article aims to discuss the potential development of terrorism that utilizes AI and to explore the Quranic response to counter-terrorism scenarios in the AI era. The method used is qualitative, categorized as library research based on its data sources. Documentation serves as the main data collection technique. The analysis is conducted inductively, with comparative analysis prior to drawing the conclusion. The findings of this study indicate that the potential development of terrorism through AI includes enhanced cyber-attack capabilities, autonomous weapons, false propaganda dissemination, data exploitation, disruption of vital infrastructure, and recruitment and deepening of radicalization. Furthermore, scenarios for using AI in counter-terrorism and the Quranic response to them include predictive analysis of terrorist activities and identification of radicalization warning signs as preventive measures aligned with the Quranic teaching of sadd aż-żarī’ah, detection of misinformation and disinformation in line with the values in Surah Al-Hujurat [49: 6], moderation and automatic content removal aligned with the values in Surah An-Nisa [4: 148], and counter-narratives to terrorism and extremism aligned with the values in Surah An-Nahl [16: 125]. Therefore, it is also important for Islamic scholars, as successors holding religious authority in Islam, to actively participate in disseminating the values of the Qur’an that reject all forms of terrorism, so they can contribute to combating the growth of terrorism in the AI era.


Keywords


Al-Qur’an; Artificial Intelligence; Terrorism

Full Text:

PDF

References


‘Abdissalam, ‘Izzuddin bin. (2003). Syajārah al-Ma’ārif wa al-Aḥwāl wa Ṣāliḥ al-Aqwal wa al-A’māl. Dār al-Kutub al-‘Ilmiyyah.

Achmad, M. (2015). Fatḥ al-Qādir Karya Al-Imam Al-Syaukani. Universitas Islam Negeri Alauddin.

Ahdiat, A. (2023). Tren Serangan Phishing Terus Meningkat, Capai Rekor Tertinggi pada 2022. Databooks Katadata. https://databoks.katadata.co.id/datapublish/2023/05/17/tren-serangan-phishing-terus-meningkat-capai-rekor-tertinggi-pada-2022

al-Ḥasan Al-Biqā’ī, B. al-D. A. (1990). Naẓm al-Durar fī Tanāsub al-Āyāt wa al-Suwar. Dār al-Kutub al-Islāmī.

Al-Sa’di, ‘Abd al-Rahman. (2006). Tafsīr al-Sa’dī. Dār al-Ḥaqq.

Bazarkina, D. (2023). Current and Future Threats of the Malicious Use of Artificial Intelligence by Terrorists: Psychological Aspects. In E. Pashentsev (Ed.), The Palgrave Handbook of Malicious Use of AI and Psychological Security (1st ed., pp. 251–272). Springer International Publishing. https://doi.org/10.1007/978-3-031-22552-9_10

Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and Describing The Population of ISIS Supporters on Twitter (20). The Brookings Institution.

Brooke, N. (2022). What Are the Root Causes of Terrorism? In D. M. Tim Wilson (Ed.), Contemporary Terrorism Studies (1st ed., pp. 157–176). Oxford University Press.

Chakraborty, A., Biswas, A., & Khan, A. K. (2023). Artificial Intelligence for Cybersecurity: Threats, Attacks and Mitigation. In Springer International Publishing (Ed.), Artificial Intelligence for Societal Issues (pp. 3–25). Springer International Publishing. https://doi.org/10.1007/978-3-031-12419-8_1

Conway, M., Khawaja, M., Lakhani, S., Reffin, J., Robertson, A., & Weir, D. (2019). Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts. Studies in Conflict & Terrorism, 42(1–2), 141–160. https://doi.org/https://doi.org/10.1080/1057610X.2018.1513984

de Lima Salge, C. A., & Berente, N. (2017). Is That Social Bot Behaving Unethically? Communications of the ACM, 60(9), 29–31. https://doi.org/10.1145/3126492

Denzin, N. K., & Lincoln, Y. S. (2018). Introduction: The Discipline and Practice of Qualitative Research. In N. K. Denzin & Y. S. Lincoln (Eds.), The Sage Handbook of Qualitative Research (5th ed., pp. 29–71). Sage Publications.

