Thursday, January 4, 2024

ISIS And Manipulation of Cyberspace for Terrorism (Part Two)

By Grace Mubashir, New Age Islam 4 January 2024 The Sudden Emergence of ISIS In Syria and Mass Appeal Among Muslims Across the World Showed the Danger of Online Terrorism. ISIS Proponents Were Able to Spread and Recruit People to Their Cause Using Cyberspace. The Migration of Educated Young To Fight The ‘Caliphate’ Highlighted The Importance Of Online Surveillance Of Cyberspace To Filter Terror Content. In India, 23 Youths Who Migrated to Yemen to Fight ISIS Were Also Radicalised Through Online Interactions. Main Points: 1. Jihadist organizations employ diverse channels to disseminate their narratives, with a particular focus on cyberspace 2. Social networking services have become the primary tool for terrorist groups, serving as a means for recruitment, target selection, and the dissemination of propaganda, including interconnected stories in support of their narrative, recruitment efforts, and fundraising 3. ISIS's media organization has invested considerable effort in producing diverse propaganda products with varying themes 4. it is imperative to emphasize that extremist movements or organizations pose not only potential risks to public order but also have a profound impact on individuals, significantly affecting the lives of their victims ------ ISIS used cyberspace effectively to spread their ideology through a process called ‘lone wolf theory’. Their manipulation of cyberspace brought into significance the importance of controlling cyberspace from becoming a haven for terrorist organisations. This article explains the exploitation of cyberspace by ISIS for their nefarious activities. Jihadist organizations employ diverse channels to disseminate their narratives, with a particular focus on cyberspace, which they perceive as a crucial tool for technological advancement and a battleground against the Western world. Notably, Islamist terrorist groups like Al-Qaeda and ISIS extensively utilize online platforms such as jihadi forums, Social Networking Services (SNS) like Facebook and Instagram, private websites and blogs, and even Internet gaming. ISIS, for instance, maintains well-protected jihadi forums like Shumukh al-Islam and al-Minbar, featuring hidden forums discussing software to conceal tracks and encrypt messages. These platforms also share information gathered from U.S. and other national sources, including counterterrorism efforts, malware details, firearms and explosives manuals, and actions against online jihadis. Advanced weaponry discussions and guidance on avoiding surveillance are also present. Social Networking Services like Facebook and Twitter were initially popular, but due to increased efforts by these platforms to remove terrorist propaganda, there is a decreasing trend in their usage. Despite this, some jihadist groups, like the Islamic Emirate of Afghanistan supporting al-Qaida, maintain Twitter accounts. Given the stricter supervision, many jihadists have shifted to encrypted platforms like Telegram, where they establish official channels for indoctrination through messages, videos, and audio clips. Furthermore, jihadist groups often operate personal webpages or blogs using open-source platforms like WordPress or FileFlyer. These serve as both security measures in case certain forums are compromised and backups for propaganda, ensuring continued dissemination across various mediums. Social Media Tools And ISIS Social networking services have become the primary tool for terrorist groups, serving as a means for recruitment, target selection, and the dissemination of propaganda, including interconnected stories in support of their narrative, recruitment efforts, and fundraising. This trend is particularly prominent in the case of ISIS in Syria and Iraq. A substantial portion of ISIS activities revolves around online propaganda, showcasing a highly organized and strategic approach to social media weaponization. Analysing their strategy, overarching narrative, strategic information objectives, target audiences, and utilization of social network media reveals a meticulously planned and professionally executed social media information campaign, akin to contemporary cross-media marketing or political public relations campaigns. Since June 2014, ISIS has conducted an exceptionally aggressive online recruitment and incitement campaign, utilizing social media to an unprecedented extent in the history of terrorist groups. The group has effectively converted popular social media technologies into tools for building and reinforcing support, even among individuals who have not physically been inside the so-called "caliphate." Strategically, ISIS employs social media to capture mass media and strategic audiences' attention, control and amplify its messaging in support of its narrative, recruit and radicalize followers, deter opponents, and raise funds. The group demonstrates a sophisticated understanding of presenting a unified vision (the Caliphate) and a common purpose. They