Islamic State's Social Media Strategy

The Islamic State militant group (IS) is fighting on many fronts against those seeking to defeat it. One of those fronts is a digital one.

IS puts media warfare on a par with its battle on the ground and often glorifies "media martyrs" - people who are killed while creating videos and other digital content for the group. 

Like many other such groups, IS has been an enthusiastic user of social media and the web, broadcasting propaganda about its successes and using it as a recruitment tool.

Although a long-time user of social media, IS activities took a significant turn in September 2015 when the group's official media outlets took to the messaging app Telegram. The move to the encrypted messaging service came after a long-running conflict with Twitter, which regularly shut down IS accounts, and some experimentation with less well-known platforms from which it was also expelled.

The timing was significant because that was the moment when Telegram set up the "channel" feature, letting users broadcast to an unlimited number of other users - a tool that many online jihadists were quick to exploit.

The move to Telegram did not go unnoticed and IS went underground in August 2016 after its official accounts were repeatedly suspended.

But IS media operatives set up lots of separate channels that simply repeated or mirrored what appeared on the official channel.

These channels simultaneously stream material produced by IS's central media operation, including its self-styled news agency Amaq, and are described as being dedicated to distributing official IS news.

The mirror channels, called the Nashir News Agency, have also regularly been suspended.

To circumvent this, their administrators use a stealthy approach in which they set up a user or channel and allow it to build up a substantial following before suddenly switching it to the easily recognisable IS mirror brand.

The channels continuously promote new join-up links for their proliferating replica versions, calling on IS supporters to distribute them further. 

Some channels, whose promotion on popular social media platforms is prohibited, are designed to maintain a lower profile to avoid suspension.

This enables them to attract a significant number of followers but the channels are usually removed before this exceeds 1,000. Such numbers suffice to get IS's message out for distribution by online supporters. 

Prominent pro-IS figures reliably stream the group's propaganda alongside other content. But IS's strong media branding renders the group's material easily recognisable among other fare.

Telegram does not allow comprehensive searches of public content, which means that the number of pro-jihad users cannot be accurately gauged.

In mid-April, the Nashir agency published a poster congratulating itself on setting up 100 mirror accounts, and there are now said to be more than 130.

This was shortly followed by a campaign to celebrate 12 months of Nashir agency's operation. As part of the campaign, the outlet called for admirers and readers to send in articles and images praising its work, which they did in large numbers. 

These promotional campaigns appeared to be an effort to buoy morale among IS supporters who enjoy relative freedom to post material on Telegram. Telegram has advertised its daily efforts to take down pro-IS channels since December last year.

In another recent move, Nashir agency has switched from just being a mouthpiece for IS to urging its followers on Telegram to spread content via Twitter and Facebook. 

It has advertised its own accounts on those platforms, which have repeatedly been suspended. It has also launched accounts on Instagram and set up English-language feeds for the first time. 

The outlet now posts IS material in Arabic and English translation via its main feeds, the latest step of an initiative to post in English that began after the Westminster attack on 22 March.

These moves by Nashir agency to expand its reach have followed criticism by IS supporters on Telegram that pro-IS channels were preaching to the converted and should step up their efforts on other platforms. 

IS has sought to cultivate the commitment of virtual foot-soldiers by highlighting their importance in its war.

Charlie Winter of the International Centre for the Study of Radicalisation and Political Violence (ICSR) acknowledges the success IS has had with Telegram.

He says the messaging service's action against pro-IS channels "seems to be very haphazard".

Home Secretary Amber Rudd has also named Telegram among tech firms she wants to be tougher on pro-jihad users.

Mr Winter adds that IS's efforts to expose unsuspecting audiences to its propaganda on other, more popular platforms now meet with much less success. 

IS might regularly post content specifically designed for Twitter, but this attempt at "amplification" no longer goes well, he says.

The group is still most successful on Telegram but its reliance on it could come at a cost, as supporters flock to the app instead of pushing the IS message to audiences elsewhere.

BBC

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

US And UK Agree To Take On Islamic State In Cyberspace:

ISIS Just Can’t Resist Social Media:

 

 

 

« Uber In Legal Fight With Google
Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

Siepel

Siepel

Siepel manufactures high quality shielded rooms and anechoic chambers dedicated to TEMPEST, NEMP & HIRF.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.