When People Become the Threat: Radicalisation in the Age of Disconnection and Hyperconnectivity

By Ruarri Fairweather
Published:July 9, 2025

i 3 Table of Contents

Introduction

In today’s paradoxical world, we are more digitally connected than ever before—and yet, more physically and socially disconnected. This new reality has created fertile ground for online radicalisation to take root, evolve, and spread. Technology has enabled unprecedented reach, anonymity, and influence, while also making it harder to detect and address emerging threats.

At the same time, organisations are facing an uncomfortable truth: the biggest cyber and security risk is no longer just external—it’s people. Your employees, contractors, and partners can unwittingly or deliberately become conduits for harm, shaped by digital environments we no longer fully understand or control.

In this article, we examine the converging risks of digital radicalisation, insider threats, and the challenges of managing human behaviour in an age where disconnection and connectivity collide.

The Rise of Radicalisation Without Borders

Summary

Radicalisation is no longer limited to fringe gatherings or isolated cells—it now germinates across message boards, social media algorithms, encrypted chat groups, and even gaming platforms. Individuals seeking community, validation, or purpose can be drawn into echo chambers of extreme ideology without ever leaving their home.

This process can happen gradually or rapidly, and across causes – whether political, religious, environmental, or purely conspiratorial.

What’s Changed?

  • Accessibility: Anyone with a phone or device can access radical content.
  • Anonymity: Pseudonyms and avatars mask real identities.
  • Reach: AI-driven platforms amplify content that triggers engagement—often favouring outrage, division, and extremity.
  • Belonging: Online movements offer identity and purpose, especially appealing to isolated or disaffected individuals.

Who Does This Impact?

Employers, governments, schools, digital platforms, law enforcement, and communities at large.

Potential Level of Impact

High

People are now the biggest risk to your organisation

Summary

In the past, cybersecurity focused on defending systems from external attacks. Today, the focus must broaden to include insider threats—individuals who may intentionally or accidentally compromise security, motivated by ideology, grievance, coercion, or confusion.

Insiders may not match the stereotypical profile of a malicious actor. They might be:

  • Radicalised employees or contractors.
  • Disengaged individuals vulnerable to manipulation.
  • Well-meaning staff sharing sensitive information on insecure platforms.
  • Victims of misinformation acting on distorted beliefs.

The Risk Profile Has Changed

  • Traditional background checks often miss online radicalisation signals.
  • Behavioural changes can be hard to detect in remote/hybrid workplaces.
  • Social engineering campaigns can weaponise insiders without their awareness.

Who Does This Impact?

All organisations—especially those with sensitive data, critical infrastructure, or public influence.

Potential Level of Impact

High

Technology has amplified human vulnerability

Summary

Technology is not neutral. It accelerates both productivity and risk. AI, algorithms, and data analytics make it easier to profile individuals, predict behaviour, and manipulate actions—at scale and in real-time.

Platforms designed to maximise engagement can become vectors for radicalisation. Meanwhile, deepfakes, synthetic media, and AI-generated content blur the lines between truth and falsehood—fuelling division and distrust.

Organisations must now grapple with:

  • Exposure to manipulation: Staff consuming or acting on harmful misinformation.
  • Information warfare: Campaigns targeting belief systems, not firewalls.
  • Loss of control: External platforms shape internal behaviour in unseen ways.

Who Does This Impact?

All employers, particularly in high-trust sectors (e.g., defence, healthcare, government, education, finance).

Potential Level of Impact

Medium to high

What needs to change: culture, monitoring, and digital maturity

Summary

There is no silver bullet. But meaningful change starts with acknowledging that people are at the centre of both opportunity and risk.

Practical steps organisations should consider:

  • Build trust-driven cultures: Employees who feel safe, supported, and valued are less likely to disengage or radicalise.
  • Invest in human-centric monitoring: Look beyond system logs—use behavioural analytics, sentiment tracking, and open-source intelligence (OSINT) ethically and transparently.
  • Reimagine security training: Move beyond phishing simulations. Focus on digital literacy, critical thinking, and psychological safety.
  • Collaborate across silos: Security, HR, legal, and compliance must work together, not in isolation.

At a societal level:

  • Platform accountability must increase.
  • Policy frameworks must evolve to address digital radicalisation as a national security issue, not just a platform problem.
  • Education systems must equip younger generations with resilience to misinformation and online manipulation.

Who Should Lead This?

Organisational leaders, boards, regulators, educators, cybersecurity teams, and civil leaders.

Potential Level of Impact

Societal

What Next?

The line between online behaviour and offline harm is thinner than ever. In an age of fractured trust, polarisation, and algorithmic influence, we must rethink how we view risk—not just as something outside the organisation, but as something within.

If disconnection is the soil, and hyperconnectivity is the fertiliser, then digital radicalisation is the plant that grows. The question is whether we are ready to recognise it, respond to it, and build systems that protect both people and organisations from its spread.

Getting Help

We help organisations navigate complex people-based risks—including insider threats, digital misinformation, and behavioural security. Whether you’re building resilience, developing policy, or responding to emerging threats, we can help shape human-centred strategies for a hyperconnected world.

Reach out for a confidential conversation on how to move from awareness to action.

 

M

Close Menu