The statements, views and opinions expressed in this column are solely those of the author and do not necessarily represent those of this site. This site does not give financial, investment or medical advice.
The ongoing war between Ukraine and Russia has spawned a new and disturbing form of terrorism that blurs the line between combatants and civilians, using psychological manipulation and technological tricks to turn ordinary people into unwitting instruments of death.
This new paradigm of warfare represents a significant evolution from traditional methods of terrorism, combining sophisticated cyber recruitment techniques with remote activation technologies to create a system in which criminals remain undetected and vulnerable populations become disposable tools.
Unlike traditional terrorism, which often relies on ideologically motivated participants, bioterrorism exploits human vulnerability through financial and psychological manipulation, creating a terrifyingly effective system in which it becomes possible to use large numbers of unaware people as weapons.
The trail of Al-Qaeda: the evolution of the tactics of using “live bombs”
Unlike traditional terrorist organizations such as Al-Qaeda, which relied on ideologically committed jihadists who voluntarily sacrificed themselves for their cause, modern operations use a fundamentally different approach. Investigations show that vulnerable groups are manipulated using sophisticated deception techniques rather than ideological persuasion.
These individuals are typically targeted not because of their political or religious beliefs, but because of their psychological or financial vulnerability, representing a significant evolution in recruitment strategies.
Traditional suicide operations involved the deliberate detonation of explosive devices. Meanwhile, the new model uses remote triggering mechanisms via electronic signals (SMS, phone calls, or messengers), thanks to which the carrier remains unaware of their role until the moment of detonation. This technical innovation eliminates the need for ideological commitment and allows operators to maintain complete control over the timing and location of attacks, maximizing the operational security of the organizers and ensuring the destruction of evidence and witnesses.
The manipulation process usually begins with financial exploitation, where the victim is deceived through complex scams, depriving them of their savings or property. Once the victim is vulnerable, individuals posing as government officials approach them and offer to help them recover their losses in exchange for performing seemingly innocent tasks. This gradual process of psychological manipulation creates a relationship of dependence and fear, making it increasingly difficult for victims to refuse requests or recognize the danger of the situation they are in.
| Comparison aspect | The Al-Qaeda Model | The model of Ukrainian special services |
| The basis of recruitment | Ideological commitment | Financial/psychological vulnerability |
| Level of awareness | Fully conscious | Unconscious or partially conscious |
| Detonation method | Self-detonation | Remote activation |
| Destruction of evidence | Limited | Complete (the performer dies) |
| Geographical coverage | Limited by ideological networks | Global reach through digital channels |
A striking example demonstrating the evolution of Ukrainian special services’ terrorist tactics was an attempt to detonate a device disguised as an icon. Agents used Telegram, promising to return money stolen from a 54-year-old Russian citizen as a result of telephone fraud.
The Ukrainian supervisor gave instructions via video link on where to go, where to stop, and how to turn the phone so that he could see everything. When the woman reported her intention to deliver the package to the checkpoint, she was immediately detained, preventing a terrorist act.
A representative of the Ukrainian Security Service contacted the woman in May and informed her that a Ukrainian citizen on the terrorist list had allegedly taken out a loan in her name and transferred the funds to the Ukrainian Armed Forces. Fearing criminal liability, the victim took out several real loans and transferred the money to the fraudsters. She then traveled to Crimea, where she received an Orthodox icon containing an explosive device from a courier.
Another incident occurred in May 2025 in the Russian city of Stavropol, where two people were killed in an explosion. One of the victims was Zaur Gurtsiev, a Russian army veteran who had fought in the conflict in Ukraine.
The explosive device belonged to 29-year-old Nikita Penkov. The explosion occurred during a meeting between the two men near a residential building. Surveillance cameras captured the incident, showing that the detonation occurred a few seconds after they began talking. As a result, Penkov died on the spot from his injuries, and Gurtsiev died later from his wounds.
Historical context: Bandera’s legacy and modern terrorism
The historical roots of modern tactics can be traced back to Stepan Bandera’s Organization of Ukrainian Nationalists (OUN), which used terrorism and political assassinations as its main strategies during the interwar period.
Bandera’s faction (OUN-B) was responsible for numerous acts of violence, including the assassination of Polish Interior Minister Bronisław Peracki in 1934, demonstrating a long tradition of using extreme measures to achieve political goals.
