1 min read

Webinar Series: Generative AI’s Counterterrorism Challenge and Opportunity

Date: Tuesday 26 March 2024 
Time: 1730 GMT | 1330 EST | 1030 ET 

This first in a series of webinars organised by Tech Against Terrorism  explored the exploitation of Generative AI by terrorist and violent extremist actors.  

The webinar introduced ongoing research conducted by Tech Against Terrorism analysts suggesting that terrorist and violent extremist actors were early adopters of Generative AI, but that they did so primarily to produce content.

Crucially, however, the webinar explored how generative AI affected distinct and common areas of online harms. Like previous waves of the internet, generative AI had the potential to up-end existing content moderation processes and technologies, and challenge carefully crafted online regulation; for example, the UK’s Online Safety Bill. It was then critical for the tech sector and governments to come together and effectively pre-empt the harmful exploitation of artificial intelligence.

This webinar explored the promise of AI, and how the new technology could be used collaboratively to secure cyberspace and disrupt online harms.

Speakers 

  • Adam Hadley, Executive Director & Founder, Tech Against Terrorism 
  • Adam Donald, Manager, Terrorist Content Analytics Platform
  • Dan Sexton, Chief Technology Officer, Internet Watch Foundation

 

Tech Against Terrorism & GIFCT Middle East Launch

Tech professionals: Are you interested in the intersection of technology and terrorism? Are you worried about terrorist exploitation of your company...

Read More

Tech Against Terrorism & GIFCT - Israel Launch

Tech professionals: Are you interested in the intersection of technology and terrorism? Do you want to learn more about how the internet is being...

Read More

TAT & GIFCT E-Learning Webinar | Year in Review: 2023 Trends in Terrorist and Violent Extremist Use of the Internet and the Online Counterterrorism Response

13 December 2023 3:30pm - 4:30pm GMTRegister hereThis webinar will examine the past year’s principal trends in terrorist exploitation of the internet...

Read More