NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Riga [Latvia]
NATO Strategic Communications Centre of Excellence
2015
|
Schlagworte: | |
Online-Zugang: | BSB01 |
Beschreibung: | We conducted research aimed at understanding the process by which DAESH disseminates propaganda online. Our focus was not the content that is distributed but the method by which it is distributed. We did so using a number of qualitative, statistical, and numerical analysis techniques in hopes of gaining a deeper insight into their operations and making recommendations for NATO and NATO member states on how to combat them effectively. We discovered a number of important findings the most salient of which is on how individual level decisions made by many of their members have contributed to the survival of their propaganda capabilities, and in some instances an advanced ability to thwart efforts to eliminate their message and their outreach to both locals as well as westerners. We can summarize our findings as follows: • Popular social media platforms such as, and especially, Twitter forms the core of DAESH's propaganda and information dissemination efforts. They use these mediums as the core of a web of content that is spread in many parts of the ungoverned internet. • DAESH (perhaps unknowingly) uses and an adaptive network structure on Twitter to combat outside influences and to react to external operations seeking to curb their operations. This network adapts at high speed and with limited central organization. • DAESH makes innovative use of platform vulnerabilities that allows them to evade detection, suspension and deletion by state and non-state actors through both automated and manual methods of detection. • DAESH has amassed a strong following supported by an internal dedicated human infrastructure allowing them to affect a substantial impact on the information environment. • Through the use of a core-periphery network structure and a high number of networkcentral actors DAESH created a redundancy factor that can withstand repeated efforts to disrupt their information supply chain. • Through the use of account inflation, signaling, and closure methods, DAESH has been able to successfully create friend/ follow networks that feed into their ability to build sustainable adaptive networks, evade detection, and maintain their level of online activity. • DAESH has built a network structure that utilizes the flexibility of small communal networks and allows for the large scale interactions commonly associated with large diverse-use networks. This adds to the challenge of combating them in the traditional information warfare environment. • We create an explanatory process to simplify the reader's understanding of the group's usage of social media. We call it the DEER process. The DEER process begins with dissemination and ends with replenishment. We recommend this model as a way to build more effective strategies in combating the group. Our findings lead us to a more detailed understanding of the DAESH propaganda machine which has gained them notoriety throughout the world and especially on traditional media platforms; and though our conclusions are technical in nature, they have far reaching policy implications. To begin, these conclusions illustrate the ineffectiveness and inefficiencies of a distributed response to DAESH propaganda. DAESH uses limited centralization from a network perspective in order to evade detection while maintaining some control over method and content of their messages-a hybrid model-where flexibility and potency are both achievable. This means that substantial resources must be dedicated in order to combat their ideology effectively. These resources (human and otherwise) are, at the moment, non-aligned, ineffective, and unsustainable over the long term. This is not because the resources and methods used are by nature ineffective, but because the adversary is using strategies and tactics which have never been encountered on this scale ever before. For example, in this report we show that the targeting of highly visible active accounts on Twitter for deletion or suspension, though can eliminate short terms gains by the group, also provides them with the time and knowledge to build more adaptive, responsive networks. While, if account targeting is based on a community/clustering method, we can increase the transaction costs of our adversary's recovery substantially-gaining invaluable time pinned on lower levels of propaganda diffusion- and simultaneously building more strategic operational tactics. We propose and recommend that in addition to the adjustments of technical methods used in the targeting of DAESH network infrastructure, that more emphasis should be placed on disrupting the supply chain of propaganda, rather on providing contrasting messages. This implies that permanent investments not only in new technology, but in human resources should be made, and coordinated labor division among NATO members as well as allies in the region should be instituted. Our discoveries rely on a number of assumptions to produce our recommendations-the most important of which-is that this information battle is based on concepts of adaptive networks and complex systems. This is a direct result of DAESH's approach of relating loose policies to its members and allowing them to make individual level behavioral decisions on how best to conduct an information war. In turn, this means that traditional methods as have been adopted by various agencies, state, and non-state actors alike simply will and do not suffice, as has been evident from the group's continual ability to conduct a propaganda war while facing insurmountable opposition, both physical and electronic. We also recommend that more effort must be made to remove the value proposition which DAESH uses to attract recruits to begin with. Though, our research did not engage the socioeconomic and geo-political environment under which potential recruits are subjected, we hypothesize that innovative efforts in this space can produce substantial declines in DAESH's ability to disseminate propaganda and ultimately to recruit westerners to their cause. Finally, we make recommendations for future and ongoing research, some of which is much needed to understand and produce effective strategies to combat the group |
Beschreibung: | 1 Online-Ressource(1 p. 24) |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048261733 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220609s2015 |||| o||u| ||||||eng d | ||
035 | |a (ZDB-45-CGR)ceeol661319 | ||
035 | |a (OCoLC)1334048367 | ||
035 | |a (DE-599)BVBBV048261733 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
084 | |a OST |q DE-12 |2 fid | ||
100 | 1 | |a Shaheen, Joseph |e Verfasser |4 aut | |
245 | 1 | 0 | |a NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE |c Joseph Shaheen |
264 | 1 | |a Riga [Latvia] |b NATO Strategic Communications Centre of Excellence |c 2015 | |
264 | 2 | |a Frankfurt M. |b CEEOL |c 2015 | |
300 | |a 1 Online-Ressource(1 p. 24) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a We conducted research aimed at understanding the process by which DAESH disseminates propaganda online. Our focus was not the content that is distributed but the method by which it is distributed. We did so using a number of qualitative, statistical, and numerical analysis techniques in hopes of gaining a deeper insight into their operations and making recommendations for NATO and NATO member states on how to combat them effectively. We discovered a number of important findings the most salient of which is on how individual level decisions made by many of their members have contributed to the survival of their propaganda capabilities, and in some instances an advanced ability to thwart efforts to eliminate their message and their outreach to both locals as well as westerners. We can summarize our findings as follows: • Popular social media platforms such as, and especially, Twitter forms the core of DAESH's propaganda and information dissemination efforts. | ||
500 | |a They use these mediums as the core of a web of content that is spread in many parts of the ungoverned internet. • DAESH (perhaps unknowingly) uses and an adaptive network structure on Twitter to combat outside influences and to react to external operations seeking to curb their operations. This network adapts at high speed and with limited central organization. • DAESH makes innovative use of platform vulnerabilities that allows them to evade detection, suspension and deletion by state and non-state actors through both automated and manual methods of detection. • DAESH has amassed a strong following supported by an internal dedicated human infrastructure allowing them to affect a substantial impact on the information environment. • Through the use of a core-periphery network structure and a high number of networkcentral actors DAESH created a redundancy factor that can withstand repeated efforts to disrupt their information supply chain. | ||
500 | |a • Through the use of account inflation, signaling, and closure methods, DAESH has been able to successfully create friend/ follow networks that feed into their ability to build sustainable adaptive networks, evade detection, and maintain their level of online activity. • DAESH has built a network structure that utilizes the flexibility of small communal networks and allows for the large scale interactions commonly associated with large diverse-use networks. This adds to the challenge of combating them in the traditional information warfare environment. • We create an explanatory process to simplify the reader's understanding of the group's usage of social media. We call it the DEER process. The DEER process begins with dissemination and ends with replenishment. We recommend this model as a way to build more effective strategies in combating the group. | ||
500 | |a Our findings lead us to a more detailed understanding of the DAESH propaganda machine which has gained them notoriety throughout the world and especially on traditional media platforms; and though our conclusions are technical in nature, they have far reaching policy implications. To begin, these conclusions illustrate the ineffectiveness and inefficiencies of a distributed response to DAESH propaganda. DAESH uses limited centralization from a network perspective in order to evade detection while maintaining some control over method and content of their messages-a hybrid model-where flexibility and potency are both achievable. This means that substantial resources must be dedicated in order to combat their ideology effectively. These resources (human and otherwise) are, at the moment, non-aligned, ineffective, and unsustainable over the long term. | ||
500 | |a This is not because the resources and methods used are by nature ineffective, but because the adversary is using strategies and tactics which have never been encountered on this scale ever before. For example, in this report we show that the targeting of highly visible active accounts on Twitter for deletion or suspension, though can eliminate short terms gains by the group, also provides them with the time and knowledge to build more adaptive, responsive networks. While, if account targeting is based on a community/clustering method, we can increase the transaction costs of our adversary's recovery substantially-gaining invaluable time pinned on lower levels of propaganda diffusion- and simultaneously building more strategic operational tactics. | ||
500 | |a We propose and recommend that in addition to the adjustments of technical methods used in the targeting of DAESH network infrastructure, that more emphasis should be placed on disrupting the supply chain of propaganda, rather on providing contrasting messages. This implies that permanent investments not only in new technology, but in human resources should be made, and coordinated labor division among NATO members as well as allies in the region should be instituted. Our discoveries rely on a number of assumptions to produce our recommendations-the most important of which-is that this information battle is based on concepts of adaptive networks and complex systems. This is a direct result of DAESH's approach of relating loose policies to its members and allowing them to make individual level behavioral decisions on how best to conduct an information war. | ||
500 | |a In turn, this means that traditional methods as have been adopted by various agencies, state, and non-state actors alike simply will and do not suffice, as has been evident from the group's continual ability to conduct a propaganda war while facing insurmountable opposition, both physical and electronic. We also recommend that more effort must be made to remove the value proposition which DAESH uses to attract recruits to begin with. Though, our research did not engage the socioeconomic and geo-political environment under which potential recruits are subjected, we hypothesize that innovative efforts in this space can produce substantial declines in DAESH's ability to disseminate propaganda and ultimately to recruit westerners to their cause. Finally, we make recommendations for future and ongoing research, some of which is much needed to understand and produce effective strategies to combat the group | ||
650 | 4 | |a Politics | |
650 | 4 | |a Media studies | |
650 | 4 | |a Communication studies | |
650 | 4 | |a Security and defense | |
650 | 4 | |a Social psychology and group interaction | |
650 | 4 | |a Methodology and research technology | |
650 | 4 | |a Studies in violence and power | |
650 | 4 | |a ICT Information and Communications Technologies | |
650 | 4 | |a Peace and Conflict Studies | |
912 | |a ZDB-45-CGR | ||
940 | 1 | |n oe | |
940 | 1 | |q BSB_OE_CEEOL | |
999 | |a oai:aleph.bib-bvb.de:BVB01-033641936 | ||
966 | e | |u https://www.ceeol.com/search/gray-literature-detail?id=661319 |l BSB01 |p ZDB-45-CGR |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184065215037440 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Shaheen, Joseph |
author_facet | Shaheen, Joseph |
author_role | aut |
author_sort | Shaheen, Joseph |
author_variant | j s js |
building | Verbundindex |
bvnumber | BV048261733 |
collection | ZDB-45-CGR |
ctrlnum | (ZDB-45-CGR)ceeol661319 (OCoLC)1334048367 (DE-599)BVBBV048261733 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07778nmm a2200517zc 4500</leader><controlfield tag="001">BV048261733</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220609s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-45-CGR)ceeol661319</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1334048367</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048261733</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">OST</subfield><subfield code="q">DE-12</subfield><subfield code="2">fid</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shaheen, Joseph</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE</subfield><subfield code="c">Joseph Shaheen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Riga [Latvia]</subfield><subfield code="b">NATO Strategic Communications Centre of Excellence</subfield><subfield code="c">2015</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">Frankfurt M.</subfield><subfield code="b">CEEOL</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource(1 p. 24)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">We conducted research aimed at understanding the process by which DAESH disseminates propaganda online. Our focus was not the content that is distributed but the method by which it is distributed. We did so using a number of qualitative, statistical, and numerical analysis techniques in hopes of gaining a deeper insight into their operations and making recommendations for NATO and NATO member states on how to combat them effectively. We discovered a number of important findings the most salient of which is on how individual level decisions made by many of their members have contributed to the survival of their propaganda capabilities, and in some instances an advanced ability to thwart efforts to eliminate their message and their outreach to both locals as well as westerners. We can summarize our findings as follows: • Popular social media platforms such as, and especially, Twitter forms the core of DAESH's propaganda and information dissemination efforts. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">They use these mediums as the core of a web of content that is spread in many parts of the ungoverned internet. • DAESH (perhaps unknowingly) uses and an adaptive network structure on Twitter to combat outside influences and to react to external operations seeking to curb their operations. This network adapts at high speed and with limited central organization. • DAESH makes innovative use of platform vulnerabilities that allows them to evade detection, suspension and deletion by state and non-state actors through both automated and manual methods of detection. • DAESH has amassed a strong following supported by an internal dedicated human infrastructure allowing them to affect a substantial impact on the information environment. • Through the use of a core-periphery network structure and a high number of networkcentral actors DAESH created a redundancy factor that can withstand repeated efforts to disrupt their information supply chain. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">• Through the use of account inflation, signaling, and closure methods, DAESH has been able to successfully create friend/ follow networks that feed into their ability to build sustainable adaptive networks, evade detection, and maintain their level of online activity. • DAESH has built a network structure that utilizes the flexibility of small communal networks and allows for the large scale interactions commonly associated with large diverse-use networks. This adds to the challenge of combating them in the traditional information warfare environment. • We create an explanatory process to simplify the reader's understanding of the group's usage of social media. We call it the DEER process. The DEER process begins with dissemination and ends with replenishment. We recommend this model as a way to build more effective strategies in combating the group. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Our findings lead us to a more detailed understanding of the DAESH propaganda machine which has gained them notoriety throughout the world and especially on traditional media platforms; and though our conclusions are technical in nature, they have far reaching policy implications. To begin, these conclusions illustrate the ineffectiveness and inefficiencies of a distributed response to DAESH propaganda. DAESH uses limited centralization from a network perspective in order to evade detection while maintaining some control over method and content of their messages-a hybrid model-where flexibility and potency are both achievable. This means that substantial resources must be dedicated in order to combat their ideology effectively. These resources (human and otherwise) are, at the moment, non-aligned, ineffective, and unsustainable over the long term. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This is not because the resources and methods used are by nature ineffective, but because the adversary is using strategies and tactics which have never been encountered on this scale ever before. For example, in this report we show that the targeting of highly visible active accounts on Twitter for deletion or suspension, though can eliminate short terms gains by the group, also provides them with the time and knowledge to build more adaptive, responsive networks. While, if account targeting is based on a community/clustering method, we can increase the transaction costs of our adversary's recovery substantially-gaining invaluable time pinned on lower levels of propaganda diffusion- and simultaneously building more strategic operational tactics. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">We propose and recommend that in addition to the adjustments of technical methods used in the targeting of DAESH network infrastructure, that more emphasis should be placed on disrupting the supply chain of propaganda, rather on providing contrasting messages. This implies that permanent investments not only in new technology, but in human resources should be made, and coordinated labor division among NATO members as well as allies in the region should be instituted. Our discoveries rely on a number of assumptions to produce our recommendations-the most important of which-is that this information battle is based on concepts of adaptive networks and complex systems. This is a direct result of DAESH's approach of relating loose policies to its members and allowing them to make individual level behavioral decisions on how best to conduct an information war. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">In turn, this means that traditional methods as have been adopted by various agencies, state, and non-state actors alike simply will and do not suffice, as has been evident from the group's continual ability to conduct a propaganda war while facing insurmountable opposition, both physical and electronic. We also recommend that more effort must be made to remove the value proposition which DAESH uses to attract recruits to begin with. Though, our research did not engage the socioeconomic and geo-political environment under which potential recruits are subjected, we hypothesize that innovative efforts in this space can produce substantial declines in DAESH's ability to disseminate propaganda and ultimately to recruit westerners to their cause. Finally, we make recommendations for future and ongoing research, some of which is much needed to understand and produce effective strategies to combat the group</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Media studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communication studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security and defense</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social psychology and group interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Methodology and research technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Studies in violence and power</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">ICT Information and Communications Technologies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Peace and Conflict Studies</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-45-CGR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">BSB_OE_CEEOL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033641936</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.ceeol.com/search/gray-literature-detail?id=661319</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-45-CGR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048261733 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:59:34Z |
indexdate | 2024-07-10T09:33:25Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033641936 |
oclc_num | 1334048367 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | 1 Online-Ressource(1 p. 24) |
psigel | ZDB-45-CGR BSB_OE_CEEOL |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | NATO Strategic Communications Centre of Excellence |
record_format | marc |
spelling | Shaheen, Joseph Verfasser aut NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE Joseph Shaheen Riga [Latvia] NATO Strategic Communications Centre of Excellence 2015 Frankfurt M. CEEOL 2015 1 Online-Ressource(1 p. 24) txt rdacontent c rdamedia cr rdacarrier We conducted research aimed at understanding the process by which DAESH disseminates propaganda online. Our focus was not the content that is distributed but the method by which it is distributed. We did so using a number of qualitative, statistical, and numerical analysis techniques in hopes of gaining a deeper insight into their operations and making recommendations for NATO and NATO member states on how to combat them effectively. We discovered a number of important findings the most salient of which is on how individual level decisions made by many of their members have contributed to the survival of their propaganda capabilities, and in some instances an advanced ability to thwart efforts to eliminate their message and their outreach to both locals as well as westerners. We can summarize our findings as follows: • Popular social media platforms such as, and especially, Twitter forms the core of DAESH's propaganda and information dissemination efforts. They use these mediums as the core of a web of content that is spread in many parts of the ungoverned internet. • DAESH (perhaps unknowingly) uses and an adaptive network structure on Twitter to combat outside influences and to react to external operations seeking to curb their operations. This network adapts at high speed and with limited central organization. • DAESH makes innovative use of platform vulnerabilities that allows them to evade detection, suspension and deletion by state and non-state actors through both automated and manual methods of detection. • DAESH has amassed a strong following supported by an internal dedicated human infrastructure allowing them to affect a substantial impact on the information environment. • Through the use of a core-periphery network