Terrorist Groups; The Enemy's Proxy in Modern Hybrid Warfare

Terrorist groups, utilizing asymmetric operations, psychological warfare, and new technologies, have become key tools in hybrid-cognitive wars. Supported by foreign powers, these groups pursue insecurity, delegitimization, and the weakening of social cohesion in target countries. Historical examples like ISIS, the Mujahedin-e Khalq (MEK), and Jaish al-Adl show how these groups have been used as proxy tools in hybrid wars. Meanwhile, cyberspace has become a vital arena for the spread of media terrorism, where terrorist groups, by publishing fake news, inciting ethnic tensions, and instilling despair, seek to influence public opinion and create instability. In an interview with Dr. Ali Ghadiri, an international affairs expert, we examined the capacities of terrorist groups in hybrid wars, historical examples of U.S. cooperation with these groups, and new strategies for neutralizing cyber and cognitive threats.

1. What capacity do terrorist groups have for use in proxy hybrid-cognitive wars? Can a historical pattern be pointed to in this regard?

Terrorist groups have significant capacity for exploitation in proxy hybrid-cognitive wars due to their structural, ideological, and operational characteristics. Essentially, terrorist groups in our time act as mercenaries for world powers and countries, playing a proxy role on behalf of superpowers. Given that direct confrontations in our time carry significant economic, political, and military repercussions and risks, enemies currently try to achieve their objectives using proxy groups. These groups possess specific capacities, the recognition of which can be effective in planning precise and effective measures to counter them.

• Execution of Asymmetric Operations: The first feature and capacity of proxy terrorist groups is the execution of asymmetric operations. Due to their decentralized and flexible structure, terrorist groups are capable of carrying out asymmetric operations that incur low military and political costs for their supporters. These operations, such as suicide attacks or bombings, can create deep psychological impacts on the target society and intensify a sense of insecurity. These groups can also infiltrate the weak points of the target society and deliver effective blows using techniques like cyber-attacks or prolonged, dispersed attacks.


• Use of Cognitive Warfare Tools: Media is one of the most important, accessible, and cheapest methods of influencing the public opinion of the target society. In cognitive warfare, the enemy, by producing a massive volume of news, data, and analyses, tries to influence the minds of the people and officials, leading to miscalculations and, consequently, despair and surrender among the people and officials of the target society. These groups, through producing media content, try to institutionalize fear, anxiety, and terror in the target society and negatively impact individuals' cognition. Through their specific narrative-building, they seek to delegitimize governments and activate ethnic, religious, and generational fault lines, and by influencing the perceptions and beliefs of the target society, turn the people against the authorities and rulers, creating instability and unrest in target societies.

 

• Delegitimization of Values and Norms: One method of terrorist groups in the cognitive sphere is the delegitimization of the values and beliefs of the target society. Values and beliefs in a society are factors of solidarity, cohesion, unity, and guarantors of its survival and vitality. Values and norms in human societies stem from the history, civilization, and ideologies of societies and are the link between different ethnicities in a country. For example, religious values in our society, which have permeated the life and existence of these people, and norms derived from Iranian nationality and civilization, have also infiltrated all fibers of our society, and these two factors link the vast majority of our people with different dialects, races, and numerous and diverse ethnicities. These terrorist groups, by delegitimizing values and norms, attempt to challenge the identity and foundation of a country and render that society identity-less or replace it with their desired identity. Therefore, when people and youth in target societies confront their values and norms, that society experiences anomie or confusion, and the foundations of its political, cultural, and identity system will face numerous problems.


