Crouching shahid, hidden jihad: mapping the online propaganda campaign of the Hayat Tahrir al-Sham-affiliated Ebaa News Agency

被引:1
作者
Lakomy, Miron [1 ]
机构
[1] Univ Silesia, Inst Polit Sci, Katowice, Poland
关键词
Hayat Tahrir al-Sham; Ebaa News Agency; iba; propaganda; open source intelligence; jihad; TWITTER;
D O I
10.1080/19434472.2021.1977372
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
The primary objective of this paper is to map the online presence of Hayat Tahrir al-Sham's (HTS) media branch - Ebaa News Agency (ENA) - on the surface web. It also measures three years of propaganda output of the group and its viewership, as well as outlines the thematic landscape of its productions based on the content analysis of a sample. It argues that Ebaa's messaging pattern constitutes a peculiar mixture of opposing priorities. It paid a great deal of attention to portraying itself as an independent news agency that has nothing to do with violent terrorist organizations (VEOs). In effect, its productions are easily available on the surface web. A closer look, however, proves that since 2017 ENA has been dedicated to supporting HTS's radical Islamist agenda. This paper provides evidence of this. Moreover, Ebaa adopted a two-vector distribution strategy of its productions, composed of standalone websites and Telegram channels. In this context, the output of this media cell appears to be quite impressive. Between 2017 and 2020, it was capable of releasing more than 13,000 pieces of propaganda on its websites. At the same time, however, their viewership was lower than initially expected.
引用
收藏
页码:361 / 389
页数:29
相关论文
共 61 条
[1]  
al-Tamimi, 2020, WASHINGTON I NEAR E, V75
[2]  
al-Tamimi A.J., 2020, HAYAT TAHRIR AL SHAM
[3]  
[Anonymous], SYR 2018 INT REL FRE
[4]  
[Anonymous], HTSS EBAA NEWS AGENC
[5]  
[Anonymous], 15 SOUNDCLOUD STAT W
[6]  
[Anonymous], 2017, al-Modon
[7]  
Bazzell M., 2016, Open source intelligence techniques: Resources for searching and analyzing online information
[8]  
Bin Ali M., 2018, RSIS COMMENTARY, V063
[9]  
Chertoff M, 2017, Journal of Cyber Policy, V2, P26, DOI [10.1080/23738871.2017.1298643, 10.1080/23738871.2017.1298643, DOI 10.1080/23738871.2017.1298643, 10.1080/23738871.2017, DOI 10.1080/23738871.2017, https://doi.org/10.1080/23738871]
[10]  
Choudhury N., 2014, INT J COMPUTER SCI I, V5, P8096