Content uploaded by Ahmed Al-Rawi
Author content
All content in this area was uploaded by Ahmed Al-Rawi on Dec 05, 2017
Content may be subject to copyright.
RESEARCH NOTE
Video games, terrorism, and ISIS’s Jihad 3.0
Ahmed Al-Rawi
a
,
b
a
Department of Communication Studies, Concordia University, Montreal, Canada;
b
Department of Media &
Communication, Erasmus University Rotterdam, Rotterdam, the Netherlands
ABSTRACT
This study discusses different media strategies followed by the Islamic
State in Iraq and Syria (ISIS). In particular, the study attempts to under-
stand the way ISIS’s video game that is called “Salil al-Sawarem”(The
Clanging of the Swords) has been received by the online Arab public.
The article argues that the goal behind making and releasing the video
game was to gain publicity and attract attention to the group, and the
general target was young people. The main technique used by ISIS is
what I call “troll, flame, and engage.”The results indicate that the
majority of comments are against ISIS and its game, though most of
the top ten videos are favorable towards the group. The sectarian
dimension between Sunnis and Shiites is highly emphasized in the
online exchanges, and YouTube remains an active social networking
site that is used by ISIS followers and sympathizers to promote the
group and recruit others.
KEYWORDS
Iraq; ISIS; Islam; Middle East;
online jihad; terrorism; video
game
Introduction
Many global terrorist organizations such as ISIS are increasingly trying to recruit Western
youth.
1
According to US intelligence experts, about 1000 foreign fighters join ISIS every
month.
2
Some of those recruits come from Western countries. According to a source in the
FBI, there are over 150 Americans who are allegedly in Syria to fight for ISIS,
3
while the
Canadian Intelligence agency estimates that about 130 Canadians have already joined ISIS as
of 2014.
4
According to the Canadian Standing Senate Committee on National Security and
Defence (SSCNSD), “eighty radicalized Canadians have been identified as participating with
terrorists overseas and have returned to Canada and approximately 145 Canadians are
believed to be abroad providing support to terrorist groups.”
5
Indeed, ISIS is a terrorist organization that has an “apocalyptic, end-of-days strategic
vision,”as Army general Martin Dempsey rightly describes it.
6
The organization evolved
to be a more radical and dangerous extension of Al-Qaeda terrorist group.
7
According to a
senior leading figure in this group, the ideological foundation of ISIS was established in
Camp Bucca, which was the largest US detention facility in Iraq. Due to the time prisoners
spent at the Camp and the fact that many other insurgent members were detained there, it
became a fertile ground for extremism wherein Islamists managed to hold numerous
meetings and make detailed agreements for future plans.
8
When ISIS advanced in the
Sunni provinces, it looted banks and became the richest terrorist group in the world.
9
It
CONTACT Ahmed Al-Rawi ahmed.alrawi@concordia.ca Department of Communication Studies, Concordia
University, 7141 Sherbrooke Street W., Montreal H4B 1R6, Quebec, Canada.
Color versions of one or more of the figures in the article can be found online at www.tandfonline.com/ftpv.
TERRORISM AND POLITICAL VIOLENCE
http://dx.doi.org/10.1080/09546553.2016.1207633
© 2016 Taylor & Francis
also committed war crimes as hundreds of captured Iraqi soldiers, especially Shiites, were
executed, while the Yezihdi and Christian minorities suffered a great deal as many were
forced to flee to Iraqi Kurdistan.
10
However, the main areas identified that sustain ISIS’s
power grip are related to “psychological tactics such as terrorizing populations, religious
and sectarian narratives, [and] economic controls.”
11
Literature review
Back in 1982, Schmid and de Graaf emphasized that “an act of terrorism is in reality an act
of communication. For the terrorist, the message matters, not the victim.”
12
Numerous
other scholars rightly claim that communication and terrorism go hand in hand because
communication is the oxygen of terrorist acts.
13
Similarly, Freedman and Thussu believe
that media outlets are at the core of terrorism because they are “increasingly seen as active
agents in the actual conceptualization of terrorist events.”
14
As discussed below, ISIS fully
exploits various media platforms in order to disseminate fearful messages and create an
effective impact on their receivers.
In contemporary times, one of the main platforms mentioned above is social media,
which plays a major role in people’s lives. In fact, some scholars believe that social media
can become instrumental in uniting and sometimes radicalizing the public in relation to
political and social issues.
15
Al-Qaeda, for example, has been active on many online
forums for several years waging an E-Jihad to recruit sympathizers and spread its
ideology.
16
It also created a “jihadist cloud”which allowed it to maintain “its virtual
spaces and niches on the Internet.”
17
These (offline) extremists groups use modern
technology and the Internet as the main means to influence others. “For the terrorists
themselves, new media are, collectively, a transformative tool that offers endless possibi-
lities for communication and expansion.”
18
In this regard, there are different psychological
motivations that lead some individuals to join extremist groups that can be categorized as
“revenge seekers [who] need an outlet for their frustration, status seekers [who] need
recognition, identity seekers [who] need a group to join, and thrill seekers [who] need
adventure.”
19
Video games and terrorism
In relation to video games and terrorism, a number of games directly deal with terror-
related issues, especially in connection with the War on Terror. For example, Splinter Cell
is a game that revolves around the 9/11 events,
20
while Counter-Strike allows teams from
opposing sides to take the role of terrorists as well as counter-terrorists.
21
Similar to
Counter-Strike, other games like America’s Army, Modern Warfare 2, and Medal of Honor:
Warfighter allow players to become terrorists, which could have some psychological and
educational benefits.
22
In 2006, Al-Qaeda group made changes to the first person shooter
(FPS) game Quest for Saddam (2003) and introduced another game called Quest for Bush.
The goal of the original game was to kill Iraqi soldiers and capture Saddam Hussein,
whereas Al-Qaeda completely reversed the players’roles. Further, the Iraqi American
artist, Wafaa Bilal, made more adaptations to the same game, which he called Night of
Bush Capturing: A Virtual Jihadi (2008).
23
As a social and artistic experience, Bilal’s video
2A. AL-RAWI
game version created some controversy because the player was “in the position of a suicide
bomber whose aim is to kill the president of the United States.”
24
On the other hand, video games by the Lebanese Hezbollah and Syrian Afkar Media
company were used as alternative media outlets to offer playing roles that were contrary to
the mainstream Western representation of Arab Muslims.
25
In this way, “video games
provide violent non-state actors and organizations sympathetic to them with a means of
presenting their grievances and displaying their fighting prowess in ways that advance the
organizations’strategic goals.”
26
Some of these alternative games include Quraish and
Under Siege, which were both produced by Afkar Media.
27
Trolling, flaming, and social media effects
This paper covers two concepts that are related to the use of harsh and violent language,
namely trolling and flaming. There is, however, a conceptual problem in defining these
two terms because of the apparent overlap between them. In fact, “trolling and flaming
often merge, in that in both cases there is intent to disrupt the ongoing conversation, and
both can lead to extended aggravated argument.”
28
In this regard, the relative anonymity
of online users enhances the kind of flaming or trolling that can occur on different
platforms.
29
In general, the two terms involve using some kind of negative face that is
explained below by employing computer-mediated communication.
Theliteratureonthesetwotypesofanti-social behavior is also connected to studies
andreportsonchildprotectionpractices.Ingeneral,thereisoftenasenseofmoral
panic, risk, and public anxiety when it comes to children’s Internet exposure and use.
30
Social media use could have negative effects on the well-being of some adolescents
including what is known as “E-Crime 2.0,”which includes “offences that exploit the
ways in which users of new communication technologies make themselves publicly
visible and available through new social media.”
31
Some of the harmful social media
effects that are reported in previous research on adolescents and children include “social
isolation, depression and cyber-bullying.”
32
In a large-scale study that involved about
10,000 EU children, the respondents themselves reported certain types of risks that they
find on the Internet including pornography, cyber-bullying, and violent content.
33
Other
types of harmful effects include “poor self-rating of mental health and experiences of
high levels of psychological distress and suicidal ideation.”
34
Indeed, exposure to violent
content seems to be one of the main recurrent public concerns when it comes to social
media use by adolescents and children.
In their politeness theory, Brown and Levinson discuss the different motivations behind
using negative face. For example, it might be used when discussing “dangerously emo-
tional or divisive topics e.g. politics, race, religion.”