• Delegitimization: The legitimacy of a political system is one of the most important factors for the durability, survival, and vitality of a political system. Essentially, in contemporary societies, governments and states cannot continue to exercise sovereignty without legitimacy. Of course, much can be said about the foundations of legitimacy in Western systems and religious systems, especially the Shiite system, which requires extensive time. But very briefly, it must be stated that in the liberal democracy system, the basis of the rulers' legitimacy is the will and desire of the people, but in the Islamic system, especially the Shiite system, the basis of legitimacy is the divine will. Therefore, terrorist groups, within the framework of cognitive-hybrid war, try to weaken the concept of the legitimacy of political systems, especially the Islamic system in Iran, in the minds of the people. The existence of legitimacy in a political system leads to people's obedience to the ruler and rulers. Therefore, delegitimization can lead to civil disobedience, turning the people against the ruling system and creating unrest and instability.


• False Narrative-Building: Terrorist groups generally, by presenting extremist ideologies, try to attract dissatisfied individuals and youth by presenting extremist and subversive views and using harsh concepts against the value system of society, and use them for suicidal actions. In today's world, the technological superiority of the West enables extremist and fundamentalist groups and Salafi ideologies to recruit and prepare individuals for suicide operations or violent actions. These ideologies, using false narratives derived from deviant religious or ethnic narratives, exploit social, ethnic, and religious fissures in target countries, creating a false sense of identity, belonging, solidarity, and cohesion among group members, and providing grounds for chaos and insecurity in target societies.

 

• Utilization of New Technologies: The enemy, leveraging technological superiority and using new technologies, has launched a vast campaign of cognitive attacks against target societies, including ours. Terrorist groups use digital technologies, such as communication bots, artificial intelligence, and multimedia content, to disseminate their messages and influence public opinion. These tools allow them to create widespread effects at low cost. Cyber-attacks, such as hacking websites or spreading false information, are also part of these groups' capacity in hybrid warfare.

Historical Patterns

Over more than four decades of the history of the Islamic Revolution, a vast number of cognitive patterns of terrorist groups can be named. I will try to mention a few very briefly.

Terrorist groups like ISIS, the Mujahedin-e Khalq (MEK), and groups linked to the PKK (such as PJAK) have significant capacity for use in proxy hybrid-cognitive wars against the Islamic Republic of Iran due to their structural characteristics, ideologies, and foreign support. For example, the Takfiri group ISIS acted at times as a proxy tool in hybrid wars against Iran and its allies (such as the governments of Syria and Iraq). This group, utilizing military, media, and psychological tools, created profound impacts in the region. Through the dissemination of violent videos and extensive propaganda on social media, such as Telegram and X (formerly Twitter), it tried to attract disillusioned individuals in target societies and spread fear and insecurity among the people of target countries, including Iran. By producing professional multimedia content, it promoted its extremist narratives and recruited forces from around the world. Also, ISIS carried out asymmetric operations in Iran, including the attack on the Islamic Consultative Assembly (Parliament) and the shrine of Imam Khomeini in June 2017. These attacks, although limited, were designed to create psychological insecurity and undermine public trust in Iran's security institutions. ISIS also, by promoting sectarian narratives (Sunni vs. Shiite), tried to intensify religious divides in Iran and the region and thereby target Iran's social cohesion.

Also, the Mujahedin-e Khalq (MEK) is one of the well-known groups that has played a role in hybrid-cognitive wars against the Islamic Republic of Iran and acted as a proxy tool for some Western and regional governments. This terrorist group uses media like affiliated television channels and websites, as well as social media, to publish false narratives against the Iranian system. By publishing fake or distorted news, this group tries to undermine the system's legitimacy and create despair in public opinion. The MEK has also collaborated with Western intelligence services, such as Mossad and the CIA, to collect sensitive information on Iran's nuclear and military programs. The disclosure of Iran's nuclear information in 2002 by this group is an example of their proxy role. This group, with the support of America and the Zionist regime, by forming extensive propaganda campaigns outside the country, seeks to create a united front against the Islamic Republic.

