Expert Commentary

Why ISIS is So Successful

March 9, 2016 | Harleen Gambhir

The rise of the Islamic State has been accompanied by the increasing presence of the terror group on social media. ISIS’s message of a Muslim utopia is disseminated through various organizations and outlets, all coordinated through complex bureaucratic measures. Counterterrorism analyst for the Institute for the Study of War, Harleen Gambhir, discussed with The Cipher Brief why ISIS’s message is so successful, what advantages they have in getting their message out, and how the U.S. can better compete in this war of narratives. 

The Cipher Brief: In what ways has ISIS' messaging been successful? How would you assess the effectiveness of ISIS’ messaging in relation to other terrorist organizations?

Harleen Gambhir: ISIS’s messaging is incredibly effective, largely due to its strategic emphasis on hybridized digital warfare. The organization fully coordinates its military and messaging campaigns with the support of a robust media bureaucracy. ISIS’s online content, including its videos, photos, speeches, and religious chants, all emphasize the organization’s core claim: that it has created utopia for Muslims in the form of a caliphate that believers are obligated to defend. This claim to control terrain as a caliphate is ISIS’s primary source of strength or its center of gravity. Depictions of bustling markets or the brutal execution of “apostates” all reiterate the immediacy and inevitable victory of ISIS’s paradise. 

ISIS’s bureaucracy in Iraq and Syria supports efforts to broadcast this resonant message. The organization has established a central media foundation that sets messaging priorities and media campaigns in consultation with ISIS leader Abu Bakr al-Baghdadi and his council. These centralized messages are then disseminated through multiple outlets, including ISIS’s official media foundations, provincial reporting offices, unofficial media collectives, and online supporters. Each organization and medium reaches a different audience: some target local Syrians and Iraqis, others broadcast to ISIS’s supporters in the Middle East, and others are oriented to Western audiences. This diffraction ensures that ISIS gains credibility amongst different populations even as its central message is repeated constantly.  

ISIS’s online operations have already inspired other terrorist groups and will likely continue to do so. Syrian al-Qaeda affiliate Jabhat al Nusra (JN) released the first issue of its English-language magazine Risalah in July 2015, more than a year after ISIS pioneered its glossy, English-language magazine Dabiq. JN’s magazine sought to discredit ISIS and included appeals to foreign fighters, demonstrating the emergence of a new digital front for the groups’ ongoing rivalry. Taliban militants also began posting live updates on Twitter and Telegram during an attack on the Spanish Embassy in Kabul, Afghanistan in December 2015, possibly adopting ISIS’s practice of providing live battlefield reports. ISIS’s media success may fuel a “terroristic Darwinism” phenomenon in which jihadist groups improve their propaganda capabilities in an effort to match ISIS.

TCB: What advantages and challenges does ISIS face in developing a messaging strategy?

HG: ISIS’s primary advantage is its continued ability to claim that it controls territory as a caliphate across Iraq, Syria, and now Libya. ISIS will continue to enjoy global resonance so long as that military reality holds true. ISIS also benefits from its regional affiliate campaign across the Middle East, North Africa, and Asia. ISIS-linked jihadist groups are also executing attacks in Bangladesh, Yemen, Afghanistan, and Indonesia, among other locations, enabling ISIS to claim perpetual action and success even as it experiences military failures or internal hardship. ISIS’s media apparatus is adept at drowning out territorial losses with media coverage of spectacular and graphic attacks. Finally, ISIS benefits from its ability to centrally control its messaging. ISIS’s internal security ensures all media produced within ISIS’s areas of control complies with mandated messaging guidelines.

ISIS is challenged by its own media success. The organization’s propaganda perpetually raises the bar for shock and intimidation, and risks losing potency over time. ISIS also faces competition from other jihadist groups, as described above. These organizations are adopting elements of ISIS’s messaging strategy while censuring ISIS for its brutality and authoritarianism. ISIS will be forced to innovate and adapt in order to maintain its edge, particularly as other groups criticize the legitimacy of ISIS’s Caliphate.

TCB: What can we do better to counter ISIS’s message, both offensively (communicate a better alternative to ISIS' message), and defensively (prevent their message from resonating)? 

HG: Offensively, the U.S. must revise both the form and content of its anti-ISIS messaging effort. The U.S. and other members of the anti-ISIS coalition must agree upon a core narrative for the anti-ISIS fight, akin to ISIS’s central message of having created a caliphate. This central message could focus on ISIS’s failure to adequately govern and defend its people, for example, or on the coalition’s support to Muslim communities. The anti-ISIS coalition should then create a body to formulate discrete, coalition-wide messaging campaigns that reflect this narrative and respond to real-world events, particularly battlefield developments. Each coalition member should provide direction and resources to local partners, such as religious and community organizations, to then disseminate anti-ISIS material in accordance with the centrally announced campaign. The U.S. and its allies must allow local partners to determine the optimal media and format for their audiences, whether online, in print, or on radio. Achieving this degree of coordination will be extremely difficult, but it is necessary in order to promote a viable alternative to ISIS’s messaging.

