Abstract
This paper examines the intersection of online gaming and terrorism, highlighting how terrorist organizations leverage online gaming and mods platforms to recruit and radicalize new members. Terrorist organizations have increasingly utilized online gaming and other digital platforms to recruit and radicalize individuals. Video games are multifaceted creative works integrating various art forms, including music, writing, narrative, visual arts, and character design. These complex productions require human engagement and interaction to unfold, leveraging computer programming and specialized hardware to bring the gaming experience to life. However, terrorist organizations have explored this avenue in recruiting members into their organizations. Seventy per cent of terrorist organizations have used online gaming platforms for recruitment and radicalization. The paper used social learning theory as its theoretical construct. The paper relied on secondary data-gathering techniques. The paper reveals the complexities of this phenomenon, including the use of mods to promote extremist ideologies, the exploitation of online gaming communities, and the role of social media and other digital channels in facilitating terrorist recruitment. Hence, the paper recommend amongst others a synergy among the Law enforcement agencies and counter-terrorism organizations aimed at monitoring and disrupting terrorist activities on online gaming platforms.
References
Aarseth, E. (2004). Genre trouble: Narrativism and the art of simulation. In N. Wardrip-Fruin & P. Harrigan (Eds.), First person: New media as story, performance, and game (pp. 45–55). MIT Press.
Bakunin, M. (1873). Statism and Anarchy. Translated and edited by Sam Dolgoff in 1971. Cambridge University Press.
Bandura, A. (1986). Social Foundations of Thought and Action: A Social Cognitive Theory. Englewood Cliffs, NJ: Prentice Hall.
Bandura, A. (1977). Social Learning Theory. Englewood Cliffs, NJ: Prentice Hall.
Barton, K. M., & Maharg, P. (2009). Reconceptualising the Video Game as a Medium. Journal of Gaming & Virtual Worlds, 1(2), 139–153.
Bazin, A. (1967). The ontology of the photographic image. Film Quarterly, 13(2), 4–9.
Bellis, M. (2004). The History of the Internet. About.com. http://inventors.about.com/library/inventors/blinternet.htm
Björk, S., & Holopainen, J. (2005). Patterns in game design. Charles River Media.
Bjorklund, D. F., & Pellegrini, A. D. (2010). Evolutionary perspectives on social development. In P. K. Smith & C. H. Hart (Eds.), The Wiley- Blackwell handbook of childhood social development (pp. 64–81). Oxford, England: Wiley-Blackwell.
Bloom, M. (2011). Bombshell: Women and Terror. University of Pennsylvania Press.
Bogost, I. (2006). Unit operations: An approach to videogame criticism. MIT Press.
Bryman, A. (2012). Social research methods. Oxford University Press.
Bushman, B. J., & Huesmann, L. R. (2006). Is there a causal link between media violence and aggression? Journal of Social Issues, 62(3), 603–621.
Ceruzzi, P. E. (2003). A history of modern computing. MIT Press.
Clement, J.(2024). “Video gamer distribution worldwide 2022, by region” Statista https://www.statista.com/statistics/297874/number-mobile-gamers-region/
Cook, P. (2005). The cinema book. BFI Publishing.
Counter Extremism Project. (2020). The Use of Online Advertising by Terrorist Organizations.
Counter Extremism Project. (2020). The Use of Online Games by Terrorist Organizations.
Counter Extremism Project. (2020). The Use of Online Influencers by Terrorist Organizations.
Curran, K. Canning,P. Laughlin, M. McGowan C. & Rory-Carlin, R.(2005). Online Gaming. American Journal of Applied Sciences 2 (3): 622–625, 2005
Dauber, C., Robinson, M., Baslious, J., & Blair, A. (2019). Call of Duty: Jihad — How the Video Game Motif Has Migrated Downstream from Islamic State Propaganda Videos. Perspectives on Terrorism, 13/3: 17–31.
Ducheneaut, N., Yee, N., & Candy, L. (2006). The life and times of a guild: Understanding the social dynamics of massively multiplayer online games. Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology.
Erikson, E. H. (1977). Toys and reasons: Stages in the ritualization of experience. New York, NY: Norton.
Ferguson, C. J. (2010). The influence of television and video games on aggression. Journal of Applied Developmental Psychology, 31(5), 273–278.
Francastel, P. (1956). Art and technology in the nineteenth and twentieth centuries. Columbia University Press.
Ganor, B. (2002). Defining terrorism: Is one man’s terrorist another man’s freedom fighter? Police Practice and Research, 3(4), 287–304.
Gee, J. P. (2007). What video games have to teach us about learning and literacy? Palgrave Macmillan.
Genachowski, J. (2010). The third way: A narrow and tailored broadband framework. Federal Communications Commission.
Gombrich, E. H. (1971). The story of art. Phaidon.
Hakim, C. (1982). Secondary analysis in social research. Allen & Unwin
Hamari, J., & Koivisto, J. (2015). Why do people use gamification services? International Journal of Information Management, 35(4), 419–431.
Hegghammer, T. (2014). Jihadism: Online Discourse and the Abstraction of Violence. In New Media and the New Middle East (pp. 103–122). New York: Columbia University Press.
