Every age has its own wars, limiting conditions, and its own peculiar preconceptions. The contemporary digitalized world, which has gained pace with the advent of Globalization 4.0, is grappling with escalating crises related to cyberspace. Cyberspace has become the fifth operational space after air, land, sea, and outer space. Nefarious and inimical forces exploit cyberspace owing to its huge reach and protected nature. Interestingly, the initial instances of minor cybercrime have morphed into full-fledged cyberterrorism attacks.
Extremist organizations and non-state actors are using cyberspace to fulfill vested interests. Technology has facilitated such factions to wage large-scale destruction and cyber warfare against their opponents. From online terrorist recruitment and planning attacks on encrypted digital platforms to digital fundraising for terrorist organizations, terrorist outfits are spreading havoc in the world in general and in Pakistan in particular.
Is the situation totally out of control, or are there potential areas for cooperation and attention? Reducing the menace of digital terrorism, protecting national security, and safeguarding critical infrastructure requires a robust legislative framework, public-private partnerships, regional and global collaboration, and consistent and prolonged investment in high-tech research and development.
Thus, the huge reach, encryption, and anonymity of cyberspace, particularly on social media, computer systems, and dark web forums, have given immense power to terrorist outfits to exploit it for vested social, political, religious, and ideological interests, fueling societal fragmentation, infiltration of foreign terrorist organizations, digital radicalization, and extremism.
Digital Terrorism: A New Form of Terrorism
What is the digital age? What is its new form of terrorism? The contemporary socio-economic and political system, which is highly connected owing to the Internet of Things (IoT), is called the digital age. This has turned the world into a global village where everyone is connected to everyone. Despite the boons of the modern digitalized world, its downsides are equally relevant. For instance, cyberspace has acquired the status of the fifth operational space after land, sea, air, and space. Nations are confronting each other in cyberspace. Where nations are confronting, non-state actors and terrorist outfits have equally acquired hold of it for furthering their vested agendas. Thus, the digital age’s new challenge is digital terrorism, also known as cyberterrorism.

How Is Digital Terrorism Different from Cybercrime and Cyberterrorism?
Is there any difference between digital terrorism and cybercrime? The twin terms are often confused. Cybercrime is a crime where a computer is used as a vector or a target, mainly for economic motives. Cyberterrorism, on the other hand, is an act carried out via computer to pursue religious, social, political, and ideological agendas. This distinction is crucial in understanding the broader implications of digital terrorism.
Key Aspects of Digital Terrorism
Use of Digital Platforms for Dissemination of Digital Radicalization
Various inimical forces use digital platforms to spread digital radicalization. For instance, the promotion of a fabricated notion of Jihad by Tehrik-i-Taliban Pakistan (TTP) and the Islamic State of Iraq and Syria (ISIS). The perpetrators of such organizations use altered and fabricated verses of the Holy Quran to manipulate people toward their ideology. Nations worldwide are cognizant of such activities and are trying their best to restrict the activities of such organizations on digital platforms. One such example is the banning of the Al-Qalam website by the Pakistani Government.
Fundraising for Terrorist Organizations via Cryptocurrencies
Not limited to this, terrorist organizations have become sharp and updated with the development of the digital world. They have started using digital space to fund their apathetic and dark activities. In Pakistan, such factions have recently been using Bitcoin to collect funds for their activities. After the incident, Bitcoin operations were banned in the country, with the apprehension of enablers linked with ISIS. Likewise, in 2020, the U.S. Department of Justice dismantled a network of Bitcoin transactions linked to ISIS and Al-Qaeda, underscoring the global financial dimensions of digital terrorism. Thus, it can be said that digital terrorism has emerged as a new monster with the rise of the digital era.
Exploitation of Ethnic and Sectarian Diversity by Launching Disinformation and Misinformation Campaigns
Similarly, terrorist outfits are exploiting ethnic and sectarian diversities by launching misinformation and disinformation campaigns. Non-state actors are extending their religious ideas by sharing fake and adulterated content on social media platforms to deepen divisions between Shiite and Sunni communities around the globe.
The most striking episode of a disinformation campaign ever launched by any state against another state is India’s Disinfo Scandal against Pakistan. As per the EU DisinfoLab report, a global network of hundreds of fake news sites controlled by Indian sources was caught publishing false narratives against Pakistan. Similarly, ISIS has consistently used social media to exacerbate Sunni-Shia tensions. At the same time, neo-Nazi groups in Europe and North America exploit digital platforms to spread racist ideologies and recruit followers. Thus, the vulnerable nature of cyberspace has granted malicious entities immense power to pursue their ideological motives.