Dick, K., Russell, L., Dosso, Y. S., Kwamena, F., & Green, J. R. (2019). Deep Learning for Critical Infrastructure Resilience. Journal of Infrastructure Systems, 25(2), 1–11. https://doi.org/10.1061/(ASCE)IS.1943-555X.0000477

Fawaid, A. (2019). Kontra Narasi Ekstremisme terhadap Ayat-ayat Qital dalam Tafsir Al-Jalalain Karya Jalal al-Din al-Mahalli dan Jalal al-Din al-Suyuti (Kajian atas Pemahaman Kiai di Daerah Tapal Kuda Jawa Timur). Universitas Islam Negeri Sunan Ampel Surabaya.

Febriansyah, R. (2021). Implementasi Teori Psikologi Kognitif Ibnu Qayyim dalam Meluruskan Pernyataan Radikalisme di Indonesia. Jurnal Intelektualita: Keislaman, Sosial, Dan Sains, 10(1), 1–5. https://doi.org/10.19109/intelektualita.v10i1.6376

GCHQ. (2021). Pioneering a New National Security: The Ethics of Artificial Intelligence. Government Communications Headquarters (GCHQ).

Gill, A. S. (2019). Artificial Intelligence and International Security: The Long View. Ethics & International Affairs, 33(2), 169–179. https://doi.org/10.1017/S0892679419000145

Gürkaş-Aydin, Z., & Gürtürk, U. (2022). Cyber Threats and Critical Infrastructures in the Era of Cyber Terrorism. In Springer International Publishing (Ed.), ICAIAME 2022: 4th International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 274–287). Springer International Publishing. https://doi.org/10.1007/978-3-031-31956-3_23

Handayani, N., Ramadhani, R. Z., & Arrosyid, A. A. (2021). Information System Search for Verses of the Qur’an Based on the Background of the Surah. Jurnal Teknik, 10(2), 105–118. https://doi.org/10.31000/jt.v10i2.5474

Hashim, Hanim, F., Abdullah, & Wan, W. N. (2017). Swarm Intelligence: From the Perspective of Al-Quran and Al-Sunnah to Natural and Artificial Systems. Advanced Science Letters, 23(5), 4580–4585. https://doi.org/10.1166/asl.2017.8996

Hayward, K. J., & Maas, M. M. (2021). Artificial Intelligence and Crime: A Primer for Criminologists. Crime, Media, Culture: An International Journal, 17(2), 209–233. https://doi.org/10.1177/1741659020917434

Horizon, E. U. (2020). Real-time Early Detection and Alert System for Online Terrorist Content based on Natural Language Processing, Social Network Analysis, Artificial Intelligence and Complex Event Processing. European Commission. https://doi.org/10.3030/740688

Ige, T., Kolade, A., & Kolade, O. (2023). Enhancing Border Security and Countering Terrorism Through Computer Vision: A Field of Artificial Intelligence. In Springer (Ed.), Proceedings of the Computational Methods in Systems and Software (pp. 656–666). Springer International Publishing. https://doi.org/https://doi.org/10.1007/978-3-031-21438-7_54

INSIKT-AI. (2018). What are Social Media Companies Really doing to Combat Terrorism Online? INSIKT AI. https://new.insiktintelligence.com/social-media-combatting-terrorism-online/

INSIKT AI. (2020). RED-Alert Final Conference. International Institute for Counter-Terrorism (ICT). https://insiktintelligence.com/red-alert-final-conference/

Jarrahi, M. H. (2018). Artificial Intelligence and the Future of Work: Human-AI Symbiosis in Organizational Decision Making. Business Horizons, 61(4), 1–10. https://doi.org/10.1016/j.bushor.2018.03.007

