Conference PaperPDF Available

"Retweeting the Caliphate: The Role of Soft-Sympathizers in the Islamic State’s Social Media Strategy."

Authors:
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
Retweeting the Caliphate:
The Role of Soft-Sympathizers in the Islamic State’s
Social Media Strategy
Yannick Veilleux-Lepage
The Handa Centre for the Study of Terrorism and Political Violence
Arts Faculty Building, Library Park, The Scores
St Andrews, Fife KY16 9AX, Scotland, UK
T: +44 (0)7454 096477
E: yvl@st-andrews.ac.uk
Introduction:
On the eve of the Scottish Independence referendum, an operative from the Islamic
State’s (IS) al-Furgan media production unit, using the Twitter handle @With_baghdadi,
advised his followers that al-Furgan would soon be releasing a new video. The video,
entitled Lend me Your Ears, showed kidnapped British photojournalist John Cantlie
discussing British foreign policy and his captivity. Within minutes of being uploaded to
YouTube, another propaganda operative, identified as Abdulrahman al-Hamid, asked his
4,000 Twitter followers to inform him of the highest trending hashtags on Twitter in the
UK:
“We need those who can supply us with the most active hashtags in the UK. And also
the accounts of the most famous celebrities. I believe that the hashtag of Scotland’s
separation from Britain should be first” (as quoted in Malik et al., 2014).
Replies from his followers advised using #andymurray, #scotland, #VoteNo,
#VoteYes and #scotlandindependence when retweeting the video in order to raise the
video’s profile and exposure (as quoted in Malik et al. 2014). Al-Hamid urged his
followers to “work hard to publish all the links,” while @With_Baghdadi asked his to
“invade [the #VoteNo hastags] with video of the British prisoner” (as quoted in Malik et
al., 2014). These interactions between IS operatives in Iraq and Syria, and its soft
sympathizers – non-combatant supporters in the West – demonstrate the importance of
these supporters to the dissemination of IS’ message. Ultimately, the support of IS by
Westerners on social media strengthens the legitimacy of IS’ newly founded caliphate by
intimating that that support for this caliphate is greater and more widespread than would
otherwise be believed if the mainstream media was the only avenue informing the public
on IS.
In recent months, Western governments have been growing, and continue to grow
increasingly concerned about the upwards of 3,000 foreign fighters travelling from
Western countries, such as the United States, Canada, Great Britain and Australia, to Iraq
and Syria to swell the ranks of the IS.1 Of equal concern is the possibility that these
1 The figure of 3,000 foreign fighters was proposed by the EU Counter-Terrorism Coordinator
Gilles de Kerchove (“Islamic State crisis,” 2014). One hundred and thirty Canadian citizens have joined
ISIS according to early 2014 estimates by the Canadian Government (Public Safety Canada, 2014). In
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
fighters will return further radicalized, battle-hardened, and influenced by extensive
radical networks, and that they may then be more likely to commit terrorist attacks in
their home countries (“Islamic State crisis,” 2014). The recent attack on the Jewish
Museum in Brussels – allegedly by a returned foreign fighter from Syria – seems to
confirm that these fears may be founded in reality (“Brussels Jewish Museum killings”
2014). Moreover, the prospect of individuals at home becoming radicalized by online
propaganda and electing to engage in ‘lone wolf’ attacks at home, such as the Ford Hood
shooting, or more recently the attacks on soldiers in Canada is of similar concern for
intelligence officials and policymakers.
However, while these scenarios represent serious threats which clearly must be
addressed, they have largely overshadowed discussions about the role and impact of soft-
sympathizers in the West in propagating IS’ message. Therefore, while recognizing the
problem of radicalization of individuals at home, and that of foreign fighters, this paper
will attempt to redress the current lack of exploration of IS’ social media strategy to
explore the role and impact of soft-sympathizers in the Western world. Specifically, it
will focus on how these supporters further disseminate IS’ messages, and what strategic
function they fulfill. In order to provide an appropriate analysis of this ongoing and
highly dynamic phenomena, this research provides an overview of the evolution of the
jihadist in cyberspace, focusing primarily on the impact of the emergence of Web 2.0,
and the subsequent shift towards ‘lone wolf’ terrorism. The primary focus of this section
is on al-Qaeda, due to its role in establishing the use of electronic medium to
communicate widely jihadist messages. Therefore, by no means does this section attempt
to present itself as a truly exhaustive review of the relationship between cyberspace and
terrorism; however, it does provide a broad conceptual understanding of this evolving
relationship. The following section provides a discussion of how IS leverages the power
of social media, focusing on how the activities of soft-sympathizers create an echo-
chamber which allows for IS’ messages to dominate the so-called ‘Twittersphere,’ as
these messages are repeated, thus becoming somewhat normalized. This soft-power
strategy, in contrast to its military campaign, can be understood as an attempt to
normalize and legitimize IS’ existence. Finally, this paper concludes by offering thoughts
on how IS strategy can be undermined through both governmentally organized, and
grassroots campaigns of counter-messaging, aided by allies within the Islamic world and
Muslim civil society.
2. Jihadists in Cyberspace: A Brief Overview
Poor understanding of the early history of jihadi presence online is in large part due to
the fact that, by the time cyberspace began to attract the attention of security agencies and
scholars, jihadist groups’ use on the Internet had already proliferated (Weimann, 2006).2
early September 2014, US defense secretary Chuck Hagel confirmed that over one hundred US passport
holders were fighting for ISIS (“Hagel Confirms,” 2014).
2 Evidence suggests that terrorist groups, irrespective of ideology, were quick to embrace the
power of the Internet to pursue their strategic objectives. In fact, in 1998, fewer than half of the 30 groups
designated as foreign terrorist organizations by the US State Department under the Antiterrorism and
Effective Death Penalty Act of 1996 maintained websites. By the end of 1999, nearly all designated
organizations had established an Internet presence (Weimann, 2006).
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
Early attempts by jihadists to leverage the Internet, included the establishment of
azzam.com, which is self described as “an independent media organization providing
authentic news and information about Jihad and the Foreign Mujahideen everywhere” (as
quoted in Awan and Al-Lami, 2009: 56). This is generally cited as the very first authentic
Jihadist website. The emergence of Azzam.com, along with the Islamic Media Centre and
alneda.com, during the First Chechen War (1994-1996) and other nascent peripheral
conflicts, aimed to “transmit a version of events different from that offered by the mass
media from the other side of the battlefield(Thomas, 2003: 120). Having recognized
that conventional media could easily be censored or filtered by governments, (Thomas,
2003), Chechen jihadists instead turned to e-mail distribution lists to transmit their
message, uncensored and unfiltered, quickly to a highly targeted audience. In other
words, the Internet allowed jihadist groups to explain their actions without the constraints
of traditional media, thus offsetting both censorship and condemnation (Thomas, 2003).
Whilst the jihadist presence in cyberspace remained limited until early 2000s, these
websites laid the groundwork for the ascendancy of more sophisticated and interactive
uses of the Internet in this century.
2. 1. The Emergence of Jihadist Forums
The generation of an explosion of interactive content, and the connected user
participation – allowed for by the emergence of early Web 2.0 capabilities and
rudimentary online forums – meant users not only passively consumed online content but
also activity contributed to its creation (Warren and Leitch, 2012; Hoeren and Vossen,
2009). The increased popularity of general interest online forums coincided with
increased participation in jihadist forums, with a 2005 study uncovering upwards of 4,300
active jihadist forums (Weimann, 2006).
