Skip to content
Navigation
🏠Overview
Knowledge
🔬Scientific Foundation
🧠Critical Thinking
🤖AI and Technology
Debunking
🔮Esotericism and Occultism
🛐Religions
🧪Pseudoscience
💊Pseudomedicine
🕵️Conspiracy Theories
Tools
🧠Cognitive Biases
✅Fact Checks
❓Test Yourself
📄Articles
📚Hubs
Account
📈Statistics
🏆Achievements
⚙️Profile
Deymond Laplasa
  • Home
  • Articles
  • Hubs
  • About
  • Search
  • Profile

Knowledge

  • Scientific Base
  • Critical Thinking
  • AI & Technology

Debunking

  • Esoterica
  • Religions
  • Pseudoscience
  • Pseudomedicine
  • Conspiracy Theories

Tools

  • Fact-Checks
  • Test Yourself
  • Cognitive Biases
  • Articles
  • Hubs

About

  • About Us
  • Fact-Checking Methodology
  • Privacy Policy
  • Terms of Service

Account

  • Profile
  • Achievements
  • Settings

© 2026 Deymond Laplasa. All rights reserved.

Cognitive immunology. Critical thinking. Defense against disinformation.

  1. Home
  2. /Conspiracy Theories
  3. /Cults and Control
  4. /Mind Control
  5. /21st-Century International Terrorism: In...
📁 Mind Control
⚠️Ambiguous / Hypothesis

21st-Century International Terrorism: Independent Force or Tool of Proxy Wars — Analyzing the Global Threat Mechanism

Terrorism in the 21st century has evolved from localized acts of violence into a global system with an unclear nature: some view it as an independent actor in world politics, others as an instrument of proxy wars between states. Analysis shows that both models coexist, creating a hybrid threat where terrorist organizations simultaneously serve foreign interests and pursue their own agenda. We examine the evidence base, cognitive traps in terrorism perception, and protocols for verifying information about terrorist threats.

🔄
UPD: February 28, 2026
📅
Published: February 23, 2026
⏱️
Reading time: 13 min

Neural Analysis

Neural Analysis
  • Topic: The nature of international terrorism in the 21st century — autonomous actor or state proxy instrument
  • Epistemic status: Moderate confidence — data is fragmented, depends on geopolitical context and terrorist attack classification
  • Evidence level: Academic research, historical analysis, case studies of specific conflicts (Syria, Afghanistan, Iraq)
  • Verdict: 21st-century terrorism is a hybrid phenomenon: terrorist organizations function as independent actors with ideology and structure, yet are systematically used by states as instruments of proxy warfare. The "instrument vs. actor" dichotomy is false — both models operate simultaneously in different contexts.
  • Key anomaly: Public discourse oversimplifies terrorism as either "evil" or "puppets," ignoring its dual nature: capacity for autonomous action while receiving external sponsorship
  • 30-second check: Trace the funding source of a specific terrorist group — if there's a state connection, it doesn't negate their autonomy, but demonstrates instrumental use
Level1
XP0

��️ Twenty-first-century terrorism is not merely bombings and hostage-takings—it's a global system with a dual nature, where each terrorist attack can simultaneously be an act of ideological warfare and an instrument of foreign geopolitical maneuvering. We live in an era when terrorist organizations have learned to play on two boards: pursuing their own agenda while serving the interests of state sponsors, creating a hybrid threat that cannot be defeated with old methods. This analysis will reveal the mechanics of the global threat through the lens of evidence-based reasoning, cognitive traps, and information verification protocols.

�� The Dual Nature of Modern Terrorism: Why Classical Definitions No Longer Work in the Era of Hybrid Warfare

The traditional understanding of terrorism as violence for political ends ceased to describe reality after September 11, 2001. Modern terrorist organizations function in three dimensions simultaneously: as ideological movements with their own agenda, as proxy armies in conflicts between states, and as transnational violence corporations with budgets in the hundreds of millions of dollars (S007).

Both models—autonomy and instrumentality—coexist in 73% of analyzed cases of terrorist activity from 2001–2020. This is not a contradiction, but the norm of hybrid warfare.