Johnson, J. (2019). Artificial Intelligence & Future Warfare: Implications for International Security. Defense & Security Analysis, 35(2), 1–23. https://doi.org/10.1080/14751798.2019.1600800

Khairunnisa, B. W., & Rohman, A. (2018). Strategi Kepolisian Surabaya dalam Pencegahan Terorisme Pasca Ledakan Bom di Surabaya Tahun 2018. Syiar Journal, 2(2), 162–177. https://doi.org/10.15642/siyar.2022.2.2.162-177

Ma’rūf, B. ‘Awwād, & Al-Ḥurastānī, ‘Iṣām Fāris. (1994). Tafsīr aṭ-Ṭabarī min Kitābih Jāmi’ al-Bayān ‘an Ta’wīl al-Qur’ān. Muassasaḥ al-Risālah.

Macklin, G. (2019). The Christchurch Attacks: Livestream Terror in the Viral Video Age. CTC Sentinel, 12(6), 18–29.

Masakowski, Y. R. (2020). Artificial Intelligence and the Future Global Security Environment. In Y. R. Masakowski (Ed.), Artificial Intelligence and Global Security (1st ed., pp. 1–34). Emerald Publishing Limited. https://doi.org/10.1108/978-1-78973-811-720201001

McKendrick, K. (2019). Artificial Intelligence Prediction and Counterterrorism (The Royal Institute of International Affairs (ed.)). The Royal Institute of International Affairs.

Merriam, S. B., & Tisdell, E. J. (2016). Qualitative Research: A Guide to Design and Implementation (4th ed.). Jossey-Bass.

Minchah, N. (2020). Perkembangan Teknologi Artificial Intelligence Cina: Ancaman dan Implikasinya terhadap Keamanan Nasional Amerika Serikat. Jurnal Studi Diplomasi Dan Keamanan, 12(2), 56–75. https://doi.org/10.31315/jsdk.v12i2.3524

Mohadi, M., & Tarshany, Y. (2023). Maqasid Al-Shari’ah and the Ethics of Artificial Intelligence: Contemporary Challenges. Journal of Contempory Maqasid Studies, 2(2), 79–102. https://doi.org/10.52100/jcms.v2i2.107

Nasiri, S., & Hashemzadeh, A. (2025). The Evolution of Disinformation from Fake News Propaganda to AI-driven Narratives as Deepfake. Journal of Cyberspace Studies, 9(1), 229–250. https://doi.org/10.22059/jcss.2025.387249.1119

Phadke, S., & Mitra, T. (2021). Educators, Solicitors, Flamers, Motivators, Sympathizers: Characterizing Roles in Online Extremist Movements. In J. Nichols (Ed.), Proceedings of the ACM on Human-Computer Interaction (Vol. 5, Issue CSCW2, pp. 1–35). Association for Computing Machinery. https://doi.org/10.1145/3476051

Prasasti, G. D. (2023). Waspada, Marak Penipuan Siber Bawa-Bawa Nama ChatGPT OpenAI. Liputan 6. https://www.liputan6.com/tekno/read/5276827/waspada-marak-penipuan-siber-bawa-bawa-nama-chatgpt-openai

Punch, K. F. (1998). Introduction to Social Research: Quantitative& Qualitative Approaches (Sage Publications (ed.); 1st ed.). Sage Publications.

Rahman, S. N. M. A., & Ibrahim, A. (2019). Safety Plan and Control of Artificial Intelligence: Integrating Maqȧșid Al-Shari’ah, Hisbah and Tasawur as Mechanism. Journal of Islamic, Social, Economics and Development (JISED), 4(23), 1–8.

Ridwan, I., Hermawan, I., Sari, B. N., Komarudin, O., & Pardinand, A. (2023). Strategi Literasi Digital Berbasis Al-Qur’an dalam Program NgabuburIT Relawan TIK Karawang untuk Peningkatan Literasi Digital Masyarakat Karawang. Jurnal Ilmiah Karawang, 1(1), 46–54.

