ArticlePDF Available

Abstract and Figures

This study discusses different media strategies followed by the Islamic State in Iraq and Syria (ISIS). In particular, the study attempts to understand the way ISIS's video game that is called " Salil al-Sawarem " (The Clanging of the Swords) has been received by the online Arab public. The article argues that the goal behind making and releasing the video game was to gain publicity and attract attention to the group, and the general target was young people. The main technique used by ISIS is what I call " troll, flame, and engage. " The results indicate that the majority of comments are against ISIS and its game, though most of the top ten videos are favorable towards the group. The sectarian dimension between Sunnis and Shiites is highly emphasized in the online exchanges, and YouTube remains an active social networking site that is used by ISIS followers and sympathizers to promote the group and recruit others.
Content may be subject to copyright.
RESEARCH NOTE
Video games, terrorism, and ISISs Jihad 3.0
Ahmed Al-Rawi
a
,
b
a
Department of Communication Studies, Concordia University, Montreal, Canada;
b
Department of Media &
Communication, Erasmus University Rotterdam, Rotterdam, the Netherlands
ABSTRACT
This study discusses dierent media strategies followed by the Islamic
State in Iraq and Syria (ISIS). In particular, the study attempts to under-
stand the way ISISs video game that is called Salil al-Sawarem(The
Clanging of the Swords) has been received by the online Arab public.
The article argues that the goal behind making and releasing the video
game was to gain publicity and attract attention to the group, and the
general target was young people. The main technique used by ISIS is
what I call troll, ame, and engage.The results indicate that the
majority of comments are against ISIS and its game, though most of
the top ten videos are favorable towards the group. The sectarian
dimension between Sunnis and Shiites is highly emphasized in the
online exchanges, and YouTube remains an active social networking
site that is used by ISIS followers and sympathizers to promote the
group and recruit others.
KEYWORDS
Iraq; ISIS; Islam; Middle East;
online jihad; terrorism; video
game
Introduction
Many global terrorist organizations such as ISIS are increasingly trying to recruit Western
youth.
1
According to US intelligence experts, about 1000 foreign ghters join ISIS every
month.
2
Some of those recruits come from Western countries. According to a source in the
FBI, there are over 150 Americans who are allegedly in Syria to ght for ISIS,
3
while the
Canadian Intelligence agency estimates that about 130 Canadians have already joined ISIS as
of 2014.
4
According to the Canadian Standing Senate Committee on National Security and
Defence (SSCNSD), eighty radicalized Canadians have been identied as participating with
terrorists overseas and have returned to Canada and approximately 145 Canadians are
believed to be abroad providing support to terrorist groups.
5
Indeed, ISIS is a terrorist organization that has an apocalyptic, end-of-days strategic
vision,as Army general Martin Dempsey rightly describes it.
6
The organization evolved
to be a more radical and dangerous extension of Al-Qaeda terrorist group.
7
According to a
senior leading gure in this group, the ideological foundation of ISIS was established in
Camp Bucca, which was the largest US detention facility in Iraq. Due to the time prisoners
spent at the Camp and the fact that many other insurgent members were detained there, it
became a fertile ground for extremism wherein Islamists managed to hold numerous
meetings and make detailed agreements for future plans.
8
When ISIS advanced in the
Sunni provinces, it looted banks and became the richest terrorist group in the world.
9
It
CONTACT Ahmed Al-Rawi ahmed.alrawi@concordia.ca Department of Communication Studies, Concordia
University, 7141 Sherbrooke Street W., Montreal H4B 1R6, Quebec, Canada.
Color versions of one or more of the gures in the article can be found online at www.tandfonline.com/ftpv.
TERRORISM AND POLITICAL VIOLENCE
http://dx.doi.org/10.1080/09546553.2016.1207633
© 2016 Taylor & Francis
also committed war crimes as hundreds of captured Iraqi soldiers, especially Shiites, were
executed, while the Yezihdi and Christian minorities suered a great deal as many were
forced to ee to Iraqi Kurdistan.
10
However, the main areas identied that sustain ISISs
power grip are related to psychological tactics such as terrorizing populations, religious
and sectarian narratives, [and] economic controls.
11
Literature review
Back in 1982, Schmid and de Graaf emphasized that an act of terrorism is in reality an act
of communication. For the terrorist, the message matters, not the victim.
12
Numerous
other scholars rightly claim that communication and terrorism go hand in hand because
communication is the oxygen of terrorist acts.
13
Similarly, Freedman and Thussu believe
that media outlets are at the core of terrorism because they are increasingly seen as active
agents in the actual conceptualization of terrorist events.
14
As discussed below, ISIS fully
exploits various media platforms in order to disseminate fearful messages and create an
eective impact on their receivers.
In contemporary times, one of the main platforms mentioned above is social media,
which plays a major role in peoples lives. In fact, some scholars believe that social media
can become instrumental in uniting and sometimes radicalizing the public in relation to
political and social issues.
15
Al-Qaeda, for example, has been active on many online
forums for several years waging an E-Jihad to recruit sympathizers and spread its
ideology.
16
It also created a jihadist cloudwhich allowed it to maintain its virtual
spaces and niches on the Internet.
17
These (oine) extremists groups use modern
technology and the Internet as the main means to inuence others. For the terrorists
themselves, new media are, collectively, a transformative tool that oers endless possibi-
lities for communication and expansion.
18
In this regard, there are dierent psychological
motivations that lead some individuals to join extremist groups that can be categorized as
revenge seekers [who] need an outlet for their frustration, status seekers [who] need
recognition, identity seekers [who] need a group to join, and thrill seekers [who] need
adventure.
19
Video games and terrorism
In relation to video games and terrorism, a number of games directly deal with terror-
related issues, especially in connection with the War on Terror. For example, Splinter Cell
is a game that revolves around the 9/11 events,
20
while Counter-Strike allows teams from
opposing sides to take the role of terrorists as well as counter-terrorists.
21
Similar to
Counter-Strike, other games like Americas Army, Modern Warfare 2, and Medal of Honor:
Warghter allow players to become terrorists, which could have some psychological and
educational benets.
22
In 2006, Al-Qaeda group made changes to the rst person shooter
(FPS) game Quest for Saddam (2003) and introduced another game called Quest for Bush.
The goal of the original game was to kill Iraqi soldiers and capture Saddam Hussein,
whereas Al-Qaeda completely reversed the playersroles. Further, the Iraqi American
artist, Wafaa Bilal, made more adaptations to the same game, which he called Night of
Bush Capturing: A Virtual Jihadi (2008).
23
As a social and artistic experience, Bilals video
2A. AL-RAWI
game version created some controversy because the player was in the position of a suicide
bomber whose aim is to kill the president of the United States.
24
On the other hand, video games by the Lebanese Hezbollah and Syrian Afkar Media
company were used as alternative media outlets to oer playing roles that were contrary to
the mainstream Western representation of Arab Muslims.
25
In this way, video games
provide violent non-state actors and organizations sympathetic to them with a means of
presenting their grievances and displaying their ghting prowess in ways that advance the
organizationsstrategic goals.
26
Some of these alternative games include Quraish and
Under Siege, which were both produced by Afkar Media.
27
Trolling, aming, and social media eects
This paper covers two concepts that are related to the use of harsh and violent language,
namely trolling and aming. There is, however, a conceptual problem in dening these
two terms because of the apparent overlap between them. In fact, trolling and aming
often merge, in that in both cases there is intent to disrupt the ongoing conversation, and
both can lead to extended aggravated argument.
28
In this regard, the relative anonymity
of online users enhances the kind of aming or trolling that can occur on dierent
platforms.
29
In general, the two terms involve using some kind of negative face that is
explained below by employing computer-mediated communication.
Theliteratureonthesetwotypesofanti-social behavior is also connected to studies
andreportsonchildprotectionpractices.Ingeneral,thereisoftenasenseofmoral
panic, risk, and public anxiety when it comes to childrens Internet exposure and use.
30
Social media use could have negative eects on the well-being of some adolescents
including what is known as E-Crime 2.0,which includes oences that exploit the
ways in which users of new communication technologies make themselves publicly
visible and available through new social media.
31
Some of the harmful social media
eects that are reported in previous research on adolescents and children include social
isolation, depression and cyber-bullying.
32
In a large-scale study that involved about
10,000 EU children, the respondents themselves reported certain types of risks that they
nd on the Internet including pornography, cyber-bullying, and violent content.
33
Other
types of harmful eects include poor self-rating of mental health and experiences of
high levels of psychological distress and suicidal ideation.
34
Indeed, exposure to violent
content seems to be one of the main recurrent public concerns when it comes to social
media use by adolescents and children.
In their politeness theory, Brown and Levinson discuss the dierent motivations behind
using negative face. For example, it might be used when discussing dangerously emo-
tional or divisive topics e.g. politics, race, religion.
35
Some of the goals behind employing
it include certain kinds of orders and requestsmade to denote to the other person a
desire to do or refrain from doing something.
36
In their compliance gaining theory,
Marwell and Schmitt discussed several techniques to persuade people including punish-
ing activity,which refers to the use of negative face or actions which usually entail
uttering threats.
37
Though the study was published long before the emergence of the
Internet, trolling and aming can be linked to this theoretical concept since they can be
regarded as an online attempt to gain compliance by either modifying or preventing
certain kinds of behavior with the persistent use of negative face.
TERRORISM AND POLITICAL VIOLENCE 3
In relation to trolling, one of the rst studies that examined it was conducted by
Donath on Usernet groups.
