Islamic State's Social Media Strategy

The Islamic State militant group (IS) is fighting on many fronts against those seeking to defeat it. One of those fronts is a digital one.

IS puts media warfare on a par with its battle on the ground and often glorifies "media martyrs" - people who are killed while creating videos and other digital content for the group. 

Like many other such groups, IS has been an enthusiastic user of social media and the web, broadcasting propaganda about its successes and using it as a recruitment tool.

Although a long-time user of social media, IS activities took a significant turn in September 2015 when the group's official media outlets took to the messaging app Telegram. The move to the encrypted messaging service came after a long-running conflict with Twitter, which regularly shut down IS accounts, and some experimentation with less well-known platforms from which it was also expelled.

The timing was significant because that was the moment when Telegram set up the "channel" feature, letting users broadcast to an unlimited number of other users - a tool that many online jihadists were quick to exploit.

The move to Telegram did not go unnoticed and IS went underground in August 2016 after its official accounts were repeatedly suspended.

But IS media operatives set up lots of separate channels that simply repeated or mirrored what appeared on the official channel.

These channels simultaneously stream material produced by IS's central media operation, including its self-styled news agency Amaq, and are described as being dedicated to distributing official IS news.

The mirror channels, called the Nashir News Agency, have also regularly been suspended.

To circumvent this, their administrators use a stealthy approach in which they set up a user or channel and allow it to build up a substantial following before suddenly switching it to the easily recognisable IS mirror brand.

The channels continuously promote new join-up links for their proliferating replica versions, calling on IS supporters to distribute them further. 

Some channels, whose promotion on popular social media platforms is prohibited, are designed to maintain a lower profile to avoid suspension.

This enables them to attract a significant number of followers but the channels are usually removed before this exceeds 1,000. Such numbers suffice to get IS's message out for distribution by online supporters. 

Prominent pro-IS figures reliably stream the group's propaganda alongside other content. But IS's strong media branding renders the group's material easily recognisable among other fare.

Telegram does not allow comprehensive searches of public content, which means that the number of pro-jihad users cannot be accurately gauged.

In mid-April, the Nashir agency published a poster congratulating itself on setting up 100 mirror accounts, and there are now said to be more than 130.

This was shortly followed by a campaign to celebrate 12 months of Nashir agency's operation. As part of the campaign, the outlet called for admirers and readers to send in articles and images praising its work, which they did in large numbers. 

These promotional campaigns appeared to be an effort to buoy morale among IS supporters who enjoy relative freedom to post material on Telegram. Telegram has advertised its daily efforts to take down pro-IS channels since December last year.

In another recent move, Nashir agency has switched from just being a mouthpiece for IS to urging its followers on Telegram to spread content via Twitter and Facebook. 

It has advertised its own accounts on those platforms, which have repeatedly been suspended. It has also launched accounts on Instagram and set up English-language feeds for the first time. 

The outlet now posts IS material in Arabic and English translation via its main feeds, the latest step of an initiative to post in English that began after the Westminster attack on 22 March.

These moves by Nashir agency to expand its reach have followed criticism by IS supporters on Telegram that pro-IS channels were preaching to the converted and should step up their efforts on other platforms. 

IS has sought to cultivate the commitment of virtual foot-soldiers by highlighting their importance in its war.

Charlie Winter of the International Centre for the Study of Radicalisation and Political Violence (ICSR) acknowledges the success IS has had with Telegram.

He says the messaging service's action against pro-IS channels "seems to be very haphazard".

Home Secretary Amber Rudd has also named Telegram among tech firms she wants to be tougher on pro-jihad users.

Mr Winter adds that IS's efforts to expose unsuspecting audiences to its propaganda on other, more popular platforms now meet with much less success. 

IS might regularly post content specifically designed for Twitter, but this attempt at "amplification" no longer goes well, he says.

The group is still most successful on Telegram but its reliance on it could come at a cost, as supporters flock to the app instead of pushing the IS message to audiences elsewhere.

BBC

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

US And UK Agree To Take On Islamic State In Cyberspace:

ISIS Just Can’t Resist Social Media:

 

 

 

« Uber In Legal Fight With Google
Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Templar Executives

Templar Executives

Templar Executives is a leading, expert and dynamic Cyber Security company trusted by Governments and multi-national organisations to deliver business transformation.

Secucloud

Secucloud

Secucloud GmbH is a provider of high-availability cyber-security solutions, offering a cloud-based security-as-a-service platform, particularly for providers.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Kennedys

Kennedys

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.