A historical example of this group's terrorist activities was directing the unrest in 2017 and 2019 in Iran, where through false narrative-building on social media platforms and publishing inflammatory content, they directed protests towards violence and armed operations, such as attacks on Basij bases and civilians. Also, separatist groups like the Komala factions and Turkish separatist currents, by promoting ethno-centric discourses, especially in Kurdish-inhabited and Turkish-inhabited regions of Iran, try to intensify ethnic divides and strengthen secessionist sentiments. These actions are part of the cognitive war to weaken national identity and social cohesion in Iran. These groups, by creating propaganda campaigns and fabricating false ethno-centric narratives, seek the country's disintegration. Attacks on border posts and the martyrdom of a number of Iranian soldiers and military personnel in recent years are historical examples of this case.

2. Are you aware of any historical examples of the U.S. resorting to terrorist groups to advance hybrid-cognitive war against Iran and other target countries and societies?

The issue of the United States using terrorist groups as tools for hybrid-cognitive warfare is a complex and sensitive subject that requires careful examination based on evidence. There are many examples of America's misuse of terrorist groups in different countries around the world, the examination of which requires extensive research, but some examples are briefly mentioned.

1. Mujahedin-e Khalq (MEK): Over the past four decades, America has used the despised MEK organization and, with extensive support for this terrorist group, carried out numerous violent actions, including the assassination of over 17,000 Iranians in the early years of the revolution, and numerous bombings that led to the martyrdom of many state leaders and members of parliament. In all these actions, the United States not only did not condemn these actions but provided overt and covert material, moral, and logistical support to this group. During the eight-year Sacred Defense (Iran-Iraq War), America used this group as Saddam Hussein's spies. After the U.S. invasion of Iraq in 2003, the MEK was placed under U.S. supervision at Camp Ashraf. Although the group was on the U.S. list of terrorist organizations at the time (from 1997 to 2012), some reports indicate indirect intelligence cooperation between the U.S. and this group. For example, the MEK provided intelligence on Iran's nuclear program, playing a role in exposing the Natanz nuclear facility in 2002. After the delisting of the MEK from the U.S. terrorist list in 2012, the group continued its political and media activities against Iran and received support from some political circles in the U.S. This support includes speeches by former U.S. officials at the group's events and funding for their media activities. This terrorist group, using American media platforms through media campaigns, publishing fake or distorted information, and trying to influence international public opinion, has acted as a tool for psychological warfare against Iran. These actions have been carried out with the aim of undermining the legitimacy of the Iranian system and intensifying political and economic pressure.

2. Support for the Jaish al-Adl Terrorist Group in the Sistan and Baluchestan Region: The Jundullah group (which later changed its name to Jaish al-Adl) is a Salafi militant group active in Iran's Sistan and Baluchestan region and is designated as a terrorist group by Iran. This group has carried out numerous attacks against Iranian military and civilian forces. Jaish al-Adl was formed in the early 2000s with the stated aim of defending the rights of the Baloch people and fighting the Iranian government. This group has carried out terrorist attacks such as bombings and assassinations of Iranian officials. Reports indicate that these actions were carried out with direct U.S. support. For example, in 2007, ABC News reported that U.S. officials had been in contact with Jundullah leaders and used them to gather intelligence against Iran. This report claims that this support was part of a broader strategy to pressure Iran. Also, documents published by WikiLeaks show that some U.S. officials were aware of Jundullah's activities and considered the group a tool for destabilizing Iran.


3. Support for Rebel Groups in Syria (Jabhat al-Nusra and Related Groups): During the Syrian civil war (2011 onwards), the United States supported some rebel groups opposed to the government of Bashar al-Assad, some of which had ties to hardline groups like Jabhat al-Nusra (Al-Qaeda's branch in Syria). This support indirectly led to the weakening of Iran's allies (the Syrian government and Hezbollah). These rebel groups essentially acted as proxies for America and reactionary regional countries to confront the Resistance Axis. The U.S. and its allies supported rebel groups under the title of "moderate opposition" to overthrow the Assad government. CIA and Pentagon programs to train and arm rebel groups in Syria, such as the "Timber Sycamore" program, indirectly aided some hardline groups like Jabhat al-Nusra. Published documents show that America played a significant role in the actions of these terrorist groups by arming them. Some social media posts, such as statements by Tulsi Gabbard, claim that the U.S. indirectly supported groups like Jabhat al-Nusra, Ahrar al-Sham, and even ISIS. These claims, although controversial, indicate internal criticism in the U.S. of interventionist policies.