Hinton, A. (2013). Can video games be used to promote peacebuilding? Journal of Peacebuilding & Development, 8(2), 147–162.
Hoffman, B. (2006). Inside terrorism. Columbia University Press.
Holt, T. J., Freilich, J. D., & Chermak, S. M. (2019). The Spread of Terrorist and Extremist Propaganda via Online Gaming. Journal of Terrorism Research, 10(2), 1–15.
Huizinga, J. (1955). Homo ludens: A study of the play-element in culture. Beacon Press.
Josephus, F. (93 AD). The Jewish War. Penguin Books.
Juul, J. (2010). A casual revolution: Reinventing video games and their players. MIT Press.
Juul, J. (2005). Half-real: Video games between real rules and fictional worlds. MIT Press.
Kaspersky. (2020). The state of gaming security. Kaspersky Labs.
Katz, Y. (2007, April 19). Hezbollah’s special force video game. The Jerusalem Post.
Kent, S. L. (2001). The Ultimate History of Video Games: From Pong to Pokémon and Beyond. Three Rivers Press.
Koehler, D. (2014). The radical online: Individual radicalization processes and the role of
the internet. NATO Science for Peace and Security Series, E: Human and Societal Dynamics, 113. IOS Press.
Kohlmann, E. (2023). The digital caliphate: How terrorist organizations are exploiting social media. Journal of Counterterrorism Studies, 1(1), 1-15.
Kohlmann, E. (2014). The Role of Social Media in the Spread of Terrorist Ideology. Journal of Terrorism Research, 5(1), 1–15.
Kumar, A. (2019). Cybersecurity in the gaming industry. Journal of Cybersecurity, 5(1), 1–12.
Kushner, D. (2003). Masters of doom: How two guys created an empire and transformed pop culture. Random House.
Kuss, D. J., & Griffiths, M. D. (2012). Internet gaming addiction: A review of the literature. International Journal of Mental Health and Addiction, 10(1), 1–18.
Laqueur, W. (2003). The Age of Terrorism. Little, Brown and Company.
Lange, D. (2017). Copyright in the digital age. Stanford University Press.
Lastowka, G. (2010). Virtual justice: The new laws of online worlds. Yale University Press.
Levitt, M. (2014, September). Hamas’s Gaza Assault Video Game. PolicyWatch, 2325. The Washington Institute for Near East Policy.
Levy, S. (1984). Hackers: Heroes of the computer underground. Anchor Press.
McJohn, S. M. (2006). Copyright: Examples and Explanations. Aspen Publishers.
Montfort, N. & Bogost, I. (2009). Racing the beam: The Atari video computer system. MIT Press.
Murray, J. H. (2003). Hamlet on the holodeck: The future of narrative in cyberspace. MIT Press.
Ogele, E. P. (2024). Terrorist financing in the digital age: An analysis of cryptocurrencies and online crowd funding. Journal of Terrorism Studies, 6(2).
Payne, M.T. (2016). Playing War: Military Video Games after 9/11. New York University Press.
Piaget, J. (1962). Play, dreams and imitation (Vol. 24). New York, NY: Norton.
Raming, S. (2023). Counter Recruiting in the Online Gaming Community. Toda Peace Institute. Policy Brief No. 163.
RAND Corporation. (2012). Al-Qaeda’s use of the internet (MG-1183-OSD). Santa Monica, CA: RAND Corporation Pub.
Rapoport, D. C. (2004). The four waves of modern terrorism. In A. K. Cronin & J. M. Ludes (Eds.), Attacking terrorism: Elements of a grand strategy (pp. 46–73). Georgetown University Press.
Sageman, M. (2008). Leaderless Jihad. Terror Networks in the Twenty-First Century. University of Pennsylvania Press.
SANS Institute (2019). Malware attacks on online gaming platforms. SANS Institute.
Saunders, M. N., Lewis, P. & Thornhill, A. (2009). Research methods for business students. Pearson Education.
Sheff, D. (1993). Game over: How Nintendo conquered the world. Random House.
Ucko, P. J., & Rosenfeld, A. (1967). Palaeolithic cave art. Weidenfeld & Nicolson.
US Army Cyber Institute. (2019). Cybersecurity threats to military personnel and their families. US Army Cyber Institute.
Wardlaw, G. (1989). Political terrorism: Theory, tactics, and counter-measures. Cambridge University Press.
Weimann, G. (2016). Terrorist Migration to the Dark Web. Perspectives on Terrorism, 10(3) pp. 40–44
Weimann, G. (2014). Terrorist Migration to the Dark Web. Journal of Terrorism Research, 5(1), 1–15.
Weimann, G. (2010). Terror on the internet: The new arena, the new challenges. United States Institute of Peace.
Vanderbilt, J. (2013). The Essential Guide to Video Game Writing and Design. A K Peters/ CRC Press.
Vygotsky, L. (1978). Mind in society: The development of higher psycho- logical functions. Cambridge, MA: Harvard University Press.
Wolf, M. J. P. (2001). The medium of the video game. University of Texas Press.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright (c) 2025 Political Observer | Revista Portuguesa de Ciência Política (Portuguese Journal of Political Science)