A Comparative Analysis of Information and Artificial Intelligence towards National Security

Information is inevitable when it comes to national security. The information revolution seems to hold the massive potential to strengthen national security against current and upcoming threats and cyber-attacks. However, advancements in information accessibility possess innumerable complications for retaining stable national security. One of the preeminent information sources is social media which certainly raises information manipulation factors and destabilizes national security. To accomplish better national security plans, information technology can help countries to identify potential threats, share information securely, and protect mechanisms in them. Artificial Intelligence (AI) is one of the smart areas that robustly facilitates secure information handling to avoid threats and cyber-attacks. It intelligently scrutinizes information available to the public through social media and assists in refraining negative effects on national security. This research article widely focuses on four main analytical milestones; 1) Information available to the public 2) Information affecting national security 3) Risks of cyber-attacks 4) AI as paramount to national security for accomplishing competent information role. Our principal objective is to demystify information accessibilities perspectives for readers to understand the fundamentals of information accessibility and inaccessibility corresponding to national security. To support and manifest our milestones and objectives, a Systematic Literature Review (SLR) is methodologically adapted to draw suitable conclusions and develop a farsighted frame of reference. This paper concludes with AI tool based categorization and domain-specific analysis with area-based limitations to highlight current needs. Above all, this article is a thought-provoking kick-start for many naive social media users that usually avoid information-bearing elements and are victimized by cyber-attacks followed by national security compromises.


I. INTRODUCTION
National security is highly interconnected with the conduct of information. Various mechanisms have been developed over the years to address information handling [1]. However, the rapid and comparatively recent diffusion of social-media-based information, while bringing numerous benefits, has also demonstrated the urgent need to craft new national security mechanisms to cope with deteriorating circumstances. The Computer Emergency Response Team (CERT) for the Software Engineering Institute (SEI) [2] reported that security incidents are doubled every year followed by an increased growth rate since 2001. In response to these figures, there is a huge amount of security incidents that are never reported. The national systems of security largely rely on information that impacts current and future changes irrespective of national security interests [3]. National security systems are largely dependent upon information spread through various anti-national channels.
National security can be defined as to national strategy to ensure the protection of a nation's fundamental and enduring needs while protecting every citizen's essential safety needs with personnel and social values [4]. The exploitation of national security interests manipulates the desired security territorial parameters resulting in defamation of national values, interests, and global relationships [5]. Social media is by far the huge platform with billions of users posting the bulk of information per second anonymously which poses concrete threats to sustaining stable national security [6]. Online disinformation is an ongoing situation that is currently defenseless and adds worry to regulating the flow of information violating the principle of free speech [7].
Information circulating through various means is not obliged to spread within secure parameters [8]. For example, information on social media may also hinder national security. Social media information acts controversially in information warfare. It is used as a handy tool by hacktivists and criminals for cyberexploitation, hacking, and extortion purposes [9]. Social media accounts and pages are critical to national security as millions of users interact commutatively at a given time providing immense exposure to national vulnerabilities and reputation damage.
Disinformation played a massive role in destabilizing national security measures without putting additional effort. It has become a partisan issue that has potentially paralyzed national actions plans [10]. The heaviest price for being online is paid through circulations of fake news also known as disinformation or spam information. However, all categories of information (disinformation, spam information, fake manipulation of information, partial information) are resulting in a peculiar mixture of apprehension and inaction [11]. Information is also flooded with foreign meddling depending upon the other national enmity and intentions to dysfunctional national security.
To prevent facing threatening situations, Artificial Intelligence (AI) plays its part in the digital developments and implications for society of the information revolution [12]. AI-powered social media information monitoring tools can contribute as social listening tools to confront social information profiles and audiences. The involvement of AI to interpret social data information at different scales can facilitate investigating what's being said in them along with extracting culprits based on that information [13]. AI as content smarter in dealing with content-generating bots with information actions inspection as illustrated in Figure 1 through a hierarchy of stages and its sub-domains and related fields.
This research article covers the role of information in national security concerning the availability of information accessible and available to the public while critically scrutinizing the impact and effects of cyberspace complicity. More precisely, the objectives and milestones of this article are enumerated as follows: 1.
Role of information specifically circulating on social media platforms concerning its effectiveness and potency on national security measures are potentially highlighted, discussed and analysed to pinpoint information role in national security.

