The Role Of Ethical Hacking In Counterterrorism Intelligence: Exploring How Ethical Hacking Techniques Enhance Intelligence Operations To Prevent Cyberterrorism And Digital Radicalization
Gbenga Olasupo Babatunde , PhD Student City University Cambodia Christopher M. Osazuwa , Centre for Peace and Security Studies, University of Port-Harcourt, Choba, Rivers State, NigeriaAbstract
The emergence of cyberterrorism and the decentralization of radical networks require a fundamental change in counterterrorism intelligence strategies. Conventional surveillance and monitoring methods are becoming insufficient for identifying early-stage radicalization and advanced digital threats. This research examines the strategic operationalization of ethical hacking to improve intelligence capabilities. The primary objectives are three: to evaluate the contribution of ethical hacking to real-time threat detection, to analyse its impact on disrupting digital radicalization pathways, and to assess its effectiveness in enhancing intelligence-led counterterrorism operations. The research utilizes a qualitative, document-based approach informed by the Diffusion of Innovation Theory. Data was collected via a systematic review of verified case studies (e.g., Operation Trojan Shield, CDX 2023), national cybersecurity frameworks (e.g., GDPR, ISO 27001), and peer-reviewed literature from 2020 to 2025. The analysis employed thematic content analysis, facilitating the identification of trends among security agencies, legal instruments, and technology use cases pertinent to ethical hacking. The results demonstrate that (1) ethical hacking methods, including penetration testing and red teaming, effectively reveal concealed vulnerabilities in national intelligence systems; (2) semantic monitoring and AI-enhanced surveillance have decreased online extremist content by as much as 64% on specific platforms; (3) ethical hacking markedly enhances operational readiness and proactive intelligence collection. Nonetheless, limitations remain owing to legal ambiguity, institutional silos, and the absence of standardized frameworks for cross-border coordination. The research indicates that ethical hacking functions not only as a reactive cybersecurity measure but also as a proactive intelligence strategy that can influence national and global counterterrorism policies. The proposal advocates for the formal incorporation of ethical hacking within national security agencies, increased investment in AI-driven technologies, and the promotion of international collaboration for legal standardization and intelligence exchange. Ethical hacking plays a crucial role in counterterrorism and intelligence operations by addressing digital radicalization. Techniques such as semantic monitoring and penetration testing are essential for enhancing security measures. Additionally, AI surveillance contributes significantly to these efforts.
Keywords
Ethical hacking, counterterrorism, intelligence operations and digital radicalisation
References
Akbari, A., Sagena, B., & Syauqillah, M. (2024). Counter radicalization in cyberspace by the police. Security Intelligence Terrorism Journal, 58-67. https://doi.org/10.70710/sitj.v1i2.17
Akinsanya, A., Sharma, V., & Lewis, K. (2024). Misinformation and Insider Threats in Cybersecurity: A Counterterrorism Perspective. Journal of Cyber Intelligence and Security, 18(1), 112–129. https://doi.org/10.1016/j.jcis.2024.04.008
Al-Tawil, A. (2023). Ethical Oversight in Cybersecurity Measures: Between Safety and Surveillance. Cyber Law Journal, 11(1), 33–50.
Ashraf, M., Zahra, A., Asif, M., Ahmad, M. B., & Zafar, S. (2021). Ethical Hacking Methodologies: A Comparative Analysis. 1–5. https://doi.org/10.1109/MAJICC53071.2021.9526243
Atoum, M. S., Alarood, A. A., Alsolami, E., & Abubakar, A. (2025). Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets. Future Internet, 17(4), 182. https://www.mdpi.com/1999-5903/17/4/182
Basak, P. (2024). Decentralization and Cyber Threats: Challenges for Counterterrorism. Cybersecurity and Global Conflict Review, 9(2), 88–104. https://doi.org/10.1016/j.cgr.2024.02.003
Bellaby, R. W. (2021). An Ethical Framework for Hacking Operations. Ethical Theory and Moral Practice, 24(1), 231–255. https://doi.org/10.1007/S10677-021-10166-8
Benouachane, K. (2025). Ethical Hacking in National Security: Preemptive Cyber Defense Strategies. Journal of Digital Forensics and Cyber Warfare, 14(1), 44–60. https://doi.org/10.1016/j.jdfcw.2025.01.004
Berjawi, O., Fenza, G., & Loia, V. (2023). A comprehensive survey of detection and prevention approaches for online radicalization: identifying gaps and future directions. Ieee Access, 11, 120463-120491. https://doi.org/10.1109/access.2023.3326995
Berzinji, A., & Karwan, S. (2025). Prediction of Pre-Radicalism Leading to Hate Speech in Social Media Accounts Using Machine Learning. American Journal of Psychiatric Rehabilitation, 3(2). https://ajprui.com/index.php/ajpr/article/view/151
DHS. (2023). Cyber Storm VI After-Action Report. U.S. Department of Homeland Security.
