Islamic State's Social Media Strategy

The Islamic State militant group (IS) is fighting on many fronts against those seeking to defeat it. One of those fronts is a digital one.

IS puts media warfare on a par with its battle on the ground and often glorifies "media martyrs" - people who are killed while creating videos and other digital content for the group. 

Like many other such groups, IS has been an enthusiastic user of social media and the web, broadcasting propaganda about its successes and using it as a recruitment tool.

Although a long-time user of social media, IS activities took a significant turn in September 2015 when the group's official media outlets took to the messaging app Telegram. The move to the encrypted messaging service came after a long-running conflict with Twitter, which regularly shut down IS accounts, and some experimentation with less well-known platforms from which it was also expelled.

The timing was significant because that was the moment when Telegram set up the "channel" feature, letting users broadcast to an unlimited number of other users - a tool that many online jihadists were quick to exploit.

The move to Telegram did not go unnoticed and IS went underground in August 2016 after its official accounts were repeatedly suspended.

But IS media operatives set up lots of separate channels that simply repeated or mirrored what appeared on the official channel.

These channels simultaneously stream material produced by IS's central media operation, including its self-styled news agency Amaq, and are described as being dedicated to distributing official IS news.

The mirror channels, called the Nashir News Agency, have also regularly been suspended.

To circumvent this, their administrators use a stealthy approach in which they set up a user or channel and allow it to build up a substantial following before suddenly switching it to the easily recognisable IS mirror brand.

The channels continuously promote new join-up links for their proliferating replica versions, calling on IS supporters to distribute them further. 

Some channels, whose promotion on popular social media platforms is prohibited, are designed to maintain a lower profile to avoid suspension.

This enables them to attract a significant number of followers but the channels are usually removed before this exceeds 1,000. Such numbers suffice to get IS's message out for distribution by online supporters. 

Prominent pro-IS figures reliably stream the group's propaganda alongside other content. But IS's strong media branding renders the group's material easily recognisable among other fare.

Telegram does not allow comprehensive searches of public content, which means that the number of pro-jihad users cannot be accurately gauged.

In mid-April, the Nashir agency published a poster congratulating itself on setting up 100 mirror accounts, and there are now said to be more than 130.

This was shortly followed by a campaign to celebrate 12 months of Nashir agency's operation. As part of the campaign, the outlet called for admirers and readers to send in articles and images praising its work, which they did in large numbers. 

These promotional campaigns appeared to be an effort to buoy morale among IS supporters who enjoy relative freedom to post material on Telegram. Telegram has advertised its daily efforts to take down pro-IS channels since December last year.

In another recent move, Nashir agency has switched from just being a mouthpiece for IS to urging its followers on Telegram to spread content via Twitter and Facebook. 

It has advertised its own accounts on those platforms, which have repeatedly been suspended. It has also launched accounts on Instagram and set up English-language feeds for the first time. 

The outlet now posts IS material in Arabic and English translation via its main feeds, the latest step of an initiative to post in English that began after the Westminster attack on 22 March.

These moves by Nashir agency to expand its reach have followed criticism by IS supporters on Telegram that pro-IS channels were preaching to the converted and should step up their efforts on other platforms. 

IS has sought to cultivate the commitment of virtual foot-soldiers by highlighting their importance in its war.

Charlie Winter of the International Centre for the Study of Radicalisation and Political Violence (ICSR) acknowledges the success IS has had with Telegram.

He says the messaging service's action against pro-IS channels "seems to be very haphazard".

Home Secretary Amber Rudd has also named Telegram among tech firms she wants to be tougher on pro-jihad users.

Mr Winter adds that IS's efforts to expose unsuspecting audiences to its propaganda on other, more popular platforms now meet with much less success. 

IS might regularly post content specifically designed for Twitter, but this attempt at "amplification" no longer goes well, he says.

The group is still most successful on Telegram but its reliance on it could come at a cost, as supporters flock to the app instead of pushing the IS message to audiences elsewhere.

BBC

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

US And UK Agree To Take On Islamic State In Cyberspace:

ISIS Just Can’t Resist Social Media:

 

 

 

« Uber In Legal Fight With Google
Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

CIRCL

CIRCL

CIRCL is the national Computer Incident Response Center of Luxembourg

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Cynamics

Cynamics

Cynamics is the only network monitoring solution built specifically for Smart City, Public Safety and Critical Infrastructure networks.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

Hong Kong Broadband Network (HKBN)

Hong Kong Broadband Network (HKBN)

HKBN are a leading integrated telecom and technology solutions provider that offers a comprehensive range of premier ICT services to both the enterprise and residential markets.

Ultra Electronics

Ultra Electronics

Ultra specialises in providing application-engineered bespoke solutions. We focus on mission critical and intelligent systems in the defence, security, critical detection & control markets.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.