2.
Cyber-space rivalries, cyber-attacks, cyberthefts, disinformation campaigns, and the potential risk of cyber-concerned factors are extensively discussed and explored to provide a broader and comprehensible vision to deduce substantial reasoning to measure and prevent national threats and attacks. 3.
AI stance and aspect for national security relief and assistance to fight against dis-informers and various cyber-divisions i.e. to discuss AI fight to tackle digital information war against national interest is another cardinal objective of this research article.

4.
Another objective is to disclose information circle for cyber-space violation that briefly discuss and highlight the interconnected linkages for traceability and tracking. 5.
A model to limit/control information is designed and presented for possible tracking and stopping of social media information that is targeting and destabilizing national security. 6.
Moreover, challenges and information gaps for national security are broadly and extensively covered to portray cyberspace violations with respect to national security. The proposed dendrogram presents broader picture of various connected recent factors of information flow and national security threats to diversify readers' vision. This article encapsulates a precise perspective of information's role in national security measures. However, the significance and novelty factors of this research article are as follows: 1.
The existing surveys are neither comprehensive nor they are based on Systemic Literature Review. Moreover, to the best of our knowledge, existing does not cover all aspects regarding information coming from social media and its menace to national security.

2.
The existing surveys are not up to date and do not include recent works on artificial intelligence in the field of information role and national security measures.

3.
Another significant aspect is Applicationspecific analysis of artificial intelligence approaches that is not provided in the earlier literature.

4.
AI Tool's categorization and analysis with respect to information flow specifically on social media is another distinguishing factor of this article that makes it different and significant from the rest of the literature viable so far.

5.
Information authentication and in-authentication model is designed and supported through a functional algorithm along with utilizing the AI frameworks through series of steps for tool assistance. 6.
The motivation and primary intention of this article for contributing towards knowledge is to comparatively analyse information and artificial intelligence towards national security to enlighten the threatening factors related to cyberspace violation, social media manipulators, and disinformation campaigns and their intensifying effects, measures and possible precautionary steps. The rest of the article is organized as Section II covers relevant background and literature review; Section III gives a detailed overview of systematic literature review parameters taken as a methodology with a brief knowledge of research questions and exclusion/inclusion criteria. Section IV, V, VI, and VII analytically cover the proposed research question along with supporting models and graphical representations. Section VIII concludes the paper.