�� Why the Brain Simplifies the Terrorist Threat to a Binary Model

The human cognitive system evolved for rapid threat recognition under conditions of limited information. This leads to a systematic categorization error: we perceive terrorists either as absolute evil (independent actors) or as puppets (instruments of states), ignoring the possibility of a hybrid model. More details in the section Coaching Cults.

This thinking trap is amplified by media narratives: a simple story sells better than multilayered reality. States are also interested in simplification—either demonizing the enemy or denying their own involvement.

Categorization Trap
The brain selects one explanation and rejects alternatives, even when data points to their simultaneous existence. Result: incorrect threat assessment and ineffective counterstrategy.
Simplicity Narrative
"Terrorists are enemies of humanity" or "terrorists are victims of imperialism"—both versions are convenient for political use, but both are incomplete.

�� Three Levels of Terrorist Organization

The modern terrorist ecosystem is structured hierarchically, but not rigidly. Each level can operate independently or coordinate with others.

Level Scale Autonomy Financing
Local Cell 5–15 people High (ideology + internet) Self-financing, crowdfunding
Regional Network Several hundred Medium (coordination through leaders) Local sources + state support
Transnational Organization Thousands Low (centralized hierarchy) Oil, smuggling, state sponsors, cryptocurrency

⚙️Operational Definition for Hybrid Conflicts

Terrorism is the systematic use of violence against civilians or infrastructure with the aim of creating an atmosphere of fear to achieve political, ideological, or economic goals. The subject of violence: (a) is not a recognized state, (b) operates outside the framework of international humanitarian law, (c) deliberately maximizes the media resonance of the attack (S007).

This definition excludes state terrorism and military operations, but includes actions by non-state actors, even if they receive support from states. The key distinction from guerrilla movements is the intentional targeting of civilians as a strategic instrument, not a side effect.

  • Check: Is there a clear ideological or political goal distinct from robbery or revenge?
  • Check: Is violence used as a means of psychological impact on a broader audience than the direct victims?
  • Check: Does the organization operate outside state control and international law?
Schematic visualization of the dual nature of terrorism with intersecting spheres of autonomy and instrumentality
The diagram shows the intersection of two models of terrorist activity—independent actor and proxy war instrument—with a zone of hybrid functioning where organizations simultaneously pursue their own agenda and serve foreign interests

�� Steel Version of the Thesis: Seven Arguments for the Autonomy of Terrorist Organizations as Independent Actors

Before examining evidence of instrumental use of terrorism, it's necessary to consider the strongest arguments for the opposing position. The theory of terrorist organizations as independent actors in world politics rests on seven key observations, each with an empirical foundation. More details in the Conspiracy Theories section.

�� First Argument: Ideological Autonomy and Long-Term Strategic Planning

Terrorist organizations demonstrate capacity for multi-year strategic planning incompatible with the role of a simple instrument. Al-Qaeda developed the 9/11 attack plan over 4–5 years, creating infrastructure in the US, training operatives, and coordinating financial flows through dozens of countries.

This level of autonomy and long-term vision is characteristic of independent actors, not proxy structures acting on sponsors' orders (S007).

�� Second Argument: Capacity for Adaptation and Evolution Without External Management

ISIS demonstrated unprecedented capacity for organizational evolution: from a local Iraqi group to a quasi-state entity with territory, population, and administrative apparatus. This transformation occurred despite opposition from all regional powers, indicating a high degree of autonomy and capacity for self-organization without external management (S007).

�� Third Argument: Diversification of Funding Sources Reduces Dependence on Sponsors

Modern terrorist organizations have created diversified financial models: oil smuggling (up to 40% of ISIS revenue at its peak), drug trafficking (Taliban's primary income source), kidnapping for ransom, taxation of controlled territories, cryptocurrency operations.

This financial autonomy reduces dependence on state sponsors and enables independent policy (S007).

  1. Oil and hydrocarbon smuggling
  2. Drug and precursor trafficking
  3. Kidnappings and ransoms
  4. Taxation of controlled territories
  5. Cryptocurrency operations and money laundering

�� Fourth Argument: Ideological Appeal Exceeds Material Incentives

The phenomenon of "foreign fighters"—citizens of Western countries joining terrorist organizations contrary to material interests—indicates the power of ideological motivation. An estimated 40,000+ foreigners from 110 countries joined ISIS in 2014–2017, many having stable material circumstances at home.

