Click here to read our latest report “30 Years of Trends in Terrorist and Extremist Games”

Light of Darkness: An Analysis of ISKP’s Digital Handbook

Light of Darkness: An Analysis of ISKP’s Digital Handbook
13th October 2025 Paula Nunez-Guerra
In Insights

The digital bulletin, Light of Darkness, was originally conceived as a supplementary component to Voice of Khurasan and has gradually consolidated its status as an independent and specialised publication produced under the auspices of the Islamic State Khorasan Province (ISKP). Its principal objective is not the dissemination of propaganda directed at external audiences. Instead, it prioritises the internal dissemination of specialised technological guidance. This guidance is intended to assist members and sympathisers in circumventing online surveillance mechanisms. It also seeks to prevent the systematic removal of extremist content from digital platforms. Since the debut of Voice of Khurasan in early 2022 – an outlet that has since evolved into ISKP’s foremost English-language periodical with forty-six issues to date – tech themes have appeared sporadically, most prominently through a special edition devoted to artificial intelligence. In contrast to Al Naba, which constitutes the organisation’s main publication, Voice of Khurasan is distinguished by its broad coverage of subjects, including geopolitics, security, and emerging technologies.

Despite this thematic breadth, ISKP has approached the integration of Al-related discourse with considerable caution, raising questions regarding the strategic rationale behind the relative underdevelopment of this thematic area. However, previous GNET research has highlighted the ways in which ISKP uses AI, including for propaganda and as an attempt to “circumvent counter-terrorism monitoring.”

Since July 2023, Light of Darkness has been published as an autonomous bulletin  within Voice of Khurasan, and is distinct in content and scope. Its content is organised around three principal thematic axes: (1) preventive strategies for cyberattacks and systematic management of the digital footprint; (2) detailed recommendations of digital tools, platforms, and techniques to avoid the removal of online material; and (3) the operational use of the artificial intelligence technologies, including prescriptions for the selection of chatbots deemed suitable for highly sensitive operations.

Therefore, this Insight will analyse the seven issues published to date of Light of Darkness. To do so, a methodology of direct observation was used within the framework of a research stay at CITCO, the competent authority in Spain for the removal of illegal content.

Overview of Publications

A review of the first seven issues (July 2023 – June 2025) shows a consistent positioning of Light of Darkness within the final sections of Voice of Khurasan, until the seventh issue, which, for the first time, was placed at the beginning. Early editions omitted the issue numbers and the Al Azaim production logo, but these elements later became standardised, signalling the greater institutionalisation of the bulletin.

The Light of Darkness newsletters, since their initial launch, have ranged in length from 9 to 17 pages, with the most recent issue being the longest. This latest publication (June 2025) features a hooded figure facing a vast technological network illustrated with digital symbols on its cover. The cover’s predominant blue colour echoes that of the inaugural issue of Light of Darkness. However, a key distinction lies in the first issue’s use of the Daesh emblem, composed of the words “Islamic State”, a symbol primarily employed in audiovisual formats.

Figure 1: Cover of the first issue of Light of Darkness (July 2023).

Figure 2: Cover of the latest issue of Light of Darkness (June 2025).

 

Number of Light of Darkness / CharacteristicsDoes the number appear on the cover?Does the logo of the production company (Al Azaim) appear on the cover?Date of publicationNumber of Voice of KhurasanWhere does it appear in the magazine?
Number 1NoNoJuly 202327In the end
Number 2YesYesMarch 202434In the end
Number 3YesYesMay 202436In the end
Number 4YesYesSeptember 202439In the end
Number 5YesYesJanuary 202543In the end
Number 6YesNoMarch 202545In the end
Number 7YesNoJune 202546At the beginning

Figure 3: Table about published issues of Light of Darkness (from July 2023 to June 2025).