Defensively, the U.S. and its allies should aim to reduce ISIS’s resonance online. The U.S. should continue to work with social media platform owners to identify and eliminate pro-ISIS accounts and posts. It should also encourage efforts to “drown out” ISIS’s content, for instance by flooding ISIS’s Telegram chat rooms and Twitter hashtags with anti-ISIS content. Finally, the U.S. and its partners should continue to act against ISIS’s physical media infrastructure, destroying communications nodes, and arresting individuals who support ISIS’s online operations.

Media campaigns alone will not destroy ISIS, however. The U.S. and its allies must deprive the organization of terrain in the physical world, using effective messaging to hasten ISIS’s destruction. The U.S. should thus embrace ISIS’s example of hybridized warfare and unite military and digital operations into a cohesive strategic effort.

The Author is Harleen Gambhir

Harleen Gambhir is a Counterterrorism Analyst at the Institute for the Study of War. She focuses on the Islamic State of Iraq and al-Sham’s global strategy and operations, as well as on the organization's propaganda and digital presence. Gambhir also manages several of ISW’s technology partnerships.

Learn more about The Cipher's Network here

Next Steps in U.S.-Cuba Relations
Strengthening U.S. Cyber Defenses
Russia Sanctions: The New Normal
Corruption in China: The Party’s Over
Change in the Kingdom: Three Big Shifts
Managing Information & Risk in the Digital Age
Endgame in Afghanistan
The Convergence of Crime and Terror
Strengthening the Public-Private Partnership
The Billion Dollar Spy: An Interview with Author David Hoffman
The New Battlefield
North Africa: Instability Increasing
The Kidnapping Capital of the World
Homegrown Terror in the Age of ISIS
The Refugee Crisis: Europe on the Brink
The Future of Mexican Oil
Cracks in the System
Embassy Security Three Years After Benghazi
Fourteen Years Later
Can Congress Solve the Cybersecurity Problem?
Arctic Game Changer?
Where They Stand on National Security
The First 100 Days
Worthy of Fleming: Anthony Horowitz's "Trigger Mortis"
At the Crossroads
Eye in the Sky
Rough Road Ahead for Rousseff
Leveling the Playing Field: Tech Access in China
The Dead Drop
Top of Mind for Chief Security Officers
Protecting Your Business
The Future of Oil
Chinese Expansion in Latin America
American Involvement in Syria
The Future of Geospatial Intelligence
The Umbrella Movement: One Year Later
Ebola: An End in Sight?
The Pakistan Problem
The Dead Drop
The Encryption Debate
Going Dark
The US-Mexico Relationship
The Rise of Mobile Technology in Africa
The Dead Drop
Construction Boom in the Gulf
Cybersecurity: The Human Factor
Beijing and the South China Sea
Will Peace Talks Succeed in Colombia?
Social Media and Terrorism
The Rise of Israel’s Tech Sector
Securing the Border
Red Sun Rising
The Dead Drop
Adopting the Iran Deal
Stability on the Peninsula
Crime in South Africa
Combatting Terrorist Financing
The Dead Drop
Recovering from a Cyber Attack
Stability in South Asia
Veterans Day
Israel’s Wave of Violence
The Dead Drop
Protecting Critical Infrastructure
ISIS on the March
The Paris Attacks
Rethinking U.S. Security Assistance
The War on Terror 2.0
Putting Mali in Context
Will Russia Ever Change?
Will Canada Pull Back?
Understanding Putin’s Popularity
Chinese Expansion in Africa
Terrorism Finance and Wildlife Poaching
Illicit Trafficking in Latin America
Climate Change and Security
Preventing Another San Bernardino
Supply Chain Security
Negotiating a New Safe Harbor Agreement
The Battle for Yemen
Foreign Tech Access in China
The Dead Drop
Offensive Cyber Operations
Travel Security in the Age of ISIS
Iran: A Rising Cyber Power?
The Future of Cybersecurity
The Arab Spring Five Years Later
Preparing Today’s Military for Tomorrow’s Wars
Cybersecurity for Small and Medium-Sized Enterprises
Maritime Security in the Gulf of Guinea
Improving Aviation Security
The Dead Drop
Terrorism in 2016
Cybersecurity in 2016
The World in 2016: Opportunities and Risks
China in 2016
Russia in 2016
Moscow’s Cyber Buildup
The China-India Relationship
Russian Influence in Latin America
The Future of Homegrown Terrorism
