After James Foley murder, an effort to stamp out jihadi Twitter accounts
Loading...
The gruesome murder of American journalist James Foley yesterday was an opportunity for the self-styled Islamic State (IS) to put on a propaganda show. The jihadi group uploaded video of the killing to YouTube and Vimeo and its social media team bombarded Twitter 鈥 including targeting journalists and others who closely follow the war in Syria and Iraq 鈥 with the links.
Within minutes YouTube deleted the original post and Twitter was not far behind, announcing it would suspend accounts spreading the distressing video. But by that time the clip had multiplied. Users posted slightly different versions to evade detection 鈥 YouTube has an algorithm that prevents re-uploads. By Tuesday evening, dozens of copies of the footage could be found with just a simple web search.
As social media sites fought to shut them down, the online followers of IS reveled in the butchery of a hostage and called for more, part of the point of the exercise for the group. Social media has become an important fund-raising and recruitment tool for them. While to most people the murder was nihilistic and repugnant, for would-be internet mujahideen it was a moment of celebration.聽
The online tussle since Mr. Foley's death highlights an ethical dilemma. As IS captured swathes of Iraqi territory in June and eastern Syria over the last month, they also made gains online. In addition to opening dozens of official accounts and media outlets, the militants have spawned a universe of 鈥榝an boy鈥 Twitter feeds re-posting their statements and praising their cause.
What can and should be done about extremist group accounts? Left unchecked, their feeds spread a violent message and rally support. But closing down all the feeds is a nearly impossible, even futile chore. And if successful it would also deprive those who seek to track and counter such groups of important data points.聽
Foley鈥檚 murder is an extreme example. But other IS releases have helped analysts track key militant operations, analyze troop movements, and tally foreign聽 recruits.
鈥淭here鈥檚 always this tension,鈥 says Matthew Levitt, former deputy assistant secretary for intelligence and analysis at the US Treasury Department. 鈥淵ou don鈥檛 want to shut them down, because they offer a treasure trove of information 鈥 but you also want to start sending a message [to extremists] that we know what you鈥檙e doing.鈥
There are also questions of censorship, with some arguing that the answer to savagery is sunlight, not darkness, and worries about regulatory overreach that could severely curtail free speech. For instance the United Kingdom's Metropolitan Police that "viewing, downloading or disseminating" the Foley murder video, which was carried out by a man with a British accent, may be treated as a terrorism offense. That could in theory leave many of the journalists, analysts, friends of Foley, and the merely curious, at risk of lengthy jail terms.
Social media for jihad
The social media war escalated over the summer, as IS consolidated its media wing.
鈥淟ast year, there were no official newsfeeds, just people advertising either on forums or on Facebook,鈥 says Aymenn J Al Tamimi, who closely follows jihadi social media as the Shillman-Ginsburg Fellow at the Middle East Forum. 鈥淣ow, it鈥檚 a centralized media operation,鈥 he says. 鈥淎ll their accounts follow each other; there is coordination.鈥
The first official IS accounts were on Twitter, which has blocked dozens of streams since July. Twitter spokesman Nu Wexler writes that users are banned if they violate rules that 鈥減rohibit 鈥榰nlawful use鈥 and聽鈥榙irect, specific threats of violence against others.鈥 鈥 He did not respond to questions about whether the United States had requested the closures.
YouTube, meanwhile, has a policy of shutting down accounts linked to any individuals or groups designated by the US State Department as terrorists. A spokesperson declined to comment, pointing to the site's community guidelines for fair use.
Another site adopted by militants says it has been in touch with European authorities on how to limit content. JustPaste.it, which allows users to share text and photos without opening an account has seen a surge in IS activity, particularly as Twitter began to close accounts.
鈥淐urrently, I'm monitoring all the most popular notes and deleted all content that is illegal due to Europe Union law,鈥 the site鈥檚 owner, Mariusz 呕urawek, says. 鈥淎lso, I'm cooperating with (the police) to track terrorist activity on the page.鈥
JustPasteIt recently deleted a slew of graphic IS postings. But keeping up with the flow of material from new users is a gargantuan task. 鈥淒ue to the high volume of traffic 鈥 I have to monitor the site almost all the time,鈥 Mr. 呕urawek says.
Sisyphean task?
鈥淭echnically speaking, it is very hard to shut down all the accounts and prevent them from popping up tomorrow,鈥 says Mr. Levitt, who currently heads The Washington Institute's counterterrorism and intelligence program. 聽
One example is the case of Hajjaj al Ajmi, a Kuwaiti cleric designated by the US Treasury as a sponsor of terrorism on Aug. 7 for his work funding Al Qaeda鈥檚 Syrian rebel affiliate, Jabhat al-Nusra.
Almost immediately, Mr. Ajmi鈥檚 once prolific Twitter feed was blocked. Gone were the photos of him praying in the Syrian countryside, the banners calling for donors to fund the jihad.聽
But left unblocked on Twitter was Ajmi鈥檚 organization, the so-called People鈥檚 Commission for the Support of the Syrian Revolution, which continues to operate on Twitter and has worn the blocking of its leader as a badge of honor. The charity 鈥渃ontinues to support the oppressed," the account wrote in Arabic on Aug. 7, the day Ajmi was listed, brandishing posters of his latest fundraiser.
Ajmi鈥檚 account also offers a prime example of why some counter terrorism officials oppose shutting down known accounts.
Before it was blocked, his @HajjajAlAjmi feed provided perhaps the most accessible picture of the network of private Gulf-based donors to the Syrian opposition. He interacted with fellow fundraisers, including a representative in Qatar, indicated which operations and groups he was providing money for, and provided Human Rights Watch with details that helped of Allawites on the Syrian coast in 2013. Early in the Syrian conflict Ajmi even posted bank account numbers 鈥 a gift to those trying to track terror financing.聽
In IS鈥檚 case, Mr. Al-Tamimi says the accounts helped him follow their activity in smaller towns with almost no conventional news reporting.
鈥淚n Iraq鈥檚 Anbar province, it helped to analyze: which group is leading the offensive in this area?鈥 He and other analysts were able to map out everything from the tempo of IS operations to its casualties per operation.
鈥淗aving these feeds is useful,鈥 he says, 鈥淭hough... I can understand the concern given how this group has grown. Maybe analysts shouldn鈥檛 be too selfish.鈥
Blacking out the black flag
Since Foley's murder, a debate over violent movements' use of social media that had been confined to activists and academics, has gone public. Shortly after the video was released, Twitter users started #ISISMediaBlackout, urging Twitter users not to repost links or photos of his murder. Newspapers that ran stills from the video were lobbied to change the practice and some, , agreed.
Mr. 呕urawek聽of JustPasteIt said even before the video he was facing 鈥減ressure from British, German, and Polish press to delete all content connected with ISIS."
IS may be deciding that at least some platforms aren鈥檛 worth the trouble. Since being knocked off Twitter, IS has moved its regional spokesman accounts to a little-known platform called Diaspora, which relies on decentralized servers, or pods, to host content.
Diaspora did not respond to a request for comment about the accounts, and several of the feeds appeared to have been closed after the Monitor sent a request to the company including links pointing them out.