SlideShare a Scribd company logo
1 of 21
N A T H A N S T E P H E N S O N
Tweets of Terrorists
ISIS Summary
ISIS: Islamic State of Iraq and Syria
Al Qaeda splinter group of Sunni militants
 Seeks to bring Muslim-inhabited areas under its political
control
Platforms
Active across Instagram, Twitter, and Facebook
Used to incite support and spread their message
From the Horse’s Mouth
Shapes their image directly through social media
We receive a lot of content directly from ISIS, as
opposed to through the lens of a journalist
They are creating a brand for themselves
Content
Post pictures and videos of captured Iraqi soldiers,
beheadings, mass executions
Also, cat pics
Online Forums
Traditionally, terrorist groups used online forums to
disseminate information, communicate, and garner
support.
ISIS officials could easily control debate on these
forums by deleting certain posts and suspend
potentially troublesome users
Platforms Cont.
Twitter is more difficult to control, but provides
more ubiquitous message
Thousands of individual fighters have personal
Twitter, Facebook, and Instagram accounts
Despite large number of accounts, the campaign is
very deliberate and very coordinated
One of the ways the coordinate this campaign is
through an app called the Dawn of Glad Tidings
Dawn of Glad Tidings App
AKA “Dawn”
Official ISIS product promoted by the organization’s
top users
Advertised as a way to keep on latest news about the
group
Hundreds of users have signed up for the app
Dawn Cont.
First used in April 2014
Once signed up, the app posts tweets on behalf of
your account
Content is decided by individuals in ISIS’s social-
media operation
Tweets of links, pictures, and hashtags are posted by
everyone who has signed up for the app
Sometimes produces as many as 40,000 tweets per
day
Dawn App Cont.
Tweets made by the Dawn app are spread out to
avoid triggering Twitter’s spam-detection algorithms
Dawn App Cont.
Used to spread below image
Volume of tweets caused any search for “Baghdad” to
generate the image among its first results
Done to promote intimidating image
Intimidation
Various reports say that when ISIS invaded Iraq,
Iraqi police forces abandoned their uniforms,
dropped their weapons, and fled
The invasion was met with little resistence
Reportedly, partially due to the intimidating brand
ISIS has created and spread for itself through social
media
Organized Hashtag Campaigns
ISIS periodically enlists thousands of activists to
repetitively tweet hashtags at certain times of day so
that the hashtags trend
Skews results of Arabic Twitter account
@ActiveHashtags
@ActiveHashtags
Tweets the day’s top trending tags
Various accounts that do the same thing
Once ISIS hashtags make it into the streams, it can
result in hundreds of retweets per tweet
Recruit Support
ISIS uses social media campaign to recruit support
Increasing number of foreign fighters seeking to join
ISIS
Current reports estimate that thousands of foreign
fighters (including approximately 100 Americans)
are currently involved in ISIS conflict in Syria
Narrowcasting
One of the ways ISIS achieves this is through
narrowcasting
They develop specific content for various purposes
In one video, the leader of ISIS vocalizes a message
targeted specifically at children; he calls for “the
youths around the globe” to join his cause
Another video features a Canadian turned ISIS
fighter attempting to appeal to Westerners
Online Support
Certain groups with no official ties to ISIS have taken
it upon themselves to further enhance online
presence
Translate and repost ISIS content in various
langauges
Adapt content posted by ISIS to better target
Westerners
Reaction from Twitter
Twitter periodically suspends ISIS accounts, but
more accounts continue to open
New accounts are quickly created and regain
thousands of followers in a matter of hours
Conclusion
ISIS uses social media to develop a brand for
themselves, spread their message, intimidate their
enemies, and recruit support
Coordinated, effective utilization of social media is
an integral part of their organization
References
https://news.vice.com/article/isis-fighters-and-their-
friends-are-total-social-media-pros
https://news.vice.com/article/jihad-selfies-these-
british-extremists-in-syria-love-social-media
http://www.theatlantic.com/international/archive/2014
/06/isis-iraq-twitter-social-media-strategy/372856/
http://www.theguardian.com/world/2014/jun/23/who-
behind-isis-propaganda-operation-iraq

More Related Content

Viewers also liked

Bully Breeds - Myths & Facts
Bully Breeds - Myths & FactsBully Breeds - Myths & Facts
Bully Breeds - Myths & FactsNathan Stephenson
 
REZULTATE PRODUSELOR JEUNESSE
REZULTATE PRODUSELOR JEUNESSEREZULTATE PRODUSELOR JEUNESSE
REZULTATE PRODUSELOR JEUNESSEJEUNESSE
 
