The Government of India has reportedly blocked 14 Messenger mobile applications that were allegedly used by militants in Jammu and Kashmir to spread terror. Intelligence agencies had identified these apps as being used by militants and their supporters for communication purposes. The apps were found to be difficult to track as they did not have representatives in India and were deemed to pose a threat to national security. The apps have been blocked under Section 69A of the Information Technology Act, 2000, after intelligence agencies prepared a list of apps that do not follow Indian laws and could potentially spread terror propaganda in the Valley.
Terrorist groups and militants have been known to use mobile applications for a variety of purposes, including communication, propaganda, recruitment, and the coordination of attacks. Messaging apps, in particular, are popular among terrorist groups as they allow for secure, encrypted communication that is difficult to track or intercept. These apps can be used to share information, plan attacks, and coordinate movements among group members.
In addition to messaging apps, other types of apps, such as social media platforms and file-sharing apps, can also be used by terrorists for propaganda and recruitment purposes. Social media platforms can be used to spread extremist messages and recruit new members while file-sharing apps can be used to distribute propaganda videos and other materials.
It is true that simply banning apps is not a comprehensive solution to terrorism. While blocking apps may disrupt the communication and coordination of terrorist groups in the short term, it does not address the underlying root causes of terrorism. Therefore, the administration needs to adopt a comprehensive and holistic approach to counter-terrorism, which includes addressing the root causes of terrorism, improving intelligence and law enforcement capabilities, promoting dialogue and reconciliation, and engaging with communities to build trust and cooperation. Developing technological solutions to detect and monitor terrorist activity online and collaborating with tech companies is the most important aspect of the fight against terrorism.