II. LITERATURE REVIEW
The twentieth century has witnessed the most lethal and kinetic wars in the history of warfare and information sharing surfaces [14]. Whereas, the twenty-first century dawned with a multi-fold of information conflict that is on verge of bringing cyber-wars to destroy national security plans and features [15]. Physical wars with man force and weapons are now replaced with state and non-state actors to take control of significant places in cyber-space having aftermaths for the physical domain. Cyber-space freely allows these actors to extend their powers based on information manipulation corresponding to the social media domain at a much larger scale without any physical barrier. This was thought to be impossible earlier.
Social media is not only a technological life force that connects, informs and shares a common platform with millions of users, but also has the power of strong nonexistential attacks to strike national securities [16]. Social media has assisted people globally to organize and plan aggressive riots, recruit terrorists, plotting attacks, glorify national wars and gangs compilations, and spread violence in response to minor/major events [17]. The credit for such activities goes to the information circulation on social media that has affected national security plans at a greater rate. These strong transitional waves not only amplify disastrous action but also coordinate actions against government and law enforcement [18].
To control Information exchange, Information manipulation is in dire need this time. The world is on verge of being extinct with Peace if suitable measures are not taken timely and correctly. Artificial intelligence has shifted the paradigm and contributed to managing information needs on various social media platforms [19]. Artificial intelligence work through social media bots that spy through content smarter algorithms [20]. These algorithms act more swiftly than the opposing bots while learning, changing, and altering speed is way more dynamic. Real-time automated blocking is a better choice for creators as well as it allows smart blocking of users that target them with malicious attacks.
Cyber-space allows invaders to extend their powers in the social media domain with a much faster pace and ease which was considered impossible earlier [21]. However, Artificial Intelligence deals perfectly with state and nonstate actors to stop misusing the marketplace of ideas and beliefs on this battlefield of Cyber-war. According to USA Social media unit, information available on media brings tremendous threats to national security primarily relevant to social engineering, web applications attacks, and threatening to phish [22]. Due to such unforeseeable consequences, the USA has banned Twitter and Facebook officially at government organizations.
Information damages national security by destabilizing the national causes in terms of generating huge economic losses. In 2013, the social media of a wellrenowned Press group was hacked and released news about two explosions at the white house resulting in injury to President. This news was reached the US stock traders within two minutes and it dropped 143 points i.e. $136.5 billion estimated loss. Few other prominent and highlighted cyber-attacks to get and manipulate information are hacking email accounts of CIA Director John Brennan and James Clapper, Director of National Intelligence; the 2011 RSA SecureID Cybersecurity attack; the 2016 Democratic National Committee email leak and the mysterious 2014 Sony Pictures hack, Brexit campaign, US elections by Cambridge Analytica [23]. Another prominent and most recent cyberspace violation with potential intervention for derailing national security was Google+. Google+ came to an end after 500,000 Google+ users data security was compromised when the private information of such a huge amount of users was breached raising shocking results afterward [24]. Many government officials were reported to be blackmailed after this incident reporting.
Information solely impacts the national security as crucial information like enemy's logistics, operational elements, training schedules and institutions, weapon ammunition details, army sensitive movements along with sensitive defence catalogues are majorly taken from social media through cyber-space violation [25]. Informationdriven companies are suspiciously getting monitored and information can spread swiftly while bringing the negative impact of believing false information about national security. National security is on the verge of getting playful in the hands of anti-national movements that stays hidden while effectively targeting desired National interest.
Information-bearing element pressurizes the policymakers to react to domestic and international security differently that resulting in affecting national plans differently [26]. Instead of imposing bans on social media usage, national security agencies should implement information controlling laws that can restrict and filter information sharing capabilities of social media. This factor is only accomplishable through Artificial Intelligence discussed in detail in the following sections. Figure 2 illustrates the information cycle in cyberspace and how social media is relevant as an integral part of it. Social networking applications and social systems informatics are in a coordinated bond to facilitate data synthesis, data manipulations, and third-party data sharing. Social systems informatics administers data sources and frequency closely functional with networking applications. It is more like a highly connected feature in which one information sets trigger others and the loop continues until a suitable audience is targeted and informed. While social networking application facilitates and provides users account information, their shared information along with search and interest history. Most importantly, audio/video and text retrievals hold credible information to utilize against national security [27]. This set of information also helps in manipulating a user for fraud, blackmailing, and sometimes using a person against national interest [28]. As shown in Figure  2, the other two primary factors are social networking databases and data feed & exchange. Information in an organized form creates a database.
A social networking database provides complete sets of linkages that exist between millions of users. For example, a database for all residents of Oman is supposed to have the same data linkages and can be broadcasted with desirable information within a matter of seconds based on factors such as age, racial and ethnic groups [29]. Any information intended to manipulate can be spread based on such links while risking national security and national action plan. Figure 2 also presents social networking databases contribution toward future data predictions, activity tracking, market trends, and users response rates in response to any national threats. Data feed features extend national compromises. Even if a resident of a country lives outside the country's premises, a data feed still reaches through a mobile phone based on data links to trigger outrage. This factor is also accomplished through thirdparty data shares without consent [30]. The power of social media has unearthed the socially constructed information bombs that can act as a targeted disaster for national security within a few seconds while costing nothing.

III. METHODOLOGY
This study has been undertaken as a Systematic Literature Review (SLR). This review entails a thorough, transparent, and replicable process for literature search and critical analysis. SLR as a methodology allows incorporating quantitative reasoning for the research questions with valid supporting arguments to build better research subjects. The SLR process is guided by [31] recommendations. The review process catered from [31] is followed as (a) Scoping (b) search and analysis (c) peerreviewed papers selection guided by research questions. The research questions are designed to fulfil the current and latest subject of study. Research questions are formulated below.

Social Networking Databases
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3183642 RQ3: What are the current and future risks of cyber-attacks, cyber-space manipulation, and cyber-wars resulting from Information driven media? 4.
RQ4: How Artificial Intelligence is acting paramount to national security for accomplishing competent information role and acting as a saviour for national security?

