User:Sarapark/sandbox

= Updated Article Draft =

The Usage of Social Media by Islamic State
Background

The Islamic State also known as ISIS, ISIL, and the Daesh has become an islamic terrorist organization that is know for it’s social media recruitment effort. The group has utilized many forms of provocative online media such as websites, social media platforms, and online magazines/flyers as a method of recruiting followers internationally. They have garnered a strong following through this platform and they have recruited followers from western countries such as the United States, United Kingdom, and Canada. (Citation) All of these efforts has been through the transmission of radical imagery and extremist islamic ideology via social media.

Corporate Social Media Platform Usage

In 2013-2014, the organization primarily used the mainstream platforms: Twitter, Facebook, and Telegram. During 2014, there was an estimated 46,000-90,000 Twitter accounts that advocated for ISIS or were run by supporters of the movement. (Citation 7) In 2015, Twitter was able to ban 125,000 ISIS sympathetic accounts. (Citation Article 2) ISIS utilized a technique called “Jihadist Follow Friday” to encourage their users to follow new ISIS sympathetic accounts each Friday. (Citation 8) To signify this, they used many hashtags in arabic such as: #theFridayofSupportingISIS. This allowed them to gain followers each week and to promote their community and message on a weekly basis. (Citation 7)

After these accounts are banned, ISIS supporters often create new accounts to replace the ones that were previously suspended. Twitter defines those who recreate accounts as “resurgents” and explains that these are often difficult accounts to remove completely, since they tend to pop back up in an alternate form. It is estimated that approximately 20% of all ISIS affiliated Twitter accounts can be traced back to fake accounts created by the same user. Many of these accounts are traced back to the “Baqiya family” which is an online network of thousands of ISIS followers. (Citation Article 8) During important ISIS military victories,  Many of these accounts are traced back to the “Baqiya family” which is an online network of thousands of ISIS followers. [8] During important ISIS military victories, there was a sudden surge of tweets. During the ISIS march on Mosul, there was about 42,000 tweets on Twitter supporting the invasion.

Further, an encrypted messaging platform called Telegram banned dozens of pro-ISIS channels.

The particular videos that ISIS often posts include executions of “enemies of the Caliphate” which often consists of westerners or Jordanian nationals. Most infamously, an executioner named Jihadi John was seen in many of these videos prior to his death in 2017. (Citation)

However, as the November 2015 attacks in Paris demonstrate, IS also uses old-fashioned methods of communication and propaganda. Lewis notes that the attacks in Paris represent the sort of 'propaganda in action' which was a method developed by the 19th century anarchists in Europe. The November 2015 IS attacks were perpetrated without prior warning, largely because the operatives met face-to-face and used other non-digital means of communication. Additionally, it is common for ISIS to claim responsibility of many terror attacks around the world such as the Paris Attacks, the Florida night club shooting, and the Las Vegas attack. (Citation)

Usage of the Dark Web

Since ISIS’s activities on the surface web are now being monitored closely, the jihadists are forced to look for new online safe havens, the Dark Web became the perfect alternative as it is inaccessible to most but navigable for the initiated few, and it is completely anonymous. (Bertrand, 2015) ISIS published a variety of content on the dark web as well as their own internally generated platforms.

In response to corporate social media platforms banning their accounts, ISIS has made their own platform to increase their ability to spread their message. Without the intervention of corporate actors such as Twitter, ISIS has been able to freely spread their messages on their own platforms and websites. In 2017, Europol, the European Police, was able to uncover 52 unique online ISIS networks containing over 2,000 unique extremist items. (Citation 2)

Given certains features of the Dark Web (it requires special browser in order to access, it is also untraceable) tracking down ISIS’s activities on the Dark Web has been extremely difficult for anti terrorism specialists.