35
Some of the goals behind employing
it include certain kinds of “orders and requests”made to denote to the other person a
desire to do or refrain from doing something.
36
In their compliance gaining theory,
Marwell and Schmitt discussed several techniques to persuade people including “punish-
ing activity,”which refers to the use of negative face or actions which usually entail
uttering threats.
37
Though the study was published long before the emergence of the
Internet, trolling and flaming can be linked to this theoretical concept since they can be
regarded as an online attempt to gain compliance by either modifying or preventing
certain kinds of behavior with the persistent use of negative face.
TERRORISM AND POLITICAL VIOLENCE 3
In relation to trolling, one of the first studies that examined it was conducted by
Donath on Usernet groups.
38
Also, Hardaker provides several definitions for trolling
and classifies it into different types based on four main features: aggression, deception,
disruption, and success. In relation to this study, two categories are more relevant. The
first one is called thwarted/frustrated impoliteness, which refers to the malicious intent of
a message, but its intention is frustrated or thwarted by the receiver either because (s)he is
not offended, so no action is taken (frustrated), or because it is countered by, for example,
“sarcasm, contempt, amusement, or suchlike”(thwarted). The second type is called
genuine, malicious, or strategic impoliteness, which successfully achieves its goal in
offending the receiver(s).
39
Further, Bishop discusses two types of trolling: flame trolling
and kudus trolling. The former refers to vitriolic comments that are not intended to be
humorous, unlike the latter type. Again, the overlap between the two terms is obvious
here. Bishop also classified people who troll others into different types,
40
yet none of the
classifications he offered could be applicable to this study on mediated terrorism.
In all cases, trolling seeks to create an argument, entice others into endless discussion,
or hijack a discussion.
41
In other words, trolling is meant as a distraction from the main
online discussion in the forum or platform by diverting attention to another issue which is
mostly irrelevant.
Similar to trolling, there is no agreement on a unified definition of flaming, but it
usually “consists of aggressive or hostile communication occurring via computer-mediated
channels.”
42
Indeed, flaming is similar to trolling, but the language is usually harsher,
more personal and is far more aggressive since it contains insults, obscenity, swearing, and
curses,
43
especially if the topic relates to religion.
44
Whether trolling or flaming, ISIS sympathizers run what is called “‘disseminator’
accounts”on social media, especially Twitter, which “lend moral and political support
to those in the conflict.”
45
It is also known as the Swarmcast model in communication
studies; “once content is produced and released, it is often the distributing network of
media mujahideen, rather than the original producer, that ensures continuing content
availability.”
46
This model suggests that sympathizers gather like a swarm of bees or birds
that always re-organize themselves and are ready to engage and attack at any given time.
In the following section, a discussion is made on ISIS’s media techniques.
ISIS communication strategy
ISIS employs a communication strategy that is based on highlighting certain appeals.
Haroro J. Ingram identified three media strategies followed by ISIS: “the use of a multi-
dimensional, multi-platform approach that simultaneously targets ‘friends and foes’to
enhance the reach, relevance and resonance of its messaging; the synchronisation of
narrative and action to maximise operational and strategic ‘effects’in the field; and the
centrality of the Islamic State ‘brand’to its entire campaign.”
47
In this regard, the high
number of ISIS recruits indicates that ISIS is still successful since one of its most
important appeals being employed is its professed link to a conservative version of
Islam (salaf or pious predecessors). This claim is used as a marketing tool by ISIS as its
members insist on utilizing the black banner which was originally used by Muslims when
Islam first emerged. Further, the group’s name itself is meant to sound Islamic (ISIS), or
later abbreviated as the Islamic State (Tandheem Al-Dawlah Al-Islamiah). Third, there is
4A. AL-RAWI
an ongoing flow of information from cities controlled by ISIS, showing that the group
intends to rule in a utopian way that is allegedly reminiscent of early Islam, especially in
relation to highlighting religious duties and obligations.
48
The above claims are all meant
to brand ISIS as a purely Islamic group,
49
so any attack against its members is regarded as
an attack against Islam itself. For example, ISIS’sDabiq magazine refers to anyone that
fights the group as an enemy of Islam, infidel, or apostate. In an article on AbūSinān an-
Najdī, who was killed in his attack on the Āl Salūl Emergency Task Force in Saudi Arabia,
the writer pledges revenge against Saudi security forces: “By Allah! You will not enjoy
safety and security, and you will not have a comfortable life as long as you wage war
against Islam and the Muslims and remain as tails of the West, which plays around with
you as it pleases. Your coalition with the Majūs [pejorative for Shiites] and the Crusaders
against Ahlus-Sunnah [Sunnis] in Iraq and Shām is the biggest witness against you.”
50
Further, ISIS repeatedly portrays itself as “the protective vanguard for the world’s Sunni
Muslims,”
51
while the theme of victimhood in the sense that Muslims, especially Sunnis,
are victims of world powers is prominent in ISIS’s promotional materials.
52
Indeed,
equating the group with Islam and the Sunni faith is one of the appeals that drives
some devout Muslims to join this criminal organization.
On the other hand, ISIS also releases favorable images by showing its charitable side,
such as helping elderly people or organizing life in the cities they control. Some also show
fighters relaxing, swimming, eating, and playing with cats.
53
According to a study con-
ducted by Voactiv on ISIS’s promotional materials for about a one-month period, 45% of
the materials posted online are focused “on its efforts to build and sustain the caliphate.”
54
The study also found that only 2% of the materials posted targeted the West, in compar-
ison to 4% on Libya that recently witnessed a growing ISIS presence. James Farwell claims
that these “warmer images aim to communicate the message that, while strictly Islamic,
ISIS stands for promoting the welfare of people, not murdering them.”
55
Yet this is not the
only message ISIS wants to communicate, as the main intention behind releasing such
positive images is to give the impression to the outside world as well as to the people they
control that the group is strong and resilient as it is not affected by the ongoing military
operations against its fighters. Further, some recruits seek thrilling experiences and
adventure and regard ISIS as the “hippest”
56
and “sexiest jihadi group on the block.”
57
Bennhold observes that some young ISIS recruits come “from a world in which . . . Islam is
punk rock. The headscarf is liberating. Beards are sexy.”
58
Other reports on “pop jihadists”
in Europe fit this category, and they are defined as “Muslim youngsters who flirt with
terrorist symbols”with the use of social media.
59
Finally and most importantly, ISIS uses propaganda and misinformation which are
based on disseminating its ideology to as many people as possible and in various
languages. President Obama revealed some of ISIS’s strategies in a speech delivered
in February 2015: “The high-quality videos, the online magazines, the use of social
media, terrorist Twitter accounts—it’s all designed to target today’syoungpeople
online, in cyberspace.”
60
Aside from the different tools that circumvent Internet censor-
ship, ISIS and its affiliates and sympathizers use Al-Hayat, Al-Furqan, and Al-Ethar
media centers, which function as their centralized Information Ministry. These differ-
ent media centers use social media outlets like YouTube, Twitter, and Facebook besides
certain websites, radio stations, the Clanging of the Swords promotional videos, and its
Dabiq magazine to disseminate their ideology.
61
The New York Times is accurate in
TERRORISM AND POLITICAL VIOLENCE 5
describing ISIS media strategy as Jihad 3.0
62
due to its highly sophisticated media
campaign that involves the use of “multidimensional propaganda,”
63
high-tech filming,
and editing equipment.
64
The term is originally derived from Web 3.0, which devel-
oped from Web 2.0. According to Manuel Castells, this new phenomenon refers to “the
cluster of technologies, devices, and applications that support the proliferation of social
spaces on the Internet thanks to increased broadband capacity, open source software,
and enhanced computer graphics and interface, including avatar interaction in three-
dimensional virtual spaces.”
65
Indeed, ISIS is making full use of different technologies
that are not confined to social media, especially Twitter, but extend to video games,
hacking by its Cyber Caliphate Army, apps, and the Dark Web.
According to an ISIS follower, the group uses a few centralized Twitter accounts that
“tweet official statements and news updates”as well as provincial accounts run from the
provinces ISIS controls, “which publish a live feed about [local] Isis operations.”
66
In
addition, there are ISIS “jihobbyists,”
67
fan clubs, or followers and sympathizers, for it is
estimated that ISIS has about 46,000 Twitter accounts that are sympathetic to or suppor-
tive of the group, which are mostly based in Iraq, Syria, and Saudi Arabia,
68
prompting the
EU to commission the European Law Enforcement Agency, Europol, to block ISIS access
to social media.
