Terrorism, the Internet and the Social Media Advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism.


  • Luke Bertram Fellow, German Institute on Radicalization and De-Radicalization Studies (GIRDS)


Digital technology and terrorism, Counter-Terrorism, Digital Media, Terrorist Groups Digital Potential, Digital Existence.


The deeply engrained nature of social media in modern life have provided ease of access to information and speed of use within almost every aspect of a person’s life. These same benefit are also available to terrorists and their organizations. The same technology that allows for a globalized world to interact without regard for distance or physical location is also utilized, exploited and adapted to by terrorist organizations to conduct operations, reach candidates and ensure organizational longevity. 


This article takes the position of observer of these advancements with the end goal of informing counter-violent extremism strategists of the advances that terrorist groups have already made in digital technology; and where the priority of intervention strategies should be aimed. Further, this is intended to guide policy makers to embrace and utilize digital technologies as a mechanism to carry counter-radicalization and counter-violent extremism interventions through the same digital potential and reach the same audiences as terrorist organizations. What appears strongly apparent is that social media will not abate from its intrinsic position graphed into daily life. This means that counter-terrorism, counter-radicalization and counter-violent extremism strategies must take up the same technology in order to effectively discredit and nullify extremist groups – a digital problem needs a digital solution. 


Ali, M. (2013, September). The link between unemployment and terrorism [Video file]. Ted Conferences. Retrieved from www.ted.com/talks/mohamed_ali_the_link_between_unemployment_and_terrorism

Aly, A. (2016, 26 February). Brothers, Believers, Brave Mujahideen: Focusing attention on the audience of violent jihadist preachers. Studies in Conflict and Terrorism. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157407

Aly, A., Macdonald, S., Jarvis, L. & Chen, T. M. (2016, 7 April) Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization. Studies in Terrorism and Conflict. 2016, VOL. 0, NO. 0, 1–9. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157402

Anti-Defamation League. (2014, 11 July). Hashtag Terror: How ISIS Manipulates Social Media. http://www.adl.org/combatinghate/internationalextremismterrorism/c/isisislamicstatesocialmedia.html

Atran, S. (2015, 23 April). The Youth Need Values and Dreams. United Nations General Assembly [Video file]. Retrieved from https://www.youtube.com/watch?v=qlbirlSA-dc

Berger, J.M. & Morgan, J. (2015, March). Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on U.S. Relations with the Islamic World Analysis Paper. Retrieved from http://www.brookings.edu/~/media/research/files/papers/2015/03/isis-twitter-census-berger-morgan/isis_twitter_census_berger_morgan.pdf

Braddock K. & Horgan, J. (2015, 11 December) Towards a Guide for Constructing and

Disseminating Counternarratives to Reduce Support for Terrorism. Studies in Conflict & Terrorism. 2016, Volume 39, Number 5, 381–404. Retrieved from http://dx.doi.org/10.1080/1057610X.2015.1116277

Broadhurst, R., Grabosky, P., Alazab, M. and Chon, S. (2014). Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime. International Journal of Cyber Criminology. Volume 8, issue 1, pp. 1 -20. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/1545341663?rfr_id=info%3Axri%2Fsid%3Aprimo

Coker, C. (2002). Globalisation and Terrorism [Conference Paper]. London School of Economics and Political Science. Retrieved from https://www.google.de/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwjhloiRp6vKAhVH8A4KHW5hD2QQFggnMAA&url=http%3A%2F%2Fwww.g8.utoronto.ca%2Fconferences%2F2002%2Ftokyo%2Fcocker.pdf&usg=AFQjCNHIdQKbY0XILj7iET-a7J4mXtYHgw&cad=rja

Conway, M. (2005, 8-10 September). Terrorism ‘Use’ and the Internet Fighting Back. Conference Paper: Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities. Retrieved from https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwj8yczw1cLNAhUMMY8KHfGFAzAQFggeMAA&url=http%3A%2F%2Fwww.oii.ox.ac.uk%2Fresearch%2Fcybersafety%2Fextensions%2Fpdfs%2Fpapers%2Fmaura_conway.pdf&usg=AFQjCNGsB3-g-clxKhAdsL0Y3qHmCRdCeg

Conway, M. (2016, 12 April). Determining the Role of the Internet in Violent

Extremism and Terrorism: Six Suggestions for Progressing Research. Studies in Conflict & Terrorism. 1521-0731. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157408