Internal Social Media Policy

Ironically, ISIS has undergone procedures to ban their supporters from using social media after they have already been radicalized. Citing mantras such as “command something that the soul dislikes, obeying them is obligatory,” ISIS has been able to keep their followers off the internet. (Citation 3)

Relevant Impacts of ISIS Social Media Usage

ISIS social media posts have mobilized ordinary citizens throughout the world and other radical jihadists groups to act upon their digitized demands. Their methods have worked to effectively recruit younger individuals to join their groups in a consolidated setting. Platforms such as Facebook, Twitter, and Youtube are more impressionable mediums, especially on a younger demographic. For this reason, ISIS strategically places their polished messages on these platforms to attract potential new members from an early age. (Citation 13)

A study about the repercussions of social media demonstrated that there were approximately 1,264 cases that could be categorized as “violent-inciting” examples; in these cases, ISIS social media experts have deliberately posted threatening propaganda to provoke offline aggression (Citation 13). Many “call for action” verbs that have a positive connotation have also been utilized to establish feelings of justification towards any pertinent violence.

Critiques of Movement

Both national governments and corporations have taken a stand against ISIS in both the physical and virtual spheres.

The U.S. Department of State announced an international coalition in 2014, in which they list five lines of effort to expose ISIS. They include:

Providing military support to partners

Impeding the flow of foreign fighters

Stopping financing and funding

Addressing humanitarian crises in the region

Exposing true nature (Citation 16)

Companies are also taking action to hinder Isis social media recruitment attempts. Google’s ThinkTank, Jigsaw, launched a collaboration with Youtube in July, 2017 to redirect any potential recruits using the Redirect Method. (Citation 9)

“The Redirect Method uses Adwords targeting tools and curated YouTube videos uploaded by people all around the world to confront online radicalization. It focuses on the slice of ISIS’ audience that is most susceptible to its messaging, and redirects them towards curated YouTube videos debunking ISIS recruiting themes. This open methodology was developed from interviews with ISIS defectors, respects users’ privacy and can be deployed to tackle other types of violent recruiting discourses online.” (Citation 15)

By using this tactic, Jigsaw catches slogans that manifest any positive ISIS sentiments, like “Baqiyah wa Tatamadad” (Remaining and Expanding), and “Al Dawla Al Islameyah,” which includes “al-Dawla,” a sign of respect. (Citation)

Lastly, Anonymous declared war against ISIS in November of 2015, attempting to thwart the social media recruitment efforts by targeting ISIS’s communication networks. (Citation 17)

Citation

Ingraham, Nathan. “ISIS Created Its Own Social Network to Spread Propaganda.” Engadget, 4 May 2017

Koerner, Brendan I. “Why ISIS Is Winning the Social Media War.” Wired, Conde Nast, 1 May 2017

Dearden, Lizzie. “Isis Bans Fighters from Using Social Media amid Paranoia over Spying and Dissent.” The Independent, Independent Digital News and Media, 22 June 2017

“CHAPTER 13 Recruitment and Radicalization: The Role of Social Media And New Technology.” Center for Complex Operations, Center for Complex Operations, 24 May 2016

Bertrand, Natasha. “ISIS Is Taking Full Advantage of the Darkest Corners of the Internet.” Business Insider, Business Insider, 11 July 2015

“'Jihadi Cool': How ISIS Switched Its Recruitment and Social Media Master Plan.” Fox News, FOX News Network

Berger, Morgan (2015-03-05). "Defining and describing the population of ISIS supporters on Twitter". The Brookings Institution. Retrieved 2016-05-22.

Wright, Shaun; Denney, David; Pinkerton, Alasdair; Jansen, Vincent A.A.; Bryden, John (2016-05-17). "Resurgent Insurgents: Quantitative Research Into Jihadists Who Get Suspended but Return on Twitter". Journal of Terrorism Research. 7 (2). ISSN 2049-7040. doi:10.15664/jtr.1213.

