recommended reading

ISIS Opponents Take Aim at Its Online Presence

The Islamic State of Iraq and Syria has taken to Twitter to spread its message, trumpet bloody successes, and recruit potential jihadists, but its social-media campaign has come under attack from forces that range from the U.S. State Department to the mysterious group of hacker-activists who call themselves Anonymous.

ISIS has maintained a notably active presence on Twitter, using creative and tech-savvy tactics to amplify its message, maintaining accounts that tweet in English, German, and Russian in addition to Arabic, and posting polished videos with very graphic action sequences and special effects straight out of a Hollywood playbook. Some of these tactics are targeted toward young Syrians, Iraqis, and other Muslims in the region, imploring them to join the fight to carve an Islamic state out of the Levant. Others, like a recruitment video that includes testimonials in English from ISIS fighters with Australian and British accents, are meant to attract soldiers from Western countries.

The U.S. government has an answer to ISIS's recruitment campaign. Long before President Obama announced he would send military advisers to Iraq, the State Department launched a program to engage terrorists on Twitter. A verified Twitter account called Think Again Turn Away sports the State Department's official seal as its avatar ("Some truths about terrorism," reads the account's bio), tweeting replies to jihadi propaganda and calls to action. "Your deluded opinions are incapable of justifying #ISIS' acts of barbarisms against civilians," read a recent tweet from the account.

The State Department announced last week that it will expand the Think Again Turn Away counterterrorism program, awarding a contract worth more than half a million dollars to a company in Northern Virginia to run the account. Officials at the State Department would not comment on how effective the campaign has been.

Meanwhile, an anti-ISIS hashtag, #No2ISIS, has cropped up in Iraq. In an attempt to counteract the powerful ISIS propaganda machine, hundreds are tweeting their opposition to the group and their tactics—including Iraq's Ambassador to the U.S., Lukman Faily.

ISIS's opponents are joined by a Twitter account with the handle @wikibaghdady, which has been revealing insider information about ISIS's dealings for the last six months, The Daily Beast reports. Although no one knows who is behind the account, many of its tweeted predictions have been borne out. @wikibaghdady exposed the real name of the mysterious leader of ISIS as well as those of many on his council, in addition to information about the organization's structure, finances, and future plans. But although whoever is behind the handle seems to be privy to some ISIS secrets, the mole is probably not a good samaritan—he's likely a "fellow jihadi playing dirty politics against members of his own cohort," writes The Daily Beast's Jacob Siegel.

This ragtag crew waging war on ISIS's online presence finds another accomplice in Anonymous, the shadowy network of hacker-activists that uses cyberattacks to further its causes. Anonymous is planning to attack ISIS's sponsors in what will be called "Operation No2ISIS," according to a Forbes report. "We are unable to target ISIS because they predominantly fight on the ground," a source within Anonymous told Forbes. "But we can go after the people or states who fund them."

In a conflict that's in large part being fought over the hearts and minds of Iraqis, Syrians, and potential recruits, ISIS's social-media prowess has frightened its enemies and brought new conscripts running. It's no surprise, then, that an unlikely band of opponents is demonstrating its resistance both on the battlefield and on the Internet.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.