Press "Enter" to skip to content

Tag: terrorism

Distributed swarms, OODA loops, and stigmergy

This is a third paper in a cycle on distributed swarms, OODA loops and stigmergy co-authored with a PhD student of mine. The paper is titled Distributed Swarming and Stigmergic Effects on ISIS Networks: OODA Loop Model, and was published in the Journal of Media and Information Warfare. This is probably the densest and most interesting paper in the series, as we analyse information warfare waged by distributed swarms in the context of network-centric warfare theory, stigmergic adaptation, and John Boyd’s work on the OODA loop concept. For me the most interesting elements of the paper involve our discussion of Von Moltke’s concept of auftragstactic in the context of maneuver warfare in the information domain.

On the use of Telegram in lone wolf attacks

This is a paper I co-authored with two collaborators, one of which is a PhD student of mine, titled Encrypted Jihad: Investigating the Role of Telegram App in Lone Wolf Attacks in the West, and published in the Journal of Strategic Security. We examine the role played by Telegram, one of the most popular social media apps offering end-to-end encrypted communications, in the command and control [C2] operations of distributed terrorist organizations. Specifically, I was interested in illustrating how encrypted platforms such as Telegram can be used as part of a complex stigmergic communications strategy relying on memetic impact both within the distributed network and outside of it. In brief, Telegram acts as a standalone communication platform where core C2 vectors are encrypted and obfuscated from counter-terrorism efforts, while all other communication is built for maximum memetic potential, relying on stigmergic impact among otherwise unconnected nodes acting as lone wolves.

Black-boxing the Black Flag

This is a paper I co-wrote with a PhD student of mine, titled Black-boxing the Black Flag: Anonymous Sharing Platforms and ISIS Content Distribution Tactics, currently in peer reviewWe analyse ISIS’ use of anonymous sharing portals in its content distribution operations as part of a broader information warfare strategy focused on withstanding degrading attacks by popular social media portals. What is interesting about this paper is that we use a key notion from actor network theory – the black box – to conceptualise the role of anonymous sharing portals in the propaganda operations of distributed terrorist networks.