Snider, Mike. “YouTube Redirects ISIS Recruits to Anti-Terrorist Videos.” USA Today, Gannett Satellite Information Network, 20 July 2017

Siegel, Jacob. “ISIS Is Using Social Media to Reach YOU, Its New Audience.” The Daily Beast, The Daily Beast Company, 31 Aug. 2014

Kohlmann, Evan. “Everything You Need to Know about ISIS.” MSNBC, NBCUniversal News Group, 20 Nov. 2015

Sen, Ashish Kumar. “How Do You Disrupt ISIS’ Social Media Strategy and Safeguard Freedoms?” Atlantic Council

Awan, Imran. “Cyber-Extremism: ISIS and the Power of Social Media.” Social Science and Public Policy.

Lister, Tim. “ISIS: What Does It Really Want?” CNN, Cable News Network, 11 Dec. 2015

“The Redirect Method.” The Redirect Method, redirectmethod.org/.

“The Global Coalition To Defeat ISIS.” U.S. Department of State, U.S. Department of State, 10 Sept. 2014, www.state.gov/s/seci/.

Cohen, Paula. “Anonymous Hackers' Group Declares War on ISIS.” CBS News, CBS, 16 Nov. 2015, www.cbsnews.com/news/anonymous-hackers-declare-war-on-isis/.

Peer Edit: Raffi Terteryan
Great job in doing the draft. The information is presented very clearly and your edits are refreshing. I think that the second paragraph starting with, "A study by..." can be reworded to sound less like an essay and more like a wikipedia article. Great use of data in that section. You guys also did a great job making sure to reference scholarly articles. If where it says "citation" it is drawing from the same article as footnotes 15 and 16, maybe try to diversify the information sources. Lastly, a word like "ironically" in the last paragraph make it seem less subjective. Overall, great job with the draft; I'm looking forward to seeing the finished product!

= First Article Draft = We chose to improve an existing article, Terrorism and Social Media, which is an extremely short article with only 29 references. Within this article, there are several components that could be included to fully reflect the way terrorism operates within social media platforms; more specifically, we would like to add extensive information regarding ISIS’s methodology in advancing their goals through these mediums. Terrorist groups like the Islamic State have become one of the most active users of social media; they have gone on to successfully recruit members through platforms like Facebook and Twitter.

Specifically, we hope to cover the topics of ISIS’ social media recruitment strategy, their own social media network, Twitter’s response to their propaganda, and their internal ban on social media for their fighters. Information for these topics will be highlighted in the articles mentioned in last week’s sources assignment. Further, we will cite specific hashtags and analyse the type of videos and propaganda that they created and how it differs from other terrorist groups in the past.

We wish to expand on how ISIS used social media as their online recruitment tool, discuss the potential impact of that, and most importantly, discuss what could be the possible solution to such issues. The references from the original article are mostly from non academic sources like websites and newspapers, as we expand on this article, we will also review the sources, generalize more information from academic sources like literature review and research papers.

Our proposed edit is listed below in the following section in italics. We were able to double the section length by describing some of the key information previously missing from the section.

AQAP and Islamic State (ISIS/ISIL/DAESH)

Islamic State has emerged as one of the most potent users of social media. In many respects, Islamic State learned their propaganda craft from al Qaeda on the Arabian Peninsula (AQAP). However, IS quickly eclipsed its mentor, deploying a whole range of narratives, images and political proselytizing through various social media platforms.[15] The particular videos that ISIS often posts include executions of “enemies of the Caliphate” which often consists of westerners or Jordanian nationals. Most infamously, an executioner named Jihadi John was seen in many of these videos prior to his death in 2017. (Citation)

A study by Berger and Morgan estimated that at least 46,000 Twitter accounts were used by ISIS supporters between September and December 2014.[16] However, as ISIS supporters regularly get suspended and then easily create new, duplicate accounts,[15] counting ISIS Twitter accounts over a few months can overestimate the number of unique people represented by 20–30%.[17] In 2015, Twitter was able to ban 125,000 ISIS sympathetic accounts. Further, an encrypted messaging platform called Telegram banned dozens of pro-ISIS channels.(Citation Article 2)

