Skip to main content

Friday, 31 January 2025 | 04:45 am

|   Subscribe   |   donation   Support Us    |   donation

Log in
Register


"जिहाद": ISIS’s Voice of Khurasan digital manual trains jihadists in cyber warfare, encryption & anonymous recruiting; Bengaluru’s Mehdi Masroor Biswas, radicalized 17,700 followers before his 2014 arrest, but his 2024 release raises fresh terror concerns

The Light of Darkness series reveals how ISIS trains digital jihadists, using encryption, VPNs, and secure messaging to evade intelligence agencies and continue online operations.
 |  Satyaagrah  |  Opinion
Inside ISIS’s Digital Playbook: How the Terror Organisation Has Been Giving Step-by-Step Guidance for a New Breed of Islamic Jihadis Online
Inside ISIS’s Digital Playbook: How the Terror Organisation Has Been Giving Step-by-Step Guidance for a New Breed of Islamic Jihadis Online

The Islamic State (ISIS) has expanded its battlefield beyond physical territories, venturing into the vast expanse of the internet to recruit and train a new generation of 'online jihadis.' Central to this strategy is their propaganda magazine, Voice of Khurasan, which plays a crucial role in realizing ISIS's ambition of enlisting jihadis worldwide through social media and other online platforms.

In Issue 27, the magazine introduced a series titled "Light of Darkness," serving as a comprehensive guide for radicalization, digital security, and clandestine operations in cyberspace. To date, five parts of this series have been published, instructing ISIS supporters on maintaining anonymity online, evading intelligence agencies, utilizing encrypted platforms, and recruiting new members without detection.

These chapters underscore the significance of "cyber jihad" and digital warfare, illustrating how an 'untraceable' network of online jihadis can perpetuate ISIS operations globally. This section of the magazine transcends mere ideological preaching, aiming to equip recruits with practical skills such as concealing digital footprints and communicating securely to disseminate ISIS propaganda and facilitate terror funding.

The series establishes the groundwork for a self-sustaining, decentralized terrorist network, a development that poses significant challenges and must be addressed by security agencies to prevent online jihadis from operating covertly on the internet.

As the use of social media, messaging apps, and darknet platforms proliferates, ISIS is evolving. The terror outfit is transitioning from traditional armed insurgency to a sophisticated online battleground. A decade ago, online warfare was primarily the domain of rival nations. However, with terror outfits like ISIS engaging in online warfare, the approach to combating terrorism must adapt swiftly.

The "Light of Darkness" series is a chilling revelation of how terrorism is adapting to the modern age, transforming digital spaces into recruitment hubs and training camps. Each of the five chapters published thus far delves into different facets of ISIS's digital strategy, encompassing radicalization, encryption, and recruitment.

This strategic shift by ISIS underscores the pressing need for comprehensive countermeasures that address both the physical and digital realms of terrorist activity. Security agencies worldwide must enhance their capabilities to monitor and disrupt these online networks, ensuring that the internet does not become a safe haven for those who seek to spread terror.

The Origins – Justifying Online Jihad and Cybersecurity Concerns

In the 27th issue of Voice of Khurasan, ISIS introduced the "Light of Darkness" series, marking a pivotal shift in their approach to jihad. This inaugural installment emphasized the significance of digital jihad and provided guidance on how ISIS supporters can safely navigate the cyber realm. Unlike traditional recruitment or ideological articles, this piece rationalized the use of the internet for jihadist activities while addressing digital safety concerns.

The author acknowledged a divide within jihadist circles regarding internet usage. One faction was entirely opposed, viewing the internet as a perilous space where operatives could be easily tracked. Conversely, others perceived it as an essential battlefield, crucial for disseminating ISIS propaganda and coordinating operations. The author contended that, while security concerns are valid, completely avoiding the internet is not the solution, especially when engaging with ISIS sympathizers in the modern world. The message was clear: learn how to use the internet safely and turn it into a tool for ISIS’s “cause.”

This initial chapter served two primary purposes. First, it justified why ISIS and its supporters should not shy away from engaging in online operations, explaining how the digital space can be used as a battlefield where ideology can spread faster than through traditional methods. Second, it laid down the foundational need for cybersecurity, introducing the concept of protecting one’s digital footprint. Notably, the emphasis on cybersecurity was not about protecting personal privacy in the conventional sense. Rather, it was about hiding jihadist activities from government surveillance.