effectively leverage user experience and visual mediums, such as infographics, to emotionally engage their followers and strategic audiences. Simultaneously, they disrupt opponents' narratives and online activities by exploiting messaging, positioning themselves among other jihadist factions in the Middle East. The strategy emphasizes "Force Multiplication" through social media to project a more potent image than reality. This involves creating a substantial online presence for visibility with strategic audiences, gaining mass media attention, and creating the illusion of a large following. "Disseminators" play a crucial role, spreading ISIS tweets and postings to their followers, creating social proof and potentially attracting more genuine followers. The use of carefully crafted hashtags and "astro-turfing" techniques adds credibility to their narrative, borrowing from political campaigning strategies. ISIS also employs "test-balloons" to track and gather feedback on potential ideas, terms, and graphics, resembling both target audience analysis and product pre-testing in support of their campaign. From a strategic narrative perspective, the creation of a Caliphate, marking a return to the original version of Islam with the introduction of Sharia law, is central to ISIS. The group presents Muslims as besieged globally due to perceived laxity, advocating for the restoration of a caliphate as a religious duty. Despite a centralized narrative, ISIS utilizes diverse voices and apparent contradictions in messaging, incorporating deterring images alongside seemingly humanitarian actions like delivering food and displaying affection for kittens. Analysing the narrative and associated messaging reveals that ISIS's social media campaign aims to set the international media agenda, control the narrative, counter opposing propaganda, position themselves in contrast to other jihadist factions, connect supporters in online networks, recruit new members, intimidate, and deter opponents, demonstrate capacity and command and control, and raise funds. The strategic audiences for ISIS include sympathizers and supporters, potential recruits, potential donors, international media, local audiences in conflict zones, and the wider international community, including Muslim scholars. Upon analysing the narrative and associated messaging, it becomes evident that ISIS's social media campaign pursues several strategic objectives: 1. Setting the international media agenda: Gaining attention and visibility for their messages. 2. Controlling the narrative: Shaping the perception of their cause. 3. Countering propaganda: Responding to Western, Shia Muslim, and regime narratives against ISIS. 4. Positioning themselves: Presenting as more powerful than they may be in reality. 5. Connecting supporters: Building and maintaining online support networks. 6. Recruiting new members: Especially targeting disenfranchised youth in the West. 7. Intimidating and deterring opponents: Including Iraqi/Syrian soldiers, civilians, and rival jihadist factions. 8. Demonstrating capacity and command and control: Projecting a sense of organizational strength. 9. Raising funds: Utilizing social media for financial support. Equally Important, ISIS Identifies At Least Six Strategic Audiences: 1. Sympathizers and supporters: To gain and maintain backing. 2. Potential recruits: Particularly disenfranchised youth in the West for mobilization and recruitment to jihadist theatres. 3. Potential donors: Seeking financial support for their activities. 4. International media: Aiming to gain attention and shape media coverage. 5. Local audiences in conflict zones and ISIS zones: Including Iraqi soldiers, civilians, and other rival jihadist factions. 6. Wider international community: Including Muslim scholars for broader influence and recognition. ISIS’s Media Organs ISIS's media organization has invested considerable effort in producing diverse propaganda products with varying themes. The Diwan (high governmental body) of Central Media has played a pivotal role by providing support and guidance to local media bureaus. To centralize the propaganda production and dissemination process, ISIS's Diwan of Central Media has implemented written guidance, an evaluation system for both bureaus and products and a real-time quality-control process, ensuring close interaction between the central body and local media bureaus. ISIS has established a comprehensive set of rules and processes governing propaganda production. This structured approach has fostered unity of purpose among the group's local media bureaus, enabling them to not only create individual products but also contribute to a cohesive narrative portraying ISIS as a large and well-functioning caliphate. ISIS and its supporters utilize various online platforms to disseminate their ideology, including: 1. Jihadi forums such as Shumukh al-Islam and al-Minbar in Arabic, as well as pro-ISIS forums in other languages like Ansar al-Jihad fi Italia. 2. Social Networking Services (SNS) like Google+, Facebook, Twitter, Instagram, and YouTube. 