top of page
Writer's pictureJK Blue

INTERNET : AN INSTRUMENT OF TERROR

Updated: Feb 16, 2022



SOCIAL_MEDIA

Today, global terrorist organisations are using the internet to gain information of sensitive targets across the globe. Using the information available on various communication systems, these terrorist organisations identify vulnerable targets and plan their highly synchronised attacks. The Al-Qaeda and ISIS networks have been successful in their use of audio-visual propaganda, pre-recorded videotapes, computer audio-video games and jihad inspired music, in order to spread radical ideology and to reach out to supporters across the globe. The jihadi websites show videos of attacks on the World Trade Center and other major attacks to motivate sympathisers for the cause. In recent times we have witnessed how terrorist groups are reaching out, motivating and instructing youth from all over the globe to join Jihad.


The recruitment process, based on internet and social media platforms, follows a very simple process which starts with the sharing of contents on Jihad and seeing as to who liked it. Repeat the process to identify people who are consistently following and liking such content. In the initial phase, the contents may not be very radical, however, the intensity and frequency will gradually be increased to target a few like-minded persons. Thereafter, contacts will be shared and links would be established by existing sympathisers to direct and instruct these “identified” people to join the terrorist group. Fund raising through online means is like supplying oxygen to cyber Jihad. The terrorist groups are using e-mails, messages and encrypted links to collect donations for the group. Every terrorist group is also linked with non terrorist religious/political party which collects the funds and transfers it by overt and covert methods, including hawala transactions. Social networking sites are being used for trading weapons online. Facebook is quite popular in hosting online bazaars for weapons from small grenades to heavy machine-guns and guided missiles. The weapons are distributed by various countries to security forces and their proxy alliances in the Middle East. These online bazaars provide open platforms for terrorist groups to buy weapons and explosives for their attacks. It has also increased the capability of lone wolf attackers in any region.


Online tutorials supported by scripts, audios and videos are available on Jihadi websites for new volunteers to learn about handling of arms, ammunition, explosives and even on how to carry out attacks. Online classes on hacking, encryption and maintaining anonymity are also available for their viewers to learn. However, the lack of institutionalised engagement programmes for youth in Kashmir definitely leaves a vacuum, which is exploited by radical entities. Educated yet unemployed youth in Kashmir offer abundant resources for recruitment, in the form of terrorists and e-Jihadists. People in Kashmir are accessing the internet through both computers and smart phones, however the majority of them are using personal smart phones to access Jihad contents available on digital platforms. Websites like Facebook, Youtube, Instagram and Twitter are the major web-based sources for the dissemination of radicalising content.


WhatsApp is the most popular, though Snapchat and Telegram applications are also used for sharing of messages, but they are used by a small faction of youth. Kashbook is a unique website used only by the people of Kashmir. In May 2017, after Jammu and Kashmir government banned 22 social media services, including Facebook, WhatsApp, Twitter, the Valley came up with its own version of Facebook. VPN-free website was developed by a 16-year-old boy from Anantnag district and it featured the Kashmiri language. This example proves the abundance of technical expertise among the youth of Kashmir and their desire for social media platforms. Messaging applications like Telegram are also preferred due to its end-to-end encryption and self-destruct messaging facility. It can also store unlimited data in the cloud and can share videos up to 1 GB data. The level of security and anonymity is very high in Telegram and it is very difficult for security agencies to track down the communicating members and the nature of contents. Skype and Viber applications are generally used to make internet-based audio and video phone calls without using cellular SIM, hence locations of the communicators are not disclosed. VoIP calls are preferred among terrorists and their sympathisers.



Before Covid-19, smart phones were accessible to very limited students but today, where all classes are conducted online, even small children have access to it. The teenagers in Kashmir are more vulnerable due to this facility as terrorist groups are looking for such age group for recruitment. Therefore, it becomes a social responsibility including parents to do a spot check of smart phones operated by teenagers. By doing this, the youth can be saved from falling prey to such terrorist organisations. Why I am saying is that, I myself had witnessed a lot of youth sitting on the roadside busy over smart phones. This addiction over smart phones is because of the internet facility which is also being utilised by terrorists as an instrument to recruit the youth. At the same time, counselling classes & education drives by schools & NGOs with reference to the menace must be regularly undertaken both for youth as also their parents to prevent drifting of young minds towards radicalisation & terrorism.


52 views0 comments

Recent Posts

See All

Comments


bottom of page