38
Also, Hardaker provides several denitions for trolling
and classies it into dierent types based on four main features: aggression, deception,
disruption, and success. In relation to this study, two categories are more relevant. The
rst one is called thwarted/frustrated impoliteness, which refers to the malicious intent of
a message, but its intention is frustrated or thwarted by the receiver either because (s)he is
not oended, so no action is taken (frustrated), or because it is countered by, for example,
sarcasm, contempt, amusement, or suchlike(thwarted). The second type is called
genuine, malicious, or strategic impoliteness, which successfully achieves its goal in
oending the receiver(s).
39
Further, Bishop discusses two types of trolling: ame trolling
and kudus trolling. The former refers to vitriolic comments that are not intended to be
humorous, unlike the latter type. Again, the overlap between the two terms is obvious
here. Bishop also classied people who troll others into dierent types,
40
yet none of the
classications he oered could be applicable to this study on mediated terrorism.
In all cases, trolling seeks to create an argument, entice others into endless discussion,
or hijack a discussion.
41
In other words, trolling is meant as a distraction from the main
online discussion in the forum or platform by diverting attention to another issue which is
mostly irrelevant.
Similar to trolling, there is no agreement on a unied denition of aming, but it
usually consists of aggressive or hostile communication occurring via computer-mediated
channels.
42
Indeed, aming is similar to trolling, but the language is usually harsher,
more personal and is far more aggressive since it contains insults, obscenity, swearing, and
curses,
43
especially if the topic relates to religion.
44
Whether trolling or aming, ISIS sympathizers run what is called “‘disseminator
accountson social media, especially Twitter, which lend moral and political support
to those in the conict.
45
It is also known as the Swarmcast model in communication
studies; once content is produced and released, it is often the distributing network of
media mujahideen, rather than the original producer, that ensures continuing content
availability.
46
This model suggests that sympathizers gather like a swarm of bees or birds
that always re-organize themselves and are ready to engage and attack at any given time.
In the following section, a discussion is made on ISISs media techniques.
ISIS communication strategy
ISIS employs a communication strategy that is based on highlighting certain appeals.
Haroro J. Ingram identied three media strategies followed by ISIS: the use of a multi-
dimensional, multi-platform approach that simultaneously targets friends and foesto
enhance the reach, relevance and resonance of its messaging; the synchronisation of
narrative and action to maximise operational and strategic eectsin the eld; and the
centrality of the Islamic State brandto its entire campaign.
47
In this regard, the high
number of ISIS recruits indicates that ISIS is still successful since one of its most
important appeals being employed is its professed link to a conservative version of
Islam (salaf or pious predecessors). This claim is used as a marketing tool by ISIS as its
members insist on utilizing the black banner which was originally used by Muslims when
Islam rst emerged. Further, the groups name itself is meant to sound Islamic (ISIS), or
later abbreviated as the Islamic State (Tandheem Al-Dawlah Al-Islamiah). Third, there is
4A. AL-RAWI
an ongoing ow of information from cities controlled by ISIS, showing that the group
intends to rule in a utopian way that is allegedly reminiscent of early Islam, especially in
relation to highlighting religious duties and obligations.
48
The above claims are all meant
to brand ISIS as a purely Islamic group,
49
so any attack against its members is regarded as
an attack against Islam itself. For example, ISISsDabiq magazine refers to anyone that
ghts the group as an enemy of Islam, indel, or apostate. In an article on AbūSinān an-
Najdī, who was killed in his attack on the Āl Salūl Emergency Task Force in Saudi Arabia,
the writer pledges revenge against Saudi security forces: By Allah! You will not enjoy
safety and security, and you will not have a comfortable life as long as you wage war
against Islam and the Muslims and remain as tails of the West, which plays around with
you as it pleases. Your coalition with the Majūs [pejorative for Shiites] and the Crusaders
against Ahlus-Sunnah [Sunnis] in Iraq and Shām is the biggest witness against you.
50
Further, ISIS repeatedly portrays itself as the protective vanguard for the worlds Sunni
Muslims,
51
while the theme of victimhood in the sense that Muslims, especially Sunnis,
are victims of world powers is prominent in ISISs promotional materials.
52
Indeed,
equating the group with Islam and the Sunni faith is one of the appeals that drives
some devout Muslims to join this criminal organization.
On the other hand, ISIS also releases favorable images by showing its charitable side,
such as helping elderly people or organizing life in the cities they control. Some also show
ghters relaxing, swimming, eating, and playing with cats.
53
According to a study con-
ducted by Voactiv on ISISs promotional materials for about a one-month period, 45% of
the materials posted online are focused on its eorts to build and sustain the caliphate.
54
The study also found that only 2% of the materials posted targeted the West, in compar-
ison to 4% on Libya that recently witnessed a growing ISIS presence. James Farwell claims
that these warmer images aim to communicate the message that, while strictly Islamic,
ISIS stands for promoting the welfare of people, not murdering them.
55
Yet this is not the
only message ISIS wants to communicate, as the main intention behind releasing such
positive images is to give the impression to the outside world as well as to the people they
control that the group is strong and resilient as it is not aected by the ongoing military
operations against its ghters. Further, some recruits seek thrilling experiences and
adventure and regard ISIS as the hippest
56
and sexiest jihadi group on the block.
57
Bennhold observes that some young ISIS recruits come from a world in which . . . Islam is
punk rock. The headscarf is liberating. Beards are sexy.
58
Other reports on pop jihadists
in Europe t this category, and they are dened as Muslim youngsters who irt with
terrorist symbolswith the use of social media.
59
Finally and most importantly, ISIS uses propaganda and misinformation which are
based on disseminating its ideology to as many people as possible and in various
languages. President Obama revealed some of ISISs strategies in a speech delivered
in February 2015: The high-quality videos, the online magazines, the use of social
media, terrorist Twitter accountsits all designed to target todaysyoungpeople
online, in cyberspace.
60
Aside from the dierent tools that circumvent Internet censor-
ship, ISIS and its aliates and sympathizers use Al-Hayat, Al-Furqan, and Al-Ethar
media centers, which function as their centralized Information Ministry. These dier-
ent media centers use social media outlets like YouTube, Twitter, and Facebook besides
certain websites, radio stations, the Clanging of the Swords promotional videos, and its
Dabiq magazine to disseminate their ideology.
61
The New York Times is accurate in
TERRORISM AND POLITICAL VIOLENCE 5
describing ISIS media strategy as Jihad 3.0
62
due to its highly sophisticated media
campaign that involves the use of multidimensional propaganda,
63
high-tech lming,
and editing equipment.
64
The term is originally derived from Web 3.0, which devel-
oped from Web 2.0. According to Manuel Castells, this new phenomenon refers to the
cluster of technologies, devices, and applications that support the proliferation of social
spaces on the Internet thanks to increased broadband capacity, open source software,
and enhanced computer graphics and interface, including avatar interaction in three-
dimensional virtual spaces.
65
Indeed, ISIS is making full use of dierent technologies
that are not conned to social media, especially Twitter, but extend to video games,
hacking by its Cyber Caliphate Army, apps, and the Dark Web.
According to an ISIS follower, the group uses a few centralized Twitter accounts that
tweet ocial statements and news updatesas well as provincial accounts run from the
provinces ISIS controls, which publish a live feed about [local] Isis operations.
66
In
addition, there are ISIS jihobbyists,
67
fan clubs, or followers and sympathizers, for it is
estimated that ISIS has about 46,000 Twitter accounts that are sympathetic to or suppor-
tive of the group, which are mostly based in Iraq, Syria, and Saudi Arabia,
68
prompting the
EU to commission the European Law Enforcement Agency, Europol, to block ISIS access
to social media.
69
This decentralized communication method makes it challenging to
counter ISIS messages,
70
though it can oer some security benets like disclosing valuable
information about the location of some ISIS ghters.
71
According to Berger and Morgans
study on ISIS Twitter accounts, 73% of the followers selected Arabic as their main
language followed by 18% English and 6% French, anding that tracks to some extent
with the distribution of Western foreign ghters.
72
In fact, the Arabic language has long
been one of the fastest growing languages on Twitter, with more than 2 million tweets
posted every single day.
73
Other media platforms are actively exploited by ISIS. In April 2014, ISIS introduced an
Android app, called The Dawn of Glad Tidings,which leverages Twitter usersaccounts
to share ISIS-related tweets.
74
It was only recently that ISIS moved to another social
network called Diasporaand other lesser known networks and websites like Friendica,
Quitter, Justpaste, Ask.fm, Soundcloud, and Mixlr after its Twitter accounts were
blocked.
75
In terms of online inuence, it seems that ISIS has a wide network of followers
and/or sympathizers that exist not only in the Middle East region but that extend to North
America and Europe.
76
It is important to note here that the shocking beheading and killing images and
videos that are disseminated by ISIS are meant to create awareness about the group and
its activities similar to the shock advertising techniques used by some commercial
corporations which are well documented in previous scientic research.
77
This is
another persuasive strategy as ISIS attempts to brand itself as a savage group that is
defending Islam against the indels, represented by anyone that ghts them. In this
regard, social networking sites are mostly used to attract attention and entice possible
victims, after which other communication technologies are used, especially mobile
services like Viber, Surespot, WhatsApp, FaceTime, Kik, Skype, and Telegram.
78
In
brief, the dierent platforms used and media strategies followed by ISIS that seem to
complement each other indicate that this group is waging a new Jihad that goes beyond
what Web 2.0 oers, making it far more eective than traditional terrorist organiza-
tions like Al-Qaeda.
