Articles in the latest issue of the "Voice of Khurasan," an English-language monthly magazine published by Al-Azaim Media Foundation, a media outlet linked to the Islamic State Khorasan Province (ISKP), which defines itself as a supporting entity for the Islamic State (ISIS), argue that Allah punishes those who deviate from the right path, urge Muslims to wage jihad, and advise jihadi fighters to use social media but secure their personal data online.
Issue 36, the most recent issue of the magazine, is dated Dhu Hijjah 1445, in the Hijri calendar, which corresponds with the lunar month beginning June 7, 2024. A PDF copy of the magazine was shared on the internet.
The magazine seeks donations via cryptocurrency Monero (XMR)
One of the articles is the third part of a series titled "Light of Darkness – 3." It calls for adopting technologies, wherever they are invented, to advance the cause of jihad. It cites how in the Battle of Trench in the year 626, Salman Farsi, a former Zoroastrian from Persia who had converted to Islam, advised the digging of trenches around Medina, a defensive measure he had learned in Persia.
"Here is our lesson – 'We should first accept appropriate technology until we have the best one, no matter who or where it's invented. After that, we have to rely on Allah.' Such is the field of modern technology. Social media is like a technological net thrown by the kuffar to catch us. Also, it's a great platform to communicate with our brothers and spread our message to every corner of the world in a very short time," it says.
The article advises the adoption of social media but also warns of the security issues associated with networks like TikTok, Facebook, Twitter, Instagram, and others. Subsequently, it explains how to secure the mujahideen's presence on social media networks. It notes the dangers of social media and the internet, citing examples of disinformation, hacking, data breaches, fake profiles, malicious ads, scams, and mental health issues as related to these technologies. It advises jihadi fighters on how to secure their data, saying: "To protect yourself from social media scams, be cautious about the information you share, verify the authenticity of accounts and websites before interacting with them. Always exercise skepticism and double-check any offers or requests for personal information. While Facebook data isn't 100 percent safe, you can take some steps to protect yourself as much as possible from data scams on the platform by following some steps:
"Verify Links: Before clicking on any link, especially in messages, check the URL and be wary of suspicious links.
"Keep Your Profile Private: Adjust your Facebook privacy settings to limit who can see your information.
"Use Strong, Unique Passwords: Protect your account with a strong password and enable two-factor authentication (2FA).
"Report Suspicious Activity: If you encounter any suspicious activity on Facebook, report it to the platform immediately.
"Use security features: By staying vigilant and using security features available on Facebook, you can help protect your data from scams. Protecting your social media profile involves several strategies such as using strong, unique passwords for each social media account. Consider using a password manager to keep track of them.
"Enable Two-factor Authentication (2FA): This adds an extra layer of security to your account.
"Adjust Privacy Settings: Review and adjust your privacy settings to control who can see your posts, profile information, and activity.
"Report Suspicious Activity: Take care before sharing any information: Be cautious about what you share online. Avoid posting sensitive information such as your home address, phone number, or financial details.
"Beware of phishing attempts: Be suspicious of messages or links from unknown users, even if they seem legitimate.
"Use The Latest Features: Stay updated with the latest security features and settings on your social media platforms.
"Monitor Unusual Activity: Monitor your account for any unauthorized access or unusual activity and report it immediately. (For better practices, you can follow the previous two instalments in the Light of Darkness series)."
The full text of this report is available to MEMRI Jihad and Terrorism Threat Monitor subscribers.
Subscription information is available at this link.
JTTM subscribers can visit this page to view the report.