69
This decentralized communication method makes it challenging to
counter ISIS messages,
70
though it can offer some security benefits like disclosing valuable
information about the location of some ISIS fighters.
71
According to Berger and Morgan’s
study on ISIS Twitter accounts, 73% of the followers selected Arabic as their main
language followed by 18% English and 6% French, “afinding that tracks to some extent
with the distribution of Western foreign fighters.”
72
In fact, the Arabic language has long
been one of the fastest growing languages on Twitter, with more than 2 million tweets
posted every single day.
73
Other media platforms are actively exploited by ISIS. In April 2014, ISIS “introduced an
Android app, called ‘The Dawn of Glad Tidings,’which leverages Twitter users’accounts
to share ISIS-related tweets.”
74
It was only recently that ISIS moved to another social
network called “Diaspora”and other lesser known networks and websites like Friendica,
Quitter, Justpaste, Ask.fm, Soundcloud, and Mixlr after its Twitter accounts were
blocked.
75
In terms of online influence, it seems that ISIS has a wide network of followers
and/or sympathizers that exist not only in the Middle East region but that extend to North
America and Europe.
76
It is important to note here that the shocking beheading and killing images and
videos that are disseminated by ISIS are meant to create awareness about the group and
its activities similar to the shock advertising techniques used by some commercial
corporations which are well documented in previous scientific research.
77
This is
another persuasive strategy as ISIS attempts to brand itself as a savage group that is
defending Islam against the infidels, represented by anyone that fights them. In this
regard, social networking sites are mostly used to attract attention and entice possible
victims, after which other communication technologies are used, especially mobile
services like Viber, Surespot, WhatsApp, FaceTime, Kik, Skype, and Telegram.
78
In
brief, the different platforms used and media strategies followed by ISIS that seem to
complement each other indicate that this group is waging a new Jihad that goes beyond
what Web 2.0 offers, making it far more effective than traditional terrorist organiza-
tions like Al-Qaeda.
6A. AL-RAWI
ISIS’s video game
The focus of this study is on the video game released by ISIS that is adapted from the well-known
Grand Theft Auto (GTA). In particular, the research is limited to the videos and comments
posted on this video game trailer. It is not clear whether the game was truly produced or not; it is
also not clear who exactly developed it since there are many links to the video game, especially
those leading to torrent websites. However, the current links either do not work or lead to
maliciouswebsites(seeforexampleFigure1).
79
Certainly, the video game’s trailer is not
produced by the centralized media centers of ISIS like Al-Hayat, Al-Furqan, and Al-Ethar,
especially in that the group stands against entertainment activities like listening to music or
playing games that can divert attention from prayer and faith.
80
This means that the game is
made by some ISIS followers or sympathizers probably outside the group’s controlled territories.
In terms of its development, it is not difficult to make changes to the original GTA game by
customizing characters or playing opposing roles similar to America’sArmyand Modern
Warfare 2, as mentioned above (see Figure 2). As for the date of ISIS’s video game release,
one of the first videos to report on the GTA game appeared on YouTube in June 2014, but the
game became more popular in September of the same year, based on a Google search in Arabic
using the term “Download Salil al-Sawarem’sgame.”“Salil al-Sawarem”is also the name given
by ISIS to its motivational religious chant, which must be distinguished from the video game.
81
In all cases, the game is called “Salil al-Sawarem”in Arabic (The Clanging of the Swords),
which is a first person shooter game.
82
The game’s cover reads: “Your games which are
producing from you, we do the same actions in the battlefields!!”
83
In other words, the types of
real armed confrontations ISIS is engaged with are similar to the virtual wars produced in
Western video games. Further, the name itself given to the game is also supposed to project the
idea of strength, fearlessness, and resilience at times of war. It is alleged that ISIS adapted
Figure 1. A seemingly malicious website that hosts ISIS’s game. The file looks malicious because its size
is only 375KB, which is too small for a game like GTA.
TERRORISM AND POLITICAL VIOLENCE 7
another first person shooter game called RMA III which is developed for Microsoft
84
as well as
another version of the famous Call of Duty.
85
In general, the target group of such video games is young people who are supposed to be more
attracted to violent and first shooter games. There seems to be certain emotional appeals for
young male adolescents to play first shooter games,
86
including a desire to “experience fantasies
of power and fame, to explore and master what they perceive as exciting and realistic environ-
ments (but distinct from real life), to work through angry feelings or relieve stress, and as social
tools.”
87
Other studies showed that there is a positive correlation between adolescents’anger,
frustration, and peer rejection on the one hand and preference for antisocial media content and
cyberbullying on the other hand.
88
Indeed, violent video games are more appealing for adoles-
cents than for adults,
89
partly due to the wishful identification with some of the games’
characters.
90
As mentioned above, some view ISIS as a “cool”organization in its Jihad 3.0 efforts,
so producing such games can help in recruiting young people to its organization.
Results and discussion
In terms of methodology, an Arabic language search was made on YouTube using the term
“ISIS’s Salil al-Sawarem game”on September 5, 2015. YouTube is selected because it is regarded
as one of the most famous video platforms in the world,
91
and YouTube gaming channels that
attract people from different ages, especially teenagers, are regarded as the most popular ones.
92
In fact, YouTube gaming offers massive economic opportunities for videogame producers and
professionalgamersbecauseofthelargenumberoffans.
93
According to Forbes magazine,
YouTube gaming channels bring in over 3.5 billion views a month as of June 2014.
94
The top ten clips were selected based on the number of views (See Table 1),
95
and a
content analysis of the posted videos and their comments was conducted to understand
Figure 2. ISIS’s video game cover.
8A. AL-RAWI
Table 1. YouTube clips on ISIS’s video game.
No. Hyperlinks No. of views Tone No. of comments Date posted No. of likes No. of dislikes
1https://www.youtube.com/watch?v =
45EG2MVmzC4&list = PLOdRtf56-
ng5VGGyNYtT69qH9TzQdVYM5&index = 25
119,814 Negative 196 Oct 8, 2014 1154 254
2https://www.youtube.com/watch?v = FoPPaZl23Bw 37,552 Positive 6 Sep 21, 2014 176 291
3https://www.youtube.com/watch?v = 5HEdnrG37ZM 37,256 Positive 14 Sep 21, 2014 73 29
4https://www.youtube.com/watch?v = W5LDEJ8qAEA 27,853 Positive 83 Jul 8, 2015 117 143
5https://www.youtube.com/watch?v = ck_9gpJBOSs 12,952 Positive Disabled Sep 21, 2014 31 78
6https://www.youtube.com/watch?v = CNycIc4ImSI 11,844 Neutral 13 Sep 20, 2014 34 31
7https://www.youtube.com/watch?v = mN4e_8uaD6I 11,096 Neutral 17 Mar 13, 2015 25 94
8https://www.youtube.com/watch?v = eupI1LICSpI 10,654 Positive 5 Aug 7, 2015 58 29
9https://www.youtube.com/watch?v = 5PxBUIEH504 9,576 Positive 20 Jun 7, 2014 78 39
10 https://www.youtube.com/watch?v = zcLuyrTd7Vc 8,091 Negative 43 Oct 17, 2014 56 55
TERRORISM AND POLITICAL VIOLENCE 9
their tone or valence in terms of expressing negative, positive, or neutral views towards the
game and its sponsor.
96
The tone of the video towards ISIS and its video game was
assessed based on what is presented in the video itself, the title, and/or its accompanying
description. This is a method that has been followed in many studies on YouTube videos
and their comments.
97
In relation to this study, video clips (8) and (9) mostly presented the game in a neutral
way, yet their descriptions referred to ISIS as a state that must remain forever (Baqyyah
#ﺑﺎﻗﻳﺔ ), or that it was the one which follows the right path of Prophet Muhammed. Hence,
these two videos were coded as positive towards ISIS and the game. If the stance was not
clear, the video was coded as neutral. Before coding all the videos and comments, two
coders examined over 10% of the sample (n= 3 videos and 50 comments), and intercoder
reliability was measured using Cohen’s Kappa. A .890 agreement was reached that was
very acceptable.
