2ISIS and Web‐Based Insurgency
2.1 Introduction
In Chapter 1, we discussed the phased development of tactical and strategic operations on the Internet. These stages included
- Stage I (late‐1990s to approximately 2010)(Communication)
- Simple communication
- Use of the Internet for proselytization and recruiting
- Stage II (~2010–~2015) (Tactical)
- Use of the Internet to achieve tactical effects (e.g., denial, crowd mobilization …)
- Stage III (~2015 to Present)(Strategic)
- Use of the Internet to provide strategic effects (e.g., influence election results)
Operations on the Internet began with hackers experimenting with new technology. Shortly after, however, Patriotic hacktivists used Internet technologies to act out, usually protesting a perceived slight.
Online networking grew as more people joined social media applications. This included the use of Facebook and Twitter for political activities (e.g., campaigning) and coordinating rallies. Trolls, and other bad actors, picked up on the use of social media to coordinate these rallies, including the pitting of hostile groups against one another to result in violence. Along with trolls, AQI, and then ISIS, used the Internet to raise funds, to recruit, and to command and control operations. In fact, ISIS was the first example of the use of the Internet to recruit, mobilize, and build a state on the Internet.
2.1.1 Terrorist Development of the Internet for Messaging
A recent “cyber” phenomenon is the non‐nation state, terrorist, ...