Foto slide jeunesse
Foto slide jeunesseFoto slide jeunesse
Foto slide jeunesseJEUNESSE
 
Physical methods of disinfection
Physical methods of disinfectionPhysical methods of disinfection
Physical methods of disinfectionpaul3060
 
Sliding mechanics
Sliding mechanics   Sliding mechanics
Sliding mechanics paul3060
 
Microbiology an evolving science 3rd edition
Microbiology an evolving science 3rd editionMicrobiology an evolving science 3rd edition
Microbiology an evolving science 3rd editionJimmy Liang
 

Viewers also liked (8)

Tough Puppy Plan
Tough Puppy PlanTough Puppy Plan
Tough Puppy Plan
 
Bully Breeds - Myths & Facts
Bully Breeds - Myths & FactsBully Breeds - Myths & Facts
Bully Breeds - Myths & Facts
 
REZULTATE PRODUSELOR JEUNESSE
REZULTATE PRODUSELOR JEUNESSEREZULTATE PRODUSELOR JEUNESSE
REZULTATE PRODUSELOR JEUNESSE
 
Foto slide jeunesse
Foto slide jeunesseFoto slide jeunesse
Foto slide jeunesse
 
Association and causation
Association and causationAssociation and causation
Association and causation
 
Physical methods of disinfection
Physical methods of disinfectionPhysical methods of disinfection
Physical methods of disinfection
 
Sliding mechanics
Sliding mechanics   Sliding mechanics
Sliding mechanics
 
Microbiology an evolving science 3rd edition
Microbiology an evolving science 3rd editionMicrobiology an evolving science 3rd edition
Microbiology an evolving science 3rd edition
 

Similar to Jour3300pres

How ISIS games twitter
How ISIS games twitterHow ISIS games twitter
How ISIS games twitterCHSGmedia
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxbudbarber38650
 
Galliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social mediaGalliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social mediaAustin Schiano
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaCOMRADES project
 
PSC 497---THESIS PAPER
PSC 497---THESIS PAPERPSC 497---THESIS PAPER
PSC 497---THESIS PAPERNash Jones
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
Facebook and Twitter for Nonprofits
Facebook and Twitter for NonprofitsFacebook and Twitter for Nonprofits
Facebook and Twitter for NonprofitsGood Works
 
Isis What is ISIS It was first formed as Al Qaeda in .docx
Isis What is ISIS It was first formed as Al Qaeda in .docxIsis What is ISIS It was first formed as Al Qaeda in .docx
Isis What is ISIS It was first formed as Al Qaeda in .docxchristiandean12115
 
Social media marketing
Social media marketingSocial media marketing
Social media marketingravi sindhu
 
Social Media
Social MediaSocial Media
Social MediaIvychad
 
Socialmediaforukinsurance
SocialmediaforukinsuranceSocialmediaforukinsurance
Socialmediaforukinsurancemelaniachj
 
Social Media For Uk Insurance
Social Media For Uk InsuranceSocial Media For Uk Insurance
Social Media For Uk InsuranceMarkmuir
 
Internet's Impact on Terrorism
Internet's Impact on TerrorismInternet's Impact on Terrorism
Internet's Impact on TerrorismKevin Daly
 
Miami University_P2P_Submission
Miami University_P2P_SubmissionMiami University_P2P_Submission
Miami University_P2P_SubmissionKristen Koch
 
Disability Rights and Social Media
Disability Rights and Social MediaDisability Rights and Social Media
Disability Rights and Social MediaMarsha Lanier
 

Similar to Jour3300pres (20)

How ISIS games twitter
How ISIS games twitterHow ISIS games twitter
How ISIS games twitter
 
567 bruce
567 bruce567 bruce
567 bruce
 
Global TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docxGlobal TerrorismGVPT 406AbstractSocial M.docx
Global TerrorismGVPT 406AbstractSocial M.docx
 
Galliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social mediaGalliotti Policy Reccomendation ISIS and social media
Galliotti Policy Reccomendation ISIS and social media
 
ISIS and Cyber Terrorism
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber Terrorism
 
Nonprofits Social Media
Nonprofits Social MediaNonprofits Social Media
Nonprofits Social Media
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
 
Demi-PDF
Demi-PDFDemi-PDF
Demi-PDF
 
PSC 497---THESIS PAPER
PSC 497---THESIS PAPERPSC 497---THESIS PAPER
PSC 497---THESIS PAPER
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Facebook and Twitter for Nonprofits
Facebook and Twitter for NonprofitsFacebook and Twitter for Nonprofits
Facebook and Twitter for Nonprofits
 