6A. AL-RAWI
ISISs video game
The focus of this study is on the video game released by ISIS that is adapted from the well-known
Grand Theft Auto (GTA). In particular, the research is limited to the videos and comments
posted on this video game trailer. It is not clear whether the game was truly produced or not; it is
also not clear who exactly developed it since there are many links to the video game, especially
those leading to torrent websites. However, the current links either do not work or lead to
maliciouswebsites(seeforexampleFigure1).
79
Certainly, the video games trailer is not
produced by the centralized media centers of ISIS like Al-Hayat, Al-Furqan, and Al-Ethar,
especially in that the group stands against entertainment activities like listening to music or
playing games that can divert attention from prayer and faith.
80
This means that the game is
made by some ISIS followers or sympathizers probably outside the groups controlled territories.
In terms of its development, it is not dicult to make changes to the original GTA game by
customizing characters or playing opposing roles similar to AmericasArmyand Modern
Warfare 2, as mentioned above (see Figure 2). As for the date of ISISs video game release,
one of the rst videos to report on the GTA game appeared on YouTube in June 2014, but the
game became more popular in September of the same year, based on a Google search in Arabic
using the term Download Salil al-Sawaremsgame.”“Salil al-Sawaremis also the name given
by ISIS to its motivational religious chant, which must be distinguished from the video game.
81
In all cases, the game is called Salil al-Sawaremin Arabic (The Clanging of the Swords),
which is a rst person shooter game.
82
The games cover reads: Your games which are
producing from you, we do the same actions in the battleelds!!
83
In other words, the types of
real armed confrontations ISIS is engaged with are similar to the virtual wars produced in
Western video games. Further, the name itself given to the game is also supposed to project the
idea of strength, fearlessness, and resilience at times of war. It is alleged that ISIS adapted
Figure 1. A seemingly malicious website that hosts ISISs game. The le looks malicious because its size
is only 375KB, which is too small for a game like GTA.
TERRORISM AND POLITICAL VIOLENCE 7
another rst person shooter game called RMA III which is developed for Microsoft
84
as well as
another version of the famous Call of Duty.
85
In general, the target group of such video games is young people who are supposed to be more
attracted to violent and rst shooter games. There seems to be certain emotional appeals for
young male adolescents to play rst shooter games,
86
including a desire to experience fantasies
of power and fame, to explore and master what they perceive as exciting and realistic environ-
ments (but distinct from real life), to work through angry feelings or relieve stress, and as social
tools.
87
Other studies showed that there is a positive correlation between adolescentsanger,
frustration, and peer rejection on the one hand and preference for antisocial media content and
cyberbullying on the other hand.
88
Indeed, violent video games are more appealing for adoles-
cents than for adults,
89
partly due to the wishful identication with some of the games
characters.
90
As mentioned above, some view ISIS as a coolorganization in its Jihad 3.0 eorts,
so producing such games can help in recruiting young people to its organization.
Results and discussion
In terms of methodology, an Arabic language search was made on YouTube using the term
ISISs Salil al-Sawarem gameon September 5, 2015. YouTube is selected because it is regarded
as one of the most famous video platforms in the world,
91
and YouTube gaming channels that
attract people from dierent ages, especially teenagers, are regarded as the most popular ones.
92
In fact, YouTube gaming oers massive economic opportunities for videogame producers and
professionalgamersbecauseofthelargenumberoffans.
93
According to Forbes magazine,
YouTube gaming channels bring in over 3.5 billion views a month as of June 2014.
94
The top ten clips were selected based on the number of views (See Table 1),
95
and a
content analysis of the posted videos and their comments was conducted to understand
Figure 2. ISISs video game cover.
8A. AL-RAWI
Table 1. YouTube clips on ISISs video game.
No. Hyperlinks No. of views Tone No. of comments Date posted No. of likes No. of dislikes
1https://www.youtube.com/watch?v =
45EG2MVmzC4&list = PLOdRtf56-
ng5VGGyNYtT69qH9TzQdVYM5&index = 25
119,814 Negative 196 Oct 8, 2014 1154 254
2https://www.youtube.com/watch?v = FoPPaZl23Bw 37,552 Positive 6 Sep 21, 2014 176 291
3https://www.youtube.com/watch?v = 5HEdnrG37ZM 37,256 Positive 14 Sep 21, 2014 73 29
4https://www.youtube.com/watch?v = W5LDEJ8qAEA 27,853 Positive 83 Jul 8, 2015 117 143
5https://www.youtube.com/watch?v = ck_9gpJBOSs 12,952 Positive Disabled Sep 21, 2014 31 78
6https://www.youtube.com/watch?v = CNycIc4ImSI 11,844 Neutral 13 Sep 20, 2014 34 31
7https://www.youtube.com/watch?v = mN4e_8uaD6I 11,096 Neutral 17 Mar 13, 2015 25 94
8https://www.youtube.com/watch?v = eupI1LICSpI 10,654 Positive 5 Aug 7, 2015 58 29
9https://www.youtube.com/watch?v = 5PxBUIEH504 9,576 Positive 20 Jun 7, 2014 78 39
10 https://www.youtube.com/watch?v = zcLuyrTd7Vc 8,091 Negative 43 Oct 17, 2014 56 55
TERRORISM AND POLITICAL VIOLENCE 9
their tone or valence in terms of expressing negative, positive, or neutral views towards the
game and its sponsor.
96
The tone of the video towards ISIS and its video game was
assessed based on what is presented in the video itself, the title, and/or its accompanying
description. This is a method that has been followed in many studies on YouTube videos
and their comments.
97
In relation to this study, video clips (8) and (9) mostly presented the game in a neutral
way, yet their descriptions referred to ISIS as a state that must remain forever (Baqyyah
#), or that it was the one which follows the right path of Prophet Muhammed. Hence,
these two videos were coded as positive towards ISIS and the game. If the stance was not
clear, the video was coded as neutral. Before coding all the videos and comments, two
coders examined over 10% of the sample (n= 3 videos and 50 comments), and intercoder
reliability was measured using Cohens Kappa. A .890 agreement was reached that was
very acceptable.
98
The total number of views for these ten videos was 286,688 and the earliest clip posted
was on June 7, 2014. The highest number of views (119,861) and comments (196) was for
a video that made fun of the game and ISIS that was posted by an Iraqi comedian who
imitates Jon Stewart and Bassem Youssef. As for the tone of posted videos, there were
more positive clips towards ISIS and its video game (n= 6) than negative (n=2)or
neutral (n= 2) ones. In fact, some video posters openly showed their support for ISIS. For
example, video clip number (2) is posted by user Abu Bakr Al-Baghdadis lovers,while
many other commentators have ISISs black banner as their usersphoto (see Figure 3).
With regard to the total number of likes and dislikes, it was only accurate to count them
by taking into account the tone of the videos posted. In total, there were 1,944 dislikes
(68.3%) of the game and ISIS in comparison to 901 likes (31.5%).
As for the comments, there were in total 397 comments and replies on the posted
videos. Due to the highly personal nature of replies, they were discarded from the study
together with any irrelevant and ambiguous posts. In total, 199 comments were identied;
57.2% (n= 114) of the comments were negative towards the game and ISIS, 33.6%
(n= 67) comments were positive, and 9% (n= 18) were neutral without supporting any
side (see Figure 4). With regard to the negative comments, they usually contained praise
for anyone who criticized ISIS and its game, which was usually ridiculed for the claim that
it was independently developed from Grand Theft Auto. For example, YouTuber Hadji
Mmentioned that this is a famous American video game, and any person with some
experience in programming can change the shapes of its characters and even the sound
eects.Further, most of the criticism was centered on showing that ISIS did not represent
Islam and/or that Shiite militias ghting ISIS were victorious. As for the positive com-
ments that praised the game and ISIS, they constituted 33.6% of the total comments.
These results closely correspond with the number of video dislikes (68.3%) of the game
and their likes (31.5%). Despite the dominance of negative comments against ISIS, there
was still an active group of sympathizers and followers who mostly believed that support-
ing ISIS online was an expression of their devotion to Sunni Islam, allegedly under attack
by Shiites. To give a few examples, YouTuber Islamic Floodsays: Youve reached a
cowardice stage that youre afraid of an Islamic States game. . . . Hail to the Islamic states
men and let [Allah] fortify its Mujahideen. . . . The Islamic State has defeated you in all the
religious, military, cultural and even electronic fronts.Another YouTuber called
Muhammed Al-Mutairigave ISIS a more regional scope, stating: We wish the games
10 A. AL-RAWI
Figure 3. Screenshot of the video game trailer uploaded by the user Abu Bakr Al-Baghdadis lovers.
114
67
18
0
20
40
60
80
100
120
Ne
g
ative Positive Neutral
Figure 4. Tone of comments on the top 10 YouTube videos.
TERRORISM AND POLITICAL VIOLENCE 11
objective is to make the Mujahideen heroes. . . . Their goal is to spread Islam, defend the
righteous, and lift injustice from Muslims. . . . Frankly, we need such games in order to
have a new generation whose goal is to remove Israel and its agents from Muslim lands.
Finally, YouTuber Hasoon Aconnected his favorable comment towards ISIS with
famous Twitter hashtags such as ISIS remainsthat is mentioned above, saying: Itll
expand (# ); if you leave it alone, itll be strengthened (# ). By Allahs will, if you ght it,
itll remain (# ).
