Islamic State Supporters Shift From Twitter to Encrypted Messaging

The GW Program on Extremism analyzed nearly 850,000 tweets from Islamic State sympathizers as part of a new report on extremist activity.

October 26, 2017

Twitter was once the preferred platform for the Islamic State (IS), however, the social network’s counter-extremism policies have contributed to a decline in activity by IS supporters. New research from the George Washington University’s Program on Extremism indicates that Twitter’s efforts, including content removal, may have been effective, but IS’s fight on Twitter is far from over.

The Program on Extremism conducted a study of 845,646 tweets by 1,782 English-language pro-IS accounts from Feb. 15, 2016, to May 1, 2017, to examine how IS evolved online. In “Digital Decay,” a report analyzing the dataset, program research fellow Audrey Alexander concludes Twitter’s policies hinder IS sympathizers on the platform. Counter-IS practitioners, however, should not overstate the impact of these measures in the broader fight against the organization online.

Twitter’s approach did successfully undercut the virtual network of IS sympathizers, contributing to a substantive drop in account activity among the users monitored, but the decline was not caused by the company’s efforts alone. IS’s strategic shift from Twitter to messaging platforms that offer encryption services also affected sympathizers’ behavior.

This shift was in part influenced by Twitter’s counter-terrorism measures, but it was also a noticeable trend before the company began to pursue mass suspension of pro-IS accounts.

Although a reduction in IS content on Twitter initially sounds like a positive metric for success, the Program on Extremism report argues that success for a social media company in the fight against the extremist group does not necessarily aid the U.S. government’s efforts against the organization. Silencing IS supporters on Twitter could challenge law enforcement’s ability to detect and disrupt threats posed by violent extremists, Ms. Alexander said.

“As a product of duress, the rope connecting IS’s global base of supporters to the organization’s top-down, central infrastructure is beginning to fray as followers stray from the agenda set for them by strategic communications,” she said. “Our study reveals that despite mounting pressures, IS sympathizers are skilled problem-solvers in the digital sphere. Rather than ruminating over losses, angered adherents fight to be heard, either on Twitter or other platforms.”

IS’s central leadership achieved mixed results in directing discourse among English-language sympathizers on Twitter, the report found.

Battlefield initiatives served as a unifying theme among adherents, but terrorist attacks did little to sustain dialogue. Most notably, current events—like the attempted coup in Turkey and the 2016 presidential election in the United States—were among the most popular topics within the sample. Events unrelated directly to IS caused some of the most significant spikes in activity, the report found.

The study notes, “English-language IS sympathizers on Twitter defy straightforward analysis or convenient solutions.” It also argues that the fight against IS online, a success for tech companies in removing extremist content, is not the same as success for counterterrorism community at large.

“Swift efforts to silence IS supporters on social media may inadvertently produce side effects that challenge the efficacy of policymakers and law enforcement in preventing threats posed by violent extremists,” Ms. Alexander said. “Moreover, such actions do not necessarily affect the core of the movement and its leadership.”

The report suggests entities tasked with countering online extremism and preventing terrorism must be adaptable and willing to pursue alternative ventures. While some collaboration is beneficial, the government cannot rely predominantly on the efforts of social media providers in the fight against IS online.

Twitter and other social media companies should also consider different ways to slow and contain the flow of extremist content and users.

Politics and Society


Extremism Symposium Debates Encryption, Social Media Use

March 28, 2017
The two-day Program on Extremism and GW Law event featured government officials and tech industry leaders.

Female Jihadists Play Critical Roles in Terror Groups

December 02, 2016
A Program on Extremism paper suggests researchers must look beyond gender stereotypes to understand the role of America’s jihadi women.