Over the decades, cyberspace has become weaved into the very foundation of routine life, permeating all parts of modern human society. Aside from the huge benefits and opportunities provided by cyberspace, it has additionally evolved into a source of threats and weaknesses. Threat agents are diverse and include both state and non-state actors.
Non-state actors thrive in cyberspace due to its lack of borders, anonymity, low entrance barriers and operation cost. Terrorist organizations, criminal networks, and hacktivist groups use online platforms to spread propaganda, recruit new members, and radicalize people.
Cybercrime, such as financial fraud, identity theft, and hacking, thrives on the internet, with perpetrators targeting individuals, corporations, and governments for illicit benefits. Cyberspace dangers include hacking, cybercrime, and espionage, as well as far-reaching attacks on key national infrastructure that can inflict disruption, destruction, and even human loss. Social media weaponization, fundraising and dark web operations all demonstrate how non-state actors exploit the internet. Al-Qaeda has been a vital hub of the global jihadist movement since its formation in 1988. Al-Qaeda has evolved, to become a global jihadist network, and a franchise group for Salafist jihadists all over the world (Vasiliev, & Zherlitsyna, n.d.). The experience of fighting in Afghanistan and Syria has broadened Al-Qaeda’s relationships, and given the global proliferation of jihadist groups, it now has a wider and more robust network. With online multiplier effects, the Internet has emerged as a vital medium for Al-Qaeda and other jihadist factions conducting their so-called Digital Jihad across the Middle East and globally.
Al-Qaeda’s core advantage is not in its global infrastructure and membership, but in its unifying and highly appealing ideology (Gunaratna, 2005). According to its initial mandate, Al-Qaeda’s primary goal now is to motivate and instigate Islamist movements and Muslim majority around the world to target those seen to be enemies of Islam. After Bin Laden’s death, Ayman al Zawahiri took over as the leader of Al Qaeda. He professed three main foundations of Al Qaeda’s ideology and told them to apply in events in Iraq and elsewhere (Congressional Research Services, January, 2005). The “three foundations,” as outlined by Al Zawahiri are as follows; The Quran-Based Authority to Govern, The Liberation of the Homelands and The Liberation of the Human Being. The aforementioned principles were reaffirmed by a video message in June 2005 by Al Zawahiri which were in contrast to secular and religious reform ideologies voiced by other Muslims masses as well as United States support for democracy (Congressional Research Services, January, 2005).
Before the internet, Al-Qaeda used a number of traditional communication tools to spread its beliefs and operations. This includes the dissemination of written materials such as pamphlets, bulletins, and magazines via mosques, academic institutions, and supportive community organizations (Smith, 2005). Furthermore, the organization profited from the spread of audio and video recordings depicting significant leaders such as Osama bin Laden, frequently using courier networks for distribution (Jones, 2003). Arab satellite television networks, most notably Al Jazeera, served as a forum for Al-Qaeda to spread its message, frequently broadcasting exclusive interviews with its leaders (Brown, 2004). Interpersonal contact and personal networks were critical in spreading Al-Qaeda’s message and recruiting supporters. Camps for training and jihadist networking acted as centers for radicalization and recruitment, while high-profile terrorist actions, including the 1998 U.S. embassy bombings and the 9/11 attacks, catapulted the group into international prominence (Davis, 2002). Through these established avenues, Al-Qaeda gained prominence and global influence.
For a long time, Al Qaeda has had a significant social media presence. Extremist groups use popular social media channels to share propaganda, recruit followers, and spread their ideologies. They may create official accounts or use existing ones to reach a wider audience. While some of the group’s official websites have been taken down, the group and its supporters continue to utilize social media platforms to broadcast propaganda, connect with followers, and recruit new members. Most Al-Qaeda content is still widely available online, especially since security officials have been focused on blocking the flow of propaganda from the Islamic State. Al-Qaeda sermons and films are often republished online; entire channels on encrypted chat applications are dedicated to repeating archival content. Previously unreleased footage of Al-Qaeda leaders is turned into new videos, giving the idea that these slain warriors are still speaking out. Terrorist organizations such as Al Qaeda have increasingly used chatrooms to spread their propaganda. Before 9/11, Al Qaeda had a single website that was solely published in Arabic. Almost 4000 openly jihadi websites now contribute to al Qaeda’s global presence as an ideological organization (Rabasa et al., 2006)
The Internet’s greatest advantage is its anonymity. Terrorists have created powerful encryption tools and innovative tactics that allow the Internet to be an efficient and reasonably secure means of communication. For example, terrorists online use Steganography, where communication and chats are hidden in graphic files, and dead dropping where information is sent through email drafts in an online email account accessible to anyone with the password (Eben Kaplan, 2009). Additionally, the Internet provides a huge arena of potential recruiters and donors. Terrorist fundraising online has become so ubiquitous that certain organizations can collect donations through popular online payment sites, such as PayPal. A special report prepared by the USIP identifies eight ways in which contemporary jihadist militants exploit the capabilities of the Internet, notably for psychological warfare, propaganda and publicity, data mining, fund-raising, recruitment and mobilization, group networking, sharing information, and for planning and coordinating actual attacks (Rudner, 2016). Looking at recent incidents of Al Qaeda, they use the internet to directly target terrorist activities which have a multiplier effects for global jihad, most notably inciting terror, recruitment of jihads, training of militants, terrorism financing, terror operations, and cyber-warfare.
The internet has incredible recruitment power. Not every youngster is destined to trade in their toy gun for an AK-47, as radicalization is a multifaceted process that typically takes a long time. Based on a New York Police Department research, an individual must first be exposed to extremist ideology, then consciously identify with it, before submitting to a lengthy process of rigorous indoctrination (Dornbierer, 2011). Those vulnerable individuals who make it through this procedure do so owing to the presence of an incubator, which is a place or platform that gives extremist ‘fodder’ or fuel to exacerbate the situation. It’s not surprising, therefore, that the internet is playing an increasingly important role in radicalization; it’s a readily available incubator that gives a lot of powerful content with only a few clicks. Terrorist websites frequently serve as virtual training grounds, offering tutorials on how to construct explosives, fire surface-to-air missiles, fire at soldiers, and much more (Dornbierer, 2011). Extremist forums and message boards provide a space for like-minded individuals to connect, share information, and plan activities. These platforms can be used to radicalize individuals and coordinate offline actions. Terrorist websites also provide messages and propaganda movies that seek to boost morale and expand recruitment and fundraising networks. As-Sahab, Al-Qaeda’s media arm, is one of the most visible.
Al Qaeda’s technique of raising funds from around the world has genuine charities, using shell companies and legitimate businesses as covers. A lump sum amount of money also comes from countries in Southeast Asia, with add on funding networks from Europe also (Roth et al., 2004). Many of these financial incubators have been identified, while many continue to remain anonymous. Al Qaeda now has a very straightforward online process to acquire funds through which online fraud, identity theft, and other internet crimes take place. It diligently infiltrates charitable organizations rather than just online publishing websites to exploit money and resources. Al Qaeda in its funding uses various security measures such as anonymizers that replace the IP address provided by the internet (Rabasa et al., 2006).
The formation of Al Qaeda in the Indian subcontinent AQIS is a change in focus from the far enemy America, to the near enemy, the South Asians countries. Ghazwa-e-Hind, the battle of India, emerged as a regional organization which includes the major portions of Pakistan not bordering Afghanistan, along with all of India, Bangladesh and parts of Myanmar. In May 2015 AQIS released a video called ‘From France to Bangladesh: The Dust Will Never Settle Down (Viswanathan, 2023). In the video, they claim that ‘the World Bank and International Monetary Fund policies, drone attacks, Charlie Hebdo publications, and Narendra Modi’s words calling for Muslims to be burned alive are all part of the same fight’ (Viswanathan, 2023). AQIS wants to create to its own advantage the existing divide present in Indian society, while also seeking to capitalize on the historical fears of domination and suppression of the Muslim community. Ayman al Zawahiri describes this in the same video when he says ‘as our Muslim brothers residing under the dark shade of Hindu occupation’ (Viswanathan, 2023).
