By Soumya Awasthi
The Australian Security Intelligence Organisation’s (ASIO) Director General Mike Burgess recently expressed concerns over the rising online radicalisation amongst the country’s youth.
In his annual assessment speech at Canberra, Burgess remarked that this had forced ASIO to raise the National Terrorism Threat Level from ‘Possible’ to ‘Probable’. Some of the concerning trends that pose direct challenges include lone-actor attacks, online radicalisation, the resurgence of far-right extremism, and concerns over returning foreign fighters.
At a time when cyberspace has emerged as a frontline for geopolitical conflicts and extremist activities, counterterrorism tactics must evolve to address the new realities of digital radicalisation, encrypted communications, and cyber-financed terrorism. Australia’s Counter-Terrorism and Violent Extremism Strategy 2025 provides a blueprint to address the modern-day terrorist threats by merging cybersecurity, artificial intelligence (AI)-driven surveillance, and intelligence-sharing mechanisms. Canberra seeks to pre-empt terrorist activities by using digital monitoring tools, administering stern encryption laws, and collaborating with intelligence units.
The digital threat landscape: The convergence of cybersecurity and terrorism
The snowballing of digital platforms and swift technological advances, such as AI, have created fertile ground for the propagation of extremist content. This content is no longer restricted to the dark web but has spread across mainstream platforms, including social media, gaming platforms, encrypted messaging services, and publicly accessible forums.
One of the most concerning developments is the infiltration of online gaming platforms used by millions of Australians. Extremist groups are increasingly utilising in-game chatrooms and gaming-related social media spaces—such as Discord, Steam, and Twitch—to target, groom, and radicalise the youth. Furthermore, social media algorithms continue to serve as amplifiers of radical content, creating echo chambers and increasing exposure to extremist narratives.
Although Australia has not witnessed any recent terrorist activities, the government acknowledges the heightened risk of ideologically motivated cyberattacks on Australian organisations. As per Cybercx’s Digital Forensics and Incident Response 2025 report, cyberspace has created a vast opportunity for terror groups to carry out recruitment, radicalisation, training, fundraising, communication, public perception, and planning, making it a vital asset in their strategy.
AI-driven misinformation and deepfake technology pose other challenges to Australia’s security landscape. Extremist groups use AI tools to create personalised deepfake videos and digital propaganda intended to influence public perception and provoke violence. For instance, deepfakes and AI-generated pornography, along with bots on Telegram distributing rape content, are being sold on dark-net platforms to generate funding, dehumanise target groups, and feed violence as part of radicalisation and recruitment efforts.
Australia’s counterterrorism approach: Cybersecurity as a pillar of national security
To combat the rising threat of digital terrorism, Australia has implemented a multi-pronged approach—combining strong legislative tools, mutual responsibility by industry partners, real-time monitoring, content takedown powers, financial intelligence, and international collaboration—that reflects modern extremism as a fluid, digital phenomenon.
According to Extremism Insights, the Department of Home Affairs removed 17,295 violent extremist content and 90,684 unique accounts from digital platforms between 2018 and 2024. In continuation of these efforts, in 2022, the Government of Australia partnered with Microsoft to create the Gaming Safety Toolkit, which assisted parents, carers, and gaming communities with age-specific advice.
The Counter-Terrorism and Violent Extremism Strategy 2025 employs a multi-agency approach and collaborative efforts between ASIO, the Australian Federal Police (AFP), the Australian Cyber Security Centre, and the Five Eyes intelligence-sharing network.
The Government of Australia has built a legislative network that could counter online extremism. The Counter-Terrorism Legislation Amendment (Prohibited Hate Symbols and Other Measures) Act 2023 introduced new criminal offences-,Counter%2DTerrorism%20Legislation%20Amendment%20(Prohibited%20Hate%20Symbols,and%20Other%20Measures)%20Bill%202023&text=This%20bill%20seeks%20to%20amend,and%20tactics%20of%20violent%20extremists.), such as possessing or distributing either online or verbally violent extremist material. This legislative effort is supplemented by the Online Safety Act 2021, which grants the e-Safety Commissioner powers to force digital platforms, search engines, app stores, and internet service providers to remove, delist, or block access to content promoting terrorism, violence, or extremist ideologies. This capability ensures that Australia has the regulatory authority and the operational tools to intervene swiftly when dangerous content surfaces online. In 2019, Australia amended its Australian Citizenship Amendment (Citizenship Cessation) Bill (2007), allowing the government to revoke the citizenship of dual nationals involved in terrorism.