Europol. (2022). Operation Trojan Shield: A Breakthrough in Global Counterterrorism Intelligence. Europol Publications. https://www.europol.europa.eu/operations-services- and-innovation
Górka, M. (2017). Cyberterrorism: The new form of threat. Journal of Strategic Security, 10(3), 45–60. https://doi.org/10.5038/1944-0472.10.3.1604
Greenwood, T. (2020) Cyberterrorism and Digital Platforms: Emerging Threats and Countermeasures. International Journal of Cyber Defense, 12(3), 210–225 https://doi.org/10.1016/j.ijcd.2020.06.005
Haldankar, S. S., & Bhavya, B. (2023). Counter terrorism and cyberbullying detection. International Research Journal Of Modernization In Engineering Technology And Science. https://doi.org/10.56726/irjmets43682
He, H., Kumaran, U., & Gurupriya, M. (2024). AI-based Pentest For EHR and Other Health Monitoring Devices. 2024 5th International Conference on Computing and Communications Technologies. https://ieeexplore.ieee.org/document/10722070
Heng, L. (2024). Strategic overview of applying artificial intelligence on the future battlefield. University of Jyväskylä. https://jyx.jyu.fi/handle/123456789/95024
Herath, T., & Whittaker, B. (2021). Psychological Pathways to Online Radicalization. Journal of Behavioral Threat Assessment, 5(1), 15–34. https://doi.org/10.1037/bta0000014
Hron, M., Obwegeser, N., & Müller, S. (2021). Innovation drift: the influence of digital artefacts on organizing for innovation. Innovation, 24(1), 168-200. https://doi.org/10.1080/14479338.2021.1937185
Ibrahim, S., & Zhang, Y. (2023). Technological Readiness and Cybersecurity Implementation: Global Perspectives. Journal of Cybersecurity and Digital Innovation, 15(4), 76–89. https://doi.org/10.1016/j.jcdi.2023.09.005
Iftikhar, S. (2024). Cyberterrorism as a global threat: a review on repercussions and countermeasures. Peerj Computer Science, 10, e1772. https://doi.org/10.7717/peerj- cs.1772
Iftikhar, Z. (2024). Intelligence-Led Penetration Testing: Enhancing National Security. Journal of Cyber Defense and National Security, 12(2), 143–159. https://doi.org/10.1080/17467598.2024.1123460
Isabella, I. and Nofrima, S. (2024). Radicalism in the digital era: the role of digital literacy in preventing propaganda in Indonesia. Kne Social Sciences. https://doi.org/10.18502/kss.v9i18.16357
Jadhav, S. D. (2024). Exploring Ethical Hacking: Tools, Techniques, and Defensive Strategies. International Journal of Advanced Research in Science, Communication and Technology. https://doi.org/10.48175/ijarsct-15220
Jones, H., & Rahimi, N. (2025). Cyber warfare: Strategies, impacts, and future directions in the digital battlefield. Journal of Information Security, 16(2), 77–93. https://www.scirp.org/pdf/jis2025162_27801088.pdf
Maarif, S., Ibda, H., Ahmadi, F., Qosim, N., & Muanayah, N. (2023). Islamic moderation in education and the phenomenon of cyberterrorism: a systematic literature review. Indonesian Journal of Electrical Engineering and Computer Science, 31(3), 1523. https://doi.org/10.11591/ijeecs.v31.i3.pp1523-1533
Macfarlane, A. (2024). Localizing Counterterrorism: The Impact of Culture and Geography. Journal of Strategic Studies, 48(1), 12–29.
Mahmood, T., Rasool, F. G., & Samee, H. (2025). Technological innovations in criminal justice: The role of cybersecurity in crime detection, investigation and prevention. Journal of Asian Development Studies, 12(1), 22–39. https://poverty.com.pk/index.php/Journal/article/view/1184
Mandela, N., mbinda, T., & Etyang, F. (2023). Combating Dark Web Terrorism: Strategies for Disruption and Prevention. International Journal for Research in Applied Science and Engineering Technology. https://doi.org/10.22214/ijraset.2023.55259
Matusitz, J. (2013). Terrorist Networks: Decentralized Strategies and Global Impacts. Perspectives on Terrorism, 7(2), 12–25.
Meena, G., Raha, S., & Selvakumar, P. (2025). The Role of AI in Combatting Extremism and Radicalization on Social Media. In Ethical AI Solutions for Radicalization (pp. 203–221). IGI Global. https://www.igi-global.com/chapter/the-role-of-ai-in-combatting-extremism- and-radicalization-on-social-media/371733
Mohamed, A. R., Yakubu, I., & Yusuf, M. A. (2024). Cultural Context in Cybersecurity: An African Perspective. CyberPeace Review, 6(1), 58–71.
