Documenting the Virtual Caliphates Dr. Mia Bloom #N /30/16-06/30/19

Similar documents
(U//FOUO) ISIL Social Media Messaging Resonating with Western Youth

Terrorism in Cyberspace

THE FUTURE OF CYBER TERRORISM

Ladies and gentlemen, Thanks for giving me the opportunity to talk to you today. Ladies and gentlemen,

ICT Jihadi Monitoring Group. AZAN Magazine Profile Analysis

Tech Savvy Militants in the Age of ICT Globalization: Online Radicalization to Violent Extremism in Kenya

Intelligence Bulletin

ISIS-inspired Terrorist Attack in the South of France

Terror Finance and Technology

OK GOOGLE, SHOW ME EXTREMISM: ANALYSIS OF YOUTUBE S EXTREMIST VIDEO TAKEDOWN POLICY AND COUNTER-NARRATIVE PROGRAM Introduction

Anatomy of an Insurgency

Jihadist women, a threat not to be underestimated

Overview 1. On June 29, 2014, ISIS leader Abu Bakr al-baghdadi declared the establishment of the

The Terrorism Threat In 2012: Global Perspective Terrorism Risk And Insurance Markets In 2012 OECD Headquarters Paris, France 5 December 2012

Analysis of ISIS's Claims of Responsibility for Terrorist Attacks Carried Out Abroad. Overview 1

UC Berkeley Working Papers

Arije ANTINORI, PhD Coordinator of CRI.ME LAB SAPIENZA UNIVERSITY OF ROME FROM THE ISLAMIC STATE TO THE ISLAMIC STATE OF MIND

In the Name of God, the Most Gracious, the Most Merciful. General Guidance and Instructions

NAVAL POSTGRADUATE SCHOOL

Students View Towards Religion-based Terrorism: A Study on Hajee Mohammad Danesh Science and Technology University (HSTU), Dinajpur, Bangladesh

Tuesdays 14:50-17:45 (and a few Fridays) Vestergade 10-A12

Jihadist Brides, Victims of the West

Policy Workshop of the EU-Middle East Forum (EUMEF) Middle East and North Africa Program. Deconstructing Islamist Terrorism in Tunisia

HIZB UT-TAHRIR [THE ISLAMIC LIBERATION PARTY] IN THE WEST BANK

Security threat from Afghanistan: Under- or overrated?

Alexander Thurston. African Studies Program

How Terrorists may be Hiding in Plain Sight. Cindy Casey, Gwynedd Mercy University

Summary. Aim of the study, main questions and approach

Civil Wars, Violence, and International Responses project The Evolution of Armed Groups: Crafting Effective Responses Workshop 7 November 2017

ISIS s media network:

Big Data, information and support for terrorism: the ISIS case

Radicalism and of the violent Islamist extremism phenomenon in the Albanian Balkans (Albania, Kosovo, Macedonia)

The public seven radi entering th. (NYPD) released. caliphate, virtual. grounds. Police Department, 2007.

describes and condemns is an ideology followed by a fraction of over a billion followers.

Partners, Resources, and Strategies

The Mind Of Jihad By Laurent Murawiec READ ONLINE

Supporting the Syrian Opposition

The Establishment of ISIS in Syria in the Lower Euphrates Valley

A Report of the Seminar on

COMMUNICATION PLAYBOOK

Executive Summary December 2015

JEFFERSON COLLEGE COURSE SYLLABUS CRJ135 TERRORISM. 3 Credit Hours. Prepared by: Mark A. Byington. Revised Date: January 2009

INTERNATIONAL TERRORISM AND COUNTERTERRORISM. Spring Political Science MWF , Maybank 307. Dr. Mary Desjeans

America Unravels Iraq: Kurds, Shiites, And Sunni Arabs Compete For Supremacy By Mohammed M. A. Ahmed

ISIS ONLINE: COUNTERING TERRORIST RADICALIZATION & RECRUITMENT ON THE INTERNET & SOCIAL MEDIA

A study which, in addition to the explanation on the where, when and how of terrorism, helps to understand

The impact of the withdrawal of the American troops from Syria on the campaign against ISIS (Initial Assessment) Overview

Talking to Terrorists: Entering and Exiting the Terrorist Trajectory Internet Seduction and Intervention

Radical Islam In The House: The Plan To Take America For The Global Islamic State By Kate Mathieson, Michael Coffman READ ONLINE

Efforts to carry out electronic Jihad on the part of the Jihadi online forum members

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

THE INTERPLAY AND IMPACT OF ORGANISED CRIME AND TERRORISM ON THE PROCESS AND DEVELOPMENT OF THE CONCEPT OF SECURITY: CASE STUDY OF ISIS ABSTRACT

Assessing ISIS one Year Later

MINDS ON ACTIVITY SETTING THE STAGE. News in Review January 2013 Teacher Resource Guide EIGHT DAYS: Israel and Hamas

Cyber Intelligence. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 4th, 2018 D7-1

