Abstract
Although ISIS was driven out of its last territory in Syria and its physical caliphate collapsed in 2019, recent terrorist attacks and incidents in various areas, such as Central Africa, and recently designated terrorists by the Department of State signify the presence and growth of ISIS affiliates. Yet, once under scrutiny, their whereabouts have been less known and studied since then. In this paper, we aim to reopen this line of investigation to further our understanding of the recent ISIS online presence. We collect and analyze a longitudinal dataset of tweets from potential ISIS affiliates and an existing dataset of ISIS Twitter activities around 2015—when Twitter cracked down on many ISIS accounts. We build a user classifier to identify ISIS supporters on Twitter. We further investigate different types of content and topics used by known ISIS accounts and compare these attributes among ISIS and its potential affiliates. We also identify messages that gained abnormal attention and support and presumably were used to spread propaganda and influence and manipulate the online community. Finally, we build and evaluate an image classifier using the residual network pretrained image classification models to categorize the photos attached to the candidate propaganda tweets of ISIS and identify the major themes in those media files.
Similar content being viewed by others
Notes
Also known as the Islamic State in Iraq and al-Sham, the Islamic State of Iraq and the Levant (ISIL), the Islamic State (IS), and in Arabic, Daesh (an acronym formed from the initial letters of the group’s previous name in Arabic—“al-Dawla al-Islamiya fil Iraq wa al-Sham”—which means to tread underfoot, trample down, or crush something, and sounds unpleasant to their supporters) is a militant Sunni Islamist extremist group that follows a Salafi jihadist doctrine.
As of 2021, four Twitter users with similar usernames of @CtrlSec (https://twitter.com/CtrlSec), @CtrlSec0, @CtrlSec1, and @CtrlSec2 are directly associated to this campaign.
We used https://www.wordclouds.com to generate the word clouds.
This uniqueness is solely based on the tweet IDs, the author of the tweets, and the media keys. We did not remove photos that are visual duplicates.
IS-K or ISIS-K stands for the Islamic State - Khorasan Province.
Twitter Moderation Research Consortium: https://transparency.twitter.com/en/reports/moderation-research.html
References
Ahmad S, Asghar MZ, Alotaibi FM, Awan I (2019) Detection and classification of social media-based extremist affiliations using sentiment analysis techniques. HCIS 9:1–23
Aïmeur E, Amri S, Brassard G (2023) Fake news, disinformation and misinformation in social media: a review. Soc Netw Anal Min 13(1):30
Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2019) A large-scale study of ISIS social media strategy: community size, collective influence, and behavioral impact. Proc Int AAAI Conf Web Soc Med 13(01):58–67
Alfifi M, Kaghazgaran P, Caverlee J, Morstatter F (2018) Measuring the impact of isis social media strategy. MIS2. Marina Del Ray, California
Amarasingam A (2020) Telegram Deplatforming ISIS Has Given Them Something to Fight for. https://www.voxpol.eu/telegram-deplatforming-isis-has-given-them-something-to-fight-for. [Online; accessed 9-January-2022]
Badawy A, Ferrara E (2017) The rise of jihadist propaganda on social networks. SSRN Electron J. https://doi.org/10.2139/ssrn.2982256
Barrón-Cedeno A, Jaradat I, Da San Martino G, Nakov P (2019) Proppy: organizing the news based on their propagandistic content. Inform Process Manag 56(5):1849–1864
Benigni M, Carley KM (2016) From tweets to intelligence: Understanding the islamic jihad supporting community on twitter. In: Social, Cultural, and Behavioral Modeling: 9th International Conference, SBP-BRiMS 2016, Washington, DC, USA, June 28-July 1, 2016, Proceedings 9, pp. 346–355. Springer
Berger JM, Morgan J (2015) The ISIS twitter census: defining and describing the population of ISIS supporters on twitter. Brook Project US Relations Islamic World 3(20):1–42529