Cukier, K. and Mayer-Schoenberger, V. (2013, May/June). The Rise of Big Data. Foreign Affairs. Volume 92, issue 3. http://search.proquest.com.ezproxy.csu.edu.au/docview/1335008763?OpenUrlRefId=info:xri/sid:primo&accountid=10344

Denning, D. E. (2001). Activism, Hacktivism, and Cyberterrorism: The internet as a tool for influencing foreign policy, chapter 8 in Arquilla and Ronfeldt (ed.), Networks and Netwars: The Future of Terror, Crime and Militancy, pp. 239-288. Rand Corporation. Retrieved from https://www.rand.org/content/dam/rand/pubs/monograph_reports/MR1382/MR1382.ch8.pdf

Dubouloz, C. & Wilner, A. (2010, February). Home grown terrorism and transformative learning: an interdisciplinary approach to understanding radicalization. Global Change Peace and Security. Retrieved from http://www.researchgate.net/publication/228624027_Homegrown_terrorism_and_transformative_learning_an_interdisciplinary_approach_to_understanding_radicalization

Edelman, A. (2015, 10 May). Lone-wolf terrorists could attack U.S. ‘at any moment,’ Homeland Security chief admits. New York Daily News. Retrieved from http://www.nydailynews.com/news/politics/lone-wolf-terrorists-attack-moment-dhs-chief-article-1.2217118

Eriksson, J. and Giacomello, G. (2006, July). The Information Revolution, Security, and International Relations: (IR) Relevant Theory? International Political Science Review, volume 27, number 3, pp. 221 – 244. Sage Publications Limited. Retrieved from http://ips.sagepub.com.ezproxy.csu.edu.au/content/27/3/221

Ferguson, P. and Huston, G. (1998, June). What Is a VPN? Part I. The Internet Protocol Journal, volume 1, number 1. Cisco Systems. Retrieved from http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_11/what_is_a_vpn.html

Grob-Fitzgibbon, B. (2010, 10 August). From the dagger to the bomb: Karl Heinzen and the evolution of political terror. Terrorism and Political Violence. Volume 16, number 1, pp. 97 – 115. United Kingdom: Routledge Taylor and Francis Group. Retrieved from http://www-tandfonline-com.ezproxy.csu.edu.au/doi/abs/10.1080/09546550490446036

Harrison, W. B. [Jnr] (2002, 7 March). Closing The Digital Divide. Global Information. Vital Speeches of the Day. Volume 68, issue 19, pp. 606 – 608. Retrieved from http://connection.ebscohost.com/c/speeches/6995469/closing-digital-divide

Heickerö, R. (2014, 28 July). Cyber Terrorism: Electronic Jihad. Strategic Analysis, volume 38, number 4, pp. 554 – 565. United Kingdom: Routledge Taylor and Francis Group. Retrieved from http://www-tandfonline-com.ezproxy.csu.edu.au/doi/abs/10.1080/09700161.2014.918435

Henschke, A. (2014, June). A decision-making procedure for responding to cyber-attacks. Occasional Paper, number 6, pp. 3 - 9. National Security College. Crawford School of Public Policy. Australian National University. Retrieved from http://nsc.anu.edu.au/documents/ocassional-paper-6-cyber-ethics.pdf

House of Commons, United Kingdom. (2012, 6 February). Roots of Violent Radicalization. Nineteenth Report of Session 2010–12. Reference: HC 1446. House of Commons Home Affairs Committee. Retrieved from http://www.publications.parliament.uk/pa/cm201012/cmselect/cmhaff/1446/1446.pdf

Jones, C. (2015, 17 March). Jake Bilardi’s story shows why terrorist intervention must be tailored. The Conversation. Retrieved from https://theconversation.com/jake-bilardis-story-shows-why-terrorist-intervention-must-be-tailored-38769

Khalil, E. (2014, 1 October). Gone viral - Islamic State's evolving media strategy. Jane’s Intelligence Review. IHS Global Limited. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/1609437740?rfr_id=info%3Axri%2Fsid%3Aprimo

Klausen, J. (2015). Tweeting the Jihad: Social Media Networks of

Western Foreign Fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38:1, 1-22. Retrieved from http://dx.doi.org/10.1080/1057610X.2014.974948

Koehler, D. (2014). The Radical Online: Individual Radicalization Processes and the Role of the Internet. Journal for Deradicalization. Winter, 2014/2015, number 1, pp. 116 – 134. Retrieved from http://journals.sfu.ca/jd/index.php/jd/article/view/8/8

