Terrorism The Internet and Propaganda FINAL
Terrorism The Internet and Propaganda FINAL
INTRODUCTION
The Internet provides a relatively unregulated and unrestricted place where
terrorists can craft and disseminate propaganda through seemingly limitless
numbers of websites and social media platforms, tailoring their pitch so as to
target thousands of potential new recruits to join their organization and further
their cause. ISIS, in particular, produces the most technologically advanced
propaganda yet. Through sophisticated digital means, they have promoted the
idea that ISIS has successfully established a caliphate and recruited thousands
of new members to join the terrorist organization. ISIS films, which range from
minutes to hours long, use Hollywood-style production tricks and special effects
to portray ISIS terrorists as heroes and depict fighting for ISIS as akin to
playing in a real-life video game. These violent and gruesome depictions are
sent out alongside pictures and posts describing romantic, exciting encounters
and riches enjoyed by ISIS youth. ISIS propaganda combines the horrifying and
tantalizing to deliberately target young adults through social media, portraying
life in ISIS territory as glamorous and utopian, and its members as heroic and
desirable. Such propaganda fails to disclose the harsh realities of life in ISIS or
ISIS-perpetrated atrocities.
Efforts to thwart this propaganda in its many forms thus far have been
relatively unsuccessful. For instance, it has not been sufficient to suspend
pro-ISIS social media accounts; new pro-ISIS accounts quickly spring up to
replace them. Likewise, law enforcement efforts to stop potential ISIS recruits
at airports can only do so much; they cannot successfully prevent every
would-be recruit from traveling to join ISIS. Even the Material Support Statute
has its drawbacks as a tool for countering ISIS propaganda. Prosecuting individu-
als for promoting and distributing ISIS propaganda under the Statute, for
instance, may have the more harmful effect of chasing other terrorists to sites
that are more difficult for law enforcement to monitor. Lack of available time
and resources plays a role, too. Hence, Twitter might suspend the accounts of
only those users who have the most outrageous or highest quantities of postings,
leaving behind many dangerous but more scrupulous users. Furthermore, dissemi-
* Ariel V. Lieberman graduated with distinction from Georgetown University Law Center’s JD/LLM
program in National Security Law in May 2016. She is admitted to practice in Vermont and the District
of Columbia, and is currently an associate at Kirkland & Ellis in their International Trade and National
Security practice group in Washington, DC. © 2017, Ariel Victoria Lieberman.
95
96 JOURNAL OF NATIONAL SECURITY LAW & POLICY [Vol. 9:95
nating propaganda on the Internet would not necessarily satisfy the terms of the
Material Support Statute, especially if the user cannot be shown to have
coordinated with ISIS.
This paper proposes a multi-faceted approach for combatting ISIS propa-
ganda focusing primarily on counter-propaganda measures that expose the
reality of living conditions in an ISIS society and poke holes in ISIS’s false veil
of legitimacy and power. Some such measures already have been taken. For
instance, the Center for Strategic Counterterrorism Communications – an initia-
tive within the U.S. Department of State – along with a small number of
individuals have tried to expose the truth behind ISIS and to ridicule the
organization. However, these measures have not proven to be particularly
effective. Such measures need to be plentiful enough to not get buried beneath
pro-ISIS propaganda. Counter-propaganda should avoid appearing biased and
utilize a credible communicator. It should target the powerful lures that attract
teenagers to ISIS. Furthermore, while counter-propaganda measures should aim
to flood social media, social media sites such as Twitter should use a more
discerning approach, e.g., they should be selective about suspending accounts
so as to avoid pushing pro-ISIS users onto encrypted communication platforms.
Law enforcement officials should also be selective: they must use care when
considering propaganda as a basis for prosecuting material support cases;
otherwise, they could undermine the Government’s legitimacy by prosecuting
untenable cases. However, suspensions and prosecutions may be useful in at
least temporarily preventing dangerous propaganda from reaching teenagers and
thus should not be completely abandoned.
