Skip to content

Bytes and Bullets: Terrorism’s Technological Transformation Tactic

Introduction

The emergence of technology in the past few decades has significantly transformed terrorism.  Previously, it was confined to the tangible and practical acts of violence such as killings, bombings, hijackings, or assassinations. These actions were orchestrated to induce terror in the general population and persuade the government to achieve its ideological and political objectives. The digital revolution has expanded the operational capability and organisational capacity of terrorists which constitutes a new challenge to the national and international security framework.

Content Creation and propaganda

The current generation of terrorists are proficient in using social media platforms to disseminate their content. Platforms like TikTok, YouTube, Facebook, and X (Twitter) have been inundated with extremist content generated and shared by terrorists.[i] ISIS utilises Telegram and several social media platforms to share Telegram links of content files to disseminate its message globally and garner support for its purpose.[ii]  They create sentimentally manipulative and compelling videos, audio, pictures and digital magazines with powerful graphics to appeal to the audience’s emotions therefore legitimise their actions.[iii]

Radicalisation and Recruitment

Digital media platforms and private communication applications have emerged as instruments of radicalisation and subsequent recruitment.[iv] Terrorists employ social media platforms such as Facebook, WhatsApp, and  X(Twitter) to specifically target young individuals along with establishing their virtual communities. This virtual community operates as an echo chamber, reinforcing and solidifying extreme opinions. Some radicals are prepared to be recruited, while other impassioned radicals voluntarily join the terrorist ranks to achieve their ideological ambitions.[v]  Recruited individuals are provided with virtual training, which includes the creation of explosives and the planning and execution of a terror attack, through specific modules.

Communication

Throughout history, terrorism has traditionally depended on meetings in person, operational preparation using paper and maps, and the distribution of paper scripts containing secret codes for hierarchical communication within the organisation and among its members. The advent of technology has fundamentally transformed the approach of terrorist organisations such as Al Qaeda and ISIS, as they now strive to establish global networks of followers with the aim of targeting any nation at any given moment. Terrorist groups employ encrypted messaging applications such as WhatsApp and Telegram to facilitate communication regarding attack plans and the exchange of operational information, thereby impeding surveillance and interception efforts by security authorities. Operational techniques involve the utilisation of mobile phones to remotely trigger improvised explosive devices (IEDs).[vi]

Cyber-Terrorism

The advent of cyberspace has exposed a realm of potential vulnerabilities and susceptibility to cyber-terrorist attacks. Cyberterrorism is an appealing choice for terrorists to cause destruction by infiltrating government websites and disrupting vital infrastructure, as such denying access to essential services. Cyber terrorists have the ability to exploit a wide range of tools that are accessible for engaging in cybercrime. They can leak sensitive data, disrupt the power grid, or disable banking systems. This can also serve as a method to instil anxiety and fear throughout a state in order to pressure its governing authorities.[vii] Groups such as the United Cyber Caliphate and the Ansar Caliphate army have aligned themselves with the Islamic State and seek to establish a “digital Caliphate” by attempting to engage in such acts of cyber terrorism.[viii]

Terrorist Financing

Due to vigilant and stringent international financial monitoring, terrorist organisations that raise funding through drug sales, donations, and bank transfers have been brought to the forefront. As a result, cryptocurrencies such as Bitcoin have emerged as a means of raising funding for terrorism.[ix] Cryptocurrency enables pseudonymous identities for both the sender and the recipient while transferring funds.[x] This method complicates the process of being recognised by enforcement agencies.  In addition, they utilise the dark web as a means to engage in illicit transactions involving weapons and narcotics to generate financial resources. This approach evades the conventional financial system, raises finances, and facilitates the activities of terrorist organisations.

