Artificial Intelligence (AI) is conquering the world by replacing traditional techniques and labor with modern strategies and techniques. It is transforming every sector by solving complex problems in seconds. Whether it is healthcare, finance, or education, AI is becoming very common nowadays. AI has accelerated the transformation by introducing new technologies and weapons in terrorist activities. AI has not only advanced the weaponry of terrorist organizations, but it has also provided tools for generating propaganda videos without leaving any trace of recognition. Over the past decade, AI has been intrigued by terrorism. Studies have shown that the internet has become a key instrument for online radicalization and recruitment of youngsters. Due to AI, terrorist organizations have marked a shift from training camps to digital radicalization.
This evolving landscape introduces a new concept of “digital shadow wars.” Unlike traditional warfare, these digital shadow wars have characteristics like invisibility and deniability. These characteristics are now often used by terrorist organizations to carry out their operations covertly. This new form of terrorism is known as “Terrorism 2.0,” accompanied by traditional as well as modern techniques.
Emerging Technologies Used by Terrorist Organizations
The following are some emerging technologies used in terrorist activities:
AI-Based Systems
For spreading propaganda and misinformation, AI is becoming a reliable tool for the accomplishment of extremist agendas. According to the United Nations Counterterrorism Office, misuse of AI, especially in terrorism, is posing a great security challenge. Terrorists are actively using and learning AI tools for digital propaganda and to expand their networks without being recognized. Tools like chatbots provide a pathway for terrorists to have conversations with an unknown identity. Those chats enable the leadership to easily recruit youngsters without having a physical meeting. The Islamic State of Iran and Syria (ISIS) frequently uses AI tools, and they also have a digital department for teaching machine learning to young lads. AI has transformed the nature of organized terrorism by enabling sophisticated online operations.
Deepfake Ecosystems
Deepfake ecosystems are used to create fake videos, images, and voice notes to misinterpret the situation. INTERPOL has warned about the threats of deepfakes in cybercrime. These fake videos manipulate public perceptions, as they are difficult to recognize as AI-created. Before they are recognized, the video goes viral in public, and the public narrative is manipulated. These deepfakes are emerging as a major global risk as they have highlighted how synthesized media can destabilize societies without any loss of terrorist fighters. The Russia-Ukraine conflict is a clear example of threats produced by deepfakes. During this conflict, a deepfake was created in which Ukraine’s president, Volodymyr Zelensky, forced his soldiers to surrender. Almost the whole public believed the video, but later it was identified as a deepfake. This shows that deepfakes can be used as soft weapons in times of war to weaken the morale of adversaries.
Swarm Drone Microsystems
The Australian Army Research Centre notes that drones have changed asymmetric warfare by reducing cost. Drones are cheap and easily available; due to this, many terrorist organizations use drone technology. Swarm drones are frequently used by terrorists due to their low costs and flexibility. They are small-sized drones that can be used anywhere without being easily detected on radar. This technology includes multiple uses of small drones. One of its types is mothership drones, in which there are many small drones within one drone. During war, this one drone serves the functions of multiple drones. Due to their cheap cost and availability, many terrorist organizations used them. Recently, it was found that TTP now has access to quadcopters, and ISIS has gained access to many swarm drones. The West Point Counterterrorism Centre says it is “drone jihadism.”
Quantum-Inspired Encryption
Quantum-inspired encryption is the next generation of cryptographic algorithms that will protect data against threats from quantum computers. The US National Institute of Standards and Technology (NIST) highlights the importance of post-quantum cryptography to secure sensitive information from decryption risks. On one side, it strengthens cybersecurity, while on the other side, it poses a threat to national security, as this technology can be used by non-state actors for secure communications. Improved encryption techniques make it harder to monitor potential malicious activity and may enable hidden networks to be more covert. The European Union Agency for Cybersecurity (ENISA) stresses that quantum-safe cryptography will play a key role in future cybersecurity systems, and it will also be a challenge to monitor encrypted environments.
Brain-Computer Interface Exploitation
A brain-computer interface is a neurotechnology that enables communication between the human brain and digital devices. DARPA has invested in projects promoting neurotechnology to enhance the communication system. Initially, neurotechnology was used in medical rehabilitation, but now this technology has shown vulnerabilities as terrorist organizations are using this technology for their operations. Terrorists can read the thoughts of a person and can use that data to brainwash him. This leads to privacy concerns of an individual, boosting psychological warfare.
New Weapons in Digital Shadow Wars
The following are some of the major weapons that terrorist organizations are using in the age of artificial intelligence:
Cyber-Physical Hybrid Weapons
It refers to a system where digital mechanisms destroy the physical infrastructure. It can include any virus, which can be installed in the sensitive systems of the military and can hack or leak data; also, it can disrupt the energy grids and communication infrastructure. The most useful advantage of this technology is that the attack can be done without the presence of any soldiers. The Stuxnet cyber weapon is an example of a hybrid weapon that was used to target Iran’s nuclear facilities. Although this technology is not used by any terrorist organization, ISIS has attempted basic cyber operations, so it is possible that in the near future, ISIS will have access to cyber-physical hybrid weapons, which is a great security concern.
AI-Guided Autonomous Explosive Systems
This technology includes a combination of AI and weaponry. Many missiles and drones are designed to accompany artificial intelligence. This system reduces human control once activated, and all procedures from targeting to attack are done by artificial intelligence. Terrorists use advanced drones and lethal munitions. Still, they do not have access to AI-based weapons due to their high cost. In the near future, they can gain access to this technology as terrorist organizations are funded by many other adversaries. AI is increasingly intrigued by terrorism, so the possibility of these developments may not be far in the near future.
Counterterrorism Strategies in Digital Shadow Wars
- AI-Based Defense Systems: To counter the online propaganda of terrorist organizations, states need AI-based defense systems that can easily detect deepfakes. Microsoft and Google provide such tools. For this purpose, EUROPOL uses counter-propaganda AI.
- Digital Intelligence Cooperation: Terrorism 2.0 operates across borders. So, states need cross-border cooperation to exacerbate the expansion of artificial intelligence in terrorism. In this case, the Five Eyes intelligence sharing network and INTERPOL global databases are of much importance.
- Regulation of AI Technologies: AI is a dual-use technology, so states must regulate its development and prevent its misuse without stopping the innovation. States must promote the digital literacy initiatives given by UNESCO.
Conclusion
The evolving nature of terrorism from traditional methods to modern strategies clearly highlights the emergence of terrorism 2.0. This 2.0 terrorism leads to the digital shadow wars. They are using AI as their new trend and technique. Now the conflicts may take the form of “invisible wars” where damage is done but no loss of life. This would definitely give an advantage to terrorist organizations if not countered in time. The most malicious advantage of AI in terrorism is that there would be no deaths of terrorists, and they can easily carry out their terrorist activities without having any fear. Through deepfakes and AI tools, there would be more recruitment. So, the rate of recruitment will increase in comparison to deaths, which can raise serious global security issues. Ultimately, the future of global security will be determined by how effectively states can control and regulate the technological evolution of terrorism 2.0.

