ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media. A new report from West Point’s Combating Terrorism Center (CTC) shows that official ISIL propaganda on social media is dwindling.

The CTC analyzed more than 9,000 ISIL messages with images and videos shared online in an 18-month period beginning January 2015. It found a steady decline in the production of visual media messages since August 2015, when the terror group pushed out 700 such posts in a single month. By contrast, ISIL released only 200 posts with images a year later in August.

The report attributed a marked reduction in certain propaganda themes to struggles within the group. More than half of the messages coded for the report were images or clips depicting daily life in the caliphate, often as organized and peaceful, presumably to further its goal of luring sympathizers to Iraq and Syria. For instance, it has shared photos of ice cream factories or infrastructure projects.

By contrast, the CTC found that the number of media releases focused on ISIL’s governance, for instance, images of ISIL soldiers distributing food and money, fixing roads, or issuing punishments for civilian crimes—dropped over the 18-month period, while the frequency of military-themed messages remained steady. Daniel Milton, the center’s director and author of the report, read this as a sign that ISIL was “struggling to maintain the outward appearance of a functioning state.”

ISIL’s most attention-grabbing images and videos, those that featured gruesome beheadings or executions and include an actual dead body in the frame, have been surprisingly rare. Fewer than 10% of the messages fell under this category, according to the report. The volume of these posts remained steady, but the characters within them changed. In 2014, most broadcasted executions were of anti-ISIL fighters, including prisoners. In January 2016, the number of “spies” caught in ISIL territory and killed in media releases began to outpace that of enemy soldiers.

Either way, ISIL has kept its messengers relatable. “They may be Iraqi and Syrian locals speaking in Arabic or recently arrived foreigners from abroad,” Milton explained. “Regardless of the individual, it seems that the group has decided that its message will be better received if those conveying it look more like the intended target audience.” This approach has lent its campaign “an aura of inclusiveness and breadth” lacking in propaganda from Al-Qaeda, ISIL’s predecessor. That group’s online media typically featured long-winded speeches by terrorist leaders.

The decrease in the volume of messages may be a sign that ISIL has less to brag about, according to Milton and other ISIL experts. There may also be less time for propaganda when ISIL is under physical attack.

Pushback by social media companies has contributed to the decline. This summer, Twitter announced it had suspended 360,000 terror-inciting accounts between mid-2015 and August 2016. Daily suspensions were up 80%, mostly thanks to new proprietary spam-fighting tools, the company said.

Both Twitter and Facebook say they have proactively blocked accounts connected to Islamic State terrorists, rather than wait for other users to report them. Last year, in response to such efforts, ISIL moved some of its propaganda to platforms like Whatsapp and Telegram, which offer more protection from outside surveillance.

When Telegram announced last September it had created private channels that would allow followers to broadcast to groups of followers, ISIL quickly set up shop on the app, the researchers note. Telegram reportedly became the communication tool of choice for organizers of the Paris attacks in November 2015.

J.M. Berger, a fellow with George Washington University’s Program on Extremism who focuses on social media, noted a significant decline in the group’s tweeting activity, partially due to Twitter’s efforts to suspend accounts.

Google is also in this fight. It’s think tank Jigsaw began testing a “redirecting method” that inserts anti-propaganda ads in Google search results for 1,700 keywords related to the Islamic State. The impact of that program remains unclear (paywall).
Even if its propaganda has declined, ISIL’s message is sure to live on, Milton said, especially in the minds of impressionable children: “The psychological effects of the group’s control over what people read, watched, and heard will likely outlast its physical control of the territory.”

DefenseOne:

 

« Decrypting the Dark Web
US Has A Strategy To Defend Against Another Massive IoT Attack »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

PhishX

PhishX

PhishX is a SaaS platform for security awareness that simulates Cyberthreats, train people, while measure and analysis results, reducing Cybersecurity risks for People and Companies.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.

Taktika

Taktika

Taktika stands at the forefront of cybersecurity defense, offering cutting-edge integration and managed Security Operations Center (SOC) services.