The author referred to government agencies tracking jihadi activities online as Tawagheet (tyrannical rulers, referring to Western and allied governments). This terminology reinforced a paranoid yet strategic mindset, emphasizing that government agencies are constantly monitoring every aspect of the internet. Therefore, hiding behind firewalls, fake accounts, and encryption was presented as a necessity for survival.

The chapter also encouraged ISIS sympathizers to self-educate about digital literacy. It was suggested that every jihadist should study cybersecurity, learn about cyber threats, and understand how to protect their online identity. This was not just about avoiding arrests; it was about creating a sustainable online presence that could spread propaganda and coordinate activities without being easily detected.

This strategic shift underscores ISIS's recognition of the internet's power and their intent to exploit it fully. By rationalizing online jihad and emphasizing cybersecurity, they aim to create a resilient network of digital warriors capable of advancing their malicious objectives while evading detection.

The Dangers of Digital Footprints and Online Surveillance

In the 34th issue of Voice of Khurasan, ISIS continued its "Light of Darkness" series, focusing on the critical issue of digital footprints and the pervasive nature of online surveillance. Building upon the initial discussion that justified an online presence for jihadists, this installment provided detailed guidelines aimed at helping ISIS supporters avoid detection by intelligence agencies, corporations, and other monitoring entities.

The author emphasized that every action taken on the internet leaves a traceable mark, which can later be used against the individual responsible. Activities such as posting on social media, utilizing search engines, or even clicking on specific links contribute to an accumulation of digital footprints. These digital traces have the potential to expose an individual's identity, location, and activities, thereby increasing the risk of detection.

The article specifically highlighted the threat of government surveillance, asserting that intelligence agencies worldwide actively monitor social media platforms, communication channels, and online transactions. The intent was to caution ISIS sympathizers that their online behavior could lead to their apprehension. It warned that many online services, including free educational courses and religious forums, require users to register with personal information. This data could be exploited by authorities to construct digital profiles of potential jihadists.

To mitigate these risks, the guide recommended several privacy-enhancing strategies. It advised jihadists to minimize the sharing of personal data, avoid using real identities, and refrain from posting content that could disclose their locations or activities. The use of encrypted communication channels and anonymizing tools, such as Virtual Private Networks (VPNs) and Tor, was suggested to obscure online movements.

The article drew a historical parallel, suggesting that just as early Muslims had to conceal their movements to survive, today's digital warriors must adopt similar tactics to evade tracking and arrest. The author concluded with a call for continuous vigilance, urging supporters to educate themselves on evolving cybersecurity risks to ensure their survival in the digital space.

This installment underscores ISIS's recognition of the internet's double-edged sword—while it serves as a powerful tool for propaganda and recruitment, it also poses significant risks of exposure. By emphasizing the importance of digital hygiene and operational security, ISIS aims to cultivate a cadre of cyber-savvy operatives capable of advancing their agenda while evading detection.

This development highlights the need for comprehensive countermeasures that address both the physical and digital realms of terrorist activity. Security agencies worldwide must enhance their capabilities to monitor and disrupt these online networks, ensuring that the internet does not become a safe haven for those who seek to spread terror.

Social Media as a Battlefield – Control, Surveillance, and Counterstrategies

In the 36th issue of Voice of Khurasan, ISIS continued its "Light of Darkness" series, focusing on the pivotal role of social media in jihadist operations. The author cautioned readers that social media platforms serve as both tools and traps, offering avenues to disseminate messages while simultaneously exposing users to surveillance and censorship. This installment delved into how Western governments and technology companies monitor and restrict ISIS content, and it outlined strategies to evade detection and sustain digital activities.

The author contended that platforms like Facebook and Twitter were designed as instruments of surveillance, referencing the Cambridge Analytica scandal, where a simple quiz was used to collect user data. The article asserted that social media companies gather data on their users, flag suspicious accounts, and collaborate with intelligence agencies to track online jihadist activities. It portrayed account suspensions, bans, and reduced content reach as deliberate acts of oppression against the Islamic cause.

A key security recommendation in this chapter was to minimize personal exposure on social media. The article advised jihadists never to share real names, locations, or identifiable information online. It warned that even casual posts, photos, or interactions could reveal crucial details. The article primarily focused on avoiding data leaks across different platforms, as such leaks could potentially help intelligence agencies trace jihadist activities.