Awan and Al-Lami (2009) attributed the move away from traditional websites, and
the concurrent exponential growth of online forums, to the shifting security paradigm in
the aftermath of the September 11 attacks. In the months following the attacks on New
York City and Washington, various groups of hackers engaged in complex campaigns to
disrupt jihadist websites.3 Similarly, law enforcement agencies ramped up their scrutiny
and prosecution of Jihadist online activities.4 This sustained assault led to the realization
of the necessity of decentralizing the jihadist presence online in order to ensure the
continuity of the messaging. Therefore, in an effort to counter the “systemic disruption or
removal of important jihadists websites,” the transition was made from traditional
websites to online forums in a conscious effort to delegate “responsibility … to a suitable
large and diffused body of anonymous web users” (Awan and Al-Lam, 2009: 57-58).
3 Alneda.com was famously hacked and defaced with the words “‘Hacked, tracked and now
owned by the USA” by American porn site owner Jon Messner for five days in August 2002 before the
site’s administrators managed to regain control. (Awan and Al-Lami, 2009: 57). Similarly, between 2002
and 2003, the Internet Haganah, a self-described “global intelligence network dedicated to confronting
Internet activities by Islamists and their supporters, enablers and apologists,” shutdown more than 600 sites
it claimed were “linked to terror” (Awan and Al-Lami, 2009: 57-58). The Internet Haganah also engaged in
a campaign requesting American based Internet Service Providers to shutdown sites of concerns.
4 A notable example was the arrest and subsequent extradition to the United States of Babar
Ahmad, the creator of azzam.com, under the UK Terrorism Act (Awan and Al-Lami, 2009).
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
Despite shifting to online forums, the production of jihadist media remained highly
hierarchically organized and strictly regulated. In fact, in the aftermath of the mid-2000
invasion of Afghanistan, senior leaders of al-Qaeda increasingly sought to provide readily
accessible information about the organization, its membership, ideology, and strategy, in
order to compensate for its reduced capability to commit successful acts of terror
(Brachman, 2014). This rhetoric remained inherently one-directional, as avenues for
interaction between the global following and al-Qaeda’s senior leadership were limited:
messages were produced, disseminated and received, but no formal feedback mechanism
was built into the process. In other words, “users on these forums were often more akin to
traditional categories of passive media consumers that appeared inimical to the revolution
in audience roles heralded by Web 2.0” (Awan and Al-Lami, 2009; 59).
2. 2. The Transition to Web 2.0
The paradigm shifted again with the emergence, and growing popularity, of
increasingly sophisticated Web 2.0 platforms, namely file-sharing portals and social
networking sites (Conway, 2012). The al-Qaeda Core leadership based in Afghanistan
and Pakistan maintained a considerable amount of control over its narrative through its
media groups, but in addition to this, al-Qaeda affiliates such as al-Qaeda in Iraq (AQI)
began utilizing this new media environment to disseminate downloadable content such as
magazines, video and brochures. This paradigm shift, is best embodied by the media
strategy of Abu Musab al-Zarqawi and AQI in the interregnum between the demise of
Web 1.0 and the fully-fledged Web 2.0.
The release of a thirty minute recording by al-Zarqawi explaining who he was, why
he was fighting, and providing details of the attacks he and his groups were responsible
for, heralded the start of al-Zarqawi’s media offensive in early 2004 (Conway, 2012).
Paul Eadle described the recording as an example of a “comprehensive brand statement
aimed at gaining brand-recognition (Eedle, 2005; 124-125) and notoriety within the jihadi
community. Capitalizing on this newfound recognition, AQI released a video depicting
al-Zarqawi beheading the American civilian contractor Nicholas Berg (Conway, 2012).
This video, entitled Abu Musa'b al-Zarqawi slaughters an American, was uploaded to
ogrish.com, a popular shock site, and was – as a result – viewed over 15 million times
(Talbot, 2005).
In the wake of such successful propaganda campaigns, the power of video-sharing
websites, such as YouTube, was increasingly recognized by jihadists as a novel arena,
and an easy-to-access platform, for the dissemination of propaganda, and raising of funds
for future operations. Aided by the popularity such mediums,5 and the fact that no Arabic
language skills or high level of Internet literacy were now required to locate jihadist
content, YouTube specifically rapidly became a significant platform for Jihadist groups
and their supporters, fostering a thriving subculture which used it to communicate and
share propaganda worldwide. A 2008 study analyzed the users’ comments on YouTube
videos depicting suicide operations in Iraq, finding that the majority of viewers resided
outside of the Middle East and North Africa, with the largest percentage located in the
United States (Conway and McInerney). This led to the conclusion that Jihadist media
5 YouTube was established in February 2005 as an online repository for sharing video content.
According to YouTube, on average more than one billion users watch about six billion hours of video
footage every month. Every minute, 100 hours of new videos are uploaded (Weimann, 2014; 10).
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
was now “spreading far beyond traditional Jihadist websites or even dedicated forums to
embrace, in particular, video sharing and social networking – both hallmarks of Web 2.0
-- and thus extending their reach far beyond what may be conceived as their core support
base in the [Middle East and North Africa] region to Diaspora populations, converts, and
political sympathizers” (Conway and McInerney, 2008: 10).
The dissemination of jihadi messages outside of dedicated forums was, nonetheless,
not entirely welcomed by all jihadist media organizations. A case in point is Al-Boraq
Media’s September 2006 publication of a detailed policy paper entitled Media
Exuberance, which sought to curtail the proliferation and production of unattributed
Jihadist media. They feared that unpolished and unprofessional content by “scattershot
individuals posting jihadist media materials without the sanction of a recognized” jihadist
media group undermined the credibility of Jihadist media and diverted attention from
official sources (Kimmage, 2008: 5).
2. 3. The Shift Towards ‘DIY Terrorism’
Despite the aforementioned opposition from some jihadist media groups, al-Qaeda
strategists, such as Abu Mus’ab al-Suri, nonetheless quickly recognized the importance
of the decentralization of their operations. Notably, in 2004, al-Suri penned his Call for a
Global Islamic Resistance, in which he decried the hierarchical model of al-Qaeda as
outdated and vulnerable, espousing instead the advantages grassroots leaderless
resistance (Bousquet, 2011; Michael, 2013). Al-Suri’s strategy of individual jihad, best
illustrated by the activities of al-Qaeda in the Arabian Peninsula (AQAP).
Another highly important paradigm shift, largely dependent on the power of the
Internet, occurred with the 2010 AQAP launch its widely distributed English-language
online magazine titled Inspire, which encouraged individual jihad against Americans and
Westerners (Michael, 2013). With slick production values and graphics, Inspire mixed
ideologically driven material with pragmatic instructional and skill-building content in an
effort to fostering a do-it-yourself approach to terrorism (Lemieux et al., 2014).
Moreover, this emphasis on a do-it-yourself ethos targeted at an English-speaking
readership is an “especially interesting development in Inspire that set it apart from other
examples of the al-Qaeda propaganda” (Lemieux et al., 2014). Through a section entitled
Open Source Jihad, Inspire attempted to increase the motivation of individuals in the
West, while lowering skill-based barrier that had previously hampered individuals
attempting to carry out successful terrorist attacks. For example, one issue detailed how
to conduct a random shooting in a crowded restaurant, while another instructs readers
how to weld blades to the front of a pick up truck to “mow down the enemies of Allah”6
(as quoted in Michael, 2013; 55).
