The Use of Digital Technologies in Caucasian Jihadist Propaganda: From Websites to Digital Jihadist Jamaats
Keywords:
Caucasus, jihadism, digital ethnography, propaganda, recruitmentAbstract
This article examines the evolving role of digital technologies in the activities of Caucasian jihadist movements from the early 2000s to the present. Drawing on digital ethnography, qualitative content analysis, and secondary sources, the study identifies how jihadist groups in the North and South Caucasus have used online platforms for propaganda, recruitment, mobilization, and operational coordination. The analysis emphasizes both the regional specificity of these networks and their integration into wider transnational jihadist ecosystems. The findings show that the earliest phase of online jihadist activity in the Caucasus relied on static websites that disseminated multilingual propaganda, including sermons, battlefield footage, and ideological manifestos. These resources served to legitimize violence and foster community among sympathizers. With the rise of social media across the post-Soviet space, jihadist actors shifted to interactive environments. After the outbreak of the Syrian civil war, they began constructing Digital Jihadist Jamaats - virtual communities that became arenas of ideological socialization and pathways from passive sympathy to active participation. Recruitment strategies typically involved a two-stage process. Initial exposure occurred on open platforms such as VKontakte, Facebook, or YouTube, followed by redirection into privacy-focused messaging applications like Telegram or Signal. These secure spaces minimized surveillance, enabled trust-building, and supported logistical coordination. Such practices proved effective, contributing to the departure of thousands of fighters from the Caucasus to Syria and Iraq. Online platforms also facilitated instructional propaganda. Jihadist actors circulated manuals on improvised explosives, operational security, and small-scale attacks, often translated into Russian. In parallel, networks engaged in intelligence gathering and surveillance of security forces. Documented cases in Georgia revealed attempts to collect personal data on law-enforcement officers and to plan attacks on symbolic sites. Jihadist groups also adopted financial and technological innovations. Cryptocurrency enabled fundraising, while bots, automated accounts, and pseudo-news portals amplified propaganda. More recently, artificial intelligence and deepfake technologies have been used to enhance the credibility and reach of jihadist messaging. These developments highlight the adaptability of jihadist actors in exploiting emerging technologies. The study situates these findings within a framework that combines digital ethnography, framing theory, and transnationalism. The article’s key contribution is the introduction of the concept of the Digital Jihadist Jamaat. To the best of the author’s knowledge, this represents the first scholarly application of the term. It captures the hybrid nature of jihadist online formations, which function both as arenas of ideological interaction and as mechanisms that bridge digital engagement with offline mobilization. By advancing this concept, the study contributes to the analysis of Caucasian jihadist activism and to broader debates on political Islam and digital extremism.References
Bloom, M., Tiflati, H., & Horgan, J. (2019). Navigating ISIS’s preferred platform: Telegram1. Terrorism and Political Violence, 31(6), 1242-1254.
Boellstorff, T., Nardi, B., Pearce, C., & Taylor, T. L. (2012). Ethnography and virtual worlds: A handbook of method. Princeton University Press.
Brantly, A. F. (2017). Innovation and adaptation in jihadist digital security. U.S. Army Cyber Institute. DOI: 10.1080/00396338.2017.1282678.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77-101. https://doi.org/10.1191/1478088706qp063oa
Buchanan, B., Lohn, A. J., Musser, M., Sedova, K. (2021). Truth, lies, and automation: How language models could change disinformation. Center for Security and Emerging Technology.
Business Insider. (2015, November 20). 15 secure apps ISIS terrorists are using to communicate online. https://www.businessinsider.com/isis-communicate-apps-2015-11
Campana, A., & Ratelle, J.-F. (2014). A political sociology approach to the diffusion of conflict from Chechnya to Dagestan and Ingushetia. Studies in Conflict and Terrorism, Taylor & Francis Journals, vol. 37(2),, 42(1), 115-134.