Cyber jihad as a virtual invitation into terrorism activities: Multimodal critical discourse analysis of Rumiyah and Inspire magazines

International Terrorism and ISIS

The Inghamasi: ISIL?s New Way of War

Issue Overview: Jihad

STATEMENT OF JARRET BRACHMAN BEFORE THE HOUSE ARMED SERVICES COMMITTEE SUBCOMMITTEE ON TERRORISM, UNCONVENTIONAL THREATS AND CAPABILITIES

The death of Yasser Murtaja in the Great March of Return

Selected methods of recruiting Islamic terrorists

by Jennifer S. Hendrickson

ihs.com/conflictmonitor Conflict Monitor A complete OSINT collection and analysis service for Syria and Iraq

British fanatics heading to Iraq to join ISIS militants in their HUNDREDS amid fears 'they could bring terror to UK'

Houghton Mifflin Harcourt Collections 2015 Grade 8. Indiana Academic Standards English/Language Arts Grade 8

Device Agnostic: Why You Need to Transform Now

MEDIA KIT. A global movement at the intersection of faith and culture. Will you join us?

. 2. Select region - 5. the Islamic State in Iraq and the Levant (ISIL). It seeks to establish a regional,

Online Authorities? Young British Sikhs, Religious Transmission and the Internet

Executive Summary Diocese of Maitland-Newcastle 2018 Synod of Bishops XV Ordinary General Assembly Young people, the Faith and Vocational Discernment

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

Terrorism And Counter-Terrorism In Africa: Fighting Insurgency From Al Shabab, Ansar Dine And Boko Haram (New Security Challenges) By Hussein Solomon

St. Catharine St. Margaret Parish Town Hall Meeting St. Catharine School Auditorium February 1, 2017 MEETING SUMMARY

Curriculum for the Bachelor Degree in

OPERATION OF ISIS THROUGH SOCIAL MEDIA AND ITS LEGAL IMPLICATIONS IN INDIA

INTERNATIONAL TERRORISM AND COUNTERTERRORISM. Spring Political Science MWF , Maybank 307. Dr. Mary Desjeans

THE SCOOP WINNING THE NEW WAR OF TERROR The Paris massacre has changed everything: the enemy, the targets and now the way to prevail

A new religious state model in the case of "Islamic State" O Muslims, come to your state. Yes, your state! Come! Syria is not for

Global View Assessments Winter Key Judgment: Pro-democracy protests in Hong Kong leave China few viable options.

Digital Jihad: How online networks are changing extremists

AM L CHALLE N G E S. situation in Sydney, Australia, in December 2014; two attacks on

Islam and Terrorism. Nov. 28, 2016 Clarity in defining the enemy is essential to waging war.

Past Involvement of IHH in Supporting the Global Jihad and Radical Islam - Additional Information 1

Prime Minister s Foreword

Georgia Quality Core Curriculum 9 12 English/Language Arts Course: American Literature/Composition

I N THEIR OWN VOICES: WHAT IT IS TO BE A MUSLIM AND A CITIZEN IN THE WEST

Texas JSA LoneStar. Winter Congress Approaching. 2 Career Politicians. 3 The Fight against ISIS. 3 Compromises

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION CRIMINAL COMPLAINT

REQUIRED DOCUMENT FROM HIRING UNIT

Intelligence and Terrorism Information Center at the Center for Special Studies (C.S.S)

EDUCATION, CRITICAL THINKING, AND TERRORISM: THE REPRODUCTION OF GLOBAL SALAFI JIHAD IN CONTEMPORARY EGYPT

Who but the Enemy of the American People? Arnie Rosner A sovereign American. A Californian and NOT a U.S. Citizen

Jihadi Terrorism and the Radicalisation Challenge European and American Experiences. Proof Copy. Edited by. Ghent University, Belgium.

ISIS and the Saudi Wahhabi Threat to Asian Security

Title: How Jihadists Become Sovereigns: Islamic State Governance in Iraq and Syria Committee: Elisabeth Wood (chair), Oona Hathaway, and Ellen Lust

The killing of two Al-Qaeda leaders in Iraq and its implications

Head of Growth job description and organisational overview

The Recent Lone Wolf Attacks: Trend or Anomaly?

Transcription:

Documenting the Virtual Caliphates Dr. Mia Bloom #N000014 16-1 -3174 06/30/16-06/30/19 How does ISIS propaganda reflect and predict the strength of the Caliphate? MILITARY RELEVANCE: The project goal is to log and record ISIS multi-language propaganda, including news bulletins, photo-reports, videos, and documents, using the PI s unique access and monitoring methodology. TECHNICAL APPROACH: Collect, archive, code, and tag ISIS propaganda disseminated on its encrypted platforms Telegram in multiple languages, with a particular focus on Arabic materials. Conduct visual and other analyses of propaganda materials to determine: How does ISIS narrative change according to real-time events? Can ISIS messaging campaigns signal weakness? The emergence of tactical innovations of actions on the battlefield, How is Propaganda disseminated? SCHEDULE: 24 Months TASKS Shared Ontologies, Planning Tagging, Coding of Data Dissemination Interim Results Creating Codebook, Data user friendly Refinement and Testing Models Final Report FY17 FY18 Accomplishments: archived over 16,000 pieces of visual Propaganda, 2 peer reviewed papers, 1 chapter, 2 policy papers & 6 presentations Transition Goals: Machine learning and neural network

