Recent Advances in Computer Science and Communications

Author(s): Shubham Pandey and Archana Patel*

DOI: 10.2174/0126662558264263231127062519

Leveraging ChatGPT in Law Enforcement

Article ID: e081223224323 Pages: 9

  • * (Excluding Mailing and Handling)

Abstract

The advent of powerful tools like ChatGPT has opened up exciting new possibilities for augmenting law enforcement capabilities, elevating its efficiency and expanding its capacity. The AI-driven capabilities of ChatGPT can be harnessed to usher in novel applications in diverse areas such as language translation, customer service, content generation, and even law enforcement. In the realm of law enforcement, ChatGPT's potential is boundless, ranging from the generation of detailed reports and the transcription and translation of vital documents to the profiling of criminals and the automation of legal documents. However, the deployment of such technology in law enforcement raises critical issues of privacy, safeguarding fundamental rights, and the perpetuation of societal biases. Furthermore, the deployment of emerging technologies like ChatGPT could also open up new avenues for committing cybercrimes. Therefore, it is crucial to address these issues and establish regulatory frameworks that govern the use of such advanced technologies. In this paper, we provide legal and technical recommendations to regulate the use of ChatGPT and mitigate the potential risks associated with its usage, including the perpetration of various cybercrimes.

Graphical Abstract

[1]
A. de la Fuente, R.P. Leal, and A.G. Armada, "New technologies and trends for next generation mobile broadcasting services", IEEE Commun. Mag., vol. 54, no. 11, pp. 217-223, 2016.
[http://dx.doi.org/10.1109/MCOM.2016.1600216RP]
[2]
M.A. Tunc, E. Gures, and I. Shayea, "A survey on iot smart healthcare: Emerging technologies, applications, challenges, and future trends", arXiv preprint arXiv:. 2109.02042
[3]
M. Pacansky-Brock, Best practices for teaching with emerging technologies., Routledge, 2013.
[4]
B. S. Mehta, "Changing nature of work and the gig economy: Theory and debate. FIIB Business Review",.2319714520968294,
[5]
C.V. Baccarella, T.F. Wagner, C.W. Scheiner, L. Maier, and K.I. Voigt, "Investigating consumer acceptance of autonomous technologies: the case of self-driving automobiles", Eur. J. Innov. Manage., vol. 24, no. 4, pp. 1210-1232, 2021.
[http://dx.doi.org/10.1108/EJIM-09-2019-0245]
[6]
R. Kellermann, T. Biehle, and L. Fischer, "Drones for parcel and passenger transportation: A literature review", Trans. Res. Interdis. Perspect., vol. 4, p. 100088, 2020.
[http://dx.doi.org/10.1016/j.trip.2019.100088]
[7]
K. Gkoumas, and M. Christou, "A triple-helix approach for the assessment of hyperloop potential in Europe", Sustainability (Basel), vol. 12, no. 19, p. 7868, 2020.
[http://dx.doi.org/10.3390/su12197868]
[8]
M. Haller, M. Billinghurst, B. Thomas, Eds., Emerging technologies of augmented reality: Interfaces and design: Interfaces and design., Igi Global, 2006.
[9]
P. Garcia, "Biometrics on the blockchain", Biometric Technology Today, vol. 2018, no. 5, pp. 5-7, 2018.
[http://dx.doi.org/10.1016/S0969-4765(18)30067-5]
[10]
W. Deng, Z. Xiang, K. Huang, J. Liu, C. Yang, and W. Gui, "Detecting intelligent load redistribution attack based on power load pattern learning in cyber-physical power systems", IEEE Trans. Ind. Electron., pp. 1-9, 2023.