6 A similar tactic, minus the blades, was employed in the West on at least three occasions: In 2006,
Mohammed Taheri-azar injured nine people with a sports utility vehicle on the campus of the University of
North Carolina at Chapel Hill (Spencer, 2010); On 22 May 2013, a British Army solider was run over with
a car before being stabbed and hacked to death by two converts to Islam in the southeast of London (The
“Return to old-style terror,” 2013).; and more recently, a Canadian solider was killed and another one
injured after being deliberately struck by a car driven by a convert who had previously expressed a desire to
travel to Iraq to fight with ISIS (Woods, 2014). This tactic embodies the essence of ‘do-it-yourself’
terrorism, as it “offers terrorists with limited access to explosives or weapons an opportunity to conduct a
homeland attack with minimal prior training or experience” (FBI, 2010),
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
The production of Inspire magazine is, in many ways, the incarnation of the strategic
vision of Anwar al-Awlaki, a popular,7 American born, online cleric affiliated with
AQAP whose sermons were widely distributed on YouTube. Al-Awlaki is also credited
with inspiring a number of terrorist plots and attacks.8 According to Brain Jenkings
(2011), Al-Awlaki and Inspire led to a fundamental shift in al-Qaeda’s strategy from
organizationally-led jihad, towards do-it-yourself terrorism. Similarly, Jarret Brachman
(2014) claims that al-Awlaki and AQAP made do-it-yourself terrorism, and its
participants, the focus of their media efforts, rather than conceptualizing al-Qaeda’s
sympathizers as merely an audience. A change in the nature of terrorism, whereby
terrorist organizations such as AQAP can motivate and empower individuals to commit
acts outside of any chain of command, according to Bruce Hoffman (2010), represents a
change in the nature of terrorism itself.
As a result of this paradigmatic shift, online jihadist activity came to have standing in
its own right. A 2012 article on electronic jihad, posted on the leading jihadist forums al-
Fida and Shumukh al-Islam, stated that:
“[A]ny Muslim who intends to do jihad against the enemy electronically, is
considered in one way or another a mujaheed, as long as he meets the conditions of
jihad such as the sincere intention and the goal of serving Islam and defending it,
even if he is far away from the battlefield” (as quoted in Weimann 2014, 4).
Similarly, Muhammad bin Ahmadal-Salim’s 39 Ways to Serve and Participate in
Jihad extolled “performing electronic jihad” as a “blessed field which contains much
benefit” (as quoted in Awan et al 2011: 56). Given the belief that participation in indirect
jihad is seen as both a required and effective form of resistance and participation in
current times, the call for electronic jihad inevitably did not remain unanswered in the
wake of the Syrian Civil War.
3. The Use of Social Media by IS
As highlighted by Lewis (2014), the military victory of IS represents only one part of
the equation in establishing its caliphate. The key battle for IS is not solely military and
achieved by violence, but also includes the formation of “the practical basis of a society”
(p. 11-12). In order to achieve this social objective, IS relies on the dissemination of its
7 A 2009 British government analysis of YouTube found 1,910 videos of al-Awlaki, one of which
had been viewed 164,420 times (Weimann, 2014). Similarly, in 2008, his popular lecture Constants on the
Path of Jihad was available on ummah.com, a mainstream site that received at the time approximately
48,300 visit per month from the US alone (Meleagrou-Hitchens, 2011).
8 Al-Awlaki is believed to have been in contact with at least two of the 9/11 hijackers. He is also
credited with inspiring or directing a number of other terrorist attacks: the failed 2008 Times Square
bombing; the 2009 shooting inside the Fort Hood military base; the failed 2009 “underwear bomber;” and a
failed 2010 bombing attempt involving a parcel bomb hidden inside a printer in the cargo hold of a
passenger jet (Weimann, 2014). Moreover, Roshanara Choudhry, a Muslim student jailed for attempting to
murder British MP Stephen Timms in May 2010, claimed that she was radicalized after listening to
Awlaki’s YouTube videos (Weimann, 2014).
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
message to foster support both domestically and abroad through a uniquely effective
social media strategy.
Although all sides of the Syrian Civil War have adopted the use of social media, the
use of social media by IS appears to have generated far more attention, and consequently
has been more successful than others. In addition, whilst various terrorist organizations,
such as AQAP and Al Shabaab, have maintained Twitter accounts since 2010, they often
did so as a secondary means of communication. The bulk of content was instead
available on extremist forums, featuring downloadable content such as magazines, videos
and brochures. In contrast, the distribution of information almost exclusively on Twitter,
has allowed IS to quickly reach a large audience. Therefore, the dissemination of its
ideology, and the advancement of its long-term objective, namely the legitimization of
the consolidation and expansion of territory, has occurred more successfully than it might
otherwise have done (Friedland, 2014).
In order to frame its message, IS has developed a range of exceptionally professional
and sophisticated communication and social media initiatives that are exceptionally easy
to access and highly attractive to their audiences. On 5 July 2014, IS media group Al-
Hayat Media released in numerous different languages (including Albanian, English,
French, and German) the first issue of its online magazine Dabiq,9 a publication
reminiscent of Inspire magazine (Cambhir, 2014). Each issue reaffirms “key themes,
strategic exploits and ideological constructions, as well as speech from [IS] leaders”
(Saltman and Winter, 2014; 39). In addition, they also contain powerful photographic
imgery of IS’ military and state-building endeavors such as: images of wounded Iraqi
Security Force soldiers; the distribution of food and water by IS fighters in regions under
its control; victorious parades of militants in invaded cities; the destruction of Shiite and
Sufi shrines; and the execution of prisoners and members of religious minorities
(Styszynski, 2014). Similarly, IS produces high-quality videos, which have thus far
included The End of Sykes-Picot, The Flames of War, The Clanging of the Swords I-IV,
and Upon the Prophetic Methodology, which romanticize the daily lives of IS fighters.
Punctuated with cinematographic effects, such as instant replays and slow-motion shots,
these, often feature length, videos “appear to be something from a Hollywood action film
or a video game” (Vitale and Keagle, 2014: 9).
The development of a highly sophisticated media strategy which relies upon the
decentralized nature of social media, particularly Twitter, has allowed for the mass
dissemination of IS’ multitudinous products. While content is created under the direct
guidance of IS strategists, dissemination relies upon sympathizers at the grassroots level.
Therefore, the message of IS’ communications remain strategically unified despite
dissemination being ‘crowd sourced.’ This extensive reliance on soft-sympathizers either
re-tweeting or re-posting content produced and authorized by IS leadership has “no clear
precedent” (Barrett, 2014: 51). For example, on the day Abu Bakr al-Baghdadi declared
the establishment of the Caliphate, IS began circulating pictures of his speech before a
video of the speech was uploaded several times on YouTube. The links to these YouTube
videos were then uploaded on the widely popular file sharing website justpaste.it prior to
9 Dabiq is a town located in north Syria and is mentioned in a hadith describing events of the
Malahim (Armageddon) where the greatest battle between Muslims and the crusaders takes place. In other
words, Dabiq represents a story of Muslim unity against the Romans (Saltman and Winter, 2014)
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
being Tweeted by IS to tens of thousands of sympathizers. These sympathizers, in turn,
re-tweeted the links and more importantly, copied and uploaded links to, and the video
itself, using various different accounts. These new links were then added to justpaste.it
and Tweeted again, in a repetitive manner (Barrett, 2014). This extensive reliance on
soft-sympathizers either re-tweeting or re-posting content produced and authorized by IS
leadership has “no clear precedent” (Barrett, 2014: 51). This strategy, aimed at gaining
maximum exposure and overcoming YouTube’s attempt to suppress IS propaganda, has
shown its efficiency on many occasions. Another pertinent example of this strategy in
action, showing “the ease” and “speed with which IS is able to spread its message”
(Barrett, 2014; 52), is that of the film Flames of War. After two days of having been
uploaded, one randomly selected page – amongst dozens of others promoting the video –
had recorded 18,034 views within just a seven-hour timeframe.