As mentioned above, almost all the replies were personal, containing attacks on
individual posters who opposed ISIS or vice versa. These replies were highly sectarian in
nature as there was intense aming in the kind of exchange of obscene language and
religious curses especially between Sunnis and Shiites. For example, any criticism against
ISIS was interpreted by some of the groups sympathizers as criticism against Islam and/or
the Sunni faith. This nding is similar to other studies that examined religious comments
on YouTube and the divisive sectarian rhetoric that characterizes this platform.
99
The
prevalent use of the negative face by the two opposing online communities was expected
because of the nature of the religious topic discussed.
100
The main function of the negative
face was to gain compliance via punishing activity.
101
This was routinely done by using
aming in order to either force the opponents to leave the platform/video commentary
section or make them stop writing negative comments.
Further and in relation to the swarming communication model, ISIS followers seemed
to gather around videos that referred to DAESH ( ), which is the Arabic acronym of
ISIS. The term itself is regarded as demeaning by ISIS, which prohibits people living under
its control from using it.
102
ISIS followers are usually very active in responding to ISIS
criticism and are often accompanied by other users who share the same beliefs. Similar to
a swarming activity, they closely coordinate and synchronize their trolls as they suddenly
appear to assist some ISIS members in the exchange of insults, and they disappear
afterwards. It is like waging a constant online war.
The other main function of this trolling activity is to silence opposition and dissent,
especially that which comes from Shiite Muslims. Most importantly, the trolling and
aming game played by ISIS followers on YouTube serves the purpose of winning some
oppositional or neutral voices to their side since the exchange of insults frequently results
in curses against Sunni gures who are highly venerated, like Prophet Mohammeds
companions. In this way, ISIS followers will get the required evidence that Shiites hold
antagonistic views against Sunnis, which might produce the possible impact on some
devout Sunnis. This sophisticated technique is similar to what is used by ISIS on English-
language platforms that target Westerners. For example, Shawn Carrie observes that
condemning ISIS on Twitter usually results in openly mixing statements like support
our troopsmingled cozily next to kill all muslims.’”
103
Carrie emphasizes that the latter
term is repeatedly used by ISIS as a recruitment tool to convince some that there is
inherent Western hatred and an ongoing attack against Islam and that ISIS is the only
group that truly defends the doctrine. Further, other news reports like US Gun-maker
Creates CrusaderRie to Fight Islamic State
104
are regarded by ISIS as excellent
examples that support their abovementioned claim.
In this regard, this trolling and aming game, which I call the troll, ame, and engage
technique, is regarded as an eective recruitment tool in ISISs Jihad 3.0 eorts. It is
important to note here that some of the attempts made by ISIS followers and sympathizers
12 A. AL-RAWI
to create a reaction from the online audience fail in what is called thwarted/frustrated
impoliteness.
105
These attempts to agitate YouTubers are meant to be tactical diversions
from the main negative discussion on and criticism of ISIS, which is what characterizes
trolling.
106
Yet, a few other attempts by ISIS followers can be categorized as genuine,
malicious, or strategic impoliteness
107
because they succeed in oending their opponents
by using highly obscene terms, insults, and curses. For example, Figure 5 shows how one
YouTuber, Layth Jamal,systematically ames by posting abusive comments in response
to anyone criticizing ISIS in order to gain compliance. He starts trolling one user,
Abdulla ahmmad12,and is suddenly accompanied by YouTuber Gvhh Gbj,who
both personally attack and succeed in oending their target. In the end, they engage
him by using sectarian rhetoric which is meant to gain his support, silence him, or force
him to abandon the online platform. In the example given here, Abdulla ahmmad12
starts questioning Layth Jamalfor the lattersaming language. In his response, Layth
Figure 5. Trolling, aming, and engaging on YouTube.
TERRORISM AND POLITICAL VIOLENCE 13
Jamalsays: I have started insulting any Shiite I encounter online though they still post
negative comments against mebecause he praises ISIS. In this case, Layth Jamal
believes that aming can drive users away from the platform or from posting negative
comments. Further, the sectarian language was meant to engage others, for Abdulla
ahmmad12responded by saying: By Allah, Im a Sunni myself.”“Layth Jamalfurther
manipulated the sectarian discussion by questioning Abdulla ahmmad12”’s faith: If you
are a Sunni, how come you encourage them to make such oensive clips that insult the
Prophet. The Shiites sent me private messages in which they cursed Abu Bakr, Othman,
and Aysha [Muhammeds companions].Further, Gvhh Gbjoered his apology for
aming, stating that he thought that Abdulla ahmmad12was a dirty and lthy Shiite.
The online engagement ended with a cheerful tone due to reaching some kind of mutual
understanding. In brief, Layth Jamaland Gvhh Gbjmade use of the anonymous
feature of YouTube to swarm and troll others whenever they found a suitable video that
demeaned ISIS. The purpose was to divert attention from the main discussion, and
aming was used if the impoliteness was thwarted or frustrated, which ultimately ended
in engaging some neutral or opposing voices.
Conclusion
The general goal behind making and releasing Salil al-Sawarems video game is to gain
publicity and attract attention to the group. This is part of the groups Jihad 3.0 eorts, as
the main target is young people who might get the impression that ISIS is a technologi-
cally advanced group that not only produces high-denition and well-edited videos but
also has its owns apps, social media tools, drones, and video games. The ndings of this
study show that the majority of comments and number of likes and dislikes are against
ISIS and its video game, but YouTube remains one of the main online platforms wherein
ISIS is still sharing and spreading its messages, which is evident in the high number of
favorable ISIS videos. Also, there are a considerable number of followers and sympathizers
who constantly try to inuence others by using trolls, ames, and certain kinds of
engagements, while a highly divisive and sectarian rhetoric is used in order to polarize
the audience and possibly gain the support of some users.
For future research, more studies are needed in order to examine other social media
platforms like Facebook in order to investigate whether swarming and the troll, ame, and
engage method is also used by ISIS followers. Further, interviews with online users who
are actively engaged with ISIS members are needed in order to further understand the
various motivations and possible eects of this online interaction with a focus on gender,
sectarian discussion, and age.
Notes on contributor
Ahmed Al-Rawi is an Assistant Professor in the Department of Communication Studies, Concordia
University, Montreal, Canada; and a Research Fellow in the Department of Media & Communication,
Erasmus University Rotterdam, Rotterdam, the Netherlands.
14 A. AL-RAWI
Notes
1. John McCoy and W. Andy Knight, Homegrown Terrorism in Canada: Local Patterns,
Global Trends,Studies in Conict & Terrorism 38, no. 4 (2015): 25374.
2. Eric Schmittdec, In Battle to Defang ISIS, U.S. Targets Its Psychology,The New York
Times, December 28, 2014, http://www.nytimes.com/2014/12/29/us/politics/in-battle-to-
defang-isis-us-targets-its-psychology-.html?_r=0 (accessed January 7, 2015).
3. Reuters, FBI Tracking 150 Americans Who Traveled to Syria, Perhaps to Fight,November 18,
2014, http://www.reuters.com/article/2014/11/18/us-usa-fbi-syria-idUSKCN0J22HG20141118#_
blank (accessed December 25, 2015).
4. CNN, The Names: Who Has Been Recruited to ISIS from the West,February 26, 2015,
http://www.cnn.com/2015/02/25/world/isis-western-recruits/ (accessed March 1, 2015).
5. Standing Senate Committee on National Security and Defence, Countering the Terrorist
Threat in Canada: An Interim Report,2015, http://www.parl.gc.ca/Content/SEN/
Committee/412/secd/rep/rep18jul15-e.pdf (accessed January 8, 2016).
6. Spencer Ackerman, “‘ApocalypticIsis beyond Anything Weve Seen, Say US Defence
Chiefs,The Guardian, August 22, 2014, http://www.theguardian.com/world/2014/aug/21/
isis-us-military-iraq-strikes-threat-apocalyptic (accessed October 20, 2015).
7. Erin Saltman and Charlie Winter, Islamic State: The Changing Face of Modern Jihadism,
Quillam, November, 2014, https://www.quilliamfoundation.org/wp/wp-content/uploads/pub
lications/free/islamic-state-the-changing-face-of-modern-jihadism.pdf (accessed June 10,
2016).
8. Martin Chulov, ISIS: The Inside Story,The Guardian, December 11, 2014, http://www.
theguardian.com/world/2014/dec/11/-sp-isis-the-inside-story?CMP=share_btn_tw (accessed
January 9, 2015).
9. Robert Tait, ISISHalf-a-billion-dollar Bank Heist Makes it Worlds Richest Terror Group,
The Telegraph, June 14, 2014, http://www.telegraph.co.uk/news/worldnews/middleeast/iraq/
10899995/ISIS-half-a-billion-dollar-bank-heist-makes-it-worlds-richest-terror-group.html
(accessed July 28, 2015)
10. CBS, U.N.: ISIS Committing War Crimes in Iraq,June 16, 2014, http://www.cbsnews.com/
videos/u-n-isis-committing-war-crimes-in-iraq/ (accessed July 29, 2015). See also Richard
Spencer, Iraq Crisis: UN Condemns War Crimesas Another Town Falls to Isis,The
Guardian, June 16, 2014, http://www.telegraph.co.uk/news/worldnews/middleeast/iraq/
10904414/Iraq-crisis-UN-condemns-war-crimes-as-another-town-falls-to-Isis.html (accessed
July 17, 2015).
11. Schmittdec, In Battle to Defang ISIS(see note 2 above).
12. Alex P. Schmid and Janny De Graaf, Violence as Communication: Insurgent Terrorism and
the Western News Media (London: Sage, 1982), 14.
