SlideShare una empresa de Scribd logo
1 de 5
How ISIS Games Twitter
The militant group that conquered northern Iraq is deploying a
sophisticated social-media strategy.
J.M. BERGERJUN 16 2014, 2:00 PM ET
Pete Simon/Flickr
The advance of an army used to be marked by war drums. Now it’s
marked by volleys of tweets.
The Islamic State of Iraq and Syria (ISIS), the Sunni militant group that
seized Iraq’s second-largest city last week and is now pledging to take
Baghdad, has honed this new technique—most recently posting photos
on Twitter of an alleged mass killing of Iraqi soldiers. But what’s often
overlooked in press coverage is that ISIS doesn’t just have strong,
organic support online. It also employs social-media strategies that
inflate and control its message. Extremists of all stripes are increasingly
using social media to recruit, radicalize and raise funds, and ISIS is one
of the most adept practitioners of this approach.
One of ISIS's more successful ventures is an Arabic-language Twitter app
called The Dawn of Glad Tidings, or just Dawn. The app, an official ISIS
product promoted by its top users, is advertised as a way to keep up on
the latest news about the jihadi group.
Hundreds of users have signed up for the app on the web or on their
Android phones through the Google Play store. When you download the
app, ISIS asks for a fair amount of personal data:
J.M. Berger
Once you sign up, the app will post tweets to your account—the content
of which is decided by someone in ISIS’s social-media operation. The
tweets include links, hashtags, and images, and the same content is also
tweeted by the accounts of everyone else who has signed up for the app,
spaced out to avoid triggering Twitter’s spam-detection algorithms. Your
Twitter account functions normally the rest of the time, allowing you to
go about your business.
Tweets Sent by ISIS's Social-Media App Over a 2-
Hour Period
J.M. Berger
The app first went into wide use in April 2014, but its posting activity has
ramped up during the group’s latest offensive, reaching an all-time high
of almost 40,000 tweets in one day as ISIS marched into the northern
Iraqi city of Mosul last week. On Sunday, as the media reported on the
group’s advance toward Baghdad, hundreds of Dawn app users began
sending thousands of tweets featuring an image of an armed jihadist
gazing at the ISIS flag flying over the city, with the text, “We are coming,
Baghdad” (see below).
The volume of these tweets was enough to make any search for
“Baghdad” on Twitter generate the image among its first results, which is
certainly one means of intimidating the city’s residents.
J.M. Berger
The app is just one way ISIS games Twitter to magnify its message.
Another is the use of organized hashtag campaigns, in which the group
enlists hundreds and sometimes thousands of activists to repetitively
tweet hashtags at certain times of day so that they trend on the social
network. This approach also skews the results of a popular Arabic
Twitter account called @ActiveHashtags that tweets each day’s top
trending tags. When ISIS gets its hashtag into the @ActiveHashtags
stream, it results in an average of 72 retweets per tweet, which only
makes the hashtag trend more. As it gains traction, more users are
exposed to ISIS’s messaging. The group’s supporters also run accounts
similar to @ActiveHashtags that exclusively feature jihadi content and
can produce hundreds of retweets per tweet.
ISIS uses hashtags to focus-group messaging and branding concepts.
As a result of these strategies, and others, ISIS is able to project strength
and promote engagement online. For instance, the ISIS hashtag
consistently outperforms that of the group’s main competitor in Syria,
Jabhat al-Nusra, even though the two groups have a similar number of
supporters online. In data I analyzed in February, ISIS often registered
more than 10,000 mentions of its hashtag per day, while the number of
al-Nusra mentions generally ranged between 2,500 and 5,000.
ISIS also uses hashtags to focus-group messaging and branding
concepts, much like a Western corporation might. Earlier this year, ISIS
hinted, without being specific, that it was planning to change the name of
its organization. Activists then carefully promoted a hashtag crafted to
look like a grassroots initiative, demanding that ISIS leader Abu Bakr al-
Baghdadi declare not an Islamic state in Syria and Iraq, but the rebirth of
an Islamic caliphate. The question of when and how to declare a new
caliphate is highly controversial in jihadi circles, and the hashtag
produced a great deal of angry and divisive discussion, which ISIS very
likely tracked and measured. It never announced a name change.
Media attention has focused, not unreasonably, on ISIS’s use of social
media to spread pictures of graphic violence, attract new fighters, and
incite lone wolves. But it’s important to recognize that these activities are
supported by sophisticated online machinery. ISIS does have legitimate
support online—but less than it might seem. And it owes a lot of that
support to a calculated campaign that would put American social-media-
marketing gurus to shame.
http://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-
strategy/372856/