Cybersecurity and the Digital Footprint

The first three issues place significant emphasis on the notion of cyber threats and cyber hygiene, underscoring both the persistent risk posed by cyberattacks and the strategic importance of managing one’s digital footprint. The bulletins explicitly encourage ISKP supporters to overcome apprehension toward technology, framing it simultaneously as a source of vulnerability and as a crucial instrument for empowerment. They include practical recommendations for strengthening cybersecurity practices, such as creating and maintaining robust passwords, implementing two-factor authentication mechanisms, and carefully regulating the disclosure of personal information.

The inaugural issue presents a comprehensive overview of ten major cyber threats, ranging from ransomware and phishing schemes to vulnerabilities in Internet of Things (IoT) devices and supply chain attacks, thereby aligning its discussion with established cybersecurity discourse. While conceding that achieving absolute digital security is an impossibility, the bulletin characterises the internet as an inherently insecure environment. On this basis, it justifies the pursuit of offensive cyber operations, contending that jihadist actors are themselves frequent targets of hostile digital campaigns conducted by their adversaries. To reinforce this argument, the text invokes historical analogies, asserting that Muslim communities have historically faced existential threats from external forces and therefore must maintain a heightened state of vigilance within the contemporary digital sphere.

Figure 4: Extract from the first issue of the Light of Darkness explaining what technology is (July 2023, page 1).

Figure 5: Own elaboration based on the extracted idea from the first issue of the Light of Darkness, which explains the top ten threats to cybersecurity (July 2023).

The second issue (March 2024) expands on this discussion by exploring the concept of the digital footprint, which may be active (such as content creation) or passive (such as web browsing). The publication warns that such footprints are frequently permanent and thus must be carefully managed. As part of its proposed mitigation strategies, the bulletin advises readers to use virtual private networks (VPNs) and to exercise heightened caution when interacting with hyperlinks. 

Applications and Content Removal

Subsequent issues offer a systematic analysis of the role of social media and communication platforms in monitoring and content takedown. Issue three (May 2024) notes that governments and other actors actively monitor online activity of groups like ISKP, and emphasises the importance of considering not only individual security but also the collective security of the movement: “Please think before you give your personal information. It’s really important not only for you, but also for your companions and your goal” (page 4). This bulletin provides a detailed examination of the ways in which companies such as Facebook gather and exploit user data, while later editions (issues four to six) attribute the suppression of jihadist material primarily to algorithmic detection systems, frequently framing this process through historical analogies to the early persecution of Muslims in Islamic history. 

To mitigate detection, Light of Darkness articulates a set of operational recommendations. These include avoiding specific symbols, hashtags, and keywords; creating multiple user profiles; and prioritising encrypted messaging services. Telegram and Signal are consistently promoted, while platforms such as WhatsApp and Facebook Messenger are explicitly dissuaded due to their metadata-sharing practices. Notably, issue five contains a comparative table that systematically evaluates five applications (Telegram, Signal, Threema, WhatsApp, Facebook Messenger) across six variables – encryption, data policy, message self-destruction, group capacity, file-sharing limits, and the availability of public channels – highlighting Telegram’s scalability and its public channel functionality as decisive factors. Telegram is presented as superior in several respects, including its maximum group capacity (up to 200,000 members) and its file-sharing capability (up to 2GB). The bulletin warns against using Gem Space due to perceived opacity in its data governance practices and instead advocates the secure deployment of Telegram’s features, with particular emphasis on private channels and secret chats.

Figure 6: Extract from the fifth issue of the Light of Darkness comparing different apps (January 2025, page 5).

Artificial Intelligence: An Obligation?

The most recent issue foregrounds artificial intelligence, framing its use as a religious obligation (frad al-ayn) incumbent upon ISKP supporters. AI is described as “vital” (page 4) for navigating the contemporary information landscape, with an emphasis on both the opportunities and risks it presents. The bulletin presents the responsible use of AI as a moral imperative, consistent with Islamic teachings of protecting oneself and others from harm, avoiding exploitative technologies, and combating misinformation. Nevertheless, the publication warns against excessive dependence on automation and emphasises caution when handling personal data. 