Moreover, to further its strategy of crowd-sourced dissemination, IS affiliates
developed an Android application called The Dawn of Glad Tiding10 to enable users to
keep up with the latest news about the activities of the Islamic State. Vitally, the
application also allows IS’ main communication branch to send Tweets periodically from
the accounts of everyone who has installed the application, thereby flooding social media
with IS propaganda without triggering Twitter’s spam-detection algorithms (Berger,
2014). The Dawn of Glad Tiding first went into wide use in April 2014, but reached an
all-time high of almost 40,000 tweets on the day IS marched into Mosul (Vitale and
Keagle, 2014).
In addition, IS sympathizers also routinely engage in systematic ‘hashtag hijacking,’
manipulating Twitter to magnify IS’ message. Hashtag hijacking involves the
repurposing of popular and/or trending hashtags by adding those hashtags into unrelated
Tweets as a means of infiltrating conversations. In order to increase the visibility of their
messages, IS sympathizers co-opted World Cup hashtags such as #Brazil2014 or
#WC2014, and, as mentioned earlier, hijacked Tweets relating to the Scottish
Independence referendum (Vitale and Keagle, 2014). Utilizing popular and trending
hashtags in conjunction with IS’ own hashtags such as #theFridayofsupportingISIS,
#Thought_of_a_Lone_Lion and #AmessagefromISIStoUS, increases the exposure of the
message. This strategy allows for a message which has effectively been crafted by only a
handful of IS propaganda agents to be disseminated by thousands of sympathizers in
order to reach millions of Twitter users. In fact, in the period between 17 September and
17 October 2014, the activities of IS supporters resulted in 4.1 million Retweets (Barrett,
2014).
3. 1. Implications of IS’ Social Media Strategy
Although there is nothing new in violent extremist groups quickly adopting new
technology, what has hardly any precedent is the breadth of the communication strategy
implemented by IS. Not only does IS use new technology to create the content which it
releases, it also utilizes new technologies innovatively in the dissemination of that
content. This strategy has, until now, been only sparsely covered in terrorism study
literature. That being said, communications scholar Henry Jenkins’ (2006) notion of
10 The Dawn of Glad Tiding was available through the Google Play store prior to its removal for
violating Google’s terms of service.
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
convergence culture provides a useful theoretical framework to analyze the impact of IS
tactics.
According to Jenkins (2006), convergence culture whereby “old and new media
collide, where grassroots and corporate media intersect, where the power of the media
intersect, where the power of the media producer and the power of the media consumer
interact in unpredictable ways” (p. 2), is not a technological change. Rather, it is the
embodiment of a social change where media consumers no longer passively consume
material, but also engage in the creation of virtual communities, combining their
collective intelligence and resources to achieve a defined purpose. The fundamental
innovation of IS’ media strategy is this exploitation of the collective resource which is its
Western followers.
Fundamentally, IS recognizes that the majority of Western supporters will never
engage in kinetic actions such as terrorist acts in their homelands, or fighting abroad.
Instead, IS utilizes these supporters for the purpose of disseminating information and
propaganda relating to their cause. Arguably, not requiring Western supporters to engage
actively in terrorist acts, allows IS to garner the participation of these supporters without
asking them to cross moral boundaries they might not feel comfortable crossing. This
perfectly embodies Brachman’s notion of jihobbyists. Brachman (2008) contends that the
rise of Web 2.0 allowed individuals who have largely driven their own radicalization
without direct assistance, training, or support “to move forward the Jihadist agenda” (p.
19)
In addition to increasing the exposure of IS’ message, these disseminators also seek to
move forward this jihadist agenda by aiding IS to gain recognition and acceptance. In
other words, they are actively engaged in an attempt to normalize IS’ narrative. IS media
strategy can be understood in terms of soft power projection. While some of IS’
propaganda is clearly aimed at intimidating Western audiences with depictions of
atrocities and human rights abuse, these intimidation tactics have been punctuated with
imagery of genuine state-building exercises. These images include the depiction of IS’
engagement in administrative functions. Particularly relevant examples include: the
enforcement of sharia law through the establishment of a religious police force; the
establishment of religious schools; the distribution of food; and reconstruction projects
(Lefler 2014). The aim of these depictions is the advancement of the notion of the
Islamic State as a legitimate state in order to gain long-term support of the local populace.
This is of critical importance to IS in its attempt to socialize the Muslim world to the
ideas and values of the Islamic State.
In order to socialize its global Muslim audience, the mass dissemination of IS’
carefully crafted message seeks to dominate the narrative. The creation of an echo
chamber amplifies and reinforces its messages through transmission and repetitions
whilst also drowning out competing views. In order words, by ensuring that its narrative
is louder than that of its opponents, IS’ sophisticated use of social media creates an
impression of large legitimate online support, which exceeds the actual reality. Whilst
videos of beheadings and other atrocities have gained tremendous profile, possibly more
important is the positive narrative created by IS videos which depict a unified community
were pious men police the streets eliminating drugs and making sure everyone prays
together. This offers a sharply idealized contrast to most states in the Middle East, where
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
aging autocrats are seen to preside over irredeemably corrupt and stagnant governments,
and can arguably be seen as IS’ greatest success.
Despite IS’ impressive social media strategy, its narrative remains vulnerable to
challenges. Echo chambers are typically present within closed systems, such as online
forums, which are hermetically sealed from divergent perspectives. However, Twitter in
itself is not a closed-system. As such, whilst any open system may be open to domination
by a series of ‘loud noises’, this domination of narrative is only temporary and can be
challenged by various competing views, which in this particular case weaken the
‘absoluteness’ of IS’ message. Among these challenges the satire from within Muslim
world has been particularly effective in slowly eroding the absoluteness of the IS
narrative. For example, the Burn the IS Flag campaign, seemingly started by Muslims
outraged by the actions of IS, has been trending on Twitter under the hashtags
#BurnISISFlagChallenge and #BurnISIS. Based on the ALS Ice Bucket Challenge, the
movement features people posting photos and videos of themselves burning IS’ banner
and then challenging their friends to follow suit (Palmer, 2014). Similarly, the US State
Department’s launch of a tough and graphic counter campaign, uses IS’ own images of
barbaric acts against fellow Muslims in propaganda which counters IS’ narrative. The
corner stone of this counter-campaign is a video entitled Run – Do Not Walk to ISIS
Land, which tells potential recruits that they can learn “useful new skills” such as
“blowing up mosques” and “crucifying and executing Muslims,” in a sarcastic attempt to
illustrate the appeal of joining IS, whilst also offering an alternative to IS’ seductive
message (Logiurato, 2014).
