ISIS Social Media Ops Are Declining

The war against the Islamic State seems to have hit a turning point, both on the battlefield and on social media. A new report from West Point’s Combating Terrorism Center (CTC) shows that official ISIL propaganda on social media is dwindling.

The CTC analyzed more than 9,000 ISIL messages with images and videos shared online in an 18-month period beginning January 2015. It found a steady decline in the production of visual media messages since August 2015, when the terror group pushed out 700 such posts in a single month. By contrast, ISIL released only 200 posts with images a year later in August.

The report attributed a marked reduction in certain propaganda themes to struggles within the group. More than half of the messages coded for the report were images or clips depicting daily life in the caliphate, often as organized and peaceful, presumably to further its goal of luring sympathizers to Iraq and Syria. For instance, it has shared photos of ice cream factories or infrastructure projects.

By contrast, the CTC found that the number of media releases focused on ISIL’s governance, for instance, images of ISIL soldiers distributing food and money, fixing roads, or issuing punishments for civilian crimes—dropped over the 18-month period, while the frequency of military-themed messages remained steady. Daniel Milton, the center’s director and author of the report, read this as a sign that ISIL was “struggling to maintain the outward appearance of a functioning state.”

ISIL’s most attention-grabbing images and videos, those that featured gruesome beheadings or executions and include an actual dead body in the frame, have been surprisingly rare. Fewer than 10% of the messages fell under this category, according to the report. The volume of these posts remained steady, but the characters within them changed. In 2014, most broadcasted executions were of anti-ISIL fighters, including prisoners. In January 2016, the number of “spies” caught in ISIL territory and killed in media releases began to outpace that of enemy soldiers.

Either way, ISIL has kept its messengers relatable. “They may be Iraqi and Syrian locals speaking in Arabic or recently arrived foreigners from abroad,” Milton explained. “Regardless of the individual, it seems that the group has decided that its message will be better received if those conveying it look more like the intended target audience.” This approach has lent its campaign “an aura of inclusiveness and breadth” lacking in propaganda from Al-Qaeda, ISIL’s predecessor. That group’s online media typically featured long-winded speeches by terrorist leaders.

The decrease in the volume of messages may be a sign that ISIL has less to brag about, according to Milton and other ISIL experts. There may also be less time for propaganda when ISIL is under physical attack.

Pushback by social media companies has contributed to the decline. This summer, Twitter announced it had suspended 360,000 terror-inciting accounts between mid-2015 and August 2016. Daily suspensions were up 80%, mostly thanks to new proprietary spam-fighting tools, the company said.

Both Twitter and Facebook say they have proactively blocked accounts connected to Islamic State terrorists, rather than wait for other users to report them. Last year, in response to such efforts, ISIL moved some of its propaganda to platforms like Whatsapp and Telegram, which offer more protection from outside surveillance.

When Telegram announced last September it had created private channels that would allow followers to broadcast to groups of followers, ISIL quickly set up shop on the app, the researchers note. Telegram reportedly became the communication tool of choice for organizers of the Paris attacks in November 2015.

J.M. Berger, a fellow with George Washington University’s Program on Extremism who focuses on social media, noted a significant decline in the group’s tweeting activity, partially due to Twitter’s efforts to suspend accounts.

Google is also in this fight. It’s think tank Jigsaw began testing a “redirecting method” that inserts anti-propaganda ads in Google search results for 1,700 keywords related to the Islamic State. The impact of that program remains unclear (paywall).
Even if its propaganda has declined, ISIL’s message is sure to live on, Milton said, especially in the minds of impressionable children: “The psychological effects of the group’s control over what people read, watched, and heard will likely outlast its physical control of the territory.”

DefenseOne:

 

« Decrypting the Dark Web
US Has A Strategy To Defend Against Another Massive IoT Attack »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

Beachhead Solutions

Beachhead Solutions

Beachhead's SimplySecure is a configurable, web-based management tool allowing you to remotely secure vulnerable mobile devices in your organization.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

AuthMind

AuthMind

Prevent your next identity-related cyberattack with the AuthMind Identity SecOps Platform. It works anywhere and deploys in minutes.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Intelidata Techedge Pvt. Ltd.

Intelidata Techedge Pvt. Ltd.

Intelidata are a Global Cyber Security Consultancy and Services firm that helps companies drive growth by minimizing risk and maximizing potential.

tmc3

tmc3

tmc3 is an award-winning, people-centric consultancy that is transforming cyber security from an overhead into an organisational enabler.

Inception Cyber

Inception Cyber

Inception Cyber, the inventors of intent-based security, is leading the next generation of threat prevention for an increasingly AI-driven world.