By Dr. Jarrod Sadulski  |  10/14/2025


human hand and artificial hand touching cyber lock

Artificial intelligence (AI) has become part of our daily lives. The use of artificial intelligence has a long history, but it has really taken shape in recent years.

For example, AI-powered solutions have had major implications in many aspects of our society and can assist with learning. Common applications of AI include its use with virtual assistants such as Siri® and Alexa®.

Similarly, AI is used by recommendation systems that learn our patterns of interest based on user behavior. For instance, AI models use machine learning algorithms that learn the online content we like and don’t like, and it offers suggestions based on machine learning and data science. For example, AI is responsible for the recommendations we receive on:

  • Netflix®
  • YouTube®
  • Ecommerce sites
  • Browsers on our smartphones, laptops, and other electronic devices

Machine learning enables AI to learn from someone’s network traffic and other online activities to:

  • Make decisions
  • Make predictions

Artificial intelligence can also be used for other purposes:

  • Helping search engines such as Google® to rank content on search engine results pages and understand search engine inquiries
  • Analyzing data sets and generating new data by using patterns generative AI tools have learned from accessing existing online data
  • Generating synthetic data, which involves AI using algorithms to develop artificial data that can be analyzed without putting real data at risk
  • Marketing business products and services using targeted advertisements based on users' online behavior
  • Handling routine business tasks such as inventory management and product demand forecasting
  • Forecasting the weather
  • Aiding malware detection and intrusion detection
  • Controlling autonomous drones, autonomous vehicles, surveillance systems, and biometric systems such as facial recognition
  • Creating predictive policing

 

The Use of AI Security Tools in Cybersecurity

For law enforcement personnel, the use of AI in cybersecurity is critical. AI systems and AI-powered threat detection can reduce security incidents by identifying cyber threats before they occur. Through AI-powered cybersecurity, security professionals and security teams can apply threat detection in real time.

Managed security service providers use AI-powered tools in threat detection to monitor network traffic and detect patterns before a cybersecurity attack occurs. For example, the Department of Homeland Security uses AI in cybersecurity through its Cybersecurity and Infrastructure Security Agency (CISA) and security automation applications.

In security operations centers, CISA uses machine learning algorithms and AI security tools to monitor the internet for emerging threats. Gathering threat intelligence is particularly useful for reducing cybersecurity attacks to our critical infrastructures. CISA also uses AI security and machine learning for threat detection and to analyze past cyber threats and determine their connection to new cyber threats.

 

Cybersecurity Professionals and Security Vendors in Business

The integration of AI by cybersecurity teams to protect sensitive data and for proactive threat hunting is essential to combat cyber threats to organizations. In addition, AI technology can be extremely helpful in maintaining network security and data privacy.

Artificial intelligence tools are essential in security operations and can detect unknown threats before security teams can do so manually. For instance, AI cybersecurity tools can mitigate cyber threats through predictive modeling. Predictive modeling helps security professionals to anticipate future cyber threats through:

  • Detecting known hacker methods
  • Applying historical cyber threats
  • Monitoring network traffic

While artificial intelligence tools can be effective, human oversight should be maintained. For instance, a healthcare facility’s cybersecurity vendors need to protect patient data and proprietary information.

Security professionals around the world depend on AI cybersecurity protection. AI’s capability for deep learning can be used to detect cyber threats, and AI capabilities can improve the security posture of about anything that uses technology.

 

AI Cybersecurity Operations and the Cloud

AI security can be helpful for cloud security because artificial intelligence tools provide faster threat detection for security teams. Cybersecurity professionals can use AI’s deep learning abilities for enabling rapid response to:

  • Intrusion detection
  • Advanced threat detection
  • Identification of security gaps

Deep learning involves a type of machine learning that uses artificial neural networks with multiple layers to learn from a substantial amount of data. Deep learning is helpful for security analysts analyzing vast datasets.

 

Artificial Intelligence and Its Use by Hackers

Security processes depend on AI-powered systems and threat intelligence to prevent AI-powered attacks. However, cybercriminals may apply AI techniques and leverage AI tool to conduct cyber-attacks.

According to the British consumer website Which?, there has been a 76% increase in account hijacking attacks through AI. Which? also notes that there has over a 1,000% increase in SIM swap scams where criminals have stolen cell phone numbers and linked the stolen numbers to a SIM card.

 

Integrating AI for Deepfakes

As a criminologist, one of my biggest concerns about the unethical use of AI involves deepfake technology. Between mid-2023 to the middle of 2024, 60% of consumers reported encountering a deepfake, according to Benjamin Gorman of LifeLock.