98
The total number of views for these ten videos was 286,688 and the earliest clip posted
was on June 7, 2014. The highest number of views (119,861) and comments (196) was for
a video that made fun of the game and ISIS that was posted by an Iraqi comedian who
imitates Jon Stewart and Bassem Youssef. As for the tone of posted videos, there were
more positive clips towards ISIS and its video game (n= 6) than negative (n=2)or
neutral (n= 2) ones. In fact, some video posters openly showed their support for ISIS. For
example, video clip number (2) is posted by user “Abu Bakr Al-Baghdadi’s lovers,”while
many other commentators have ISIS’s black banner as their users’photo (see Figure 3).
With regard to the total number of likes and dislikes, it was only accurate to count them
by taking into account the tone of the videos posted. In total, there were 1,944 dislikes
(68.3%) of the game and ISIS in comparison to 901 likes (31.5%).
As for the comments, there were in total 397 comments and replies on the posted
videos. Due to the highly personal nature of replies, they were discarded from the study
together with any irrelevant and ambiguous posts. In total, 199 comments were identified;
57.2% (n= 114) of the comments were negative towards the game and ISIS, 33.6%
(n= 67) comments were positive, and 9% (n= 18) were neutral without supporting any
side (see Figure 4). With regard to the negative comments, they usually contained praise
for anyone who criticized ISIS and its game, which was usually ridiculed for the claim that
it was independently developed from Grand Theft Auto. For example, YouTuber “Hadji
M”mentioned that “this is a famous American video game, and any person with some
experience in programming can change the shapes of its characters and even the sound
effects.”Further, most of the criticism was centered on showing that ISIS did not represent
Islam and/or that Shiite militias fighting ISIS were victorious. As for the positive com-
ments that praised the game and ISIS, they constituted 33.6% of the total comments.
These results closely correspond with the number of video dislikes (68.3%) of the game
and their likes (31.5%). Despite the dominance of negative comments against ISIS, there
was still an active group of sympathizers and followers who mostly believed that support-
ing ISIS online was an expression of their devotion to Sunni Islam, allegedly under attack
by Shiites. To give a few examples, YouTuber “Islamic Flood”says: “You’ve reached a
cowardice stage that you’re afraid of an Islamic State’s game. . . . Hail to the Islamic state’s
men and let [Allah] fortify its Mujahideen. . . . The Islamic State has defeated you in all the
religious, military, cultural and even electronic fronts.”Another YouTuber called
“Muhammed Al-Mutairi”gave ISIS a more regional scope, stating: “We wish the game’s
10 A. AL-RAWI
Figure 3. Screenshot of the video game trailer uploaded by the user “Abu Bakr Al-Baghdadi’s lovers.”
114
67
18
0
20
40
60
80
100
120
Ne
g
ative Positive Neutral
Figure 4. Tone of comments on the top 10 YouTube videos.
TERRORISM AND POLITICAL VIOLENCE 11
objective is to make the Mujahideen heroes. . . . Their goal is to spread Islam, defend the
righteous, and lift injustice from Muslims. . . . Frankly, we need such games in order to
have a new generation whose goal is to remove Israel and its agents from Muslim lands.”
Finally, YouTuber “Hasoon A”connected his favorable comment towards ISIS with
famous Twitter hashtags such as “ISIS remains”that is mentioned above, saying: “It’ll
expand (# ﲤﺘﺪ ); if you leave it alone, it’ll be strengthened (# ﺗﺸﺘﺪ ). By Allah’s will, if you fight it,
it’ll remain (# ﺑﺎﻗﻴﺔ )”.
As mentioned above, almost all the replies were personal, containing attacks on
individual posters who opposed ISIS or vice versa. These replies were highly sectarian in
nature as there was intense flaming in the kind of exchange of obscene language and
religious curses especially between Sunnis and Shiites. For example, any criticism against
ISIS was interpreted by some of the group’s sympathizers as criticism against Islam and/or
the Sunni faith. This finding is similar to other studies that examined religious comments
on YouTube and the divisive sectarian rhetoric that characterizes this platform.
99
The
prevalent use of the negative face by the two opposing online communities was expected
because of the nature of the religious topic discussed.
100
The main function of the negative
face was to gain compliance via punishing activity.
101
This was routinely done by using
flaming in order to either force the opponents to leave the platform/video commentary
section or make them stop writing negative comments.
Further and in relation to the swarming communication model, ISIS followers seemed
to gather around videos that referred to DAESH ( ﺪﺎﻋﺷ ), which is the Arabic acronym of
ISIS. The term itself is regarded as demeaning by ISIS, which prohibits people living under
its control from using it.
102
ISIS followers are usually very active in responding to ISIS
criticism and are often accompanied by other users who share the same beliefs. Similar to
a swarming activity, they closely coordinate and synchronize their trolls as they suddenly
appear to assist some ISIS members in the exchange of insults, and they disappear
afterwards. It is like waging a constant online war.
The other main function of this trolling activity is to silence opposition and dissent,
especially that which comes from Shiite Muslims. Most importantly, the trolling and
flaming game played by ISIS followers on YouTube serves the purpose of winning some
oppositional or neutral voices to their side since the exchange of insults frequently results
in curses against Sunni figures who are highly venerated, like Prophet Mohammed’s
companions. In this way, ISIS followers will get the required evidence that Shiites hold
antagonistic views against Sunnis, which might produce the possible impact on some
devout Sunnis. This sophisticated technique is similar to what is used by ISIS on English-
language platforms that target Westerners. For example, Shawn Carrie observes that
condemning ISIS on Twitter usually results in “openly mixing statements like ‘support
our troops’mingled cozily next to ‘kill all muslims.’”
103
Carrie emphasizes that the latter
term is repeatedly used by ISIS as a recruitment tool to convince some that there is
inherent Western hatred and an ongoing attack against Islam and that ISIS is the only
group that truly defends the doctrine. Further, other news reports like “US Gun-maker
Creates ‘Crusader’Rifle to Fight Islamic State”
104
are regarded by ISIS as excellent
examples that support their abovementioned claim.
In this regard, this trolling and flaming game, which I call the “troll, flame, and engage”
technique, is regarded as an effective recruitment tool in ISIS’s Jihad 3.0 efforts. It is
important to note here that some of the attempts made by ISIS followers and sympathizers
12 A. AL-RAWI
to create a reaction from the online audience fail in what is called thwarted/frustrated
impoliteness.
105
These attempts to agitate YouTubers are meant to be tactical diversions
from the main negative discussion on and criticism of ISIS, which is what characterizes
trolling.
106
Yet, a few other attempts by ISIS followers can be categorized as genuine,
malicious, or strategic impoliteness
107
because they succeed in offending their opponents
by using highly obscene terms, insults, and curses. For example, Figure 5 shows how one
YouTuber, “Layth Jamal,”systematically flames by posting abusive comments in response
to anyone criticizing ISIS in order to gain compliance. He starts trolling one user,
“Abdulla ahmmad12,”and is suddenly accompanied by YouTuber “Gvhh Gbj,”who
both personally attack and succeed in offending their target. In the end, they engage
him by using sectarian rhetoric which is meant to gain his support, silence him, or force
him to abandon the online platform. In the example given here, “Abdulla ahmmad12”
starts questioning “Layth Jamal”for the latter’sflaming language. In his response, “Layth
Figure 5. Trolling, flaming, and engaging on YouTube.
TERRORISM AND POLITICAL VIOLENCE 13
Jamal”says: “I have started insulting any Shiite I encounter online though they still post
negative comments against me”because he praises ISIS. In this case, “Layth Jamal”
believes that flaming can drive users away from the platform or from posting negative
comments. Further, the sectarian language was meant to engage others, for “Abdulla
ahmmad12”responded by saying: “By Allah, I’m a Sunni myself.”“Layth Jamal”further
manipulated the sectarian discussion by questioning “Abdulla ahmmad12”’s faith: “If you
are a Sunni, how come you encourage them to make such offensive clips that insult the
Prophet. The Shiites sent me private messages in which they cursed Abu Bakr, Othman,
and Aysha [Muhammed’s companions].”Further, “Gvhh Gbj”offered his apology for
flaming, stating that he thought that “Abdulla ahmmad12”was a “dirty and filthy Shiite.”
The online engagement ended with a cheerful tone due to reaching some kind of mutual
understanding. In brief, “Layth Jamal”and “Gvhh Gbj”made use of the anonymous
feature of YouTube to swarm and troll others whenever they found a suitable video that
demeaned ISIS. The purpose was to divert attention from the main discussion, and
flaming was used if the impoliteness was thwarted or frustrated, which ultimately ended
in engaging some neutral or opposing voices.
