Darko Trifunović

DOI Number
First page
Last page


 Over time, terrorism has evolved into different forms. One of the most dangerous is certainly cyber terrorism. There are many different motivations for terrorists to deploy cyber terrorism as a tool in their fight. Internet and computer networks are powerful resources on which contemporary society relies heavily. Terrorist groups have developed new tools and methods of the fight and they have become more effective, efficient, and unpredictable. Virtual, or cyberspace, is perfect and very safe ground for terrorist groups’ various activities, such are secret encrypted communication, file sharing, indoctrination and recruitment of vulnerable individuals, fundraising and promotions of their future actions and accomplishments spreading fear among common people. Are we adequately aware of these facts and prepared for countermeasures? The fact is that terrorists use mostly open-source tools (software) for their purposes, widely available and free of charge, as well as video games, popular social networks (mostly Twitter), and software developed by their programmers. The purpose of this paper is to point out some of the methods radical Islamic terrorist groups have been using and underline the importance of responding to this new security challenge.


cyber terrorism, Islamic terrorists, Anonymous, steganography, the Islamic state.

Full Text:



Akhgar, B., Bayerl, P. S., & Sampson, F. (Eds.). (2016). Open Source Intelligence Investigation: From Strategy to Implementation. Cham: SpringerInternational Publishing.

Alkhouri, L., Kassirer, A., & Nixon, A. (2016). Hacking For ISIS: The Emergent Cyber Threat Landscape. Flashpoint.

Anonhq. (2015). Anonymous Finally Reveals How They Attack ISIS Militants|#opisis|ISIS|Available at Anonymous. Retrieved 19.03.2017.

Anthony, F.,&Mekhenne, S. (2017). They’re young and lonely. The Islamic State thinks they’ll make perfect terrorists.‘What’s happening to our children? Washington Post. Available at: Retrieved 19.01.2019.

Arquilla, J., &Ronfeldt, D. (2001). Networks and netwars: The future of terror, crime, and militancy. Santa Monica, CA: National Defense Research Institute.

Axelrod, E. M. (2009). Violence goes to the Internet: Avoiding the snare of the Net. Illinois: Charles C Thomas Publisher.

Aydinli, E. (2016). Violent non-state actors: From Anarchists to Jihadists. London: Routledge.

Clauson, J. (2014). ISIS use grand theft auto mock-up to recruit and boost morale, Inquisitr, Available at Retrieved 19.03.2017

Coker, M., Yadron, D., & Palette, D. (2015). Hacker killed by drone was Islamic State’s “secret weapon”. Wall Street Journal. Available at: http://www. wsj. com/articles/hacker-killed-by-drone-was-secret-weapon-1440718560Retrieved 19.03.2018

CyberWarzone. (2017). Anonymous Serbia identified jihadi groups in the Balkans #opIceISIS, Available at 10.02.2019.

De Guttry, A., Capone, F., &Paulussen, C. (Eds.). (2016). Foreign fighters under international law and beyond. The Hague: TMC Asser Press.

Denning, D. (2000). Cyber terrorism. Testimony Before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. In E.V. Linden (Ed.), Focus on Terrorism (pp.71-76). New York: Nova Science Publishers.

European Union Agency for Fundamental Rights, Key migration issues: one year on from initial reporting, Available at Retrieved 19.03.2017.

Evans, M. (2014). Call of Duty being used to recruit British Muslims', father of Welsh Jihadists claims. Express. Available at: Retrieved 19.03.2017

FranceschiBicchierai, L. (2015). How a Teenage Hacker Became the Target of a US Drone Strike. MotherBoard. Available at: Retrieved 19.03.2017

Gallagher, S. (2012). Steganography: how al-Qaeda hid secret documents in a porn video. Available at: 19.04.2018.

Gilbert, D. (2015). Anonymous #OpIsis: Hacktivists publish a how-to guide for identifying Islamic State Twitter accounts. International Business Times. Available at: Retrieved 19.03.2017

Guardian (2015a). Junaid Hussain: British hacker for Isis believed killed in US airstrike, The Guardian. Available at: Retrieved 19.03.2017

Guardian (2015a). US Central Command Twitter account hacked to read 'I love you Isis. The Guardian, Available at Retrieved 19.03.2017

Hall, A. (2017). Teenage female ISIS fanatic was 'radicalized at the age of seven and stabbed a German police officer because she was unable to make it to Syria, Mail Online. Available at: Retrieved 19.03.2018.

Huggler, J. (2016). Syrian teenager arrested in Germany 'was planning Isil bomb attack. The Telegraph.Available at: Retrieved 19.03.2017

Iklody, G. (2010). The New Strategic Concept and the Fight Against Terrorism: Challenges&Opportunities. TerörizmleMücadeleDergisi, 3(2), 3-12.

Jevtic, M. (2007). Political Science and Religion. The Politics and Religion Journal. 1(1). 59-69.

Khandelwal, S. (2015). Anonymous has claimed to have taken down 20,000 ISIS-affiliated Twitter accounts, The Hacker News Available at Retrieved 19.03.2017

Kolata, G. (2001). Veiled messages of terrorists may lurk in cyberspace. New York Times. Available at: Retrieved 19.03.2017

Lockhart, K (2015).#OpISIS: Why Anonymous has declared an online war against Isil - in 90 seconds. The Telegraph. Available at: Retrieved 19.03.2017

Mickolus, E. (2016). Terrorism, 2013–2015: A Worldwide Chronology. North Carolina, US: McFarland & Company Inc. Jefferson.

Murphy, L. (2015). The Curious Case Of The Jihadist Who Started Out As A Hacktivist. Vanity Far. Available at: Retrieved 19.03.2017

Ogun, M. N. (Ed.). (2015). Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. Washington, DC: IOS Press.

Robertson, N., Cruickshank, P., & Lister, T. (2012). Documents reveal al Qaeda's plans for seizing cruise ships, the carnage in Europe. CNN: Assyrian International News Agency.

Spencer, R. (2015). The complete infidel's guide to ISIS. New York, NY: Simon and Schuster.

Stainer, M. (2015). Ghost Sec, an Anonymous affiliate, hacks ISIS site on the deep web with Viagra, Prozac ad. Washington Times. Available at: Retrieved 19.03.2017

Szoldra, P. (2016). Here’s how the military tracked down and killed the top hacker for ISIS. Business Insider. Available at: Retrieved 19.03.2017

Tafoya, W. L. (2011). Cyberterror. FBI Law Enforcement Bulletin(80)1. 1-16.

Trifunović, D. (2015). Digital steganography in terrorist networks, XLII International Symposium on Operations Research, Belgrade: Faculty of Mathematics.

Weimann, G. (2011). Cyberterrorism: How Real is the Threat? United States Institute of Peace Special Report No. 119. Special Report, Retrieved 19.03.2017



  • There are currently no refbacks.

© University of Niš, Serbia
Creative Commons licence CC BY-NC-ND
Print ISSN: 0353-7919
Online ISSN: 1820-7804