Más contenido relacionado

Destacado

Ig je game engines y1 assignment brief
Ig je game engines y1 assignment briefIg je game engines y1 assignment brief
Ig je game engines y1 assignment brief
PaulinaKucharska
 
Michelin dyk-9-eco driving-eng
Michelin dyk-9-eco driving-engMichelin dyk-9-eco driving-eng
Michelin dyk-9-eco driving-eng
adrien_ide
 

Destacado (12)

Scape prospectus
Scape prospectusScape prospectus
Scape prospectus
 
Jauniešu centru iespējas piesaistīt finansējumu
Jauniešu centru iespējas piesaistīt finansējumuJauniešu centru iespējas piesaistīt finansējumu
Jauniešu centru iespējas piesaistīt finansējumu
 
Ig je game engines y1 assignment brief
Ig je game engines y1 assignment briefIg je game engines y1 assignment brief
Ig je game engines y1 assignment brief
 
LEGO LotR review
LEGO LotR reviewLEGO LotR review
LEGO LotR review
 
Παρουσιαση αθλήματος επιτραπέζιας αντισφαίρισης
Παρουσιαση αθλήματος επιτραπέζιας αντισφαίρισηςΠαρουσιαση αθλήματος επιτραπέζιας αντισφαίρισης
Παρουσιαση αθλήματος επιτραπέζιας αντισφαίρισης
 
Character profile ppt
Character profile pptCharacter profile ppt
Character profile ppt
 
Michelin dyk-9-eco driving-eng
Michelin dyk-9-eco driving-engMichelin dyk-9-eco driving-eng
Michelin dyk-9-eco driving-eng
 
Online marketing
Online marketingOnline marketing
Online marketing
 
Representation of age
Representation of ageRepresentation of age
Representation of age
 
Αγιασμός στο σχολείο
Αγιασμός στο σχολείοΑγιασμός στο σχολείο
Αγιασμός στο σχολείο
 
Gedigte by AM Niemann
Gedigte by AM NiemannGedigte by AM Niemann
Gedigte by AM Niemann
 
dba_lounge_Iasi: Everybody likes redis
dba_lounge_Iasi: Everybody likes redisdba_lounge_Iasi: Everybody likes redis
dba_lounge_Iasi: Everybody likes redis
 

Similar a How ISIS games twitter

Galliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social mediaGalliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social media
Austin Schiano
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
budbarber38650
 
The Islamic State - Revolutionizing the Historical Precedent of Terrorism
The Islamic State - Revolutionizing the Historical Precedent of TerrorismThe Islamic State - Revolutionizing the Historical Precedent of Terrorism
The Islamic State - Revolutionizing the Historical Precedent of Terrorism
Ashley Smith
 
Islamic StateDavid JonesAmerican Military Un.docx
Islamic StateDavid JonesAmerican Military Un.docxIslamic StateDavid JonesAmerican Military Un.docx
Islamic StateDavid JonesAmerican Military Un.docx
christiandean12115
 
Katherine Neal_Case Study 2
Katherine Neal_Case Study 2Katherine Neal_Case Study 2
Katherine Neal_Case Study 2
Kate Neal
 

Similar a How ISIS games twitter (16)

Jour3300pres
Jour3300presJour3300pres
Jour3300pres
 
Islamic State Activity in Libya
Islamic State Activity in LibyaIslamic State Activity in Libya
Islamic State Activity in Libya
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
Galliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social mediaGalliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social media
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
 