This installment underscores ISIS's recognition of the dual-edged nature of social media—it serves as a powerful tool for propaganda dissemination and recruitment, yet it also poses significant risks of exposure and counteraction. By highlighting the surveillance capabilities of Western entities and advising on countermeasures, ISIS aims to equip its supporters with the knowledge to navigate the digital landscape effectively while evading detection.

Advanced Online Security – Protecting Jihadist Communications

In the 39th issue of Voice of Khurasan, ISIS continued its "Light of Darkness" series, shifting focus to strengthening digital security and maintaining anonymous communications. This installment provided detailed guidance on encryption, secure browsing, and privacy-enhancing tools, aiming to ensure that jihadists could operate online without exposing themselves to intelligence agencies. It also discussed how Western governments and tech companies monitor and restrict ISIS content, while outlining strategies to evade detection and continue digital operations.

A significant emphasis was placed on privacy settings and social media account management. The author urged jihadists to regularly update their privacy settings, reviewing what information was publicly available on their profiles. The use of disposable email addresses and anonymous accounts was encouraged, with warnings against linking any jihad-related activity to personal identities. The article also highlighted the importance of reading app permissions carefully, cautioning that many applications request unnecessary access to contacts, location, and personal data, which could be exploited by intelligence agencies.

The article introduced privacy-focused browsers and search engines, recommending the use of Tor and VPNs to mask online activity. It explained how Tor routes internet traffic through multiple layers of encryption, making it harder to trace the user’s actual location. Combining Tor with VPNs was suggested for an added layer of security.

A critical aspect of this chapter was password management and multi-factor authentication. It advised using unique, complex passwords for each account and warned against reusing credentials. Password managers were recommended to securely store login information, ensuring that passwords were not written down or saved in unencrypted files. Additionally, it stressed the importance of enabling two-factor authentication (2FA) wherever possible to prevent unauthorized access to accounts.

The author also covered secure messaging practices, highlighting the importance of encrypted apps like Telegram and Signal. It was explained how these platforms provide end-to-end encryption, preventing third parties from intercepting communications. However, the author warned that simply using encrypted messaging apps was not enough—users needed to take extra precautions, such as enabling disappearing messages, avoiding group chats with unknown individuals, and frequently clearing chat histories.

This installment underscores ISIS's recognition of the critical importance of advanced digital security measures in their operations. By providing detailed instructions on encryption, secure browsing, and privacy tools, ISIS aims to equip its supporters with the knowledge to navigate the digital landscape effectively while evading detection.

Telegram and the Illusion of Privacy

In the 43rd issue of Voice of Khurasan, ISIS continued its Light of Darkness series, focusing on messaging applications, particularly Telegram. The platform has become a widely used tool for jihadist communication, offering features like encrypted messaging and anonymous channels. However, the article raised an important question—can Telegram truly be trusted by jihadists, or is it another tool being monitored by intelligence agencies?

The article acknowledged Telegram’s reputation for strong privacy features, including end-to-end encryption, secret chats, and its historical reluctance to cooperate with Western intelligence agencies. These features have made Telegram a preferred choice for jihadist communication, enabling the creation of private groups, anonymous channels, and self-destructing messages that minimize traceability. However, the author also warned against blind trust in the app, highlighting recent changes in Telegram’s policies that suggest increased cooperation with authorities.

One of the major concerns raised was Telegram’s admission that it might share user information with law enforcement if presented with a government order. The article pointed out that while Telegram had previously resisted takedown requests, there have been instances where it complied with authorities in terrorism-related cases. This shift indicated a potential risk for pro-ISIS channels, signaling that Telegram could become another battleground where intelligence agencies crack down on jihadist content.

To counteract this risk, the article provided detailed operational guidelines on how jihadists should use Telegram while minimizing their chances of exposure. It recommended always opting for secret chats instead of regular conversations, as secret chats offer better encryption and prevent messages from being stored on Telegram’s servers. Additionally, it advised users to hide their phone numbers and only register accounts using disposable SIM cards, ensuring that personal information could not be traced back to them.

The article also emphasized the importance of two-step verification (2FA) to prevent account hijacking and advised against joining public groups where intelligence operatives could potentially infiltrate discussions. Another key security measure was the use of VPNs when accessing Telegram to mask IP addresses and further complicate tracking efforts.

Despite these recommendations, the article acknowledged that no platform is truly foolproof. The evolving nature of digital surveillance means that jihadists must remain adaptable, continuously updating their methods to avoid detection. The author warned readers that while Telegram may seem like a safe space for now, relying on a single platform is dangerous. Jihadists were encouraged to diversify their communication methods and always assume that their activities were being monitored.

