Blast from the Past (2) Drone Strikes in Yemen and the Response on Twitter

The posting of SSI in early May was the direct response to a drone strike that had killed about 40 AQAP members on April 21, 2014.[1] Shortly afterwards, on April 24, 2014, jihadi-linked accounts on Twitter started posting pictures and names of the alleged slain AQAP fighters. By using the hash tag #شهداء_القصف_الأمريكي_باليمن all in all about 200 Tweets were issued from April 24 to April 27; all Tweets are in Arabic. The hash tag translated to “the martyrs of the American strike on Yemen.”

The distinctive feature of this Twitter network analysis is set on two key findings:

  1. a division between pro-ISIS and pro-AQ can be identified. The main underlining finding, however, is the common relation to the U.S. drone strikes in Yemen against AQAP, whereas most pro-ISIS media activists and followers nevertheless have high, if not higher, sympathies for AQAP. There is a shared opinion on AQAP and drone strikes, independent of the leaning of individual accounts towards ISIS or AQ Central.
  2. The hash tag referring to the drone strike was short-lived and quickly reached its peak when the majority of the martyrs had been announced on Twitter.

Four major hubs can be identified within this network on Twitter, with the respective accounts @_Glibeb, @AbuUsamh, @Adnan_Alawlaqi, and @al_khansaa2 as the most influential. These four major nodes are connected to each other by shared followers, who (re-) tweeted using the hash tag and by addressing accounts directly. Some of the interlinking accounts are further analyzed below.

retweet.png

The quick response to the drone strike and the short time span of interest on Twitter is unique

The biggest node in this network analysis is @Adnan_Alawlaqi, some of his followers are connected to the other three major nodes. By choosing “Alawlaqi”, the account claims a direct relationship to the Yemeni tribe and to the U.S.-Yemeni cleric Anwar al-Awlaqi who had been killed in a drone strike in 2011.

200.png

Figure 24 Networking about 200 Tweets relating to the U.S. drone strike in Yemen – the broader the arrow is in the graph, the more often the source mentions the addressed account

For the avatar of the account of @Adnan_Alawlaqi Osama bin Laden has been chosen, the background picture shows “the martyr: Abu ‘l-Ghayth al-Shabwani”, a Yemeni AQAP fighter killed in a drone strike. For his web interface Twitter account, he has chosen the cover of the book “Why I Chose al-Qa’ida” which has been written by Abu Mus’ab, an AQAP affiliate who claimed being a member of al-Awlaq tribe.[2] According to the book, Abu Mus’ab al-Awlaqi “was martyred in an American strike on Wadi Rafd in the Shabwa Province” in 2009. His full name is given as Muhammad ‘Umayr al-Kalawi al-‘Awlaqi. The foreword of the book has been written by AQAP chief Abu Basir (Nasir al-Wuhayshi), which evidently was finished shortly before the death of Abu Mus’ab. The about 80-page long book outlines in simple words and reasoning the motivation to have joined al-Qa’ida and serves as a guide to inspire and indoctrinate a non-Arabic audience. The English-language magazine Inspire has a regular section entitled “Why did I Choose Al Qaeda” where selected parts of the book are made available in English.[3]

The most mentioned users in this data-set highlights the impact and importance of the major nodes, with @Adnan_Alawlaqi ranging at the top. @Qaadayaalumaa1 has been omitted in this analysis, although rank 4, it is not connected to the above network analysis. Instead, it is an independent sub-network that uses the same hash tag and shares similar content.

Capture.JPG

@Adnan_Alawlaqi has a little over 4,000 followers and issued more than 2,000 Tweets as of May 12, 2014. The account is primarily affiliated with “the organization of al-Qa’ida on the Arab Peninsula” and pictures from within Yemen[4] and of drones[5] are frequently published. It seems to be following the strict AQ conduct and has little to none connection to any ISIS related material.

Another major node in the network is @abuUsamh, as seen on the bottom right. According to his online profile, this is the account of Abu Usama al-Abini. His profile further states his clear favor of ISIS, hoping that

“the Islamic State in Iraq and al-Sham will remain and expand, by the will of God, #the lion cubs of jihad (#شبل_الجهاد)[6] // my backup account is @abuusamh1.”[7]

He refers to the “soldiers of Yemen” (jund al-Yemen) and lists his YouTube channel “greebe1.”[8] His focus is also set on Yemen, but he approves and idealizes ISIS and their war in Syria as the future and considers them as an avant-garde that will soon arrive in Yemen as well. He has about 2,300 followers and issued 1,300 Tweets as of May 12, 2014.

@abuUsamh posted pictures of alleged victims of the April drone strike and provides further information. The name of the deceased seen here is given as “the Mujahid: Abu Tamim al-Qayfi (…) killed in the despicable American [missile] strike. Look at his smile!”[9]

@abuUsamh is connected to @Adnan_Alawlaqi by three accounts, two of which also interlink to @_Glibeb. @Jeefsharp and @911Fahd interlink these two major nodes.

@_Glibeb refers to Jilbib al-Shurruri and has about 2,500 followers and issued close to 9,000 Tweets as of May 12, 2014. He too has a greater leaning towards ISIS and re-tweets and disseminates videos published by ISIS’s media channel al-Furqan.[10] Like most other Twitter accounts linked to this hash tag, @_Glibeb posts pictures of male victims of the airstrike with the impression that they indeed had been AQAP members. He may be of Yemini origin and possibly related to some of the deceased by tribal relations.

The fourth most important node in this mini-network of approximately 200 Tweets is an account the reader of this work may already be acquainted with: @al_khansaa2.[11] This account in this network is only linked via the account @aboyahay88 to the main node of @Adnan_Alawlaqi. The main objective, as for the others, is to document the martyrs of the drone strike and provide affirmative comments on pictures of killed AQAP members. All pictures issued within this particular hash tag are male, some are flashing weapons, and others are a screen grab from a jihadi video. One of the pictures shared by @al_khansaa2 is a typical Yemeni dressed man flashing his janbiyya a specific type of dagger with a short curved blade that is worn on a belt. This is a sign of male hood and pride and very common on the streets in Yemen.

@aboyahay88, the account linking @al_khansaa2 to @Adnan_Alawlaqi also connects to two other nodes, @alabjani_21 and @Mooneer55. @aboyahay88, whose screen name is the sincere (الصديق) referring to Abu Bakr further states on his profile “We belong to God and to Him we shall return”, taken out of the Qur’an (2:156). This part of the Qur’an is often cited at funerals and generally expressed to sympathize with the deceased, emphasizing the conviction in the existence of the afterlife. Apart from this @aboyahay88 is a low-key and low profile node with only 438 followers and over 4,000 Tweets as of May 12, 2014. The majority of his shared pictures are Yemen related with some pictures apparently taken by a cell-phone, perhaps implying he has taken these himself. Other pictures are from ISIS accounts on Twitter. His Twitter account is linked to the open Facebook group al-Ta’ifa al-Mansura that has eleven members but no actions or shared material whatsoever. All eleven members are part of the jihadist cluster network and show related iconography.[12]

@alabjani_21 is one of the more prolific Twitter accounts in this network, although not the biggest node in this particular network analysis. He has over 9,000 followers and Tweeted close to 17,000 times as of May 12, 2014. The chosen avatar is Ayman al-Zawahiri with both of hands held up towards the viewer – in a praying fashion, although it is clearly a screenshot of one of al-Zawahiri’s sermons televised by as-Sahab. @Mooneer55 in turn only has 787 followers but Tweeted an impressive 11,700 times as of May 12, 2014. This account clearly aligns itself to ISIS with an avatar showing Abu ‘Umar al-Baghdadi and referencing “the book leading the right way” (kitab yahdi) and the “sword that assists” (sayf yansur), as detailed in the chapter The ‘Arab Spring’ as a Renaissance for AQ Affiliates in a Historical Perspective.

Of greater interest are the two accounts linking the three nodes of @Adnan_Alawlaqi, @_Glibeb, @abuUsamh, which are:

@JeefSharp: This account is also in clear association to ISIS, stating in his profile,

“I pledge allegiance to the amir al-mu’mineen Abu Bakr al-Baghdadi.”

He has a meager 185 followers and around 3,500 Tweets. The majority of these are retweets of ISIS related accounts and material, that is in parts also anti-Muslim Brotherhood, demanding action instead of passive protests.[13]

And @911Fahd: This account showcases the killed leader of the TTP, Hakim Allah Mehsud with an ISIS related avatar. He has a little over 1,000 followers and Tweeted an incredible 66,454 times as of May 12, 2014. The majority of his shared pictures are related to Iraq and ISIS but also include a picture of the Gaza-based Jund Allah and their leader Abu al-Nur al-Maqdisi – all of whom had been wiped out by their rival HAMAS in 2008.[14] Like the above account, @911Fahd mainly retweets and is interlinked to high profile users such as @al_khansaa2 or @Adnan_Alawlaqi.

[1] Erich Schmitt, U.S. Drones and Yemeni Forces Kill Qaeda-Linked Fighters, Officials Say, The New York Times, http://www.nytimes.com/2014/04/22/world/middleeast/us-drones-and-yemeni-forces-kill-qaeda-linked-fighters-officials-say.html?_r=1, April 21, 2014.

[2] Abu Mus’ab al-Awlaqi, Limadha akhtartu ‘l-Qa’ida?, al-Malahem, July 2010.

[3] For example, Inspire, al-Malahem, 10th edition, Spring 1434 / 2013, 34-35.

[4] “Crimes of the Yemeni army against the Sunni people in Shabwa”, https://twitter.com/Adnan_Alawlaqi/status/464782931891077120/photo/1, May 9, 2014.