A. SCOPE
The review is designed to scope only papers that specifically use the term 'Information' and 'National Security. This scoping allows a better and targeted review of our area of interest within the role of information for national security along with AI applications in such cases. According to [31] defined SLR recommendations, identification of synonyms and alternative terms are given in Table 1. Search terms are the query words that are used to dig out peer-reviewed research articles. There is a lack of definite systematic coverage of work on the role of information for national security, but this factor does not limit the interpretation of the findings. Alternatively, we have considered the closest general literature for our proposed area of study. The relevance and clarity are checked by readings abstracts and concluding points of articles. The complete coverage of inclusion and exclusion criteria with stats of articles on elected journals are given in Figure 3. Figure 3 shows various parameters based on title-based rejections, abstract-based rejections, and selection based on a general and detailed study of selected research to cover a credible and broader area of research.

B. SEARCH AND ANALYSIS
For comprehensive search and analysis, relevant peerreviewed literature is searched on credible search engines i.e. Google Scholar, Scopus [32], and Web of Knowledge [33]. As far as operational criteria for filtering are concerned, we have excluded papers where definite usage of information among national securities was of least concern. Secondly, articles with generic discussion in response to our query terms are also excluded. For inclusion, papers with combined use of 'Information' and 'National Security' and clearly stating our intended purpose of research are considered.

. Exclusion and Inclusion Criteria
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3183642

C. OVERVIEW OF REVIEWED PAPERS AND REFERRED WORKS
The earliest identified research article on the role of information in national security is almost 20 years old. However, the majority of the papers are considered from 2010 to 2021 to mainly target the digital era. The complete coverage of query responses and stats of articles on elected journals are given in Table 1. Table 1 also illustrates the publications years of the selected papers with their conferences and journals categories differentiations.

IV. INFORMATION & ITS IMPACT ON NATIONAL SECURITY
Information significance can be determined through the extent of being lethal on the fact that how fast the information can spread and how greatly the impact of believing false information can bring destruction to national security [34]. The huge relevance of social networks and the information available to them are the global setbacks that spurred the interest of national policymakers in response to retaining security [35]. The tremendous influence and pressure through information from social media platforms like Twitter and Facebook can conceivably derail domestic and international relations within less or no time [36]. The global national lawmakers believe that instead of denying the effective applicability of social media information and dismissing social media for being highlighted as a threat to national security, one should ensure the information sources and its credibility before it can reach every citizen [37]. Information can be scrutinised and validated before it can be made available to the entire nation for better prevention of any actors wishing to spoil national securities [38]. It is desirable to locate whether the information circulating through social media should be considered trustworthy to root out its validity and credibility.
Information circulated through convention ways and Cyber-ways hold different spreading strengths and aftermath results [39]. The cyber-warfare has moved information sharing capabilities of a common person beyond controlling powers [40]. Change in audience and platforms now become a weapon of choice for national anti-security agents. Enabling information sharing capabilities to every person in use should be passed through defined filters to protect any negative and unforeseeable circumstances [41]. AI has the potential to apply filters and scrutinized the desirable checks on information to possibly control the national security plans and measures described below.

A. UNDERSTANDING AI-NEEDED FRAMEWORK FOR NATIONAL SECURITY
Online social networking is consistently showing explosive annual growth. After becoming the most widely used and adaptable information source, it caters a great deal to national interests [42]. Targeted advertising and viral marketing are introduced to exploit social information without prior checks and scrutiny [43]. False information tends to spread faster because re-sharing facility available on media platforms. To remove false information requires removing it from all associated people who already have shared it. Removing threatening information is a seemingly tedious task, but eradicating its impact on people is much more threatening as well as challenging [44]. The everyday lives of people increasingly depend on online access to information and its related services. The manipulation of social media users through cyber-space is efficient yet convenient [45]. The dire need of differentiating between authorized and unauthorized information sources can significantly help to stop misinformation in the first place. Information can be made stoppable and accountable by incorporating very easy checks proposed in figure 4. In figure 4, we have proposed a simple model that can act wisely to limit the spread of information to limit national compromises. As per the Model, Information is derived from two sources 1) authentic sources such as approved users, national organizations, and government-owned media channels. 2) in-authentic sources such as millions of social media users and privately owned information broadcasting groups. In-authentic sources are effectively subjected to AI frameworks based on the requirement. Social media information is not only text-based. It also originates from Images, videos/visuals, and speech/audio contexts that can be significantly monitored through AI frameworks highlighted in the proposed model. After passing through extensive filtering and checks, information can either be approved (allowed to share by potential users) or disapproved (dumped). Detailed Algorithmic functions are described in Algorithm 1.
Declare I as Authentic 8.
If The AI frameworks proposed in the model can cater to issues like false information spread, anti-national users, stability threats, and filtering of information. This model encapsulates every information context i.e. Sources verification, content and text analysis, image and speech classification, and knowledge built-ups all collectively powered by AI mechanism. Moreover, it can also help in locating the source of information. In-authentic sources should always be checked before they can perform a certain action. AI mechanisms used in our model are discussed in the section below.