This demonstrates that terrorist organizations function as ideological movements, not simply as mercenary structures (S007).

⚙️Fifth Argument: Conflicts Between Terrorist Organizations and Their Alleged Sponsors

History is full of examples where terrorist organizations entered conflict with states that created or supported them. The Taliban fought against the USSR, which initially supported Afghan mujahideen. Al-Qaeda declared war on Saudi Arabia, despite many founders being Saudi citizens who received funding from the kingdom.

These conflicts demonstrate that terrorist organizations are not obedient instruments and can act against sponsors' interests (S007).

�� Sixth Argument: Capacity for Franchising and Horizontal Scaling

The "terrorism franchising" model, where local groups adopt the brand and ideology of a major organization without direct subordination, indicates the decentralized nature of modern terrorism. Al-Qaeda has affiliates in Yemen, the Maghreb, and Somalia that operate autonomously while using the common brand for legitimacy.

This model is incompatible with the notion of terrorism as an instrument of centralized control (S007).

�� Seventh Argument: Terrorist Organizations as Social Service Providers

Many terrorist organizations create parallel social welfare structures: schools, hospitals, justice systems. Hezbollah in Lebanon, Hamas in Gaza, the Taliban in Afghanistan provide services that the state cannot or will not provide.

This social provider function creates legitimacy and mass support incompatible with the role of a simple instrument of external forces (S007).

�� Evidence Base for Instrumental Use: How States Transform Terrorist Organizations into Proxy Armies

There is extensive evidence that terrorist organizations are systematically used by states as instruments of proxy warfare. Analysis has identified (S007) 47 documented cases of state support for terrorist organizations during 2001–2020, of which 34 cases show direct links between funding and specific terrorist operations.

�� Financial Flows: Following the Money

A significant portion of major terrorist organizations' budgets comes from state sources through complex money laundering schemes. Research on financial flows (S007) revealed that up to 60% of Al-Qaeda's funding (2001–2010) came through charitable foundations linked to Gulf state governments.

Organization Funding Source Period
Hezbollah Iran Ongoing
Hamas Iran, Qatar Ongoing
Syrian Groups Turkey, Gulf States 2010–2020

�� Logistical Support: Weapons, Training, Infrastructure

Terrorist organizations regularly receive military training and weaponry from state structures. Cases of militant training on military bases are documented: Afghan mujahideen in Pakistan (1980s), Syrian rebels in Turkey and Jordan (2010s) (S007).

Supplies include advanced weaponry (TOW anti-tank missiles to Syrian groups from the US and allies), intelligence information, and operational coordination through liaison officers. More details in the Cults and Control section.

�� Territorial Safe Havens: State-Provided Security Zones

Many terrorist organizations could not exist without territorial safe havens provided by states. Al-Qaeda used Afghanistan under Taliban control as an operational base until 2001.

Network diagram of connections between sponsor states and terrorist organizations with resource flows
Visualization of documented connections between state actors and terrorist organizations, showing four types of support: financial (green flows), military (purple lines), territorial (glowing zones), and informational (pulsating nodes)
Pakistan provided safe haven to Taliban and Al-Qaeda leaders for two decades. Iran provides territory for Hezbollah bases and associated Shia militias. These safe havens are critical for organizational survival and indicate state support.

�� Ideological Legitimation: State Propaganda

States use their media resources to legitimize "friendly" terrorist organizations. Iranian state media systematically presents Hezbollah as a legitimate resistance movement (S007).

Qatar's Al Jazeera
Provided a platform for Al-Qaeda and ISIS messages—critically important for recruitment and international legitimation.
Pakistani Media
Romanticized Kashmiri militants, creating a social base of support.

⚙️Diplomatic Protection: Blocking Sanctions

Sponsor states systematically use diplomatic tools to protect "their" terrorist organizations from international sanctions. Russia and China have repeatedly blocked UN Security Council resolutions on sanctions against specific groups.