[5] https://twitter.com/Adnan_Alawlaqi/status/465097992320462848/photo/1, May 10, 2014.

[6] The lion cups (shibl) of jihad  is a often used reference to the youngest among the Mujahidin or in general the upcoming generation; consisting of, like their fathers, of both fighting and preaching elements.

[7] https://twitter.com/abuUsamh, May 12, 2014.

[8] https://www.youtube.com/user/greebe1, May 12, 2014.

[9] https://twitter.com/abuUsamh/status/460184658357940224/photo/1, April 26, 2014.

[10] “Special report on the civil service work by the Islamic State in Aleppo before ISIS was betrayed; preparing: Flour and bread – health care – electricity – overall services”, https://twitter.com/_Glibeb/status/464708125233139712, May 9, 2014. Two links are set in the Tweet, the first leads to YouTube where a sequence of the video Services provided for by the State of the ISIS series Rasa’il min ard al-malahem, part 14, is shown: https://www.youtube.com/watch?v=-wqXh3xmq1A, published on December 30, 2013. The second link extends the civil aspect of ISIS by directing to a Facebook group, https://www.facebook.com/IslamicManagementforServices.

[11] See for example the chapter The Role of Social Media in Defining the Rules of Engagement for Jihadi Conflicts or Datasets of Jabhat al-Nusra on Twitter.

[12] https://m.facebook.com/groups/327559194025966?view=info, May 12, 2014.

[13] A retweet from @lion_isis, https://twitter.com/lion_isis/status/464968794004135937/photo/1, published May 10, 2014. Accessed May 12, 2014.

[14] Details are given in the following subchapter: Operationalization and internalization of theology – the Intersection of Online Guidelines by Abu Yahya and the impact in the Offline.

The Shift in Platform Exploitation Over Time

Session 1 of the Progressive Terrorism Studies Webinar Series. “The Persistent Online Presence: The Shift in Platform Exploitation Over Time”

How the Salafi-Jihadi movement has been able to exploit the internet to distribute their message has been a key concern of those seeking to challenge these narratives. The first webinar in the Progressive Terrorism Studies Webinar series provided a data-driven update on how the Arabic speaking core of the Salafi-Jihadi information ecosystem has continued to evolve. This is not a new phenomenon – nor restricted to the pop cultural and pseudo-scientific hype regarding al-Dawlat al-Islamiyya – rather, jihadists have been exploiting all means possible on the Internet for decades. 

This research comprises over 6.4 million Telegram updates collected in near real-time since June 2017. These updates were collected from channels and groups confirmed to be part of the Salafi-Jihadi movement, stemming from Jihadist exploitation of the internet for over a decade, but focused here on their operation on Telegram. From within this vast archive of material a collection of 4 million instances of URL sharing were recorded for analysis. 

The session emphasised the importance of robust design and data collection in the study of Salafi-Jihadi groups.  

The subject of study needs to be identified by someone able to:  

  • recognise the theological references and imagery,  
  • join online groups by passing the vetting conducted by the Salafi-Jihadi movement in Arabic. If a researcher cannot respond to Q&A in Arabic, it is a sure sign they cannot enter the core of the movement.      

Similarly, for analysis which examines change over time the data collection needs to occur in near real-time, as downloading weeks, months, or years after the event does not provide a credible dataset for analysis. This is because the attempted disruption from outside, internal purging of some groups, and the activity of bots, all combine to undermine confidence in time-series analysis of Telegram data collected using a retrospective approach.  

The large-scale analysis provides a strategic level overview of the way the Salafi-Jihadi movement has operated since Telegram became its primary platform for communicating with supporters and acting as a core platform for their media output – in combination with other platforms since Europol’s claim of they had removed IS from the internet in November 2019. By examining the URL they share, the analysis shows the breadth of the Salafi-Jihadi presence across platforms and provides an overview into whether there are detectable patterns in their use of different online services.  

A reduced version of the domain tool used in the time-series analysis shows the engagement profile of various domains in the study.   

The tool can be viewed here and more detail on the analysis can be found on github. 

The analysis showed:  

  • Some platforms experience persistent engagement profiles, while others experience sudden spikes in use, or short-term exploitation.  
  • Correlations between the use of different platforms could be used to develop a rapid alert system to locate material.  
  • Co-citation style network analysis can be used to detect clusters of platforms which are used collectively. This would allow clusters of platforms which are being exploited in a similar way to be supported or work collectively.  

The session built on 2019 the publication by Emily Winterbotham, Dr Ali Fisher and Dr Nico Prucha. This is the largest ever study of traffic between the online platforms that comprise the Jihadi information ecosystem. This study included 24 months of data from the core of the Salafi-Jihadi Telegram network and revealed the inner workings of their multiplatform communication paradigm. The paper demonstrated the different roles that platforms play within the multiplatform information ecosystem, including Telegram, Tamtam, and Matrix.  
 

A more progressive Terrorism Studies

This I have resolved on … to run when I can, to go when I cannot run, and to creep when I cannot go.

Pilgrim’s Progress – Part 2 Chapter 6.

The role of the Feeble-mind character in Bunyan’s religious allegory Pilgrim’s Progress is to highlight the importance of continuing to make progress towards an identified goal.

A more progressive approach to Terrorism Studies could focus on extending the depth at which the Salafi-Jihadi movement is understood. This would be based on robust data science and human expertise, a focus on the primary language of the Salafi-Jihadi movement – Arabic – and the extensive archive of theologically inspired thought which the movement has produced.

It is the archive of theology as expressed and interpreted by the core of the movement which provides the best predictor of the actions of the movement. In contrast, some researchers and commentators within the orthodoxy of Terrorism Studies claim to see artefacts of their western habitus in Salafi-Jihadi material – the focus on crime, rap music, and naïve notions of a Jihadi ‘Utopia’.    

Since the 1980s research has shown that the study of terrorism has struggled with availability, handling and analysis of data. Despite the length of time and frequent observations about the problems with data, rather than making progress, these problems within orthodox Terrorism Studies have remained. In addition, “the dispersed nature of much of the more rigorous, ‘critical’ and conceptually innovative research on ‘terrorism’” means that level of rigor in research is conducted outside the orthodoxy.

Over a decade ago Magnus Ranstrop highlighted the ongoing problem, which Alex Schmid and Berto Jongman originally identified back in 1988; that ‘there are probably few areas in the social science literature in which so much is written on the basis of so little research’. As a result, much of the writing in Terrorism Studies is “impressionistic, superficial, and at the same time often also pretentious, venturing far-reaching generalisations on the basis of episodal evidence”.

Rüdiger Lohlker recently recently continued this theme when he highlighted, the tendency for orthodox Terrorism Studies to contain “an empty fog of words without inner content”. Quoting German philosopher G. W. F. Hegel. The section quoted by Rüdiger Lohlker continues:

This sort of chatter, though lacking the idea of philosophy, gains for itself a kind of authority through its very prolixity and arrogance. Partly this is because it seems almost incredible that such a big shell should be without a kernel…

 G. W. F. Hegel

Such is the coagulation of mediocrity within a section of orthodox Terrorism Studies that unscientific, methodologically flawed and statistically unsound commentary is talked up as ‘data science’ and ‘groundbreaking research’, while the evidentiary basis goes unquestioned within the mainstream scholarship and peer review. Over the last decade – rather than being addressed – these issues have become systemic.

Making progress

As noted in the development of Critical Terrorism Studies, “it is not enough to simply point out what is lacking in current research; a clear and realistic alternative must be provided”. Sections of the orthodox Terrorism Studies, and offshoots in the CVE industry, have an opportunity to break from the contemporary stagnation and develop a strong data culture and emphasis on evidence-based research. A progressive approach to analyzing the complex, theologically driven, Salafi-Jihadi movement, will move away from the contemporary obsession with finding so-called ‘gaps’ in the largely superficial and stagnant orthodox literature.

Many of the criticisms highlighted at the start of CTS remain within sections of the orthodoxy. CTS itself – with a focus on Western policy and Western academia – has struggled to break free from the Western frames of reference, among other challenges. The framing of Terrorism, with 9/11 as a moment of temporal rupture, still dominates CTS. This inhibits the deeper understanding of the Salafi-Jihadi movement which maintains different temporal reference points to those which dominate CTS and traditional approaches to Terrorism Studies, both in relation to time in the physical world and in relation to this world (Dunya) as an abode through which a soul passes.

To address the superficial, orientalist and neocolonialist tendencies of the orthodoxy, and the temporal framing of CTS, a progressive movement within Terrorism Studies would probe the intended meaning of Salafi-Jihadi content in their understanding of the world, rather than in a Western-centric English language dominated habitus. Critique of the orthodox Terrorism Studies has highlighted “its poor methods and theories, its state centricity, its problem-solving orientation and its institutional and intellectual links to state security projects”. Many of these problems have also concerned scholars within terrorism studies “who have long acknowledged the deficiencies and limitations of current research”.

In addition, a progressive Terrorism Studies approach would uphold standards for the appropriate use of statistical data to produce a clear break from the systemic malaise in data handling which have existed within orthodox Terrorism Studies. With a strong data culture and robust research design, a dynamic approach to Terrorism Studies could utilise the changes in the technological environment for research. This is not dissimilar from the way Salafi-Jihadi groups have adapted to the opportunities which evolving technology has created.