Demi-PDF
Demi-PDFDemi-PDF
Demi-PDF
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
 
The Islamic State - Revolutionizing the Historical Precedent of Terrorism
The Islamic State - Revolutionizing the Historical Precedent of TerrorismThe Islamic State - Revolutionizing the Historical Precedent of Terrorism
The Islamic State - Revolutionizing the Historical Precedent of Terrorism
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Islamic State of Iraq and Syria.docx
Islamic State of Iraq and Syria.docxIslamic State of Iraq and Syria.docx
Islamic State of Iraq and Syria.docx
 
Islamic StateDavid JonesAmerican Military Un.docx
Islamic StateDavid JonesAmerican Military Un.docxIslamic StateDavid JonesAmerican Military Un.docx
Islamic StateDavid JonesAmerican Military Un.docx
 
ISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERRORISIS-THE TRAIL OF TERROR
ISIS-THE TRAIL OF TERROR
 
ISIS
ISISISIS
ISIS
 
Social Media By MD Azmir Fakir
Social Media By MD Azmir FakirSocial Media By MD Azmir Fakir
Social Media By MD Azmir Fakir
 
Katherine Neal_Case Study 2
Katherine Neal_Case Study 2Katherine Neal_Case Study 2
Katherine Neal_Case Study 2
 
Terrorism and business
Terrorism and businessTerrorism and business
Terrorism and business
 

Más de CHSGmedia (20)

Final feedback and exam prep
Final feedback and exam prepFinal feedback and exam prep
Final feedback and exam prep
 
Revision tip #6
Revision tip #6Revision tip #6
Revision tip #6
 
Revision tip #5
Revision tip #5Revision tip #5
Revision tip #5
 
Revision tip #4
Revision tip #4Revision tip #4
Revision tip #4
 
Section b planning sheet
Section b planning sheetSection b planning sheet
Section b planning sheet
 
planning section B
planning section Bplanning section B
planning section B
 
Theory grid
Theory gridTheory grid
Theory grid
 
Revision tip #3
Revision tip #3Revision tip #3
Revision tip #3
 
Planning sheet section a q2 & 3
Planning sheet section a q2 & 3Planning sheet section a q2 & 3
Planning sheet section a q2 & 3
 
Section a q1 planning sheet
Section a q1 planning sheetSection a q1 planning sheet
Section a q1 planning sheet
 
Revision tip #2
Revision tip #2Revision tip #2
Revision tip #2
 
Grade a exemplar answer
Grade a exemplar answerGrade a exemplar answer
Grade a exemplar answer
 
AQA June 2010
AQA June 2010AQA June 2010
AQA June 2010
 
A grade war answer and mark scheme q1
A grade war answer and mark scheme q1A grade war answer and mark scheme q1
A grade war answer and mark scheme q1
 
Section a exam tips from aqa
Section a exam tips from aqaSection a exam tips from aqa
Section a exam tips from aqa
 
Revision tip #1
Revision tip #1Revision tip #1
Revision tip #1
 
Revise theory
Revise theoryRevise theory
Revise theory
 
New and digital technology – social media case
New and digital technology – social media caseNew and digital technology – social media case
New and digital technology – social media case
 
Intro to new and digital media 2017
Intro to new and digital media 2017Intro to new and digital media 2017
Intro to new and digital media 2017
 
Marginalised identity case study
Marginalised identity case studyMarginalised identity case study
Marginalised identity case study
 

Último

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 

Último (20)

