Back
About RSIS
Introduction
Building the Foundations
Welcome Message
Board of Governors
Staff Profiles
Executive Deputy Chairman’s Office
Dean’s Office
Management
Distinguished Fellows
Faculty and Research
Associate Research Fellows, Senior Analysts and Research Analysts
Visiting Fellows
Adjunct Fellows
Administrative Staff
Honours and Awards for RSIS Staff and Students
RSIS Endowment Fund
Endowed Professorships
Career Opportunities
Getting to RSIS
Research
Research Centres
Centre for Multilateralism Studies (CMS)
Centre for Non-Traditional Security Studies (NTS Centre)
Centre of Excellence for National Security
Institute of Defence and Strategic Studies (IDSS)
International Centre for Political Violence and Terrorism Research (ICPVTR)
Research Programmes
National Security Studies Programme (NSSP)
Social Cohesion Research Programme (SCRP)
Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
Other Research
Future Issues and Technology Cluster
Research@RSIS
Science and Technology Studies Programme (STSP) (2017-2020)
Graduate Education
Graduate Programmes Office
Exchange Partners and Programmes
How to Apply
Financial Assistance
Meet the Admissions Team: Information Sessions and other events
RSIS Alumni
Outreach
Global Networks
About Global Networks
RSIS Alumni
Executive Education
About Executive Education
SRP Executive Programme
Terrorism Analyst Training Course (TATC)
International Programmes
About International Programmes
Asia-Pacific Programme for Senior Military Officers (APPSMO)
Asia-Pacific Programme for Senior National Security Officers (APPSNO)
International Conference on Cohesive Societies (ICCS)
International Strategy Forum-Asia (ISF-Asia)
Publications
RSIS Publications
Annual Reviews
Books
Bulletins and Newsletters
RSIS Commentary Series
Counter Terrorist Trends and Analyses
Commemorative / Event Reports
Future Issues
IDSS Papers
Interreligious Relations
Monographs
NTS Insight
Policy Reports
Working Papers
External Publications
Authored Books
Journal Articles
Edited Books
Chapters in Edited Books
Policy Reports
Working Papers
Op-Eds
Glossary of Abbreviations
Policy-relevant Articles Given RSIS Award
RSIS Publications for the Year
External Publications for the Year
Media
Cohesive Societies
Sustainable Security
Other Resource Pages
News Releases
Speeches
Video/Audio Channel
External Podcasts
Events
Contact Us
S. Rajaratnam School of International Studies Think Tank and Graduate School Ponder The Improbable Since 1966
Nanyang Technological University Nanyang Technological University
  • About RSIS
      IntroductionBuilding the FoundationsWelcome MessageBoard of GovernorsHonours and Awards for RSIS Staff and StudentsRSIS Endowment FundEndowed ProfessorshipsCareer OpportunitiesGetting to RSIS
      Staff ProfilesExecutive Deputy Chairman’s OfficeDean’s OfficeManagementDistinguished FellowsFaculty and ResearchAssociate Research Fellows, Senior Analysts and Research AnalystsVisiting FellowsAdjunct FellowsAdministrative Staff
  • Research
      Research CentresCentre for Multilateralism Studies (CMS)Centre for Non-Traditional Security Studies (NTS Centre)Centre of Excellence for National SecurityInstitute of Defence and Strategic Studies (IDSS)International Centre for Political Violence and Terrorism Research (ICPVTR)
      Research ProgrammesNational Security Studies Programme (NSSP)Social Cohesion Research Programme (SCRP)Studies in Inter-Religious Relations in Plural Societies (SRP) Programme
      Other ResearchFuture Issues and Technology ClusterResearch@RSISScience and Technology Studies Programme (STSP) (2017-2020)
  • Graduate Education
      Graduate Programmes OfficeExchange Partners and ProgrammesHow to ApplyFinancial AssistanceMeet the Admissions Team: Information Sessions and other eventsRSIS Alumni
  • Outreach
      Global NetworksAbout Global NetworksRSIS Alumni
      Executive EducationAbout Executive EducationSRP Executive ProgrammeTerrorism Analyst Training Course (TATC)
      International ProgrammesAbout International ProgrammesAsia-Pacific Programme for Senior Military Officers (APPSMO)Asia-Pacific Programme for Senior National Security Officers (APPSNO)International Conference on Cohesive Societies (ICCS)International Strategy Forum-Asia (ISF-Asia)
  • Publications
      RSIS PublicationsAnnual ReviewsBooksBulletins and NewslettersRSIS Commentary SeriesCounter Terrorist Trends and AnalysesCommemorative / Event ReportsFuture IssuesIDSS PapersInterreligious RelationsMonographsNTS InsightPolicy ReportsWorking Papers
      External PublicationsAuthored BooksJournal ArticlesEdited BooksChapters in Edited BooksPolicy ReportsWorking PapersOp-Eds
      Glossary of AbbreviationsPolicy-relevant Articles Given RSIS AwardRSIS Publications for the YearExternal Publications for the Year
  • Media
      Cohesive SocietiesSustainable SecurityOther Resource PagesNews ReleasesSpeechesVideo/Audio ChannelExternal Podcasts
  • Events
  • Contact Us
    • Connect with Us