The way the object of study, such as the groups who make up the Salafi-Jihadi movement, choose to operate has evolved:

  • The evolving concept of the electronic ribat. Since 2011, members of jihadist forums have issued media strategies that encourage the development of a media mujahideen. This encouragement has been accompanied by the release of guides to using social media platforms, which often include lists of recommended accounts to follow. 
  • By 2013, Jihadists had aggressively expanded their use of Twitter, in addition to Facebook and YouTube, especially since the outbreak of violence in Syria. This propagation effort by the “media mujahideen” was approved and sanctioned by movement leaders and contributed to the interconnected jihadist zeitgeist. 
  • Learning from each interaction on the electronic ribat, the media mujahidin rapidly developed to maintain a persistent presence based on the speed, agility, and resilience of the Swarmcast.
  • In this struggle for survival, the media mujahidin have benefited from collective approaches and emergent behaviors, these have allowed a decentralised network to thrive in the face of increasingly aggressive content removal.
  • The media mujahidin frequently use widely available software for media production – this software would also be easily accessible to researchers to provide a window into the production methods.

In addition the current technological environment provides many opportunities for research:

  • Servers are cheap and easy to access – for example if you use Amazon for shopping, then that is enough to access cloud computing through AWS.
  • Processing power and RAM are cheaper than they have ever been, allowing relatively complex calculations and data analysis to be produced rapidly.
  • Most modern personal laptops and desktops have hardware sufficient to run the analysis required for many data science projects which would extend current research into the use of the internet by Salafi Jihadi groups, or ‘extremist’ groups more broadly. Of note, most contemporary material published by salafi Jihadi groups is produced on the same widely available hardware / software (more on that in a later post).
  • While there are many commercially available and hugely powerful ‘data systems’ which integrate a range of data storage and analytical processes within a single platform, there are also many open source programs which can be used to conduct academic research. These open sources software options may not permit all the analysis to be conducted within one platform, requiring the researcher to use a range of approaches to achieve the desired analysis.   
  • There are many ‘how to’ guides for those aspiring to become better at using python, java, or any of the other popular coding languages. Similarly, resources are freely available which researchers can use to learn more about data science or using specific open source software more generally in their work, whether in the form of walkthroughs or articles packed with quick tips and tricks.

To build a stronger data culture will mean;

  • Acknowledging the problems with evidence and data which have to date beset orthodox Terrorism Studies, 
  • Reviewers and editors robustly enforcing actual standards for statistical analysis, for example,
    • if you are going to claim something such as a correlation or a long-term trend – it will need to be backed up by a statistical calculation using data acquired through a scientifically appropriate method.  
    • if the analysis is based on subjective ‘coding’ of data – is there an appropriate intercoder reliability score. If there is not, there is little reason for readers to be confident that the research presented would be repeatable, that coding remains unchanged over time, and that other researchers would apply the same coding definitions in the same way. Without intercoder reliability there is little reason to have confidence in the resulting ‘analysis’ rendering it largely unpublishable.  
  • Editors and publishers insisting on clear conflict of interest reporting,
  • The Terrorism Studies community putting methodology above attention grabbing headlines and tweetable pseudo-metrics.
    • If the methodology is flawed or the statistical analysis unsound – no matter if the ‘findings’ are appealing or even intuitively correct – the study lacks the necessary basic elements to be considered publishable research.  
      • Sample:
        • If research is claiming to have analysed a sample, to what extent can the sample be considered representative of the whole?
        • Was that sample derived from a consistent methodology, or a hodgepodge of pieces cobbled together?
        • How was the sample identified and collected? In effect research design (architecture) and data collection (acquisition) to use two of Jeffrey Stanton’s four A’s of data science.   
    • If you cannot do the calculation to produce a statistical result, do not use the word related to that calculation e.g. correlation, trend etc.  
      • Correlation:
        • When an author claims correlation – a range of questions should spring to mind; do you mean a positive or negative correlation?
        • how strong a correlation?
        • Did you use Pearson, Spearman, or Kendall?
      • Trend:
        • If a trend / trendline is claimed, what is the R-squared value? Is your line a good representation of the data?
        • A trend requires more than two or three data points.
        • Do you mean one point in time has fewer of ‘x’ than another? This is not a trend, upward or downward, one point just has fewer than the other.

Based on what is currently being published within the orthodoxy of Terrorism Studies there are a range of issues, including;

  • Journals specifically focused on terrorism research, a range of journals in related disciplines which have hurried to do ‘special issues’ on ISIS, and ‘research centers’ self-publishing special reports, which have published articles as if they are either unaware of the basic scientific and statistical standards or are content to publish material that they know falls short of the minimum acceptable scientific standards.
  • Senior researchers, including Professors, who will cite work that falls short of scientific or statistical standards without commentary or critique, some even talking it up as ‘ground breaking’ or ‘data science’.  

The current state of orthodox Terrorism Studies must be judged on the behaviour of those in the discipline. Such is the coagulation of mediocrity in orthodox Terrorism Studies, senior researchers have not questioned unsound methodologies, and journals through their peer reviewers and editors, have not upheld standards. The previously observed problems of data and data analysis within some sections of orthodox Terrorism Studies have now reached systemic levels.

In a scientific discipline,

  • If the relevant scientific or methodological information is not present in an article submitted to a journal, then that paper is going in the bin because it does not reach minimum standards for undergraduate level work, let alone peer review.
  • When individuals deliver presentations, which make statistical claims about trends or correlation without any calculations, or use substandard / misleading data visualisation to support their argument, they could expect to be laughed out of the building.  

If statistical and data analysis in Terrorism Studies do not adopt the standards adopted by other fields, it cannot take full advantage of the potential offered by increasing integration of data science or forms of statistical analysis into the study of Salafi-Jihadi groups.

The following series of posts examines specific tangible reasons why robust data science and evidence-based analysis is important and offers a critique of contemporary uses of data within orthodox Terrorism Studies.  

  • A progressive focus on what events and material means to Salafi-Jihadi groups – Da’wa As Constant on the Path of Jihad:

The purpose of research is to develop deeper understand the object of study. While Western-centric interpretations of ‘utopia’ and claims the ‘West is Winning‘ or that Salafi-Jihadi groups are defeated may be easier to produce and more comfortable for policymakers to read, they do not capture what the Salafi-Jihadi movement means or believes. The message that ISIS is defeated, may be politically expedient when tweeted by Donald Trump and echoed by researchers including the authors of the ISIS Reader. Yet, while it is possible to produce a definition of ‘defeat’ to back such a claim, that definition is unlikely to be a useful indicator of the current state nor future behaviour of the group. Far from defeated al-Dawlat al-Islamiyya, as a fighting force, “is bigger now than it was nearly six years ago”, according to Kurdish forces – a claim supported by a CIA assessment. UN Under-Secretary General, Vladimir Voronkov, has suggested that the number is even higher, some 27,000 Daesh fighters in Syria and Iraq, with up to a 100,000 civilians having some level of dependency on the group.

In addition to expedient notions of ‘defeat’, the focus on concepts such  as ‘Utopia’ are artefacts which result from Western researchers’ tendency to view material through their Western-centric lens. A progressive approach would focus on understanding what the intended audience understands by the material such groups produce, and be able to quote prior Salafi-Jihadi material to back that interpretation. In effect, progressive Terrorism Studies would focus on reading the lips of the Salafi-Jihadi movement, as Reuven Paz suggested over a decade ago.

  • Progressive commitment to scientific methods to escape the impressionistic and statistically unsound representations of data in orthodox Terrorism Studies:

The failure to uphold statistical methods in orthodox Terrorism Studies has become systemic. Methodologically flawed, statistically unsound, unpublishable garbage is now talked up within the orthodoxy of Terrorism studies as ‘data science’ by professors and published in journals or circulated as ‘special reports’. This section provides a critique of the unscientific approaches to data and statistics considered acceptable within orthodox Terrorism Studies. The adoption of a progressive approach to Terrorism Studies would demand a clear break from this flawed research, putting robust methodology above tweetable headlines. 

  • Orthodoxy claims decline – time for a reality check:

While production of media content by IS has fluctuated, some commentators have sought to coerce the data into a linear direction – a so-called decline. This section examines how the narrative has been constructed and shows that committing to the decline narrative has meant overlooking some serious methodological flaws and fluctuation in content. The decline narrative was built by shifting the goalposts both in terms of definition and time-periods rather than robust statistical analysis. In fact, while some claimed consensus around the decline narrative – a robust statistical analysis reveals average weekly video output increased in both quantity and longevity of production between 2017 and 2019.

  • Neo-Colonialist tendency to devalue ideas in Arabic:

This section unpacks some of the methods widely accepted within orthodox Terrorism Studies to show how they devalue material in Arabic in favour of English language sources and Western-Centric interpretations. A progressive Terrorism studies would focus on the primary language of the Salafi-Jihadi movement (Arabic).

  • Decline narrative as strategic communication tool:

The so-called decline has been more than a narrative deployed in commentary; it has also been used as a strategic communication tool. This section highlights the need for genuine scientific methodologies, appropriate statistical analyses, and robust conflict of interest reporting to ensure the field can escape the current coagulation of mediocrity and rebuild confidence in the academic output.

  • Progressive commitment to robust statistical analysis; the end to Mc_Data:

Scientific methodologies and robust statistical approaches can lift orthodox Terrorism Studies out of the current malaise of mediocrity, and enable the field to embrace the opportunity available through evidence-based research and a stronger data culture.  

A progressive Terrorism studies, using robust data science and evidence-based analysis, is important because contrary to the dominant narratives of IS having collapsed or been in terminal decline, al-Dawlat al-Islamiyya (IS) used the time on the open front in Iraq and Syria as an educational opportunity, to build a base of supporters running into the thousands. This is why al-Dawlat al-Islamiyya, as a fighting force, “is bigger now than it was nearly six years ago”.