I. WHAT IS PROPAGANDA?
Propaganda has been defined in many different ways and can take on a
variety of forms. For example, the United States military defines propaganda as
“[a]ny form of communication in support of national objectives designed to
influence the opinions, emotions, attitudes, or behavior of any group in order to
benefit the sponsor, either directly or indirectly.”1 Merriam-Webster defines
propaganda as a “dissemination of ideas, information, or rumor for the purpose
of helping or injuring an institution, a cause, or a person.”2 According to
Black’s Law Dictionary, propaganda is “the systematic dissemination of doc-
trine, rumor or selected information to promote or injure a particular doctrine,
view, or cause.”3 These definitions of propaganda are very broad and can
encompass a wide range of positive and negative activity. Thus, it is helpful to
1. Peter J. Smyczek, Regulating the Battlefield of the Future: The Legal Limitations on the Conduct
of Psychological Operations (PSYOP) Under Public International Law, 57 A.F.L.REV. 209, 215 (2005)
(citing Joint Chiefs of Staff, Joint Pub. 1-02, Department of Defense Dictionary of Military and
Associated Terms 427-428 (12 Apr. 2001)).
2. Propaganda, WEBSTER’S THIRD NEW INTERNATIONAL DICTIONARY (1961).
3. Propaganda, BLACK’S LAW DICTIONARY (10th ed. 2014).
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 97
break down the term propaganda into smaller, workable categories to under-
stand the various forms in which propaganda appears.
Propaganda can be categorized in a variety of ways. For example, propa-
ganda can be categorized according to the source of the message. “White
propaganda” refers to “messages issued from an open and acknowledged source,
targeting a specific audience and not hiding the source.”4 “Black propaganda”
refers to messages from an unknown source, often based on lies or fabrications.5
“Gray propaganda” is neither completely true nor completely false, and does
not specifically identify its source.6
International human rights literature categorizes prohibited propaganda as
either 1) defamatory propaganda, 2) subversive propaganda, or 3) propaganda
or incitement to aggressive war or genocide.7 Defamatory propaganda refers to
“communications that tend to ‘degrade, revile, and insult’ foreign states, their
institutions, leaders or other agents with the intent to disturb the peaceful
relations between states.”8 Subversive propaganda refers to “communications
intending to overthrow the political leader, or existing internal political order of
a state,” which violates the international norm of non-interference in the internal
affairs of a sovereign state.9 Propaganda or incitement to aggressive war or
genocide refers to communications “intending to implant in the minds of people
a disposition or desire to engage in or normalize unlawful violence.”10 Although
ISIS has engaged in all three of these types of propaganda, the one most
relevant to this paper is this third category of propaganda.
Propaganda can be effective at winning the hearts and minds of populations if
it is used effectively. However, if used ineffectively, and its origin made too
obvious, propaganda may result in unanticipated negative consequences for the
originating entity, referred to as blowback in the intelligence community.11
Thus, any counter-propaganda by the United States against ISIS, for example,
by planting a false story about its members, must be wary of the potential for it
to cause more harm than good. The potential for blowback is especially high in
the 21st century as twenty-four hour news and the Internet have made accessing
information faster and easier and more difficult for the government to prevent.
Furthermore, despite the fact that so many people are exposed to the conditions
sometimes associated with generating terrorism, such as presence in a conflict
zone or religious ideology, most individuals do not become radicalized to the
point that they engage in terrorism.29 However, certain predisposing risk factors
are associated with involvement in terrorism. These factors include: the pres-
ence of some emotional vulnerability, alienation, or disenfranchisement; dissatis-
faction with the one’s current life situation and the perception that conventional
political activity is useless to improve it; identification with certain perceived
victims; the belief that engaging in violence against the state is not inherently
immoral; and a sense of kinship with those experiencing similar issues.30 A
factor of particular importance is that recruits expect a sense of reward from
being involved with terrorism.31 This reward may come in the form of height-
ened status, respect, or authority within an individual’s immediate peer group,
broader racial movement, or wider religious community, or personal spiritual or
emotional reward.32 For example, suicide bombers typically believe that they
will be rewarded in the afterlife.33
Individual characteristics and motivations are not the only considerations
relevant to understanding why a given individual may become radicalized.
