The Synthetic Media Threat: Generative AI and Deepfake Technology enabled Synthetic Media as Emerging Vectors of Cyberterrorism

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2026 | Volume : 13 | 02 | Page :
    By

    Aditya Anand,

  1. Student, KIIT School of Law, KIIT University, Bhubaneswar, Odisha, India

Abstract

Keywords: Cyberterrorism, deepfakes, generative AI, large language models, disinformation, synthetic media, critical infrastructure, national security

How to cite this article:
Aditya Anand. The Synthetic Media Threat: Generative AI and Deepfake Technology enabled Synthetic Media as Emerging Vectors of Cyberterrorism. Journal of Artificial Intelligence Research & Advances. 2026; 13(02):-.
How to cite this URL:
Aditya Anand. The Synthetic Media Threat: Generative AI and Deepfake Technology enabled Synthetic Media as Emerging Vectors of Cyberterrorism. Journal of Artificial Intelligence Research & Advances. 2026; 13(02):-. Available from: https://journals.stmjournals.com/joaira/article=2026/view=244773


References

  1. Busch, E., & Ware, J. (2023). The Weaponization of Deepfakes: Digital deception on the Far- Right. https://doi.org/10.19165/2023.2.07
  2. Collins, S., & McCombie, S. (2012). Stuxnet: the emergence of a new cyber weapon and its implications. Journal of Policing Intelligence and Counter Terrorism, 7(1), 80–91. https://doi.org/10.1080/18335330.2012.653198
  3. Cornell Law (2025). The legal gray zone of deepfake political speech. Cornell Journal of Law and Public Policy. https://publications.lawschool.cornell.edu/jlpp/2025/10/24/the-legal-gray-zone-of-deepfake political-speech/
  4. Deepfake statistics (2025) The data behind the AI fraud wave. https://deepstrike.io/blog/deepfake-statistics-2025
  5. Ferrag, M. A., Ndhlovu, M., Tihanyi, N., Cordeiro, L. C., Debbah, M., Lestable, T., & Bhattacharya, (2025). Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities. Future Generation Computer Systems, 173, 107877.
  6. Fortinet. (2025). Deepfake AI and cybersecurity: Safeguarding digital trust
  7. Harvard Ash Center. (2025). The apocalypse that wasn’t: AI was everywhere in 2024’s Harvard Kennedy School Ash Center for Democratic Governance and Innovation. https://ash.harvard.edu/articles/the-apocalypse-that-wasnt
  8. IBM. (2025). A new wave of deepfake-driven cyber crime targets businesses. IBM Think Insights. https://www.ibm.com/think/insights/new-wave-deepfake-cybercrime
  9. Iftikhar, S. (2024). Cyberterrorism as a global threat: A review on repercussions and countermeasures. PeerJ Computer Science, 10, e1772. https://doi.org/10.7717/peerj-cs.1772
  10. Masood, M., Nawaz, M., Malik, K. M., Javed, A., Irtaza, A., & Malik, H. (2023). Deepfakes generation and detection: State-of-the-art, open challenges, countermeasures, and future directions. Applied Intelligence, 53(4), 3974–4026.
  11. Miotti A & Wasil (2024). Combatting deepfakes: Policies to address national security threats. arXiv preprint arXiv:2402.09581.
  12. Mohurle, & Patil, M. (2017). A brief study of WannaCry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938–1940.
  13. Momeni, M. (2025). Artificial intelligence and political deepfakes: Shaping citizen perceptions through misinformation. Global Media and Communication. https://doi.org/10.1177/09732586241277335
  14. Montasari, R. (2024). Responding to deepfake challenges in the United In Cyberspace, cyberterrorism and the international security in the fourth industrial revolution (pp. 121– 148). Springer.
  15. NSA, FBI, & CISA. (2023). Contextualizing deepfake threats to organizations (Cybersecurity Information Sheet). S. Department of Defense. https://media.defense.gov/2023/Sep/12/2003298925/-1/-1/0/CSI-DEEPFAKE THREATS.PDF
  16. Recorded Future. (2024). 2024 deepfakes and election disinformation: Targets, objectives, and emerging tactics. Recorded Future Intelligence https://recordedfuture.com/research/targets-objectives-emerging-tactics-political- deepfakes
  17. Security Distillery. (2024). Deepfakes: The new frontier in political disinformation. The Security https://thesecuritydistillery.org/all-articles/deepfakes-the-new-frontier-in-political- disinformation
  18. S. Government Accountability Office. (2024). Science & tech spotlight: Combating deepfakes (GAO-24-107292). U.S.https://www.gao.gov/products/gao-24-107292
  19. Weimann, (2004). Cyberterrorism: How real is the threat? United States Institute of Peace Special Report 119.
  20. Wolff, E. D., Growley, K. M., & Gruden, M. G. (2021). Navigating the SolarWinds supply chain attack. The Procurement Lawyer, 56(2), 1–9.
  21. World Economic Forum. (2024). Global risks report 2024. World Economic Forum. https://www.weforum.org/publications/global-risks-report-2024

Ahead of Print Subscription Original Research
Volume 13
02
Received 30/03/2026
Accepted 20/04/2026
Published 22/05/2026
Publication Time 53 Days


Login


My IP

PlumX Metrics