3. Telegram, an encrypted messaging software. 4. Sharing sites like archive.org. 5. The dark web. Prominent Media Related to ISIS Include: • Al-Furqan: Established in 2006, it initially belonged to AQ in Iraq but shifted allegiance to ISIS in 2013, becoming the official media outlet for ISIS' leadership. • Al-Hayat Media Center: Established in mid-2014, it targets non-Arabic speakers, adheres to mainstream media standards, and produces material in various languages such as German, English, and French. Notably, it published digital magazines like Dabiq, Konstantiniyye, and Dar al-Islam, which seem to be discontinued. • Ajnad: Specializing in Nasheeds and audio content, Ajnad Media publishes religious hymns in Arabic and Western languages, mobilizing ISIS members for jihad. • Al-Bayan: A radio network providing coverage in Arabic, English, French, and other languages, reporting on ISIS activities in different arenas. • Al-Naba Weekly: ISIS' official weekly in Arabic, still active, covering the group's activities and providing religious justifications for its operations. • Amaq News Agency: Appearing in 2014, Amaq issues claims of responsibility for ISIS operations worldwide. While its official role was endorsed by ISIS in July 2017, its place in the group's media hierarchy remains somewhat opaque. • Al-Nour: An unofficial media outlet of ISIS, producing audiovisual and written propaganda material for French speakers. • Furat: Another unofficial media outlet of ISIS, producing audiovisual and written propaganda material in Russian and English languages. Silber & Bhat, authors of the 2007 NYPD jihadist report, describe the Internet, with its numerous extremist websites and chat rooms, as a virtual incubator. Many extremists initiate their radicalization while researching or browsing the cyber world. Assaf Moghadam, in "Nexus of Global Jihad," emphasizes the Internet's role in contemporary terrorist cooperation, particularly through social media platforms like Facebook and Twitter. These platforms enhance individual actors' ability to support terrorism, contributing to radicalization. Facebook dominates social media in the Middle East, with 164 million active monthly users. Arab youth rely on Facebook and Twitter for news, with 49% getting daily news from Facebook. YouTube remains a media powerhouse, witnessing a 160% increase in channels in the Middle East over the past three years. The Internet has amplified the importance of informal networks, facilitating cooperation among terrorist actors. Recruiters use social media to outsource recruitment, reaching broader audiences. Social media influencers, like Ahmad Musa Jibril and Musa Cerantonio, provide spiritual support and bridge language gaps, connecting official accounts with non-Arabic speakers in Western countries. Various Internet platforms, including forums, social media, private websites, blogs, and online gaming, facilitate terrorist cooperation. Conventional forums, like jihadi forums and chat rooms, persist alongside unconventional platforms. Facebook and Twitter serve jihadists for sharing operational information, attracting recruits, propaganda dissemination, and intelligence gathering on potential targets and attack schedules. The internet has played a crucial role in enhancing informal networks and increasing the number of terrorist actors involved in cooperation. It enables rapid and cost-effective connections between terrorist actors across various locations. Recruiters use social media to outsource recruitment, reaching a broader audience and streamlining the formation of geographically dispersed cells. Jytte Klausen highlights how social media facilitates recruitment outsourcing to hubs of militants outside war zones, expanding organizational reach. Moghadam's study emphasizes the online influence of jihadi spiritual authorities, such as Ahmad Musa Jibril and Musa Cerantonio, who use platforms like Twitter to provide spiritual support, disseminating jihadi material to followers. These "disseminators" serve as a bridge between official accounts in Arabic and non-Arabic speakers in Western countries. Regarding internet platforms for terrorist cooperation, conventional forums like jihadi forums and chat rooms, alongside unconventional platforms such as social media, private websites, blogs, and internet gaming, play a significant role. Despite a shift towards unconventional forums, conventional ones remain important, with five to fifteen jihadi forums active at any given time, according to Thomas Hegghammer. Chat rooms are widely used for radicalization and cooperation between terrorist actors, as seen in reports of Finnish foreign fighters joining Al-Qaeda affiliates in Syria after engaging in chat room conversations. Facebook is a prominently used platform by jihadists, serving four main purposes: sharing operational manuals and tactics, attracting potential recruits, acting as a propaganda outlet, and gathering intelligence on potential targets and attack schedules. Twitter is another