Al-Qaeda vs. the Islamic State: Evolving Media Strategies of Terrorist Organizations

By James Calderon – Rise to Peace Contributor

Abstract: This paper analyzes the evolution of jihadist media strategies through a comparative analysis of al-Qaeda and the Islamic State of Iraq and Syria (ISIS). While al-Qaeda relied on centralized, ideologically driven messaging, ISIS transformed extremist communication by exploiting social media, high-quality visuals, and decentralized online networks. These shifts reflect how terrorist organizations adapt to technological change and generational trends. The study also examines the emerging role of artificial intelligence (AI) as both a tool and a threat by enabling extremist groups to produce propaganda and disinformation while also providing counterterrorism agencies new capabilities for detection and prevention. The paper concludes that terrorism’s future battles will be fought increasingly in digital spaces, requiring adaptive and tech-driven counterstrategies.

James Calderon is a graduate student at Columbia University, where he is pursuing a Master of International Affairs with a concentration in international security and diplomacy. His work explores authoritarianism, terrorism, and security dynamics in the Middle East. Professionally, he brings extensive experience in research and writing, having held diverse internships and roles in the U.S. Department of State, the Department of Veterans Affairs, the House of Representatives, and several research institutions. He earned his Bachelor of Arts in Political Science and Global Studies, with a minor in Public Relations, from Marist University, where his undergraduate thesis analyzed radicalization in French and Italian Muslim communities.

I. Historical Context and Introduction  

In 1998, Osama Bin Laden established al-Qaeda out of a network of veterans from the American-backed Afghan insurgency against the Soviet Union.[1] At this time, the main objective of al-Qaeda was to support Islamist causes in conflicts throughout the world. Following the 1991 Gulf War, due to the Saudi decision to host American troops, the United States was made al-Qaeda’s number one target.[2] Shortly later, Osama Bin Laden would leave his native Saudi Arabia to Sudan and then to Afghanistan where Taliban leadership offered refuge. Prior to September 11, al-Qaeda carried out the 1998 bombings of U.S. embassies in Kenya and Tanzania, and the 2000 attack on the USS Cole. In 1999, the American government designated al-Qaeda as a foreign terrorist organization.3

In response to the 2003 American invasion of Iraq, Jordanian national Abu Musab al-Zarqawi founded Tawhid wal Jihad (which translates to “Monotheism and Holy War”).[3] Zarqawi later pledged allegiance to al-Qaeda and renamed his organization to al-Qaeda in Iraq.[4] Zarqawi wished to establish a civil war between Sunni Muslims and Shia Muslims, and ultimately establish a caliphate.[5] Al-Qaeda is Sunni however considers Shia Muslims to be “associates”. In contrast, Zarqawi was much more extreme in his views and called for the killing of Shias. In fact, al-Qaeda considered Zarqawi to be too radical and as such, their relations would be strained. 

In 2006, Zarqawi was killed in a U.S. airstrike. Abu Ayyub al-Masri would take over and rename the organization the Islamic State of Iraq. Seven years later, in 2013, Abu Bakr al-Baghdadi expanded operations into Syria and the organization adopted its current name of the Islamic State of Iraq and Syria, ISIS.[6] 

Jihadist groups have long used media as a tool of asymmetric warfare in order to project power, spread ideology, and influence global audiences without conventional military strength. For groups like Al-Qaeda and ISIS, media plays a key role in recruitment, legitimizing actions, deterring enemies, and controlling the narrative. While both organizations share ideological roots, their media strategies differ sharply. These differences reveal contrasting goals, structures, and generational outlooks. ISIS’s media model, in particular, marks a major shift where digital propaganda is turned into a core weapon.       

II. Al-Qaeda’s Media Strategy

Ayman al-Zawahari, Osama Bin Laden’s successor, once stated that, “We [al-Qaeda] are in a battle, and more than half of this battle is taking place in the battlefield of the media. And that we are in a media battle in a race for the hearts and minds of our people”.[7]  However, Al-Qaeda’s media strategy was not existent at the time of the organization’s creation. Once such a strategy became implemented, the focus was on long form and ideologically dense messaging. In the first phase (1988-2000) of al-Qaeda’s media strategy, the organization was not overtly active in distributing literature. Instead, the majority of efforts were centered around the personality-cult of Osama Bin Laden and little was done in order to reach out to new members.[8] As such, predominantly those who already sympathized with the organization’s cause viewed their material. It was not until Bin Laden realized the value in international television interviews that he was able to further promote himself and the organization’s ideals.