      rsis.ntu
      rsis_ntu
      rsisntu
      rsisvideocast
      school/rsis-ntu
      rsis.sg
      rsissg
      RSIS
      RSS
      Subscribe to RSIS Publications
      Subscribe to RSIS Events

      Getting to RSIS

      Nanyang Technological University
      Block S4, Level B3,
      50 Nanyang Avenue,
      Singapore 639798

      Click here for direction to RSIS

      Get in Touch

    Connect
    Search
    • RSIS
    • Publication
    • RSIS Publications
    • CO17032 | Crowdsourcing Local Attacks: ISIS Expands its Radical Reach
    • Annual Reviews
    • Books
    • Bulletins and Newsletters
    • RSIS Commentary Series
    • Counter Terrorist Trends and Analyses
    • Commemorative / Event Reports
    • Future Issues
    • IDSS Papers
    • Interreligious Relations
    • Monographs
    • NTS Insight
    • Policy Reports
    • Working Papers

    CO17032 | Crowdsourcing Local Attacks: ISIS Expands its Radical Reach
    Syed Huzaifah Bin Othman Alkaff

    20 February 2017

    download pdf

    Synopsis

    The Islamic State of Iraq and Syria (ISIS) has taken to crowdsourcing local attacks to make up for its losses in the Middle East. This has become a major plank of the group’s strategy to expand its radical reach and inflict global violence.

    Commentary

    ISIS WITH a self-styled caliph has been hierarchical in its internal command within Iraq and Syria, and the management of its wilayats (provinces). The group has a rank-and-file structure that directly oversees its members’ activities. Yet somewhat paradoxically, it crowdsources for lone wolves to partake in violence in its name. Indeed its hierarchical approach and crowdsourcing endeavours are complementary. The weakening of its central command in the face of attacks will see a strengthening of its crowdsourcing strategy.

    Crowdsourcing as a strategy fits well with the group’s current objective. It can rely heavily on ISIS’ transnational support network to obtain its needed service to inflict terror. Moreover, this mode of sourcing allows ISIS to divide the work between numerous participants to achieve an impactful cumulative result. The group can easily exploit its network by crowdsourcing from these radical milieus – those who share their perspective and objectives, who approve of certain forms of violence, and who (at least to a certain extent) support the violent group morally and logistically – to pursue its agenda.

    ISIS’ Framework of Offence

    In an article from the January issue of Rumiyah, the ISIS magazine, the group instructs its audiences the specific details of carrying out an attack. This includes how to leave evidence at the scene to so that ISIS can claim responsibility. Apart from military-grade weapons, ISIS additionally promotes the use of light weapons such as knives in conducting terror acts. This makes weaponisation easy for its crowd-sourced “terror activists”.

    Following the group’s losses in recent months, it is not surprising to see how ISIS has changed its strategy to stay relevant. ISIS’ adoption of crowdsourcing will inevitably strengthen the reputation of the group for being the dominant terror organisation on the international stage. The crowdsourcing strategy can also be proven effective because its members are no longer restricted geographically, and can execute attacks far beyond the physical radius of ISIS central. After all, ISIS’ targets, choices of weapons and radical milieus are ubiquitous. It is only a matter of time before an attack could happen that consequently will be claimed by ISIS.

    ISIS’ conventional strategy is to promote the use of asymmetrical and guerrilla tactics in conducting terror attacks. Rumiyah not only echoes the same tactics, but also introduces the element of crowdsourcing terror in these tactics. The magazine teaches its supporters how to communicate with the group to claim responsibility after attacks have been conducted, especially if the attack is not ordered directly by the group. An example would be to place a symbol related to the group – like the ISIS flag – at the scene of the attack. In this way, ISIS easily gains and maintains its terror name through its crowd-sourced supporters.

    Nature of ISIS’ Targets

    ISIS has explicitly declared and widely publicised their targets through their propaganda. Analyses of ISIS’ numerous publications (Dabiq, Rumiyah, and An-Naba’) and the group’s patterns in claiming responsibility for terror attacks show that four main points underpin what ISIS is essentially about:

    • Religious intolerance. This manifests in attacks on religious shrines, places of worships, as well as places that are against the ISIS brand of religious values.

