Indonesia: How WhatsApp Facilitates Terrorist Grooming of Children Online

by Anika Shah - Technology
0 comments

Indonesia’s Densus 88 and the Rise of Extremist Grooming of Children on WhatsApp

In November 2025, Indonesia’s National Police Detachment 88 (Densus 88 AT Polri), in collaboration with the National Counter-Terrorism Agency (BNPT), reported the arrest of five adults involved in recruiting children into radical-terrorist groups operating on encrypted messaging platforms. Approximately 110 children, aged 10–18, from various Indonesian provinces were identified as alleged members of these groups. This development highlights a concerning trend: the exploitation of encrypted messaging apps not merely as communication tools, but as integral components of a strategic technological architecture employed by extremist organizations.

The Shift to Encrypted Messaging and Targeting of Minors

As deplatforming and content moderation efforts increase on mainstream social media platforms, radical-extremist groups are increasingly migrating to finish-to-end encrypted messaging apps like WhatsApp and Telegram to evade detection. This shift coincides with a deliberate strategy to target minors, leveraging the privacy afforded by these platforms to facilitate grooming and radicalization. The presence of children within these encrypted groups reflects a broader tactical adaptation by extremist actors.

Why WhatsApp Matters in Indonesia

WhatsApp has become a dominant communication platform in Indonesia, with 43% of Indonesians obtaining news via the app and 76% using it for general communication purposes, as reported in the Reuters Institute’s Digital News Report 2025. Reuters Institute’s Digital News Report 2025. With 112 million users, Indonesia ranks as the third-largest WhatsApp user base globally, according to World Population Review data. This widespread adoption makes WhatsApp a particularly vulnerable platform for extremist activity.

Generation Z and Alpha: A Vulnerable Demographic

A 2025 survey by the Indonesian Internet Service Providers Association (APJII) revealed that Generation Z (aged 12-27 years) and Generation Alpha (aged 1-11 years) constitute the largest segment of internet users in Indonesia, representing 48.73% of the total. This high rate of internet usage among children increases their susceptibility to exposure to radicalism and terrorism through digital platforms.

WhatsApp’s Role During the Pandemic and Beyond

The COVID-19 pandemic and the subsequent shift to online learning further amplified WhatsApp’s role in children’s communication patterns. With limited access to dedicated online learning platforms in some schools, teachers increasingly relied on WhatsApp to deliver lessons, share assignments, and facilitate communication with students. WhatsApp’s ease of utilize, user-friendly interface, and multimedia sharing capabilities made it a convenient tool for both educators and students.

Exploitable Features of WhatsApp

Several technical features of WhatsApp have been exploited by violent extremist actors:

  • End-to-End Encryption (E2EE): While designed to enhance privacy and security, E2EE prevents service providers from accessing the content of messages, hindering early detection of extremist activity.
  • Closed-Group, Invitation-Based Access: This structure facilitates “funneling,” where individuals are initially drawn into seemingly innocuous groups before being moved to more closed, ideologically homogenous subgroups.
  • Community Feature: Allows administrators to manage up to 100 groups, increasing their control over information dissemination.
  • Trust-Based Social Ties: Participation in WhatsApp groups is often based on pre-existing relationships, fostering a sense of safety and trust that can be exploited by extremists.

From Propaganda to Grooming: The Recruitment Process

Extremist recruitment on encrypted messaging platforms often involves a process of relational grooming. Adult administrators build relationships with children by exploiting their demand for belonging and addressing their psychosocial vulnerabilities. This grooming process progresses through stages:

  1. Building Closeness: Administrators engage in seemingly natural conversations, using emoticons, humor, and emotional support to foster bonding.
  2. Controlling Information Flow: Administrators curate the information consumed by group members, presenting extremist narratives and delegitimizing external sources.
  3. Normalizing Violence: Violence is gradually presented as acceptable, justified, or even heroic.
  4. Inciting Action: Strong group identity and relationships are leveraged to encourage participation in extremist activities, ranging from logistical support to direct action.

WhatsApp’s Countermeasures

WhatsApp has implemented several measures to combat extremist exploitation, including:

  • Terms of Service and Messaging Guidelines: Prohibit illegal activities and the promotion of violence and child exploitation.
  • Forwarding Limits: Restrictions on message forwarding were introduced in 2018 and 2020 to limit the mass dissemination of misinformation.
  • Business Messaging Policy: Explicitly prohibits terrorist activities and criminal facilitation.

Collaboration and Future Recommendations

The case identified by Indonesian authorities in November underscores the need for a multi-faceted approach to counter extremist recruitment online. Preventative measures should focus on product design, governance, and collaboration.

Recommendations include:

  • Developing a safety design framework specifically for a “kids’ mode” with protective default settings and enhanced parental controls.
  • Improving transparency reporting by addressing child risks and vulnerabilities on the platform.
  • Strengthening behavioral indicators as a risk-based intervention to identify suspicious activity.
  • Enhancing cross-sectoral collaboration involving educators, child protection agencies, and law enforcement.

Effective counter-terrorism strategies must recognize the evolving tactics of extremist groups and adapt to the changing digital landscape.

Related Posts

Leave a Comment