In the second phase (September 11, 2001 to mid 2000s), al-Qaeda was able to capitalize on media exposure from the September 11 attacks and international search for Bin Laden to promote their cause. Moreover, the group gained popularity and search topics on the internet increased. This could be indicative of radicalization as Inspire, an al-Qaeda affiliated magazine, gained traction online as well.[9] This period was also marked by growing decentralization where propaganda began to feature senior members from all over the world in order to maintain high interest and international al-Qaeda cells as well as individual militants were highlighted.  Finally, in the third phase (late 2000s to present), the organization has begun to rely more exclusively on the internet and social media in order to distribute propaganda with the intention to mobilize Western Muslims against their governments.[10] Due to a greater amount of media being released by all jihadist groups, al-Qaeda began to receive less media attention. In order to counteract this trend, the organization has relied on tech savvy young adults to disperse propaganda. This has resulted in al-Qaeda affiliated media to become more influential in the eyes of a youth.[11]

Yet despite efforts to modernize, al-Qaeda’s communication strategy remained rooted in ideological depth rather than visual immediacy. Its top-down structure and reliance on traditional formats limited its ability to compete in an increasingly intense digital environment. It was in this evolving media landscape that ISIS emerged, an organization that would not only inherit al-Qaeda’s ideological framework but also revolutionize how terrorism communicates and recruits through the power of social media and cinematic production.

III. The Islamic State of Iraq and Syria’s Media Strategy

Building upon, but ultimately surpassing, al-Qaeda’s early propaganda model, ISIS developed a media machine unlike any previous terrorist organization. For instance, the organization operates two divisions that are dedicated to propaganda: Al Hayat Media, focused on recruiting and painting an idyllic future, and Mu’assassat al-Furqan which focuses on spreading fear.[12] ISIS places special emphasis on its propaganda workers which is reflected in their monthly income being higher than those of a traditional soldier.[13]

Additionally, several Westerners rank towards the top of ISIS’s propaganda machine. Investigations indicate that an American and a German have played key roles in Al-Hayat Media.15 With this foreign talent, ISIS has much more media capability than al-Qaeda as they distribute high-quality and length propaganda movies. 

There are three major areas of innovation regarding ISIS’s media strategy: global dissemination of threat, decentralized messaging, and the development of new software.[14]  Social media allows sympathizers to disseminate their propaganda much more efficiently. At al-Qaeda’s peak, their videos could only air through Al-Jazeera or very specific websites. Today, ISIS sympathizers utilize social media where, for example, they can take over threads on unrelated topics. A strong case study can be seen in the 2014 World Cup where ISIS users tagged their tweets with “#brazil_2014” which gave them access to a network of users that were only browsing for soccer updates. 

With their decentralized structure and many sympathizers living in the West, there are as many as 3,000 users that can produce nearly 100,000 tweets each day.17 Due to this volume, it is incredibly difficult for governments to keep up. This approach differs from terror groups of the past who needed to rely on rigid structures to distribute propaganda. In contrast, due to technological advancement, ISIS is able to create a flexible system that is consistently being updated. 

Regarding software, ISIS developed an app called “Dawn of Glad Tidings” which allows users to post tweets without any manual input. Propaganda officials design the tweets and the app coordinates them based on a timing mechanism in order to avoid detection by algorithms.[15] Experts state that this app was responsible for up to almost 40,000 tweets in one day as ISIS fought in Mosul.[16] With the creation of this app, ISIS continued to produce content online even while sympathizers were away from their phones.

IV. Comparative Analysis

The evolution from al-Qaeda’s media strategy to that of the Islamic State marks a significant transformation in jihadist communication. Both organizations recognize media as an indispensable weapon of war, yet they deploy it in fundamentally different ways. As stated before, al-Qaeda’s media operations emerged in an earlier era defined by limited access to mass communication, where propaganda was largely ideologically dense and leader-centric.

Al-Qaeda’s strategy centered on persuasion through authority. Its messaging relied on theological legitimacy, charismatic leadership, and appeals to collective grievance. 

ISIS, by contrast, was born into a fully globalized, networked environment and therefore treated media not as a supporting instrument but as its own battlefield. Prioritizing accessibility and emotional immediacy over ideological depth, ISIS used high-definition video, social media platforms, and interactive apps in order to invite participation and immersion. This allows sympathizers to become both consumers and ultimately producers of propaganda.

