Islamic State's Social Media Strategy

The Islamic State militant group (IS) is fighting on many fronts against those seeking to defeat it. One of those fronts is a digital one.

IS puts media warfare on a par with its battle on the ground and often glorifies "media martyrs" - people who are killed while creating videos and other digital content for the group. 

Like many other such groups, IS has been an enthusiastic user of social media and the web, broadcasting propaganda about its successes and using it as a recruitment tool.

Although a long-time user of social media, IS activities took a significant turn in September 2015 when the group's official media outlets took to the messaging app Telegram. The move to the encrypted messaging service came after a long-running conflict with Twitter, which regularly shut down IS accounts, and some experimentation with less well-known platforms from which it was also expelled.

The timing was significant because that was the moment when Telegram set up the "channel" feature, letting users broadcast to an unlimited number of other users - a tool that many online jihadists were quick to exploit.

The move to Telegram did not go unnoticed and IS went underground in August 2016 after its official accounts were repeatedly suspended.

But IS media operatives set up lots of separate channels that simply repeated or mirrored what appeared on the official channel.

These channels simultaneously stream material produced by IS's central media operation, including its self-styled news agency Amaq, and are described as being dedicated to distributing official IS news.

The mirror channels, called the Nashir News Agency, have also regularly been suspended.

To circumvent this, their administrators use a stealthy approach in which they set up a user or channel and allow it to build up a substantial following before suddenly switching it to the easily recognisable IS mirror brand.

The channels continuously promote new join-up links for their proliferating replica versions, calling on IS supporters to distribute them further. 

Some channels, whose promotion on popular social media platforms is prohibited, are designed to maintain a lower profile to avoid suspension.

This enables them to attract a significant number of followers but the channels are usually removed before this exceeds 1,000. Such numbers suffice to get IS's message out for distribution by online supporters. 

Prominent pro-IS figures reliably stream the group's propaganda alongside other content. But IS's strong media branding renders the group's material easily recognisable among other fare.

Telegram does not allow comprehensive searches of public content, which means that the number of pro-jihad users cannot be accurately gauged.

In mid-April, the Nashir agency published a poster congratulating itself on setting up 100 mirror accounts, and there are now said to be more than 130.

This was shortly followed by a campaign to celebrate 12 months of Nashir agency's operation. As part of the campaign, the outlet called for admirers and readers to send in articles and images praising its work, which they did in large numbers. 

These promotional campaigns appeared to be an effort to buoy morale among IS supporters who enjoy relative freedom to post material on Telegram. Telegram has advertised its daily efforts to take down pro-IS channels since December last year.

In another recent move, Nashir agency has switched from just being a mouthpiece for IS to urging its followers on Telegram to spread content via Twitter and Facebook. 

It has advertised its own accounts on those platforms, which have repeatedly been suspended. It has also launched accounts on Instagram and set up English-language feeds for the first time. 

The outlet now posts IS material in Arabic and English translation via its main feeds, the latest step of an initiative to post in English that began after the Westminster attack on 22 March.

These moves by Nashir agency to expand its reach have followed criticism by IS supporters on Telegram that pro-IS channels were preaching to the converted and should step up their efforts on other platforms. 

IS has sought to cultivate the commitment of virtual foot-soldiers by highlighting their importance in its war.

Charlie Winter of the International Centre for the Study of Radicalisation and Political Violence (ICSR) acknowledges the success IS has had with Telegram.

He says the messaging service's action against pro-IS channels "seems to be very haphazard".

Home Secretary Amber Rudd has also named Telegram among tech firms she wants to be tougher on pro-jihad users.

Mr Winter adds that IS's efforts to expose unsuspecting audiences to its propaganda on other, more popular platforms now meet with much less success. 

IS might regularly post content specifically designed for Twitter, but this attempt at "amplification" no longer goes well, he says.

The group is still most successful on Telegram but its reliance on it could come at a cost, as supporters flock to the app instead of pushing the IS message to audiences elsewhere.

BBC

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

US And UK Agree To Take On Islamic State In Cyberspace:

ISIS Just Can’t Resist Social Media:

 

 

 

« Uber In Legal Fight With Google
Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

EC-Council

EC-Council

EC-Council is a member-based organization that certifies individuals in various e-business and information security skills.

Integrity360

Integrity360

Integrity360 is a leading independent cyber security and payments compliance specialist providing dedicated experts for managed services, consulting services, penetration testing and incident response

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

HancomWITH

HancomWITH

Hancomwith is an information security company. We provide optimized blockchain solutions in areas including next-generation authentication, security and digital asset transaction.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.