Berger J, Strathearn B (2013) Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks
Bolsover G, Howard P (2017) Computational propaganda and political big data: Moving toward a more critical research agenda. Mary Ann Liebert, Inc. 140 Huguenot Street, 3rd Floor New Rochelle, NY 10801 USA
Brooking ET (2015) Anonymous vs. The Islamic State. https://foreignpolicy.com/2015/11/13/anonymous-hackers-islamic-state-isis-chan-online-war. [Online; accessed 10-January-2022]
Chu Z, Gianvecchio S, Wang H, Jajodia S (2012) Detecting automation of twitter accounts: Are you a human, bot, or cyborg? IEEE Trans Dependable Secure Comput 9(6):811–824
Comito C (2021) How covid-19 information spread in us? The role of twitter as early indicator of epidemics. IEEE Trans Serv Comput 15(3):1193–1205
Corera G (2020) ISIS ’still evading detection on Facebook’, report says. https://www.bbc.com/news/technology-53389657. [Online; accessed 23-February-2023]
Dalton A, Aghaei E, Al-Shaer E, Bhatia A, Castillo E, Cheng Z, Dhaduvai S, Duan Q, Hebenstreit B, Islam MM, et al(2020) Active defense against social engineering: The case for human language technology. In: Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, pp. 1–8
Darwish MA (2019) From Telegram to Twitter: The Lifecycle of Daesh Propaganda Material. https://www.voxpol.eu/from-telegram-to-twitter-the-lifecycle-of-daesh-propaganda-material. [Online; accessed 13-January-2022]
Farrall L (2019) The fall of the ISIS ‘caliphate’. https://www.cnn.com/2023/02/17/politics/us-troops-wounded-syria-isis/index.html. [Online; accessed 22-February-2023]
Fernandez M, Alani H (2018) Contextual semantics for radicalisation detection on twitter. In: Semantic Web for Social Good Workshop (SW4SG) at International Semantic Web Conference 2018, vol. 2182. CEUR Workshop Proceedings
Ferrara E, Wang W-Q, Varol O, Flammini A, Galstyan A (2016) Predicting online extremism, content adopters, and interaction reciprocity. In: Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II 8, pp. 22–39. Springer
Gaikwad M, Ahirrao S, Phansalkar S, Kotecha K (2021) Online extremism detection: a systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools. IEEE Access 9:48364–48404
Grave E, Bojanowski P, Gupta P, Joulin A, Mikolov T (2018) Learning word vectors for 157 languages. In: Proceedings of the International Conference on Language Resources and Evaluation (LREC 2018)
Hern A (2015) Anonymous ’at war’ with Isis, hacktivist group confirms. https://www.theguardian.com/technology/2015/nov/17/anonymous-war-isis-hacktivist-group-confirms. [Online; accessed 10-January-2022]
He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778
How to detect propaganda (1938) In Publications of the Institute for Propaganda Analysis, 210–218
Hristakieva K, Cresci S, Da San Martino G, Conti M, Nakov P (2022) The spread of propaganda by coordinated communities on social media. In: 14th ACM Web Science Conference 2022, pp. 191–201
International Assoc of Chiefs of Policec. IA, of Operations B, Research of America US. (1975) Clandestine tactics and technology-a technical and background intelligence data service, volume 3
Karimi Y, Squicciarini A, Wilson S (2022) Automated detection of doxing on twitter. Proc ACM Hum-Comput Interact 6(CSCW2):1–24
Karimi Y, Squicciarini A, Forster PK, Leavitt KM (2022) A longitudinal dataset of twitter isis users. arXiv preprint arXiv:2202.00878
Krizhevsky A (2014) One weird trick for parallelizing convolutional neural networks. arXiv preprint arXiv:1404.5997
Liebermann O (2023) 4 US troops wounded in Syria raid that killed senior ISIS leader on Thursday. https://www.cnn.com/2023/02/17/politics/us-troops-wounded-syria-isis/index.html. [Online; accessed 22-February-2023]
Lotan G, Graeff E, Ananny M, Gaffney D, Pearce I et al (2011) The Arab spring\(\vert\) the revolutions were tweeted: information flows during the 2011 Tunisian and Egyptian revolutions. Int J Commun 5:31
