ARTIFICIAL INTELLIGENCE AND CYBERCRIME: NEW CHALLENGES AND PROSPECTS FOR LEGAL REGULATION

Authors

DOI:

https://doi.org/10.69635/ciai.2025.11

Keywords:

Artificial Intelligence, Cybercrime, Legal Regulation, Deepfakes, Cybersecurity, AI Autonomy, Digital Evidence, Forensic Analysis, International Cooperation, Machine Learning

Abstract

The rapid development of artificial intelligence (AI) is fundamentally changing the methods and scale of cybercrime, and also poses significant challenges for legal regulation. This article highlights the fundamental aspects of the use of AI to commit cyberattacks (automated hacking tools, deep fakes, intellectual fraud, etc.) and considers ways to counter them by law enforcement agencies. The legal aspects related to the extended autonomy of AI systems are examined, leading to new liability issues, problems of assessing deep fakes evidence and the need for international cooperation in cybersecurity field. The rapid development of artificial intelligence (AI) is fundamentally changing the methods and scale of cybercrime, and also poses significant challenges for legal regulation. This article highlights the fundamental aspects of using AI to commit cyberattacks (automated hacking tools, deepfakes, intellectual fraud, etc.) and explores ways in which law enforcement agencies can counter them. It reveals legal aspects related to the extended autonomy of AI systems, which leads to new issues of liability, problems of assessing evidence of deepfakes, and the need for international cooperation in the field of cybersecurity.

The aim of the study is to develop a holistic view of the threats posed by AI tools in the context of cybercrime and to formulate recommendations for improving national and transnational legislation. The article proposes specific mechanisms for ensuring the reliability of digital evidence (from the creation of algorithms for detecting manipulations to methods for analyzing the chain of their storage), highlights the current practice of criminal prosecution in Ukraine and abroad, and also provides proposals for the unification of procedures for forensic analysis of materials obtained or modified with the help of AI. The results of the work show that effective legal counteraction to AI-based cybercrime requires the simultaneous development of technical tools, enhanced protection of human rights, and international harmonization of legal norms. The development of specialized investigation methods, including big data analytics and machine learning technologies, must be balanced with increasing security and transparency standards. Particular attention is paid to the issue of further modernization of training programs for legal professionals and the involvement of experts in the field of cybersecurity, which will allow for a faster response to the dynamics of new threats.

References

Kuznetsov, A. A., Gorbenko, Y. I., Kolovanova, I. P., & Prokopovych-Tkachenko, D. I. (2017). Key schedule of block symmetric ciphers. ASC Academic Publishing.

Rassomahin, S. G., Kuznetsov, A. A., & Prokopovych-Tkachenko, D. I. (2017). Security and noise immunity of telecommunication systems: New solutions to the codes and signals design problem. ASC Academic Publishing.

Stefanovych, O., Kuznetsova, K., Tarasenko, Y., & Polins’ky, O. (2018). Steganography hiding of information using 3D-printing technologies. 2018 International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo). https://doi.org/10.1109/UkrMiCo43733.2018.9047559

Chesney, R., & Citron, D. (2019). Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. California Law Review, 107(6), 1753-1820.

Tarasenko, Y. S., Smirnov, V. V., & Prokopovych-Tkachenko, D. I. (2019). Features of detecting hidden artificial objects under customs control conditions. Systems and Technologies Conference Proceedings, 2(58), 161-169.

Kostenko, O. V., Prokopovych-Tkachenko, D. I., & Florov, S. V. (2023). Legal risks of compromising a qualified electronic signature. Legal Scientific Electronic Journal, (11), 373-379. https://doi.org/10.32782/2524-0374/2023-11/91

Kostenko, O. V. (2022). Analysis of national strategies for the development of artificial intelligence. Information and Law, 2(41), 58-69. https://doi.org/10.37750/26166798.2022.2(41).270365

Kostenko, O., Furashev, V., Zhuravlov, D., & Dniprov, O. (2022). Genesis of Legal Regulation Web and the Model of the Electronic Jurisdiction of the Metaverse. Bratislava Law Review, 6(2), 21-36. https://doi.org/10.46282/blr.2022.6.2.316

Prokopovych-Tkachenko, D. I., Kuznetsov, A. A., & Tarasenko, Y. (2018). Information security in critical infrastructures. ASC Academic Publishing.

Kuznetsov, A. A., Kiyan, A. S., & Prokopovych-Tkachenko, D. I. (2020). Periodic properties of cryptographically secure pseudorandom sequences. Applied Radioelectronics, 4, 2537.

Prokopovych-Tkachenko, D. I. (2016). Accelerated generation of pseudorandom sequences of maximum period using elliptic curve transformations. Information Processing Systems, 4(129), 197-203.

