Islamic State Propaganda Is Persistent

Official propaganda from the Islamic State (IS) dwindled during 2020 after disruption from Western coalition forces, but informal supporter networks continue to spread its message far and wide, Europol has warned. Many pieces of Islamic State propaganda, was crafted not just to inspire potential recruits but also to boost the organisation’s reputation and to reinforce perceptions of the Islamic State as ruthless.

All terrorist groups seek to cultivate this kind of image because their power derives from their ability to inspire dread out of proportion to the threats they actually pose. But the Islamic State has been singularly successful at that task, thanks to its mastery of modern digital tools, which have transformed the dark arts of making and disseminating propaganda. 

Europol’s latest  report analyses the key trends of last year, highlighting the persistence of terrorist content across multiple online channels. Focusing on the Islamic State and al-Qaeda as well as their offshoots, the report addresses the trajectories of these groups and how they have responded to shifting dynamics and attempted to overcome setbacks. “Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns. The production and dissemination of propaganda content is integral to these efforts,” explained Europol executive director, Catherine De Bolle.

“Driven by digital innovation, these groups do not refrain from exploiting the latest technologies to broadcast their message to intended audiences.”

IS’s official propaganda capabilities remained muted in 2020 after significant losses of infrastructure and personnel, with video releases becoming increasingly rare, the report says. However, “committed IS supporters and their networks” are stepping in to spread the group’s messages and advance operational activity both online and off. IS-supporting media outlets have expanded their digital output and offered assistance to these supporters on how to use private online channels to stay hidden.

“IS-aligned media outlets that specialise in cyber security, privacy, and encrypted communications remained committed to their mission of providing online security awareness to IS supporters,” according to Europol.

Campaigns from media outlets have also helped to inspire Supporter-Generated Content (SGC) productions across encrypted platforms like Telegram. These, in turn, help to direct and inspire lone actor attacks in the EU and elsewhere, the report noted. Now, Efforts are being focused on staging an IS revival in Iraq and Syria, publicising its military gains in Africa and spreading the message that freeing IS prisoners around the world is a priority.

Europol:      Brookings:      Wired:    Infosecurity Magazine:     Oodaloop:    ISDGlobal:        ISDGlobal:

You Might Also Read: 

The Taliban's Mastery Of  Information Warfare:

 

« British Military Aim To Reduce Their Attack Surface
Big Data & Cloud Computing - Concurrent Technologies Of The Digital Revolution »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

INCIBE-CERT

INCIBE-CERT

INCIBE-CERT is the reference security incident response center for citizens and private law entities in Spain

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

Relyance AI

Relyance AI

Relyance AI - One unified platform for privacy, security, & governance.

Upwind Security

Upwind Security

Upwind delivers comprehensive cloud security, precisely when and where it’s most critical.