13. Paul Wilkinson, The Media and Terrorism: A Reassessment,Terrorism and Political
Violence 9, no. 2 (1997): 5164; Pippa Norris, Montague Kern, and Marion R. Just,
Framing Terrorism: The News Media, the Government, and the Public (London: Psychology
Press, 2003); Austin T. Turk, Sociology of Terrorism,Annual Review of Sociology (2004):
27186; Brigitte Lebens Nacos, Mass-mediated Terrorism: The Central Role of the Media in
Terrorism and Counterterrorism (Lanham, MD: Rowman & Littleeld, 2007); Philip Seib and
Dana M. Janbek, Global Terrorism and New Media: The Post-Al Qaeda Generation
(Abingdon, UK: Routledge, 2010); Christoph P. Pfeier, Terrorism and Its Oxygen: A
Game-theoretic Perspective on Terrorism and the Media,Behavioral Sciences of Terrorism
and Political Aggression 4, no. 3 (2012): 21228; Cristina Archetti, Understanding Terrorism
in the Age of Global Media: A Communication Approach (Basingstoke, UK: Palgrave
Macmillan, 2012); Susan Currie Sivek, Packaging Inspiration: Al Qaedas Digital Magazine
in the Self-Radicalization Process,International Journal of Communication 7 (2013): 23.
14. Des Freedman and Daya Thussu, Introduction: Dynamics of Media and Terrorism,in
Media & Terrorism: Global Perspectives, edited by Des Freedman and Daya Thussu
(Thousand Oaks, California: Sage, 2012), 10.
TERRORISM AND POLITICAL VIOLENCE 15
15. Lincoln Dahlberg, The Internet, Deliberative Democracy, and Power: Radicalizing the
Public Sphere,International Journal of Media & Cultural Politics 3, no. 1 (2007): 4764.
16. Maura Conway and Lisa McInerney, Jihadi Video and Auto-radicalisation: Evidence from
an Exploratory YouTube Study,in Intelligence and Security Informatics (Berlin: Springer
Berlin Heidelberg, 2008), 108118; Quillam,Cheering for Osama: How Jihadists use
Internet Discussion Forums,London, August, 2010, http://www.quilliamfoundation.org/
wp/wp-content/uploads/publications/free/cheering-for-osama-how-jihadists-use-the-inter
net-forums.pdf (accessed June 4, 2015).
17. Nico Prucha, Online Territories of TerrorUtilizing the Internet for Jihadist Endeavours,
Jihadism Online,2011,http://www.oiip.ac.at/leadmin/Unterlagen/Dateien/Publikationen/
Article_ORIENT_IV_NicoPrucha.pdf (accessed January 10, 2016).
18. Seib and Janbek, Global Terrorism, ix (see note 13 above).
19. John Venhaus, Why Youth Join al-Qaeda. United States Institute of Peace,United States
Institute of Peace, May, 2010, http://www.usip.org/sites/default/les/SR236Venhaus.pdf
(accessed June 4, 2015)
20. Robert Young, Going Fifth Freedom: Fighting the War on Terror in the Splinter Cell:
Blacklist Video Game,Critical Studies on Terrorism 8, no. 1 (2015): 14762.
21. James Newman, Playing with Videogames (Abingdon, UK: Routledge, 2008), 169; Phoebe
Wild, Sam Fisher and the War on Terror: An Analysis of Splinter Cell in a Post-9/11
Context,Critical Studies on Terrorism 7, no. 3 (2014): 43445; Talmadge Wright, Eric Boria,
and Paul Breidenbach, Creative Player Actions in FPS Online Video Games: Playing
Counter-Strike,Game Studies 2, no. 2 (2002): 10323.
22. Marcus Schulzke, The Virtual War on Terror: Counterterrorism Narratives in Video
Games,New Political Science 35, no. 4 (2013): 586603.
23. Alec Charles, Playing with Ones Self: Notions of Subjectivity and Agency in Digital Games,
Eludamos. Journal for Computer Game Culture 3, no. 2 (2009): 28194.
24. Robert W. Sweeny, Pixellated Play: Practical and Theoretical Issues Regarding Videogames
in Art Education,Studies in Art Education 51, no. 3 (2010): 263.
25. Vit Sisler, Palestine in Pixels: The Holy Land, Arab-Israeli Conict, and Reality Construction
in Video Games,Middle East Journal of Culture and Communication 2, no. 2 (2009): 27592.
26. Marcus Schulzke, Simulating Terrorism and Insurgency: Video Games in the War of Ideas,
Cambridge Review of International Aairs 27, no. 4 (2014): 62743.
27. Vit Sisler, 10 Playing Muslim Hero,in Digital Religion: Understanding Religious Practice in
New Media Worlds, edited by Heidi Campbell (London: Routledge, 2012), 13646.
28. Susan Herring, Kirk Job-Sluder, Rebecca Scheckler, and Sasha Barab, Searching for Safety
Online: Managing Trollingin a Feminist Forum,The Information Society 18, no. 5 (2002):
371384, 372.
29. John Suler, The Online Disinhibition Eect,Cyberpsychology & Behavior 7, no. 3 (2004):
32126; Noam Lapidot-Leer and Azy Barak, Eects of Anonymity, Invisibility, and Lack of
Eye-contact on Toxic Online Disinhibition,Computers in Human Behavior 28, no. 2 (2012):
43443.
30. Matthew David, Amanda Rohlo, Julian Petley, and Jason Hughes, The Idea of Moral
PanicTen Dimensions of Dispute,Crime, Media, Culture 7, no. 3 (2011): 21528; Gary
Clapton, Viviene E. Cree, and Mark Smith, Moral Panics and Social Work: Towards a
Sceptical View of UK Child Protection,Critical Social Policy 33, no. 2 (2013): 197217.
31. Majid Yar, E-Crime 2.0: The Criminological Landscape of New Social Media,Information &
Communications Technology Law 21, no. 3 (2012): 207.
32. Paul Best, Roger Manktelow, and Brian Taylor, Online Communication, Social Media and
Adolescent Wellbeing: A Systematic Narrative Review,Children and Youth Services Review
41 (2014): 2736.
33. Sonia Livingstone, Lucyna Kirwil, Cristina Ponte, and Elisabeth Staksrud, In Their Own
Words: What Bothers Children Online?,European Journal of Communication 29, no. 3
(2014): 27188.
16 A. AL-RAWI
34. Hugues Sampasa-Kanyinga and Rosamund F. Lewis, Frequent Use of Social Networking
Sites Is Associated with Poor Psychological Functioning among Children and Adolescents,
Cyberpsychology, Behavior, and Social Networking 18, no. 7 (2015): 38085.
35. Penelope Brown and Stephen C. Levinson, Politeness: Some Universals in Language Usage
(Cambridge: Cambridge University Press, 1987), 67.
36. Brown and Levinson, Politeness, 65 (see note 35 above).
37. Gerald Marwell and David R. Schmitt, Dimensions of Compliance-gaining Behavior: An
Empirical Analysis,Sociometry (1967): 35064.
38. Judith S. Donath, Identity and Deception in the Virtual Community,in Communities in
Cyberspace, edited by Peter Kollock and Marc Smith (London: Routledge, 1999), 2758.
39. Claire Hardaker, Trolling in Asynchronous Computer-mediated Communication: From
User Discussions to Academic Denitions(2010): 2189.
40. Jonathan Bishop, Representations of Trollsin Mass Media Communication: A Review of
Media-texts and Moral Panics Relating to Internet Trolling,’” International Journal of Web
Based Communities 10, no. 1 (2014): 12.
41. Paul Baker, Moral Panic and Alternative Identity Construction in Usenet,Journal of
Computer-Mediated Communication 7, no. 1 (2001); Herring, Job-Sluder, Scheckler, and
Barab, Searching for Safety Online: (see note 28 above); Tammara Combs Turner, Marc A.
Smith, Danyel Fisher, and Howard T. Welser, Picturing Usenet: Mapping Computer-
mediated Collective Action,Journal of Computer-Mediated Communication 10, no. 4 (2005).
42. Patrick B. OSullivan and Andrew J. Flanagin, Reconceptualizing Flamingand Other
Problematic Messages,New Media & Society 5, no. 1 (2003): 70.
43. Peter J. Moor, Ard Heuvelman, and Ria Verleur. Flaming on Youtube,Computers in
Human Behavior 26, no. 6 (2010): 153646.
44. Ahmed Al-Rawi, Online Reactions to the Muhammad Cartoons: YouTube and the Virtual
Ummah,Journal for the Scientic Study of Religion 54, no. 2 (2015): 26176; Ahmed Al-
Rawi, Facebook as a Virtual Mosque: The Online Protest against Innocence of Muslims,
Culture and Religion 17, no. 1 (2016): 1934; Ahmed Al-Rawi, The Online Response to the
Quran Burning Incidents,in Political Islam and Global Media: The Boundaries of Religious
Identity, edited by Noha Mellor and Khalil Rinnawi (London: Routledge, 2016), 10521.
45. Joseph A. Carter, Shiraz Maher, and Peter R. Neumann. # Greenbirds: Measuring
Importance and Inuence in Syrian Foreign Fighter Networks,The International Centre
for the Study of Radicalisation and Political Violence, 2014, http://icsr.info/wp-content/
uploads/2014/04/ICSR-Report-Greenbirds-Measuring-Importance-and-Ineunce-in-Syrian-
Foreign-Fighter-Networks.pdf (accessed April 20, 2015).