B. AI-BASED SOURCE IDENTIFICATION MECHANISMS
The source identification and information origin locating are critical factors to target the potential source of misinformation to snub them before they reach millions of users [46]. The social media accounts holder that is maliciously involved in cyber-space violations are hard to track and thus continue their anti-national mission to destabilize the actions plans [47]. The fear of getting caught and being traced is vital in counter-attacking such sources and tracing their backend supporting bodies. AI-based source identification mechanisms can add great support for the tracing and locating features [48]. AI mechanisms have facilitated the tracing of data sources and their relative linkages with greater ease from the larger sets of data in seconds [49]. AI has penetrated its roots for tracing social media information and provides source trees for better traceability features in a matter of seconds. A large number of users were once difficult to manage and now AI introduces a mechanism that brings better traceability with high data volumes [50].
AI provides possible support to accurate mechanisms handling that shows great potential that information sources/users can easily locate out of millions of users. Few such mechanisms are:

1) ARTIFICIAL NEURAL NETWORKS (ANN)
for everything that is not meant to be easily tracked can be easily sorted out through neural networks. ANN proposes tools where humans are allowed to handle architectural decisions while optimization and traceability features are controlled and performed by networks mechanisms. ANN helps to develop associated links along with optimizing networks [51] [52].

2) SCIKIT-LEARN
It underpins unsupervised learning calculations to create choice trees and bunching group illustrations. It presents a very calculated and targeted order with an additional feature of information change. Information change at any stage can also be traced through feature determination and ensemble techniques that can be accomplished in a couple of lines and less time [53].

3) THEANO
It enables information counts up to multiple times to give calculated figures about how many times a piece of information is shared. It eases complex computational tasks for locating the number of users. A very essential feature to discover the severity of information spread [54].

4) MXNET
It is useful to tackle the whole set of new host devices and newly entered devices to align with a communitydeveloped framework [55].

5) KERAS
For image recognition problems and picking a suitable architecture, Keras can contribute well. Information sources available on social media are not only broadcasted and shared in textual format. Images are equally threatening for cyber-space violations [56].

6) H20
This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022 Risk and fraud analysis is a much-needed feature provided through H20. It used predictive analysis, insurance analytics, and advertising applications along with customer intelligence. Customer intelligence allows keeping activity records to produce required results without running extensive search activities [57].

C. NATIONAL SECURITY AND CONTROLLED INFORMATION PROCESSING
One of the prime advantages of social media is that it allows the government to share critical information in a crisis. One such incident is that benefitted the government reported in Turkey back in 2016 [58]. Turkey's president Erdogan used social media to beat military tanks through a powerful source of information to call the Turkish nation. Successfully, Turkish rebellious attempts were suppressed and Erdogan managed to sustain peace [59]. Reportedly, the plotted rebellious act was largely communicated and circulated through social media. After surfacing such events, national security measures of different countries started taking different measures. Globally, the information controlling measures of social media to prevent national security varies and holds different choices and preferences. Some of the countries seem to be rigid while others are a bit relaxed in this regard. For example, China and North Korea are the top listed countries for controlled social media and all other heavily censored information-seeking platforms [60] [61]. All information passes through strict barriers before it could reach other audiences.
Moreover, these countries also impose penalties for the user violating the national security plan. Iran is another prominent country that strictly blocked all social media platforms along with heavily censoring political media to secure national stability. After North Korea, China and Iran, there are other countries like Belarus, Qatar, Syria, Thailand, and UAE that are rigid in heavily filtering the information being spread to deal better with national security [62]. Europe has also imposed suitable restrictions [63]. These countries have restricted social media as well as strongly monitored communication application barriers that limit information sharing rapidly and in controlled measures. Above all, most of the Gulf States have already discontinued wi-fi calls to keep stronger checks for stabilizing national security [64].