Campana, A., & Ducol, B. (2015). Voices of the “Caucasus Emirate”: Mapping and analyzing North Caucasus insurgency websites. Terrorism and Political Violence, 27(4), 679-700. https://doi.org/10.1080/09546553.2013.848797
Chernin, V. (2025, April 19). Islamist opposition in the Russian Federation. Begin-Sadat Center for Strategic Studies. https://besacenter.org/islamist-opposition-in-the-russian-federation
Clifford, B., & Powell, H. (2019). Encrypted extremism: Inside the English-speaking Islamic State ecosystem on Telegram (Program on Extremism, GWU).
Clifford, B. (2021). Moderating extremism: The state of online terrorist content removal policy in the United States (Program on Extremism, GWU).
Coffey, L. (2015, May 14). Recruiting Georgia in the fight against ISIL. Al Jazeera. https://www.aljazeera.com/opinions/2015/5/14/recruiting-georgia-in-the-fight-against-isil
Conway, M., & McInerney, L. (2008). Jihadi video and auto-radicalisation: Evidence from an exploratory YouTube study. Intelligence and Security Informatics, pp 108-118. https://doi.org/10.1007/978-3-540-89900-6_13
Conway, M. (2017). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77-98. https://doi.org/10.1080/1057610X.2016.1157408.
Corman, S. R., Trethewey, A., & Goodall, B. (2007). A 21st Century model for communication in the global war of ideas. Consortium for Strategic Communication, Arizona University.
Dion-Schwarz, C., Manheim, D., & Johnston, P. B. (2019). Terrorist use of cryptocurrencies: Technical and organizational barriers and future threats. RAND Corporation https://www.rand.org/pubs/research_reports/RR3026.html
DFWatch. (2015, November 24). ISIS threatens Georgia in new video.https://dfwatch.net/isis-threatens-georgia-in-new-video-39060/
Faist, T. (2000). The volume and dynamics of international migration and transnational social spaces. Oxford University Press.
Farwell, J. P. (2014). The media strategy of ISIS. Survival, 56(6), 49-55. DOI:10.1080/00396338.2014.985436
Fisher, A. (2015). Swarmcast: How jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3-20.
Glick Schiller, N., Basch, L., & Blanc-Szanton, C. (1992). Towards a transnational perspective on migration: Race, class, ethnicity, and nationalism reconsidered. New York Academy of Sciences.
International Crisis Group. (2016). The North Caucasus insurgency and Syria: An exported jihad? ICG Report No. 238. https://www.crisisgroup.org/rpt/europe-central-asia/russia-internal/238-north-caucasus-insurgency-and-syria-exported-jihad
Kimmage, D. (2010). The al-Qaeda media nexus: The virtual network behind the global message. Radio Free Europe/Radio Liberty.
Klausen, J. (2015). Tweeting the jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1-22. https://doi.org/10.1080/1057610X.2014.974948
Kviris Palitra. (2016, September 19). Mogvatsodetfotoebi, sakheli-gvarebi da misamarthebi im khalkhisa vinc arian islamis mtrebi” - ISIS-is akhali mukara Sakartvelos?! (In Georgian) / “Provide us with photos, names, and addresses of those who are enemies of Islam” - ISIS’s new threat to Georgia?!http://www.kvirispalitra.ge/versia/31526-qmogvatsodeth-mtrebis-misamarthebiq.html
Laamal, L. (2025). Faith, resistance, and digital advocacy: NIYSO’s role in Chechen activism. OC Media. https://oc-media.org/faith-resistance-and-digital-advocacy-niysos-role-in-chechen-activism
Meleagrou-Hitchens, A., Alexander, A., &Kaderbhai, N. (2017). The impact of digital communications technology on radicalization and recruitment. International Affairs, 93(5), 1233-1249.
Meydan TV. (2017, March 7). State security officer: More than 900 Azerbaijanis in the ranks of ISIS. Meydan TV. https://www.meydan.tv/en/article/state-security-officer-more-than-900-azerbaijanis-in-the-ranks-of-isis/
Milton, D. (2016). Communication breakdown: Unraveling the Islamic State’s media efforts. Combating Terrorism Center, West Point United States Military Academy. https://ctc.westpoint.edu/wp-content/uploads/2016/10/ISMedia_Online.pdf
Moore, C., & Tumelty, P. (2008). Foreign fighters and the case of Chechnya: A critical assessment. Studies in Conflict & Terrorism, 31(5), 412-433.