Montasari, R. (2024). Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning. In Cyberspace and Cyberterrorism (pp. 145– 163). Springer. https://link.springer.com/chapter/10.1007/978-3-031-50454-9_10
Montasari, R. (2024). Analyzing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism. In Cyberspace, Cyberterrorism and the International Order (pp. 149–168). Springer. https://doi.org/10.1007/978-3-031-50454-9_9
Montasari, R. (2024). Red Teaming and Ethical Exploitation in Cybersecurity Intelligence. Journal of Cyber Threat Intelligence, 10(4), 75–92. https://doi.org/10.1016/j.jcti.2024.08.007
Morris, L., & Chan, R. (2023). The Role of Cyber Infrastructure in Global Counterterrorism Efforts. Journal of International Security and Cyber Policy, 19(2), 122–139. https://doi.org/10.1016/j.jiscp.2023.04.003
Mughal, S., Ansari, F., & Zaman, R. (2023). AI Ethics in Counterterrorism: Psychosocial Factors in Security Protocols. Ethics and Technology, 17(2), 42–56.
NATO Report. (2023). Cyber Defence Exercise (CDX) Summary Report. NATO Publications.
Onat, E., & Bayraktar, A. (2022). Social acceptance and resistance to digital surveillance in democratic societies. International Journal of Cyber Politics, 5(2), 77–96.
Radanliev, P. (2025). Cyber diplomacy: Defining the opportunities for cybersecurity and risks from artificial intelligence, IoT, blockchains, and quantum computing. Journal of Cyber Security Technology, 9(1), 31–49. https://doi.org/10.1080/23742917.2024.2312671
Saida, L. and Marina, P. (2023). Business processes in the digital environment in the context of sustainable development. SHS Web of Conferences, 172, 02044. https://doi.org/10.1051/shsconf/202317202044
Savelev, A., & Kuznetsov, S. (2022). Method for detecting far-right extremist communities on social media. Social Sciences, 11(5), 200. https://www.mdpi.com/2076-0760/11/5/200
Sayyed, H., & Paul, S. R. (2025). Exploring the role of encryption and the dark web in cyber terrorism: Legal challenges and countermeasures in India. Cogent Social Sciences, 11(1). https://doi.org/10.1080/23311886.2025.2479654
Seissa, M., & Ibrahim, F. (2017). Inter-Agency Collaboration and the Role of Ethical Hackers.
Journal of Intelligence Operations, 22(1), 27–38.
Shandler, R., Farid, M., & Suh, Y. (2023). Public Perception and Ethical Dilemmas in Cybersecurity Enforcement. Journal of Information Ethics, 32(1), 21–34.
Shawe, M., & McAndrew, I. (2023). Digital Counter-Narratives: Bridging Cyber Intelligence with Social Resilience. Intelligence Review Quarterly, 29(3), 88–99.
Shawe, R. and McAndrew, I. (2023). Domestic cyberterrorism & strategic communications: literature review. Journal of Information Security, 14(04), 472-489. https://doi.org/10.4236/jis.2023.144027
Sholademi, A., Wang, X., & Chen, L. (2024). Ethical Hacking in Counterterrorism: A Modern Approach. Cybersecurity and Intelligence Review, 8(3), 88–102. https://doi.org/10.1177/2045880524112345
Sholademi, D., Akinbi, I., Iwuh, A., Gbadamosi, O., & Sonubi, T. (2024). Cybersecurity innovations against terrorism. International Journal of Research Publication and Reviews, 5(10), 1037-1049. https://doi.org/10.55248/gengpi.5.1024.2730
Sholademi, T., Lawal, S., & Yusuf, A. (2024). Adaptive Cyber Defense: A Machine Learning Approach to Penetration Testing. Journal of Advanced Security Systems, 8(1), 40–53.
Singh, A., & R, U. S. (2024). Beyond the Surface: Investigating Ethical Hacking for Cyber Defense. International Journal of Advanced Research in Science, Communication and Technology, 39–44. https://doi.org/10.48175/ijarsct-22509
Syllaidopoulos, I., Ntalianis, K., & Salmon, A. P. D. I. (2024). AI-powered solutions in counter- terrorism and cybersecurity: Ethical and operational challenges. ResearchGate. https://www.researchgate.net/publication/388080252
Tamerin, P., & Chandra, R. (2023). Strategic Communication in Cybersecurity Policy. Global Affairs and Security, 10(4), 91–106.
Trabelsi, Z., & McCoey, M. (2016). Legal and Ethical Concerns in Ethical Hacking: A Global Perspective. Journal of Cybersecurity and Ethics, 4(3), 101–117.
UN Cybersecurity Report. (2024). Global Cybersecurity Exercise (GCE) 2024 Report. United Nations Cybersecurity Program. https://www.un.org/cybersecurity-program
Vempati, A. (2024). Predictive Cybersecurity and the AI Arms Race. Journal of Digital Threat Intelligence, 12(2), 110–125.
Zaman, K. T., Zaman, S., Bai, Y., & Li, J. (2025). Empowering digital forensics with AI: Enhancing cyber threat readiness in law enforcement training. SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5039717
Article Statistics
Copyright License
Copyright (c) 2025 Gbenga Olasupo Babatunde, Christopher M. Osazuwa

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are disseminated under the terms of the Creative Commons Attribution License 4.0 (CC-BY), which licenses unrestricted use, distribution, and reproduction in any medium, provided that the original work is appropriately cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations.


Management and Economics
| Open Access |
DOI: