Press "Enter" to skip to content

Tag: OODA loop

Distributed swarms, OODA loops, and stigmergy

This is a third paper in a cycle on distributed swarms, OODA loops and stigmergy co-authored with a PhD student of mine. The paper is titled Distributed Swarming and Stigmergic Effects on ISIS Networks: OODA Loop Model, and was published in the Journal of Media and Information Warfare. This is probably the densest and most interesting paper in the series, as we analyse information warfare waged by distributed swarms in the context of network-centric warfare theory, stigmergic adaptation, and John Boyd’s work on the OODA loop concept. For me the most interesting elements of the paper involve our discussion of Von Moltke’s concept of auftragstactic in the context of maneuver warfare in the information domain.

On the use of Telegram in lone wolf attacks

This is a paper I co-authored with two collaborators, one of which is a PhD student of mine, titled Encrypted Jihad: Investigating the Role of Telegram App in Lone Wolf Attacks in the West, and published in the Journal of Strategic Security. We examine the role played by Telegram, one of the most popular social media apps offering end-to-end encrypted communications, in the command and control [C2] operations of distributed terrorist organizations. Specifically, I was interested in illustrating how encrypted platforms such as Telegram can be used as part of a complex stigmergic communications strategy relying on memetic impact both within the distributed network and outside of it. In brief, Telegram acts as a standalone communication platform where core C2 vectors are encrypted and obfuscated from counter-terrorism efforts, while all other communication is built for maximum memetic potential, relying on stigmergic impact among otherwise unconnected nodes acting as lone wolves.

Black-boxing the Black Flag

This is a paper I co-wrote with a PhD student of mine, titled Black-boxing the Black Flag: Anonymous Sharing Platforms and ISIS Content Distribution Tactics, currently in peer reviewWe analyse ISIS’ use of anonymous sharing portals in its content distribution operations as part of a broader information warfare strategy focused on withstanding degrading attacks by popular social media portals. What is interesting about this paper is that we use a key notion from actor network theory – the black box – to conceptualise the role of anonymous sharing portals in the propaganda operations of distributed terrorist networks.

Swarm networks and meme warfare

This is a draft of a paper titled Swarm networks and the design process of a distributed meme warfare campaign, which I co-authored with my PhD student Travis Wall, to be presented at the IAMCR 2017 conference in Cartagena, Colombia, July 16-20, 2017.

This paper aims to develop a systemic perspective of the mechanics of generation of targeted memes forming a meme warfare campaign, by analyzing the swarm-like topology of 4chan’s /pol/ forum, and the logistics of the swarm’s rapid prototyping, coordination, production, and dissemination of content. The paper uses as its case study the #DraftOurDaughters campaign, which is documented in its entirety from inception to completion. The main focus of the argument is in developing a coherent and systemic perspective on the logistics of distributed memetic production in online spaces potentiating swarm-like behavior in their user-base. We examine this process in its entirety, from the logistics of swarm formation to the rapid prototyping of ideas leveraging short feedback loops, and the collaborative creation of semantically targeted media. Anonymous online spaces such as 4chan are identified as environments fostering a powerful feedback loop of distributed ideation, content production and dissemination. Through examining these phenomena, the paper also provides perspective on the manifestation of collaborative design practice in online participatory media spaces.