Who am I? Professor of Communication, Georgia State University What I do? Research on terrorism; my main focus is on suicide terrorism, women and terrorism and children in violent extremist organizations (VEOs). Grants from ONR, DoD, NSF and DHS. Current Projects: Mixed methods, process tracing, archival research, interviewing The role of children in terrorist networks Rape (male and female) as a deliberate and strategic tactic in wartime esp. in the Middle East & South Asia. Women in AQ, ISIS and Boko Haram. Social Media Addiction and Radicalization

Books UK (UK) (US) Forthcoming: Small Arms Children and Terror with Dr. John G. Horgan, Cornell University Press, 2019

Global penetration of a terrorist message

From Facebook to Traditional Print Media

To Live Media

Telegram Channels English:Hallumu The Anfal The Daily Routine (TDR) Khilafah Insights Lone Soldier (Lone Mujahid) State Remains Furat Wilayah Arabic:Nashir News Nashir Khilafah Amaq Dabiq Turkish:Al-Bayyinah- TR French:Al-Bayyinah- FR La Foi Militante

Chat Room Administrators are Key Nodes è è è è è è Shc Dq (Mustafa) is a key node in creating & disseminating exclusive channels w/highly violent and graphic content

Telegram has become the platform of choice for ISIS and its global supporters; Tens of Thousands of propaganda items are disseminated & shared across the platform on a daily basis;

Channels and Chat rooms employ Relatable memes for youth. Major Theme: Jihadi Cool & Brotherhood

Dabiq (July 2014 July 2016) ISIS Publications Archived Rumiyah (September 2016 September 2017) From Dabiq to Rome (March 2018 to present) Al-Naba (October 2017 to present)

Data Collection Summary Official Propaganda available on Telegram includes battlefield reports, photo reports and images about military technology, and discussions about lone actor attacks in the West. Our database includes over 16,000 pieces of ISIS propaganda collected daily since February 2017. (Data Collection continues)

Threats Detected, Reported, and Prevented Threat against David in Texas (2016) reported at last annual review Threat against gay nightclub in Toronto, Canada (June 2017) Threat against sports stadium in the UK (2017) Threats against Flinders St. Station, Melbourne & Town Hall subways, Sydney, Australia (September 2017) Threat against a shopping mall in Australia (September 2017) Threat against Prince George's school in the UK (2017) Threat against Baron Trump (January 2018)

Future Research Proof of concept using Machine Learning Disabled Fighters in ISIS Propaganda Islamic State State-Building Education State building Governance Punishment Charity Food Diffusion of Tactical Innovations Drones

Application of Machine Learning

Diffusion of Tactical Innovation Vehicle-ramming attacks (VRA) is example of adaptation & diffusion of tactics; Introduced by Anwar al-awlaki & perfected by ISIS shows extent to which groups & improve upon ideas. Testing to see whether VRAs as lethal as other tactic yet cheaper and requires far less planning. 70 60 50 40 30 20 10 0 Jan-01 Jul-01 Jan-02 Jul-02 Jan-03 Jul-03 Jan-04 Adop6on of Vehicle-Ramming A@acks Jul-04 Jan-05 Jul-05 Jan-06 Jul-06 Jan-07 Jul-07 Jan-08 Jul-08 Jan-09 Jul-09 Jan-10 Salafi-Jihadist Far Right Extremist Pales6nian Na6onalist Jul-10 Jan-11 Jul-11 Jan-12 Jul-12 Jan-13 Jul-13 Jan-14 Jul-14 Jan-15 Jul-15 Jan-16 Jul-16 Jan-17 Jul-17 Jan-18

Source of Inspiration for LONE ACTOR ATTACKS

LTTE Suicide suit runs on ba@eries, nails and run of the mill items readily available

Disabled Fighters (SVBIEDs, Combat & Recruitment)

State Building Positive messaging to promote the protostate of ISIS Better living conditions (images of food, gardens, clean water) Promoting life in accordance with Salafi religion (eliminating drugs, cigarettes, alcohol, music,& games) Provision of health care (inoculating children, providing healthcare, building hospitals) Education (school in accordance to religion, textbooks) Infrastructure

ISIS School Books 40+ textbooks (in English and Arabic) have been Archived

Grammar Text Book Students learn to tell time Based on clocks affixed to dynamite

Grade Two Math Textbook

Elimination of the Sources of Vice Hisbah collecting music & electronics Burning Cigarettes in Furat Burning Cigarettes and Musical Instruments Destroying Marijuana in Sinai Destroying Hashish in Khorasan Destroying pills in Idlib

QUESTIONS?