Management and Economics | Open Access | DOI: https://doi.org/10.37547/tajmei/Volume07Issue10-04

The Role Of Ethical Hacking In Counterterrorism Intelligence: Exploring How Ethical Hacking Techniques Enhance Intelligence Operations To Prevent Cyberterrorism And Digital Radicalization

Gbenga Olasupo Babatunde , PhD Student City University Cambodia
Christopher M. Osazuwa , Centre for Peace and Security Studies, University of Port-Harcourt, Choba, Rivers State, Nigeria

Abstract

The emergence of cyberterrorism and the decentralization of radical networks require a fundamental change in counterterrorism intelligence strategies. Conventional surveillance and monitoring methods are becoming insufficient for identifying early-stage radicalization and advanced digital threats. This research examines the strategic operationalization of ethical hacking to improve intelligence capabilities. The primary objectives are three: to evaluate the contribution of ethical hacking to real-time threat detection, to analyse its impact on disrupting digital radicalization pathways, and to assess its effectiveness in enhancing intelligence-led counterterrorism operations. The research utilizes a qualitative, document-based approach informed by the Diffusion of Innovation Theory. Data was collected via a systematic review of verified case studies (e.g., Operation Trojan Shield, CDX 2023), national cybersecurity frameworks (e.g., GDPR, ISO 27001), and peer-reviewed literature from 2020 to 2025. The analysis employed thematic content analysis, facilitating the identification of trends among security agencies, legal instruments, and technology use cases pertinent to ethical hacking. The results demonstrate that (1) ethical hacking methods, including penetration testing and red teaming, effectively reveal concealed vulnerabilities in national intelligence systems; (2) semantic monitoring and AI-enhanced surveillance have decreased online extremist content by as much as 64% on specific platforms; (3) ethical hacking markedly enhances operational readiness and proactive intelligence collection. Nonetheless, limitations remain owing to legal ambiguity, institutional silos, and the absence of standardized frameworks for cross-border coordination. The research indicates that ethical hacking functions not only as a reactive cybersecurity measure but also as a proactive intelligence strategy that can influence national and global counterterrorism policies. The proposal advocates for the formal incorporation of ethical hacking within national security agencies, increased investment in AI-driven technologies, and the promotion of international collaboration for legal standardization and intelligence exchange. Ethical hacking plays a crucial role in counterterrorism and intelligence operations by addressing digital radicalization. Techniques such as semantic monitoring and penetration testing are essential for enhancing security measures. Additionally, AI surveillance contributes significantly to these efforts.

Keywords

Ethical hacking, counterterrorism, intelligence operations and digital radicalisation

References

Akbari, A., Sagena, B., & Syauqillah, M. (2024). Counter radicalization in cyberspace by the police. Security Intelligence Terrorism Journal, 58-67. https://doi.org/10.70710/sitj.v1i2.17

Akinsanya, A., Sharma, V., & Lewis, K. (2024). Misinformation and Insider Threats in Cybersecurity: A Counterterrorism Perspective. Journal of Cyber Intelligence and Security, 18(1), 112–129. https://doi.org/10.1016/j.jcis.2024.04.008

Al-Tawil, A. (2023). Ethical Oversight in Cybersecurity Measures: Between Safety and Surveillance. Cyber Law Journal, 11(1), 33–50.

Ashraf, M., Zahra, A., Asif, M., Ahmad, M. B., & Zafar, S. (2021). Ethical Hacking Methodologies: A Comparative Analysis. 1–5. https://doi.org/10.1109/MAJICC53071.2021.9526243

Atoum, M. S., Alarood, A. A., Alsolami, E., & Abubakar, A. (2025). Cybersecurity Intelligence Through Textual Data Analysis: A Framework Using Machine Learning and Terrorism Datasets. Future Internet, 17(4), 182. https://www.mdpi.com/1999-5903/17/4/182

