Artificial Intelligence Trends (2)

AI Manipulation and the Architecture of Online Extremism

06 Nov 2025

Publication Thumb

ISBN: 978-9948-690-90-0

AED 30

Get your PDF: Max 3 downloads within 5 days

This paper examines how artificial intelligence (AI) systems, while offering significant societal benefits, present structural vulnerabilities that extremists can exploit for manipulation and  radicalization. It identifies four key weaknesses—input and data poisoning attacks, lack of interpretability, surface pattern reliance, and personalization loops—which stem from the core architecture of machine learning. These flaws allow malicious actors to bypass content moderation, embed extremist narratives, and create algorithmically reinforced echo chambers.

The analysis then explores three main exploitation channels: the use of generative AI for creating persuasive synthetic propaganda; AI-powered chatbots for scalable, interactive recruitment that simulates empathy and builds trust; and gamified approaches that integrate extremist content into online gaming environments, normalizing violence and ideology. Through case studies such as the manipulation of Microsoft’s Tay chatbot, deepfake political messages, and the gamification of real-world attacks, the study illustrates how AI tools amplify the reach, speed, and psychological impact of extremist strategies. It argues that AI attacks cannot simply be “patched” like traditional cybersecurity flaws because they are intrinsic to AI’s design, requiring proactive governance, built-in safeguards, and crosssector collaboration.

Recommendations include the establishment of AI misuse simulation labs, independent ethical audits, algorithmic transparency mandates, and enhanced digital literacy to empower users  against manipulation. The paper concludes that without embedding resilience and ethical oversight into AI systems from the outset, extremists will continue to exploit these technologies, transforming them into force multipliers for radicalization and undermining societal trust in digital information ecosystems.