AQIS is a challenge to the Indian government, because this group caters to the biggest asset and network among the jihadist organisations in the South Asian region. It is said that Asim Umar, who once led AQIS, had created a benifitial relationship with anti-India jihadist groups in India, the Indian Mujahideen (IM). This expertise and the creation of home grown grassroots networks could become a problem for India in the near future and it needs to come up with a narrative/strategy that will prevent marginalized factions from replicating extremist ideologies. In most cases internet recruitment techniques result in a reckless and unpredictable individual rather than a sophisticated and deliberate terrorist group. Nonetheless, such persons are troublesome for authorities because they are inherently more difficult to trace and prevent.
Terrorist attacks on defense and security infrastructure : Al Qaeda’s continuous presence has grave implications on the global defense and security systems. Governments globally have enhanced their counter terrorism efforts through heavy investment in intelligence gathering, surveillance, and special operations that can help to prevent possible terrorist threats (FBI, 2022). This has resulted in increased global coordination where governments have teamed up under bilateral/multilateral agreements to combat the presence of Al-Qaeda at the international level. As a response to peculiar challenges posed by terrorist organizations such as technology advancements; new training methods and manpower, resource allocations and defense spending have been adjusted. Countries have also made legislative changes as well as emergency response mechanisms that effectively address the changing nature of terrorist threat (CIA, 2023). Likewise cyber-attacks have necessitated more attention on cyber security for purposes of safeguarding the infrastructures.
Loss of Trust in Institutions Due to the Al-Qaeda Threat : The rising threat posed by Al-Qaeda has had a negative impact on public trust in institutions, particularly the military. Ongoing concerns about terrorism, fueled by Al-Qaeda’s actions and ideology, have raised questions about the ability of these institutions to safeguard national security effectively. Terrorist attacks and prolonged conflicts have created widespread insecurity, leading to concerns about the state’s capacity to provide adequate protection. Additionally, fears of potential infiltration by extremist elements within security agencies have further eroded trust.
In the digital age of the 21st century, it is important to develop effective methods to combat the proliferation of extreme content on the internet. Addressing radical ideologies that are prevalent on online platforms is of utmost importance. Governments must take the initiative to promote alternative narratives that encourage empathy and understanding towards the various political and social issues faced by the target audience. Dealing with the online radicalization of specific communities, such as those from Kerala and Kashmir, necessitates a holistic approach from government authorities. While traditional face-to-face strategies are commonly utilized, establishing a stronger online presence is essential in today’s rapidly evolving digital landscape. The internet has the power to escalate local conflicts into broader national debates, making it imperative to take proactive measures. To combat this growing threat, governments should endorse online platforms dedicated to combating terrorism and share updates through multimedia content. This will not only promote transparency and awareness but also contribute towards building a united front against extremist ideologies.
Official recognition of de-radicalization and counter-radicalization platforms will enhance mental health support online. People should be urged to make profiles on these platforms to get help. Community-based campaigns, like Operation Sadbhavna, are essential in de-radicalization endeavors (PIB, 2023). Civilian involvement in societies is crucial for deradicalization.
Interacting with people, societies, traditions, and societies, especially in conflict zones, can set the foundation for Indian-focused deradicalization projects. Thorough counter-violent extremism (CVE) methods are also needed. It is important to integrate tough and gentle methods, such as military, espionage, law enforcement, and community empowerment. Highlighting cultural and societal aspects through engagement in the community is crucial for a holistic approach to counter extremism. As extremist groups are becoming more aware of the advantages of the internet and the platforms it provides, authorities can use similar channels to reach the same individuals that extremists are targeting. This will enable counter-radicalization messages to disseminate rapidly, reaching not only the intended audiences of terrorist organizations but also various other sectors of the population.
Al-Qaeda’s use of internet channels for terrorism highlights the ever-changing nature of present-day cyber threats. From its traditional days of relying on conventional communication tools to its present vast activities on social media and encrypted platforms, Al-Qaeda has expertly used the internet’s anonymity and reach to spread its ideology, recruit new members, propagate disinformation, and fund its operations. The spread of internet radicalization presents substantial threats to national security, necessitating enhanced worldwide coordination, legal reforms, and counterterrorism activities. However, successful countermeasures must address the underlying causes of radicalization, develop alternative perspectives, and include communities in deradicalization efforts. As the digital world evolves, proactive initiatives and coordination across many industries are vital to combat the threat to online terrorism posed by Al Qaeda.