Basak, P. (2024). Decentralization and Cyber Threats: Challenges for Counterterrorism. Cybersecurity and Global Conflict Review, 9(2), 88–104. https://doi.org/10.1016/j.cgr.2024.02.003

Bellaby, R. W. (2021). An Ethical Framework for Hacking Operations. Ethical Theory and Moral Practice, 24(1), 231–255. https://doi.org/10.1007/S10677-021-10166-8

Benouachane, K. (2025). Ethical Hacking in National Security: Preemptive Cyber Defense Strategies. Journal of Digital Forensics and Cyber Warfare, 14(1), 44–60. https://doi.org/10.1016/j.jdfcw.2025.01.004

Berjawi, O., Fenza, G., & Loia, V. (2023). A comprehensive survey of detection and prevention approaches for online radicalization: identifying gaps and future directions. Ieee Access, 11, 120463-120491. https://doi.org/10.1109/access.2023.3326995

Berzinji, A., & Karwan, S. (2025). Prediction of Pre-Radicalism Leading to Hate Speech in Social Media Accounts Using Machine Learning. American Journal of Psychiatric Rehabilitation, 3(2). https://ajprui.com/index.php/ajpr/article/view/151

DHS. (2023). Cyber Storm VI After-Action Report. U.S. Department of Homeland Security.

Europol. (2022). Operation Trojan Shield: A Breakthrough in Global Counterterrorism Intelligence. Europol Publications. https://www.europol.europa.eu/operations-services- and-innovation

Górka, M. (2017). Cyberterrorism: The new form of threat. Journal of Strategic Security, 10(3), 45–60. https://doi.org/10.5038/1944-0472.10.3.1604

Greenwood, T. (2020) Cyberterrorism and Digital Platforms: Emerging Threats and Countermeasures. International Journal of Cyber Defense, 12(3), 210–225 https://doi.org/10.1016/j.ijcd.2020.06.005

Haldankar, S. S., & Bhavya, B. (2023). Counter terrorism and cyberbullying detection. International Research Journal Of Modernization In Engineering Technology And Science. https://doi.org/10.56726/irjmets43682

He, H., Kumaran, U., & Gurupriya, M. (2024). AI-based Pentest For EHR and Other Health Monitoring Devices. 2024 5th International Conference on Computing and Communications Technologies. https://ieeexplore.ieee.org/document/10722070

Heng, L. (2024). Strategic overview of applying artificial intelligence on the future battlefield. University of Jyväskylä. https://jyx.jyu.fi/handle/123456789/95024

Herath, T., & Whittaker, B. (2021). Psychological Pathways to Online Radicalization. Journal of Behavioral Threat Assessment, 5(1), 15–34. https://doi.org/10.1037/bta0000014

Hron, M., Obwegeser, N., & Müller, S. (2021). Innovation drift: the influence of digital artefacts on organizing for innovation. Innovation, 24(1), 168-200. https://doi.org/10.1080/14479338.2021.1937185

Ibrahim, S., & Zhang, Y. (2023). Technological Readiness and Cybersecurity Implementation: Global Perspectives. Journal of Cybersecurity and Digital Innovation, 15(4), 76–89. https://doi.org/10.1016/j.jcdi.2023.09.005

Iftikhar, S. (2024). Cyberterrorism as a global threat: a review on repercussions and countermeasures. Peerj Computer Science, 10, e1772. https://doi.org/10.7717/peerj- cs.1772

Iftikhar, Z. (2024). Intelligence-Led Penetration Testing: Enhancing National Security. Journal of Cyber Defense and National Security, 12(2), 143–159. https://doi.org/10.1080/17467598.2024.1123460

Isabella, I. and Nofrima, S. (2024). Radicalism in the digital era: the role of digital literacy in preventing propaganda in Indonesia. Kne Social Sciences. https://doi.org/10.18502/kss.v9i18.16357

Jadhav, S. D. (2024). Exploring Ethical Hacking: Tools, Techniques, and Defensive Strategies. International Journal of Advanced Research in Science, Communication and Technology. https://doi.org/10.48175/ijarsct-15220