Instead of looking solely at predisposing risk factors, some researchers have
proposed assessing the common features associated with the development of a
terrorist.34 These features include, but are not limited to, “the gradual nature of
the relevant socialization processes into terrorism . . . . the supportive qualities
associated with that recruitment . . . . migration between roles . . . [and] the
importance of role qualities.”35
In certain communities, the relevant socialization process into terrorism
begins at a very young age, with propaganda playing a large role. For example,
there are accounts of Palestinian neighborhoods where graffiti glorifies suicide
bombers and calendars are illustrated with the “martyr of the month.”36 Role
models can serve as an important source of authoritative legitimacy for the
justification of violent action.37 Enhanced status among an immediate circle of
activists and the broader supportive community can be a powerful incentive for
sustaining commitment.38 For some individuals, a sense of approval from a
significant individual, such as a wife or brother, is a catalyst into more extreme
29. John Horgan, From Profiles to Pathways and Roots to Routes: Perspectives From Psychology on
Radicalization into Terrorism, 618 ANNALS AM. ACAD. POL. & SOC. SCI. 80, 83 (2008).
30. Id. at 84-85.
31. Id. at 85.
32. Id.
33. Id.
34. Id.
35. Id. at 84.
36. Id. at 88.
37. Id.
38. Id.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 101
behavior.39
Increased involvement in a terrorist organization typically follows a period of
gradual progression.40 An increased commitment to the group’s narrow, extrem-
ist society consequently results in more marginalization from conventional
society.41 Commitments are often solidified as life inside the terrorist organiza-
tion becomes more challenging and the individual convinces him or herself that
the need to “stick it out” is essential.42
47. Id.
48. Knox, supra note 45, at 300.
49. Id.
50. Id.
51. Gregory S. McNeal, Cyber Embargo: Countering the Internet Jihad, 39 CASE W. RES. J. INT’L L.
789, 800 (2007-2008).
52. Id. at 795.
53. Id. at 796.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 103
ist propaganda that might be filtered out on Twitter due to its violent or graphic
nature can be transmitted freely through encrypted platforms.
ISIS has gone so far as to establish the “Al Hayat Media Center” in which
generates media specifically aimed at non-Arabic speakers, particularly younger
viewers. Its output resembles that of mainstream broadcasts,66 though their
videos are distinguished by glossy identifying marks: either a teardrop-shaped
logo of Arabic script materializing from a digital cascade of water67 or a black
and white ISIS flag in the corner of the screen.68 The Center makes videos in
several different languages and formats, including everything from minute-long
Twitter-friendly “mujatweets” to hour-long Hollywood-style documentaries show-
casing special effects and action scenes.69 It also publishes audio content and
Dabiq, an English-language PDF magazine.70 Al Hayat Media’s programming
includes a jihadi-type travel show called “Eid Greetings from the Land of
Khilafah,” filmed in Raqqa, Syria, which features ISIS fighters from Western
countries proclaiming how happy they are to be there.71 The show ends with the
sign-off: “I wish you were here.”72 “The Flames of War,” ISIS’s feature-length
film, glorifies ISIS’s “military heroism” with gruesome footage and poetic
verse.73 The more violent images of the film have been edited into a rapid-fire
action montage accompanied by a recruitment hymn.74 This film, like other ISIS
creations, implies that warfare is a real-life game of “Grand Theft Auto.”75
These films include little evidence of ISIS atrocities such as abduction, rape,
destruction of mosques, persecutions, crucifixions, and the whipping of women
who were caught without a hijab.76
The ISIS propaganda machine produces as many as 90,000 posts on Twitter,
YouTube, Facebook, and many other social media platforms every single day.77
Twitter, the San Francisco-based social media network, has more than 288
million active users worldwide,78 and is by far the most popular platform for
ISIS propaganda. Recently, Twitter has tried to thwart ISIS threats, propaganda,
and recruiting efforts by suspending accounts linked to the group, but these
efforts have not stopped ISIS sympathizers from maintaining thousands of
66. Steve Rose, The ISIS Propaganda War: A Hi-Tech Media Jihad, THE GUARDIAN (Oct. 7, 2014),
http://www.theguardian.com/world/2014/oct/07/isis-media-machine-propaganda-war.