As such, the theology which groups such as al-Dawlat al-Islamiyya sought to promote, will remain, will endure and, when given the opportunity of fertile soil, it will expand visibly when it suits their strategic cause.

Dawn is coming.

Back to the Nashir – Total Decentralization and Enhanced Resilience

Much has been written – and claimed – about the importance of the “Nashir” setup for the online presence of IS. By its logo, most times despite some variations, Nashir is easy to identify, even for non-Arabic speakers. As outlined before, Nashir is part of the IS ecosystem of online operations, but by no means “the” core spine or the central hub. From the start of jihadist online operations in the pre-9/11 2001 era, they have been resourceful, creative, highly adaptive and keen to adapt to new possibilities showcasing a high degree of innovation of ensuring to fulfilling – in jihadist mindset – the divine command of militant actions in real-life and a coherent flow of content framed as da’wa for the electronic and non-electronic realms.

In short, whatever is possible online, jihadists have been keen and adventurous from start to tamper with and follow a best-practice use that develops from a user perspective to ensure their wide range of violent, pro-violent, non-violent content stays up for as long as possible. The same habitus accounts for jihadist battlefield experiments and making use of scarce resources – as in early of the Iraq war who remembers the handles of shovels re-used as butts for pieced-together Dragunov sniper rifles?

“For the time being, for as far as we know, IS is not present on the internet anymore and we will see how fast, if ever, they will regain service”, according to Belgian Federal Prosecutor Eric Van Der Sypt after a massive takedown of IS accounts and networks on Telegram, IS was quick to kick back into action within about twelve hours. As the Nashir accounts had been culled, a big fuss was being made of the importance of IS having lost its core network.

IS creates content and pushes it out via dispersed networks. While this was centered on Telegram as the main dissemination hub, the Europol-led takedown of IS networks on that platform had the consequence that the networks formerly confined to Telegram are now on over a dozen of platforms and services similar to Telegram. Needles to write, the use of ‘outside’ links to/for the ‘surface’ web continues uninterrupted – but you need to monitor a lot of platforms now to ensure collecting as much as possible IS hubs (from Telegram, yes IS was back quick, to TamTam, Hoop, BCM, etc. etc.).

Cross platform use furthermore has a higher level of resilience as links to respective platforms are exchanged and increasingly a need for a exchange of quick private messages is required to receive ‘trusted’ links, including selected Nashir channels to avoid further takedown (including a Facebook messenger link).

tg-coms

Back to the Nashir

With Nashir alive and kicking on over a dozen of platforms, posting/reposting ‘Amaq content, new videos, new written releases (al-Naba’, collected statement of Abu Bakr etc.), Nashir has regained a presence in the blogging sphere.

bitly-19k

Sharing a bit.ly link, first on December 18 within Tamtam and also within Telegram, this particular link was clicked over 19,000 times since its creation on December 10, 2019.

frontpage

up-to-date content, ‘Amaq statements claming various attacks in MENA, the Sahel, West Africa, the current al-Naba’ edition, martyr poster – screengrab of the Nashir site.

country

Where are consumers most likely located – VPN use distorts yet nobody uses a VPN to switch to a restricted country.

source

and another example of diversification – the problem with the very temporary inconvenience as an “IS user” on Telegram due to the end of November Europol cull has enabled to re-enable the Telegram network and over a dozen other platforms as back/ups / parallel use to decentralized da’wa operations online to ensure a persistent presence of up-to-date and ‘historical’ content of primarily Arabic sources that matter gravely to IS.

 “What if the Caliphate Falls?” The IS Outlook in Early 2019

التقاط

By Seth Cantey and Nico Prucha

As outlined in our last post, around the time that al-Kuwaiti ended his life, a document written by an author using the pseudonym Abu Mawadda emerged. Titled “What if the caliphate were to fall?”[1] the article featured a banner showing a mighty tree, weathered by what appears to be a storm, yet firmly rooted to the ground. As IS has emphasized in several propaganda releases, physical territory is not required in order to act on behalf of “prophetic methodology,” which includes losses and defeat.[2] The relationship to physical territory is relative and fluctuates as jihadists are tested by God, and where only pure and true believers succeed either in this life or the afterlife.[3] What matters is the struggle and overcoming any tribulation (ibtila’) and strife (fitna). These stages clarify who is a true believer and steadfast and who is a hypocrite (munafiq) or weak in his/her belief. For Sunni extremists, steadfastness, in Arabic thibat, is detailed within a strict theological framework. No true believer can have thibat without physically proving so, and only those who are steadfast can overcome fitna or deviation. Fitna is part of creation and a means to separate humans into groups, ranging from true believers to various stages of disbelievers, hypocrites etc. Thus, fitna is a tool to ensure human purity and sincere intention to be in the service of God, and therefore to act on God’s behalf to implement, safeguard, and spread divine laws. “For God, high and exalted he is, crafted fitna in his creation to separate the sincere believers from the hypocritical liars.”[4]

Following classical jihadist literature, this claim is backed by holy scripture, the Qur’an, which is cited as proof and confirmation. “For us, we have been instructed on how to learn about those who are sincere, who are mentioned and brought to attention in the noble verses [of the Qur’an] (…), proof for those who are sincere is clearly stated. God, all praise is his, said, “The true believers are the ones who have faith in God and His Messenger and leave all doubt behind, the ones who have struggled with their possessions and their persons in God’s way. They are the ones who are true.”[5]

The 2016 document, foreseeing the obvious, that the height of IS territorial conquest cannot be sustained for the foreseeable future, highlights the main achievement of “the state.” “As God – high and exalted he is – declared you as those who believe in God and his messenger. Having realized the conditions of faith (shurud al-iman) to establish the religion of God, with the enabling by God of those who firmly believe [in the conquering of] territory.”[6] The document continues on the topic of the conquest of territory: “They [IS] have enforced obligatory prayers, the giving of alms (zakat), and are those who are commandeering good and forbidding what is wrong.”[7] The last part is a direct reference to the principle of ‘Al-amr bi-l-ma’ruf wa-nahiyy ‘an al-munkar’, with the important difference that IS uses the active verb, implying they are the ones who actively and by human effort command good (amirun) and actively forbid evil (nahun).  In this claim, the group seeks to draw on the authority of Qur’an 3:104: “Be a community that calls for what is good, urges what is right, and forbids what is wrong. Those who do this are the successful ones.”[8]

The current legacy of IS, which is of dire importance to the group as it loses territory, is at least twofold. First, IS was able to reformat physical territory based on its understanding of annihilating people and cultural heritage, vindicating (from the group’s perspective) its theology of violence. Second, its actions were documented in full HD videos, and these images are being re-shared in a context of nostalgia. Thus, IS asks “how can the disbelievers and hypocrites claim that the Mujahideen are dissuaded when losing a city or province, or when an amir or minister is killed? (…) By God, certainly not. The loss of Raqqa, Mosul, al-Khayr, Homs, even losing all provinces of the caliphate in Yemen, Libya, Afghanistan, East Africa and elsewhere [won’t affect us], God is in command of what has been and what is to come. (…) [Territorial losses] are only going to mislead the hypocrites (…) not the sincere muwahhideen. They are the ones continuing the insurgency, unimpressed by the killings of their leaders or losing their cities.”[9] The legacy of the first generation of leaders, ministers, and key theological figures endures in the form of their writings, audio-speeches, videos, and pictures online, where jihadist media supporters continue to (re-) post and (re-) share content across a wide range of platforms. “They suspect and imagine that the death of our leaders is the end of the caliphate. If this umma were to die with the death of the caliph, it would have died with the death of Prophet Muhammad.”[10]

This sentiment was reinforced in a document published in April 2018 that mocked the global coalition against Daesh as “having amassed many states, yet the Islamic State stays on top.”[11] It further mocked “the continued declared victory by this campaign here and there, claiming that the state of Islam has collapsed and is eliminated.” The mindset for IS is that their adversaries have lost the desire to fight. The group claims to find this unsurprising, as reflected in the quote: “How can they be patient in a war against those who love death on the path of God, just as they love life? They are fighting men who are dedicated to paradise, seeking to satisfy their lord.” For jihadist supporters and actual fighters, one key slogan is that the Islamic State will remain (baqiyya). Proof that this is the case for over a decade is expressed in comparing the coming and going of U.S. administrations over time. “The Bush administration claimed victory. The administration left, and the Islamic state remained. Obama came to power and did the same thing, yet the Islamic State remained. Now the old man Trump came and wants the same thing, and as before him, he will be unable to achieve victory.”[12]

Sunni extremists continue operating freely online, expanding existing databases of texts (theory) and videos (practice) for future generations. Organization on platforms like Telegram allows for a swarming to other platforms, social media sites, and the internet in general. Jihadists believe in the divine obligation of da’wa (proselytizing) to indoctrinate future generations for their cause. Groups such as IS operate conveniently online, their clandestine networks protected by, as outlined before on this blog:

  • A linguistic firewall: Arabic language skills are required to access clandestine networks. (The ongoing paucity of these language skills among researchers is appalling.)
  • An initiation firewall: knowledge of the coherent use of coded religious language and keywords, which few researchers, even those who do speak and read Arabic, can demonstrate in their writing.
  • The challenges of Telegram, where IS succeeded in shifting and re-adapting its modus operandi of in-group discussions and designated curated content intended for both public and private audiences (as part of a wider da’wa).