Jones, H., & Rahimi, N. (2025). Cyber warfare: Strategies, impacts, and future directions in the digital battlefield. Journal of Information Security, 16(2), 77–93. https://www.scirp.org/pdf/jis2025162_27801088.pdf

Maarif, S., Ibda, H., Ahmadi, F., Qosim, N., & Muanayah, N. (2023). Islamic moderation in education and the phenomenon of cyberterrorism: a systematic literature review. Indonesian Journal of Electrical Engineering and Computer Science, 31(3), 1523. https://doi.org/10.11591/ijeecs.v31.i3.pp1523-1533

Macfarlane, A. (2024). Localizing Counterterrorism: The Impact of Culture and Geography. Journal of Strategic Studies, 48(1), 12–29.

Mahmood, T., Rasool, F. G., & Samee, H. (2025). Technological innovations in criminal justice: The role of cybersecurity in crime detection, investigation and prevention. Journal of Asian Development Studies, 12(1), 22–39. https://poverty.com.pk/index.php/Journal/article/view/1184

Mandela, N., mbinda, T., & Etyang, F. (2023). Combating Dark Web Terrorism: Strategies for Disruption and Prevention. International Journal for Research in Applied Science and Engineering Technology. https://doi.org/10.22214/ijraset.2023.55259

Matusitz, J. (2013). Terrorist Networks: Decentralized Strategies and Global Impacts. Perspectives on Terrorism, 7(2), 12–25.

Meena, G., Raha, S., & Selvakumar, P. (2025). The Role of AI in Combatting Extremism and Radicalization on Social Media. In Ethical AI Solutions for Radicalization (pp. 203–221). IGI Global. https://www.igi-global.com/chapter/the-role-of-ai-in-combatting-extremism- and-radicalization-on-social-media/371733

Mohamed, A. R., Yakubu, I., & Yusuf, M. A. (2024). Cultural Context in Cybersecurity: An African Perspective. CyberPeace Review, 6(1), 58–71.

Montasari, R. (2024). Addressing Ethical, Legal, Technical, and Operational Challenges in Counterterrorism with Machine Learning. In Cyberspace and Cyberterrorism (pp. 145– 163). Springer. https://link.springer.com/chapter/10.1007/978-3-031-50454-9_10

Montasari, R. (2024). Analyzing ethical, legal, technical and operational challenges of the application of machine learning in countering cyber terrorism. In Cyberspace, Cyberterrorism and the International Order (pp. 149–168). Springer. https://doi.org/10.1007/978-3-031-50454-9_9

Montasari, R. (2024). Red Teaming and Ethical Exploitation in Cybersecurity Intelligence. Journal of Cyber Threat Intelligence, 10(4), 75–92. https://doi.org/10.1016/j.jcti.2024.08.007

Morris, L., & Chan, R. (2023). The Role of Cyber Infrastructure in Global Counterterrorism Efforts. Journal of International Security and Cyber Policy, 19(2), 122–139. https://doi.org/10.1016/j.jiscp.2023.04.003

Mughal, S., Ansari, F., & Zaman, R. (2023). AI Ethics in Counterterrorism: Psychosocial Factors in Security Protocols. Ethics and Technology, 17(2), 42–56.

NATO Report. (2023). Cyber Defence Exercise (CDX) Summary Report. NATO Publications.

Onat, E., & Bayraktar, A. (2022). Social acceptance and resistance to digital surveillance in democratic societies. International Journal of Cyber Politics, 5(2), 77–96.