Conclusion

The purpose of technology was to enhance and improve society. Unfortunately, it has also been exploited by acts of terrorism. Terrorism has acquired a clandestine dimension and camouflaged its true essence. The advent of digital technology has profoundly transformed terrorism, expanding its reach beyond geographical boundaries and turning it into a worldwide phenomenon. The anonymity feature presents safety concerns on an international scale.  This necessitates a call for a collaborative effort at the individual, societal, national, and global levels. It is essential that individuals demonstrate digital literacy, awareness, and vigilance in order to prevent terrorists from utilising digital technology for their operational and organisational purposes.

Endnotes

[i] Sam Shead, “TikTok Used by Islamic State to Spread Propaganda Videos,” BBC News, October 22, 2019, https://www.bbc.com/news/technology-50138740.

[ii] Moign Khawaja, “Telegram: The Mighty Application That ISIS Loves – PART II,” VOX – Pol, June 13, 2017, https://voxpol.eu/telegram-mighty-application-isis-loves-part-ii/.

[iii] Pablo Rey-García, Pedro Rivas-Nieto, and Nadia Mcgowan, “Terror in Pictures: Dabiq, a Graphic Analysis,” 2023, https://www.google.co.in/url?sa=t&source=web&rct=j&opi=89978449&url=https://dialnet.unirioja.es/descarga/articulo/9286042.pdf&ved=2ahUKEwihtf-At6GGAxWJSmwGHQ6TDuUQFnoECBEQAQ&usg=AOvVaw2X4hSLkt8XdMSgLOnRJ6xG.

[iv] National Investigation Agency, “NIA Files Charge Sheet in LeT Online Recruitment Module (RC-20/2020/NIA/DLI),” www.nia.gov.in, September 11, 2020, https://www.nia.gov.in/writereaddata/Portal/News/620_1_Pr.pdf.

[v] CYBER TERRORISM & JIHAD LAB, “Syria’s Hay’at Tahrir Al-Sham Lists Accounts on Encrypted Platforms WhatsApp and Telegram as Contacts for Upcoming Training Courses,” MEMRI, May 20, 2024, https://www.memri.org/cjlab/syrias-hayat-tahrir-al-sham-lists-accounts-encrypted-platforms-whatsapp-and-telegram-contacts.

[vi] Claudia Jematia, “The Use of Internet, Other Cyber and Digital Platforms as Well as Digital Devices to Support and Commit Acts of Terrorism in Eastern Africa,” www.unodc.org, August 2021, https://www.unodc.org/documents/easternafrica/TOC/UNODC_Issue_Paper_2021_The_Use_of_Internet_Other_Cyber_and_Digital_Platforms_as_well_as_Digital_Devices_to_Support_and_Commit_Acts_of_Terrorism_in_Eastern_Africa.pdf#:~:text=URL%3A%20https%3A%2F%2Fwww.unodc.org%2Fdocuments%2Feasternafrica%2FTOC%2FUNODC_Issue_Paper_2021_The_Use_of_Internet_Other_Cyber_and_Digital_Platforms_as_well_as_Digital_Devices_to_Support_and_Commit_Acts_of_Terrorism_in_Eastern_Africa.pdf%0AVisible%3A%200%25%20.

[vii] Gabriel Weimann, “Cyberterrorism: How Real Is the Threat?” (United States Institute of Peace, 2014), https://www.usip.org/sites/default/files/sr119.pdf.

[viii] Eleni Kapsokoli, “ISIS’s Digital Jihad Preparation(Volume 24, No. 3, 2023.),” www.nsf-journal.hr, 2023, https://www.nsf-journal.hr/online-issues/focus/id/1486.

[ix] U.S. Department of the Treasury, “Treasury Designates ISIS Cyber Facilitators and Trainers,” home.treasury.gov, March 1, 2024, https://home.treasury.gov/news/press-releases/jy2056.

[x] U.S. Department of Justice, “REPORT of the ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE CRYPTOCURRENCY ENFORCEMENT FRAMEWORK,” Www.justice.gov, October 2020, https://www.justice.gov/archives/ag/page/file/1326061/dl.

Blog by:

Hitaishi Bharti, Research Intern, USI, CS3

219 Total Views 2 Views Today