46. Ali Fisher, How Jihadist Networks Maintain a Persistent Online Presence,Perspectives on
Terrorism 9, no. 3 (2015): 4.
47. Haroro J. Ingram, Three Traits of the Islamic States Information Warfare,The RUSI
Journal 159, no. 6 (2014): 4.
48. Charlie Winter, The Virtual Caliphate: Understanding Islamic States Propaganda
Strategy,Quillam, July, 2015, http://www.quilliamfoundation.org/wp/wp-content/uploads/
publications/free/the-virtual-caliphate-understanding-islamic-states-propaganda-strategy.pdf
(accessed October 25, 2015).
49. Sam Thielman, ISISSinister Media Strategy, and How the West Is Fighting Back,ADWeek.
September 10, 2014, http://www.adweek.com/news/television/isiss-sinister-media-strategy-
and-how-west-ghting-back-160021 (accessed October 20, 2015); Scott Shane and Ben
Hubbard, ISIS Displaying a Deft Command of Varied Media,The New York Times,
August 30, 2014, http://www.nytimes.com/2014/08/31/world/middleeast/isis-displaying-a-
deft-command-of-varied-media.html?partner=rss&emc=rss&smid=tw-nytimes&_r=0
(accessed October 25, 2015).
50. Dabiq, The Final Statement of AbūSināna
n-Najdī(may Allah accept him),33,no. 11, August,
2015, http://www.clarionproject.org/docs/Issue%2011%20-%20From%20the%20battle%20of%
20Al-Ahzab%20to%20the%20war%20of%20coalitions.pdf (accessed January 18, 2016).
TERRORISM AND POLITICAL VIOLENCE 17
51. Detailed Analysis of Islamic State Propaganda Video: Although the Disbelievers Dislike It,
Quillam, p. 32, December 19, 2014, http://www.quilliamfoundation.org/wp/wp-content/
uploads/publications/free/detailed-analysis-of-islamic-state-propaganda-video.pdf (accessed
July 20, 2015).
52. Charlie Winter, Documenting the Virtual Caliphate,’” Quillam, p. 23, 2015, http://www.
quilliamfoundation.org/wp/wp-content/uploads/publications/free/documenting-the-virtual-
caliphate.pdf (accessed January 18, 2016).
53. Winter, Documenting the Virtual Caliphate,’” 19 (see note 52 above); Kevin Collier, Inside
the Dirty Twitter War against ISIS,The Daily Dot, March 16, 2015, http://www.dailydot.
com/politics/isis-islamic-state-twitter-ctrlsec/ (accessed June 11, 2016); Jamie Tarabay, What
a Mundane ISIS Video Can Teach Us about Its Propaganda,Vocativ, August 31, 2015,
http://www.vocativ.com/news/227279/what-a-mundane-isis-video-can-teach-us-about-its-
propaganda (accessed June 11, 2016).
54. Jamie Tarabay, Gilad Shiloach, Amit Weiss, and Matan Gilat, To Its Citizens, ISIS also
Shows a Softer Side,Vocativ, March 20, 2015, http://www.vocativ.com/world/isis-2/to-its-
citizens-isis-also-shows-a-softer-side/ (accessed January 15, 2016).
55. James P. Farwell, The Media Strategy of ISIS,Survival 56, no. 6 (2014): 50.
56. Paul Tassi, ISIS Uses GTA 5In New Teen Recruitment Video,Forbes, September 20,
2014, http://www.forbes.com/sites/insertcoin/2014/09/20/isis-uses-gta-5-in-new-teen-recruit
ment-video/#18b7f0f63d29(accessed June 11, 2016).
57. Francesca Trianni and Andrew Katz, Why Westerners Are Fighting for ISIS,Time,
September 5, 2014, http://time.com/3270896/isis-iraq-syria-western-ghters (accessed June
11, 2016).
58. Katrin Bennhold, Jihad and Girl Power: How ISIS Lured 3 London Girls,The New York
Times, August 17, 2015, http://www.nytimes.com/2015/08/18/world/europe/jihad-and-girl-
power-how-isis-lured-3-london-teenagers.html (accessed June 11, 2016).
59. DutchNews.nl,Authorities Fear the Rise of Pop Jihad,’” November 26, 2013, http://www.dutch
news.nl/news/archives/2013/11/authorities_fear_the_rise_of_p.php (accessed January 10, 2015).
60. Kathy Gilsinan, Is ISISs Social-Media Power Exaggerated?,The Atlantic, February 23,
2015, http://www.theatlantic.com/international/archive/2015/02/is-isiss-social-media-power-
exaggerated/385726/ (accessed July 23, 2015).
61. Al Arabiya, How ISIS Conquered Social Media,June 24, 2014, http://english.alarabiya.net/en/
media/digital/2014/06/24/How-has-ISIS-conquered-social-media-.html (accessed July 23, 2015);
Steve Rose, The ISIS Propaganda War: A Hi-tech Media Jihad,The Guardian, October 7, 2014,
http://www.theguardian.com/world/2014/oct/07/isis-media-machine-propaganda-war
(accessed July 23, 2015); BBC, Islamic State Magazine Dabiq Withdrawn from Sale by Amazon,
June 6, 2015, http://www.bbc.com/news/world-middle-east-33035453 (accessed July 23, 2015);
Rudaw, ISIS Radio Station Attacked Inside Mosul,August 30, 2015, http://rudaw.net/english/
middleeast/iraq/30082015 (accessed January 2, 2016).
62. Shane and Hubbard, ISIS Displaying a Deft Command(see note 49 above).
63. Saltman and Winter, Islamic State(see note 7 above).
64. Rose, The ISIS Propaganda War(see note 61 above).
65. Manuel Castells, The Rise of the Network Society: The Information Age: Economy, Society, and
Culture (Oxford, UK: John Wiley & Sons, 2011), xxvii.
66. Patrick Kingsley, Who is Behind Isiss Terrifying Online Propaganda Operation?,The
Guardian, June 23, 2014, http://www.theguardian.com/world/2014/jun/23/who-behind-isis-
propaganda-operation-iraq (accessed June 11, 2016).
67. Winter, Documenting the Virtual Caliphate,’” 7 (see note 52 above).
68. J. M. Berger and Jonathon Morgan, The ISIS Twitter Census: Dening and Describing the
Population of ISIS Supporters on Twitter,The Brookings Project on US Relations with the
Islamic World 3, no. 20, p. 2, (2015), http://www.brookings.edu/~/media/research/les/
papers/2015/03/isis-twitter-census-berger-morgan/isis_twitter_census_berger_morgan.pdf
(accessed June 11, 2016).
18 A. AL-RAWI
69. BBC News, Islamic State Web Accounts to be Blocked by New Police Team,June 22, 2015,
http://www.bbc.com/news/world-europe-33220037 (accessed February 8, 2016).
70. Jillian Melchior, ISIS Tactics Illustrate Social Medias New Place in Modern War,
TechCrunch, October 15, 2014, http://techcrunch.com/2014/10/15/isis-tactics-illustrate-
social-medias-new-place-in-modern-war/ (accessed June 11, 2016).
71. Walbert Castillo, Air Force Intel Uses ISIS MoronPost to Track Fighters,June 5, 2015, http://
www.cnn.com/2015/06/05/politics/air-force-isis-moron-twitter/ (accessed June 11, 2016).
72. Berger and Morgan, The ISIS Twitter Census,14 (see note 68 above).
73. Semiocast, Arabic Highest Growth on Twitter: English Expression Stabilizes under 40%,
November 24, 2011, http://semiocast.com/publications/2011_11_24_Arabic_highest_
growth_on_Twitter (accessed December 12, 2012).
74. The Citizen Lab, Monitoring Information Controls in Iraq in Reaction to ISIS Insurgency,
University of Toronto, June 20, 2014, https://citizenlab.org/2014/06/monitoring-informa
tion-controls-in-iraq/ (accessed July 1, 2015).
75. BBC Monitoring, Islamic State Shifts to New Platform after Twitter Block,August 19, 2014,
http://www.bbc.com/news/world-middle-east-28843350 (accessed July 1, 2015); ADL, ISIS
Supporters Exploit Mixlr to Broadcast Extremism,Anti-Defamation League, November 21,
2014, http://blog.adl.org/extremism/isis-mixlr-terrorism-extremism-social-media (accessed
July 1, 2015); Shane and Hubbard, ISIS Displaying a Deft Command(see note 49 above).
76. Jessica Stern and John M. Berger, ISIS: The State of Terror (New York: HarperCollins, 2015);
Berger and Morgan, The ISIS Twitter Census,14 (see note 68 above); Jytte Klausen,
Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and
Iraq,Studies in Conict & Terrorism 38, no. 1 (2015): 122.
77. Darren W. Dahl, Kristina D. Frankenberger, and Rajesh V. Manchanda, Does it Pay to
Shock? Reactions to Shocking and Nonshocking Advertising Content among University
Students,Journal of Advertising Research 43, no. 03 (2003): 26880; Kara Chan, Lyann Li,
Sandra Diehl, and Ralf Terlutter, ConsumersResponse to Oensive Advertising: A Cross
Cultural Study,International Marketing Review 24, no. 5 (2007): 60628; Nathalie Dens,
Patrick De Pelsmacker, and Wim Janssens, Exploring Consumer Reactions to Incongruent
Mild Disgust Appeals,Journal of Marketing Communications 14, no. 4 (2008): 24969; Tim
Jones, Peggy H. Cunningham, and Katherine Gallagher, Violence in Advertising,Journal of
Advertising 39, no. 4 (2010): 1136; Karen Nelson-Field, Erica Riebe, and Kellie Newstead,
The Emotions that Drive Viral Video,Australasian Marketing Journal (AMJ) 21, no. 4
(2013): 20511.