    • Sectarian discrimination. ISIS espouses sectarian animosity among the Muslim and other communities. The group aims for a hegemonic presence, triumphing over other religious sects and communities.

    • Anti-West. ISIS often blames the Euro-American power for the decline of Islam’s political position especially since the defeat of the Ottoman empire. This rhetoric is then compounded by its aversion to Western participation in any war in Middle-Eastern countries.

    • “Taghut” (transgressor) governments. ISIS vilifies any government who are against them, and those who do not observe Islamic law according to the ISIS way. ISIS propagates the perspective of being victimised by these governments for obstructing its goal of erecting an Islamic Caliphate.

    These four themes work collectively to imbue its audience with a clear order of ISIS’ targets. It is ominous that these targets are spread out and easily accessible in countries all over the world.

    Implications of Crowdsourcing Terror

    Countering ISIS is becoming more challenging. Its crowdsourcing strategy is blurring the lines between “lone wolves” terror acts and collective violence. The perpetrator is also not strictly bound by instructions from ISIS. Crowdsourcing of radicalism also accelerates the process of turning radicals into terrorists. ISIS members are no longer required to be attached to ISIS wilayats (provinces) or be present in Iraq and Syria.

    Moreover, the association to the group through Bai’ah (pledging of allegiance) can also be done online. These easily manoeuvre around the tight security implementations by governments. They also highlight an emerging phenomenon where any ISIS supporter can conduct attacks anywhere and anytime without direct instructions or communications. Consequently, these will also increase ISIS’ recruitment rate.

    Weaponisation of ISIS radical milieus is also becoming easier following ISIS’ numerous propaganda on self-made weapons – or any lethal weapons for that matter. The group’s current campaign of knife attacks facilitates the mobilisation of its crowd-sourced “terror activists” to strike. With this crowdsourcing strategy, radical milieus are more easily linked to the ISIS identity.

    Going Forward

    With the advent of ISIS crowdsourcing, countering ISIS will be an arduous task. ISIS is in dire need of support and manpower following its significant loss in and outside of Iraq and Syria. Policymakers thus need to discern any hint of changes in the group’s movement and strategy. Especially for the Southeast Asian region, the multi-religious and multi-ethnic societies are central to the ISIS’ framework of offence. Steps to preserve these societies’ social fabric are critical now that ISIS is expanding its radical milieus and tapping within them.

    About the Author

    Syed Huzaifah Bin Othman Alkaff is a Senior Analyst with the International Centre for Political Violence and Terrorism Research (ICPVTR), at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / Terrorism Studies / Middle East and North Africa (MENA) / Global

    Synopsis

    The Islamic State of Iraq and Syria (ISIS) has taken to crowdsourcing local attacks to make up for its losses in the Middle East. This has become a major plank of the group’s strategy to expand its radical reach and inflict global violence.

    Commentary

    ISIS WITH a self-styled caliph has been hierarchical in its internal command within Iraq and Syria, and the management of its wilayats (provinces). The group has a rank-and-file structure that directly oversees its members’ activities. Yet somewhat paradoxically, it crowdsources for lone wolves to partake in violence in its name. Indeed its hierarchical approach and crowdsourcing endeavours are complementary. The weakening of its central command in the face of attacks will see a strengthening of its crowdsourcing strategy.

    Crowdsourcing as a strategy fits well with the group’s current objective. It can rely heavily on ISIS’ transnational support network to obtain its needed service to inflict terror. Moreover, this mode of sourcing allows ISIS to divide the work between numerous participants to achieve an impactful cumulative result. The group can easily exploit its network by crowdsourcing from these radical milieus – those who share their perspective and objectives, who approve of certain forms of violence, and who (at least to a certain extent) support the violent group morally and logistically – to pursue its agenda.

    ISIS’ Framework of Offence

    In an article from the January issue of Rumiyah, the ISIS magazine, the group instructs its audiences the specific details of carrying out an attack. This includes how to leave evidence at the scene to so that ISIS can claim responsibility. Apart from military-grade weapons, ISIS additionally promotes the use of light weapons such as knives in conducting terror acts. This makes weaponisation easy for its crowd-sourced “terror activists”.

    Following the group’s losses in recent months, it is not surprising to see how ISIS has changed its strategy to stay relevant. ISIS’ adoption of crowdsourcing will inevitably strengthen the reputation of the group for being the dominant terror organisation on the international stage. The crowdsourcing strategy can also be proven effective because its members are no longer restricted geographically, and can execute attacks far beyond the physical radius of ISIS central. After all, ISIS’ targets, choices of weapons and radical milieus are ubiquitous. It is only a matter of time before an attack could happen that consequently will be claimed by ISIS.