67. Id.
68. Id.
69. Id.
70. Id.
71. Id.
72. Id.
73. Id.
74. Id.
75. Id.
76. Id.
77. Calls Mount for Shutdown of ISIS Propaganda Machine as London Girls Vanish, CBS NEW
YORK (Feb. 20, 2015, 5:17 PM), http://newyork.cbslocal.com/2015/02/20/calls-mount-for-shutdown-of-
isis-propaganda-machine-as-london-girls-vanish/.
78. Rick Gladstone & Vindu Goelmarch, ISIS Is Adept on Twitter, Study Finds, N.Y. TIMES (Mar. 5,
2015), http://www.nytimes.com/2015/03/06/world/middleeast/isis-is-skilled-on-twitter-using-thousands-
of-accounts-study-says.html?_r⫽1.
106 JOURNAL OF NATIONAL SECURITY LAW & POLICY [Vol. 9:95
active accounts on the social network.79 Twitter’s efforts against ISIS have led
to death threats against the social media company’s leaders and employees.
In a recent paper, J.M. Berger and Jonathon Morgan of the Brookings
Institute presented a demographic snapshot of ISIS supporters on Twitter by
analyzing a sample of 20,000 ISIS-supporting Twitter accounts.80 They found,
amongst other things, that between September and December 2014, an esti-
mated 46,000 Twitter accounts were used by ISIS supporters, and at least 1,000
ISIS-supporting Twitter accounts were suspended during this time.81 Embedded
location metadata revealed that approximately one in five ISIS supporters
selected English as their primary language when using Twitter, and three
quarters of users selected Arabic.82 Each ISIS-supporting account had an aver-
age of about 1,000 “followers” (individuals who subscribe to a given Twitter
user’s postings), far more than an average Twitter user would have.83 Further-
more, ISIS-supporting accounts were much more active than those of non-
supporting users.84 A relatively small group of Twitter users, overseeing between
500 and 2,000 accounts, post their “tweets” in concentrated bursts of high
volume, a tactic so effective that they are responsible for much of ISIS’s social
media success.85
79. Id.
80. J.M. Berger & Jonathon Morgan, The ISIS Twitter Census, BROOKINGS (Mar. 2015), http://www.
brookings.edu/research/papers/2015/03/isis-twitter-census-berger-morgan.
81. Id.
82. Id.
83. Id.
84. Id.
85. Id.
86. Cottee, supra note 43.
87. Scott Shane, Minneapolis to ISIS: An American’s Path to Jihad, NYTIMES.COM (Mar. 21, 2015),
http://www.nytimes.com/2015/03/22/world/middleeast/from-minneapolis-to-isis-an-americans-path-to-
jihad.html.
88. Id.
89. Id.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 107
travel to Syria to fight for the terrorist group. Two dozen other young Americans
are believed to either be with ISIS or to have been killed in the fighting.90 Three
teenage girls from Denver, ages 15, 16, and 17, were stopped in Germany in
October 2014, reportedly on their way to Syria to join ISIS.91 In mid-February,
three British schoolgirls, ages 15 and 16, were reported missing after taking a
flight to Turkey, apparently on their way to join ISIS.92
Teenagers who have been caught at airports attempting to leave the United
States to join ISIS have provided a variety of explanations for doing so. For
example, Shannon Conley, 19, was stopped by the F.B.I. in Denver.93 She
thought she could use her skills as a nurse’s aide to help ISIS fighters, and had
hoped to marry a Tunisian recruiter for ISIS whom she had met online.94
Mohammed Hamzah Khan, 19, was stopped with his younger brother and sister
in Chicago.95 Khan left his parents a letter saying he could not stay in the
United States because his taxes might be used to kill Muslims overseas.96 Some
young Americans who have successfully traveled to join ISIS have commented
about their new life on Twitter. For example, a Muslim convert from San
Francisco who calls herself “Chloe” appears to have married a Welsh fighter
who joined Nusra Front.97 She posts pictures of their cat along with expressions
of marital devotion, religious exclamations, and light-hearted remarks about her
life in Syria.98
President Obama and Secretary of State John Kerry have publicly recognized
that ISIS is targeting young people through its propaganda. According to
President Obama, it is crucial to shut down the ISIS propaganda machine that is
attracting the young recruits.99 In February 2015, at a Washington summit on
Countering Violent Extremism, President Obama stated that “[t]errorist groups
like al-Qaeda and ISIL deliberately target their propaganda in the hopes of
reaching and brainwashing young Muslims, especially those who may be
disillusioned or wrestling with their identity.”100 “The high-quality videos, the
online magazines, the use of social media, terrorist Twitter accounts – it’s all
designed to target today’s young people online,” said President Obama.101
Secretary of State John Kerry, while addressing a White House Summit, stated
90. FBI: ISIS message resonating with young people from U.S., West, CBS NEWS (Mar. 5, 2015, 8:15
PM), http://www.cbsnews.com/news/isis-targeting-young-people-from-u-s-western-countries-as-recruits/.