Radanliev, P. (2025). Cyber diplomacy: Defining the opportunities for cybersecurity and risks from artificial intelligence, IoT, blockchains, and quantum computing. Journal of Cyber Security Technology, 9(1), 31–49. https://doi.org/10.1080/23742917.2024.2312671

Saida, L. and Marina, P. (2023). Business processes in the digital environment in the context of sustainable development. SHS Web of Conferences, 172, 02044. https://doi.org/10.1051/shsconf/202317202044

Savelev, A., & Kuznetsov, S. (2022). Method for detecting far-right extremist communities on social media. Social Sciences, 11(5), 200. https://www.mdpi.com/2076-0760/11/5/200

Sayyed, H., & Paul, S. R. (2025). Exploring the role of encryption and the dark web in cyber terrorism: Legal challenges and countermeasures in India. Cogent Social Sciences, 11(1). https://doi.org/10.1080/23311886.2025.2479654

Seissa, M., & Ibrahim, F. (2017). Inter-Agency Collaboration and the Role of Ethical Hackers.

Journal of Intelligence Operations, 22(1), 27–38.

Shandler, R., Farid, M., & Suh, Y. (2023). Public Perception and Ethical Dilemmas in Cybersecurity Enforcement. Journal of Information Ethics, 32(1), 21–34.

Shawe, M., & McAndrew, I. (2023). Digital Counter-Narratives: Bridging Cyber Intelligence with Social Resilience. Intelligence Review Quarterly, 29(3), 88–99.

Shawe, R. and McAndrew, I. (2023). Domestic cyberterrorism & strategic communications: literature review. Journal of Information Security, 14(04), 472-489. https://doi.org/10.4236/jis.2023.144027

Sholademi, A., Wang, X., & Chen, L. (2024). Ethical Hacking in Counterterrorism: A Modern Approach. Cybersecurity and Intelligence Review, 8(3), 88–102. https://doi.org/10.1177/2045880524112345

Sholademi, D., Akinbi, I., Iwuh, A., Gbadamosi, O., & Sonubi, T. (2024). Cybersecurity innovations against terrorism. International Journal of Research Publication and Reviews, 5(10), 1037-1049. https://doi.org/10.55248/gengpi.5.1024.2730

Sholademi, T., Lawal, S., & Yusuf, A. (2024). Adaptive Cyber Defense: A Machine Learning Approach to Penetration Testing. Journal of Advanced Security Systems, 8(1), 40–53.

Singh, A., & R, U. S. (2024). Beyond the Surface: Investigating Ethical Hacking for Cyber Defense. International Journal of Advanced Research in Science, Communication and Technology, 39–44. https://doi.org/10.48175/ijarsct-22509

Syllaidopoulos, I., Ntalianis, K., & Salmon, A. P. D. I. (2024). AI-powered solutions in counter- terrorism and cybersecurity: Ethical and operational challenges. ResearchGate. https://www.researchgate.net/publication/388080252

Tamerin, P., & Chandra, R. (2023). Strategic Communication in Cybersecurity Policy. Global Affairs and Security, 10(4), 91–106.

Trabelsi, Z., & McCoey, M. (2016). Legal and Ethical Concerns in Ethical Hacking: A Global Perspective. Journal of Cybersecurity and Ethics, 4(3), 101–117.

UN Cybersecurity Report. (2024). Global Cybersecurity Exercise (GCE) 2024 Report. United Nations Cybersecurity Program. https://www.un.org/cybersecurity-program

Vempati, A. (2024). Predictive Cybersecurity and the AI Arms Race. Journal of Digital Threat Intelligence, 12(2), 110–125.

Zaman, K. T., Zaman, S., Bai, Y., & Li, J. (2025). Empowering digital forensics with AI: Enhancing cyber threat readiness in law enforcement training. SSRN. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5039717

Article Statistics

Copyright License

Download Citations

How to Cite

Gbenga Olasupo Babatunde, & Christopher M. Osazuwa. (2025). The Role Of Ethical Hacking In Counterterrorism Intelligence: Exploring How Ethical Hacking Techniques Enhance Intelligence Operations To Prevent Cyberterrorism And Digital Radicalization. The American Journal of Management and Economics Innovations, 7(10), 36–55. https://doi.org/10.37547/tajmei/Volume07Issue10-04