Media raids ensure that dedicated content gets pumped to the surface web, ranging from Twitter to Facebook, while the IS-swarm can (re-)configure and organize content related to what is happening offline on the ground. This ensures that the cycle of offline events influencing online materials is uninterrupted. Theological motivation, coherently repacked and put in practice, based on 300,000 pages of writings and over 2,000 videos by IS alone, must be addressed. Yet, “without deconstructing the theology of violence inherent in jihadi communications and practice, these religious ideas will continue to inspire others to act, long after any given organized force, such as the Islamic State, may be destroyed on the ground.”[13]

[1] Abu Mawadda (Al-‘Uqab al-Masri), “Wa-madha idha saqatati l-khilafa(tu)?” Mu’assassat al-Wafa’, March 28, 2016.

[2] Samih ‘Umar, “Khasarna Manbij wa-rabihna al-ma’raka,” Mu’assassat al-Wafa’, August 17, 2017.

[3] This relates to the notion of seeking ihda al-husayn, victory (nasr) or martyrdom (shahada).

[4] Abu Mawadda (al-‘Uqab al-Masri), “Wa-madha idha saqatati l-khilafa?” Mu’assassat al-Wafa’, March 28, 2016.

[5] Ibid, citing Qur’an 49:15.

[6] Ibid.

[7] Ibid.

[8] Embedded in this citation of the Qur’an is the deeper meaning of applied theology – referenced in the Qur’an in Arabic as ya’murun bi-l-ma’ruf wa-yanhun bi-l-munkir.

[9] Abu Mawadda (al-‘Uqab al-Masri), “Wa-madha idha saqatati l-khilafa?” Mu’assassat al-Wafa’, March 28, 2016.

[10] Ibid.

[11] Nasif al-Shabahat, “Dawla satunsar wa-hamla satuksar,” Mu’assassat al-Wafa’, April 2018.

[12] Ibid.

[13] Rüdiger Lohlker, “Theology Matters: The Case of Jihadi Islam.” Strategic Review. July/September 2016. http://sr-indonesia.com/in-the-journal/view/europe-s-misunderstanding-of-islam-and-isis

The Era of Recruitment via Twitter. Online Initiation into the Ranks of IS: the Tale of Abu Anwar al-Kuwaiti

3

By Seth Cantey and Nico Prucha

In December 2015, the, at the time, IS media outlet Al-Wafa’ released a document titled “Story of the call to arms of Abu Anwar al-Kuwaiti.” Penned under the pseudonym Hafid al-Khattabi, the author details Abu Anwar’s journey from Kuwait to the ranks of the Islamic State. According to the account, Abu Anwar studied engineering in the U.S., where he followed a liberal lifestyle of sin. Later, “he chose the path of repentance.” He learned about IS when he was asked about the group by a journalist on the street after leaving a mosque. The reporter was shocked to learn that Abu Anwar did not know anything about IS.[1] The article suggests that an ignorant Western reporter who bumped into a Muslim leaving a mosque lit the spark for Abu Anwar that led him to the Islamic State. After searching for “the Islamic State in Iraq and Syria” online and learning more, he wondered why he had only known about the “Islamic State” from history books. He continued his search for hours and come across many electronic sources.”[2] This hours-long quest to find out about IS online enabled him “to see and listen for himself about the Islamic State that some people had claimed was nothing but a criminal group, an aggressor, that had no room for mercy or compassion.”[3] He started to follow the “electronic releases of the Islamic State and was overwhelmed by the refutations and revelations of doubt disseminated against IS.[4]  He continued to read the noble Qur’an and the hadith of the prophet – God’s blessings upon him – and was entangled by the verses related to jihad, istishhad,[5] hijra, and combat. Especially the hadith relating to Sham [historical Syria][6] fascinated him, exerting himself in the study of tawhid, al-wala’ wa-l-bara’, ahkam al-diyyar, the obligations to migrate from the abode of disbelief to the abode of Islam, the obligation for disbelief in the tawaghit, the excommunication (takfir) of the soldiers of the tyrants, absolute dissociation from them and any disbeliever, [and] loyalty to Muslims and [the obligation] to support them by worldly and bodily means.”[7] The process of studying online resources by IS and becoming radicalized, in the sense that Abu Anwar considers the theological content by IS online as more authoritative than his understanding of religious matters prior, took about eight months.

In most Muslim-majority societies, just as in most Christian and other religious communities, religious scripture that enables violence or dehumanization of the “other” only plays a marginal role. Sunni extremists always project themselves as being ‘true’ Muslims, their focus to theologically explain the obligation to be a ‘100 % Muslim,’ which they argue requires enforcing and explaining otherwise neglected elements that relate to violence. This authoritative perspective, as pitched theoretical writings and especially in videos, show the direct application of religion and led Abu Anwar to “question God whether or not he should heed to the call of arms and migrate for jihad… Every day his heart burned with bitterness and full of fear to heed to the call to arms, desiring to join the battles to raise the banner of God, for victory for God’s religion.”[8]

When Abu Anwar finally bought his plane ticket, he flew to Turkey and encountered a new problem: how to connect with individuals of the Islamic State? He tried by “calling a hotel in Irbil to inquire about the possibility of travel to Mosul and the status of “terrorism” in the region, claiming his Iraqi mother required financial support and help.”[9] Going to Mosul would be impossible, but he was advised to “hire a driver to take him from Turkey to Raqqa for about 150 US dollars.”[10]

When Abu Anwar’s initial attempts failed,[11] he gave himself an ultimatum: either he would join IS or return to America. The night before his return flight, he sought out supporters of the Islamic State on Twitter,[12] writing that he was in Turkey, coming from the United States, and that he “was confronted by people telling me that you are seeking those who seek to migrate to the Islamic State.” He then went to sleep and awoke in the middle of the night to find a notification on his phone that one of the supporters had replied, wanting to speak to him. Abu Anwar shared his story and that his return flight to America would leave in eight hours, and he asked whether one of the brothers could help him enter the caliphate.[13] The ensuing arrangement was that Abu Anwar would be picked up “in Turkey to enter together the territory of the khilafa.

In early 2016, after IS had largely migrated from Twitter to Telegram, [14] a picture of Abu Anwar al-Kuwaiti surfaced on the internet. Below is the photograph of a young man standing in front of a makeshift armored vehicle, one that has been a signature image for IS in much the same way as for the A-Team in the popular TV series.  Abu Anwar had volunteered for a suicide mission using the makeshift vehicle. The accompanying graphic included poetic text which read:

“While on his way bidding farewell, he said:

He aborted his studies;

Packed his bags;

Bade his loved ones farewell;

Cancelled his accounts;

Wrote his testimonial;

Wiped his tears;

Craving for his lord,

He realized [his istishhadiyya operation] and advanced [to be accepted by God]…

Abu Anwar al-Kuwaiti. A success story.”

[1] Hafid al-Khattabi, “Qissat nafir Abu Anwar al-Kuwaiti,” Mu’assassat al-Wafa‘, December 2015.

[2] Ibid.

[3] Ibid.

[4] Radd/ruddud wa-shubuhat is a category in the literature of jihadism, providing space for jihadist theologians to selectively argue on theological grounds against mainstream, moderate, or opposing (i.e., AQ), theologians.

[5] Istishhad refers to the attainment of the shahada, i.e., martyrdom, either dying during combat as a regular mujahid or being a suicide bomber, an istishhadi operative.

[6] Most likely a reference to the hadith: Musnad Ahmad (21096), which states, “Narrated by Zayyid bin Thabit al-Ansari – may God be satisfied with him – said, “The messenger of God, peace and blessing be upon him, was heard saying: “My blessings for Sham [Greater historical Syria]! My blessings for Sham! My blessings for Sham!” They said: “O messenger of God, what is the meaning of this?” He said: “These angels of God have spread their wings over Sham.””

[7] Hafid al-Khattabi, “Qissat nafir Abu Anwar al-Kuwaiti,” Mu’assassat al-Wafa‘, December 2015.

[8] Ibid.

[9] Ibid.

[10] Ibid.

[11] The story includes an Arabic-speaking guard at a mosque in Turkey that Abu Anwar attended, who asked if he was really sure that he wanted join Daesh. Separately, an imam inquired, “Why does the [Islamic] State kill those who they refer to as disbelievers?” and went on to claim that IS was “nothing but a Jewish project.” Abu Anwar also tried to hire a driver to take him from Turkey to Raqqa. When the driver called a friend who spoke Arabic, that friend shouted at Abu Anwar over the phone: “Are you crazy? Pay what you owe the driver and get lost!”

[12] Although Twitter is not mentioned by name, the description of private messaging, the supporters of IS, the response hours later, and the fact that this story is from 2015, all point to the social-media platform.

[13] Hafid al-Khattabi, “Qissat nafir Abu Anwar al-Kuwaiti,” Mu’assassat al-Wafa‘, December 2015.

[14] Nico Prucha, “IS and the Jihadist Information Highway – Projecting Influence and Religious Identity via Telegram,” Perspectives on Terrorism, Vol. 10, No. 6 (2016). http://www.terrorismanalysts.com/pt/index.php/pot/article/view/556

Media Mujahidin on Telegram: Overview of 2019

Many column inches of commentary have been dedicated in recent months to the purported shift from Telegram to other platforms. We have shown previously that despite efforts to ‘cull’ jihadi channels on Telegram, disruption did not have a meaningful impact on the core network. This core allowed jihadi groups to maintain a persistent presence. The greatest impact of that attempted disruption appears to have been the much tweeted about inconvenience caused to pundits and commentators who had only been able to access the peripheral Jihadi channels and Nashir News network that were deleted in the disruption effort.  