The Light of Darkness series continues to expose the calculated approach ISIS takes to maintaining its digital operations. Each chapter reflects a deeper understanding of modern cybersecurity threats and the countermeasures that law enforcement agencies employ. While ISIS attempts to adapt, it remains clear that intelligence agencies are working tirelessly to dismantle these networks, making it increasingly difficult for jihadist groups to operate undetected.

The Case of Mehdi Masroor Biswas

A striking example of an online jihadist operating in India was Mehdi Masroor Biswas, who played a crucial role in spreading ISIS propaganda and recruiting jihadists through social media. Between 2012 and 2014, Mehdi, under the Twitter handle "@ShamiWitness", became one of ISIS’s most influential digital operatives in India. Unlike traditional jihadists, Mehdi never engaged in direct combat but instead leveraged social media as a tool for radicalisation, recruitment, and operational support for ISIS.

Mehdi Masroor Biswas was an engineer in Bengaluru who led a double life as a jihadist propagandist. Through his social media activity, he translated and disseminated ISIS’s battlefield updates, glorified terrorist attacks, and encouraged Islamists from Western countries to join the terror group. He facilitated communication between jihadist recruits and ISIS networks, effectively making Twitter a recruitment hub for aspiring terrorists. His content was not only radical but also inciteful, targeting non-Muslims, particularly Hindus, with hate-filled propaganda.

By the time of his arrest in December 2014, Mehdi had amassed 17,700 followers, including active jihadists fighting in Syria and Iraq. His digital influence was so significant that his Twitter account was regarded as one of the key English-language sources for ISIS propaganda. His conviction was seen as a major breakthrough in counterterrorism efforts, but as he was released in December 2024, it raised concerns about the potential resurgence of his online jihadist activities.

The Light of Darkness Series: A Blueprint for Online Jihad

The Light of Darkness series revealed a sophisticated blueprint for online jihad, instructing ISIS supporters on how to engage in digital operations while avoiding detection. It is not merely an ideological manifesto but a technical training manual, equipping jihadists with the skills to communicate securely, operate anonymously, and evade intelligence agencies.

This series underscores the evolving nature of terrorist strategies, highlighting the increasing importance of cybersecurity and digital literacy among jihadist networks. By disseminating such detailed operational guidance, ISIS aims to create a decentralized and resilient online presence, complicating efforts by authorities to monitor and dismantle their activities.

The case of Mehdi Masroor Biswas exemplifies the real-world application of these digital strategies. His ability to influence and recruit individuals remotely underscores the potency of online propaganda and the critical need for robust countermeasures.

As ISIS continues to adapt to the digital landscape, it is imperative for global security agencies to enhance their cyber capabilities. This includes monitoring online platforms, developing counter-narratives, and collaborating with technology companies to identify and remove extremist content.

In conclusion, the fusion of technology and terrorism presents a complex challenge that requires a multifaceted response. By understanding and countering the digital strategies employed by groups like ISIS, the international community can work towards mitigating the threat posed by online radicalization and recruitment.

vok29JanB

Support Us


Satyagraha was born from the heart of our land, with an undying aim to unveil the true essence of Bharat. It seeks to illuminate the hidden tales of our valiant freedom fighters and the rich chronicles that haven't yet sung their complete melody in the mainstream.

While platforms like NDTV and 'The Wire' effortlessly garner funds under the banner of safeguarding democracy, we at Satyagraha walk a different path. Our strength and resonance come from you. In this journey to weave a stronger Bharat, every little contribution amplifies our voice. Let's come together, contribute as you can, and champion the true spirit of our nation.

Satyaagrah Razorpay PayPal
 ICICI Bank of SatyaagrahRazorpay Bank of SatyaagrahPayPal Bank of Satyaagrah - For International Payments

If all above doesn't work, then try the LINK below:

Pay Satyaagrah

Please share the article on other platforms

To Top

DISCLAIMER: The author is solely responsible for the views expressed in this article. The author carries the responsibility for citing and/or licensing of images utilized within the text. The website also frequently uses non-commercial images for representational purposes only in line with the article. We are not responsible for the authenticity of such images. If some images have a copyright issue, we request the person/entity to contact us at This email address is being protected from spambots. You need JavaScript enabled to view it. and we will take the necessary actions to resolve the issue.


Related Articles

Related Articles




JOIN SATYAAGRAH SOCIAL MEDIA