Labi, N. (2006, July/August). Jihad 2.0: With the loss of training camps in Afghanistan, terrorists have turned to the Internet to find and train recruits. The story of one pioneer of this effort—the enigmatic “Irhabi 007”—shows how. The Atlantic. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/223088747?OpenUrlRefId=info:xri/sid:primo&accountid=10344

Mackinlay, J. (2009). The Virtual Battlefield. In The Insurgent Archipelago: From Mao to Bin Laden (pp. 123-142). United Kingdom: Hurst and Company. Retrieved from https://doms.csu.edu.au/csu/file/57260df0-83fe-4a03-a0c9-7a8c3fbc8973/1/mackinlay-j.pdf

McCauley, C., Moskalenko, S. and Van Son, B. (2013). Characteristics of Lone Wolf Violent Offenders: A Comparison of Assassins and School Attackers. Perspectives on Terrorism. Terrorism Research Initiative. Volume 7, number 1. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/240/pdf

McMillan, R. (2016, 5 April). Facebook’s WhatsApp Launches ‘End-to-End’ Encryption. WhatsApp texting service strengthens encryption so only sender and receiver can read message contents. Retrieved from http://www.wsj.com/articles/facebooks-whatsapp-turns-on-encryption-by-default-1459869097

Ministry of Education and Home Office, United Kingdom. (n.d). How social media is used to encourage travel to Syria and Iraq: Bringing note for schools. Retrieved from https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/440450/How_social_media_is_used_to_encourage_travel_to_Syria_and_Iraq.pdf

Mishra, S. (2003, 5 September). Exploitation of information and communication technology by terrorist organizations. Strategic Analysis, volume 27, number 3. Institute for Defence Studies and Analyses. United Kingdom: Routledge Taylor and Francis Group. Retrieved from http://www-tandfonline-com.ezproxy.csu.edu.au/doi/abs/10.1080/09700160308450099

Mohamedou, M-M. O. (2015, 18 June). The Islamic State, Al-Qaeda, and Postmodern Globalized Violence [Video file]. The Fletcher School, Fares Centre for Eastern Mediterranean Studies. Retrieved from https://www.youtube.com/watch?v=kFFfKJydBfs

Neumann, P. (2012, December). Countering Online Radicalization in America. National Security Program, Homeland Security Project. Bipartisan Policy Center. Retrieved from http://bipartisanpolicy.org/wp-content/uploads/sites/default/files/BPC%20_Online%20Radicalization%20Report.pdf

Phillips, P. J. (2011). Lone Wolf Terrorism. Peace Economics, Peace Science and Public Policy. Volume 17, issue 1, article 1. Berkeley Electronic Press. Retrieved from http://web.a.ebscohost.com.ezproxy.csu.edu.au/ehost/detail/detail?sid=a5c0a290-fc3d-48d7-b99d-fa3ef0c900cc%40sessionmgr4002&vid=0&hid=4101&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=60199449&db=tsh

Pretch, T. (2007, December). Home grown terrorism and Islamist radicalization in Europe. From Conversion to Terrorism. An assessment of the factors influencing violent Islamist extremism and suggestions for counter radicalization measures. Denmark: Danish Ministry of Justice. Retrieved from http://www.justitsministeriet.dk/sites/default/files/media/Arbejdsomraader/Forskning/Forskningspuljen/2011/2007/Home_grown_terrorism_and_Islamist_radicalization_in_Europe_-_an_assessment_of_influencing_factors2.pdf

Rogan, H. (2006, 20 March). Jihadism Online - A study of how al-Qaida and radical Islamist groups use the Internet for terrorist purposes, 2006/00915. Norwegian Defence Research Establishment. Retrieved from http://rapporter.ffi.no/rapporter/2006/00915.pdf

Rudner, M. (2016, 30 March). “Electronic Jihad”: The Internet as Al Qaeda's

Catalyst for Global Terror. Study in Conflict and Terrorism, Volume 0, Number. 0, 1–14. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1157403

Sageman, M. (2008). Leaderless Jihad: Terror networks in the twenty first century. Philadelphia, United States of America: University of Pennsylvania Press.