In response to Twitter and other social media platforms banning their accounts, ISIS has made their own platform to increase their ability to spread their message. Without the intervention of corporate actors such as Twitter, ISIS has been able to freely spread their messages on their own platforms and websites. In 2017, Europol, the European Police, was able to uncover 52 unique online ISIS networks containing over 2,000 unique extremist items. (Citation Article 2)

However, as the November 2015 attacks in Paris demonstrate, IS also uses old-fashioned methods of communication and propaganda. Lewis notes that the attacks in Paris represent the sort of 'propaganda in action' which was a method developed by the 19th century anarchists in Europe. The November 2015 IS attacks were perpetrated without prior warning, largely because the operatives met face-to-face and used other non-digital means of communication. Additionally, it is common for ISIS to claim responsibility of many terror attacks around the world such as the Paris Attacks, the Florida night club shooting, and the Las Vegas attack (citation).

Ironically, ISIS has undergone procedures to ban their supporters from using social media after they have already been radicalized. Citing mantras such as “command something that the soul dislikes, obeying them is obligatory,” ISIS has been able to keep their followers off the internet. (Citation Article 3).

= Finalizing our Topic and Finding Sources = Our Topic: Expand Social Media and Terrorist groups on Terrorism and social media Page

https://en.wikipedia.org/wiki/Terrorism_and_social_media

We will be adding more links to the section (both current news and of academic sources), adding sub-headers specific to ISIS and their hashtags, and general progression of their terrorist movement through these means.
 * Some sources we plan on using:
 * Article: Social Media Strategy of ISIS
 * http://www.tandfonline.com/doi/abs/10.1080/00396338.2014.985436?journalCode=tsur20
 * Provides an in-depth look at ISIS’ overall social media strategy and investigates its’ effectiveness
 * Article: ISIS created its own social network to spread propaganda
 * https://www.engadget.com/2017/05/04/isis-created-its-own-social-network-to-spread-propaganda/
 * This article details ISIS’ effort to work against social media platforms banning their material. Adding evidence from this article would be helpful to explain that ISIS is making it’s own social media platform
 * Article: Why ISIS is winning the social media War
 * https://www.wired.com/2016/03/isis-winning-social-media-war-heres-beat/

Researching the social media mechanisms used by terror group ISIS.
https://en.wikipedia.org/wiki/User:Breezelily/sandbox

= Article Evaluation: Black Lives Matter = Black Lives Matter

This article has a thoroughly written documentation regarding the Black Lives Matter movement and all of its noteworthy events from its inception until present day. I was especially surprised to see that this page lists all of the genres of criticisms the movement has received. A section including details on the qualities of the three founders and how that shaped the movement to represent not only black, but female, queer, and the marginalized would have provided great insight on why the movement was founded this way.
 * Relevance: The article featured all of the possible information that is associated with the Black Lives Matter movement, including all of the other movements that sprouted out of Black Lives Matter. These views were also represented in a neutral voice, and were factually cited with quotes, and poll data.
 * Tone: The article remained neutral, focusing on dates, metrics, and objectives of events.
 * Viewpoints: Both viewpoints (positive and negative) were represented throughout the article, which I appreciated.
 * Structure: One thing I noticed was that the 2016 Presidential Election had its own section and header, despite the fact that there was a separate timeline detailing the major BLM involvements throughout the year. I felt that the information covered in this section would have flowed better and chronologically would have made sense under that timeline.
 * Citations: All of the citations I randomly selected worked, and were links to official sources. I appreciated that each new idea written was immediately followed by a citation to a credible source.
 * Talk Page: There was no active Talk page, but it did provide me with the information that this article was the subject of a Wiki Education Foundation-supported course assignment.
 * Talk Page: There was no active Talk page, but it did provide me with the information that this article was the subject of a Wiki Education Foundation-supported course assignment.