4. Support for Afghan Mujahideen in the War against the Soviet Union (Operation Cyclone): One of the most prominent historical examples of the U.S. using militant groups in proxy warfare is the support for some Afghan Mujahideen in the 1980s against the Soviet Union. Although this case was not directly against Iran, it had indirect effects on Iran and provided a pattern for using armed groups in proxy wars. During the Afghan war (1979-1989), the U.S., through Operation Cyclone, provided billions of dollars in weapons and financial aid to the Afghan Mujahideen to fight Soviet forces. These groups included various factions, some of which later transformed into terrorist groups like Al-Qaeda. The CIA, in cooperation with Pakistan and Saudi Arabia, provided weapons, training, and financial resources to the Afghan Mujahideen. This support contributed to the fall of the Soviet-backed government in Afghanistan and the weakening of the Soviet Union. These groups promoted the narrative of "Jihad against Communism" to recruit and develop their discourse.

 

3. How do terrorist groups, by operating on social media, become tools for the enemy in waging media terrorism against the Iranian people?

Terrorist groups, by utilizing social media, become effective tools for enemies in waging media terrorism against the Iranian people. Media terrorism refers to the use of media and digital platforms to disseminate fear, hatred, false information, and distorted narratives with the aim of undermining social cohesion, delegitimizing the government, and creating psychological and political instability. These groups, using the features of social media, such as wide access, speed of dissemination, and the ability to target audiences, act as proxy arms of enemies. Below, the process and its mechanisms against the Iranian people are examined.

These terrorist groups seek to create and develop despair, reduce public trust in governing institutions, and develop social dissatisfaction, and create psychological and cognitive unrest and insecurity in society by publishing falsehoods and distorting realities about the situation in Iranian society. These groups use high-traffic social networks, including Telegram, X (Twitter), and Instagram, to republish fake news and images. These groups also seek to incite separatist sentiments by promoting divisive thoughts and ideologies through ethnic, sectarian, and religious propositions with the aim of separatism and secession. These actions are carried out with the aim of weakening the cohesion and national solidarity of Iranians and intensifying ethnic and religious polarization for political destabilization. Another goal of these terrorist groups is to create and develop fear, terror, and cognitive and psychological insecurity. Creating an atmosphere of fear and psychological insecurity breaks the national morale and the will, resolve for resistance, and steadfastness of a nation, paving the way for the enemies' domination over the target society. Also, terrorist groups try to incite the emotions of youth and recruit them by publishing and reposting ideological content. After recruiting youth, these groups prepare them for terrorist operations through intensive training courses. Also, these groups engage in espionage and sell sensitive information of target countries to receive aid from hostile countries. In this regard, these groups, in cooperation with the spy networks of Western countries, seek to attract financial and logistical aid.

4. Given the historical cooperation of the U.S. with terrorist groups (like the MEK and ISIS) in hybrid wars, what new mechanisms do you propose to counter the combination of cyber terrorism and psychological operations of these groups in cyberspace?

To counter the cyber terrorism and psychological and cognitive operations of terrorist groups in cyberspace, especially within the framework of hybrid wars, a multi-faceted and novel approach is needed, combining technology, policy-making, public education, and international cooperation. These groups, using social media and cyber tools, engage in spreading false information, inciting violence, recruiting members, and creating psychological instability. Given the historical cooperation of the United States with some terrorist groups in proxy wars against Iran (such as indirect support for the Mujahedin-e Khalq or Takfiri groups in the region), countering these threats requires advanced, multi-faceted, precise, and localized strategies.

