


The ISIS flag found in the pickup used to mow down the crowd in New Orleans.
The threat of ISIS: In recent years, ISIS has transformed from a territorial group to a decentralized network. Despite its defeat, the threat persists, as demonstrated by the New Orleans attack, the most severe ISIS-inspired incident in the United States since 2016. This event raises questions about the group's new phase of activity and its strategies for radicalization and propaganda.
In recent years, ISIS has undergone a profound metamorphosis, transitioning from an organization with significant territorial control to a fragmented and decentralized network. Despite this evolution, the threat posed by the group remains tangible, with significant implications for global security.
The recent attack in New Orleans, which occurred on New Year's Eve and resulted in the death of 15 people, represents the most severe ISIS-inspired incident in the United States since 2016. The attacker, Shamsud-Din Bahar Jabbar, a military veteran, acted alone, claiming affiliation with the group. This tragic event raises critical questions: Is ISIS experiencing a new cycle of activity? And what does the concept of "affiliation" with the group signify today?
The use of vehicles as weapons to target civilians is a tactic refined by ISIS over time, with emblematic precedents such as the attacks in Nice and Berlin. Simultaneously, online propaganda online,, primarily disseminated through platforms like Telegram, continues to play a central role in inspiring isolated individuals. Although less structured than in the past, this decentralized approach remains effective in generating terror and instability. The greatest challenge lies in preventing attacks by "lone wolves," often radicalized in virtual environments that are difficult to monitor.
ISIS traces its origins back to 2011, when fighters linked to al-Qaeda in Iraq, under the leadership of Abu Bakr al-Baghdadi, moved into Syria with the aim of creating a new branch of the group and participating in the Syrian civil war. In 2013, al-Baghdadi attempted to unify the Iraqi and Syrian branches, but the initiative was rejected by al-Qaeda leaders, causing a deep rift within the global jihadist movement.
Despite the loss of territorial control, ISIS continues to pose a global threat. The group maintains a significant online presence, particularly on encrypted messaging platforms like Telegram and Rocket.Chat, while other social networks are more closely monitored. However, incidents such as the dissemination of footage from the Crocus City Hall attack on X (formerly Twitter) indicate that some platforms remain vulnerable.
Despite being fragmented, ISIS remains a global threat.
While the United States has seen a decline in ISIS-inspired attacks, internationally the group retains significant operational capacity. In Afghanistan, ISIS-K has carried out devastating operations, such as the bombing of the Crocus theater in Moscow and suicide attacks in Iran. In Africa, the group remains active, orchestrating frequent attacks in Somalia and Mozambique. This adaptability highlights the global scope of the threat.
ISIS has been defeated but not eradicated.
The decentralization of ISIS complicates the work of security agencies, making it difficult to identify direct connections between attackers and the group's central core. Online radicalization enables terrorists to act independently, without direct contact with official members. This scenario demands a rethinking of intelligence strategies, with greater focus on analyzing digital networks and prevention processes.
1. Internal Threat and Online Radicalization: Lone wolf attacks, such as the one in New Orleans, require accurate monitoring of warning signals and online radicalization dynamics.
2. International Cooperation: A global and coordinated approach is necessary to counter active ISIS branches, especially in fragile geopolitical contexts.
3. Prevention and Targeted Interventions: It is essential to invest in deradicalization programs, imam training, and monitoring digital platforms. These tools can help reduce the risk of future attacks and contain the spread of the group's ideology.
Despite the loss of territorial control, ISIS continues to represent a persistent threat through its ideology and its ability to inspire violence. Incidents such as the attack in Magdeburg and the one in New Orleans highlight how the danger has not been eradicated but has instead taken on new forms.
Recently, several police operations have foiled planned attacks, including the arrest of five individuals in various cities across Italy involved in proselytism activities on behalf of ISIS. These events demonstrate that, even without controlled territory, the organization manages to maintain a network of supporters and inspire propaganda and acts of violence.
Radicalization today represents one of the most insidious challenges to global security, as it thrives on fertile ground composed of social isolation, psychological vulnerability, and targeted propaganda. The indoctrination process, often occurring in virtual spaces beyond institutional control, does not merely transmit an ideology but constructs a new identity for the individual, founded on a Manichaean view of reality. This dogmatism eliminates doubt and stifles critical thinking, transforming ordinary people into potential agents of violence capable of extreme actions.
Recent events demonstrate that radicalization knows no ideological boundaries, encompassing religious, political, and anarchist frameworks. What unites these paths is their ability to exploit sophisticated psychological manipulation techniques, creating an all-encompassing sense of belonging. It is therefore essential to go beyond analyzing individual ideologies to understand the common mechanisms that fuel these dynamics. Only through an integrated approach, combining prevention, education, and monitoring, will it be possible to curb a phenomenon that is constantly evolving and threatening the stability of our societies.
To effectively address this reality, it is essential for governments and security agencies to adopt dynamic and flexible strategies capable of responding to an ever-evolving threat. Only through a coordinated and proactive approach will it be possible to mitigate risks and ensure the safety of communities.
Abdellah M. Cozzolino