91. Id.
92. Id.
93. Id.
94. Id.
95. Id.
96. Id.
97. Id.
98. Id.
99. Id.
100. Kathy Gilsinan, Is ISIS’s Social Media Power Exaggerated?, THE ATLANTIC (Feb. 23, 2015, 7:05
AM), http://www.theatlantic.com/international/archive/2015/02/is-isiss-social-media-power-exaggerated/
385726/.
101. Id.
108 JOURNAL OF NATIONAL SECURITY LAW & POLICY [Vol. 9:95
that “Those recruiting for ISIS are not looking for people who are devout and
knowledgeable about the tenants of Islam . . . [t]hey’re looking for people gull-
ible enough to believe that terrorists enjoy a glamorous lifestyle.”102
ISIS is recruiting more than just fighters: the group is using propaganda to
attract potential wives and professionals such as doctors, engineers, and accoun-
tants, as part of its plan to build a new “utopian” society.103 ISIS propaganda
varies, then, depending on the target audience, and is calculated to attract young
individuals to serve a variety of purposes, luring them in through a range of
deceptive strategies. While the group’s violent, outrageous propaganda draws
the most attention, the most dangerous propaganda may arguably be that which
attempts to glamorize and normalize life in ISIS as a way of recruiting
teenagers.104
The propaganda that targets potential jihadi brides tends to romanticize life in
ISIS. It presents ISIS as espousing gender equality and offering a positive place
for women and families. For example, in early March 2015, a Western “jihadi
bride” posted a picture in which she and other ISIS women posed around a
luxury BMW, brandishing guns much like their male counterparts.105 This
image, which suggests power and a sense of equality among male and female
militants, is in stark contrast with the situation revealed in recent ISIS docu-
ments that indicate that women are heavily monitored and treated as inferior to
men.106 Other pictures have attempted to portray ISIS as pro-family by showing
ISIS fighters enjoying an average family life and playing with children in the
sunshine.107 In 2014, at least 100 French women were recruited to join ISIS as
either jihadi brides or suicide bombers.108 The propaganda targeting women
likely played a large role in recruiting them.
Propaganda aimed at men also often portrays life in ISIS as utopian For
example, a fighter posted a picture on Twitter of himself and other young male
ISIS fighters in Raqqa, relaxing and laughing together, with the caption “broth-
ers enjoying a day in the sun.”109 Such propaganda attempts to normalize
militants and their daily activities in order to construct an idyllic image of life in
102. Rebecca Kaplan, ISIS Recruiting Teenagers: Why the Government is Sounding the Alarm, CBS
NEWS (Mar. 10, 2015, 6:00 AM), http://www.cbsnews.com/news/isis-recruiting-teenagers-why-the-
government-is-sounding-the-alarm/.
103. Eric Tucker, Islamic State Recruits More than Just Fighters, BOSTON GLOBE (Dec. 17, 2014),
http://www.bostonglobe.com/news/world/2014/12/16/islamic-state-recruits-more-than-just-fighters/Wu
34jcNUyj4HSiNqrDxIOI/story.html.
104. Heather Saul, The Most Dangerous ISIS Propaganda Yet?, THE INDEPENDENT (Mar. 20, 2015),
http://www.independent.co.uk/news/world/middle-east/the-most-dangerous-isis-propaganda-yet-
jihadi-brides-with-m5s-fighters-relaxing-and-children-playing-used-to-present-caliphate-as-a-utopia-
10121653.html.