[http://dx.doi.org/10.1109/TIE.2023.3294646]
[11]
T. Zheng, Z. Chen, S. Ding, C. Cai, and J. Luo, "Adv-4-Adv: Thwarting changing adversarial perturbations via adversarial domain adaptation", arXiv preprint arXiv:2112.00428
[12]
C. Tucker, "Privacy, algorithms, and artificial intelligence", In: The economics of artificial intelligence: An agenda., University of Chicago Press, 2018, pp. 423-437.
[13]
J. Zerilli, A. Knott, J. Maclaurin, and C. Gavaghan, "Transparency in algorithmic and human decision-making: Is there a double standard?", Philos. Technol., vol. 32, no. 4, pp. 661-683, 2019.
[http://dx.doi.org/10.1007/s13347-018-0330-6]
[14]
A. Shafahi, W.R. Huang, M. Najibi, O. Suciu, C. Studer, T. Dumitras, and T. Goldstein, "Poison frogs! targeted clean-label poisoning attacks on neural networks", Adv. Neural Inf. Process. Syst., p. 31, 2018.
[15]
M. Brundage, S. Avin, J. Wang, H. Belfield, G. Krueger, and G. Hadfield, "Toward trustworthy AI development: mechanisms for supporting verifiable claims", arXiv preprint arXiv:2004.07213, .
[16]
M. Comiter, "Attacking artificial intelligence", Belfer Center Paper, vol. 8, pp. 2019-08, 2019.
[17]
S. Zeadally, E. Adi, Z. Baig, and I.A. Khan, "Harnessing artificial intelligence capabilities to improve cybersecurity", IEEE Access, vol. 8, pp. 23817-23837, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.2968045]
[18]
M. Flavin, Disruptive technology enhanced learning: The use and misuse of digital technologies in higher education., Springer, 2017.
[http://dx.doi.org/10.1057/978-1-137-57284-4]
[19]
M. Rahaman, M. M. Ahsan, N. Anjum, M. Rahman, and M. N. Rahman, "The AI Race is On! Google's Bard and OpenAI's ChatGPT Head to Head: An Opinion Article. Mizanur and Rahman, Md Nafizur, The AI Race is on",.
[20]
"The Brain Team: Make machines intelligent. Improve people’s lives (Google Research, 2017)", Available from: https://research.google/teams/brain/ accessed 25th Jan 2023
[21]
R. Kujur, What is ChatGPT? A video explaining ChatGPT, an advanced AI-powered ChatGPT that has taken the world by storm",. Availabe from:https://www.thehindu.com/scitech/technology/watch-what-is-chatgpt/article66423376.ece accessed 26th Jan 2023
[22]
B.D. Lund, and T. Wang, "Chatting about ChatGPT: how may AI and GPT impact academia and libraries?", Libr. Hi Tech News, vol. 40, no. 3, pp. 26-29, 2023.
[http://dx.doi.org/10.1108/LHTN-01-2023-0009]
[23]
A. Haleem, M. Javaid, and R.P. Singh, "An era of ChatGPT as a significant futuristic support tool: A study on features, abilities, and challenges., BenchCouncil Transactions on Benchmarks, Standards and Evaluations",, 2020.
[24]
E. Felten, M. Raj, and R. Seamans, "How will language modelers like ChatGPT affect occupations and industries?", arXiv preprint arXiv:2303.01157, 2023.
[25]
Q. Lu, B. Qiu, L. Ding, L. Xie, and D. Tao, "Error analysis prompting enables human-like translation evaluation in large language models: A case study on chatgpt",.
[http://dx.doi.org/10.20944/preprints202303.0255.v1]
[26]
I. Cingillioglu, "Detecting AI-generated essays: The ChatGPT challenge", Int. J. Inform. Learn. Technol., vol. 40, no. 3, pp. 259-268, 2023.
[http://dx.doi.org/10.1108/IJILT-03-2023-0043]
[27]