Conclusion
The general goal behind making and releasing Salil al-Sawarem’s video game is to gain
publicity and attract attention to the group. This is part of the group’s Jihad 3.0 efforts, as
the main target is young people who might get the impression that ISIS is a technologi-
cally advanced group that not only produces high-definition and well-edited videos but
also has its owns apps, social media tools, drones, and video games. The findings of this
study show that the majority of comments and number of likes and dislikes are against
ISIS and its video game, but YouTube remains one of the main online platforms wherein
ISIS is still sharing and spreading its messages, which is evident in the high number of
favorable ISIS videos. Also, there are a considerable number of followers and sympathizers
who constantly try to influence others by using trolls, flames, and certain kinds of
engagements, while a highly divisive and sectarian rhetoric is used in order to polarize
the audience and possibly gain the support of some users.
For future research, more studies are needed in order to examine other social media
platforms like Facebook in order to investigate whether swarming and the troll, flame, and
engage method is also used by ISIS followers. Further, interviews with online users who
are actively engaged with ISIS members are needed in order to further understand the
various motivations and possible effects of this online interaction with a focus on gender,
sectarian discussion, and age.
Notes on contributor
Ahmed Al-Rawi is an Assistant Professor in the Department of Communication Studies, Concordia
University, Montreal, Canada; and a Research Fellow in the Department of Media & Communication,
Erasmus University Rotterdam, Rotterdam, the Netherlands.
14 A. AL-RAWI
Notes
1. John McCoy and W. Andy Knight, “Homegrown Terrorism in Canada: Local Patterns,
Global Trends,”Studies in Conflict & Terrorism 38, no. 4 (2015): 253–74.
2. Eric Schmittdec, “In Battle to Defang ISIS, U.S. Targets Its Psychology,”The New York
Times, December 28, 2014, http://www.nytimes.com/2014/12/29/us/politics/in-battle-to-
defang-isis-us-targets-its-psychology-.html?_r=0 (accessed January 7, 2015).
3. Reuters, “FBI Tracking 150 Americans Who Traveled to Syria, Perhaps to Fight,”November 18,
2014, http://www.reuters.com/article/2014/11/18/us-usa-fbi-syria-idUSKCN0J22HG20141118#_
blank (accessed December 25, 2015).
4. CNN, “The Names: Who Has Been Recruited to ISIS from the West,”February 26, 2015,
http://www.cnn.com/2015/02/25/world/isis-western-recruits/ (accessed March 1, 2015).
5. Standing Senate Committee on National Security and Defence, “Countering the Terrorist
Threat in Canada: An Interim Report,”2015, http://www.parl.gc.ca/Content/SEN/
Committee/412/secd/rep/rep18jul15-e.pdf (accessed January 8, 2016).
6. Spencer Ackerman, “‘Apocalyptic’Isis beyond Anything We’ve Seen, Say US Defence
Chiefs,”The Guardian, August 22, 2014, http://www.theguardian.com/world/2014/aug/21/
isis-us-military-iraq-strikes-threat-apocalyptic (accessed October 20, 2015).
7. Erin Saltman and Charlie Winter, “Islamic State: The Changing Face of Modern Jihadism,”
Quillam, November, 2014, https://www.quilliamfoundation.org/wp/wp-content/uploads/pub
lications/free/islamic-state-the-changing-face-of-modern-jihadism.pdf (accessed June 10,
2016).
8. Martin Chulov, “ISIS: The Inside Story,”The Guardian, December 11, 2014, http://www.
theguardian.com/world/2014/dec/11/-sp-isis-the-inside-story?CMP=share_btn_tw (accessed
January 9, 2015).
9. Robert Tait, “ISIS’Half-a-billion-dollar Bank Heist Makes it World’s Richest Terror Group,”
The Telegraph, June 14, 2014, http://www.telegraph.co.uk/news/worldnews/middleeast/iraq/
10899995/ISIS-half-a-billion-dollar-bank-heist-makes-it-worlds-richest-terror-group.html
(accessed July 28, 2015)
10. CBS, “U.N.: ISIS Committing War Crimes in Iraq,”June 16, 2014, http://www.cbsnews.com/
videos/u-n-isis-committing-war-crimes-in-iraq/ (accessed July 29, 2015). See also Richard
Spencer, “Iraq Crisis: UN Condemns ‘War Crimes’as Another Town Falls to Isis,”The
Guardian, June 16, 2014, http://www.telegraph.co.uk/news/worldnews/middleeast/iraq/
10904414/Iraq-crisis-UN-condemns-war-crimes-as-another-town-falls-to-Isis.html (accessed
July 17, 2015).
11. Schmittdec, “In Battle to Defang ISIS”(see note 2 above).
12. Alex P. Schmid and Janny De Graaf, Violence as Communication: Insurgent Terrorism and
the Western News Media (London: Sage, 1982), 14.
13. Paul Wilkinson, “The Media and Terrorism: A Reassessment,”Terrorism and Political
Violence 9, no. 2 (1997): 51–64; Pippa Norris, Montague Kern, and Marion R. Just,
Framing Terrorism: The News Media, the Government, and the Public (London: Psychology
Press, 2003); Austin T. Turk, “Sociology of Terrorism,”Annual Review of Sociology (2004):
271–86; Brigitte Lebens Nacos, Mass-mediated Terrorism: The Central Role of the Media in
Terrorism and Counterterrorism (Lanham, MD: Rowman & Littlefield, 2007); Philip Seib and
Dana M. Janbek, Global Terrorism and New Media: The Post-Al Qaeda Generation
(Abingdon, UK: Routledge, 2010); Christoph P. Pfeiffer, “Terrorism and Its Oxygen: A
Game-theoretic Perspective on Terrorism and the Media,”Behavioral Sciences of Terrorism
and Political Aggression 4, no. 3 (2012): 212–28; Cristina Archetti, Understanding Terrorism
in the Age of Global Media: A Communication Approach (Basingstoke, UK: Palgrave
Macmillan, 2012); Susan Currie Sivek, “Packaging Inspiration: Al Qaeda’s Digital Magazine
in the Self-Radicalization Process,”International Journal of Communication 7 (2013): 23.
14. Des Freedman and Daya Thussu, “Introduction: Dynamics of Media and Terrorism,”in
Media & Terrorism: Global Perspectives, edited by Des Freedman and Daya Thussu
(Thousand Oaks, California: Sage, 2012), 10.
TERRORISM AND POLITICAL VIOLENCE 15
15. Lincoln Dahlberg, “The Internet, Deliberative Democracy, and Power: Radicalizing the
Public Sphere,”International Journal of Media & Cultural Politics 3, no. 1 (2007): 47–64.
16. Maura Conway and Lisa McInerney, “Jihadi Video and Auto-radicalisation: Evidence from
an Exploratory YouTube Study,”in Intelligence and Security Informatics (Berlin: Springer
Berlin Heidelberg, 2008), 108–118; Quillam,“Cheering for Osama: How Jihadists use
Internet Discussion Forums,”London, August, 2010, http://www.quilliamfoundation.org/
wp/wp-content/uploads/publications/free/cheering-for-osama-how-jihadists-use-the-inter
net-forums.pdf (accessed June 4, 2015).
17. Nico Prucha, “Online Territories of Terror–Utilizing the Internet for Jihadist Endeavours,”
Jihadism Online,2011,http://www.oiip.ac.at/fileadmin/Unterlagen/Dateien/Publikationen/
Article_ORIENT_IV_NicoPrucha.pdf (accessed January 10, 2016).
18. Seib and Janbek, Global Terrorism, ix (see note 13 above).
19. John Venhaus, “Why Youth Join al-Qaeda. United States Institute of Peace,”United States
Institute of Peace, May, 2010, http://www.usip.org/sites/default/files/SR236Venhaus.pdf
(accessed June 4, 2015)
20. Robert Young, “Going Fifth Freedom: Fighting the War on Terror in the Splinter Cell:
Blacklist Video Game,”Critical Studies on Terrorism 8, no. 1 (2015): 147–62.