The generational divide between the two organizations is equally significant. Al-Qaeda’s content reflected a 20th-century communication style through lengthy lectures, manifestos, and statements designed for an audience of already committed followers. ISIS, however, tailored its messaging to a younger, tech savvy demographic already accustomed to visual media and instant engagement. The result was a form of propaganda that resembled entertainment as much as extremist ideology. This shift in communication and media indicates a turning point in jihadist media strategy, demonstrating how applying technological advancement to propaganda can turn a message into a broader movement.

V. From Digital Propaganda to Artificial Intelligence

As illustrated, al-Qaeda and ISIS’s media strategy differ as ISIS was able to capitalize on the technological advancement of the time. ISIS’s success online exposes serious challenges in countering extremist propaganda. Decentralized content moves much faster than traditional information operations can keep up, making disruption difficult. The group’s digital strategy shows how insurgents can dominate the narrative without necessarily holding any physical territory. This adaptability underscores how effectively extremist groups leverage emerging technologies to advance their agendas. 

As the digital landscape continues to evolve, artificial intelligence (AI) has emerged as the next frontier, with terrorist organizations increasingly seeking to exploit its growing capabilities for propaganda, recruitment, and influence operations. As generative AI has been making tremendous progress, terrorist organizations are increasingly interested in exploiting and using it to their advantage.

Specifically, generative AI uses machine learning in order to generate new content, text, images, audio, and multifunctional simulations.[17] The difference between generative AI and other forms of AI is that the former is able to develop new outputs instead of just predicting and categorizing.[18] Examples of generative AI can be seen in ChatGPT, Google Gemini, Bing Image Creator, Microsoft VALL-E, and various other programs.

The use of artificial intelligence in radicalization and extremism is already taking place as groups such as al-Qaeda, Hamas, Hezbollah, and ISIS are already employing these tools. In the United Kingdom, a nineteen year old was arrested as he plotted to assassinate Queen Elizabeth II. Investigations later found that he exchanged approximately 5,000 messages with an AI chatbot during his radicalization.[19] 

In an article published by the Combating Terrorism Center at West Point, potential uses of AI by terrorist organizations include propaganda, interactive recruitment, automated attacks, social media exploitation, and cyber attacks.[20] Furthermore, the use of such tools by terrorist organizations fall into five categories:

  1. Polarizing or emotional content
  2. Disinformation or misinformation 
  3. Recruitment 
  4. Tactical learning 
  5. Attack planning.24

Real world examples can be seen through ISIS and Hamas. Firstly, ISIS has applied generative AI to translating propaganda messaging into languages such as Arabic, English, and Indonesian.[21]

Regarding Hamas, the terrorist organization has used generative AI in order to leak altered images with hopes of instigating more violence and spreading misinformation about what is happening in Gaza. Reports indicate that Hamas has manipulated already tragic images of injured young people and babies in order to create more chaos and disturbing content.[22]

Additionally, generative AI has been used in order to spread images and videos of Israeli soldiers wearing diapers with the aim of undermining the Israel Defense Forces, IDF, and spreading misinformation.[23]

However, artificial intelligence also provides new interesting methods in counterterrorism. Firstly, it could be used to counter propaganda and in deradicalization. AI tools could automatically detect and remove extremist content from social platforms thus curbing the spread of terrorist propaganda. AI could also support deradicalization programs by identifying at-risk individuals and analyzing their online behavior. 

Furthermore, through predictive analytics- analyzing patterns in historical data, social media presences, and other intelligence sources- AI may possess the capability to predict potential terrorist attacks.[24] 

VI.  The Reconfiguration of Counterterrorism in Digital Spaces

In today’s world, as extremist propaganda has migrated onto digital platforms, the responsibility for counterterrorism has increasingly become shared between governments and private enterprises. This shift has elevated technology companies into necessary security actors, while states are compelled to adapt to a fragmented and contested digital environment.

Platforms such as Meta, Google, and X (formerly Twitter) now function as intermediaries in contemporary counterterrorism and counterradicalization efforts. By hosting, amplifying, or suppressing content, they shape the informational conditions under which radicalization and mobilization occur. Content moderation on these platforms relies primarily on automated governance tools, including hashtag technologies, image recognition, and natural language processing models designed to detect extremist material.[25] Compared to earlier approaches, these systems are significantly more proactive and have reduced large-scale dissemination. However, in doing so, platforms have increasingly assumed the role of de facto security providers, concentrating substantial counterterrorism responsibility within non-governmental entities.             