105. Id. The article also describes, for example, a photograph of young men captioned “brothers
enjoying a day in the sun.”
106. Id.
107. Id.
108. Tucker, supra note 104.
109. Saul, supra note 105.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 109
ISIS.110 What’s more, this propaganda often appeals to foreign recruits, particu-
larly those from the West, who may be looking for signs that their new life will
still contain aspects of their present life that they may find hard to leave
behind.111 Teenagers have said that one of the main reasons they were drawn
into ISIS was the desire to be a part of the perceived “romanticism” of what
ISIS is building.112 ISIS propaganda suggests that these young adults can enjoy
the glamor and romanticism of their new society while still having the luxuries
of home.
In countries where basic necessities such as gas and flour are unavailable,
propaganda with a more materialistic focus is an effective recruitment tool.113
For instance, pictures suggesting financial gains for recruits can be persuasive to
a young person of no means. In fact, financially focused propaganda is a
powerful way to attract fighters who may not truly believe in the ideological or
theological message.114 Financial incentives have been blamed at least in part
for luring young British Muslims to join ISIS. In the UK, this demographic had
the highest level of unemployment in 2011.115 The lack of job prospects at
home, when combined with propaganda suggesting financial rewards, may
make it more likely that young adults will become radicalized.116
Another form of ISIS propaganda is that which speaks of creating a “pure”
Muslim race. Such propaganda has been compared to Nazi propaganda for its
emphasis on building a “master race.”117 Some potential new recruits have tried
to prove their worthiness as part of this “master race” by demonstrating their
faithful adherence to ISIS’s view of Islam. Examples of such responses can be
seen in certain Muslim teenagers’ fixation on only befriending or becoming
romantically involved with certain other types of Muslim individuals, and their
descriptions of their own “pure” familial lineage.
110. Id.
111. Id.
112. Caplan, supra note 103.
113. Saul, supra note 105.
114. Id.
115. Felicity Capon, ‘Perfect Storm’ For Teenagers Lured by Islamic State, NEWSWEEK (Mar. 19,
2015, 9:32 AM), http://www.newsweek.com/perfect-storm-british-teenagers-lured-islamic-state-
315022.
116. Id.
117. Id.
110 JOURNAL OF NATIONAL SECURITY LAW & POLICY [Vol. 9:95
131. Nikolas Abel, Note, United States v. Mehanna, The First Amendment, and Material Support in
the War on Terror, 54 B.C. L. REV. 711, 731 (2013).
132. Id.
133. Id.
134. Mark Joseph Stern, Translating Terrorism, SLATE (Sep. 3, 2014, 6:49 AM), http://www.slate.com/
articles/technology/future_tense/2014/09/mehanna_at_the_supreme_court_is_translating_jihad_texts_a_
crime.html.
135. Id.
136. Christopher Pochon, Recent Development, Applying the Holder Standard to Speech that
Provides Material Support to Terrorism in United States v. Mehanna, 36 HARV. J.L. & PUB. POL’Y 375,
382 (2013).
137. Id. at 382.
138. Id. at 383.
139. Id. at 384.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 113
timeline, thereby giving the tweeter’s message wider exposure. It would likely
not be an issue to establish that the user knew that ISIS was participating in
terrorist activities. However, it could be difficult to prove coordination, as it is
still unclear what amounts to coordination.
In another scenario, Twitter postings could amount to material support by
providing “personnel” to a terrorist group. In such a scenario, a Twitter user
could post ISIS propaganda that inspires another individual to join ISIS. Essen-
tially, the argument would be that the Twitter user’s propaganda recruited
another individual into ISIS, thus providing ISIS with personnel.
In Brandenburg v. Ohio, the Supreme Court held that “the constitutional
guarantees of free speech and free press do not permit a State to forbid or
proscribe advocacy of the use of force or law violation except where such
advocacy is directed to inciting or producing imminent lawless action and is
likely to incite or produce such action.”147 A pro-ISIS Twitter user may be
found to have incited “imminent lawless action” if the user’s postings can be
linked to the imminent terrorist activity of others; however, it is unclear how
imminent such terrorist activity would need to be to satisfy Brandenburg.
