Islamic State Propaganda Is Persistent

Official propaganda from the Islamic State (IS) dwindled during 2020 after disruption from Western coalition forces, but informal supporter networks continue to spread its message far and wide, Europol has warned. Many pieces of Islamic State propaganda, was crafted not just to inspire potential recruits but also to boost the organisation’s reputation and to reinforce perceptions of the Islamic State as ruthless.

All terrorist groups seek to cultivate this kind of image because their power derives from their ability to inspire dread out of proportion to the threats they actually pose. But the Islamic State has been singularly successful at that task, thanks to its mastery of modern digital tools, which have transformed the dark arts of making and disseminating propaganda. 

Europol’s latest  report analyses the key trends of last year, highlighting the persistence of terrorist content across multiple online channels. Focusing on the Islamic State and al-Qaeda as well as their offshoots, the report addresses the trajectories of these groups and how they have responded to shifting dynamics and attempted to overcome setbacks. “Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns. The production and dissemination of propaganda content is integral to these efforts,” explained Europol executive director, Catherine De Bolle.

“Driven by digital innovation, these groups do not refrain from exploiting the latest technologies to broadcast their message to intended audiences.”

IS’s official propaganda capabilities remained muted in 2020 after significant losses of infrastructure and personnel, with video releases becoming increasingly rare, the report says. However, “committed IS supporters and their networks” are stepping in to spread the group’s messages and advance operational activity both online and off. IS-supporting media outlets have expanded their digital output and offered assistance to these supporters on how to use private online channels to stay hidden.

“IS-aligned media outlets that specialise in cyber security, privacy, and encrypted communications remained committed to their mission of providing online security awareness to IS supporters,” according to Europol.

Campaigns from media outlets have also helped to inspire Supporter-Generated Content (SGC) productions across encrypted platforms like Telegram. These, in turn, help to direct and inspire lone actor attacks in the EU and elsewhere, the report noted. Now, Efforts are being focused on staging an IS revival in Iraq and Syria, publicising its military gains in Africa and spreading the message that freeing IS prisoners around the world is a priority.

Europol:      Brookings:      Wired:    Infosecurity Magazine:     Oodaloop:    ISDGlobal:        ISDGlobal:

You Might Also Read: 

The Taliban's Mastery Of  Information Warfare:

 

« British Military Aim To Reduce Their Attack Surface
Big Data & Cloud Computing - Concurrent Technologies Of The Digital Revolution »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Satisnet

Satisnet

Satisnet is a leading Security Reseller, Managed Security Services Provider (MSSP) and Cyber Training Innovator, with operations throughout the UK, EMEA and United States.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

Entreda

Entreda

Entreda offers a unified platform to automate cybersecurity and compliance policy enforcement for your devices, users, networks, applications.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Cyber Risk Institute (CRI)

Cyber Risk Institute (CRI)

CRI is a not-for-profit coalition of financial institutions and trade associations working to protect the global economy by enhancing cybersecurity and resiliency through standardization.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.