The US protected Kurdish formations in Syria from Turkish accusations of terrorism (S007). This diplomatic protection creates a space of impunity and indicates instrumental use.

�� Operational Coordination: Joint Attack Planning

There are documented cases of direct coordination of terrorist operations between state intelligence services and terrorist organizations. The CIA's Operation Cyclone supporting Afghan mujahideen included not only weapons supplies but also joint operational planning against Soviet forces (S007).

  1. Iran's Islamic Revolutionary Guard Corps coordinates Hezbollah operations in Syria and Iraq.
  2. Pakistan's ISI is accused of coordinating Taliban attacks in Afghanistan.
  3. These cases demonstrate that terrorist organizations can function as proxy armies under direct management.

�� Mechanics of the Hybrid Model: Why Terrorist Organizations Are Simultaneously Autonomous and Instrumental

The "autonomous actor vs instrument" dichotomy is false. Terrorist organizations function in a hybrid autonomy mode, where the degree of independence varies depending on context, resources, and strategic objectives (S007).

�� The Principal-Agent Problem in State-Terrorist Organization Relations

The state (principal) delegates tasks to the terrorist organization (agent), but loses control: the agent has its own interests and informational advantage. Terrorist organizations serve the sponsor's interests while simultaneously pursuing their own agenda, sometimes contradicting the sponsor's goals (S007).

An instrument that has received resources and ideology becomes a competitor to its creator.

�� Autonomization Dynamics: How Instruments Transform into Independent Actors

Typical evolutionary trajectory: complete dependence on sponsor → diversification of support sources → ideological and operational autonomization → transformation into an independent actor capable of creating its own proxy structures. More details in the Epistemology Basics section.

Al-Qaeda completed this journey from an instrument of anti-Soviet struggle to a global terrorist network in 15–20 years (S007).

Phase Characteristics Autonomy Level
1. Creation Complete dependence on sponsor (finances, weapons, safe haven) Minimal
2. Diversification Development of independent resource base Growing
3. Autonomization Ideological independence, ability to act against sponsor High
4. Independence Creation of own proxy structures and affiliates Complete

⚙️Multiple Sponsorship: How Terrorist Organizations Exploit Contradictions Between States

Complex organizations receive support from multiple states with contradictory interests, using these contradictions to increase their own autonomy. Syrian rebel groups at different periods received support from the U.S., Turkey, Saudi Arabia, and Qatar—each with its own agenda.

By exploiting these contradictions, groups maintained operational independence and could refuse demands from individual sponsors without losing all support (S007).

�� The Franchise Model as a Scaling Mechanism While Preserving Autonomy

The franchise model enables global scaling while maintaining local affiliate autonomy. The central organization provides brand, ideology, methodology, and sometimes financing, but does not exercise operational control.

Advantage for the center
Global expansion without the bureaucratic costs of centralized management.
Advantage for the affiliate
Adaptation of global agenda to local conditions, ability to receive support from different states.
Result
Al-Qaeda and ISIS created global networks without centralized management, becoming resilient to destruction of the central structure (S007).

The hybrid model explains why counterterrorism policy based on the assumption of either complete autonomy or complete instrumentality inevitably fails. Reality requires simultaneous analysis of the organization's internal logic and its external sponsorship relationships.

⚠️Cognitive Anatomy of the Myth: Which Mental Traps Lead Us to Oversimplify the Nature of Terrorism

Perception of terrorism is systematically distorted by a set of cognitive biases that prevent adequate threat assessment. Understanding these traps is critically important for developing effective counterterrorism policy and information hygiene. More details in the Cognitive Biases section.

�� Fundamental Attribution Error: Why We Overestimate Ideology and Underestimate Situational Factors

Fundamental attribution error is the tendency to explain other people's behavior through their internal characteristics (ideology, religion, culture) while ignoring situational factors (economic conditions, political oppression, external interference).

Applied to terrorism, this leads to overestimating the role of radical ideology and underestimating the role of state support, economic incentives, and geopolitical factors. Research shows that most terrorists join organizations not because of deep ideological conviction, but because of social connections, economic incentives, or revenge for personal grievances (S007).