Conclusion
As demonstrated in this paper, IS relies on a global network of disseminators to
promote its material. Instead of a single source acting as the monolithic voice of the
organization, multiple messengers collaborate to communicate its message thus lending
the appearance of authenticity and wide acceptance. It also creates a huge problem for the
people attempting to curb the spread of ISIS’s messages. Blocking multiple offending
users as they pop up becomes a challenge, and squashing violent statements on Twitter
brings up questions regarding free speech that are as yet unanswered. Moreover, relying
exclusively on the administrators of social media platforms to effectively limit the spread
of IS ideology through account closures and suspensions is unreliable at best. In this era
of instantaneous global communication it is, for the most part, futile to close or suspend
accounts unless this is nested within a wider, comprehensive anti-propaganda effort
designed to neuter IS domination of the narrative.
Perhaps the biggest mistake in the ‘War on Terror’ was the belief that the destruction
of Al-Qaeda’s training camps and leadership would lead to the demise of the group, its
affiliated movements, and its ideology. In the same way that Islamic State’s land grab is
impressive, if shocking, the group’s online actions have been even more deeply troubling.
The pervasiveness of its ideology and message means that defeating the group will
require more of Western governments than a simple military response in Iraq, or even
elsewhere in the Middle East: the message itself needs effective countering as well.
Western countries need to use an integrated, coordinated, and synchronized approach,
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
with support from allied countries in the Islamic world and Muslim civil society more
generally, in order to accomplish such a goal.
Bibliography:
Amble, J. C. (2012) Combating Terrorism in the New Media Environment. Studies in
Conflict & Terrorism, 35(5), 339–353.
Awan, A. N. and Al-Lami. M. (2009) Al-Qa'ida's Virtual Crisis. The RUSI Journal,
154(1), 56-64.
Berger, J.M. (2014, June 16). How ISIS Games Twitter. The Atlantic. Retrieved from
http://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-
media-strategy/372856/.
Bousquet, A. (2012) Complexity Theory and the War on Terror: Understanding the Self-
Organising Dynamics of Leaderless Jihad. Journal of International Relations and
Development, 15, 345-369.
Brussels Jewish Museum killings: Suspect 'admitted attack'. (2014, 1 June). BBC.
Retrieved from http://www.bbc.co.uk/news/world-europe-27654505.
Burke, J. (2003). Al-Qaeda: Casting a Shadow of Terror. New York: I.B. Tauris.
Chittooran, J. T. (2013). The Syrian Conflict in a Connected World. Council on Foreign
Relations. Retrieved from
http://www.cfr.org/content/publications/attachments/Syrian_Conflict_in_a_Conne
cted_World_Rapporteur_Notes_7-2-13.pdf.
Conway, M. (2012) From al-Zarqawi to al-Awlaki: The emergence and development of
an online radical milieu. CTX: Combating Terrorism Exchange, 2(4), 12-22.
Conway, M., & McInerney, L. (2008). Jihadi Video & Auto-Radicalisation: Evidence
from an Exploratory YouTube Study. In proceedings of the 1st European
Conference on intelligence and Security informatics.
Department of Homeland Security. (2013). Terrorist Use of Vehicle Ramming Tactics.
(Report No. IA-0086-11). Retrieved from https://publicintelligence.net/ufouo-dhs-
fbi-warning-terrorist-use-of-vehicle-ramming-tactics/.
Eedle, P. (2005). Al Qaeda’s Media Strategy. In K. G. Greenberg (Eds.), Al Qaeda Now.
Cambridge: Cambridge University Press, 2005.
Fieldland, E. (2014). The Islamic State (ISIS) Fact Sheet. Clarion Project. Retrieved
from www.clarionproject.org/factsheet/islamic-state-isis-isil.
Gambhir, H. (2014). Dbiq: The Strategic Messaging of the Islamic State. Institute for the
Study of War. Retrieved from
https://www.understandingwar.org/backgrounder/dabiq-strategic-messaging-
islamic-state
Gulmohamad, Z. K. (2014) The Rise and Fall of the Islamic State of Iraq and Al-Sham
(Levant) ISIS. Global Security Studies, 5(2), 1-11.
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
Hagel Confirms More than 100 Americans Fighting for ISIS in Iraq, Syria. (2014, 4
September). CBS. Retrieved from http://washington.cbslocal.com/2014/09/04/cbs-
news-hagel-confirms-more-than-100-americans-fighting-for-isis-in-iraq-syria/.
Hoeren T. & Vossen, G. Manifest: The Role of Law in an Electronic World Dominated
by Web 2.0. Computer Science Research and Development, 23(1), 7-13.
Hoffman, B. (2010, July 21). The American Jihad, Part II. The National Interest.
Retrieved from http://nationalinterest.org/commentary/american-jihad-part-ii-
3680.
Islamic State crisis: ‘3,000 European jihadists join fight. (2014, September 26). BBC.
Retrieved from www.bbc.com/news/world-middle-east-29372494.
Jenkins, B. M. (2003). Is Al Qaeda’s Internet Strategy Working? The RAND
Corporation. Retrieved from
http://www.rand.org/content/dam/rand/pubs/testimonies/2011/RAND_CT371.pdf
Jenkins, H. (2006). Convergence Culture: Where old and New Media Collide. New York:
New York University Press.
Kase, S. E., . Mowman, E. K., Al Amin, T., & Abdelzahar, T. (June 2014) Exploiting
Social Media for Army Operations: Syrian Civil War Use Case. Army Research
Laboratory. (Report ARL-RP-0489). Retrieved from www.dtic.mil/cgi-
bin/GetTRDoc?AD=ADA60368
Kimmage, D. (2008). The Al-Qaeda Media Nexus: The Virtual Network Behind the
Global Message. Radio Free Europe/ Radio Liberty. Retrieved from
http://www.e-prism.org/images/AQ_Media_Nexus_-_March08.pdf
Kirdar, M.J. (2011). “al-Qaeda in Iraq.” Center for Strategic & International Studies.
Retrieved form
www.csis.org/files/publication/110614_Kirdar_AlQaedaIraq_Web.pdf
Lefler, J. (2014). Life under ISIS in Mosul. Institute for the study of War. Retrieved from
http://iswiraq.blogspot.com/2014/07/ life-under-isis-in-mosul.html.
Lemieux, A. F., Brachman, J. M., Levitt, J., & Wood, J. (2014) Inspire Magazine: A
Critical Analysis of its Significance and Potential Impact Through the Lens of the
Information, Motivation, and Behavioral Skills Model. Terrorism and Political
Violence, 26(2) 354-371.
Lewis, J. D. (2014). The Islamic State: A Counter-Strategic for a Counter-State. Middle
East Security. (Report 21). Retrieved from
http://www.understandingwar.org/sites/default/files/Lewis-
Center%20of%20gravity.pdf
Loguirato, B. (2014, September 5). U.S. releases mock ISIS recruitment video that shows
jihadist group blowing up mosques, crucifying Muslims. The National Post.
Retrieved from http://news.nationalpost.com/2014/09/05/u-s-releases-mock-isis-
recruitment-video-that-shows-jihadist-group-blowing-up-mosques-crucifying-
muslims/.
