Introduction – May 2025: Beyond Gaza
“When an ideology loses its center, it does not vanish—it multiplies into operational fractals, adapting where geography withdraws and control disintegrates.”
After months of asymmetric escalation between Israel, Iran, and the United States, the Middle Eastern theater is taking shape as a new architecture of controlled chaos. The global spotlight remains fixed on drones, ICBMs, cyberattacks, and proxy conflicts—but behind the clash of powers, a quiet actor is repositioning: decentralized jihadism.
From Afghanistan to Somalia, the Sahel to cyberspace, networks affiliated with ISIS and Al-Qa’ida are restructuring, recruiting, and exploiting geopolitical instability to launch a new operational phase—less visible, more dangerous.
Even in institutional collapses like Sudan or Haiti—where jihadist presence is not yet dominant—there exist chaotic, ungoverned spaces increasingly conducive to extremist infiltration. These may soon provide ideological shelter, recruiting grounds, or logistical corridors for the next evolution of global jihad.
Afghanistan and East Africa: The New Epicenters of Jihadist Threat
“ISIS-K does not seize territory—it inherits it from others’ withdrawal. Where the state retreats, jihad reorganizes.”
In 2025, jihadist resurgence no longer stems from Raqqa or Mosul, but from Kabul and Mogadishu. ISIS’s “central” command has lost statehood ambitions, but regional branches now operate as strategic fractals—small autonomous nodes replicating Caliphate-era models in new geopolitical vacuums.
ISIS-Khorasan: Operational Vanguard of Post-Global Jihad
Between 2024 and 2025, ISIS-Khorasan (Wilayat Khorasan) has assumed transcontinental relevance. After striking Iran (Kerman bombing) and Russia (Crocus City Hall), ISIS-K now represents the only jihadist faction with strategic reach beyond Central Asia.
- Consolidated cross-border networks across Afghanistan, Pakistan, Tajikistan, and Iran by exploiting rifts between the Taliban, tribal factions, and border authorities;
- Acts as a radicalization hub for disillusioned foreign fighters drawn to a strict, apocalyptic Islamist vision;
- Believed to be prepositioning logistics abroad, potentially to carry out high-impact attacks in Asia or Europe in 2026.
ISIS–Somalia: The African Node in Jihadist Restructuring
“ISIS has not returned in grand fashion. It has returned intelligently—decentralized, camouflaged, adapting to global security failures and the interstitial spaces of chaos.”
Long underestimated, ISIS–Somalia is emerging as a key actor in sub-Saharan jihadist realignment.
- Operates alongside Al-Shabaab, yet with more fluid and less hierarchical structures across Somalia, Kenya, and Ethiopia;
- Serves as a training and finance conduit for Sahelian groups in Mali, Burkina Faso, and Niger, bridging Levantine and African jihadism;
- Leverages regional instability and reduced Western presence to become a low-cost operational hub, ideal for testing weapons, training militants, and rehearsing asymmetric tactics.
Cyber-Jihad and Artificial Intelligence: The New Frontier
“Jihadism no longer seeks the visible clash—it seeks operational invisibility and psychological collapse.”
By 2025, global jihadist strategies have expanded beyond physical territory into cyberspace as a parallel battlespace and force multiplier. Distant from drones and conventional weapons, the threat now travels through fiber optics—AI becomes a silent ally in a digital insurgency.
Generative Propaganda and Fluid Radicalization
Jihadist groups are advancing automated digital propaganda that can adapt content in real-time:
- Multilingual auto-generated extremist content, customized for segmented audiences;
- Video simulations and deepfakes designed to inspire or mislead;
- Chatbots disguised as spiritual guides to answer, radicalize, and indoctrinate.
The message is no longer centralized, but fragmented across viral micro-narratives, hidden in encrypted channels and layered anonymity.
Targeted Cyberattacks and Strategic Sabotage
Meanwhile, digital offensives are shifting toward deliberate attacks on civilian and strategic infrastructure, not with explosives but code:
- Infiltration of SCADA systems in energy and water utilities;
- “Ideological ransomware,” intended not for ransom but disruption;
- Backdoor malware pre-positioned for activation during political escalation, blackouts, or mass panic scenarios.
The new aim is no longer body count—it is system failure and cognitive entropy.
Outlook for 2026: Silent Return to Europe and North America
“The jihad of 2026 won’t topple skyscrapers—it will cut the lights and leave the West asking who flipped the switch.”
Jihadists no longer need to seize terrain to strike the West. Future attacks will not arrive in desert columns, but via lone actors, invisible networks, and low-cost, high-impact psychological operations.
