The Synthetic Media Threat: Generative AI and Deepfake Technology enabled Synthetic Media as Emerging Vectors of Cyberterrorism

Year : 2026 | Volume : 13 | 01 | Page :
    By

    Aditya Anand,

  1. Student, KIIT School of Law, KIIT University, Bhubaneswar, Odisha, India

Abstract

Cyberterrorism for most part of its academic and general understanding has been known and studied through conventional way such as a) malware deployment b)denial of essential services c) attacks on critical infrastructure, however with rapid changes in information technology as well as recent swift proliferation of generative artificial intelligence and deep fake technologies a completely new and unexamined dimension of threat vector has emerged, further expanding the threat areas are convergence of these two technology which can enable a operator of a cyber- terror campaign even with a very little technical knowledge a chance to deliver a serious threat by using generated synthetic media which can take any form across modality such as a)written text b)Images c)Audios and videos it allows it to happen with high fidelity, while being highly cost effective hence becoming a very potent and dangerous category of cyberterrorism vector it also dramatically lowers the technical barrier to entry for malicious actors. The writer by writing this research paper drawing on recent incidents and emerging literature, proposes a five-vector taxonomy of AI-enabled cyberterrorism activities, and wants to highlight corresponding countermeasures that should be taken at Technical, Legal and International level. This Paper suggests that the field of cyberterrorism research must urgently expand and take into account of these newly emerging vectors enabled by generative AI technologies which are becoming ever increasingly becoming popular, to reconceptualise its threat models and countermeasures to account for the synthetic threat landscape.

Keywords: Cyberterrorism, deepfakes, generative AI, large language models, disinformation, synthetic media, critical infrastructure, national security

How to cite this article:
Aditya Anand. The Synthetic Media Threat: Generative AI and Deepfake Technology enabled Synthetic Media as Emerging Vectors of Cyberterrorism. Journal of Artificial Intelligence Research & Advances. 2026; 13(01):-.
How to cite this URL:
Aditya Anand. The Synthetic Media Threat: Generative AI and Deepfake Technology enabled Synthetic Media as Emerging Vectors of Cyberterrorism. Journal of Artificial Intelligence Research & Advances. 2026; 13(01):-. Available from: https://journals.stmjournals.com/joaira/article=2026/view=244770


References

1. Busch, E., & Ware, J. (2023). The Weaponization of Deepfakes: Digital deception on the Far-
Right. https://doi.org/10.19165/2023.2.07
2. Collins, S., & McCombie, S. (2012). Stuxnet: the emergence of a new cyber weapon and its
implications. Journal of Policing Intelligence and Counter Terrorism, 7(1), 80–91.
https://doi.org/10.1080/18335330.2012.653198
3. Cornell Law Journal. (2025). The legal gray zone of deepfake political speech. Cornell Journal of
Law and Public Policy. https://publications.lawschool.cornell.edu/jlpp/2025/10/24/the-legal-gray-
zone-of-deepfake political-speech/
4. DeepStrike. (2025). Deepfake statistics (2025) The data behind the AI fraud wave.
https://deepstrike.io/blog/deepfake-statistics-2025
5. Ferrag, M. A., Ndhlovu, M., Tihanyi, N., Cordeiro, L. C., Debbah, M., Lestable, T., &
Bhattacharya, S. (2025). Generative AI in cybersecurity: A comprehensive review of LLM
applications and vulnerabilities. Future Generation Computer Systems, 173, 107877.
6. Fortinet. (2025). Deepfake AI and cybersecurity: Safeguarding digital trust
7. Harvard Ash Center. (2025). The apocalypse that wasn't: AI was everywhere in 2024's elections.
Harvard Kennedy School Ash Center for Democratic Governance and Innovation.
https://ash.harvard.edu/articles/the-apocalypse-that-wasnt
8. IBM. (2025). A new wave of deepfake-driven cyber crime targets businesses. IBM Think
Insights. https://www.ibm.com/think/insights/new-wave-deepfake-cybercrime

9. Iftikhar, S. (2024). Cyberterrorism as a global threat: A review on repercussions and
countermeasures. PeerJ Computer Science, 10, e1772. https://doi.org/10.7717/peerj-cs.1772
10. Masood, M., Nawaz, M., Malik, K. M., Javed, A., Irtaza, A., & Malik, H. (2023). Deepfakes
generation and detection: State-of-the-art, open challenges, countermeasures, and future
directions. Applied Intelligence, 53(4), 3974–4026.
11. Miotti A & Wasil (2024). Combatting deepfakes: Policies to address national security threats.
arXiv preprint arXiv:2402.09581.
12. Mohurle, S., & Patil, M. (2017). A brief study of WannaCry threat: Ransomware attack 2017.
International Journal of Advanced Research in Computer Science, 8(5), 1938–1940.
13. Momeni, M. (2025). Artificial intelligence and political deepfakes: Shaping citizen perceptions
through misinformation. Global Media and Communication.
https://doi.org/10.1177/09732586241277335
14. Montasari, R. (2024). Responding to deepfake challenges in the United Kingdom. In Cyberspace,
cyberterrorism and the international security in the fourth industrial revolution (pp. 121– 148).
Springer.
15. NSA, FBI, & CISA. (2023). Contextualizing deepfake threats to organizations (Cybersecurity
Information Sheet). U.S. Department of Defense.
https://media.defense.gov/2023/Sep/12/2003298925/-1/-1/0/CSI-DEEPFAKE THREATS.PDF
16. Recorded Future. (2024). 2024 deepfakes and election disinformation: Targets, objectives, and
emerging tactics. Recorded Future Intelligence https://www.recordedfuture.com/research/targets-
objectives-emerging-tactics-political- deepfakes
17. Security Distillery. (2024). Deepfakes: The new frontier in political disinformation. The Security
Distillery.https://thesecuritydistillery.org/all-articles/deepfakes-the-new-frontier-in-political-
disinformation
18. U.S. Government Accountability Office. (2024). Science & tech spotlight: Combating deepfakes
(GAO-24-107292). U.S.https://www.gao.gov/products/gao-24-107292
19. Weimann, G. (2004). Cyberterrorism: How real is the threat? United States Institute of Peace
Special Report 119.
20. Wolff, E. D., Growley, K. M., & Gruden, M. G. (2021). Navigating the SolarWinds supply chain
attack. The Procurement Lawyer, 56(2), 1–9.
21. World Economic Forum. (2024). Global risks report 2024. World Economic Forum.
https://www.weforum.org/publications/global-risks-report-2024


Ahead of Print Subscription Original Research
Volume 13
01
Received 30/03/2026
Accepted 20/04/2026
Published 22/05/2026
Publication Time 53 Days


Login


My IP

PlumX Metrics