• Designing a Cyber Monitoring and Surveillance Mechanism: The use of AI algorithms is currently one of the most important tools for monitoring, surveilling, and analyzing information and data published by terrorist groups. Preparing a regulatory framework for data monitoring, surveillance, and analysis by the Passive Defense Organization is among the most essential needs. The existence of such a framework will create a coordinated and integrated data mechanism. Of course, headquarters have been established in this field, including the Cyberspace Headquarters, but they need development and updating. Through data analysis, harmful content is tracked, and countermeasures are designed and formulated.


• Developing and Updating National Cyber Defense Infrastructure: Establishing a central cyber command to coordinate between military, security, and civilian institutions in defending digital infrastructure and countering cyber-attacks by terrorist groups can be fruitful in preventing dispersion and creating coordination and synergy in countering terrorist activities. This includes protecting sensitive infrastructure (such as banking or energy networks) and rapid response to cyber-attacks. This is done by strengthening non-operational cyber defense using advanced firewalls, strong encryption, and intrusion detection systems, utilizing domestic and indigenous capabilities. For example, the Zionist regime, using cyber technologies, caused the martyrdom and injury of many Hezbollah Mujahideen in Lebanon by exploding pagers. Also, in the twelve-day imposed war, we witnessed the use of a massive volume of cyber operations by the Zionist regime's 8200 Cyber Unit against our country. The hacking of bank accounts and part of the country's air defense are examples from the twelve-day imposed war, indicating the need to redefine cyber defense frameworks in the country according to new conditions.


• Enhancing Media Literacy and Public Education: Enhancing media literacy through developing public media education programs to increase citizens' awareness about identifying fake news, propaganda, and psychological operation techniques is one of the most important ways to counter the enemy's cognitive warfare and psychological operations. These programs must be carried out regularly and continuously through educational institutions and national media. It seems necessary to prepare a national media literacy framework and update upstream documents in this regard. The twelve-day imposed war by America and the Zionist regime was a collection of the enemy's cognitive and media operations, which requires separate and extensive research. But as an example, the publication of fake news and analyses aimed at creating and developing fear and terror in society and breaking the will and resolve for resistance and steadfastness can be cited.


• Developing Regional and International Cooperation: Utilizing new technologies, using allies, creating regional and international convergence, and sharing data and information can be effective. In this field, using international institutions and organizations and active engagement in these organizations, and drafting and approving strict international laws and guidelines, can help control and curb the media flow of terrorist groups.


For example, the MEK used social media like X (Twitter) and Telegram to spread fake news about the damage from Israeli attacks on Iran. This group, by publishing content such as "complete destruction of Iran's nuclear facilities" or "the killing of many senior IRGC commanders," tried to exaggerate the impact of the attacks and weaken the public morale of Iranians. For instance, posts on X show that accounts affiliated with the MEK sought to create horror and despair among Iranians.

Also, a Wall Street Journal report on Israel's "Operation Narnia" and "Bloody Wedding" on June 13, 2025, shows that the MEK likely provided espionage information to Mossad for targeting Iranian scientists and commanders. This intelligence cooperation was reinforced by the publication of coordinated content on social media to increase the psychological impact of the attacks. Also, given that one of the goals of the Zionist regime is the disintegration of Iran, this regime, using separatist groups like PJAK, which are active in Kurdish-inhabited regions of Iran, used social media to promote secessionist narratives and incite ethnic minorities during the Israeli attacks. These groups, by publishing video and text content on Instagram and Telegram, claimed that the Israeli attacks on Iranian military facilities indicated the weakness of the central government and an opportunity for an "ethnic uprising." For example, during the June 2025 attacks, Instagram accounts attributed to PJAK published videos claiming that the Israeli attacks on military facilities in Piranshahr (a Kurdish-inhabited region) were due to the "suppression of Kurds." This content was published with the aim of inciting ethnic sentiments and creating social division, while official sources indicate these attacks were related to Iran's nuclear facilities.

Source: Farhikhtegan