Lynch, M., Freelon, D., & Aday, S. (2014). Syria’s Socially Mediated Civil War. United
States Institute of Peace. Retrieved from
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
http://www.usip.org/sites/default/files/PW91-
Syrias%20Socially%20Mediated%20Civil%20War.pdf
Malik, S., Laville S., Cresci, E., & Gani, A. (2014, September 24). ISIS duel with Twitter
and YouTube to spread extremist propaganda. The Guardian. Retrieved from
http://www.theguardian.com/world/2014/sep/24/isis-twitter-youtube-message-
social-media-jihadi
Meleagrou-Hitchens, A. (2011). As American as Apple Pie: How Anwar al- Awlaki
Became the Face of Western Jihad. The International Centre for the Study of
Radicalisation and Political Violence. Retrieved from http://icsr.info/wp-
content/uploads/2012/10/1315827595ICSRPaperAsAmericanAsApplePieHowAn
waralAwlakiBecametheFaceofWesternJihad.pdf
Michael, G. (2013) The New Media and the Rise of Exhortatory Terrorism. Strategic
Studies Quarterly Spring, 7(1), 40-68.
O'Callaghan, D., Prucha, N., Greene, D., Conway. M., Carthy, Joe., & Cunningham, P.
(2014). Online Social Media in the Syria Conflict: Encompassing the Extremes
and the In-Betweens. Paper presented at the International Conference on
Advances in Social Networks Analysis and Mining.
Palmer, E. (2014, September 4). ‘Burn Isis Flag Challenge' Goes Viral in Arab World.
Yahoo News. Retrieved from https://uk.news.yahoo.com/burn-isis-flag-challenge-
goes-viral-arab-world-124824439.html#71eHmsL.
Public Safety Canada. (2014). Public Report On The Terrorist Threat To Canada.
Retrieved from http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2014-pblc-rpr-
trrrst-thrt/index-eng.aspx.
Ramsay, G. (2009). Relocating the Virtual War. Defence Against Terrorism Review, 2(1),
31–50.
Rid, T., & Hecker, M. (2009). War 2.0: Irregular Warfare in the Information Age.
Westport, CT and London: Praeger Security International.
Return to old-style terror. (2013, May 25). The Economist. Retrieved from
http://www.economist.com/news/britain/21578453-shocking-killing-reminder-
disorganised-jihadists-are-harder-stop-organised.
Saltman, E. M., & Winter, C. (2014). Islamic State: The Changing Face of Modern
Jihadism. Quilliam. Retrieved from http://www.quilliamfoundation.org/wp/wp-
content/uploads/publications/free/islamic-state-the-changing-face-of-modern-
jihadism.pdf
Sageman, M. (2008), Leaderless Jihad: Terror Networks in the Twenty-First Century.
Philadelphia: University of Pennsylvania Press.
Seabrook, J. (2013, January 12). Streaming Dreams. The New Yorker. Retrieved from
http://www.newyorker.com/magazine/2012/01/16/streaming-dreams.
Spencer, R. (2010, October 12). Al-Qaeda Magazine Teaches How to Kill Americans,
The Telegraph. Retrieved from
http://www.telegraph.co.uk/news/worldnews/middleeast/yemen/8059725/Al-
Qaeda-magazine-teaches-how-to-kill-Americans.html.
Presented at the 6th International Symposium on Terrorism and Transnational Crime. Antalya, Turkey.
(December 4-7, 2014)
Styszynski, M. (2014). ISIS and Al Qaeda: Expanding the Jihadist Discourse. Counter
Terrorist Trends and Analysis, 6(8), 9-14.
Talbot, D. (2014, February 1). Terror’s Server. Technology Review. Retrieved from
http://www.technologyreview.com/featuredstory/403657/terrors-server/.
Thomas, T. L. (2013) Al-Qaeda and the Internet: The Danger of ‘Cyberplanning’.
Parameters, 112-123.
Torres, M., Jordan, J., & Horsburgh, N. (2006) Analysis and Evolution of the Global
Jihadist Movement Propaganda. Terrorism and Political Violence, 18, 399-421.
Torres-Seriano, M. R. (2013) The Dynamics of Creation, Evolution, and Disappearance
of Terrorist Internet Forums. International Journal of Conflict and Violence, 7(1),
164-178.
Tsfati, Y., & Weimann, G. (2002) www.terrorism.com: Terror on the Internet. Studies in
Conflict & Terrorism, 25(5), 317-332.
Vitale, H. M., & Keagle, J.M. (2014). A Time to Tweet, as well as a Time to Kill: ISIS’
Project of Power in Iraq and Syria. Institute for National Strategic Studies.
Retrieved from
http://ndupress.ndu.edu/Portals/68/Documents/defensehorizon/DH-77.pdf
Weimann, G. (2014). New Terrorism and New Media. Commons Lab of the Woodrow
Wilson International Center for Scholars, Retrieved from
http://www.wilsoncenter.org/publication/new-terrorism-and-new-media.
Weimann, G. (2008) The Psychology of Mass-Mediated Terrorism. American Behavioral
Scientist, 52(69), 69-86.
Weimann, G. (2006). Terror on the Internet: The New Arena, the New Challenges.
Washington, DC: United States Institute of Peace.
Woods, A. (2014, October 26). How Martin Couture-Rouleau became an aspiring Islamic
State fighter. The Star. Retrieved from
http://www.thestar.com/news/canada/2014/10/26/how_martin_couturerouleau_be
came_an_aspiring_islamic_state_fighter.html.
... Once again, it is ISIS that is particularly notorious for its Twitter use. They have utilized the platform for various purposes, including intimidation -directed at both distant foes as well as local enemies -as well as for indoctrination and recruitment (Klausen, 2015;Veilleux-Lepage, 2014;Vitale & Keagle, 2014). ISIS has been particularly successful in leveraging the platform's crowdsourcing function for massive outreach, allowing others to positively contribute to their campaign by adding their own content, retweeting official tweets, and using popular hashtags (Vitale & Keagle, 2014). ...
... For instance, in 2014, ISIS supporters coopted World Cup hashtags, such as #Brazil2014 or #WC2014. Using this strategy, any Twitter user browsing these hashtags could find ISIS' tweets among regular World Cup tweets (Greene, 2015;Veilleux-Lepage, 2014;Vitale & Keagle, 2014) To further the group's strategy of crowd-sourced dissemination, ISIS affiliates have also developed an Android application named the 'The Dawn of Glad Tiding'. It was temporarily available in the "Play Store", before Google removed the app for violating their terms of service. ...
... The application allowed ISIS affiliates to automatically posts tweets -approved by its main communication branch -to the Twitter accounts of application users without upsetting Twitter's spam-detection algorithms. As such, it allowed them to flood twitter with ISIS propaganda (Veilleux-Lepage, 2014). At its height, app posting activity was around 40.000 tweets in a single day (Aly, 2017;Vitale & Keagle, 2014). ...
Research
Full-text available
In this report, the authors examine the extent to which counter-narrative initiatives via social media can be effective in preventing people from radicalization or can de-radicalize people. Specifically, they formulate the following research questions: (1) How can we conceptualize narratives and counter-narratives? (2) How are narratives and counter-narratives used via social media? (3) To what extent is it possible to use counter-narrative programs via social media to deradicalize individuals or prevent violent extremism? (4) What are the pre-requisites for a counter-narrative program for it to be effective? a. Which social media are most suitable and why? b. What can we learn from examples of counter-narrative programs that have been operational in other democratic countries? c. What can we learn from examples of social media campaigns in other domains, such as health care and environmental issues? d. What are the potential risks for unwanted side effects? (5) How can the potential effectiveness of such a counter-narrative program be determined? (6) What can be the role of the government in such a counter-narrative program
... Individuals are likely exposed to radicalizing information in settings where they can connect with radicalizing actors without interference (i.e., low formal or informal social control; [17]); it was shown that the latter include, for instance, prisons, schools, gyms, and coffee shops [11,12,18]. Given that hate and extremist actors have developed resilient cross-platform ecosystems online [21][22][23][24], the internet also provides numerous opportunities to be exposed to radicalizing messages [25][26][27]. Having said this, Clemmow and colleagues [28] showed that in a British sample of the general population, only 6.8% had, across their lifetime, sought violent extremist material online. ...