In this post we look at the content sharing network between January and May 2019. This produces a strategic overview of the network, to assess whether the network has been forced to evolve how they use the platform.

The analysis shows that at present the Jihadi network on Telegram is vast and remains functional. The URL sharing in core groups indicates core users are not currently preparing to make the jump to another platform. 

Overview:

  • The primarily Arabic Jihadi Telegram Network is very large, spanning 9,000 channels / groups and has produced over 1.7 million updates.
  • al-Dawlat al-Islamiyya, AQ, Taliban and pro-Jihadi supporters all connect into a single network which also draws on theological content at the Salafi-Jihadi Nexus.
  • This network has shared over 31,489 Unique URL from 486 domains / subdomains between January and May 2019. Active content sharing is still occurring on the surface web, despite punditry to the contrary.
  • By contrast there are very few links to the dark web, highlighting how important remaining on the surface web is for the Jihadi movement. 
  • The most frequently used domains do not offer a serious alternative to Telegram. In the period to May 2019, the behaviour previously seen in the transition between Twitter and Telegram of mass link sharing to the accounts on the new platform is not currently being repeated.   
  • A model of the information flow between platforms which are used within the jihadi information ecosystem continues to exhibit a dispersed network comprised of beacons, content stores and aggregators. 
  • Tech resources, such as apps, disposable phone numbers, encrypted email, and VPN are an important part of both the Telegram network and the entire information ecosystem.  

Data

Using the curated feed of human verified jihadi channels and groups archived by BlackLight between January and May. This dataset contains 1.7 million updates of which 878,795 (approximately 50%) were forwarded from other channels and groups.

Analysis of these messages produced a network of over 85,000 connections (content sharing or cross posting). The network is made up of 9,000 accounts and groups. The connections between nodes show that groups of channels form specific clusters, each of which containing some common theme or allegiance to a Jihadi group. 

As discussed in previous posts there is a dispersed network with many accounts that have some importance to the network (rather than one or two very important accounts – which would make the network vulnerable to disruption).

As in previous analyses, ISIS, AQ, and Taliban channels all appear in the same interconnected network. This is often because:

  • they draw on similar other channels (those with a specific historical or theological focus for example) or
  • pro-Jihadi channels / groups who share the overarching theology and purpose, but do not have specific organizational allegiance, aggregate material from both al-Dawlat al-Islamiyya and AQ.   

The network structure and emergent communication architecture of the clusters indicates that they will likely remain resilient to the removal of even a large proportion of the channels and groups. Of the different clusters, those closest to the al-Dawlat al-Islamiyya have the most dispersed network architecture – providing the greatest resilience, while Taliban appear to have adopted the distributed structure to a lesser extent.

External Links.

This section examines over 1 million (1,048,575) URL identified in messages and captions. Within this million URL sample the research found 31,489 Unique URL from 486 domains / subdomains.

Calculating the number of times URL representing content on specific domains had been observed, Telegram links appeared most frequently in posts.  It is a common observation that the domain on which data is being collected is also the most frequently linked to domain in the dataset, as users often include the link for a channel or chat in their posts.  

Domains as proportion of total observations

Looking at the number of unique URL gives an alternative perspective. It shows that while Telegram links appear frequently, they are a relatively small number of URL appearing frequently. In contrast, there are relatively higher numbers of URL from other domains, each of which appear relatively infrequently. This is logical, as many URL outside Telegram host a specific piece of content, and hence it is shared when it is released and subsequently falls out of use.

Number of different URL per domain

Examining the URL from outside Telegram provides an overview of the other locations within the Jihadi information ecosystem. This shows the number of times domains were observed in posts.    

Similarly, analysing the domains by the number of different URL shared from that domain, shows how the information ecosystem combines branded content from jihadi groups, located on content stores and aggregators, with a wide range of other material including mainstream news sites.

From this we find:

  • Despite the claims Jihadi groups have not been driven off the surface web, sites such as archive.org, telegra.ph, and justpaste.it are frequently used as Jihadi content stores and aggregators.
  • None of the most observed domains offer a serious alternative to Telegram. In the period of adjustment, which occurred in the autumn of 2015 and Spring 2016, Jihadi twitter accounts regularly shared links to Telegram channels to allow sympathisers to maintain access to the Jihadi information ecosystem. In the period to May 2019, the behaviour previously seen in the transition between Twitter and Telegram is not currently being repeated.   

Flow across the Ecosystem.

In examining the flow of users across the ecosystem in 2019 we find there are two distinct clusters, one focused on tech and the other on Jihadi content and related news. This uses the same method as was discussed during the GRNTT conference at Brookings.  

The tech cluster on the lower portion of the graph fulfils an important role for the movement, as it provides access to services such as VPN, disposable / free phone numbers and a range of communication programmes distributed as .apk files (Andriod Package File).

Overview of network graph showing traffic across Jihadi Information Ecosystem

The content cluster features platforms from the three main roles in the Jihadist information ecosystem:

  • The signposts including Telegram and Facebook,
  • Content stores such as Archive.org, Google Drive, imgur, and Files.fm
  • Aggregators such as Justpaste.it and Telegra.ph
Annotated network image

Other findings of note;

  • Obedient Supporters and Nashir 1440 are content aggregators which provide content downloads on the surface web.
  • Tgho.st – is a file sharing system native to Telegram. Tgho.st operates by users sending the file to a Telegram Bot, the bot subsequently returns a URL where that file can be downloaded by anyone using the download link in a browser. The service advertises that “These files are not deleted and will always be available for download”.
  • Videopress – URL to Videopress were frequently extracted from videos posted on the earlier version of Jihadology, although without the full Jihadology page / URL. Such a finding illustrates the importance of focusing on the Jihadi primary language, Arabic, rather than drawing conclusions from fringe languages, particularly English. However, this is likely to fall out of use following the recent update to the site.  

Conclusion

  • The primarily Arabic Jihadi Telegram Network is very large, spanning 9,000 channels / groups and has produced over 1.7 million updates.
  • al-Dawlat al-Islamiyya, AQ, Taliban and pro-Jihadi supporters all connect into a single network which also draws on theological content at the Salafi-Jihadi Nexus.
  • This network has shared over 31,489 Unique URL from 486 domains / subdomains between January and May 2019. Active content sharing is still occurring on the surface web, despite punditry to the contrary.
  • By contrast there are very few links to the dark web, highlighting how important remaining on the surface web is for the Jihadi movement. 
  • None of the most observed domains offer a serious alternative to Telegram. In the period to May 2019, the behaviour previously seen in the transition between Twitter and Telegram is not currently being repeated.   
  • A model of the information flow between platforms which are used within the jihadi information ecosystem highlights a dispersed network comprised of beacons, content stores and aggregators. 
  • Tech resources, such as apps, disposable phone numbers and email, and VPN are an important part of both the Telegram network and the entire information ecosystem. 

Come Home: Jihad in Arabia

٢٠١٩٠١٣٠_٢٢٣٠٠٥

The Islamic State, which is oftentimes referred by its Arabic acronym Daesh, proclaimed the re-establishment of the Caliphate with Abu Bakr al-Baghdadi as Caliph. Daesh stands for al-dawlat al-Islamiyya fi l-‘Iraq wa-sh Sham. The name change reflected the expansion of the Islamic State of Iraq into Syria and since 2014 often refers to itself as the Islamic State or the Islamic Caliphate State. It had been groups such as al-Qaeda (AQ) that theorized about restoring a Islamic State[1] with partially having been able to establish proto-states,[2] but never to the extent of having been able to assert control over a greater population within traditional core Arab Sunni territory. Jihadists had fantasized about being able to combat Arab regimes in the Middle East and North Africa, urging in their rhetoric to be empowered to liberate Palestine, as in their perspective, they had just defeated the Soviet Union with the withdrawal of the Red Army from Afghanistan.[3] Not seeing, yet hoping, in 1989 that one day jihad can be waged inside Arab countries, ‘Abdallah ‘Azzam  wrote: “From the morning into the middle of the night, and we are like this, if we have liberated Afghanistan tomorrow, what will we work on? (…) Or God will open a new front for us somewhere in the Islamic world and we will go, wage a jihad there. Or will I finish my sharia studies at the Islamic University in Kabul? Yes, a lot of the Mujahideen are thinking about what to work on after the jihad ends in Afghanistan.”[4] Jihad further internationalized as the zones of conflict diversified. In the 1990s conflicts arose featuring jihadist groups in Bosnia, the Caucasus, prominently Chechnya with jihadist revenge operations throughout Russia, Somalia, it continued in Afghanistan with the Taliban taking over the country and time and again Kashmir. None of these regions of conflict are part of the Arab world, yet from all of these conflicts Arabic-language media items originated, featuring a range of languages, yet dominated by Arabic. Non-Arabic fighters and tales had been subtitled in videos or released as translations, and Arabic native speaking foreigners had been either in key positions (i.e. Khattab) or Arabic affluent local fighters gave their testimony. It wasn’t until the early 2000s that AQ was able to manifest in Saudi Arabia (AQAP) for a few years but the game-changer for Sunni jihadis had been the American occupation of Iraq in 2003. Even when the first generation of AQAP failed, and was forced to re-establish itself in Yemen, jihad was finally able to gradually establish itself in Iraq in the chaotic aftermath of 2003 – giving birth over time what would be known as ISIS. Finally, after the AQAP 1.0 phase where jihadis fought inside Saudi Arabia, referred to as the land of the two holy sanctuaries, and where Arabic was the common language with few exceptions, a Sunni jihadist arm was able to persist in Iraq and produce almost exclusively materials in Arabic featuring Arabic native speakers – to seek to attract more recruits to their cause.