21. James Newman, Playing with Videogames (Abingdon, UK: Routledge, 2008), 169; Phoebe
Wild, “Sam Fisher and the ‘War on Terror’: An Analysis of Splinter Cell in a Post-9/11
Context,”Critical Studies on Terrorism 7, no. 3 (2014): 434–45; Talmadge Wright, Eric Boria,
and Paul Breidenbach, “Creative Player Actions in FPS Online Video Games: Playing
Counter-Strike,”Game Studies 2, no. 2 (2002): 103–23.
22. Marcus Schulzke, “The Virtual War on Terror: Counterterrorism Narratives in Video
Games,”New Political Science 35, no. 4 (2013): 586–603.
23. Alec Charles, “Playing with One’s Self: Notions of Subjectivity and Agency in Digital Games,”
Eludamos. Journal for Computer Game Culture 3, no. 2 (2009): 281–94.
24. Robert W. Sweeny, “Pixellated Play: Practical and Theoretical Issues Regarding Videogames
in Art Education,”Studies in Art Education 51, no. 3 (2010): 263.
25. Vit Sisler, “Palestine in Pixels: The Holy Land, Arab-Israeli Conflict, and Reality Construction
in Video Games,”Middle East Journal of Culture and Communication 2, no. 2 (2009): 275–92.
26. Marcus Schulzke, “Simulating Terrorism and Insurgency: Video Games in the War of Ideas,”
Cambridge Review of International Affairs 27, no. 4 (2014): 627–43.
27. Vit Sisler, “10 Playing Muslim Hero,”in Digital Religion: Understanding Religious Practice in
New Media Worlds, edited by Heidi Campbell (London: Routledge, 2012), 136–46.
28. Susan Herring, Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab, “Searching for Safety
Online: Managing ‘Trolling’in a Feminist Forum,”The Information Society 18, no. 5 (2002):
371–384, 372.
29. John Suler, “The Online Disinhibition Effect,”Cyberpsychology & Behavior 7, no. 3 (2004):
321–26; Noam Lapidot-Lefler and Azy Barak, “Effects of Anonymity, Invisibility, and Lack of
Eye-contact on Toxic Online Disinhibition,”Computers in Human Behavior 28, no. 2 (2012):
434–43.
30. Matthew David, Amanda Rohloff, Julian Petley, and Jason Hughes, “The Idea of Moral
Panic–Ten Dimensions of Dispute,”Crime, Media, Culture 7, no. 3 (2011): 215–28; Gary
Clapton, Viviene E. Cree, and Mark Smith, “Moral Panics and Social Work: Towards a
Sceptical View of UK Child Protection,”Critical Social Policy 33, no. 2 (2013): 197–217.
31. Majid Yar, “E-Crime 2.0: The Criminological Landscape of New Social Media,”Information &
Communications Technology Law 21, no. 3 (2012): 207.
32. Paul Best, Roger Manktelow, and Brian Taylor, “Online Communication, Social Media and
Adolescent Wellbeing: A Systematic Narrative Review,”Children and Youth Services Review
41 (2014): 27–36.
33. Sonia Livingstone, Lucyna Kirwil, Cristina Ponte, and Elisabeth Staksrud, “In Their Own
Words: What Bothers Children Online?,”European Journal of Communication 29, no. 3
(2014): 271–88.
16 A. AL-RAWI
34. Hugues Sampasa-Kanyinga and Rosamund F. Lewis, “Frequent Use of Social Networking
Sites Is Associated with Poor Psychological Functioning among Children and Adolescents,”
Cyberpsychology, Behavior, and Social Networking 18, no. 7 (2015): 380–85.
35. Penelope Brown and Stephen C. Levinson, Politeness: Some Universals in Language Usage
(Cambridge: Cambridge University Press, 1987), 67.
36. Brown and Levinson, Politeness, 65 (see note 35 above).
37. Gerald Marwell and David R. Schmitt, “Dimensions of Compliance-gaining Behavior: An
Empirical Analysis,”Sociometry (1967): 350–64.
38. Judith S. Donath, “Identity and Deception in the Virtual Community,”in Communities in
Cyberspace, edited by Peter Kollock and Marc Smith (London: Routledge, 1999), 27–58.
39. Claire Hardaker, “Trolling in Asynchronous Computer-mediated Communication: From
User Discussions to Academic Definitions”(2010): 218–9.
40. Jonathan Bishop, “Representations of ‘Trolls’in Mass Media Communication: A Review of
Media-texts and Moral Panics Relating to ‘Internet Trolling,’” International Journal of Web
Based Communities 10, no. 1 (2014): 12.
41. Paul Baker, “Moral Panic and Alternative Identity Construction in Usenet,”Journal of
Computer-Mediated Communication 7, no. 1 (2001); Herring, Job-Sluder, Scheckler, and
Barab, “Searching for Safety Online: (see note 28 above); Tammara Combs Turner, Marc A.
Smith, Danyel Fisher, and Howard T. Welser, “Picturing Usenet: Mapping Computer-
mediated Collective Action,”Journal of Computer-Mediated Communication 10, no. 4 (2005).
42. Patrick B. O’Sullivan and Andrew J. Flanagin, “Reconceptualizing ‘Flaming’and Other
Problematic Messages,”New Media & Society 5, no. 1 (2003): 70.
43. Peter J. Moor, Ard Heuvelman, and Ria Verleur. “Flaming on Youtube,”Computers in
Human Behavior 26, no. 6 (2010): 1536–46.
44. Ahmed Al-Rawi, “Online Reactions to the Muhammad Cartoons: YouTube and the Virtual
Ummah,”Journal for the Scientific Study of Religion 54, no. 2 (2015): 261–76; Ahmed Al-
Rawi, “Facebook as a Virtual Mosque: The Online Protest against Innocence of Muslims,”
Culture and Religion 17, no. 1 (2016): 19–34; Ahmed Al-Rawi, “The Online Response to the
Quran Burning Incidents,”in Political Islam and Global Media: The Boundaries of Religious
Identity, edited by Noha Mellor and Khalil Rinnawi (London: Routledge, 2016), 105–21.
45. Joseph A. Carter, Shiraz Maher, and Peter R. Neumann. “# Greenbirds: Measuring
Importance and Influence in Syrian Foreign Fighter Networks,”The International Centre
for the Study of Radicalisation and Political Violence, 2014, http://icsr.info/wp-content/
uploads/2014/04/ICSR-Report-Greenbirds-Measuring-Importance-and-Infleunce-in-Syrian-
Foreign-Fighter-Networks.pdf (accessed April 20, 2015).
46. Ali Fisher, “How Jihadist Networks Maintain a Persistent Online Presence,”Perspectives on
Terrorism 9, no. 3 (2015): 4.
47. Haroro J. Ingram, “Three Traits of the Islamic State’s Information Warfare,”The RUSI
Journal 159, no. 6 (2014): 4.
48. Charlie Winter, “The Virtual ‘Caliphate’: Understanding Islamic State’s Propaganda
Strategy,”Quillam, July, 2015, http://www.quilliamfoundation.org/wp/wp-content/uploads/
publications/free/the-virtual-caliphate-understanding-islamic-states-propaganda-strategy.pdf
(accessed October 25, 2015).
49. Sam Thielman, “ISIS’Sinister Media Strategy, and How the West Is Fighting Back,”ADWeek.
September 10, 2014, http://www.adweek.com/news/television/isiss-sinister-media-strategy-
and-how-west-fighting-back-160021 (accessed October 20, 2015); Scott Shane and Ben
Hubbard, “ISIS Displaying a Deft Command of Varied Media,”The New York Times,
August 30, 2014, http://www.nytimes.com/2014/08/31/world/middleeast/isis-displaying-a-
deft-command-of-varied-media.html?partner=rss&emc=rss&smid=tw-nytimes&_r=0
(accessed October 25, 2015).
50. Dabiq, “The Final Statement of AbūSināna
n-Najdī(may Allah accept him),”33,no. 11, August,
2015, http://www.clarionproject.org/docs/Issue%2011%20-%20From%20the%20battle%20of%
20Al-Ahzab%20to%20the%20war%20of%20coalitions.pdf (accessed January 18, 2016).
TERRORISM AND POLITICAL VIOLENCE 17
51. “Detailed Analysis of Islamic State Propaganda Video: Although the Disbelievers Dislike It,”
Quillam, p. 32, December 19, 2014, http://www.quilliamfoundation.org/wp/wp-content/
uploads/publications/free/detailed-analysis-of-islamic-state-propaganda-video.pdf (accessed
July 20, 2015).