Furthermore, it is unclear if Brandenburg would even apply to a situation
involving personnel under the material support statute. As discussed earlier, the
Supreme Court in Holder found that the Scales case did not dictate that the
Material Support Statute’s prohibition on the plaintiff’s speech violated the First
Amendment because material support was different than mere association in a
group. Similarly, the Court may find that providing personnel under the Material
Support Statute excuses the speech from Brandenburg’s reach because material
support is something different than mere advocacy.
At a cyber-security conference in February 2015, John Carlin, Assistant
Attorney General for National Security, suggested that the Justice Department
could charge individuals under the Material Support Statute for pro-ISIS social
media postings.148 Carlin noted that the United States could use the statute to
prosecute individuals for providing “technical expertise” to a designated terror-
ist organization, and that spreading the word for ISIS may count as such
expertise. The possibility of using the Material Support Statute to prosecute
individuals for promoting ISIS on social media is controversial, and the likely
legality of such a prosecution has been hotly debated among legal professionals.
If possible, it could be a powerful deterrent and active measure to combat
pro-ISIS users.
149. Michael H. Hoffman, The Legal Status and Responsibilities of Private Internet Users Under the
Law of Armed Conflict: A Primer for the Unwary on the Shape of the Law to Come, 2 WASH. U. GLOBAL
STUD. L. REV. 415, 424 (2003).
150. Id.
151. Id.
152. Rose, supra note 66.
153. Id.
154. Id.
155. Shane, supra note 87.
156. Id.
116 JOURNAL OF NATIONAL SECURITY LAW & POLICY [Vol. 9:95
157. Hiba Zayadin, Fighting Words: Inside the Social Media War Against ISIS, MEDIASHIFT (Mar. 5,
2015), http://mediashift.org/2015/03/fighting-words-inside-the-social-media-war-against-isis/.
158. Id.
159. Cotte, supra note 43.
160. See Zayadin, supra note 157 (noting hactivist groups use hacking for advocacy purposes).
161. Id.
162. Victoria Woollaston, Twitter’s “Quality Filter” Set to Rid The Site of Abuse, DAILY MAIL (Mar.
25, 2015), http://www.dailymail.co.uk/sciencetech/article-3010827/Twitter-s-Quality-Filter-set-rid-site-
abuse-Tool-automatically-censor-tweets-contain-threats-offensive-language.html.
163. Id.
164. Zayadin, supra note 157.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 117
tary was a source of extreme embarrassment to the UDA and was likely a
powerful contributing factor to the group’s massive upheaval and permanent
reputational damage.171 Similarly, public displays of ISIS members engaging in
embarrassing activities could serve to undermine the perceived prestige of the
group’s adherents.
Another goal of counter-propaganda efforts should be to expose the realities
of life in ISIS occupied territories. The media can play an important role in
undermining ISIS propaganda that portrays the terrorist life as glamorous and
romantic by broadcasting stories of real-life hardships in ISIS and other terrorist
organizations. As a result, naive teenagers who might otherwise be drawn to
ISIS may be less-inclined to join the group if they knew the dangers of its
world.
The United States and other countries should also seek to provide a counter
narrative to undermine other aspects of the ISIS narrative. This includes efforts
to discredit ISIS claims of power, legitimacy, and moral righteousness. For
example, they could damage ISIS claims of power by widely publicizing
accounts of ISIS military defeats. Likewise, religious leaders could offer alterna-
tive interpretations of the terrorist group’s ideology that discredit their actions
and puncture their claims of moral and religious righteousness. Additionally,
countries should seek to publicize examples of inclusion and respect within
their own territories, so as to undermine the ISIS narrative that portrays Western
countries as hostile to those the group seeks to recruit. This could include posts
on social media outlets about prominent leaders of a variety of faiths working
together, advertisements about opportunities to connect with like-minded indi-
viduals in a non-hostile environment, and other similar efforts to demonstrate
the potential to feel connected and accepted without needing to turn to danger-
ous organizations.
