Unmasking the Dark Art : An Analysis of Daesh’s Communication Approaches
Keywords:
Strategy, cyber-jihad, Caliphate, countermeasures, propaganda, social mediaAbstract
Cyberspace has emerged as a secure operational domain for Daesh, allowing for seamless communication, validation of their so-called Caliphate, radicalization efforts, recruitment, and the planning and execution of attacks. Despite the development of various counter-strategies aimed at disrupting these activities, Daesh has managed to consistently navigate around them, maintaining its covert influence over global audiences. This study delves into how Daesh has constructed its communication strategies by analyzing its communication infrastructure, propaganda techniques, visual manipulation, and distribution methods. It draws upon Manuel Castells' trilogy on network society, which underscores the significance of networks, identity, and information in today’s world. Adopting a qualitative case study approach, data was gathered through the content analysis of Daesh's print and video media, alongside insights from expert practitioners. The findings show that Daesh utilizes complex language and visual manipulation, often twisting historical and religious narratives to sway its audience. Additionally, it employs a multifaceted dissemination strategy that harnesses advanced technologies and supportive networks to amplify its message and extend its global reach via secure, encrypted online platforms. In conclusion, the study asserts that the pillars of Daesh's communication strategy are ideological dominance, compelling narrative crafting, and the strategic use of technology. To effectively counter this influence, a comprehensive approach is warranted, including inundating online platforms with credible counter-narratives that challenge Daesh's ideology; revising legal frameworks to keep up with the fast-paced technological landscape that transcends borders; and promoting collaboration between security agencies and tech companies to dismantle Daesh's online presence.
References
Al-Rawi, A. (2018). Video games, terrorism, and ISIS’s Jihad 3.0. Terrorism and Political Violence, 30(4), 740–760. https://doi.org/10.1080/09546553.2016.1207633
Amarasingam, A. (2021). The Cloud Caliphate: Archiving the Islamic State in Real-Time. https://doi.org/10.13140/RG.2.2.17165.26080
Baele, S. J. (2019). ISIS Propaganda: A Full-Spectrum Extremist Message. Oxford University Press.
Bockstette, C. (2009). Taliban and Jihadist Terrorist Use of Strategic Communication. Connections: The Quarterly Journal, 08(3), 1–24. https://doi.org/10.11610/Connections.08.3.01
Bouzis, K. (2015). Countering the Islamic State: U.S. Counterterrorism Measures. Studies in Conflict & Terrorism, 38(10), 885–897. https://doi.org/10.1080/1057610X.2015.1046302
Castells, M. (2011). The Power of Identity. John Wiley & Sons.
Cohen, K., & Kaati, L. (2018). Digital Jihad: Propaganda from the Islamic State. Totalförsvarets forskningsinstitut (FOI).
El Ghamari, M. (2017). Pro-Daesh jihadist propaganda. Security and Defence Quarterly, 14(1), 69–90. https://doi.org/10.5604/01.3001.0010.8472
Gambhir, H. (2016). The Virtual Caliphate: ISIS’s Information Warfare. Institute for the Study of War.
Gibson, C. (2023). Islamic state’s online propaganda: A comparative analysis. Defense & Security Analysis, 39(2), 277–278. https://doi.org/10.1080/14751798.2023.2210368
Hummel, K. (2020). Outlasting the Caliphate: The Evolution of the Islamic State Threat in Africa. Combating Terrorism Center at West Point.
Ingram, H. J. (2018). Islamic State’s English-language Magazines, 2014–2017: Trends & Implications for CT-CVE Strategic Communications. Terrorism and Counter-Terrorism Studies.
Kadivar, J. (2020). Daesh and the Power of Media and Message.
Lakomy, M. (2021). Islamic State’s Online Propaganda: A Comparative Analysis. Routledge. https://doi.org/10.4324/9781003143970
Lakomy, M. (2023). Why Do Online Countering Violent Extremism Strategies Not Work? Terrorism and Political Violence, 35(6), 1261–1298. https://doi.org/10.1080/09546553.2022.2038575
Lederer, E. M. (2022). Security Expert Warns UN Africa Could Be Future IS Caliphate. U.S. News.
Macdonald, S., Correia, S. G., & Watkin, A.-L. (2019). Regulating terrorist content on social media. International Journal of Law in Context, 15(2), 183–197.
Maghribi, H., et al. (2023). The Contextual Origin of Ibn Taymiyyah’s Thought on Jihad. Progresiva: Jurnal Pemikiran Dan Pendidikan Islam, 12(01).
Manuel, C., & Gustavo, C. (2005). The Network Society: From Knowledge to Policy.
Mia, B. (2019). Telegram and Online Addiction to Terrorist Propaganda. Minerva Research Initiative.
Mohamedou, M.-M. O. (2017). A Theory of ISIS: Political Violence and the Transformation of the Global Order. Pluto Press.
Nanninga, P. (2018). “Among the Believers Are Men.” Numen, 65(2–3), 165–184.
Oosterveld, W. T., et al. (2017). The Rise and Fall of ISIS: From Evitability to Inevitability. Hague Centre for Strategic Studies.
Reed, A. (2022). Counter-Terrorism Strategic Communications.
Reed, A., & Dowling, J. (2018). The role of historical narratives in extremist propaganda. Defence Strategic Communications, 4(1), 79–104.
Stalder, F. (2006). The Network Paradigm: Social Formations in the Age of Information.
Tatham, S. (2008). Strategic Communication: A Primer.
Volk, S. C., & Zerfass, A. (2018). Alignment: Explicating a Key Concept in Strategic Communication. International Journal of Strategic Communication, 12(4), 433–451.
Weimann, G. (2019). Competition and Innovation in a Hostile Environment. Studies in Conflict & Terrorism, 42(1–2), 25–42.
Weimann, G., & Vellante, A. (2021). The Dead Drops of Online Terrorism. Perspectives on Terrorism, 15(4), 39–53.
Winkler, C., et al. (2021). Dynamic/Static Image Use in ISIS’s Media Campaign. Terrorism and Political Violence, 33(6), 1323–1341.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
The East African Journal of Policy and Strategy is a publication of the Global Centre for Policy and Strategy (GLOCEPS). Our content is disseminated on Open Access Terms.