As the late Reuven Paz wrote in 2005, “viewing the struggle in Iraq as “return home” to the heart of the Arab world for Muslim fighters after years of struggle in “exile” in places such as Afghanistan, Bosnia, and Central Asia.”[5] Building a media heritage and tradition, Muslim fighters, referring to the first and early foreign fighter generation had been keen to write about their experiences in “exile” and document their “struggle” by releasing writings, martyr stories, audio-recordings and most important – and on a more regular basis – videos. Especially written accounts of the shuhada’, the martyrs, had been a popular and a unifying element of all conflict zones where foreign and local fighters presented their struggle as a fight for justice and their cause as decreed by God on his path. Increasingly – and as early as the early to mid-1990s – this form of documented “struggle” in “exile” entered the Internet where it is meant to stay and continues to inspire individuals to this day.[6] The martyr-stories are an integral part of the jihadist literature. Documents in Arabic outline individual biographies from 1980s Afghanistan[7] to the 1990s Chechnya[8], Bosnia[9], Somalia, to the 2000s with Afghanistan[10], the Caucasus, Somalia, Saudi Arabia[11] and Iraq[12]. From every region, from throughout the 1980s (Afghanistan) to the 2000s, Sunni extremist militant groups used the media as a tool to report to fellow Muslims (mainly in Arabic but not exclusively) about their – in their view – pious acts and deeds in fighting against injustice and oppression. Arabic is the lingua jihadica while only parts of the literature, including selected martyr biographies, are specifically translated into other languages. In cases where the martyr is not a native Arabic speaker, his account usually is translated into Arabic and the original language biography is published as well – within the respective lingual networks. The power and the value of jihadist video productions from a lingual outreach perspective in this regard is strategic: any non-native Arabic speaker issues his filmed farewell testimonial, in Arabic referenced as wasiyya, in his native language – Arabic subtitles are added. Only a portion of Arabic native speaker videos, however, are released at a later point with non-Arabic subtitles.

The theology of IS, AQ and any other Sunni extremist groups, however, is based on Arabic-language religious scriptures, not just Qur’an and Sunna, but also references elements of the rich 1,400-year long tradition of Islamic writings. The “Islamic State” applied the theology of AQ in full within its territory – and manages to post videos from other regions of the world as of 2019 where the group manages to control or at times dominate parts of territory.[13] ‘Amaq statements with claims of IS attacks in Congo und Uganda surfaced the past days as well, with pictures showing looted assault rifles and cell phones – and looted tanks and burning village homes in Nigeria. These media items, videos, pictures, writings justifying the occupation of Marawi and the outlook of jihad in South East Asia etc. are ALL in Arabic. In regions where Sunni jihadist groups pop up, Arabic language emerges within the group projected to the outside – core target audience – for native Arabic speakers. Local fighters, as is the case since the existence of VHS tapes featuring local fighters in the 1980s Afghanistan, 1990s Bosnia, Chechnya etc. speak in their local language – with Arabic substitles for the core target audience.

15111111

Whereas past AQ generations, in particular in Saudi Arabia[14], had to theologically justify their specific targeting of non-Muslims, IS enforces these theological decrees and legal rulings, in Arabic referred to in the authoritative use of language as fatawa[15] and ahkam: judicial rulings and religious conditions based on chains of arguments allowing or ban i.e. certain behavior or acts.

Jihadist online materials is a rich blend of various media, never short of content, ranging from simple homepages, discussion forums, blogs, various online libraries for texts and videos, to every single social media platform as of writing.[16] The online media footprint today is the development of nearly three decades of committed media work by jihadist actors – with two decades of online cyberpunk styled activism, ensuring that content once uploaded will stay online – and thus findable – somewhere in the rich online ecosystem. This dedicated work has been and is the expression of a strategic discourse on how to conduct jihadist warfare online and has been penned in a highly coherent manner by leading jihadist theoreticians such as Abu Mus’ab al-Suri.[17]

As Reuven Paz, a fluent Arabic speaker (and reader of Arabic language extremist materials) noted in 2007, “Jihadi militancy is … almost entirely directed in Arabic and its content is intimately tied to the socio-political context of the Arab world.”[18] As Ali Fisher notes: “People who live in that socio-political context, or habitus, easily pick up on the factors that make up the ‘narratives’”, and furthermore: “The habitus is itself a generative dynamic structure that adapts and accommodates itself to another dynamic meso level structure composed primarily of other actors, situated practices and durable institutions (fields).” And because habitus allowed Bourdieu, Fisher concludes;

“to analyze the social agent as a physical, embodied actor, subject to developmental, cognitive and emotive constraints and affected by the very real physical and institutional configurations of the field.[19]

In their habitus and manifestation, jihadist media discourses refer to certain principles of belief, or define norms, issue symbols, introduce and enforce wordings, and sources with the intention of having resonance within their target audience. As members of their respective societies, or religiously influenced cultures, they operate from “within” in crafting public messages and framing their narratives, sanctioning violence and defining “justice” and “values” – conveyed by jihadist media groups in a pedagogical fashion, using a highly coded religious language, first and foremost for their target audience: native Arabic speakers, born as Sunni Muslims. It is as if

“the form in which the significant symbols are embodied to reach the public may be spoken, written, pictorial, or musical, and the number of stimulus carriers is indefinite. If the propagandist identifies himself imaginatively with the lives of the subjects in a particular situation, he is able to explore several channels of approach.”[20]

Jihadist media groups operating in Arabic and to a much lesser degree in western languages have perhaps taken note of al-Suri’s “Message to the British and European Peoples and Governments regarding the Explosions in London”, July 2005, where he outlined the Internet as the most important medium to propagate and spread the jihadists demands and frame of reference in general.[21] He referred to “the jihadi elite” residing in Europe to partake in this venture.

With the rise of the Islamic State and their declaration of the caliphate in mid-2014, the propaganda and the interspersed media strategies to fan-out such content had reached an unprecedented peak. The move by IS to shift to social media (first Twitter 2012 until late 2015, then Telegram 2016 to as of writing (2019)[22], with a change of modus-operandi)[23], their supporters, like other Jihadist groups, have become increasingly adept at integrating operations on the physical battlefield with the online effort to propagate their ideology (=theology) and celebrate their ‘martyrs’, being able to echo contemporary stories to the rich literal corpus that exists since the 1980s.

 

 

[1] For example referred by ‘Abdallah ‘Azzam in his 1989 sermon in Seattle, USA, telling the stories of the war against the Soviets and why the ultimate goal can only be to re-establish a Islamic State. ‘Abdallah ‘Azzam,

[2] Yemen / Mali source

[3] ‘Abdallah ‘Azzam, al-jihad bayna Kabul wa-l Bayt al-Maqdis, Seattle, 1988.

For a contextual reading, Nico Prucha, “Abdallah ‘Azzam’s outlook for Jihad in 1988 – “Al-Jihad between Kabul and Jerusalem””, Research Institute for European and American Studies (2010), http://www.rieas.gr/images/nicos2.pdf.

[4] ‘Abdallah ‘Azzam, Muqaddima fi-l hijra wa-l ‘idad, 85.

[5] Reuven Paz, The Impact of the War in Iraq on the Global Jihad, in: Fradkin, Haqqani, Brown (eds.); Current Trends in Islamist Ideology, Vol 1, The Hudson Institute, 2005, 40.

[6] Nico Prucha, “Die Vermittlung arabischer Jihadisten-Ideologie: Zur Rolle deutscher Aktivisten,” In: Guido Steinberg (ed.), Jihadismus und Internet: Eine deutsche Perspektive, Stiftung Wissenschaft und Politik, October 2012, 45-56, http://www.swp-berlin.org/de/publikationen/swp-studien-de/swp-studien-detail/article/jihadismus_und_internet.html.

[7] Of the many works from this time, the accounts of martyrs by ‘Abdallah ‘Azzam are popular to this day: ‘Abdallah ‘Azzam: ’Ashaq al-hur” martyr biography collection, http://tawhed.ws/dl?i=pwtico4g, accessed August 29, 2013. To give readers an impression, this book by ‘Azzam is

[8] The al-Ansar mailing list, a branch of the al-Ansar online forum, released a collection of martyrs who died in Chechnya: al-Ansar (ed.): qissas shuhada’ al-shishan, 2007; 113 pages.

[9] This tradition was continued in the 1990s with the influx of Arab foreign fighters in Bosnia, see for example the 218 page long collection by: Majid al-Madani / Hamd al-Qatari (2002), Min qissas al-shuhada al-Arab fi l-Busna wa-l Hirsik, www.saaid.net

[10] Abu ‘Ubayda al-Maqdisi and ‘Abdallah bin Khalid al-‘Adam. Shuhada fi zaman al-ghurba. The document was published as a PDF- and WORD format in the main jihadist forums in 2008, although the 350-page strong book was completed in 2005.

[11] With al-Qa’ida on the Arab Peninsula (AQAP) active, a bi-monthly electronic magazine, the Voice of Jihad, was featured and martyr stories had been released online as well. The most prominent martyrs are featured in a special “the Voice of Jihad” electronic book (112 pages): Sayyar a’lam al-shuhada’, al-Qa’idun website, 2006.

[12] Sayyar a’lam al-shuhada‘ was a series that featured the martyr biographies in 2004-2006; the collected martyr biographies (in sum 212 pages) had been re-released by al-Turath media, a media organization that is part of IS in 2018. Since the launch of IS’ weekly newspaper al-Naba’, prominent martyr stories have been featured there.