52. Charlie Winter, “Documenting the Virtual ‘Caliphate,’” Quillam, p. 23, 2015, http://www.
quilliamfoundation.org/wp/wp-content/uploads/publications/free/documenting-the-virtual-
caliphate.pdf (accessed January 18, 2016).
53. Winter, “Documenting the Virtual ‘Caliphate,’” 19 (see note 52 above); Kevin Collier, “Inside
the Dirty Twitter War against ISIS,”The Daily Dot, March 16, 2015, http://www.dailydot.
com/politics/isis-islamic-state-twitter-ctrlsec/ (accessed June 11, 2016); Jamie Tarabay, “What
a Mundane ISIS Video Can Teach Us about Its Propaganda,”Vocativ, August 31, 2015,
http://www.vocativ.com/news/227279/what-a-mundane-isis-video-can-teach-us-about-its-
propaganda (accessed June 11, 2016).
54. Jamie Tarabay, Gilad Shiloach, Amit Weiss, and Matan Gilat, “To Its Citizens, ISIS also
Shows a Softer Side,”Vocativ, March 20, 2015, http://www.vocativ.com/world/isis-2/to-its-
citizens-isis-also-shows-a-softer-side/ (accessed January 15, 2016).
55. James P. Farwell, “The Media Strategy of ISIS,”Survival 56, no. 6 (2014): 50.
56. Paul Tassi, “ISIS Uses ‘GTA 5’In New Teen Recruitment Video,”Forbes, September 20,
2014, http://www.forbes.com/sites/insertcoin/2014/09/20/isis-uses-gta-5-in-new-teen-recruit
ment-video/#18b7f0f63d29(accessed June 11, 2016).
57. Francesca Trianni and Andrew Katz, “Why Westerners Are Fighting for ISIS,”Time,
September 5, 2014, http://time.com/3270896/isis-iraq-syria-western-fighters (accessed June
11, 2016).
58. Katrin Bennhold, “Jihad and Girl Power: How ISIS Lured 3 London Girls,”The New York
Times, August 17, 2015, http://www.nytimes.com/2015/08/18/world/europe/jihad-and-girl-
power-how-isis-lured-3-london-teenagers.html (accessed June 11, 2016).
59. DutchNews.nl,“Authorities Fear the Rise of ‘Pop Jihad,’” November 26, 2013, http://www.dutch
news.nl/news/archives/2013/11/authorities_fear_the_rise_of_p.php (accessed January 10, 2015).
60. Kathy Gilsinan, “Is ISIS’s Social-Media Power Exaggerated?,”The Atlantic, February 23,
2015, http://www.theatlantic.com/international/archive/2015/02/is-isiss-social-media-power-
exaggerated/385726/ (accessed July 23, 2015).
61. Al Arabiya, “How ISIS Conquered Social Media,”June 24, 2014, http://english.alarabiya.net/en/
media/digital/2014/06/24/How-has-ISIS-conquered-social-media-.html (accessed July 23, 2015);
Steve Rose, “The ISIS Propaganda War: A Hi-tech Media Jihad,”The Guardian, October 7, 2014,
http://www.theguardian.com/world/2014/oct/07/isis-media-machine-propaganda-war
(accessed July 23, 2015); BBC, “Islamic State Magazine Dabiq Withdrawn from Sale by Amazon,”
June 6, 2015, http://www.bbc.com/news/world-middle-east-33035453 (accessed July 23, 2015);
Rudaw, “ISIS Radio Station Attacked Inside Mosul,”August 30, 2015, http://rudaw.net/english/
middleeast/iraq/30082015 (accessed January 2, 2016).
62. Shane and Hubbard, “ISIS Displaying a Deft Command”(see note 49 above).
63. Saltman and Winter, “Islamic State”(see note 7 above).
64. Rose, “The ISIS Propaganda War”(see note 61 above).
65. Manuel Castells, The Rise of the Network Society: The Information Age: Economy, Society, and
Culture (Oxford, UK: John Wiley & Sons, 2011), xxvii.
66. Patrick Kingsley, “Who is Behind Isis’s Terrifying Online Propaganda Operation?,”The
Guardian, June 23, 2014, http://www.theguardian.com/world/2014/jun/23/who-behind-isis-
propaganda-operation-iraq (accessed June 11, 2016).
67. Winter, “Documenting the Virtual ‘Caliphate,’” 7 (see note 52 above).
68. J. M. Berger and Jonathon Morgan, “The ISIS Twitter Census: Defining and Describing the
Population of ISIS Supporters on Twitter,”The Brookings Project on US Relations with the
Islamic World 3, no. 20, p. 2, (2015), http://www.brookings.edu/~/media/research/files/
papers/2015/03/isis-twitter-census-berger-morgan/isis_twitter_census_berger_morgan.pdf
(accessed June 11, 2016).
18 A. AL-RAWI
69. BBC News, “Islamic State Web Accounts to be Blocked by New Police Team,”June 22, 2015,
http://www.bbc.com/news/world-europe-33220037 (accessed February 8, 2016).
70. Jillian Melchior, “ISIS Tactics Illustrate Social Media’s New Place in Modern War,”
TechCrunch, October 15, 2014, http://techcrunch.com/2014/10/15/isis-tactics-illustrate-
social-medias-new-place-in-modern-war/ (accessed June 11, 2016).
71. Walbert Castillo, “Air Force Intel Uses ISIS ‘Moron’Post to Track Fighters,”June 5, 2015, http://
www.cnn.com/2015/06/05/politics/air-force-isis-moron-twitter/ (accessed June 11, 2016).
72. Berger and Morgan, “The ISIS Twitter Census,”14 (see note 68 above).
73. Semiocast, “Arabic Highest Growth on Twitter: English Expression Stabilizes under 40%,”
November 24, 2011, http://semiocast.com/publications/2011_11_24_Arabic_highest_
growth_on_Twitter (accessed December 12, 2012).
74. The Citizen Lab, “Monitoring Information Controls in Iraq in Reaction to ISIS Insurgency,”
University of Toronto, June 20, 2014, https://citizenlab.org/2014/06/monitoring-informa
tion-controls-in-iraq/ (accessed July 1, 2015).
75. BBC Monitoring, “Islamic State Shifts to New Platform after Twitter Block,”August 19, 2014,
http://www.bbc.com/news/world-middle-east-28843350 (accessed July 1, 2015); ADL, “ISIS
Supporters Exploit Mixlr to Broadcast Extremism,”Anti-Defamation League, November 21,
2014, http://blog.adl.org/extremism/isis-mixlr-terrorism-extremism-social-media (accessed
July 1, 2015); Shane and Hubbard, “ISIS Displaying a Deft Command”(see note 49 above).
76. Jessica Stern and John M. Berger, ISIS: The State of Terror (New York: HarperCollins, 2015);
Berger and Morgan, “The ISIS Twitter Census,”14 (see note 68 above); Jytte Klausen,
“Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and
Iraq,”Studies in Conflict & Terrorism 38, no. 1 (2015): 1–22.
77. Darren W. Dahl, Kristina D. Frankenberger, and Rajesh V. Manchanda, “Does it Pay to
Shock? Reactions to Shocking and Nonshocking Advertising Content among University
Students,”Journal of Advertising Research 43, no. 03 (2003): 268–80; Kara Chan, Lyann Li,
Sandra Diehl, and Ralf Terlutter, “Consumers’Response to Offensive Advertising: A Cross
Cultural Study,”International Marketing Review 24, no. 5 (2007): 606–28; Nathalie Dens,
Patrick De Pelsmacker, and Wim Janssens, “Exploring Consumer Reactions to Incongruent
Mild Disgust Appeals,”Journal of Marketing Communications 14, no. 4 (2008): 249–69; Tim
Jones, Peggy H. Cunningham, and Katherine Gallagher, “Violence in Advertising,”Journal of
Advertising 39, no. 4 (2010): 11–36; Karen Nelson-Field, Erica Riebe, and Kellie Newstead,
“The Emotions that Drive Viral Video,”Australasian Marketing Journal (AMJ) 21, no. 4
(2013): 205–11.
