Small Wars Journal

information warfare

Terrorism and Social Media (TASMConf): International Conference - 25-26 June 2019 - Swansea University, Wales, UK - Radical Islamist Focused Presentations OSINT Listing

Tue, 07/02/2019 - 12:30am
The 2019 Terrorism and Social Media (TASM) conference took place on 25 and 26 June 2019 at Swansea University Bay Campus, Wales, United Kingdom. The conference was organized by Swansea University’s Hillary Rodham Clinton School of Law and its Cyber Threats Research Centre (CYTREC), with the support of the VOX-Pol Network of Excellence.

About the Author(s)

Weaponization of Metaphors in Russian Propaganda: Sexual Violence, as State Sovereignty Violation SWJED Wed, 06/26/2019 - 1:01am
The deployment of these “cognitive munitions” in the current “hot” stage of political warfare confrontation between Russia and the West should serve as a stark reminder that multiple “defusing” initiatives should be actively developed and implemented, aiming at raising the cognitive protection levels at military and civilian institutions alike.

Control the Information Environment Narrative…or the Threat Will

Fri, 06/21/2019 - 9:33am
Strategic competitors like Russia and China are using old technologies in new ways while also employing new advanced technology to fight their enemies in all domains (space, cyber, air, sea, and land). This required the U.S. Army to evolve and adapt the way it wants to fight by publishing “Multi-Domain Operations (MDO) 2028” as the cornerstone for the Joint force to militarily compete, penetrate, dis-integrate, and exploit future adversaries. While air, land, and sea domains have been prevalent since World War II, the relative new-comers of Cyber and Space are still establishing their doctrinal foundation in modern warfare.

About the Author(s)

The Advent of the “Digital Mercenaries”

Sat, 03/30/2019 - 3:08am
Modern day “condottieri”, a new type of modern “soldiers of fortune”, is emerging center stage. Namely, the ascent of a new breed, one that could be best described as “digital mercenaries”. The advent of these new professionals is of no less importance than their “traditional” counterparts who provide muscle and boots on the ground in distant and difficult environments.

About the Author(s)

The Myths of Traditional Warfare: How Our Peer and Near-Peer Adversaries Plan to Fight Using Irregular Warfare

Thu, 03/28/2019 - 5:59am
The belief that peer/near-peer/VEO competitors and adversaries will only fight us via traditional warfare, man to man, tank to tank, ship to ship, and plane to plane, are missing the historical and present day reality that these designated threats are currently competing and prevailing over us via Irregular Warfare activities in the competition space, and doing so quite successfully.

About the Author(s)

Primer: Terrorist Usage of Twitter and Social Media SWJED Thu, 03/28/2019 - 3:56am
"As terror groups such as ISIS gain more experience using social media platforms, the structure of posts and the methods used to promote the posts are becoming similar to the strategies a business would use to promote a product on those platforms. Although, the groups can’t directly mimic a business. They generally are blocked from using straightforward promotion tools put in place by the platform, such as advertisements or paid promotions. Groups like ISIS also tend to violate the terms of service for the social media platforms they are using. Much like the battle between cyber attacks and cyber security, terrorist organizations are continually adapting to circumvent detection and removal by the platforms they are using."

Operationalizing OSINT Full-Spectrum Military Operations

Mon, 01/14/2019 - 12:15am
United States Soldiers, Privates and Generals, deserve access to unbiased, unredacted phenomenological reporting from the battlefield. In no way does this diminish the value, skills, and cognitive ability of the G2 or of national agencies. Rather, this capability is a much needed and as of yet, unmined treasure of data on the enemy, neutrals, and friendlies. DoD should place this tool in the hands of every leader from COCOM to fire team NCO.

About the Author(s)

Information Overmatch: How Information Dominance Will Win Our Nation’s Wars

Sun, 01/13/2019 - 12:10am
The advent of the Internet and the global interconnection of data has generated a path to oust combat overmatch as ‘the’ game changer. Instead, information dominance will be the characteristic that will win future wars. The organization that has the most relevant, timely, and actionable information will be victorious in battle, even against a combat overmatch force. Instead of seeking combat overmatch in our future investment strategies, we should be seeking a strategy that gives us Information Overmatch.

About the Author(s)

As If We Need Another Crisis… SWJED Tue, 11/06/2018 - 12:02pm
Some would consider it incredulous to believe that thoughts could possibly be the cause of so much pain and grief in the world. Disappointingly, they are not trying hard enough to solve the problem and fail to recognize that the history of the world is indeed a history of thoughts, shaped by ideas before it is even shaped by events.