Europe: Latent Threat and Silent Radicalization
In Europe, jihadism manifests as a subterranean threat, not always visible but constantly active. Three key trends emerge:
- Lone Actors: Self-radicalized individuals disconnected from formal cells, often with clean records and no known links to terrorist networks;
- Copycat Attacks: Low-preparation violent acts inspired by digital content or recent events—stabbings, arsons, vehicular assaults;
- Soft Targets: Schools, churches, transit systems—locations with symbolic weight and high vulnerability, chosen for emotional resonance and destabilizing effect.
United States: Low-Profile Insurgency and Digital Sabotage
In the U.S., the threat is more covert but no less potent, driven by:
- Digital Prepositioning: Malware embedded in critical infrastructure (energy, transport, healthcare), ready for activation;
- Domestic Radicalization: Citizens influenced by jihadist narratives tailored to U.S. fault lines—antisemitism, anti-government extremism, grievance politics;
- Hybrid Symbolic Attacks: Low-tech but high-impact acts—poisonings, arsons, religious defacement—designed to fracture public trust.
The goal is not destruction—but disruption and disorientation.
Conclusion – A Threat Growing in the Shadows
“Jihadism hasn’t returned. It never left. It simply learned how not to be seen.”
The jihadist movement has not disappeared—it has shed its skin. The era of Caliphate theatrics is over. What remains is an adaptive threat: fragmented, agile, hard to detect yet deeply corrosive.
Its targets are no longer battlefield victories—but trust, cohesion, institutional legitimacy. Its frontline is not geography, but perception.
Thus, any effective strategy must evolve:
- From reaction to anticipation
- From surveillance to deep contextual understanding
- From border defense to cognitive and digital ecosystem protection
In today’s battlefield, seeing the threat before others do is the last true strategic advantage.
Beyond the Threat: Toward a Non-Naïve Security Doctrine
“In the world ahead, true security lies not in how much you monitor, but in how far you’re willing to defend who you are.”
Post-Caliphate jihadism requires a doctrine that is adaptive without being naïve. This means confronting complexity without fear or ideological blindness.
An effective strategy stands on five pillars:
- Strategic Predictivity – Map permissive environments before attacks occur—track social fractures, extremist narratives, and illicit corridors. Anticipate—not guess—where and why fault lines form.
- Active Protection of Fragile Spaces – No region—African or European periphery—can be left behind. Security begins with physical and cultural presence: enforce laws, defend democratic identity.
- Cognitive Defense and Democratic Values – The target isn’t only infrastructure—it’s minds, symbols, language. Protect the semantic terrain where radicalization incubates. Some values are not negotiable.
- Interdomain Response, Not Bureaucratic Delay – The threat is social, digital, ideological. So must be the response: defense, intelligence, diplomacy, law, and education in synchronized motion.
- Trust as the Foundation of Internal Deterrence – Democracy must not retreat for fear of dissent—but it must no longer stay silent when challenged. Law must be firm and legitimate. Tolerance is not weakness—it is a boundary.
Glossary of Terms
• Subterranean Presence: A metaphor for latent threats that lie dormant and reemerge without warning—applied here to jihadist activity in Western Europe.
• Decentralized Jihadism: Post-Caliphate configuration: independent, autonomous jihadist entities operating with shared ideology but without central command.
• Strategic Fractals: Coined by the author—localized jihadist cells that replicate the core ideological and tactical DNA of the original Caliphate
• Digital Prepositioning: The preemptive placement of malware, backdoors, or cyber vulnerabilities within systems to be remotely activated during escalations. A growing tactic among non-state actors in hybrid warfare contexts.
• Cultural Outpost (Presidio culturale): Institutional or social action that actively upholds democratic values, legality, and cohesion in fragile territories. Not identity imposition, but explicit safeguarding of the liberal-democratic order.
• Silent Radicalization: A process of extremist drift occurring outside known networks, often in isolation or digital echo chambers, without prior travel, known associations, or identifiable behavioral red flags.
• Permissive Narrative: A rhetorical or ideological discourse that, without overtly justifying jihadism, fosters its ecosystem through victimhood, institutional delegitimization, martyrdom glorification, and identity replacement myths.
• Cognitive Security: A society’s ability to protect itself from toxic informational, psychological, and ideological influences, including media disinformation, identity manipulation, and extremist propaganda.
• Tolerance as Boundary: The principle that hospitality must be principled, not unconditional: core norms are not negotiable, and integration implies reciprocal respect— not the unilateral renunciation of Western identity.
• Mimetic Insurgency: The evolution of terrorism into low-profile, hard-to-detect formats resembling ordinary crime—but driven by ideological destabilization objectives. Operates through noise, not spectacle.