Article
Full-text available
Exposure to radicalizing information has been associated with support for violent extremism. It is, however, unclear whether specific information use behavior, namely, a distinct pattern of incidental exposure (IE) to and active selection (AS) of radicalizing content, indicates stronger violent extremist attitudes and radical action intentions. Drawing on a representative general population sample ( N = 1509) and applying latent class analysis, we addressed this gap in the literature. Results highlighted six types of information use behavior. The largest group of participants reported a near to zero probability of both IE to and AS of radicalizing material. Two groups of participants were characterized by high or moderate probabilities of incidental exposure as well as a low probability of active selection of radicalizing content. The remaining groups displayed either low, moderate, or high probabilities of both IE and AS. Importantly, we showed between-group differences regarding violent extremist attitudes and radical behavioral intentions. Individuals reporting near zero or high probabilities for both IE to and AS of radicalizing information expressed the lowest and strongest violent extremist attitudes and willingness to use violence respectively. Groups defined by even moderate probabilities of AS endorsed violent extremism more strongly than those for which the probability for incidental exposure was moderate or high but AS of radicalizing content was unlikely.
... Terrorist groups such as Al-Qaeda in the Arabian Peninsula and Al-Shabaab group have maintained Twitter accounts since 2010. It was found that the distribution of information almost exclusively on Twitter allowed ISIS to quickly reach large audience ( Veilleux-Lepage, 2014 ). A report by the Woodrow Wilson Center revealed that Twitter has emerged as terrorists' favorite Internet service, even more popular than self-designed websites and Facebook to disseminate propaganda and enable internal communication ( Wiener-Bronner, 2014 ;Weimann, 2014 ). ...
Article
With the popularity of social networks, terrorist groups such as ISIS encouraged others to follow their activities, share their ideas, recruit fans, radicalize communities, and raise funds to support future attacks. This has led to the emergence of radicalized online accounts that belong to terrorists or their fans. Existing techniques for counter-terrorism investigations which aim to suspend such accounts are based on reports by users or syntactic-based sentiment analysis techniques, which are not accurate on short texts shared by terrorist such as tweets. This work proposed a feature augmentation approach to enrich the content of tweets before investigating them to discover the radicalized online contents. The augmented tweets are then used to classify accounts into Pro-ISIS or Anti-ISIS categories. We utilized topic modeling as a baseline method for feature augmentation. We studied the effects of utilizing tweets at different time intervals on the quality of the generated models that classify tweets and the corresponding accounts. We then introduced a novel feature augmentation approach that utilizes Neighborhood Overlap, a graph proximity technique that discovers terms having a strong relationship with the Pro-ISIS category. Terms extracted from tweets are represented as nodes in a graph, which is then partitioned into clusters containing different terms. Terms in strongly connected parts of each cluster are augmented to the original term vectors of the tweets based on the similarity between those terms and each tweet. We compared our approach with other baseline augmentation techniques such Term-to-Term correlation, Topic Modeling, and other existing techniques. Experimental results on a dataset containing Pro- and Anti-ISIS tweets show that our approach is quite promising to automate the identification of terrorist contents online. The results have shown that using graph proximity measures such as Neighborhood Overlap for term augmentation gains higher Precision, Recall, and F-measure than the typical approaches. In addition, we found that applying time-based analysis with term augmentation to identify radicalized accounts enhanced the Precision of the investigation process.
... 247). Much of ISIL's rise to power is attributable to their successful social media campaigns and, as such, warrants further empirical investigation. 2 While some scholars have examined the types of information disseminated by ISIL (e.g., Derrick et al., 2016), less is known about the ways in which ISIL's non-combatant sympathizers in the West, referred to as soft-sympathizers, utilize social media platforms (see Alexander, 2017;Veilleux-Lepage, 2014). Soft-sympathizers play an important strategic goal. ...
Article
Full-text available
A number of key risk factors are associated with racist, sexist, and homophobic practices on North American college campuses. However, one additional determinant that has thus far been overlooked is male aggrieved entitlement. Using exploratory qualitative data gleaned by the Campus Quality of Life Survey administered at a large college in the South Atlantic region of the United States, the main objective of this article is to help fill a major research gap by showing that aggrieved entitlement is a correlate that warrants more attention in future empirical and theoretical work on campus climates.
... 247). Much of ISIL's rise to power is attributable to their successful social media campaigns and, as such, warrants further empirical investigation. 2 While some scholars have examined the types of information disseminated by ISIL (e.g., Derrick et al., 2016), less is known about the ways in which ISIL's non-combatant sympathizers in the West, referred to as soft-sympathizers, utilize social media platforms (see Alexander, 2017;Veilleux-Lepage, 2014). Soft-sympathizers play an important strategic goal. ...
Article
Full-text available
We draw from Sykes and Matza's techniques of neutralization theory to interpret how Islamic State and the Levant (ISIL) soft-sympathizers justify violence perpetrated by ISIL. Data come from Tweets associated with ISIL-affiliated accounts that occurred within 24 hours of three high-profile ISIL-attributed attacks: Paris, Nice, and Orlando. Our findings suggest that condemnation of the condemners was a particularly salient neutralization technique used to point out the perverse motives and inconsistent behaviors of Western armed forces, media, and the public. More specifically, we found that the condemnation of the condemners was underlined by three specific claims: (1) comparable violence, (2) selective silence, and (3) differential humanity. Together, these claims intended to display the perceived hypocrisy of ISIL condemners, to undermine the moral credibility of the West, and to serve as the foundation for justifying ISIL-attributed violence. We conclude with theoretical implications and suggestions for policy and practice.
... Although it allows streaming communication (through Periscope) and direct messages to concrete users out of sight of the rest of network, Twitter works essentially as a public square in which stored and forward communication is used to express content that can be observed and shared by a large number of people (Marwick and Boyd 2011). If we add that political or ideological communication has become increasingly frequent on Twitter (Bode and Dalrymple 2016), it seems understandable that this social network is commonly used to disseminate hate speech (Schmidt and Wiegand 2017) and that it has become perhaps the favourite social network of extremist and terrorist groups for propaganda and the promotion of radicalisation to a wider audience (Berger and Morgan 2015;Veilleux-Lepage 2014;Weimann 2014). ...
Article
Full-text available
Abstract With the objective of facilitating and reducing analysis tasks undergone by law enforcement agencies and service providers, and using a sample of digital messages (i.e., tweets) sent via Twitter following the June 2017 London Bridge terror attack (N = 200,880), the present study introduces a new algorithm designed to detect hate speech messages in cyberspace. Unlike traditional designs based on semantic and syntactic approaches, the algorithm hereby implemented feeds solely on metadata, achieving high level of precision. Through the application of the machine learning classification technique Random Forests, our analysis indicates that metadata associated with the interaction and structure of tweets are especially relevant to identify the content they contain. However, metadata of Twitter accounts are less useful in the classification process. Collectively, findings from the current study allow us to demonstrate how digital microenvironment patterns defined by metadata can be used to create a computer algorithm capable of detecting online hate speech. The application of the algorithm and the direction of future research in this area are discussed.