Governments, in turn, have responded by integrating digital tools into their counterterrorism practices. Open-source intelligence (OSINT) methods, such as social media analysis, now complement more traditional intelligence practices, enabling extremist networks and potential radicalization to be monitored more accurately and in real time. At the same time, states have expanded strategic communication efforts aimed at challenging extremist narratives.

Strategically, counter-messaging encompasses a spectrum of approaches, ranging from disruption-oriented efforts that seek to delegitimize extremist claims to persuasion-oriented initiatives that promote alternative identities and social pathways. The latter frequently relies on non-state messengers, such as former extremists or community leaders, to enhance credibility and reach.

Despite these efforts, counter-narratives face significant structural constraints. Extremist propaganda often gains traction through emotional intensity, while state-produced messaging frequently lacks credibility in contexts marked by institutional distrust. As a result, counter-messaging remains disadvantaged within digital attention economies where emotional affect is often valued more highly than factual accuracy.

Taken together, these dynamics suggest that it is unrealistic for digital counterterrorism to eliminate extremist content entirely. Instead, its primary function is to contest the visibility, legitimacy, and narrative power of such content. Authority in the digital space is fragmented among social media platforms, states, and non-state actors, resulting in the emergence of a decentralized model of security governance.

VII. Conclusion

The progression from al-Qaeda’s traditional propaganda to ISIS’s digital media empire highlights how extremist groups rapidly adapt to technological change. While al-Qaeda relied on centralized, ideologically dense messaging, ISIS transformed media into a decentralized, participatory battlefield that redefined online radicalization.

As artificial intelligence becomes the newest technological frontier, terrorist organizations are already beginning to exploit its capabilities for propaganda, recruitment, and disinformation. Yet, AI also offers valuable tools for counterterrorism such as enabling faster detection, deradicalization efforts, and predictive analysis.

The evolution from al-Qaeda to ISIS to AI-driven extremism underscores that future conflicts will be fought not only on physical ground but also across digital and algorithmic spaces. Counterterrorism strategies must evolve accordingly to meet the speed and complexity of this new information war.

Bibliography

Earnhardt, Rebecca L. “Al-Qaeda’s Media Strategy: Internet Self- Radicalization and

Counter-Radicalization Policies.” Virginia Commonwealth University, 2014.

https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1001&context=wilder_pubs

.

Gerstel, Dylan. “Isis and Innovative Propaganda.” Swarthmore College. Accessed July 17, 2025.

https://works.swarthmore.edu/cgi/viewcontent.cgi?article=1004&context=swarthmoreirjo urnal.

Gongane, Vaishali U, Mousami  V Munot, and Alwin  D Anuse. “Detection and Moderation of Detrimental Content on Social Media Platforms: Current Status and Future Directions.” Soc Netw Anal Min, 2022. 

Hassan, Hassan. “The True Origins of Isis.” The Atlantic, January 7, 2019.

https://www.theatlantic.com/ideas/archive/2018/11/isis-origins-anbari-zarqawi/577030/.

Jetter, Michael. “The Inadvertent Consequences of Al-Qaeda News Coverage.” European

Economic Review, August 16, 2019. https://www.sciencedirect.com/science/article/abs/pii/S0014292119301448.

Mathur, Priyank, Clara Broekaert, and Colin P. Clarke. “The Radicalization (and Counter-Radicalization) Potential of Artificial Intelligence.” ICCT, May 1, 2024.

https://icct.nl/publication/radicalization-and-counter-radicalization-potential-artificial-inte lligence. 

Nelu, Clarisa. “Exploitation of Generative AI by Terrorist Groups.” ICCT, June 10, 2024. https://icct.nl/publication/exploitation-generative-ai-terrorist-groups. 

Saltman, Erin Marie, and Charlie Winter. “Islamic State: The Changing Face of Modern

Jihadism,” 2014.

Siegel, Daniel. “AI Jihad: Deciphering Hamas, al-Qaeda and Islamic State’s Generative AI

Digital Arsenal.” GNET, November 14, 2024. https://gnet-research.org/2024/02/19/ai-jihad-deciphering-hamas-al-qaeda-and-islamic-sta tes-generative-ai-digital-arsenal/. 

Thomas, Clayton. “Al Qaeda: Background, Current Status, and U.S. Policy .” Congressional

Research Service, May 6, 2024. https://www.congress.gov/crs-product/IF11854.

Weimann, Gabriel, Alexander T. Pack, Rachel Sulciner, Joelle Scheinin, Gal Rapaport, and David Diaz. “Generating Terror: The Risks of Generative AI Exploitation.” Combating

Terrorism Center at West Point, January 19, 2024. https://ctc.westpoint.edu/generating-terror-the-risks-of-generative-ai-exploitation/. 