D. DIFFERENT POSSIBLE ATTACKS
Social media data and information is not the only factor that facilitates national security compromises. There are other different possible attacks by which national security hamper. The different possible attacking factors are however information driven majorly. For example, text messages, voice calls, fax, emails, pamphlets, printed information, and various other print media resources. Aforementioned sources are separate from social media but they are vital and strong enough to provide support to attacks and destabilise national security. Information dissemination sources either from social media or outside social media disturbs the national interest equally.
However, social media works with fastest pace in comparison with other means.

V. INFORMATION EVOLUTION OVER THE COURSE OF TIME
In less than a generation, information exchanging platforms have significantly evolved from merely a timeconsuming electronic exchange to virtual real-time efficient 21 st -century information centred tools [65]. Within a few years, social media has affected the lives of billions of people. We are now living digitally transformed lives where information is acting as one of the leading factors in driving how to lead a life. The 1980s and '90s are considered to be a prominent era where emails and online servers like America Online [66], Prodigy [67], and CompuServe [68] acted as networking platforms but were somehow lesser-known and only limited to online chatting. At the earliest of 2000, Friendster [69] came as an attractive platform for millions of users and was limited to basic online interactions. 2002 was LinkedIn [70] launching year in which career-minded people were hosted that is now grown to more than 675 million users worldwide. However, this site only targeted job seekers interests and did not facilitate information violating national concerns.
2008's Facebook, 2011's Myspace, and 2012's Google+ acted as pivotal mediums for Information exchange mediums [71]. Within a short time, 72% of U.S adults use social media platforms and share information without any checks and filters. It is astonishing to note that 6000 tweets are sent per second which is 350000 per minute and 500 million per day and 200 billion per year [72].
Information evolution is not restricted to merely users' profiles platforms but has broadened its dimensions towards streaming videos platforms and weblogs and Blogs to provide a sense of being authentic and genuine [73]. For example, information exchanged by personnel users might not stark a controversy as swiftly as a blog owned by a well-renowned media agency can do. Various video-based channels can destabilize too.
During the pre-social media time when information was communicated to inform others and never meant to be manipulated. Most of the time, newspapers, magazines, and journals were distributed once a day and thus any details and information is supposed to reach after hours. There was a penalty of time to check the authenticity of information [42]. Now, the case is different. Information spreads more quickly than information negating the previous information.

A. INFORMATION AGES AND COURSE OF ACTION
There are two information ages i.e. Primary information age and secondary information age. The primary information age is about the era before the internet and is mainly comprised of newspapers, radio, and television [74]. Mostly, the information sector was governmentowned and excellently controlled, and slow. The secondary information age is the era of the internet and satellite television. Information sharing is based on quick

FIGURE 5. Course of action for information ages
platform that is privately owned without any filter, controlling checks, or government intervention [75]. The tertiary information age is the current era that is connected with mobile devices with millions of users having the liberty of sharing information without prior scrutiny. In other words, viral advertisements and hypegiving content are greatly supported to destabilize national security plans [76]. The tertiary information age is potentially threatening as well as risking nation interest with greater intensity. To compete with transforming information ages, Figure 5 that illustrates a four-step plan of action that vigilantly performs its action to deal with the tertiary information age as follows:

1) ACTION
The very first step is Action, which needs to be functional based on real-time response. Action to locate users and interpret their social activities against national interest can eradicate anti-national movements from the very beginning. Locating and tracing connected users that might be acting as co-culprits can also risk down the potential source of cyber-space violations.

2) PLAN
The second step is planning before executing a strategic national action plan. This step is based on national objectives and agenda. Planning a suitable course of action can contribute to prediction analysis for future correspondence. Above all, Targeting and rooting out the strengths and weaknesses of attackers are other aspects gained through accomplishing this step.

3) STRATEGY
National strategic measures are vital and confidential in sustaining security and dealing with upcoming changes. Define strategy and make it confidential to attack hidden action plans. The robustness of strategic measures helps retain flawless security.