favoured social networking site for jihadists due to its simple user interface and immediate public sharing function, utilized by various jihadist groups, including Al-Qaeda affiliates, the Islamic State, and Boko Haram, to disseminate propaganda and communicate with like-minded individuals and groups. What It Realized Through Presence in Cyberspace Terrorist organizations such as Al-Qaeda and ISIS consider media, especially social media networks, crucial for various purposes like psychological warfare, indoctrination, recruitment, and funding. Despite significant territorial losses, ISIS has utilized platforms like Telegram and Google+ to disseminate propaganda and promote lone-wolf attacks in the West, framing them as revenge for perceived attacks on Muslim civilians and assistance to the Islamic Caliphate. In a message dated August 2018, ISIS leader Abu Bakr al-Baghdadi acknowledged the group's territorial setbacks, urging unity among its members. He endorsed lone-wolf attacks in the West, advocating for simple methods like shootings, stabbings, or bombings, including driving into crowds. Similarly, ISIS has weaponized social media, emphasizing themes like maintaining unity among jihadists, portraying apostate Muslim leaders as betrayers of Islam, labelling the United States as the primary enemy of Islam, claiming U.S. weakening, and asserting that the United States is stealing Muslim oil. • importance of keeping unity among jihadists; • claim that “apostate Muslim leaders are betraying Islam”; • United States as the primary enemy of Islam; • claim that “the United States is weakening”; • claim that “the United States is stealing Muslim oil”. Impact On the Targeted Audience Analysing historical, political, and cultural aspects of right-wing extremism reveals commonalities in terms of target audience, conduits, and messages. Treating the impact of their similar narratives collectively underscores a fundamental dynamic. The current socio-political context, marked by immigration, stagnation, cultural, social, and economic crises, along with the fear of terrorism, forms a backdrop that unites European countries in various patterns and degrees. The extreme right has strategically capitalized on this sensitive historical period, not merely relying on nostalgia but effectively exploiting the social shock of globalization and its ensuing instability. The approach involves addressing the need for security and responding to both old and new social fears with strong and radical (clearly defined) identities. It's noteworthy that the extreme right leverages current media, discourse, and network opportunities, utilizing offline activities, new technologies (web and social media), transnationalism, and modernized ideology, rhetoric, and methods as strategic tools. This serves their purposes of self-presentation, campaigning, recruitment, communal identity building, audience engagement, and mobilization. To maximize their social reach and appeal, the extreme right targets both male and female individuals, regardless of educational background. They attract a broad demographic, including young (high-school/university-age) to middle-aged individuals from both advantaged and disadvantaged social segments. This encompasses socially and politically active individuals, drawing from both old right-wing extremist circles and the new conservative spectrum. Unveiling a common logic or leitmotif, the extremist message offers a simplified and universal solution to the ongoing transition, upholding the easier and more attractive path of rejection against the harder and unknown transformation. Recognizing this, the real challenge lies in making the latter even more seductive. • Self-presentation; • Campaigning; • Recruitment; • Communal Identity building; • Engagement of the audience; • Mobilisation. Conclusion In conclusion, it is imperative to emphasize that extremist movements or organizations pose not only potential risks to public order but also have a profound impact on individuals, significantly affecting the lives of their victims. A thorough understanding of this impact and its consequences can inform the development of future policies. Alongside victimization and the implications for the democratic legal system, careful consideration should be given to the association of illegality with extremist actions, as these two aspects have often been closely intertwined. Part One of the Article: Islamic Terrorism In Cyberspace: Changing Frontiers Of Global Muslim Terrorism ----- A regular columnist for NewAgeIslam.com, Mubashir V.P is a PhD scholar in Islamic Studies at Jamia Millia Islamia and freelance journalist. URL: https://newageislam.com/islam-terrorism-jihad/isis-cyberspace-terrorism-part-two/d/131451 New Age Islam, Islam Online, Islamic Website, African Muslim News, Arab World News, South Asia News, Indian Muslim News, World Muslim News, Women in Islam, Islamic Feminism, Arab Women, Women In Arab, Islamophobia in America, Muslim Women in West, Islam Women and Feminism

No comments:

Post a Comment