78. Corky Siemaszko, “U.S. Jihadis Being Recruited by ISIS via Skype to Attack Overseas—Or at
Home,”New York Daily News, July 3, 2014, http://www.nydailynews.com/news/crime/u-s-
jihadis-recruited-isis-skype-article-1.1854216 (accessed February 8, 2016); Hannah James,
“Female Recruits to ISIS: The Recruiter’s Call,”Global News, March 11, 2015, http://global
news.ca/news/1876491/female-recruits-to-isis-the-recruiters-call/ (accessed February 9,
2016); Nabeelah Jaffer, “The Secret World of ISIS Brides: ‘U dnt hav 2 pay 4 ANYTHING
if u r wife of a martyr,’” The Guardian, June 24, 2015, http://www.theguardian.com/world/
2015/jun/24/isis-brides-secret-world-jihad-western-women-syria (accessed February 8,
2016); Rukmini Callimachi, “ISIS and the Lonely Young American,”The New York Times,
June 27, 2015, http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-
american.html?_r=0 (accessed February 8, 2016).
79. There are two repeated links that are included in the description of some of the YouTube
videos such as http://adf.ly/s5s6S as well as http://adf.ly/7612116/daeshgame.
80. Ahmad Ramadan, “After the Internet, TV is next on ISIS blacklist,”The Arab Weekly, August
21, 2015, http://www.thearabweekly.com/?id=1634 (accessed June 11, 2016).
81. Ahmed Al-Rawi, “Anti-ISIS Humor: Cultural Resistance of Radical Ideology,”Politics,
Religion & Ideology (2016): 1–17.
82. Paul Crompton, “Grand Theft Auto: ISIS? Militants Reveal Video Game,”Al Arabiya,
September 20, 2014, http://english.alarabiya.net/en/variety/2014/09/20/Grand-Theft-Auto-
ISIS-Militants-reveal-video-game.html (accessed June 11, 2016).
TERRORISM AND POLITICAL VIOLENCE 19
83. Matthew Hall, “‘This Is Our Call of Duty’: How ISIS Is Using Video Games,”November 1,
2014, http://www.salon.com/2014/11/01/this_is_our_call_of_duty_how_isis_is_using_video_
games/ (accessed June 11, 2016).
84. Vocativ, “This Video Game Lets Jihadis Play as ISIS Fighters,”February 2, 2015, http://www.
vocativ.com/world/isis-2/isis-video-games/ (accessed June 11, 2016).
85. Jay Kang, “ISIS’s Call of Duty,”The New Yorker, September 18, 2014, http://www.newyorker.
com/tech/elements/isis-video-game (accessed June 11, 2016).
86. Jeroen Jansz, “The Emotional Appeal of Violent Video Games for Adolescent Males,”
Communication Theory 15, no. 3 (2005): 219–41; Jeroen Jansz and Martin Tanis, “Appeal
of Playing Online First Person Shooter Games,”CyberPsychology & Behavior 10, no. 1 (2007):
133–36.
87. Cheryl K. Olson, Lawrence A. Kutner, and Dorothy E. Warner, “The Role of Violent Video
Game Content in Adolescent Development: Boys’Perspectives,”Journal of Adolescent
Research 23, no. 1 (2008): 55.
88. Xanthe S. Plaisier and Elly A. Konijn, “Rejected by Peers—Attracted to Antisocial Media
Content: Rejection-based Anger Impairs Moral Judgment among Adolescents,”
Developmental Psychology 49, no. 6 (2013): 1165; Den Hamer, Anouk, Elly A. Konijn, and
Micha G. Keijer, “Cyberbullying Behavior and Adolescents’Use of Media with Antisocial
Content: A Cyclic Process Model,”Cyberpsychology, Behavior, and Social Networking 17, no. 2
(2014): 74–81.
89. Mark D. Griffiths, Mark N. O. Davies, and Darren Chappell, “Online Computer Gaming: A
Comparison of Adolescent and Adult Gamers,”Journal of Adolescence 27, no. 1 (2004):
87–96.
90. Elly A. Konjin, Marije Nije Bijvank, and Brad J. Bushman, “I Wish I Were a Warrior: The
Role of Wishful Identification in the Effects of Violent Video Games on Aggression in
Adolescent Boys,”Developmental Psychology 43, no. 4 (2007): 1038.
91. Jean Burgess and Joshua Green, YouTube: Online Video and Participatory Culture (Hoboken,
NJ: John Wiley & Sons, 2013).
92. Kiri Miller, Playing Along: Digital Games, YouTube, and Virtual Performance (Oxford, UK:
Oxford University Press, 2012).
93. Christopher Zoia, “This Guy Makes Millions Playing Video Games on YouTube,”The
Atlantic, March 14, 2014, http://www.theatlantic.com/business/archive/2014/03/this-guy-
makes-millions-playing-video-games-on-youtube/284402/ (accessed June 11, 2016).
94. Paul Tassi, “The 100 Biggest Gaming YouTube Channels Now Bring In 3.5 Billion Views A
Month,”Forbes, June 14, 2014, http://www.forbes.com/sites/insertcoin/2014/06/14/the-100-
biggest-gaming-youtube-channels-now-bring-in-3-5-billion-views-a-month/#7b64940f7e61
(accessed June 11, 2016).
95. Ahmed Al-Rawi, “Assessing Public Sentiments and News Preferences on Al Jazeera and Al
Arabiya,”International Communication Gazette (2016): 1748048516642732; Ahmed Al-Rawi,
“Understanding the Social Media Audiences of Radio Stations,”Journal of Radio & Audio
Media 23, no. 1 (2016): 50–67.
96. Klaus Krippendorff,Content Analysis: An Introduction to Its Methodology (Thousand Oaks,
CA: Sage, 2012); Daniel Riffe, Stephen Lacy, and Frederick Fico, Analyzing Media Messages:
Using Quantitative Content Analysis in Research (London: Routledge, 2014).
97. Lela Mosemghvdlishvili and Jeroen Jansz, “Framing and Praising Allah on YouTube:
Exploring User-created Videos about Islam and the Motivations for Producing Them,”
New Media & Society (2012): 1461444812457326; Mike Thelwall, Pardeep Sud, and Farida
Vis, “Commenting on YouTube Videos: From Guatemalan Rock to El Big Bang,”Journal of
the American Society for Information Science and Technology 63, no. 3 (2012): 616–29; Liesbet
Van Zoonen, Farida Vis, and Sabina Mihelj, “Performing Citizenship on YouTube: Activism,
Satire and Online Debate around the Anti-Islam Video Fitna,”Critical Discourse Studies 7,
no. 4 (2010): 249–262; Ahmed Al-Rawi, “Cyber Warriors in the Middle East: The Case of the
Syrian Electronic Army,”Public Relations Review 40, no. 3 (2014): 420–8.
20 A. AL-RAWI
98. J. Richard Landis and Gary G. Koch, “The Measurement of Observer Agreement for
Categorical Data,”Biometrics (1977) 33, no. 1: 159–74.
99. Ahmed Al-Rawi, “Sectarianism and the Arab Spring: Framing the Popular Protests in
Bahrain,”Global Media and Communication 11, no. 1 (2015): 25–42.
100. Brown and Levinson, Politeness, 65 (see note 35 above).
101. Marwell and Schmitt, “Dimensions of Compliance-gaining Behavior”(see note 37 above).
102. Patrick Garrity, “Paris Attacks: What Does ‘Daesh’Mean and Why Does ISIS Hate It?,”NBC
News, November 14, 2015, http://www.nbcnews.com/storyline/isis-terror/paris-attacks-what-
does-daesh-mean-why-does-isis-hate-n463551 (accessed June 11, 2016).
103. Shawn Carrie, “How Social Media Is Helping ISIS Recruit More Members,”The Kernel
Magazine, March 8, 2015, http://kernelmag.dailydot.com/issue-sections/staff-editorials/
12056/isis-twitter-racist-recruitment/#sthash.YlBQmtBM.dpuf (accessed June 11, 2016).
104. Web Desk, “US Gun-maker Creates ‘Crusader’Rifle to Fight Islamic State,”The Express
Tribune, September 5, 2015, http://tribune.com.pk/story/951268/us-gun-maker-creates-crusa
der-rifle-to-fight-islamic-state/ (accessed June 11, 2016).
105. Hardaker, “Trolling,”218 (see note 39 above).
106. Baker, “Moral Panic”(see note 41 above); Herring et al. “Searching for Safety Online”(see
note 28 above); Turner et al., “Picturing Usenet”(see note 41 above).
107. Hardaker, “Trolling,”219 (see note 39 above).
TERRORISM AND POLITICAL VIOLENCE 21