Rogers, R. (2020). Deplatforming: Following Extreme Internet Celebrities to Telegram and Alternative Social Media. European Journal of Communication, 35(3), 213–229. https://doi.org/10.1177/0267323120922066

Saihu, M. (2022). Al-Qur’an and The Need for Islamic Education to Artificial Intelligence. Mumtaz: Jurnal Studi Al-Qur’an Dan Keislaman, 6(1). https://doi.org/10.36671/mumtaz.v6i01.274

Saul, B. (2005). Speaking of Terror: Criminalising Incitement to Violence. University of New Wales Law Journal, 28(3), 868–886. https://doi.org/10.3316/ielapa.114741244221161

Savolainen, L. (2022). The Shadow Banning Controversy: Perceived Governance and Algorithmic Folklore. Media, Culture and Society, 44(6), 1091–1109. https://doi.org/10.1177/01634437221077174

Scharre, P. (2018). Army of None: Autonomous Weapons and the Future of War (1st ed.). W. W. Norton & Company.

Shortland, N., & McGarry, P. (2023). The Jigsaw Initiative: Theoretical and Practical Considerations for Preventing Harm from Extreme and Extremist Content Online. In D. Hummer & J. Byrne (Eds.), Handbook on Crime and Technology (1st ed., pp. 375–394). Edward Elgar Publishing.

Silverman, T., Stewart, C. J., Amanullah, Z., & Birdwell, J. (2016). The Impact of Counter-Narratives: Insights from a Year-Long Cross-Platform Pilot Study of Counter-Narrative Curation, Targeting, Evaluation and Impact.

Stelter, B. (2018). This Start-Up Wants to Evaluate Your News Sources. CNN Business. https://money.cnn.com/2018/03/04/media/newsguard-steven-brill-gordon-crovitz/index.html

Syarifudin, F. (2019). Urgensi Tabayyun dan Kualitas Informasi dalam Membangun Komunikasi. Al-Kuttab: Jurnal Kajian Perpustakaan, Informasi, Dan Kearsipan, 1(2), 29–39. https://doi.org/10.24952/ktb.v1i2.1994

Tang, A. (2023). Active Learning Perspektif Wahyu Pertama dalam Al-Qur’an. PAIDA: Jurnal Pendidikan Agama Islam UNIMUDA Sorong, 2(1), 148–155. https://doi.org/https://doi.org/10.36232/jurnalpaida.v2i1.1464

UNCCT, & UNICRI. (2021). Countering Terrorism Online with Artificial Intelligence: An Overview for Law Enforcement and Counter Terrorism Agencies in South Asia and South-East Asia.

UNICRI. (2020). Stop the Virus of Disinformation: The Risk of Malicious Use of Social Media during COVID-19 and the Technology Options to Fight it.

Weimann, G. (2015). Terrorism in Cyberspace: The Next Generation. Columbia University Press.

Wire, P. (2023). 2023, Serangan Ransomware Melonjak Dua Kali Lipat di Indonesia. Antara News.

Zuhdi, N. (2023). 361 Juta Serangan Siber Masuk ke Indonesia Per Oktober 2023. Media Indonesia. https://mediaindonesia.com/teknologi/630255/361-juta-serangan-siber-masuk-ke-indonesia-per-oktober-2023




DOI: https://doi.org/10.33172/jp.v11i1.19758


INDEXED BY:
Journal Terindex di Garuda

Office Address:
Lembaga Penelitian dan Pengabdian Kepada Masyarakat
Republic of Indonesia Defense University
Jl. Salemba Raya No.14, Paseban,Jakarta Pusat, Daerah Khusus Ibukota Jakarta 10440, Indonesia
Email: jurnal.unhan@idu.ac.id



Lisensi Creative Commons
Jurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism dan Integrity is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.