Article
Full-text available
In 2014, the world witnessed the rise of the Islamic State, a group who appeared to simultaneously wage war against the West and Middle East. This article has analysed ISIS attacks against the West, in order to demonstrate that most attacks are committed by inspired individuals rather than ISIS's members. This article will then add to the ever growing literature on ISIS's English language propaganda, by showing this propaganda is specifically targeting Western audiences through mimicking Western pop culture. An example of this is a remake of the popular videogame Call of Duty, set in Syria named Call of Jihad. The paper argues that, by using Western imagery, the group has made terrorism more relatable to Western citizens and has increased the number of attacks by inspired lone wolfs. To demonstrate this, the paper uses data extrapolated from the Global Terrorism Database relating to Islamic terrorist attacks on the West between 1998 and 2017, to show that after 2014 there has been fewer Islamic terrorist attacks linked to a terrorist group. The paper will then analyse ISIS's films, posters, video games and music to understand how they have used Western references to target a Western audience.
Book
Full-text available
This book is a timely and significant examination of the role of counter-messaging via social media as a potential means of preventing or countering radicalization to violent extremism. In recent years, extremist groups have developed increasingly sophisticated online communication strategies to spread their propaganda and promote their cause, enabling messages to be spread more rapidly and effectively. Countermessaging has been promoted as one of the most important measures to neutralize online radicalizing influences and is intended to undermine the appeal of messages disseminated by violent extremist groups. While many such initiatives have been launched by Western governments, civil society actors, and private companies, there are many questions regarding their efficacy. Focusing predominantly on efforts countering Salafi-Jihadi extremism, this book examines how feasible it is to prevent or counter radicalization and violent extremism with counter-messaging efforts. It investigates important principles to consider when devising such a program. The authors provide both a comprehensive theoretical overview and a review of the available literature, as well as policy recommendations for governments and the role they can play in counter-narrative efforts. As this is the first book to critically examine the possibilities and pitfalls of using counter-messaging to prevent radicalization or stimulate de-radicalization, it is essential reading for policymakers and professionals dealing with this issue, as well as researchers in the field.
Article
This paper uses a multimodal mixed methods approach for exploring general recontextualisation patterns of violent extremist images in online media. Specifically, the paper reports on the preliminary findings of a preliminary study which investigates various patterns in the reuse of images which appear in ISIS’s official propaganda magazines Dabiq and Rumiyah by others across various public online media platforms (e.g. news websites, social media news aggregates, blogs). Using a mixed methods approach informed by multimodal discourse analysis, and combined with data mining and information visualisation, the study addresses questions such as which types of images produced and used by ISIS in its propaganda magazines recirculate most frequently in other online media over time, on which types of online media these images reappear, and in which contexts they are used and reused on these websites, that is that is, whether the tone of the message is corporate (formal) or personal (informal). Preliminary findings from the study suggest different recontextualisation patterns for certain types of ISIS-related images of over time. The study also found that the majority of violent extremist images used in the sample analysis appear to circulate most frequently on Western news and politics websites and news aggregate platforms, in predominantly formal contexts.
Article
Full-text available
An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representing a horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role
Book
War 2.0: Irregular Warfare in the Information Age argues that two intimately connected grassroots trends—the rise of insurgencies and the rise of the web—are putting modern armies under huge pressure to adapt new forms of counterinsurgency to new forms of social war. After the U.S. military—transformed into a lean, lethal, computerized force—faltered in Iraq after 2003, a robust insurgency arose. Counterinsurgency became a social form of war—indeed, the U.S. Army calls it "armed social work"—in which the local population was the center of gravity and public opinion at home the critical vulnerability. War 2.0 traces the contrasting ways in which insurgents and counterinsurgents have adapted irregular conflict to novel media platforms. It examines the public affairs policies of the U.S. land forces, the British Army, and the Israel Defense Forces. Then, it compares the media-related counterinsurgency methods of these conventional armies with the methods devised by their irregular adversaries, showing how such organizations as al-Qaeda, the Taliban, and Hezbollah use the web, not merely to advertise their political agenda and influence public opinion, but to mobilize a following and put violent ideas into action.
Chapter
At the invitation of the New America Foundation and the New York University Center for Law and Security, a group of individuals regarded as authorities on international terrorism and Al Qaeda were brought together at a meeting held in the United States Senate office building. This volume contains the presentations that were made at this meeting. They constitute a valuable synopsis of current knowledge on Al Qaeda and the policies in place to counter threats of future terrorist attacks. The papers in this book will contribute to understanding how Al Qaeda has evolved from a movement to an ideology, what influence it has on Middle East stability and what continued threat it is to the United States, Europe, and other areas of the world. The contributors are from academia, research centers, government agencies and the media. They represent a cross section of recognized experts on Al Qaeda and international terrorism.
Book
In the post-September 11 world, Al Qaeda is no longer the central organizing force that aids or authorizes terrorist attacks or recruits terrorists. It is now more a source of inspiration for terrorist acts carried out by independent local groups that have branded themselves with the Al Qaeda name. Building on his previous groundbreaking work on the Al Qaeda network, forensic psychiatrist Marc Sageman has greatly expanded his research to explain how Islamic terrorism emerges and operates in the twenty-first century. In Leaderless Jihad, Sageman rejects the views that place responsibility for terrorism on society or a flawed, predisposed individual. Instead, he argues, the individual, outside influence, and group dynamics come together in a four-step process through which Muslim youth become radicalized. First, traumatic events either experienced personally or learned about indirectly spark moral outrage. Individuals interpret this outrage through a specific ideology, more felt and understood than based on doctrine. Usually in a chat room or other Internet-based venues, adherents share this moral outrage, which resonates with the personal experiences of others. The outrage is acted on by a group, either online or offline. Leaderless Jihad offers a ray of hope. Drawing on historical analogies, Sageman argues that the zeal of jihadism is self-terminating; eventually its followers will turn away from violence as a means of expressing their discontent. The book concludes with Sageman's recommendations for the application of his research to counterterrorism law enforcement efforts. Copyright
Article
This article presents an analysis of Al Qaeda in the Arabian Peninsula's English language publication Inspire that was conceptualized and conducted on the basis of the Information-Motivation-Behavioral Skills (IMB) framework. The IMB model has been widely tested, validated, and applied across a range of behavior change interventions, and provides both a conceptual and analytic framework to examine the range and quality of content featured across the 11 issues of Inspire that were published and distributed online starting in July of 2010. Inspire has been implicated in multiple instances of terrorism cases in the U.S. and its impact and potential can be analyzed on the extent to which it effectively targets core attitudes, perceptions of social normative support for violence, and its regular featuring of behavioral skills such as bomb making, weapons training, and emphasizing a creative and do-it-yourself ethos.
Article
This article seeks to substantiate theoretically Marc Sageman's claims of a ‘leaderless jihad’ through the application of the conceptual framework offered by the novel scientific paradigm of complexity theory. It is argued that jihadist networks, such as those behind the September 11 attacks and the bombings in London and Madrid, can be profitably understood in terms of complex adaptive systems, emergent organisations that coalesce and self-organise in a decentralised fashion. Complexity sheds new light on the jihadist movement by providing an account of the bottom-up self-organisation of its networks and the systems of distributed intelligence which allow those networks to operate and pursue successful attacks on the basis of partial and localised information, and this despite the strenuous efforts at counter-terrorism deployed by states.