Terror Recruiters Target Indians on Internet

Terror Recruiters Target Indians on Internet is a news report published by The Times of India on 18 July 2014, written by Sandhya Soman. The article examines online radicalisation and recruitment tactics used by extremist organisations including ISIS, following reports that four young men from Maharashtra had travelled to Iraq. It includes commentary from Sunil Abraham on how insular social networks and limited critical media literacy can increase vulnerability to propaganda disseminated through social media platforms.

Contents

  1. Article Details
  2. Full Text
  3. Context and Background
  4. External Link

Article Details

📰 Published in:
The Times of India
✍️ Author:
Sandhya Soman
📅 Date:
18 July 2014
📄 Type:
News Report
📰 Newspaper Link:
Read Online

Full Text

MUMBAI: What's in a name? If it indicates your religious identity, then you could get trolled by strangers wanting to draw you in with videos on the importance of archaic customs and doctored accounts of world history. City-based lawyer Shakeel Ahmed recently took one such bait on the Holocaust from a stranger on WhatsApp just to know what kind of propaganda is in circulation.

"I can laugh at such videos and false images but they might confuse youngsters," says Ahmed. Online baiting to lure sympathizers and recruits by seasoned extremists has been on the police radar. If the four youngsters from Thane and Kalyan are indeed now in Iraq fighting for the Islamic militia ISIS, then a good part of their indoctrination could have happened online, say experts.

ISIS is known to have an aggressive social media policy, including an Arabic-language Twitter app, to spread their message and recruit supporters even after the Iraqi government curtailed internet in areas captured by the group recently. "There are many websites, including jihadi ones, favoured by people with extremist leanings," says Anti-Terrorism Squad (ATS) chief Himanshu Roy. Often, the initial contact is made on social networking sites and messenger services.

"The organizations spot youngsters and befriend them before inviting the trusted select to closed chat rooms," says K P Raghuvanshi, senior police official and former ATS head.

The discussion ranges from arranging finance to direct involvement, says Roy. "We have reason to believe that these four boys, who are all educated and come from reasonably well-off families, would have visited such sites and exchanged views with others," he says, refusing to elaborate. The youngsters are supposed to have been in touch with each other.

Those without a wide social network are easy targets, says Sunil Abraham, executive director of Centre for Internet and Society, a research organization. "If, as a young Muslim, you are in touch with only your friends and family, you might believe the false information that enters your circle of trust," he says. Contrary to belief, you don't meet a variety of people on social media. "Unless you have a critical understanding of internet, the medium with its interactivity and multi-media potential could aid propaganda," he says.

It was terrorist group Al-Qaeda that started using technology effectively since 2001. Its supporters came together to upload good quality videos of beheadings and suicide bombings to grab attention. Now, there is a variety of 'jihadist' software to prevent detection, whether it is a plug-in for instant messaging service, encryption for text messages or a stealth online network, according to media reports.

In India, terrorists took to technology in a big way from 2008 onwards when Indian groups like Indian Mujahideen recruited educated people, says an official. "Even a man who didn't know English, learnt to type Hindi using English alphabets and send and receive attachments," says the officer.

While officials say that it is difficult to monitor all the online activity, Roy says that ATS will tackle it. "This is the first instance of youngsters from Maharashtra going out to fight some other war," he says.

Back to Top ⇧

Context and Background

The article was published amid heightened public attention following reports that four young men from Thane and Kalyan in Maharashtra had travelled abroad and were believed to have joined ISIS. The episode became one of the earliest widely reported cases in India linking overseas conflict zones in Syria and Iraq to online recruitment pathways, triggering closer scrutiny by law enforcement agencies of how radicalisation could occur through digital networks rather than physical contact alone.

By this period, ISIS had developed a highly coordinated online propaganda operation. Its outreach relied on professionally produced videos, multilingual social media accounts, and mobile applications designed to circulate material rapidly and cultivate sympathisers across national borders. Encrypted messaging services and invitation-only forums played a central role in sustaining recruitment efforts while limiting visibility to authorities.

The article’s reference to Indian Mujahideen reflected earlier domestic experiences with digitally enabled militancy. From around 2008 onwards, Indian security agencies had observed how homegrown extremist groups recruited educated individuals, including those with technical skills, and adopted digital tools for communication, coordination, and dissemination of propaganda. This marked a shift from earlier forms of militancy that depended largely on face-to-face networks and low-tech methods.

At the time, Indian agencies faced practical and legal challenges in responding to online radicalisation. The scale of digital communication, widespread use of encryption, and fragmentation across platforms made monitoring difficult. While laws such as the Unlawful Activities (Prevention) Act and the Information Technology Act provided mechanisms for prosecution, identifying and intervening at early stages of radicalisation remained complex. These difficulties were further compounded by ongoing debates around surveillance powers, proportionality, and the need to balance security objectives with constitutional protections and civil liberties.

📄 This page was created on 23 December 2025. You can view its history on GitHub, preview the fileTip: Press Alt+Shift+G, or inspect the .