The Application of Artificial Intelligence in Intelligence: A Comparison of U.S. Practices and Legal Constraints in the EU
Abstract
Purpose. Identify structural differences between the practice of integrating artificial intelligence into U.S. intelligence activities and the regulatory-legal model of the European Union and assess their impact on the effectiveness of the intelligence cycle.
Method. System analysis, comparative analysis.
Findings. The evolution of artificial intelligence integration into U.S. intelligence activities, as well as the corresponding legal and ethical norms of the EU, has been analyzed. The main areas of its impact on the intelligence cycle have been identified, and the legal, ethical, and technical limitations of AI use have been systematized. It has been demonstrated that claims of a full-scale AI revolution in intelligence are premature.
Theoretical implications. The results can be used for further research in the field of cognitive and information security technologies, as well as for the development of decision-making theory in intelligence activities.
Value. The materials of the article may be useful for security and defense sector professionals when assessing the opportunities and risks of implementing artificial intelligence technologies.
Future research. It is advisable to focus on the development of legal norms regulating the use of artificial intelligence in intelligence agencies and methods for reducing cognitive biases in human-machine systems.
Papertype. Analytical.
Downloads
References
Clapp, S. (2025). Defence and artificial intelligence (Members' Research Service PE 569.580 – April 2025). European Parliamentary Research Service. URL: https://www.europarl.europa.eu/RegData/etudes/BRIE/2025/769580/EPRS_BRI(2025)769580_EN.pdf
Moran, C. R., Burton, J., & Christou, G. (2023). The US Intelligence Community, Global Security, and AI: From Secret Intelligence to Smart Spying. Journal of Global Security Studies, 8(2). https://doi.org/10.1093/jogss/ogad005.
Guide to AI for the Intelligence Community. URL: https://scale.com/guides/guide-to-ai-for-the-intelligence-community.
Pylypchuk, V., & Popov, M. (2025). Trends of Using Artificial Intelligence Tools for Intelligence Analysis. Modern Information Technologies in the Sphere of Security and Defence, 53(2), 150–155. https://doi.org/10.33099/2311-7249/2025-53-2-150-155.
Koroniotis, N., Moustafa, N., Turnbull, B., Schiliro, F., Gauravaram, P., & Janicke, H. (2021). A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. У 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE. https://doi.org/10.1109/trustcom53373.2021.00125.
Schmitt, M., & Flechais, I. (2024). Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing. Artificial Intelligence Review, 57(12). https://doi.org/10.1007/s10462-024-10973-2.
Mehta, R., Jureˇckov´a, O., & Stamp, M. (2023). A Natural Language Processing Approach to Malware Classification. Journal of Computer Virology and Hacking Techniques, 20, 1–20. URL: https://arxiv.org/pdf/2307.11032.
Balanda, A., & Mokliak, S. (2025). Military Technological Innovations in the Context of Artificial Intelligence Implementation. Social Development and Security, 15(3), 302-307. https://doi.org/10.33445/sds.2025.15.3.26.
Shovkoshytnyi, I., & Vasylenko, O. (2025). Management of the Target Distribution of a Swarm of Different Types of Strike Unmanned Aerial Vehicles for Striking Non-Stationary Group Targets Based on an Adaptive Algorithm Using Optimisation Methods and Elements of Artificial Intelligence. Modern Information Technologies in the Sphere of Security and Defence, 54(3), 15–24. https://doi.org/10.33099/2311-7249/2025-54-3-15-24.
Jędrasiak, K., & Gawliczek, P. (2025). Implementing Artificial Intelligence in Data-Driven Enterprises through a Ten-Phase Framework Based on Multiple Case Studies. Social Development and Security, 15(5), 17-34. https://doi.org/10.33445/sds.2025.15.5.2.
Yakhovenko, Y., Bilyk, M., & Oliynyk, Y. (2024). Artificial Intelligence, Big Data, and Responsible Consumption as an Imperative of Innovative Development of Business Structures in the Context of Digital Economy Formation. Economics and Society, (60). https://doi.org/10.32782/2524-0072/2024-60-151.
Townley, D. (2023, May 3). Intelligence Agencies Have Used AI Since the Cold War – But Now Face New Security Challenges. The Conversation. URL: https://doi.org/10.64628/AB.7wa6ftgvp.
Savage, C. (2024, November 14). Spy Agency Memo Sets Rules for Artificial Intelligence and Americans’ Private Data. The New York Times, Section A, P. 31. URL: https://www.nytimes.com/2024/11/14/us/ai-privacy-guidelines-intelligence.html.
Artificial Intelligence at the Service of Intelligence? (2021, December 2). Numalis. URL: https://numalis.com/artificial-intelligence-at-the-service-of-intelligence/.
The EU Artificial Intelligence Act, The EU AI Act № Regulation (EU) 2024/1689 (2024, July 12). Official Journal of the European Union. URL: https://artificialintelligenceact.eu/the-act/.
Abstract views: 55 PDF Downloads: 50
Copyright (c) 2026 Сергій Стефанцев, Вадим Сокур, Андрій Булавін

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).