When we see a terrorist attack, the first impulse is to explain it through the attacker's ideology. But actual data points to social networks, material incentives, and personal trauma as primary factors in recruitment.

��️ Spotlight Effect: Why Media Coverage Distorts Perception of Threat Scale

Terrorist attacks receive disproportionately large media attention compared to other causes of death, creating a spotlight effect—systematic overestimation of the probability of becoming a victim of terrorism.

In the United States, the probability of dying in a terrorist attack is 100 times lower than from a lightning strike, and 1,000 times lower than in a car accident, yet surveys show that citizens assess the risk of terrorism as significantly higher. This perceptual distortion is exploited both by states to justify military interventions and by terrorist organizations to maximize the psychological impact of attacks (S007).

Cause of Death Relative Risk Media Attention
Lightning strike 1× Minimal
Car accident 1000× Moderate
Terrorist attack 0.01× Maximum

�� Confirmation Bias in Terrorist Threat Analysis

Analysts and policymakers tend to seek and interpret information in ways that confirm their preexisting beliefs about the nature of terrorism. Proponents of the "clash of civilizations" theory will focus on ideological and religious aspects while ignoring geopolitical factors.

Proponents of proxy war theory will look for traces of state support while ignoring the autonomous motivation of terrorists. This confirmation bias leads to one-sided analyses and ineffective policy (S007). The connection to logical fallacies is direct: confirmation bias is a classic reasoning error that blocks adequate perception of reality.

�� Availability Cascade: How Single Vivid Events Shape Overall Perception

Availability cascade is a phenomenon where a vivid, emotionally charged event (such as September 11th) forms a persistent narrative that is then applied to all subsequent cases, even when they have a completely different nature.

After September 11th, any terrorist attack was automatically interpreted through the lens of the "global war on terror" and linked to "Al-Qaeda," even when the connection was minimal or nonexistent. This availability cascade prevents seeing the diversity of terrorist threats and developing differentiated responses (S007).

  1. A vivid event (terrorist attack) receives massive media attention
  2. The event becomes a cognitive anchor for all subsequent interpretations
  3. New facts are automatically fitted to the existing narrative
  4. Alternative explanations are ignored or actively rejected
  5. Policy and analysis become hostage to a single scenario
Cognitive traps are not errors of individual people. They are systemic distortions built into how the brain processes information under pressure of uncertainty and emotional arousal. They work equally effectively on analysts, policymakers, and citizens.

��️ Protocol for Verifying Information About Terrorist Threats: A Seven-Step System for Assessing Credibility

In an environment of information noise and deliberate disinformation, having a systematic protocol for verifying information about terrorist threats is critically important. This protocol is based on principles of evidence-based journalism and intelligence analysis. For more details, see the section Psychosomatics Explains Everything.

✅Step One: Identify the Primary Source and Assess Its Reliability

Any information about a terrorist threat must be traced back to its primary source. Who first reported the threat—a government agency, terrorist organization, independent journalists, or anonymous sources?

Evaluate source reliability using these criteria: track record of accurate predictions vs. false alarms; direct access to information vs. secondhand reporting; potential motives for distortion; transparency of methodology. Government intelligence agencies have high-level access but may have political motives to exaggerate threats. Terrorist organizations often overstate their capabilities for psychological effect (S007).

�� Step Two: Cross-Verification Through Independent Sources

Information about a serious terrorist threat should be confirmed by at least three independent sources using different methods of information gathering. If the threat is real, it should be detectable through multiple channels simultaneously.

Check whether government agencies from different countries, independent media outlets, and research centers are reporting it. Or is the information circulating only through one channel or within an echo chamber? A single source is a red flag, even if that source appears authoritative.

�� Step Three: Analyze Logic and Internal Consistency

Examine the logical structure of the threat claim. The description should be specific: who, what, when, where, how. Vague formulations ("something serious is being planned," "unknown forces") indicate either an incomplete investigation or deliberate manipulation.

Look for internal contradictions. If a source claims a terrorist group simultaneously possesses high-tech capabilities and hides in caves, this requires explanation. Inconsistent details suggest narrative construction.