Recruitment of New Terrorists via Digital Platforms
Adding to the above, updated, technologically informed, and shrewd terrorist outfits are now using digital platforms to recruit terrorists. Approximately 500 females have been trained as suicide bombers, according to Inter-Services Intelligence (ISI) in Pakistan. Not only are they trained, but they are also deployed across different regions of the country. Therefore, digital terrorism has emerged as a new threat to the social and security fabric of countries.
Penetration of Digital Platforms by Non-State Actors
Likewise, the vast reach of cyberspace gives immense power to international terrorist organizations to increase their influence worldwide. For instance, ISIS has increasingly extended its branches in various regions of the Middle East, South Asia, and beyond. The notion behind its increased prudence is its ideological motivation, which it wants to extend globally. Thus, it can be safely argued that the new digital age is in the tight shackles of digital terrorism.
Organizing and Executing Cyberterrorism Attacks through Encrypted Digital Channels
Non-state actors recruit people using digital platforms and plan and plant attacks via them. Encrypted platforms like Signal and Telegram are safe havens for their malicious activities, where they can circumvent being monitored by national regulations. Using such platforms, they safely circulate bomb-making guides and recruitment plans. Thus, the new digitalized age has brought new security challenges.
Contemporary Regulations for Countering A Cyber Threat in Pakistan
Countries worldwide are cognizant of this escalating threat and are adopting counter-strategies, as does Pakistan. The Prevention of Electronic Crime Regulation Act (PECA 2016) is an example. Another example is the Pakistan Telecommunication Authority (PTA). PTA works with regional and global organizations to detect and prevent digital terrorism-related activities. However, the vast reach of the internet has given terrorist outfits immense power to circumvent government regulations. Digital terrorism, being a global problem, necessitates global and collective efforts to counter it.
Future Options
Digital terrorism is a complex issue to handle. Curbing it requires systematic short-term, medium-term, and long-term efforts. For instance, governments can frame robust legislative reforms and regulations under short-term measures. In the context of Pakistan, PECA 2016 can be upgraded to add the admissibility of digital evidence in court. Moreover, the Regional Anti-Terrorist Structure (RATS) services can be utilized under the auspices of the Shanghai Cooperation Organization (SCO). Similarly, global collaboration with organizations like INTERPOL and UNODC can facilitate countries through intelligence sharing and countering strategies.
Under medium-term options, nations can form cyber units in cities to register cyberterrorism-related incidents or attacks promptly and effectively. Moreover, public-private partnerships can be formed to equip nations with cutting-edge counterterrorism technologies. The most important aspect is the much-needed focus on digital literacy. In this context, Finland’s digital literacy program holds crucial guiding principles for countries to learn.
Under long-term options, countries can focus on fostering a culture of research and development in cybersecurity. Moreover, investment in the high-tech industry is the need of the hour. Nations should learn the principle of war mentioned by Sun Tzu in his book The Art of War: “Know your enemy and know yourself.” It is high time for nations, especially third-world nations, to equip themselves technologically, as their enemies are now technologically informed, updated, and shrewd.
Conclusion
To conclude, it can be safely argued that cyberspace’s vast reach and encrypted nature have made it a suitable tool for terrorist outfits to exploit globally. Ranging from the use of digital platforms to produce radicalization and extremism to launching fundraising for terrorist organizations, the menace of digital terrorism is rising on the horizon of the world. Owing to the complex nature of cyberterrorism, countering it requires systematic and well-thought-out policies. Given the regional and global influence of the problem, it is high time for the community of nations to join hands, ensuring the digital age must be a driving force for progress and not a breeding ground for terror. In the words of former UN Secretary-General Kofi Annan, “We must unite against terrorism in all its manifestations.”
If you want to submit your articles and/or research papers, please visit the Submissions page.
To stay updated with the latest jobs, CSS news, internships, scholarships, and current affairs articles, join our Community Forum!
The views and opinions expressed in this article/paper are the author’s own and do not necessarily reflect the editorial position of Paradigm Shift.
Muqaddas Hanif is a Zoology graduate, inspired by intricacies of life, who is channeling curiosity into
writing. She writes on wide range of subjects, including social, political and literary matters. She has a
strong interest in public service and a deep appreciation for nature.