    ISIS’ conventional strategy is to promote the use of asymmetrical and guerrilla tactics in conducting terror attacks. Rumiyah not only echoes the same tactics, but also introduces the element of crowdsourcing terror in these tactics. The magazine teaches its supporters how to communicate with the group to claim responsibility after attacks have been conducted, especially if the attack is not ordered directly by the group. An example would be to place a symbol related to the group – like the ISIS flag – at the scene of the attack. In this way, ISIS easily gains and maintains its terror name through its crowd-sourced supporters.

    Nature of ISIS’ Targets

    ISIS has explicitly declared and widely publicised their targets through their propaganda. Analyses of ISIS’ numerous publications (Dabiq, Rumiyah, and An-Naba’) and the group’s patterns in claiming responsibility for terror attacks show that four main points underpin what ISIS is essentially about:

    • Religious intolerance. This manifests in attacks on religious shrines, places of worships, as well as places that are against the ISIS brand of religious values.

    • Sectarian discrimination. ISIS espouses sectarian animosity among the Muslim and other communities. The group aims for a hegemonic presence, triumphing over other religious sects and communities.

    • Anti-West. ISIS often blames the Euro-American power for the decline of Islam’s political position especially since the defeat of the Ottoman empire. This rhetoric is then compounded by its aversion to Western participation in any war in Middle-Eastern countries.

    • “Taghut” (transgressor) governments. ISIS vilifies any government who are against them, and those who do not observe Islamic law according to the ISIS way. ISIS propagates the perspective of being victimised by these governments for obstructing its goal of erecting an Islamic Caliphate.

    These four themes work collectively to imbue its audience with a clear order of ISIS’ targets. It is ominous that these targets are spread out and easily accessible in countries all over the world.

    Implications of Crowdsourcing Terror

    Countering ISIS is becoming more challenging. Its crowdsourcing strategy is blurring the lines between “lone wolves” terror acts and collective violence. The perpetrator is also not strictly bound by instructions from ISIS. Crowdsourcing of radicalism also accelerates the process of turning radicals into terrorists. ISIS members are no longer required to be attached to ISIS wilayats (provinces) or be present in Iraq and Syria.

    Moreover, the association to the group through Bai’ah (pledging of allegiance) can also be done online. These easily manoeuvre around the tight security implementations by governments. They also highlight an emerging phenomenon where any ISIS supporter can conduct attacks anywhere and anytime without direct instructions or communications. Consequently, these will also increase ISIS’ recruitment rate.

    Weaponisation of ISIS radical milieus is also becoming easier following ISIS’ numerous propaganda on self-made weapons – or any lethal weapons for that matter. The group’s current campaign of knife attacks facilitates the mobilisation of its crowd-sourced “terror activists” to strike. With this crowdsourcing strategy, radical milieus are more easily linked to the ISIS identity.

    Going Forward

    With the advent of ISIS crowdsourcing, countering ISIS will be an arduous task. ISIS is in dire need of support and manpower following its significant loss in and outside of Iraq and Syria. Policymakers thus need to discern any hint of changes in the group’s movement and strategy. Especially for the Southeast Asian region, the multi-religious and multi-ethnic societies are central to the ISIS’ framework of offence. Steps to preserve these societies’ social fabric are critical now that ISIS is expanding its radical milieus and tapping within them.

    About the Author

    Syed Huzaifah Bin Othman Alkaff is a Senior Analyst with the International Centre for Political Violence and Terrorism Research (ICPVTR), at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

    Categories: RSIS Commentary Series / Country and Region Studies / Terrorism Studies

    Popular Links

    About RSISResearch ProgrammesGraduate EducationPublicationsEventsAdmissionsCareersVideo/Audio ChannelRSIS Intranet

    Connect with Us

    rsis.ntu
    rsis_ntu
    rsisntu
    rsisvideocast
    school/rsis-ntu
    rsis.sg
    rsissg
    RSIS
    RSS
    Subscribe to RSIS Publications
    Subscribe to RSIS Events

    Getting to RSIS

    Nanyang Technological University
    Block S4, Level B3,
    50 Nanyang Avenue,
    Singapore 639798

    Click here for direction to RSIS

    Get in Touch

      Copyright © S. Rajaratnam School of International Studies. All rights reserved.
      Privacy Statement / Terms of Use
      Help us improve

        Rate your experience with this website
        123456
        Not satisfiedVery satisfied
        What did you like?
        0/255 characters
        What can be improved?
        0/255 characters
        Your email
        Please enter a valid email.
        Thank you for your feedback.
        This site uses cookies to offer you a better browsing experience. By continuing, you are agreeing to the use of cookies on your device as described in our privacy policy. Learn more
        OK
        Latest Book
        more info