Black-Boxing the Black Flag: Anonymous Sharing Platforms and ISIS Content Distribution Tactics

The study examines three anonymous sharing portals employed strategically by the Islamic State of Iraq and Sham (ISIS) to achieve its political ends. This study argues that anonymous sharing portals such as Sendvid.com, Justpast.it, and Dump.to have been instrumental in allowing individual jihadists to generate content, disseminate propaganda and communicate freely while routing around filtering practiced by popular social media networks.The study draws on Actor Network Theory (ANT) in examining the relationship between ISIS jihadists and the emergence of anonymous sharing portals. The study suggests that, even though used prior to the massive degrading operation across social media, anonymous sharing portals were instrumental in allowing ISIS to maintain its networking structure in the face of coordinated disruption.

[1]  J. M. Berger The Metronome of Apocalyptic Time: Social Media as Carrier Wave for Millenarian Contagion , 2015 .

[2]  Abdel Bari Atwan Islamic State: The Digital Caliphate , 2001 .

[3]  Ned Rossiter,et al.  What is a research platform? Mapping methods, mobilities and subjectivities , 2014 .

[4]  Yehia Ibrahim Alzoubi,et al.  Encrypted Jihad: Investigating the Role of Telegram App in Lone Wolf Attacks in the West , 2017 .

[5]  Richard D. Besel Opening the “Black Box” of Climate Change Science: Actor-Network Theory and Rhetorical Practice in Scientific Controversies , 2011 .

[6]  Ahmad Shehabat,et al.  Distributed Swarming and Stigmergic Effects on ISIS Networks: OODA Loop Model , 2017 .

[7]  D. Cressman,et al.  A Brief Overview of Actor-Network Theory: Punctualization, Heterogeneous Engineering & Translation , 2009 .

[8]  J. Stern,et al.  Producing Terror: Organizational Dynamics of Survival , 2010 .

[9]  Dana M. Janbek,et al.  Global Terrorism and New Media: The Post-Al Qaeda Generation , 2010 .

[10]  Claudia Alvares,et al.  Populism, extremism and media: Mapping an uncertain terrain , 2016 .

[11]  B. Latour On Recalling Ant , 1999 .

[12]  J. Law After Ant: Complexity, Naming and Topology , 1999 .

[13]  Berndt Brehmer,et al.  The Dynamic OODA Loop : Amalgamating Boyd ’ s OODA Loop and the Cybernetic Approach to Command and Control ASSESSMENT , TOOLS AND METRICS , 2005 .

[14]  M. Callon The Sociology of an Actor-Network: The Case of the Electric Vehicle , 1986 .

[15]  Christopher Moore,et al.  Screenshots as Virtual Photography , 2014 .

[16]  J. Klausen Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq , 2015 .