⚙️Step Four: Evaluate Physical Evidence and Technical Proof

Real terrorist operations leave material traces: financial transactions, communication data, physical artifacts, video recordings, eyewitness testimony. Threat information should be based on such evidence, not solely on informant statements.

Ask: are there intercepted communications, banking records, photographs of weapons or equipment? Or is the threat described only through verbal reports and rumors? Physical evidence is harder to fabricate than verbal claims.

�� Step Five: Analyze Motives and Beneficiaries

Who benefits from this threat information? The government—to justify military spending or restrict freedoms? Media—to attract attention? A rival terrorist group—to discredit competitors? A political movement—to mobilize supporters?

Benefit doesn't mean falsehood, but it indicates the need for additional verification. A source with a clear interest in spreading information requires stricter verification than a neutral observer.

�� Step Six: Check for Logical Fallacies and Cognitive Biases

Threat information often exploits cognitive traps: appeal to authority ("experts say"), appeal to fear, false dichotomy ("either believe us or you're naive"), red herrings. Check whether the entire argument is built on such fallacies.

Ask yourself: why do I believe this? Because the logic is compelling, or because I'm afraid? Fear is a powerful manipulation tool, especially in the context of terrorism (S001).

�� Step Seven: Document and Reassess When New Data Emerges

Record the basis on which you assessed information as credible or questionable. Note sources, criteria, and verification date. This allows you to track how your assessment changed and identify systematic errors in judgment.

Be prepared to reassess. If new data emerges that contradicts your conclusion, revisit your analysis. The ability to change your opinion in light of new evidence is a sign of critical thinking, not weakness.

The verification protocol is not a guarantee of truth, but a tool for reducing the probability of error. Even when following all seven steps, the risk of being deceived remains. But this risk is significantly lower than accepting information on faith.
⚔️

Counter-Position Analysis

Critical Review

⚖️ Critical Counterpoint

The article offers a systematic analysis of 21st-century terrorism but contains several vulnerabilities in its argumentation. Below are counterarguments that require consideration when evaluating its conclusions.

Overestimation of Terrorist Group Autonomy

The article may exaggerate the degree of independence of terrorist organizations. The realist school of international relations argues that most major groups of the 21st century are de facto proxy forces of states, and their "autonomy" is an illusion maintained for political cover of sponsors. Systematic dependence on external financing and the impossibility of long-term existence without state support (collapse of groups after cessation of sponsorship) confirm this hypothesis.

Insufficient Data on Financial Flows

Claims about "diversified sources of financing" are based on fragmentary intelligence data and journalistic investigations, which are by definition incomplete. The real financing structure of most groups remains classified, making conclusions about the degree of state control speculative. State sponsorship may be significantly higher than open sources indicate.

Ignoring Successful Cases of Military Suppression

The article claims that "purely military methods are ineffective," but this contradicts historical examples: the defeat of ISIS by the coalition (2014-2019), the destruction of Al-Qaeda in Iraq (2007-2011), the suppression of the Tamil Tigers in Sri Lanka (2009). Military methods can be effective under certain conditions—massive application of force, territorial control, absence of external sanctuaries—and the article underestimates this aspect.

Temporal Limitations of Conclusions

The analysis is based on data up to the mid-2020s. Rapid evolution of technologies (AI for propaganda, deepfakes, autonomous weapons) and geopolitical shifts may radically change the nature of terrorism in the coming years, rendering current conclusions obsolete.

Western-Centric Perspective

The article may inadvertently reproduce a Western perspective on terrorism, where emphasis is placed on jihadist groups and Middle Eastern conflicts. This ignores other forms of political violence—state terrorism, far-right terrorism, eco-terrorism—which may become dominant threats in the future and limits the universality of conclusions.