[13] As displayed in  IS videos, i.e. Hijra wa-l qital, Wilayat Gharb Afriqa (January 15, 2019) or Radd al-Wa’id, Wilaya Diyala (January 29, 2019).

[14] Thomas Hegghammer, Jihad in Saudi-Arabia: Violence and Pan-Islamism since 1979, Cambridge: Cambridge University Press, 2010.

[15] Plural for fatwa.

[16] For a discussion on how Twitter was used by jihadist actors: Nico Prucha and Ali Fisher. “Tweeting for the Caliphate – Twitter as the New Frontier for Jihadist Propaganda.” CTC Sentinel (Westpoint), June 2013, http://www.ctc.usma.edu/posts/tweeting-for-the-caliphate-twitter-as-the-new-frontier-for-jihadist-propaganda

[17] Lia, Brynjar, Architect of Global Jihad: The Life of Al Qaeda Strategist Abu Mus’ab Al-Suri, New York: Columbia University Press, 2008.

[18] Paz, Reuven. “Reading Their Lips: The Credibility of Jihadi Web Sites as ‘Soft Power’ in the War of the Minds.” (2007).

[19] Ali Fisher, How 6th Graders Would See Through Decliner Logic and Coalition Information Operations, Onlinejihad, January 2018,  https://onlinejihad.net/2018/01/26/how-6th-graders-would-see-through-decliner-logic-and-coalition-information-operations/

[20] Harold D. Lasswell, The Theory of Political Propaganda, The American Political Science Review, Vol. 21, No. 3. (Aug., 1927), 627-631, http://links.jstor.org/sici?sici=0003-0554%28192708%2921%3A3%3C627%3ATTOPP%3E2.0.CO%3B2-L.

[21] Abu Mus’ab al-Suri, ila Britaniyyin wa-l Eurupiyyin bi sha’n tafjirat London July 2007 wa-mumarissat al-hukuma al-Britaniyya

[22] Although

[23] Martyn Frampton with Ali Fisher, and Nico Prucha. “The New Netwar: Countering Extremism Online (London: Policy Exchange, 2017).

As of 2019, the Islamic State, but also AQ or the Taliban continue to operate on Telegram and from this protected realm newly produced propaganda is injected into online spaces that are (more) accessible than the closed and hard to find groups on Telegram.

Making of a Jihadi image

A thousand men who fear not for their lives are more to be dreaded than ten thousand who fear for their fortunes.

Denis Diderot

The evidence based approach to analysing the Jihadi movement includes how the movement creates their visual images. Deconstructing these images into their components demonstrates that many of the different elements are included deliberately to communicate specific things. These elements must be interpreted within the appropriate habitus.

In part, as the late Reuven Paz noted, this means recognising that;

The Jihadi militancy is … almost entirely directed in Arabic and its content is intimately tied to the socio-political context of the Arab world.


Reuven Paz, Reading Their Lips: The Credibility of Jihadi Web Sites as ‘Soft Power’ in the War of the Minds

The other part of interpreting images within the appropriate habitus, is an appreciation of the Jihadi culture, in the sense as-Suri used “the cultural level of the mujahidin“.

At times, it is possible to heighten the cultural level of the mujahidin, and it is also possible to heighten the level of preparation and acquired skills, and this will contribute to refining the talent …

The trainers and those supervising the foundation of Resistance cells must discover those talents and refine them with culture and training so that they find their place in leading terrorist operations in this type of blessed jihad…

Later in the text as-Suri notes:

..one of the most important fundaments for training in our jihadi Resistance Call is to spread the culture of preparation and training, its programs and methods, with all their aspects, by all methods of distribution, especially the Internet, the distribution of electronic discs, direct correspondence, recordings and every other method.

as-Suri, Global Islamic Resistance Call

The socio-political and cultural elements of the habitus in which Jihadi media is created are fundamental to evidence based research into what this material intended to communicate. When this evidence based approach is applied, notions of “jihadi cool”, going from zero-to-hero, crime and gangsta rap, along with claims of utopia and ‘utopian narratives’ all become unsustainable as interpretations of what Jihadi groups intend to communicate.

Jihadi culture has drawn influences from theology, the history of muslims, history of Jihadi groups and draws on experiences from earlier iterations of the movement. Jihadi culture is inextricably linked to their understanding of evidence and scholarship, specifically the vast archive of text, audio, and video which precedes the emergence of the contemporary al-Dawlat al-Islamiyya.

Evidence based approach

Image by sawa’iq media

This image has been part of the Jihadi information ecosystem and is part of a wider genre of images.

Collection of images produced by Furat posted together in a single Telegram post.

These images are composites of numerous elements, the inclusion of which are intended to communicate concepts which have also been referenced in earlier jihadi material.

Deconstructing the image

The original image ‘training the brothers in street fighting’ was produced by hadrawmawt Yemen. This training session depicts the practical application of theology in meeting the obligation to prepare for Jihad and life on ribat. This obligation is emphasized by the quote from Surah al-Anfal (Quran 8:60) which features in the final sawa’iq media image.

And prepare against them whatever you are able of power and of steeds of war by which you may terrify the enemy of Allah and your enemy and others besides them whom you do not know [but] whom Allah knows. And whatever you spend in the cause of Allah will be fully repaid to you, and you will not be wronged.

Surah al-Anfal 8:60

Like the interconnection between contemporary jihadi material and historic precursors, the original image of the training session also appears in other content. Here it is used in combination with another image of training, also referring to Quran 8:60, emphasizing the mujahidin are obligated to prepare for combat.

The importance of preparing (training) appears frequently in documents from previous iterations of the Jihadi movement, including those by as-Suri (quoted above) and discussed in detail in Zaad e Mujahidin. For example;

Generally the military training ought to be acquired by every healthy Muslim. Even the disabled Muslim could perform various military duties, due to the modern method of warfare….

After the compulsory requirement of the Imaan and the Taqwa, the Mujahid ought to pay careful attention to the following three points:
– Highest standard of military training.
– Obedience.
– Prudence and Contrivance.

Zaad e Mujahidin
The same image was also used after the al-Furqan release of “In the Hospitality of Amirul-Muminin”

Our battle today is a battle of attrition – prolonged for the enemies. They must come to terms that jihad will last until judgement day. And that god commanded for us jihad while not decreeing for us to win. Therefore, we ask god for steadfastness, determination, guidance, righteousness, and success for us and for our brothers.

The Jihadi movement is clear about their aim and purpose, these are constants in their material not ‘latest trends’. As Reuven Paz quoted Indian scholar, Dr. Om Nagpal,

The Mujahidin do not hide their intentions. They do not use diplomatic or apologetic language. On various occasions they have used aggressive language. Repeatedly from the different corners of the world, they have proclaimed in categorical terms that their mission is Jihad. Jihad inspires them. Jihad invigorates them. Jihad gives them a purpose in life. Jihad for them is a noble cause, a sacred religious duty. Jihad is a mission


quoted in;
Paz, Reuven. “The brotherhood of global jihad.” (October , 2001) http://www.e-prism.org

Conclusion

Once the theological underpinning of the Jihadi movement is recognised, interpretation of the imagery can focus on the framework (or Habitus) within which it is created and the concepts which it is intended to communicate.

The dominant narrative among Western governments, policy experts and the mainstream media has been that Al Qaeda and other jihadi groups embrace a violent “ideology,” rather than specific religious doctrines that pervade and drive their agenda.

Rüdiger Lohlker continues,

It is crystal clear to virtually anyone who has the linguistic capacity to grasp and the opportunity to witness what jihadists are actually saying, writing and doing, both online and offline, that religion matters.

The Jihadi movement interprets waging jihad as a religious duty and they consider innovation in religion unacceptable. As a result, Jihadi culture is based on what they consider evidence; evidence rooted in a long tradition of theological writing, divine comandment and historical human acting (i.e. tales of the sahaba and selective readings of the Sunna).

That evidence is the key to an authentic interpretation of the imagery the movement produces. If commentary and academic interpretations cannot explicitly site the evidence and connect their interpretation to the long history of Jihadi theological writing, it risks becoming significantly more about what Western researchers imagine they see; an interpretation trapped in a western habitus rather than an authentic interpretation of the Jihadi movement.

Documents in Caliphate Library

Many Telegram channels and groups operated by Jihadi groups, distribute lengthy Arabic documents.

An analysis of the content shared by one such channel, ‘The Caliphate Library’ Telegram Channel shows how the Jihadi movement thrives on lengthy documents that sets out their theology, beliefs, and strategy.*

Overview of findings:

  • This individual library contained 908 pdf documents, which collectively contain over 111,000 pages. This is far from what one might expect from a movement which thinks in 140 characters, as some Western commentators suggest.
  • In addition to the material produced by Dawlat al-Islamiyya, the channel;
    • republished earlier writing through Maktabat al-Himma, a theological driven publication house of Dawlat al-Islamiyya.
    • shared earlier work produced by al-Qaeda
    • distributed historical and contemporary Salafi writing which intersects with their theology.
  • ISI era is an important part the identity for Dawlat al-Islamiyya – over 15% of the pages in ‘IS media products’ category originate from that period.
  • While 10% of PDF were encrypted, most documents were produced using tools easily available on most modern laptops.
  • Not one of the texts envisages a ‘Jihadist Utopia’ nor proposes a ‘Utopian narrative’. The idea of a ‘Utopian Narrative’ is an artefact of Western misinterpretation. It is not rooted in the texts of of Dawlat al-Islamiyya nor their predecessors.

The following infographic summerises the analysis of over 1000 documents in this Caliphate Library.

*The Caliphate Library is a loose translation of its actual name, as at time of writing the Channel is still live.