S. Chainey, and J. Ratcliffe, GIS and crime mapping., John Wiley & Sons, 2013.
[28]
P. Paialunga, "Hands-on sentiment analysis on hotels reviews using artificial intelligence and open AI’s Chat GPT, with python",. Available from: https://towardsdatascience.com/hands-on-sentiment-analysis-on-hotels-reviews-using-artificial-intelligence-and-open-ais-chatgpt-d1939850c79e accessed 24th Jan 2023
[29]
M. Mijwil, and M. Aljanabi, "Towards artificial intelligence-based cybersecurity: The practices and ChatGPT generated ways to combat cybercrime", Iraqi Journal For Computer Science and Mathematics, vol. 4, no. 1, pp. 65-70, 2023.
[30]
G. Computing, "Chat GPT in smart home systems: Prospects, risks, and benefits",.
[31]
M. Hasal, J. Nowaková, K. Ahmed Saghair, H. Abdulla, V. Snášel, and L. Ogiela, "Chatbots: Security, privacy, data protection, and social aspects", Concurr. Comput., vol. 33, no. 19, p. e6426, 2021.
[http://dx.doi.org/10.1002/cpe.6426]
[32]
F. Barth, " Evolving Law in AI’s Hands?–Preliminary Experiments, Thoughts and Observations on the Basis of Chat GPT. Preliminary Experiments, Thoughts and Observations on the Basis of Chat GPT",
[33]
""Avi asher-shapiro and david sherfinski, analysis: Chatbots in US justice system raise bias, privacy concerns",", Available from: https://www.reuters.com/legal/litigation/chatbots-us-justice-system-raise-bias-privacy-concerns-2022-05-10/ accessed 1st Feb 2023
[34]
R.K. Garg, V.L. Urs, A.A. Agrawal, S.K. Chaudhary, V. Paliwal, and S.K. Kar, "Exploring the Role of Chat GPT in patient care (diagnosis and Treatment) and medical research: A Systematic Review", medRxiv, p. p. 06, 2023..
[http://dx.doi.org/10.1101/2023.06.13.23291311]
[35]
E. Kasneci, K. Sessler, S. Küchemann, M. Bannert, D. Dementieva, F. Fischer, U. Gasser, G. Groh, S. Günnemann, E. Hüllermeier, S. Krusche, G. Kutyniok, T. Michaeli, C. Nerdel, J. Pfeffer, O. Poquet, M. Sailer, A. Schmidt, T. Seidel, M. Stadler, J. Weller, J. Kuhn, and G. Kasneci, "ChatGPT for good? On opportunities and challenges of large language models for education", Learn. Individ. Differ., vol. 103, p. 102274, 2023.
[http://dx.doi.org/10.1016/j.lindif.2023.102274]
[36]
D. Kalla, and N. Smith, "Study and analysis of chat GPT and its impact on different fields of study", Int. J. Innov. Sci. Res. Technol.,, vol. 8, no. 3, 2023.
[37]
M. Zong, and B. Krishnamachari, "A survey on GPT-3. a", rXiv preprint arXiv:2212.00857",,
[38]
E. Ferrara, "Should chatgpt be biased? challenges and risks of bias in large language models", arXiv preprint arXiv:2304.03738., 2023.
[39]
V. Božić, "and I. Poola, "Mitigating Risks in Artifical Intelligence Language Models: Strategies for Responsible Deployment",",
[40]
P. Rivas, and L. Zhao, Marketing with chatgpt: Navigating the ethical terrain of gpt-based chatbot technology",. AI, vol. 4, no. 2, pp. 375-384, 2023
[41]
Z. Alkhalil, C. Hewage, L. Nawaf, and I. Khan, "Phishing attacks: A recent comprehensive study and a new anatomy", Front. Comput. Sci., vol. 3, p. 563060, 2021.
[http://dx.doi.org/10.3389/fcomp.2021.563060]
[42]
T.Y. Zhuo, Y. Huang, C. Chen, and Z. Xing, "Exploring ai ethics of chatgpt: A diagnostic analysis", arXiv preprint arXiv:2301.12867, 2023.
[43]
R.G. Brody, E. Mulig, and V. Kimball, "Phishing, pharming and identity theft",.
[44]