78. Corky Siemaszko, U.S. Jihadis Being Recruited by ISIS via Skype to Attack OverseasOr at
Home,New York Daily News, July 3, 2014, http://www.nydailynews.com/news/crime/u-s-
jihadis-recruited-isis-skype-article-1.1854216 (accessed February 8, 2016); Hannah James,
Female Recruits to ISIS: The Recruiters Call,Global News, March 11, 2015, http://global
news.ca/news/1876491/female-recruits-to-isis-the-recruiters-call/ (accessed February 9,
2016); Nabeelah Jaer, The Secret World of ISIS Brides: U dnt hav 2 pay 4 ANYTHING
if u r wife of a martyr,’” The Guardian, June 24, 2015, http://www.theguardian.com/world/
2015/jun/24/isis-brides-secret-world-jihad-western-women-syria (accessed February 8,
2016); Rukmini Callimachi, ISIS and the Lonely Young American,The New York Times,
June 27, 2015, http://www.nytimes.com/2015/06/28/world/americas/isis-online-recruiting-
american.html?_r=0 (accessed February 8, 2016).
79. There are two repeated links that are included in the description of some of the YouTube
videos such as http://adf.ly/s5s6S as well as http://adf.ly/7612116/daeshgame.
80. Ahmad Ramadan, After the Internet, TV is next on ISIS blacklist,The Arab Weekly, August
21, 2015, http://www.thearabweekly.com/?id=1634 (accessed June 11, 2016).
81. Ahmed Al-Rawi, Anti-ISIS Humor: Cultural Resistance of Radical Ideology,Politics,
Religion & Ideology (2016): 117.
82. Paul Crompton, Grand Theft Auto: ISIS? Militants Reveal Video Game,Al Arabiya,
September 20, 2014, http://english.alarabiya.net/en/variety/2014/09/20/Grand-Theft-Auto-
ISIS-Militants-reveal-video-game.html (accessed June 11, 2016).
TERRORISM AND POLITICAL VIOLENCE 19
83. Matthew Hall, “‘This Is Our Call of Duty: How ISIS Is Using Video Games,November 1,
2014, http://www.salon.com/2014/11/01/this_is_our_call_of_duty_how_isis_is_using_video_
games/ (accessed June 11, 2016).
84. Vocativ, This Video Game Lets Jihadis Play as ISIS Fighters,February 2, 2015, http://www.
vocativ.com/world/isis-2/isis-video-games/ (accessed June 11, 2016).
85. Jay Kang, ISISs Call of Duty,The New Yorker, September 18, 2014, http://www.newyorker.
com/tech/elements/isis-video-game (accessed June 11, 2016).
86. Jeroen Jansz, The Emotional Appeal of Violent Video Games for Adolescent Males,
Communication Theory 15, no. 3 (2005): 21941; Jeroen Jansz and Martin Tanis, Appeal
of Playing Online First Person Shooter Games,CyberPsychology & Behavior 10, no. 1 (2007):
13336.
87. Cheryl K. Olson, Lawrence A. Kutner, and Dorothy E. Warner, The Role of Violent Video
Game Content in Adolescent Development: BoysPerspectives,Journal of Adolescent
Research 23, no. 1 (2008): 55.
88. Xanthe S. Plaisier and Elly A. Konijn, Rejected by PeersAttracted to Antisocial Media
Content: Rejection-based Anger Impairs Moral Judgment among Adolescents,
Developmental Psychology 49, no. 6 (2013): 1165; Den Hamer, Anouk, Elly A. Konijn, and
Micha G. Keijer, Cyberbullying Behavior and AdolescentsUse of Media with Antisocial
Content: A Cyclic Process Model,Cyberpsychology, Behavior, and Social Networking 17, no. 2
(2014): 7481.
89. Mark D. Griths, Mark N. O. Davies, and Darren Chappell, Online Computer Gaming: A
Comparison of Adolescent and Adult Gamers,Journal of Adolescence 27, no. 1 (2004):
8796.
90. Elly A. Konjin, Marije Nije Bijvank, and Brad J. Bushman, I Wish I Were a Warrior: The
Role of Wishful Identication in the Eects of Violent Video Games on Aggression in
Adolescent Boys,Developmental Psychology 43, no. 4 (2007): 1038.
91. Jean Burgess and Joshua Green, YouTube: Online Video and Participatory Culture (Hoboken,
NJ: John Wiley & Sons, 2013).
92. Kiri Miller, Playing Along: Digital Games, YouTube, and Virtual Performance (Oxford, UK:
Oxford University Press, 2012).
93. Christopher Zoia, This Guy Makes Millions Playing Video Games on YouTube,The
Atlantic, March 14, 2014, http://www.theatlantic.com/business/archive/2014/03/this-guy-
makes-millions-playing-video-games-on-youtube/284402/ (accessed June 11, 2016).
94. Paul Tassi, The 100 Biggest Gaming YouTube Channels Now Bring In 3.5 Billion Views A
Month,Forbes, June 14, 2014, http://www.forbes.com/sites/insertcoin/2014/06/14/the-100-
biggest-gaming-youtube-channels-now-bring-in-3-5-billion-views-a-month/#7b64940f7e61
(accessed June 11, 2016).
95. Ahmed Al-Rawi, Assessing Public Sentiments and News Preferences on Al Jazeera and Al
Arabiya,International Communication Gazette (2016): 1748048516642732; Ahmed Al-Rawi,
Understanding the Social Media Audiences of Radio Stations,Journal of Radio & Audio
Media 23, no. 1 (2016): 5067.
96. Klaus Krippendor,Content Analysis: An Introduction to Its Methodology (Thousand Oaks,
CA: Sage, 2012); Daniel Rie, Stephen Lacy, and Frederick Fico, Analyzing Media Messages:
Using Quantitative Content Analysis in Research (London: Routledge, 2014).
97. Lela Mosemghvdlishvili and Jeroen Jansz, Framing and Praising Allah on YouTube:
Exploring User-created Videos about Islam and the Motivations for Producing Them,
New Media & Society (2012): 1461444812457326; Mike Thelwall, Pardeep Sud, and Farida
Vis, Commenting on YouTube Videos: From Guatemalan Rock to El Big Bang,Journal of
the American Society for Information Science and Technology 63, no. 3 (2012): 61629; Liesbet
Van Zoonen, Farida Vis, and Sabina Mihelj, Performing Citizenship on YouTube: Activism,
Satire and Online Debate around the Anti-Islam Video Fitna,Critical Discourse Studies 7,
no. 4 (2010): 249262; Ahmed Al-Rawi, Cyber Warriors in the Middle East: The Case of the
Syrian Electronic Army,Public Relations Review 40, no. 3 (2014): 4208.
20 A. AL-RAWI
98. J. Richard Landis and Gary G. Koch, The Measurement of Observer Agreement for
Categorical Data,Biometrics (1977) 33, no. 1: 15974.
99. Ahmed Al-Rawi, Sectarianism and the Arab Spring: Framing the Popular Protests in
Bahrain,Global Media and Communication 11, no. 1 (2015): 2542.
100. Brown and Levinson, Politeness, 65 (see note 35 above).
101. Marwell and Schmitt, Dimensions of Compliance-gaining Behavior(see note 37 above).
102. Patrick Garrity, Paris Attacks: What Does DaeshMean and Why Does ISIS Hate It?,NBC
News, November 14, 2015, http://www.nbcnews.com/storyline/isis-terror/paris-attacks-what-
does-daesh-mean-why-does-isis-hate-n463551 (accessed June 11, 2016).
103. Shawn Carrie, How Social Media Is Helping ISIS Recruit More Members,The Kernel
Magazine, March 8, 2015, http://kernelmag.dailydot.com/issue-sections/sta-editorials/
12056/isis-twitter-racist-recruitment/#sthash.YlBQmtBM.dpuf (accessed June 11, 2016).
104. Web Desk, US Gun-maker Creates CrusaderRie to Fight Islamic State,The Express
Tribune, September 5, 2015, http://tribune.com.pk/story/951268/us-gun-maker-creates-crusa
der-rie-to-ght-islamic-state/ (accessed June 11, 2016).
105. Hardaker, Trolling,218 (see note 39 above).
106. Baker, Moral Panic(see note 41 above); Herring et al. Searching for Safety Online(see
note 28 above); Turner et al., Picturing Usenet(see note 41 above).
107. Hardaker, Trolling,219 (see note 39 above).
TERRORISM AND POLITICAL VIOLENCE 21
... Secondly, there is a lack of studies documenting how these themes have evolved in response to the group's changing circumstances and the global environment. The thematic evolution within the English text remains unexplored (Al-Rawi, 2018;Colas, 2017;Fisher, 2015;Kuznar, 2017;Qi, 2020b;Winter, 2018). By providing a detailed study of the themes and substance found in ISIS's English-language videos, this research bridges the gaps by analysing how these videos have changed to reflect global dynamics and the group circumstances. ...
Article
Full-text available
This investigation employs the analytical framework established by Braddock and Horgan to conduct a comprehensive content analysis of 79 official English-language propaganda videos disseminated by ISIS, with the objective of quantifying the thematic composition and the evolutionary trajectory of ISIS’s international media operations and propaganda machinery from 2014 to 2017. The findings reveal that a predominant portion of the videos articulate narratives extensively centred around themes of the adversary and religious discourse, with the Sharia (Islamic law) emerging as the most prevalent theme. This research concludes that at a global scale, the propaganda apparatus of ISIS has orchestrated an intricate narrative, incorporating adversarial, theological, and emotional elements, thereby delineating the advanced sophistication of ISIS’s global propaganda endeavours.