171. Id.
172. Cotte, supra note 43.
173. Id.
174. Id.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 119
ers and often jumps onto pro-ISIS Twitter hashtags.175 For example, in April
2014, DOT responded to the pro-ISIS hashtag #accomplishmentsofISIS by
using the same hashtag to post a series of sarcastic references to ISIS’s
accomplishments and links to YouTube videos detailing ISIS atrocities in
Syria.176
However, the CSCC is at a disadvantage because they have been unable to
match the shocking and outrageous videos of ISIS, the efforts of their dedicated
pro-ISIS Twitter users, or ISIS’s compelling narrative.177 Beheading videos are
shocking and repugnant, but they are also disturbingly fascinating and go viral
for this reason. CSCC videos do not go viral, and this is likely due to their less
shocking nature. Whereas ISIS’s videos have been characterized as “shock and
gore,” the CSCC’s videos have been described as “mock and bore.”178 ISIS has
a wide network of virtual supporters, referred to many as “fanboys,” who
disseminate the group’s online propaganda.179 ISIS refers to these individuals as
“knights of the uploading.”180 These “fanboys” are especially prevalent on
Twitter, despite the social media network’s efforts to ban them. The CSCC does
not have fanboys. Furthermore, and perhaps most crucially, ISIS has a strong,
compelling narrative. The CSCC does not have a narrative, or at least not one
remotely comparable in emotional strength and resonance to that of ISIS. ISIS’s
narrative is essentially that Muslims are being killed and that ISIS is the
solution. The CSCC’s narrative consists of warnings to not do what ISIS wants,
but it lacks a positive message of what to do instead. One of the greatest
challenges in counterterrorism is finding a narrative that directly speaks to a
similar kind of longing among potential terrorists and channels that longing into
nonviolent action.
Another current form of counter-propaganda comes from non-governmental
actors poking fun at terrorist organizations. For example, a group of young
Syrian refugees has been making short YouTube videos mocking ISIS.181 These
videos are useful for many reasons, including their potential ability to under-
mine ISIS’s power and make it appear less impressive, but also, very impor-
tantly, for having Middle Easterners communicate the satire. The men are
effectively saying that not all Middle Easterners support ISIS or are impressed
with the group.
175. Id.
176. Id.
177. Id.
178. Id.
179. Id.
180. Id.
181. Constanze Letsch, Laughing at ISIS: Syrian Video Artists Go Beyond Fear to Ridicule
Jihadists, THE GUARDIAN, (Mar. 12, 2015), https://www.theguardian.com/world/2015/mar/12/laughing-at-
isis-syrian-video-artists-jihadis-refugee-islamic-state.
120 JOURNAL OF NATIONAL SECURITY LAW & POLICY [Vol. 9:95
182. Id.
183. Id.
184. Id.
185. Id.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 121
CONCLUSION
The Internet has revolutionized terrorism forever. Terrorists exploit the Inter-
net’s vast resources and capabilities to further their causes in ways never before
possible. Recruitment, funding, publicity, and other essential organizational
needs are now conveniently met through the click of a button. The Internet-
savvy terrorist can simultaneously fill the roles of photographer, publicist,
fundraiser, and fighter. The previously unreachable potential new member can
now be fully recruited, from initial contact to travel arrangements, all without
ever having to leave his house.
One of the key ways that the Internet has transformed terrorism has been in
its effect on terrorist propaganda. The Internet allows terrorists to design and
deploy potentially limitless amounts of propaganda to millions of potential new
members with relatively few regulations or restrictions. Terrorists can utilize
anonymous user names and post to websites, social media platforms, chat
applications, and more, all while tailoring their message to attract a range of
different target audiences. ISIS has been remarkably adept at using various
media forms on many different Internet sites and social media platforms. So far,
efforts to thwart the ISIS propaganda machine have proven relatively fruitless.
2017] TERRORISM, THE INTERNET, AND PROPAGANDA 123
speak to distant followers without ever having to meet, social media has
provided terrorists with an unprecedented ability to directly attract young
recruits and indoctrinate new followers through direct messaging, hashtags, and
more. Propaganda can now be deployed with relative ease and at little to no
expense, as anyone can open a Twitter account and share his or her views.
Future technology will inevitably bring with it new, innovative ways for terror-
ists to manipulate its qualities to serve their purposes. Counter-propaganda
efforts will likewise continue to need to evolve to match the ever-looming threat
of terrorism.