Skip to main content
Log in

The rise of Jihadist propaganda on social networks

  • Research Article
  • Published:
Journal of Computational Social Science Aims and scope Submit manuscript

Abstract

Using a dataset of over 1.9 million messages posted on Twitter by about 25,000 ISIS sympathizers, we explore how ISIS makes use of social media to spread its propaganda and recruit militants from the Arab world and across the globe. By distinguishing between violence-driven, theological, and sectarian content, we trace the connection between online rhetoric and key events on the ground. To the best of our knowledge, ours is one of the first studies to focus on Arabic content, while most literature focuses on English content. Our findings yield new important insights about how social media is used by radical militant groups to target the Arab-speaking world, and reveal important patterns in their propaganda efforts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Notes

  1. The percentages of tweets that were labeled under each of the categories and had no stem words from the other three categories ranged from 90 to 96%. This means that most of the tweets that were labeled at this step had stem words just from one category and zero from the others and that majority-rule works well in this situation.

  2. For more on the subject, read chapter eight “The AQ-ISIS War” in [4].

  3. For more on the subject, read Milestones [23].

References

  1. Abdelaziz, S. (2014). Death and desecration in Syria: Jihadist group ‘crucifies’ bodies to send message. CNN, 2 May 2014.

  2. Alajmi, A., Saad, E., & Darwish, R. (2012). Toward an arabic stop-words list generation. International Journal of Computer Applications, 46(8), 8–13.

    Google Scholar 

  3. Allendorfer, W. H. & Herring, S. C. (2015). ISIS vs. the US government: A war of online video propaganda. First Monday, 20(12).

  4. Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World, 3(20), 1–65.

    Google Scholar 

  5. Bermingham, A., Conway, M., McInerney, L., O’Hare, N., & Smeaton, A. F. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In International conference on advances in social network analysis and mining, 2009. ASONAM’09 (pp. 231–236). IEEE.

  6. Bodine-Baron, E., Helmus, T. C., Magnuson, M., & Winkelman, Z. (2016). Examining ISIS support and opposition networks on twitter. Technical report, RAND Corporation Santa Monica United States.

  7. Cohen-Almagor, R. (2013). In internet’s way: Radical, terrorist Islamists on the free highway. International Journal of Cyber Warfare and Terrorism, 2(3), 39–58.

    Article  Google Scholar 

  8. Conover, M. D., Ferrara, E., Menczer, F., & Flammini, A. (2013). The digital evolution of occupy wall street. PLoS ONE, 8(5), e64679.

    Article  Google Scholar 

  9. Davis, C. A., Ciampaglia, G. L., Aiello, L. M., Chung, K., Conover, M. D., Ferrara, E., et al. (2016). OSoMe: The IUNI observatory on social media. PeerJ Computer Science, 2, e87.

    Article  Google Scholar 

  10. Edwards, C., & Gribbon, L. (2013). Pathways to violent extremism in the digital era. The RUSI Journal, 158(5), 40–47.

    Article  Google Scholar 

  11. Farwell, J. P. (2014). The media strategy of ISIS. Survival, 56(6), 49–55.

    Article  Google Scholar 

  12. Ferrara, E. (2017). Contagion dynamics of extremist propaganda in social networks. Information Sciences, 418–419, 1–12.

    Article  Google Scholar 

  13. Ferrara, E., Wang, W.-Q., Varol, O., Flammini, A., & Galstyan, A. (2016). Predicting online extremism, content adopters, and interaction reciprocity. In International conference on social informatics (pp. 22–39). Berlin: Springer.

  14. Fisher, A. (2015). How jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3–20.

    Google Scholar 

  15. Halverson, J. R., Goodall, Jr., H., & Corman, S. R. (2011). In Master narratives of Islamist extremism (pp. 137–148). Berlin: Springer.

  16. Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.

    Article  Google Scholar 

  17. Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online: Examining its effects on adolescents. American Behavioral Scientist, 45(6), 927–957.

    Article  Google Scholar 

  18. Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2010). Winning the battle but losing the war? Narrative and counter-narratives strategy. Perspectives on Terrorism, 3(2), 42–57.

    Google Scholar 

  19. Magdy, W., Darwish, K., & Weber, I. (2016). #FailedRevolutions: Using Twitter to study the antecedents of ISIS support. First Monday, 21(2). ISSN 13960466. http://firstmonday.org/ojs/index.php/fm/article/view/6372.

  20. Morstatter, F., Pfeffer, J., Liu, H., & Carley, K. M. (2013). Is the sample good enough? Comparing data from twitter’s streaming API with Twitter’s Firehose. In International Conference on Weblogs and Social Media (ICWSM) (pp. 400–408).

  21. Payne, K. (2009). Winning the battle of ideas: Propaganda, ideology, and terror. Studies in Conflict & Terrorism, 32(2), 109–128.

    Article  Google Scholar 

  22. Piazza, J. A. (2008). Incubators of terror: Do failed and failing states promote transnational terrorism? International Studies Quarterly, 52(3), 469–488.

    Article  Google Scholar 

  23. Qutb, S. (1964). Ma’alim fi-l-tariq (milestones). Cairo: Dar al-Shuruq.

    Google Scholar 

  24. Rowe, M., & Saif, H. (2016). Mining pro-ISIS radicalisation signals from social media users. In International Conference on Weblogs and Social Media (ICWSM) (pp. 329–338).

  25. Saad, S., Chamoun, M., & Bazan, S. B. (2015). Infowar on the web: When the caliphate goes online. In Proceedings of the ACM web science conference (Art ID. 53). ACM. https://doi.org/10.1145/2786451.2786487.

  26. Saif, H., Dickinson, T., Kastler, L., Fernandez, M., & Alani, H. (2017). A semantic graph-based approach for radicalisation detection on social media. In European semantic web conference (pp. 571–587). Berlin: Springer.

  27. Shane, S., & Hubbard, B. (2014). ISIS displaying a deft command of varied media. The New York Times, 30, 30 Aug 2014.

  28. Smith, A. G., Suedfeld, P., Conway, L. G., III, & Winter, D. G. (2008). The language of violence: Distinguishing terrorist from nonterrorist groups by thematic content analysis. Dynamics of Asymmetric Conflict, 1(2), 142–163.

    Article  Google Scholar 

  29. Stern, J., & Berger, J. M. (2015). ISIS: The state of terror. New York: HarperCollins.

    Google Scholar 

  30. Taghva, K., Elkhoury, R., & Coombs, J. (2005). Arabic stemming without a root dictionary. In International conference on information technology: Coding and computing, 2005. ITCC 2005 (Vol. 1, pp. 152–157). IEEE.

  31. Torok, R. (2013). Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2(1), 6.

    Article  Google Scholar 

  32. Varol, O., Ferrara, E., Ogan, C. L., Menczer, F., & Flammini, A. (2014). Evolution of online user behavior during a social upheaval. In Proceedings of the 2014 ACM conference on Web science (pp. 81–90). New York: ACM.

  33. Weber, I., Garimella, V. R. K., & Batayneh, A. (2013). Secular vs. Islamist polarization in Egypt on Twitter. In Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining (pp. 290–297). New York: ACM.

  34. Winter, C. (2015). Documenting the virtual ‘caliphate’. Quilliam Foundation, 33, 1–50.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adam Badawy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Badawy, A., Ferrara, E. The rise of Jihadist propaganda on social networks. J Comput Soc Sc 1, 453–470 (2018). https://doi.org/10.1007/s42001-018-0015-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s42001-018-0015-z

Keywords

Navigation