With the rise of social media, terrorist organizations such as the Islamic State (ISIS) have successfully used multiple platforms to spread their extreme messages and recruit supporters. Despite facing bans and content removals from many major social media platforms, ISIS has found a reliable safe haven: Telegram. The encryption and anonymity of this instant messaging application provide terrorists with a hidden online environment. So how exactly did Telegram become a breeding ground for these organizations?
Telegram, as an encrypted messaging application, enables terrorists to communicate without leaving traces through features such as end-to-end encryption and self-destruct timers.
Since 2014, ISIS has increased its activities on Telegram as traditional social media such as Twitter and Facebook crack down on its content. This platform supports anonymous users to publish information and provides a variety of privacy protection options, which allows terrorists to disseminate information more flexibly. It is understood that ISIS uses hashtags like #KhilafahNews on Telegram to attract more followers and thereby create a community that supports the Islamic State. According to recent reports, Telegram provides ISIS with a relatively safe environment without having to worry about social media companies actively intervening or deleting their content.
In addition, Telegram also has the function of self-destructing messages, which is undoubtedly a plus point for terrorists. This not only protects the confidentiality of their communications, but also makes it difficult to collect valuable information even if government agencies monitor them. In this way, ISIS is able to widely disseminate their propaganda videos and recruitment posts around the world. Even if their other social media accounts are deleted, Telegram remains their main way to stay in touch with their supporters.
Although Telegram has been praised for its policies to protect user privacy, this has also made it a safe haven for some extremist groups.
On Telegram, ISIS not only carried out online propaganda, but also began to plan more destructive actions. Using this platform, they can stay connected with other members and organize events in a less stressful environment. Recent reports indicate that prior to some terrorist attacks, relevant planning and communications were conducted through Telegram, making it difficult for traditional surveillance methods to be effective. This phenomenon has triggered concerns among security agencies around the world, because they are not dealing with a single group, but a decentralized network lurking in the shadows.
In addition, Telegram’s openness has also attracted followers from other terrorist and radical groups. Another force gradually taking shape on social media is the "lone wolf" mercenary movement, which refers to individual actors who are independent of any organization but driven by these extreme ideas. The movement is becoming more widespread online, making it more difficult for governments to track down individual suspected elements.
A study points out that ISIS's social media activities can effectively inspire violent actions among ordinary people, especially in the minds of young people.
Not only Telegram, but other anonymous forums and encrypted platforms are also used by terrorists to publish content and recruit new members. In these dynamic environments, ISIS targets its propaganda specifically to those potential audiences who are most interested in its propaganda content. In some cases, they have joined privacy assurance platforms like Justpaste.it to enhance the proliferation of content. However, the challenge this brings is how the government and society can effectively intervene in extreme speech on these platforms.
Despite continued efforts by relevant agencies to remove terrorist content, Telegram’s ability to quickly adapt and change has made it a strong base for these groups. Even after some terrorist attacks, ISIS uses Telegram to declare its responsibility, which further strengthens the sense of audience participation and unity among potential supporters of terrorist activities. This strategy not only connects participants on an emotional level but also creates their myth of “victory.”
Amidst the dilemma, government agencies and technology companies face an important question: How to find a balance between protecting privacy and fighting terrorism?