4) AI TOOLS
AI-based tools as described in the model are corrective and the right use can contribute to locating anonymous activities [19]. Monitoring activities and catching culprits with suitable penalties can lower the risk of future setbacks. Above all, AI tools can also ensure the measurement of success ratios against implemented national security plans. Refer to IV (B).

VI. CURRENT AND FUTURE RISKS OF CYBER-SPACE VIOLATION TO NATIONAL SECURITY
There are many current and future risks of cyber-attacks, cyber-space manipulation, and cyber-wars resulting from Information driven media. Things are inevitably going out of hand because of severe cyber-space violations [77]. The most important area greatly affected is national securities. Physical wars are now shifted to virtual cyber wars where demoting a country's national progress and agenda is much simpler than using deadlier weapons and actual armies. Currently, social media has reached 5 billion mobile devices users worldwide [78] and the network has anchored its roots deeper to feed users minds within minutes. These information spilling devices are being carried by users wherever they want hence assuring information accessibility at its best and situation as worst for cyber-attacks [79].
Specifically, government and army officials are high targets when it comes to stealing sensitive information for targeting national securities [80]. The current fact is that our digital lives appear to be completely and utterly susceptible to cybercriminals and spies. A flurry of cyberattackers is clinging to the biggest national organizations to get sensitive information that matters most for the country's dignity and security [81].
Among various risks of cyber-space violation, few risks are shaking the securities parameters with greater ease. Ransomware Apocalypse is one of the keys and the popular phenomenon of cyber violations [82]. The malicious global attackers ask for a healthy ransom with a threat to share the information publically if conditions are not met. Cyberspaces violations are also posing a certain risk in dealing with global cyberspaces. Every cyberspace is following different standards and protocols [83].
A recent example is the U.S Intelligence 'SolarWinds' hack 2021 [84] in which hackers gather untold extent of intelligence information from the U.S government and sensitive sector to do blackmailing in response to huge ransom. SolarWinds hack involved targeting three vital US firms (SolarWinds, Microsoft, and VMWare) along with 12 federal agencies (NASA and Federal Aviation Administration) as per reports by Cybersecurity and Infrastructure Security Agency (CISA) [85]. This attack was initiated to destabilize the US reputation and exposed the secrets vital for retaining USA national securities [86]. Figure 6 illustrates in-depth challenges, AI and information gaps for national security recently. There are eight highlighted factors. Social Media Violations is accountable for creating a suitable and skilled team that can effectively deal with any possible threats [87]. There is a suitable gap in expertise levels to prudently deal with social media attacks [88]. Undoubtedly, manipulators that use social media platforms to create information threats are skilled with high technology specs. To deal with such an expertise level, a higher and more compatible team is needed to cancel the threatening effects [77].  Information hacks and theft are another way to risk national security. The planned course of action by the national agency is threatened with theft which makes hackers more powerful to counterstrike the national plan [89]. Action plan exposures are dangerous and cause invisible information flows. Even if the information is stored through suitable encryption and decryption features, stolen cryptographic keys are altered to reveal the information [90]. National Strategic Design is another integral factor that contributes to information manipulation [91]. Quality Compromises along with strategic complexities are possible leading causes. Secondly, maliciously induced delays for strategic actions also allows information to spread that causes potential harm and results in cyberspace violations [92].
Social media handling also contributes to achieving better national security. Malicious and unidentifiable users, third-party access, localization breaches, and trust management among internationally developed social media links are adding threatening elements to national security [93]. Geographical differences (time zone and language barrier) are also vital factors necessary to fix to have stable national security [94].
National Security Plans are established with poor compatibility and inefficiency to deal with global threats. Implementation challenges to executing a defined plan is another way to allow a malicious user to perform their This article has been accepted for publication in IEEE Access. This is the author's version which has not been fully edited and content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2022.3183642 actions freely [95]. Time liberty is itself a very tedious act that directly facilitates intruders.
Cyber space violations include crossing defined boundaries, hidden participants, and incompatible social perspectives for cyberspace predictions. Cyberspace predictions are necessary to anticipate the next possible manipulator's action that might risk national security [96]. The lack of Information standards to do such predictions is also adding alarming situation.
Information and Security Breaches in terms of data duplication, data updates, data cloud failures, data storage, and data shifting are very critical actions that unknowingly facilitate security breaches. Lack of communication standards is also a contributory factor to information and security breaches.