Magdy W, Darwish K, Weber I (2015) # failedrevolutions: Using twitter to study the antecedents of isis support. arXiv preprint arXiv:1503.02401
Martino GDS, Yu S, Barrón-Cedeño A, Petrov R, Nakov P (2019) Fine-grained analysis of propaganda in news articles. arXiv preprint arXiv:1910.02517
McMinimy K, Winkler CK, Lokmanoglu AD, Almahmoud M (2021) Censoring extremism: influence of online restriction on official media products of isis. Terrorism and Political Violence, 1–17
Mehrotra S, Squicciarini AC, Serra E, Karimi Y (2022) Covid-19 and haters-a user model perspective. In: 2022 IEEE 9th international conference on data science and advanced analytics (DSAA), pp. 1–9. IEEE
Meleagrou-Hitchens A, Hughes S (2017) The threat to the united states from the islamic state’s virtual entrepreneurs. CTC Sentinel 10(3):1–8
Moussaoui M, Zaghdoud M, Akaichi J (2019) A possibilistic framework for the detection of terrorism-related twitter communities in social media. Concurr Compu: Pract Exp 31(13):5077
Murugan P, Karimi Y, Squicciarini A, Griffin C (2021) Modeling longitudinal behavior dynamics among extremist users in twitter data. In: 2021 IEEE international conference on big data (Big Data), pp 4906–4914. IEEE
Office GP (2016) ISIS Online: Countering Terrorist Radicalization and Recruitment on the Internet and Social Media. https://www.gpo.gov/fdsys/pkg/CHRG-114shrg22476/content-detail.html. [Online; accessed 9-January-2022]
Rasheed A (2021) Turkish intelligence helped Iraq capture Islamic State leader, sources say. https://www.reuters.com/world/middle-east/exclusive-turkish-intelligence-helped-iraq-capture-islamic-state-leader-sources-2021-10-12. [Online; accessed 22-February-2023]
Rashkin H, Choi E, Jang JY, Volkova S, Choi Y (2017) Truth of varying shades: Analyzing language in fake news and political fact-checking. In: Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, pp. 2931–2937
Saif H, Dickinson T, Kastler L, Fernandez M, Alani H (2017) A semantic graph-based approach for radicalisation detection on social media. In: The Semantic Web: 14th International Conference, ESWC 2017, Portorož, Slovenia, May 28–June 1, 2017, Proceedings, Part I 14, pp. 571–587. Springer
Smith H (2015) Shocking images of drowned Syrian boy show tragic plight of refugees. https://www.theguardian.com/world/2015/sep/02/shocking-image-of-drowned-syrian-boy-shows-tragic-plight-of-refugees. [Online; accessed 26-December-2021]
Starbird K, Palen L (2012) (how) will the revolution be retweeted?: information diffusion and the 2011 egyptian uprising. In: Proceedings of the Acm 2012 conference on computer supported cooperative work, pp 7–16. ACM
Tan R (2017) Terrorists’ love for Telegram, explained. https://www.vox.com/world/2017/6/30/15886506. [Online; accessed 21-May-2023]
Tribe F (2015) How ISIS Uses Twitter. https://www.kaggle.com/fifthtribe/how-isis-uses-twitter. [Online; accessed 9-January-2022]
Vidino L, Hughes S (2015) ISIS in America: From Retweets to Raqqa (George Washington University: Program on Extremism, 2015) 7
Weirman S, Alexander A (2020) Hyperlinked sympathizers: Urls and the islamic state. Stud Conflict Terrorism 43(3):239–257
Wolfgang B (2021) Pentagon ramps up attacks on resurgent ISIS: ‘It is not defeated’. https://www.washingtontimes.com/news/2021/apr/6/pentagon-ramps-attacks-resurgent-isis-it-not-defea. [Online; accessed 26-February-2023]
Yu S, Di Pietro R, Nakov P (2020) A survey on computational propaganda detection
Zhang J, Zhang R, Zhang Y, Yan G (2016) The rise of social botnets: attacks and countermeasures. IEEE Trans Dependable Secure Comput 15(6):1068–1082
Acknowledgements
This work was funded by the National Science Foundation under grant number 1909255.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Karimi, Y., Squicciarini, A. & Forster, P.K. A longitudinal dataset and analysis of Twitter ISIS users and propaganda. Soc. Netw. Anal. Min. 14, 19 (2024). https://doi.org/10.1007/s13278-023-01177-7
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13278-023-01177-7