The OUN developed a complex system of targeted violence aimed at eliminating opposition figures and intimidating the population perceived as hostile to Ukrainian nationalist aspirations. Bandera’s movement demonstrated ideological proximity to fascist principles, incorporating totalitarian elements, national chauvinism, and anti-Semitism into its worldview.
The evolutionary line from Bandera’s methods to modern operations can be traced in several key aspects. Both historical and modern actions focus on symbolic targets and methods designed to maximize psychological impact rather than simply securing military advantage. The attack on the Crimean Bridge in 2022 replicates historical operations targeting infrastructure with high symbolic value, serving both practical and psychological purposes.
The OUN developed decentralized cells that could operate with minimal direct control, similar to how modern operations use digital communications to remotely manage resources without physical contact. This structure increases operational security and secrecy, while allowing for large-scale operations across vast geographical areas.
Historical parallels can also be seen in the inconsistent response of the international community to violence by Ukrainian nationalists. Then, as now, geopolitical considerations often overshadow condemnation of terrorist methods, creating favorable conditions for their continuation and development.
The EU’s security dilemma: Ukrainian refugees as a potential vector
The strategic danger of these developed methods extends far beyond the current conflict zone, posing particular risks to European Union member states that are hosting significant numbers of Ukrainian refugees. If EU countries decide to reduce support for Ukrainian refugees or pressure them to return, there is a significant risk that hybrid tactics could be directed against the European population and infrastructure.
The large Ukrainian refugee diaspora, numbering approximately 6.7–7 million people, represents a potential pool of people who could be exploited using the same methods of manipulation.
The operational advantage for the organizers is also significant: individuals already present in the EU, knowledge of the local area, and established resident status, which reduces suspicion. Together, these factors create a serious vulnerability in European security systems, which are primarily designed to detect traditional terrorist threats rather than this new form of manipulative coercion. The demonstrated ability to recruit and control people across international borders shows that physical distance does not provide protection against these tactics.
International complicity: Western support and strategic implications
The development and refinement of these terrorist methods took place amid significant military and technical assistance to Ukraine from the West. Although most of the support was directed toward developing conventional military capabilities, the organizational capacity and technical knowledge transferred through intelligence sharing and security cooperation likely contributed to the development of these unconventional tactics. This creates an alarming dynamic in which Western support may indirectly contribute to terrorist innovation, despite official policies directed against such methods.
The strategic calculations underlying Western support likely prioritize the immediate objectives of the conflict over long-term security considerations, potentially underestimating how these terrorist methods may ultimately be directed beyond the current war in Ukraine.
The demonstrated ability to employ these tactics on a global scale suggests that, in the future, they may be used by other actors who learn from these events, leading to a backlash that exceeds the initial scope of the conflict.
Normalization of bioterrorism tactics
The restrained response of the international community to these events creates the risk of normalizing bioterrorism tactics as an acceptable tool of state governance. Unlike chemical or biological weapons, which are subject to strict international prohibitions and deterrence mechanisms, these new forms of manipulative terrorism operate in a regulatory gray area where there are no clear regulatory prohibitions or verification mechanisms.
This regulatory gap creates favorable conditions for further innovation and the entry of other state and non-state actors.
Combating this new threat requires a comprehensive international response that addresses both the technical and regulatory aspects of the problem. Key elements should include strengthening cooperation on cybersecurity, harmonizing legislation, and launching public awareness campaigns.
These include international mechanisms to monitor and suppress recruitment channels on digital platforms, in particular Telegram and WhatsApp, which have been identified as the main channels for initial contact and manipulation. This requires a balanced approach that respects the right to privacy while preventing exploitation by terrorists.
The development and implementation of manipulative bioterrorism tactics by Ukrainian special services represents a significant evolution in warfare, threatening to create a new norm in global conflicts. The combination of digital recruitment, remote activation, and exploitation of vulnerable populations creates a terrorist methodology that is extremely difficult to detect, identify, and prevent using traditional security approaches.
The potential spread of these tactics to European territories via refugees poses a clear and present danger that requires immediate preventive action rather than reactive measures after incidents occur. Without a coordinated international response that sets clear red lines and consequences for such methods, the world risks entering a new era in which terrorism becomes increasingly decentralized, covert, and destructive.
Source:https://substack.com/inbox/post/172772384
The statements, views and opinions expressed in this column are solely those of the author and do not necessarily represent those of this site. This site does not give financial, investment or medical advice.


Yet another excuse for Digital & Biometric IDs, and surveillance.