... Before traveling to the Middle East, the majority are radicalized by social media propaganda through contacts made on Facebook, Skype, or YouTube and even in video games. The ISIS produced a number of games in the name of entertainment but all these games leading to terrorist activities [39] and in the era of 2023 at this time this video has 89K viewers which is great number (See Figs. 2 and 3). ...
Article
Full-text available
This research explores Malaysia’s post-independence interaction between the government, civil society, and Islam, the majority religion in the nation. Many predicted that Islam would cause social and economic deterioration when Malaya gained independence from the British in 1957. The constitution declares Islam to be the official state religion, but it also guarantees non-Muslims the right to practice their faith freely and without hindrance. Since then, the state has continued to be in charge of everything related to religion, and Malaysia has been praised for many years as a haven of moderate Islam. However, for a variety of reasons, hate inspired by religion has grown more common and well-liked in Malaysia over the past several years. This research highlights the causes of the rise in hate crimes and the fall of Malaysia’s once-moderate form of Islam. It suggests that rather than attributing the radicalization of Malaysian Muslims to localized issues at the regional and national levels, it should be assessed in light of contemporary geopolitics and its implications for the welfare of the Muslim world. The study suggests that some of the best strategies for combating extremism and avoiding radicalization include ensuring that individuals’ rights are upheld and implementing good government.
... Evidence suggested that ISIS group was quickly embraced and used technologies and multimedia to its own values and to build its support base by recruiting new radical sympathisers [34]. Such extremist groups use all forms of online communication from games [35] to online recruitments [9], [36]. As these means and materials target global supporters and sympathisers, therefore they are usually written and translated into different languages e.g., Arabic, English and French etc. as [37] indicate. ...
Conference Paper
Full-text available
The dissemination of online (non)-inflammatory content by radicals and extremists through social media has increased recently, where such groups have heavily depended on social media for their interaction and recruitment, especially in the Arab world. This study examined online Saudi users' awareness of mobile apps inflammatory content and online mobilisation used by radical and terrorism groups, and their perceptions of such content. Based on the data collected from an online survey, primary findings revealed that respondents understood the dangerous of online inflammatory content, especially those related to conflicts between Islamic sects' (e.g., Sunni / Shiite) followers. They underlined the differentiate between the (non)-inflammatory content on social media. In terms of practical implications, the results suggest that local authorities should carefully anticipate in the Internet sphere and understand the social media widespread polarization and cyber recruitments.
Article
This study explores Fursan al-Aqsa: The Knights of the Al-Aqsa Mosque (developed by Nidal Nijm Games in 2022) highlighting its role in the portrayal of the Israeli-Palestinian conflict as a paradigm between propaganda and entertainment. By examining the game’s discourse, and its impact on player perceptions, this research sheds light on how video games can shape understanding and engagement with geopolitical issues. The research utilises Albert Bandura’s concept of moral disengagement to analyse the game’s content and its reception on platforms like Twitch and YouTube. By assessing how the game frames moral considerations through its narrative and gameplay, this study reveals the potential of digital games to affect player perceptions and contribute to the broader media landscape surrounding political issues. The analysis also explores the reception and re-interpretation of the game by players and content creators, thus offering insights into the complex interplay between video game content, ideological influence, and audience engagement.
Preprint
Full-text available
Interdependent networks structurally influence each other so that the source network imposes hidden community structures into the target network. We propose a mathematical model that by generalizing hierarchical clustering for multilayer networks, finds some interlayer transmitted hidden community structures that are not detectable by conventional community detection methods. The proposed methodology reveals evidence for hidden interlayer interactions that consequently generate hidden links on the target network. These hidden links construct hidden community structures on the target network (imposed from the source network) that are distinct from the community structures of the solo target network (without the presence of the source network). This model applies to systems with hidden interlayer interactions such as covert criminal groups, inter-platform social network interactions, and financial markets. Criminal and terrorist groups use the "source layer" (e.g., video game networks) to manage, guide, and lead their criminal activities on the "target layer." These groups keep the interlayer interactions covert. The members form their communities on an online source layer and perform their activities on the target layer without leaving a footprint. Social networks on different platforms (layers) possess communities that influence each other. Financial markets are well known for complicated endogenous and exogenous, but often hidden, not to say the least, asymmetric layer interactions. In this research, we generalize hierarchical clustering to represent the hidden communities resulting from the spillover from one network to another. We implement our model on multilayer financial networks: in particular, we find that trading value logarithmic changes (source) impose hidden community structures on the price return network (target). The main finding is that adding another relevant layer such as the trading value layer adds more information to systemic behaviors throughout the price return network. Dismissing it may yield less systemic information and underestimation of systemic risk because the footprint of some structures on the target network is originated from another layer and is not detectable from singling out the target layer.
Article
Full-text available
Ergebnisse einer Kurzexploration von 20 Gaming- und gaming-nahen Plattformen im Zuge des RadiGaMe Projektes. Erhältlich open access auf der RadiGaMe Webseite: https://www.radigame.de/fileadmin/DatenRadigame/Publikationen/RadiGaMe_Report1.pdf
Article
Full-text available
This article investigates the online comments made by Arab Facebook users on news items posted on the Facebook pages of two very popular TV channels: Al-Jazeera Arabic and Al-Arabiya. This study employs different methods to closely examine over 620,000 comments posted on the two Facebook pages as well as studying the most commented on news stories from a total of 11,685 news reports. The results indicate that commentators expressed some dominant sentiments that are mostly in line with the TV channels’ coverage of certain events, while certain news topics attracted most of the online public’s comments especially on Al Jazeera channel.
Article
Full-text available
When the short anti-Islam film the Innocence of Muslims was first posted on YouTube in English, no tangible reactions were seen in the Arab world. However, when the same producer dubbed it into Arabic and posted it on YouTube, street protests started around some parts of the Arab world. The study reported here examines a popular Facebook page identified as The global campaign to counter the hurtful film against the Prophet Muhammed that was created to protest against the Innocence of Muslims film. This study investigated all 6949 Facebook updates and comments that were available on this page by 15 October 2012 and found that a clear majority of posts were Pro-Islamic focusing on prayers for Muhammed and supplications to defend him. This study advances our theoretical understanding of the connection between online and offline religion by providing empirical evidence in relation to this controversial incident.
Article
Full-text available
The publication of 12 cartoons depicting the Prophet Muhammad by the Danish newspaper Jyllands-Posten on September 30, 2005, created a great deal of controversy over self-censorship, freedom of speech, and accusations of religious incitement. Muslim activists organized protests, and later hundreds of people were killed and hundreds of others were injured due to violent reactions to the cartoons. This article focuses on how people used YouTube to react to these cartoons by analyzing 261 video clips and 4,153 comments. Results show that the majority of the video clips and comments were moderate and positive in tone toward Islam and Muhammad; however, a small percentage either called for jihad against the West or made lethal threats against the artist. Other comments carried curses or insults against Denmark, while a few others were anti-Islamic. The fact that these online reactions were highly varied in tone suggests that the online public sphere is very much divided.
Article
Videogames represent one of the fastest growing and most influential forms of contemporary visual culture. In this article, the author looks to five aspects of current videogames: perspective, interactivity, interface, narrative, and time and movement. Each of these videogame modalities is analyzed as related to a wide range of popular media, including film and new media. Art educators are provided with specific suggestions for incorporating aspects of videogames in practice, questions that point to the problematic nature of many videogames, as well as general theoretical directions for future research.
Book
We cannot truly understand - let alone counter - terrorism in the 21st century unless we also understand the processes of communication that underpin it. This book challenges what we know about terrorism, showing that current approaches are inadequate and outdated, and develops a new communication model to understand terrorism in the media age.
Article
After the release of ISIS's ‘Salil Al-Sawarem' promotional and motivational video with its famous religious chant, hundreds of Arab YouTubers started mocking it by editing its chant and including it in funny dancing clips which they called ‘the popular edition'. Also, some Arabic and Kurdish TV channels produced shows that aimed at mocking the radical group. Since ISIS regards dancing as a religious taboo, these popular and official media productions represent a cultural resistance force and a rejection of ISIS and its extremist ideology. I argue in this article that these active involvements in ridiculing, countering, and discrediting the terrorists’ ideology are cultural resistance efforts that aim at countering terrorism and raising awareness about its dangers in the Middle East region.
Article
In the past ten years jihadist materials have increased rapidly on the Internet. Within its online-spheres the jihadists assume authoritative roles of interpreting religious sources with the intention to incite and inspire individuals to join an overall cause. Radical writings and videos are easily accessible and direct their messages in various levels and by differing means, with divergent levels of impact and effect on its consumers. The article intends to decipher some aspects of jihadism on the Internet and the implications of its comprising corpus.
Article
Al Qaeda is today a fragmented organization, and its strategic communication efforts now focus largely on recruiting individuals in the West to carry out "individual jihad" in their home countries. One Al Qaeda-affiliated publication, Inspire, represents an unusual use of the digital magazine format and content for recruitment. This study examines the content and design of Inspire to determine how the magazine may advance the self-radicalization that it seeks to induce in its readers. This analysis finds that the magazine weaves together jihadist ideology, a narrow interpretation of Islam, and appropriations of Western popular culture to maximize the publication's potential for motivating readers toward violence.