Stability in Sub-Saharan Africa
Protecting Your Digital Identity
Elections in Taiwan: A Turning Point?
The Caliphate of Crime
Biotechnology’s Dark Side
Rethinking U.S. Strategy Toward China
The Evolution of Weapons of Mass Destruction
A New Era in US-Iranian Relations?
Will Information Sharing Improve Cybersecurity?
Evaluating China's New Silk Road
Tech in Latin America: Opportunities and Challenges
The Destruction of Libyan Oil
Ransomware: Protecting Yourself from Cyber Extortion
The US and India: Strengthening Security Cooperation
Security and Stability in Afghanistan
Combatting the Al Shabaab Threat
Sports Security: Protecting Your Venue
Israel’s Arab Alliance: A Counter to ISIS and Iran?
The End of U.S. Space Supremacy
The Caucasus: Instability Increasing
Stabilizing Iraq
The Trans-Pacific Partnership: Deepening U.S. Commitment to Asia
Securing Industrial Control Systems
The Battle for Ukraine
Defeating Boko Haram
Jordan: The Indispensable Ally
China’s Military Modernization
The Cybersecurity Skills Shortage
Solving Mexico’s Violence Problem
The Northern Triangle: The Most Violent Region in the World
The Future of the Middle East
Terrorism in the World’s Largest Muslim Country
The Rise of Quantum Computing
Europe’s Terrorism Problem
Stability in the East China Sea
The Rise of Counter-Drone Technology
The ISIS WMD Threat
Healthcare and the Cyber Threat
Security in the Indo-Pacific: Australia’s New Role
Countering ISIS' Message
Containing the ISIS Cancer
Security, Privacy, and the Fight Over Encryption
Taking Aim at Smart Guns
Losing Patience with North Korea
The Difficult Road Ahead for Colombia
The Taliban Resurgence
ISIS: The New Face of Global Jihad?
Connecting with Latin America
Russia and China: Mutually Assured Detachment
The Scourge of Terrorism
The Security Challenge of Terror
European Unity in the Face of Crises
Developing Enhanced Cybersecurity Systems
Pakistan: Friend and Foe?
Egypt’s Economy on the Brink
Tehran’s Balancing Act
Russia Makes Moves in the Middle East
Kenya’s Battle with al-Shabaab
Missile Defense in the Korean Peninsula
Are America's Ports Secure?
The Human Factor Behind the Panama Papers Leak
Russian Military Modernization
APTs: The Boogeymen of Cybersecurity
Vietnam: Guns and Butter
Syria: Power-sharing, Partitioning, and the Fight Against ISIS
Turbulence in Turkey
The U.S. and the Philippines: Shoulder to Shoulder in the South China Sea
The Darker Side of the Internet of Things
Cybersecurity Challenges in Asia
Taliban on the Offensive
Quagmire in Yemen
Cocaine and Conflict in Colombia
The Cloud: Nebulous, but Nimble
Censorship in China
An Emerging Crime-Terror Nexus in Europe
IRGC: Iran's Power Player
Latin America: The New Frontier for Cyber Attacks
The Hydra and the Snake: The Death of Osama Bin Laden
Nuclear Deterrence and Assurance in East Asia
Vehicle Cybersecurity: Running in Place
What Drives ISIS
Tensions Simmer in the South China Sea
Managing the Mobile Phone Malware Threat
Leaving the Oil Spigot Open
Burundi: A Path Toward Civil War?
The Value of Special Operations Forces
ISIS in the Balkans
The Tech Must Flow
North Korea’s Party Congress: What was all the fuss about?
Argentina: A Smoother Ride
Libya: Obama’s “Worst Mistake”
Tsai Ing-Wen’s Balancing Act
The North Korea Workers’ Party Congress and Kim Jong-un’s Legitimacy
Flying the Unfriendly Skies: Airline Security
Nuclear Standoff in South Asia
How to Read Riyadh
Even in Defeat, Austria’s Far-right Emulates Populist Growth in Europe
More Effective, Less Secure: The Cyber-Threat to Medical Devices
A New Era in the U.S.-Japan Security Partnership
Passing the Torch to the Next Generation of Saudi Leaders
U.S. Military Aid to Egypt Continues Despite Democratic Struggle
How Secure are Radiological Materials?
Roadblocks on the Path to Normality in Iran
Caracas in Crisis
Algeria: Exporting Stability
The Push for Kurdish Independence
U.S. and China: Strategic Cooperation at Arm’s Length
City Life: Living Smarter, Not Harder
Homegrown Terror in Orlando
A Rough Patch in U.S.-Saudi Relations
Japan’s “Abenomics”
A Tale of Two Bears: The DNC Hack
The Origins of Brexit
Best Of: The Chinese Communist Party Under Xi Jinping