Moore, C. (2015). Foreign bodies: Transnational activism, the insurgency in the North Caucasus and “beyond.” Terrorism and Political Violence, 27(3), 395-415. https://doi.org/10.1080/09546553.2015.1032035
Müller, P., Harrendorf, S. & Mischler, A. (2022). Linguistic Radicalisation of Right-Wing and Salafi Jihadist Groups in Social Media: a Corpus-Driven Lexicometric Analysis. Eur J Crim Policy Res 28, 203-244 https://doi.org/10.1007/s10610-022-09509-7
Palitra News. (2018, June 28). Ahmed Chataevis khmovani gzavnili islamur sakhelmts’ipos ert-ert liders, sadats Sakartvelozets aris saubari [Ahmed Chatayev’s voice message to one of the leaders of the Islamic State, which also mentions Georgia] [Video]. https://palitranews.ge/video/ahmed-chataevis-khmovani-gzavnili-islamur-sakhelmtsifos-ert-ert-liders-sadats-sakartvelozets-aris-saubari
Pink, S., Horst, H., Postill, J., Hjorth, L., Lewis, T., & Tacchi, J. (2016). Digital ethnography: Principles and practice. SAGE Publications Ltd.
Program on Extremism (2022). Terrorism, violent extremism, and the war in Ukraine (Briefing). https://extremism.gwu.edu/terrorism-violent-extremism-and-the-war-in-ukraine.
Ratelle, J. (2016). North Caucasian foreign fighters in Syria and Iraq: assessing the threat of returnees to the Russian Federation. Caucasus Survey, 4(3), 218-238. https://doi.org/10.1080/23761199.2016.1234096
Ratelle, J.-F. (2017). The North Caucasus insurgency: A potential spillover into the Russian Federation? Caucasus Analytical Digest, 93, 2-5.
Schmid, A. P., & Tinnes, J. (2015). Foreign (terrorist) fighters with IS: A European perspective. The Hague: International Centre for Counter-Terrorism (ICCT). DOI:10.19165/2015.1.08. ISSN:2468-0656.
Security Affairs. (2015, November 20). The ISIS guide: How to stay secure online. Security Affairs. https://securityaffairs.com/42115/hacking/opsec-isis-guide.html.
Snow, D. A., & Benford, R. D. (1988). Ideology, frame resonance, and participant mobilization. International Social Movement Research, 1, 197-217.
Souleimanov, E. A., &Laryš, M. (2024). Driven by revenge: Why Chechen foreign fighters have joined Ukraine against Russia. Nationalities Papers, 53(5), 1060-1076. https://doi.org/10.1017/nps.2024.85
Speckhard, A., & Ellenberg, M. D. (2020). ISIS in their own words: Recruitment history, motivations for joining, travel, experiences in ISIS, and disillusionment over time - Analysis of 220 in-depth interviews of ISIS returnees, defectors and prisoners. Journal of Strategic Security, 13(1), 82-127. https://doi.org/10.5038/1944-0472.13.1.1791
Tarrow, S. (2011). Power in movement: Social movements and contentious politics (3rd ed.). Cambridge University Press.
TV Imedi. (2020, January 28). Beri Gabriel Salosis kuchaze chatarebuli spetsoperatsiis kadrebis k’ronologia arenashi [Chronology of footage from the special operation on Bery Gabriel Salosi Street in Arena] [Video]. YouTube. https://youtu.be/wvPLdnvagFo?si=AEpotW-UqyTJ1YNc
Weimann, G. (2015). Terrorism in cyberspace: The next generation. Woodrow Wilson Center Press.
Winter, C. (2015). Documenting the virtual caliphate. Quilliam.
Zetter, K. (2015, November 19). Security manual reveals the OPSEC advice ISIS gives recruits. Wired. https://www.wired.com/2015/11/isis-opsec-encryption-manuals-reveal-terrorist-group-security-protocols/