One of the most vital aspects of Australia’s counterterrorism approach is its stringent encryption laws, which grant law enforcement the power to compel technology companies to provide access to encrypted communications. The Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018 has expanded the government’s surveillance capabilities, allowing intelligence agencies to intercept, decrypt, and monitor suspect communications.
The Australian Transaction Reports and Analysis Centre (AUSTRAC) is crucial in countering terror financing. Under the Anti-Money Laundering and Counter-Terrorism Financing regime, AUSTRAC ensures that regulated businesses prevent finances from diverting into terrorism. To further enhance this framework, the Anti-Money Laundering and Counter-Terrorism Financing Amendment Bill 2024 was passed by the Australian Parliament on 29 November 2024, reflecting Australia’s ongoing commitment to meeting international standards set by the Financial Action Task Force.
The dark web serves as a marketplace for illicit goods such as weapons, fake identification documents, the sale and purchase of cryptocurrencies, and cyberattack tools, enabling terrorist activities. Cryptocurrencies are another challenge, as Bitcoin and Monero allow terrorist organisations to fund their activities without leaving any financial footprint. This has raised concerns for financial intelligence agencies, prompting the AFP to collaborate with an American company, Chainanalysis, to carry out Operation Spincaster, monitoring blockchain transactions for suspicious activities. The 2024 Amendment Bill builds on this foundation by further aligning Australia’s laws with evolving global standards, including the misuse of cryptocurrencies.
Challenges
Australia’s counterterrorism strategy has enhanced advanced surveillance, AI-driven threat assessment, and biometric reporting to trace extremists, boosting the operational competencies of national law enforcement agencies. However, concerns persist around mass surveillance, algorithmic bias, racial profiling, and the erosion of digital privacy. Terrorist networks’ adaptability—using encrypted platforms, decentralised communication tools, and emerging technologies like quantum computing—steadily outperforms conventional monitoring approaches. This evolving digital landscape requires innovation, careful oversight, and a balance between national security and civil liberties. This guarantees that counterterrorism efforts do not inadvertently overpower free speech or mistake legitimate political discourse as extremist activity.
Lessons for India
India has undertaken numerous initiatives aligned with its national security goals. Nonetheless, it could benefit from adopting a more unified approach to counter the exploitation of cyberspace and emerging technologies by terrorist organisations by drawing inspiration from Australia’s systematic plan of action integrating AI-powered monitoring to detect early signs of radicalisation.
Clear legal frameworks should mandate platform cooperation for accessing encrypted communications, ensuring transparency and accountability. Strengthening intelligence-sharing alliances within the agencies and other like-minded partners would enhance the tracking of cross-border threats.
Although India already has a de-radicalisation and rehabilitation programme, it could also establish cyber rehabilitation programmes, combining psychological support, digital literacy, and vocational training to reintegrate at-risk individuals. By prioritising prevention, coordinated intelligence, and resilient infrastructure, India can build a future-ready counterterrorism framework that balances security needs with individual rights, fostering a secure and inclusive digital environment.
Conclusion
Australia’s Counter-Terrorism and Violent Extremism Strategy 2025 represents a technologically sophisticated and intelligence-driven approach to counterterrorism. However, its reliance on mass surveillance, AI-based threat detection, and strict encryption laws raises complex ethical and legal debates. While effective in neutralising digital threats, balancing national security and individual freedoms remains a critical challenge. India, facing similar hiccups in cyber radicalisation, can learn from Australia’s successes and shortcomings, ensuring its counterterrorism measures remain robust, ethical, and future-proof in an era of rapidly evolving digital threats.
About the author: Soumya Awasthi is Fellow, Centre for Security, Strategy and Technology at Observer Research Foundation.
Source: This article was published at the Observer Research Foundation.