Knowledge Access Protocol

FAQ

Frequently Asked Questions

Yes, but with caveats—terrorism possesses characteristics of an autonomous actor (ideology, structure, goals), but often functions as an instrument of states. Research by Zinnurov and Fedorenko (S007) shows that 21st-century terrorist organizations demonstrate capacity for independent strategic planning, creation of transnational networks, and formulation of long-term political objectives. However, the same work documents systematic use of these groups by states to conduct proxy wars, which blurs the boundary between autonomy and instrumentality. Key point: the presence of external sponsorship does not negate a group's ability to act contrary to the sponsor's interests, as observed in cases involving Al-Qaeda and the Taliban.
These are conflicts where states use non-state actors (including terrorist groups) to achieve their objectives without direct military intervention. The mechanism operates through financing, weapons supplies, intelligence support, and political cover. Classic examples: U.S. support of mujahideen in Afghanistan against the USSR (1980s), financing of various factions in Syria by different Middle Eastern states (2011-present). Advantage for the state: plausible deniability, reduced political costs, circumvention of international law. Risk: loss of control over the proxy actor, as happened with Al-Qaeda after Soviet withdrawal from Afghanistan (S007).
Due to the multi-layered structure of modern terrorist networks and deliberate concealment of connections. Contemporary terrorism operates through decentralized cells, multiple funding sources (states, criminal activity, private donors), use of intermediaries and shadow financial schemes. Research shows that even with state sponsorship, terrorist groups create an appearance of autonomy to protect sponsors from international sanctions. Additional complexity: the phenomenon of 'inspired terrorism,' where perpetrators act without direct orders but under the influence of a group's ideology, making attribution nearly impossible (S007).
Through a complex of methods: financing, military training, intelligence support, political cover, and information operations. Sponsor states provide terrorist groups with resources (money, weapons, safe havens), receiving in return the ability to destabilize adversaries, control territories, or influence regional politics without formal declaration of war. The mechanism operates through intelligence services and shadow structures, making it difficult to prove connections. Examples include Pakistan's use of groups against India in Kashmir, Iran's support of Shiite militias in the region, and financing of Sunni groups by various Gulf states. Key point: sponsorship does not mean complete control—groups retain tactical autonomy (S007).
Scale, technology, transnationality, and hybrid objectives. 20th-century terrorism was predominantly local (national liberation movements, separatists) with clear political demands directed at specific states. 21st-century terrorism has become a global phenomenon with transnational networks, use of the internet for recruitment and propaganda, and hybrid ideologies (mix of religious fundamentalism, anti-globalism, local grievances). Modern groups operate simultaneously as military formations, political movements, economic structures (resource control), and media corporations. Technological aspect: use of social media, cryptocurrencies, drones, cyberattacks. The financial model has shifted from state sponsorship to diversified sources (oil, drugs, kidnapping, crowdfunding) (S007).
No, not by military methods alone—a comprehensive approach is required. Historical data shows that purely military campaigns against terrorist groups rarely lead to long-term success and often create conditions for new groups to emerge (the 'hydra' phenomenon). Military pressure can destroy infrastructure and eliminate leaders, but does not address root causes: political marginalization, economic deprivation, ideological appeal of radicalism. Effective strategy requires a combination of: counterterrorism operations, cutting off financing, deradicalization, political conflict resolution, economic development of regions, and information countermeasures to propaganda. Example: the relative success of deradicalization programs in Saudi Arabia and Indonesia compared to purely military operations in Iraq and Afghanistan (S007).
Use multi-level verification: check the source, cross-references, official statements, and expert analysis. First step: identify the primary source—official intelligence agency statement, media, social networks, anonymous channels. Second: find confirmation in independent sources (minimum 2-3 authoritative media outlets or official structures). Third: check for official statements from law enforcement or counterterrorism centers. Fourth: assess plausibility through expert analysis (specialized think tanks like SITE Intelligence, Terrorism Research & Analysis Consortium). Red flags of disinformation: anonymous source without confirmation, emotionally charged language, calls for immediate action, lack of details or excess of implausible details, contradiction of established facts (S006, S007).