Lisickiy, K., Kuznetsova, K., Malenko, Y., Zavgorodnia, O., & Prokopovych-Tkachenko, D. I. (2019). Accelerated method for calculating the algebraic immunity of S-boxes. 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON). https://doi.org/10.1109/UKRCON.2019.8879943

Kuznetsov, A. A., Serhienko, R. V., & Prokopovych-Tkachenko, D. I. (2018). Algebraic immunity of symmetric ciphers. Computer Science and Cybersecurity, (1), 36-48.

Moroz, B. I., Prokopovych-Tkachenko, D. I., & Petrenko, I. V. (2018). Improvement of router authorization protocols in wireless networks to reduce negative impact. Systems and Technologies, 12(3), 55-68.

Voloshyn, R. M., & Prokopovych-Tkachenko, D. I. (2020). Recommendations on cybersecurity of the educational process. Formation of a Modern Management Model, 15(2), 33-40.

Prokopovych-Tkachenko, D. I., Kuznetsov, A. A., & Moskovenko, I. V. (2018). Heuristic methods for gradient search of cryptographic Boolean functions. Radiotechnics, 23(2), 4149.

Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., ... & Bengio, Y. (2014). Generative adversarial nets. In Advances in Neural Information Processing Systems, 27, 2672-2680.

Brundage, M., Avin, S., Clark, J., Toner, H., Eckersley, P., Garfinkel, B., ... & Anderson, H. (2018). The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. Future of Humanity Institute, University of Oxford.

Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 374(2083), 20160360.

Ng, A. (2019). AI transformation playbook. Landing AI Publication, 1-25.

Prokopovych-Tkachenko D. (2024). Assessment of the state of information security using expert systems. Systems and technologies, (1), 5-12.

Prokopovych-Tkachenko D. I., Kozina G. L., & Savchenko Y. V. (2024). Mathematical approach to increasing the speed of software implementation of the SM4 crypto algorithm. Systems and technologies, 68(2), 6-14.

Prokopovych-Tkachenko D. (2024). MILITARY AI SYSTEMS (MILAI): SOCIO-POLITICAL CHALLENGES. Legal Scientific Electronic Journal, 04(04-2024), 3-10.

Prokopovych-Tkachenko D. (2024). RENAISSANCE OF DIGITAL TECHNOLOGIES AND NATIONAL SECURITY: ASSESSMENT OF THE IMPACT OF 10T, AI, VIRTUAL REALITY. Legal Scientific Electronic Journal, 04(04-2024), 6-15.

Kuznetsov, A. A., & Prokopovych-Tkachenko, D. I. (2018). Technologies for encryption based on Boolean functions. Radio Engineering, 7(2), 33-47.

Prokopovych-Tkachenko, D. I. (2013). Method of generating pseudorandom sequences of maximum period using elliptic curve transformations. Academy of Customs Service of Ukraine, 5(1), 17-25.

Tarasenko, Y. S., Savchenko, Y. V., & Prokopovych-Tkachenko, D. I. (2019). The paradigm of radio-electronic measurements: From error to uncertainty. University of Customs and Finance, 4(66), 110-118.

Kuznetsov, A. A., Kolovanova, Y. P., & Prokopovych-Tkachenko, D. I. (2017). Algebraicgeometric codes: Analysis and properties. Radio Engineering, 70-89.

Prokopovych-Tkachenko, D. I. (2014). Co-authorship of the Law of Ukraine "On Amendments to the Law of Ukraine 'On the State Service for Special Communications and Information Protection of Ukraine' (No. 4432)". Verkhovna Rada of Ukraine.

Voloshyn, R. M., & Prokopovych-Tkachenko, D. I. (2020). Recommendations on cybersecurity of the educational process. Formation of a Modern Management Model, 15(2), 33-40.

Brunner, T. (2021). Blockchain for evidence integrity: A novel approach for digital evidence chain-of-custody. International Journal of Digital Forensics, 2(1), 33-47.

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2020). Cybercrime and digital forensics: An introduction. 3rd ed. Routledge.

Kostenko, O. (2022). Comparative legal aspects of personal data protection in the era of AI. Information and Law, 3(42), 89-101. https://doi.org/10.37750/26166798.2022.3(42).271212

Downloads

Views: 304

  |  

Downloads: 183

Published

2025-03-14

Issue

Section

AI in Legal and Ethical Compliance

Categories

How to Cite

Zverev Volodymyr, Bushkov Valery, Khrushkov Borys, Sarychev Volodymyr, Ostaltsev Oleksiy, & Prokopovych-Tkachenko Yehor. (2025). ARTIFICIAL INTELLIGENCE AND CYBERCRIME: NEW CHALLENGES AND PROSPECTS FOR LEGAL REGULATION. Contemporary Issues in Artificial Intelligence, 1. https://doi.org/10.69635/ciai.2025.11

Most read articles by the same author(s)