Weinman, Edward. “Inside Isis.” Connecticut College. Accessed July 16, 2025.

https://www.conncoll.edu/news/cc-magazine/past-issues/2016-issues/fall-2016/inside-isis

/. 


[1] Clayton Thomas, “Al Qaeda: Background, Current Status, and U.S. Policy ,” Congressional Research Service, May 6, 2024, https://www.congress.gov/crs-product/IF11854.

[2] Ibid. 3 Ibid.

[3] Edward Weinman, “Inside Isis,” Connecticut College, accessed July 16, 2025, https://www.conncoll.edu/news/cc-magazine/past-issues/2016-issues/fall-2016/inside-isis/.

[4] Ibid.

[5] Hassan Hassan, “The True Origins of Isis,” The Atlantic, January 7, 2019, https://www.theatlantic.com/ideas/archive/2018/11/isis-origins-anbari-zarqawi/577030/.

[6] Edward Weinman, “Inside Isis,” Connecticut College, accessed July 16, 2025, https://www.conncoll.edu/news/cc-magazine/past-issues/2016-issues/fall-2016/inside-isis/.

[7] Rebecca L Earnhardt, “Al-Qaeda’s Media Strategy: Internet Self- Radicalization and Counter-Radicalization Policies,” Virginia Commonwealth University, 2014, https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1001&context=wilder_pubs.

[8] Ibid.

[9] Michael Jetter, “The Inadvertent Consequences of Al-Qaeda News Coverage,” European Economic Review, August 16, 2019, https://www.sciencedirect.com/science/article/abs/pii/S0014292119301448.

[10] Rebecca L Earnhardt, “Al-Qaeda’s Media Strategy: Internet Self- Radicalization and Counter-Radicalization Policies,” Virginia Commonwealth University, 2014, https://scholarscompass.vcu.edu/cgi/viewcontent.cgi?article=1001&context=wilder_pubs.

[11] Ibid.

[12] Dylan Gerstel, “Isis and Innovative Propaganda,” Swarthmore College, accessed July 17, 2025, https://works.swarthmore.edu/cgi/viewcontent.cgi?article=1004&context=swarthmoreirjournal.

[13] Ibid. 15 Ibid.

[14] Erin Marie Saltman and Charlie Winter, “Islamic State: The Changing Face of Modern Jihadism,” 2014. 17 Dylan Gerstel, “Isis and Innovative Propaganda,” Swarthmore College, accessed July 17, 2025, https://works.swarthmore.edu/cgi/viewcontent.cgi?article=1004&context=swarthmoreirjournal.

[15] Ibid.

[16] Ibid.

[17] Clarisa Nelu, “Exploitation of Generative AI by Terrorist Groups,” ICCT, June 10, 2024, https://icct.nl/publication/exploitation-generative-ai-terrorist-groups.

[18] Ibid.

[19] Priyank Mathur, Clara Broekaert, and Colin P. Clarke, “The Radicalization (and Counter-Radicalization) Potential of Artificial Intelligence,” ICCT, May 1, 2024, https://icct.nl/publication/radicalization-and-counter-radicalization-potential-artificial-intelligence.

[20] Gabriel Weimann et al., “Generating Terror: The Risks of Generative AI Exploitation,” Combating Terrorism Center at West Point, January 19, 2024, https://ctc.westpoint.edu/generating-terror-the-risks-of-generative-ai-exploitation/. 24 Ibid.

[21] Clarisa Nelu, “Exploitation of Generative AI by Terrorist Groups,” ICCT, June 10, 2024, https://icct.nl/publication/exploitation-generative-ai-terrorist-groups.

[22] Daniel Siegel, “AI Jihad: Deciphering Hamas, al-Qaeda and Islamic State’s Generative AI Digital Arsenal,” GNET, November 14, 2024, https://gnet-research.org/2024/02/19/ai-jihad-deciphering-hamas-al-qaeda-and-islamic-states-generative-ai-digital-arsenal/.

[23] Ibid.

[24] Clarisa Nelu, “Exploitation of Generative AI by Terrorist Groups,” ICCT, June 10, 2024, https://icct.nl/publication/exploitation-generative-ai-terrorist-groups.

[25] Vaishali U Gongane, Mousami  V Munot, and Alwin  D Anuse, “Detection and Moderation of Detrimental Content on Social Media Platforms: Current Status and Future Directions,” Soc Netw Anal Min, 2022.