M.J. Crockett, "Moral outrage in the digital age", Nat. Hum. Behav., vol. 1, no. 11, pp. 769-771, 2017.
[http://dx.doi.org/10.1038/s41562-017-0213-3] [PMID: 31024117]
[45]
C. Pernet, "New phishing technique lures users with fake Chatbots",. Available from: https://www.techrepublic.com/article/new-phishing-technique-chatbot/ accessed 1st Feb 2023
[46]
R. Slonje, P.K. Smith, and A. Frisén, "The nature of cyberbullying, and strategies for prevention", Comput. Human Behav., vol. 29, no. 1, pp. 26-32, 2013.
[http://dx.doi.org/10.1016/j.chb.2012.05.024]
[47]
E.A.M. van Dis, J. Bollen, W. Zuidema, R. van Rooij, and C.L. Bockting, "ChatGPT: Five priorities for research", Nature, vol. 614, no. 7947, pp. 224-226, 2023.
[http://dx.doi.org/10.1038/d41586-023-00288-7] [PMID: 36737653]
[48]
R.H. Lewis, and J. Jiao, "“ComputeGPT: A computational chat model for numerical problems”, In", arXiv preprint arXiv:2305.06223.. 2023., .
[49]
P. Pa, "An attacker’s dream? exploring the capabilities of ChatGPT for developing malware", 2023 Cyber Security Experimentation and Test Workshop 2023, pp. 10-18, .
[http://dx.doi.org/10.1145/3607505.3607513]
[50]
S. Biswas, Prospective role of chat GPT in the military: according to ChatGPT., Qeios, 2023.
[51]
K.T. Gradon, "Electric sheep on the pastures of disinformation and targeted phishing campaigns: The security implications of ChatGPT", IEEE Secur. Priv., vol. 21, no. 3, pp. 58-61, 2023.
[http://dx.doi.org/10.1109/MSEC.2023.3255039]
[52]
S. Singh, S. Tiwari, P. K. Yadav, A. Kumar, and V. Srivastava, Chat Gpt: Exploring the capabilities and limitations of a large language model.
[53]
A. Tlili, B. Shehata, M.A. Adarkwah, A. Bozkurt, D.T. Hickey, R. Huang, and B. Agyemang, "What if the devil is my guardian angel: ChatGPT as a case study of using chatbots in education", Smart Learning Environments, vol. 10, no. 1, p. 15, 2023.
[http://dx.doi.org/10.1186/s40561-023-00237-x]
[54]
P. Hacker, A. Engel, and M. Mauer, "Regulating ChatGPT and other large generative AI models", Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency 2023 , pp. 1112-1123, .
[http://dx.doi.org/10.1145/3593013.3594067]
[55]
S. Kalhoro, M. Rehman, V. Ponnusamy, and F.B. Shaikh, "Extracting key factors of cyber hygiene behaviour among software engineers: A systematic literature review", IEEE Access, vol. 9, pp. 99339-99363, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3097144]
[56]
A. Vishwanath, L.S. Neo, P. Goh, S. Lee, M. Khader, G. Ong, and J. Chin, "Cyber hygiene: The concept, its measure, and its initial tests", Decis. Support Syst., vol. 128, p. 113160, 2020.
[http://dx.doi.org/10.1016/j.dss.2019.113160]
[57]
C. Smith, "Cyber security, safety, & ethics education (Doctoral dissertation, Utica College)",.
[58]
M.A. Al-Shareeda, and S. Manickam, "Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g enabled vehicular networks", IEEE Access, vol. 10, pp. 120606-120615, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3222488]
[59]
D. Singh, N.P. Mohanty, S. Swagatika, and S. Kumar, "Cyber hygiene: The key concept for cyber security in cyberspace", Test Engineering and Management, vol. 83, pp. 8145-8152, 2020.
[60]
M. Wade, "Digital hostages: Leveraging ransomware attacks in cyberspace", Bus. Horiz., vol. 64, no. 6, pp. 787-797, 2021.
[http://dx.doi.org/10.1016/j.bushor.2021.07.014]