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 

How ISIS games twitter

  • 1. How ISIS Games Twitter The militant group that conquered northern Iraq is deploying a sophisticated social-media strategy. J.M. BERGERJUN 16 2014, 2:00 PM ET Pete Simon/Flickr The advance of an army used to be marked by war drums. Now it’s marked by volleys of tweets. The Islamic State of Iraq and Syria (ISIS), the Sunni militant group that seized Iraq’s second-largest city last week and is now pledging to take Baghdad, has honed this new technique—most recently posting photos on Twitter of an alleged mass killing of Iraqi soldiers. But what’s often overlooked in press coverage is that ISIS doesn’t just have strong, organic support online. It also employs social-media strategies that inflate and control its message. Extremists of all stripes are increasingly using social media to recruit, radicalize and raise funds, and ISIS is one of the most adept practitioners of this approach. One of ISIS's more successful ventures is an Arabic-language Twitter app called The Dawn of Glad Tidings, or just Dawn. The app, an official ISIS
  • 2. product promoted by its top users, is advertised as a way to keep up on the latest news about the jihadi group. Hundreds of users have signed up for the app on the web or on their Android phones through the Google Play store. When you download the app, ISIS asks for a fair amount of personal data: J.M. Berger Once you sign up, the app will post tweets to your account—the content of which is decided by someone in ISIS’s social-media operation. The tweets include links, hashtags, and images, and the same content is also tweeted by the accounts of everyone else who has signed up for the app, spaced out to avoid triggering Twitter’s spam-detection algorithms. Your Twitter account functions normally the rest of the time, allowing you to go about your business. Tweets Sent by ISIS's Social-Media App Over a 2- Hour Period
  • 3. J.M. Berger The app first went into wide use in April 2014, but its posting activity has ramped up during the group’s latest offensive, reaching an all-time high of almost 40,000 tweets in one day as ISIS marched into the northern Iraqi city of Mosul last week. On Sunday, as the media reported on the group’s advance toward Baghdad, hundreds of Dawn app users began sending thousands of tweets featuring an image of an armed jihadist gazing at the ISIS flag flying over the city, with the text, “We are coming, Baghdad” (see below). The volume of these tweets was enough to make any search for “Baghdad” on Twitter generate the image among its first results, which is certainly one means of intimidating the city’s residents.
  • 4. J.M. Berger The app is just one way ISIS games Twitter to magnify its message. Another is the use of organized hashtag campaigns, in which the group enlists hundreds and sometimes thousands of activists to repetitively tweet hashtags at certain times of day so that they trend on the social network. This approach also skews the results of a popular Arabic Twitter account called @ActiveHashtags that tweets each day’s top trending tags. When ISIS gets its hashtag into the @ActiveHashtags stream, it results in an average of 72 retweets per tweet, which only makes the hashtag trend more. As it gains traction, more users are exposed to ISIS’s messaging. The group’s supporters also run accounts similar to @ActiveHashtags that exclusively feature jihadi content and can produce hundreds of retweets per tweet. ISIS uses hashtags to focus-group messaging and branding concepts.
  • 5. As a result of these strategies, and others, ISIS is able to project strength and promote engagement online. For instance, the ISIS hashtag consistently outperforms that of the group’s main competitor in Syria, Jabhat al-Nusra, even though the two groups have a similar number of supporters online. In data I analyzed in February, ISIS often registered more than 10,000 mentions of its hashtag per day, while the number of al-Nusra mentions generally ranged between 2,500 and 5,000. ISIS also uses hashtags to focus-group messaging and branding concepts, much like a Western corporation might. Earlier this year, ISIS hinted, without being specific, that it was planning to change the name of its organization. Activists then carefully promoted a hashtag crafted to look like a grassroots initiative, demanding that ISIS leader Abu Bakr al- Baghdadi declare not an Islamic state in Syria and Iraq, but the rebirth of an Islamic caliphate. The question of when and how to declare a new caliphate is highly controversial in jihadi circles, and the hashtag produced a great deal of angry and divisive discussion, which ISIS very likely tracked and measured. It never announced a name change. Media attention has focused, not unreasonably, on ISIS’s use of social media to spread pictures of graphic violence, attract new fighters, and incite lone wolves. But it’s important to recognize that these activities are supported by sophisticated online machinery. ISIS does have legitimate support online—but less than it might seem. And it owes a lot of that support to a calculated campaign that would put American social-media- marketing gurus to shame. http://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media- strategy/372856/