Deepfakes can be created through generative AI, which use deep learning to create:

  • Realistic images
  • Sound bites
  • Other media content

Not everyone adheres to strong AI ethics; fake content in the wrong hands can be used for criminal behavior and create havoc. For example, voice cloning models have been used to target victims. Imaging the impact of a fake speech created by AI that imitates a world leader. That speech could lead to global conflict.

A cloned voice through generative AI can be used in extortion cases. It can also be used by a scam artist to convince a victim that a loved one is in trouble and needs money.

Another concern that I have is the use of deepfakes in stealing someone’s image and using it maliciously. For example, the face of a real person could be placed on explicit content or deepfake videos could be used to spread misinformation.

Deepfakes can be used in positive ways, however. For example, they can be used in the entertainment industry for:

  • De-aging actors for creative purposes
  • Voice synthesis
  • Training and education

 

Protecting Yourself from AI-Driven Threats

Cybercriminals are always looking for ways to hack into technological devices and gain information. However, AI can be used to reduce cyber risks and increase privacy protection by using facial recognition to open smartphones and other devices.

Better cybersecurity through the use of advanced AI models has now become an important part of antivirus and anti-malware protection, because AI can be trained to detect threats triggered by differences in learning behavior patterns. AI can alert a user if those behavior patterns have changed, which is a useful security measure.

AI can be used to increase endpoint security from sophisticated threats. It can provide email protection through detecting phishing emails or attachments that contain viruses and reduce the need for maintaining human oversight.

AI can be used in conjunction with several cybersecurity tools to create strong passwords to protect you from a cyberattack. It can be used to control access management or as a password manager.

In terms of internet safety, AI can be used to increase firewall protection. It can monitor suspicious online activity and block threat actors from accessing a computer or smart device.

In order for artificial intelligence tools to be effective in providing protection from hackers and other cyber criminals, it is essential that the software on your devices is regularly updated. Cyberthreats and attack vectors continue to evolve and develop. Therefore, frequent AI software updates are essential to keep up with emerging technology.

AI can also be used to protect against from identity theft. For example, AI can be used to continuously monitor for a hacker using someone’s identity.

AI can monitor the dark web to determine if our personal information such as Social Security numbers have been stolen. There are products such as Norton® Genie, an AI scam detector that detects AI-generated messages with an over 90% accuracy.

Any device connected to the internet is at risk of being a target by a hacker. For example, any products that use the internet are at risk of being hacked, such as:

  • Smart speakers
  • Home camera systems
  • Baby monitors

The good news is that AI systems can be used to increase household cybersecurity by:

  • Blocking suspicious activity
  • Alerting users of new or attempted connections

 

The Evolving AI Landscape

Clearly, AI is here to stay and when used properly, it can be useful for many aspects of our lives. However, it is important that AI is used ethically. With the power of AI comes the ability for criminals to use artificial intelligence tools to:

  • Conduct cyberattacks and cyber extortion schemes
  • Steal private or financial information
  • Create public chaos

Artificial intelligence tools are always advancing. As a result, it is wise to remain on top of AI developments, especially in cybersecurity, to understand how threat actors are using artificial intelligence for their own purposes.

 

The B.S. in Cybersecurity at AMU

For interested adult learners who want to learn how to protect users and organizations from cybercriminals, American Military University (AMU) providers an online Bachelor of Science in Cybersecurity. Courses in this degree program are taught by experienced cybersecurity professionals and include a wide range of topics, such as:

  • Cyber warfare
  • Red and blue team security
  • Computer and network security
  • Biometrics

In this program, students can choose one of four concentrations to suit their professional aspirations, such as:

  • Wireless and mobile security
  • General
  • Critical infrastructure
  • Digital forensics

For more information about this bachelor’s degree in cybersecurity, visit AMU’s information technology degree program page.

Siri is a registered trademark of Apple, Inc.
Alexa is a registered trademark of Amazon.com, Inc.
Netflix is a registered trademark of Netflix, Inc.
YouTube is a registered trademark of Google, LLC.
Google is a registered trademark of Google, LLC.
Norton is a registered trademark of Gen Digital, Inc.


About The Author
Dr. Jarrod Sadulski

Dr. Jarrod Sadulski is an associate professor in the School of Security and Global Studies and has over 20 years in the field of criminal justice. He holds a bachelor’s degree in criminal justice from Thomas Edison State College, a master’s degree in criminal justice from American Military University, and a Ph.D. in criminal justice from Northcentral University.

His expertise includes training on countering human trafficking, maritime security, mitigating organized crime, and narcotics trafficking trends in Latin America. Jarrod has also testified to both the U.S. Congress and U.S. Senate on human trafficking and child exploitation. He has been recognized by the U.S. Senate as an expert in human trafficking.

Jarrod frequently conducts in-country research and consultant work in Central and South America on human trafficking and current trends in narcotics trafficking. Also, he has a background in business development.