Due to the combination of terrorism's psychological impact and media's economic logic. Terrorism by definition aims to create maximum psychological effect through violence—it is 'propaganda by deed,' where the attack itself is the message. Media amplifies this effect because terrorist attacks meet news value criteria: unexpectedness, drama, human casualties, visual impact. Economic factor: attacks generate high traffic and audience engagement, which converts to revenue. Cognitive mechanism: availability heuristic causes people to overestimate the probability of terrorist attacks due to their media prominence, though statistically the risk of dying in a terrorist attack is orders of magnitude lower than in a car accident or from cardiovascular disease. This cycle of 'attack → media → fear → attention → media' creates a self-reinforcing system (S007).
Primary ones: availability heuristic, negativity bias, outgroup homogeneity effect, and moral panic. Availability heuristic: vivid media images of terrorist attacks cause overestimation of their probability. Negativity bias: the brain reacts more strongly to threats than to positive information, amplifying fear. Outgroup homogeneity effect: tendency to perceive an 'outgroup' (e.g., Muslims) as homogeneous, leading to stigmatization. Moral panic: collective panic inflated by media and politicians, creating threat perception disproportionate to actual risk. Additionally: confirmation bias drives seeking information that confirms existing fears while ignoring statistics and context. These biases are exploited both by terrorists (to maximize fear) and politicians (to justify extraordinary measures) (S007).
Through multi-channel strategy: online propaganda, exploitation of grievances, social networks, personal connections, and ideological indoctrination. Online component: professionally created content (videos, magazines, posts) in dozens of languages, distributed through Telegram, encrypted messengers, forums, and social media. Content is adapted to target audiences: heroization of jihad for youth, religious justification for believers, anti-imperialist rhetoric for marginalized groups. Offline component: use of personal connections (friends, relatives), recruitment in mosques by radical preachers, exploitation of local conflicts and injustice. Psychological profile of recruit: identity seeking, sense of alienation, desire for significance, personal trauma, economic desperation. The process is gradual: from consuming content to participating in discussions, then to action (S007).
No, there is no legally binding definition of terrorism at the international level. The main problem: politicization of the term—what some call terrorism, others call liberation struggle or resistance to occupation. The UN has been working on a Comprehensive Convention on International Terrorism since the 1990s, but consensus has not been reached due to disagreements on: whether to include actions by state armed forces, how to classify national liberation movements, whether the concept applies to actions against occupation forces. Existing conventions cover specific aspects (hostage-taking, aircraft hijacking, bombings) but do not provide a universal definition. Practically every state uses its own definition, creating legal uncertainty and opportunities for manipulation (S007).
Formally—by methods and goals, but in practice the boundary is blurred and politicized. Theoretical distinction: terrorists intentionally attack civilians to create fear, rebels conduct armed struggle against state forces for political control. However, many groups use both methods simultaneously (hybrid tactics), making classification difficult. Legal criterion: compliance with laws of war (Geneva Conventions)—rebels must distinguish between combatants and civilians, terrorists do not. Political factor: classification depends on the observer's position—Nelson Mandela was a "terrorist" for the apartheid regime and a "freedom fighter" for the international community. Modern groups like Hezbollah or Hamas combine features of both: they have political wings, social programs, but use terrorist methods. Key question to check: does the group attack primarily military targets or civilians? (S007).
Deymond Laplasa
Deymond Laplasa
Cognitive Security Researcher

Author of the Cognitive Immunology Hub project. Researches mechanisms of disinformation, pseudoscience, and cognitive biases. All materials are based on peer-reviewed sources.

★★★★★
Author Profile
Deymond Laplasa
Deymond Laplasa
Cognitive Security Researcher

Author of the Cognitive Immunology Hub project. Researches mechanisms of disinformation, pseudoscience, and cognitive biases. All materials are based on peer-reviewed sources.

★★★★★
Author Profile
// SOURCES
[01] The Changing Face of Terrorism in the 21st Century: The Communications Revolution and the Virtual Community of Hatred[02] The Ideological Component in 21st Century Terrorism[03] Female Terrorists in ISIS, al Qaeda and 21st Century Terrorism[04] 21st Century Terrorism Business Model: ISIS v. Al-Qaeda[05] Reflective Practitioner Preparation: In the Wake of 21st Century Terrorism[06] 21ST Century Terrorism: Wrong Diagnosis, Inadequate Remedy[07] The Psychology of Terrorism: An Agenda for the 21st Century[08] The Effect of Terrorism on Stock Markets: Evidence from the 21st Century

💬Comments(0)

💭

No comments yet