The Arctic: Technology and Infrastructure on Earth and in Space
Jordan: Stability Amidst Chaos
Exporting Jihad: Bosnia and Kosovo
Changing World Order: The Effects of Brexit
Navigating Uncharted Waters
Iraq after ISIS: Divide it or Fix it?
Terrorism in Istanbul: Severe Implications
North Korea as a Cyber Threat
One If By Air, Two If By Sea: Unmanned Surface Vehicles
The FBI’s Intelligence Mission
Does NATO Need a New Ideology?
Philippines v. China: Laying Down the Law of the Sea
Is Turkey Returning to a Policy of “Zero Problems?”
Federal Cybersecurity One Year After the OPM Breach
NATO: Weathering the Storms
The Rise of the Fringe: A Threat to Democracy?
Hezbollah's Many Faces
Trans-Pacific Trade Deal Remains in Limbo
The Aftermath of the Nice Attack: Is ISIS’ “Prestige” on the Rise?
Crossing the Line: A Failed Coup in Turkey
France’s Vulnerabilities in a Changing Terror Landscape
The Problem with Proxies
Water Security in South Asia: Running Dry and Running Out of Options
The Clash over Social Media Data
Extremist Groups Target Diversity in Bangladesh
Kenya: Private Sector and Government Coordinate on National Security
The ISIS-Al Qaeda Rivalry
Will Syria’s Most Productive Citizens Ever Return Home?
Trust but Verify: The United States, China & Economic Espionage
The World is Watching: The American Election and China
The Status Quo Will Not Work in South Sudan
Kurdistan as a Geopolitical Playground
Rio Olympic Games: A Missed Opportunity
Spinning Silk: Asia and the GCC
China-Japan Relations: Trading Goods While Exchanging Words
Climate Change in Ethiopia: Managing the Risks
Mounting Security Challenges in Afghanistan
Is There a Future for the Muslim Brotherhood in Egypt?
Niger Delta Militants Compound Nigeria’s Security Crises
Thailand Under the Junta
Brazil: Getting its House Back in Order Post Olympics
Indicators of Political Instability
Finding Water in the Desert: Water Security in the Middle East
The Blurring Line Between Cyber and Physical Threats
The World is Watching: The American Election and Russia
NATO’s Ambiguity on the Red Line for Russia
Boko Haram: The Plague Affecting Nigeria and Beyond
Tunisia: From Revolution to Governance
Russia, China, and Cyber Espionage
The F-35 Joint Strike Fighter: Potential Game-Changer or Procurement Nightmare?
Climate Change Jeopardizes National Security
Algeria: A Bulwark Against ISIS
Venezuela's Military: Both a Stabilizing and Destabilizing Force
Will Theresa May's Britain Stay Committed to European Defense?
America and the Asian Infrastructure Investment Bank
What’s at Stake in the South China Sea?
Fifteen Years After 9/11: Much Accomplished, Much to be Done
The Post-9/11 U.S. Military
The Post-9/11 U.S. Intelligence Community
South Africa: ANC Losing Its Grip on Power
The World is Watching: The American Election and Saudi Arabia
Turkish Leverage Over the United States and European Union
Nuclear North Korea: A No-Win Scenario?
Insider Cyber Threats: A Pressing Problem Facing Business
Al Shabaab: A Persistent Threat
Unease, Uncertainty, and Strife: Global Inequality and Instability
Europe Bears a Big Burden in the World's Migration Crisis
Malicious Cyber-Actors in the Financial Services Industry
China's Ongoing Struggle to Clamp Down on Terrorism
Growing Instability in Africa’s Top Two Oil Producers
The World is Watching: The American Election and Iran
Dollars and Sense: Military Spending During an Economic Downturn
Forewarned is Forearmed: Confronting Adversaries in Cyberspace
Is Peace Possible in Colombia?
The Rise of Hypersonic Weapons
Nuclear No First Use: Ambiguity vs. Clarity
Al Qaeda Growing Stronger By the Minute
Cyber and the Law
The DRC: Strong Grip on Power, Weak Handle on Governance
Combatting Haqqani Network is Key to Afghan Strategy
War and Peace: Syria and the Question of American Intervention
The F35: A 21st Century Coalition Asset
Objective: Mosul
Where is Duterte Leading the Philippines?
Great Power Politics in Latin America
In the Strait of Hormuz, Little has Changed with Iran
Corralling the Cartel: OPEC and Oil Prices
Russian Hacking: The Difficult Path Between Inaction and Escalation
Philippines' Duterte Leaves U.S. Policymakers "Baffled"
The World is Watching: The American Election and Germany