VII. ARTIFICIAL INTELLIGENCE TOOLS FOR NATIONAL SECURITY
Artificial Intelligence is acting paramount to national security for accomplishing competent information roles and acting as a saviour for national security [97]. AI is an inspiring technological platform that is the most powerful tool in generations for benefitting national security [98].
AI is not limited to improving human life for natural problems. IT has broadened the ways of looking into unlocking mysteries that seemed to be impossible and now are game-changing superpowers [99].
AI has anchored its roots in social media-based platforms due to its diverse set of applications and amenities. Table 2 is covering various tools with their purpose and possible applications that can cop-up many of the issues identified above. These tools are providing a solution to many of the current cyber-space problems and are acting as guarding agents against anti-national factors. Every tool identified is unique in its nature application and purpose [100]. These tools are subjected to desirable feature extraction and edition too based upon user selection of choices. Table 2 Tools are Artificial Intelligence-based and contribute to automating many tedious tasks highlighted in Figure 6. These tools are making social media management controllable along with larger-scale social media monitoring. AI enables social media and its relevant information to better understand national preferences [100]. AI helps to target and eradicate threatening factors effectively and conveniently.

Tool
Purpose Preferred Application Areas DeepText [101] To understand conversation better for information processing, Translation of different languages Social Media applications specifically Facebook FBLearner Flow platform [102] To run thousands of user classifications along with content understanding Primarily developed, used, and adapted by Facebook MonkeyLearn [103] To gain insight from social media Text data.
Natural language processing based social media applications Aylien [104] To deal with large volumes of real-time content from the new outlet and social media content Academic publications, New reporting applications, entity extraction, and sentiment analysis platforms IBM Watson [105] To deal with information available on Clouds based on extracting keywords, categories, and entities.
Specifically designed by IBM to tailor industrial information needs and dive documents.
TextBlob [106] For text classification, part-of-speech tagging Excellent, easy, and user-friendly interface for easy and beginners applications. GenSim [107] Recognizing text similarities, text indexing, and navigating text documents.
For handling large volumes of data that needs a fast and scalable solution. FAIR [108] Facebook Artificial Intelligence Researchers tool to analyze and develop AI systems with the intelligence level of humans.
For AI-based research and innovation. Specifically, Facebook (a social media application) uses FAIR. CRM [109] AI-powered automation platform designed for scheduling a call and other audio-aided features.
Every social media application allows users for making/scheduling a call thus it is used by almost all current applications. Chatbots [110] Intelligent and self-supported auto answer generator (in response to user questions).
Specifically used for automated customer help, and widely used in online selling and buying websites. rasa.io [111] For one-to-one conversations for millions of contacts Marketing, subscribing, and other broadcasting applications.

VIII. CONCLUSION
Artificial Intelligence is revolutionizing the information role with its applications and helping solve complex cyber-space problems. AI can provide social media users with real-time information personalization based on their intentions and behaviour. It can be used to edit, forbid, and locate anti-national campaigns to meet national security needs. AI can also help with content scrutiny to find matches of anti-state agents, the national cyber-criminals, and security plan spoilers. It can be used to handle routine tasks like performance analysis, anti-state campaign reports, and much more. In our article, we have identified AI tools that can help to process social media information to protect national security in a better way. We have identified initial ways of manipulating information to derail national security with current and most recent attacks meant for shaking national security parameters and plans. This paper briefly covers how information can critically get involved in sensitive information retrievals, spreading disinformation, creating spam to drive users' minds falsely, and possible privacy theft for blackmailing purposes with ample examples as limitations of current functional areas.
All the content covered in this article is catered through Systematic Literature Review (SLR) to deduce credible and authentic arguments in response to formulated research questions such as information impact on national security, information evolution, current, and future risks of cyber-space violation to national securities with specifically highlighting Artificial Intelligence as a saviour for national security. In the last section, a list of tools vital for information investigation and analysis with its purpose and application area are given to facilitate readers better for information usage and prevention for retaining national security.

IX. FUTURE DIRECTIONS
The possible future course of action for upcoming researchers is to establish all-purpose multi-functional information handling tool for information flow that can help in sustaining better national security measures. Secondly, another future direction is to draw testified and traceable parameters to meet security standards with respect to information coming from social media platforms. These parameters can help to establish accountable measures to catch national threats before they can harm security plans.