structure and a high number of networkcentral actors DAESH created a redundancy factor that can withstand repeated efforts to disrupt their information supply chain. • Through the use of account inflation, signaling, and closure methods, DAESH has been able to successfully create friend/ follow networks that feed into their ability to build sustainable adaptive networks, evade detection, and maintain their level of online activity. • DAESH has built a network structure that utilizes the flexibility of small communal networks and allows for the large scale interactions commonly associated with large diverse-use networks. This adds to the challenge of combating them in the traditional information warfare environment. • We create an explanatory process to simplify the reader's understanding of the group's usage of social media. We call it the DEER process. The DEER process begins with dissemination and ends with replenishment. We recommend this model as a way to build more effective strategies in combating the group. Our findings lead us to a more detailed understanding of the DAESH propaganda machine which has gained them notoriety throughout the world and especially on traditional media platforms; and though our conclusions are technical in nature, they have far reaching policy implications. To begin, these conclusions illustrate the ineffectiveness and inefficiencies of a distributed response to DAESH propaganda. DAESH uses limited centralization from a network perspective in order to evade detection while maintaining some control over method and content of their messages-a hybrid model-where flexibility and potency are both achievable. This means that substantial resources must be dedicated in order to combat their ideology effectively. These resources (human and otherwise) are, at the moment, non-aligned, ineffective, and unsustainable over the long term. This is not because the resources and methods used are by nature ineffective, but because the adversary is using strategies and tactics which have never been encountered on this scale ever before. For example, in this report we show that the targeting of highly visible active accounts on Twitter for deletion or suspension, though can eliminate short terms gains by the group, also provides them with the time and knowledge to build more adaptive, responsive networks. While, if account targeting is based on a community/clustering method, we can increase the transaction costs of our adversary's recovery substantially-gaining invaluable time pinned on lower levels of propaganda diffusion- and simultaneously building more strategic operational tactics. We propose and recommend that in addition to the adjustments of technical methods used in the targeting of DAESH network infrastructure, that more emphasis should be placed on disrupting the supply chain of propaganda, rather on providing contrasting messages. This implies that permanent investments not only in new technology, but in human resources should be made, and coordinated labor division among NATO members as well as allies in the region should be instituted. Our discoveries rely on a number of assumptions to produce our recommendations-the most important of which-is that this information battle is based on concepts of adaptive networks and complex systems. This is a direct result of DAESH's approach of relating loose policies to its members and allowing them to make individual level behavioral decisions on how best to conduct an information war. In turn, this means that traditional methods as have been adopted by various agencies, state, and non-state actors alike simply will and do not suffice, as has been evident from the group's continual ability to conduct a propaganda war while facing insurmountable opposition, both physical and electronic. We also recommend that more effort must be made to remove the value proposition which DAESH uses to attract recruits to begin with. Though, our research did not engage the socioeconomic and geo-political environment under which potential recruits are subjected, we hypothesize that innovative efforts in this space can produce substantial declines in DAESH's ability to disseminate propaganda and ultimately to recruit westerners to their cause. Finally, we make recommendations for future and ongoing research, some of which is much needed to understand and produce effective strategies to combat the group Politics Media studies Communication studies Security and defense Social psychology and group interaction Methodology and research technology Studies in violence and power ICT Information and Communications Technologies Peace and Conflict Studies |
spellingShingle | Shaheen, Joseph NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE Politics Media studies Communication studies Security and defense Social psychology and group interaction Methodology and research technology Studies in violence and power ICT Information and Communications Technologies Peace and Conflict Studies |
title | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE |
title_auth | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE |
title_exact_search | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE |
title_exact_search_txtP | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE |
title_full | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE Joseph Shaheen |
title_fullStr | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE Joseph Shaheen |
title_full_unstemmed | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE Joseph Shaheen |
title_short | NETWORK OF TERROR, HOW DAESH USES ADAPTIVE SOCIAL NETWORKS TO SPREAD ITS MESSAGE |
title_sort | network of terror how daesh uses adaptive social networks to spread its message |
topic | Politics Media studies Communication studies Security and defense Social psychology and group interaction Methodology and research technology Studies in violence and power ICT Information and Communications Technologies Peace and Conflict Studies |
topic_facet | Politics Media studies Communication studies Security and defense Social psychology and group interaction Methodology and research technology Studies in violence and power ICT Information and Communications Technologies Peace and Conflict Studies |
work_keys_str_mv | AT shaheenjoseph networkofterrorhowdaeshusesadaptivesocialnetworkstospreaditsmessage |