Schmid, A. P. (2013, March). Radicalization, De-Radicalization, Counter-Radicalization: A Conceptual Discussion and Literature Review. International Centre for Counter-Terrorism. Retrieved from http://www.icct.nl/download/file/ICCT-Schmid-Radicalization-De-Radicalization-Counter-Radicalization-March-2013.pdf

Simon, T., Goldberg, A., Aharonson-Daniel, L., Leykin, D. and Adini, B. (2014, August). Twitter in the Cross Fire—The Use of Social Media in the Westgate Mall Terror Attack in Kenya. Plos One, volume 9, issue 8, reference e104136. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/1556010857?rfr_id=info%3Axri%2Fsid%3Aprimo

Soo Hoo, K., Goodman, S. & Greenberg, L. (2008, 3 March). Information technology and the terrorist threat. Survival, vol. 39, no. 3, Autumn 1997, pp. 135-55. Retrieved from http://dx.doi.org/10.1080/00396339708442930

Stevens, T. and Neumann, P.R. (2009, 28 January). Countering Online Radicalization: A Strategy for Action. London, United Kingdom: The International Centre for the Study of Radicalization and Political Violence. Retrieved from https://cst.org.uk/docs/countering_online_radicalization1.pdf

Stohl, M. (2007, 30 March). Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games? Crime Law Social Change. Cyber Terrorism. Volume 46, pp. 223 – 238. Springer Science + Business Media. Retrieved from http://link.springer.com.ezproxy.csu.edu.au/article/10.1007/s10611-007-9061-9

Tabansky, L. (2011, November). Critical Infrastructure Protection against Cyber Threats. Military and Strategic Affairs. Volume 3, number 2, pp. 61 – 78. Retrieved from http://www.inss.org.il/uploadimages/Import/%28FILE%291326273687.pdf

Tadjdeh, Y. (2014, December). Government, Industry Countering Islamic State’s Social Media Campaign (Updated). National Defence. Retrieved from http://www.nationaldefensemagazine.org/archive/2014/December/Pages/GovernmentIndustryCounteringIslamicStatesSocialMediaCampaign.aspx

Tehrani, P. M., Manap, N. A. and Taji, H. (2013). Cyber terrorism

challenges: The need for a global response to a multi-jurisdictional crime. Computer Law and Security Review, volume 29, pp. 207 – 215. Faculty of Law, The National University of Malaysia. Malaysia: Elsevier Limited. Retrieved from http://www.sciencedirect.com.ezproxy.csu.edu.au/science/article/pii/S0267364913000666

The Clarion Project. (2014, 10 September). The Islamic State's (ISIS, ISIL) Magazine: All of the issues of the Islamic State's glossy propaganda magazine 'Dabiq,' named after a key site in Muslim apocalypse mythology can be found here. Retrieved from http://www.clarionproject.org/news/islamic-state-isis-isil-propaganda-magazine-dabiq

Thomas, T. L. (2003). Al Qaeda and the Internet: The danger of "cyberplanning". Parameters.Volume 33, number 1. ProQuest. Central. Retrieved from http://search.proquest.com.ezproxy.csu.edu.au/docview/198039860?OpenUrlRefId=info:xri/sid:primo&accountid=10344

Torok, R. (2013). Developing an explanatory model for the process of online radicalization and terrorism. Security Infomatics, a Springer Open Journal, volume 2, number 6. Security Research Institute, Edith Cowan University. Perth, Australia: Torok; licensee Springer. Retrieved from http://www.security-informatics.com/content/2/1/6

Torres-Soriano, M.R. (2016, 27 April). The Caliphate Is Not a Tweet Away: The Social Media Experience of Al Qaeda in the Islamic Maghreb. Studies in Conflict & Terrorism. DOI: 10.1080/1057610X.2016.1159430. Retrieved from http://dx.doi.org/10.1080/1057610X.2016.1159430

Von Behr, I., Reding, A., Edwards, C. and Gribbon, L. (2013). Radicalization in the digital era: The use of the internet in 15 case studies of terrorism and extremism. Brussels, Belgium: RAND Europe. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf

Weimann, G. (2006). New terrorism, new media. In Terror on the internet: the new arena, the new challenges. (pp. 15-31). Washington, DC: United States Institute of Peace Press. Retrieved from https://doms.csu.edu.au/csu/file/1eba375e-679b-43bf-b60a-d75d35983420/1/weimann-g.pdf

West, L. J. (2014, June). Virtual terrorism: Data as a target. Cybersecurity: Mapping the ethical terrain. Occasional Paper, number 6, pp. 28 - 33. National Security College. Crawford School of Public Policy. Australian National University. Retrieved from http://nsc.anu.edu.au/documents/ocassional-paper-6-cyber-ethics.pdf

Wilson, C. (2005, 1 April). Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. CRS Report for Congress. Congressional Research Service - The Library of Congress. Retrieved from http://handle.dtic.mil/100.2/ADA444799