ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media. A new report from West Point’s Combating Terrorism Center (CTC) shows that official ISIL propaganda on social media is dwindling.

The CTC analyzed more than 9,000 ISIL messages with images and videos shared online in an 18-month period beginning January 2015. It found a steady decline in the production of visual media messages since August 2015, when the terror group pushed out 700 such posts in a single month. By contrast, ISIL released only 200 posts with images a year later in August.

The report attributed a marked reduction in certain propaganda themes to struggles within the group. More than half of the messages coded for the report were images or clips depicting daily life in the caliphate, often as organized and peaceful, presumably to further its goal of luring sympathizers to Iraq and Syria. For instance, it has shared photos of ice cream factories or infrastructure projects.

By contrast, the CTC found that the number of media releases focused on ISIL’s governance, for instance, images of ISIL soldiers distributing food and money, fixing roads, or issuing punishments for civilian crimes—dropped over the 18-month period, while the frequency of military-themed messages remained steady. Daniel Milton, the center’s director and author of the report, read this as a sign that ISIL was “struggling to maintain the outward appearance of a functioning state.”

ISIL’s most attention-grabbing images and videos, those that featured gruesome beheadings or executions and include an actual dead body in the frame, have been surprisingly rare. Fewer than 10% of the messages fell under this category, according to the report. The volume of these posts remained steady, but the characters within them changed. In 2014, most broadcasted executions were of anti-ISIL fighters, including prisoners. In January 2016, the number of “spies” caught in ISIL territory and killed in media releases began to outpace that of enemy soldiers.

Either way, ISIL has kept its messengers relatable. “They may be Iraqi and Syrian locals speaking in Arabic or recently arrived foreigners from abroad,” Milton explained. “Regardless of the individual, it seems that the group has decided that its message will be better received if those conveying it look more like the intended target audience.” This approach has lent its campaign “an aura of inclusiveness and breadth” lacking in propaganda from Al-Qaeda, ISIL’s predecessor. That group’s online media typically featured long-winded speeches by terrorist leaders.

The decrease in the volume of messages may be a sign that ISIL has less to brag about, according to Milton and other ISIL experts. There may also be less time for propaganda when ISIL is under physical attack.

Pushback by social media companies has contributed to the decline. This summer, Twitter announced it had suspended 360,000 terror-inciting accounts between mid-2015 and August 2016. Daily suspensions were up 80%, mostly thanks to new proprietary spam-fighting tools, the company said.

Both Twitter and Facebook say they have proactively blocked accounts connected to Islamic State terrorists, rather than wait for other users to report them. Last year, in response to such efforts, ISIL moved some of its propaganda to platforms like Whatsapp and Telegram, which offer more protection from outside surveillance.

When Telegram announced last September it had created private channels that would allow followers to broadcast to groups of followers, ISIL quickly set up shop on the app, the researchers note. Telegram reportedly became the communication tool of choice for organizers of the Paris attacks in November 2015.

J.M. Berger, a fellow with George Washington University’s Program on Extremism who focuses on social media, noted a significant decline in the group’s tweeting activity, partially due to Twitter’s efforts to suspend accounts.

Google is also in this fight. It’s think tank Jigsaw began testing a “redirecting method” that inserts anti-propaganda ads in Google search results for 1,700 keywords related to the Islamic State. The impact of that program remains unclear (paywall).
Even if its propaganda has declined, ISIL’s message is sure to live on, Milton said, especially in the minds of impressionable children: “The psychological effects of the group’s control over what people read, watched, and heard will likely outlast its physical control of the territory.”

DefenseOne:

 

« Decrypting the Dark Web
US Has A Strategy To Defend Against Another Massive IoT Attack »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN)

Cyber Security Experts Association of Nigeria (CSEAN) is a not for profit group of professionals in the field of Information Security in Nigeria and Diaspora.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

Chaos Computer Club (CCC)

Chaos Computer Club (CCC)

The Chaos Computer Club is Europe's largest association of hackers.

London School of Emerging Technology (LSET)

London School of Emerging Technology (LSET)

LSET's Cyber Security Unit is your premier destination for comprehensive cybersecurity education and training.