Isis What is ISIS It was first formed as Al Qaeda in .docx
Isis What is ISIS It was first formed as Al Qaeda in .docxIsis What is ISIS It was first formed as Al Qaeda in .docx
Isis What is ISIS It was first formed as Al Qaeda in .docx
 
Social media marketing
Social media marketingSocial media marketing
Social media marketing
 
Social Media
Social MediaSocial Media
Social Media
 
Socialmediaforukinsurance
SocialmediaforukinsuranceSocialmediaforukinsurance
Socialmediaforukinsurance
 
Social Media For Uk Insurance
Social Media For Uk InsuranceSocial Media For Uk Insurance
Social Media For Uk Insurance
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
Internet's Impact on Terrorism
Internet's Impact on TerrorismInternet's Impact on Terrorism
Internet's Impact on Terrorism
 
Miami University_P2P_Submission
Miami University_P2P_SubmissionMiami University_P2P_Submission
Miami University_P2P_Submission
 
Disability Rights and Social Media
Disability Rights and Social MediaDisability Rights and Social Media
Disability Rights and Social Media
 

Jour3300pres

  • 1. N A T H A N S T E P H E N S O N Tweets of Terrorists
  • 2. ISIS Summary ISIS: Islamic State of Iraq and Syria Al Qaeda splinter group of Sunni militants  Seeks to bring Muslim-inhabited areas under its political control
  • 3. Platforms Active across Instagram, Twitter, and Facebook Used to incite support and spread their message
  • 4. From the Horse’s Mouth Shapes their image directly through social media We receive a lot of content directly from ISIS, as opposed to through the lens of a journalist They are creating a brand for themselves
  • 5. Content Post pictures and videos of captured Iraqi soldiers, beheadings, mass executions
  • 7. Online Forums Traditionally, terrorist groups used online forums to disseminate information, communicate, and garner support. ISIS officials could easily control debate on these forums by deleting certain posts and suspend potentially troublesome users
  • 8. Platforms Cont. Twitter is more difficult to control, but provides more ubiquitous message Thousands of individual fighters have personal Twitter, Facebook, and Instagram accounts Despite large number of accounts, the campaign is very deliberate and very coordinated One of the ways the coordinate this campaign is through an app called the Dawn of Glad Tidings
  • 9. Dawn of Glad Tidings App AKA “Dawn” Official ISIS product promoted by the organization’s top users Advertised as a way to keep on latest news about the group Hundreds of users have signed up for the app
  • 10. Dawn Cont. First used in April 2014 Once signed up, the app posts tweets on behalf of your account Content is decided by individuals in ISIS’s social- media operation Tweets of links, pictures, and hashtags are posted by everyone who has signed up for the app Sometimes produces as many as 40,000 tweets per day
  • 11. Dawn App Cont. Tweets made by the Dawn app are spread out to avoid triggering Twitter’s spam-detection algorithms
  • 12. Dawn App Cont. Used to spread below image Volume of tweets caused any search for “Baghdad” to generate the image among its first results Done to promote intimidating image
  • 13. Intimidation Various reports say that when ISIS invaded Iraq, Iraqi police forces abandoned their uniforms, dropped their weapons, and fled The invasion was met with little resistence Reportedly, partially due to the intimidating brand ISIS has created and spread for itself through social media
  • 14. Organized Hashtag Campaigns ISIS periodically enlists thousands of activists to repetitively tweet hashtags at certain times of day so that the hashtags trend Skews results of Arabic Twitter account @ActiveHashtags
  • 15. @ActiveHashtags Tweets the day’s top trending tags Various accounts that do the same thing Once ISIS hashtags make it into the streams, it can result in hundreds of retweets per tweet
  • 16. Recruit Support ISIS uses social media campaign to recruit support Increasing number of foreign fighters seeking to join ISIS Current reports estimate that thousands of foreign fighters (including approximately 100 Americans) are currently involved in ISIS conflict in Syria
  • 17. Narrowcasting One of the ways ISIS achieves this is through narrowcasting They develop specific content for various purposes In one video, the leader of ISIS vocalizes a message targeted specifically at children; he calls for “the youths around the globe” to join his cause Another video features a Canadian turned ISIS fighter attempting to appeal to Westerners
  • 18. Online Support Certain groups with no official ties to ISIS have taken it upon themselves to further enhance online presence Translate and repost ISIS content in various langauges Adapt content posted by ISIS to better target Westerners
  • 19. Reaction from Twitter Twitter periodically suspends ISIS accounts, but more accounts continue to open New accounts are quickly created and regain thousands of followers in a matter of hours
  • 20. Conclusion ISIS uses social media to develop a brand for themselves, spread their message, intimidate their enemies, and recruit support Coordinated, effective utilization of social media is an integral part of their organization