In a significant development, the bulletin expands its guidance by providing concrete examples of how AI may be used strategically, such as automating content translation, generating persuasive messaging, and analysing adversarial narratives to anticipate and counter counterterrorism discourse. The document stresses that these tools should be deployed with discretion to avoid detection by automated moderation systems, thereby integrating operational effectiveness with security considerations. Moreover, the issue includes a comparative assessment of popular AI platforms, recommending that users disable memory functions where possible, employ anonymisation techniques such as VPNs, and restrict sensitive queries to platforms with strong privacy policies. This approach illustrates a dual awareness: (1) a recognition of AI’s capacity to enhance propaganda dissemination and organisational reach; and (2) a concern that careless or unregulated use could expose networks to surveillance and operational compromise. The emphasis on disciplined, value-driven engagement with AI signals a broader strategic effort to embed technological innovation within ISKP’s ideological and operational framework without undermining its security posture.

Figure 7: Extract from the seventh issue of the Light of Darkness about the importance of learning AI as an individual obligation (June 2025, page 16).

 

In support of this argument, the bulletin includes a comparative table evaluating ChatGPT, Bing AI, Brave Leo, and DeepSeek across five categories: data storage practices, memory control, privacy, use cases, and overall recommendations. Brave Leo is identified as the most suitable option for highly sensitive queries due to its anonymous mode; by contrast, Bing AI and DeepSeek are expressly discouraged for all but non-sensitive searches, owing to concerns about the opacity of their data-handling practices. This selective adoption highlights ISKP’s ambivalent stances towards AI technologies, portraying them as both indispensable tools for operational effectiveness and objects of persistent mistrust.

Conclusions

The analysis of the seven issues published to date of Light of Darkness illustrates a shift away from conventional propaganda towards an internally-oriented handbook of digital resistance. The bulletin’s principal objectives can be summarised in two key points: (1) to cultivate a cautious and discreet presence online by avoiding traceable identifiers, and (2) to frame AI as a strategic instrument, advocating the selective use of platforms considered less intrusive.

The relative scarcity of AI-related material within the ISKP media ecosystem appears to stem from two factors: (1) a profound distrust of external systems and (2) a belief in the adequacy of existing tools to sustain ISKP’s propaganda apparatus. Nonetheless, Light of Darkness reflects an adaptive modus operandi, where digital self-preservation and operational security are prioritised over mass dissemination.

From a counterterrorism perspective, this analysis suggests that platforms and agencies must increase their awareness about, and be keen to adapt to, the changes encouraged by the Light of Darkness. In this regard, they should pay special attention to new keywords or encrypted language that terrorist actors may use, as well as to platforms that forgo rigorous moderation of terrorist content. 

In sum, the Light of Darkness bulletin represents a strategic adaptation by ISKP to the increasingly surveilled digital environment. Its focus on operational security, technological literacy, and controlled AI usage highlights an ongoing effort to preserve its online presence while evading algorithmic censorship and law enforcement intervention. Ultimately, it can be observed that ISKP’s official media outlet is placing increasing emphasis on emerging technology, and on ensuring that its followers possess the mechanisms and tools necessary for enhanced privacy and security.

Paula M. Núñez-Guerra holds a degree in Journalism from the University of Málaga, a Master’s in International Relations and Communication from the University Camilo José Cela, and has been a PhD candidate at Complutense University of Madrid in the Doctoral Programme in Political Science and Administration and International Relations since 2022. Her research interests include jihadist terrorism, which has been the focus of several national and international conferences in which she has participated and articles and chapters she has written.

Are you a tech company interested in strengthening your capacity to counter terrorist and violent extremist activity online? Apply for GIFCT membership to join over 30 other tech platforms working together to prevent terrorists and violent extremists from exploiting online platforms by leveraging technology, expertise, and cross-sector partnerships.