Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
MANUEL RICARDO TORRES-SORIANO
  • Universidad Pablo de Olavide de Sevilla
    Carretera de Utrera Km.1 -41013- Sevilla- SPAIN
  • 34 954977945
Research Interests:
Research Interests:
Research Interests:
This article seeks to answer the question “What will be the main cause of terrorist conflict in the year 2040?”. It argues that terrorism would be primarily motivated in the long term by technophobia, which – to take David Rapoport’s... more
This article seeks to answer the question “What will be the
main cause of terrorist conflict in the year 2040?”. It argues
that terrorism would be primarily motivated in the long term
by technophobia, which – to take David Rapoport’s analysis
a stage further – would prompt a fifth wave of modern
terrorism. The article offers a scenario analysis, describing
five possible scenarios triggered by the interaction between
five trends: technological advances in biomedicine, the
emergence of new ideologies, climate change, structural
unemployment associated with automation, and the growth
of cities. The major strength of technophobia as a potential
mobiliser of a new wave of terrorism is its cross-cutting
nature, which enables it to serve as a cause accepted by
any sector of the societies of tomorrow.
Research Interests:
El propósito de este documento es analizar desde una visión prospectiva cómo la irrupción de la inteligencia artificial va a transformar las operaciones de influencia y su recepción por parte de la sociedad. Se presta atención a los... more
El propósito de este documento es analizar desde una visión prospectiva cómo la irrupción de la inteligencia artificial va a transformar las operaciones de influencia y su recepción por parte de la sociedad. Se presta atención a los posibles efectos de la pérdida de centralidad de los humanos en estas operaciones, la devaluación de la percepción sensorial como criterio para discriminar la verdad de la mentira, los sesgos en las plataformas de aprendizaje autónomo y la creciente hibridación entre el marketing digital y la propaganda política.
Research Interests:
Research Interests:
The present article examines the relevance of jihadist propaganda as an indicator of the threat from terrorism. To that end, it uses jihadist propaganda output referring to Spain as a case study. It proposes an instrument of measurement... more
The present article examines the relevance of jihadist propaganda as
an indicator of the threat from terrorism. To that end, it uses jihadist
propaganda output referring to Spain as a case study. It proposes an
instrument of measurement based on content analysis, in which the
origin, format, content, and distribution method of the materials are
taken as categories. The results offer empirical evidence regarding
the seriousness of the terrorist threat against Spain, a country that is
particularly exposed due to its historical and geographical singularities
and its status as the victim of an attack deemed paradigmatic in
the minds of jihadists.
Research Interests:
Research Interests:
The purpose of this article is to analyze how the new political and technological context has impacted on the development of state actions aimed at influencing the development of electoral processes in other countries. Using the study of... more
The purpose of this article is to analyze how the new political and technological context has impacted on the development of state actions aimed at influencing the development of electoral processes in other countries. Using the study of the United States presidential elections in 2016 and France in 2017, this work analyses the causes that explain the success or failure of "influence operations", and propose some of the lessons learned from these two cases.
Research Interests:
This article proposes an in-depth study into the specific dynamics of cyberspace as a stage onto which to project so-called " proxy wars ". Its basic thesis is that the main advantage which this strategy provides (low risk of retaliation... more
This article proposes an in-depth study into the specific dynamics of cyberspace as a stage onto which to project so-called " proxy wars ". Its basic thesis is that the main advantage which this strategy provides (low risk of retaliation by the actor under attack) is also its principal weakness, since indirect participation in a cyber conflict detracts from a State's efficiency in reaching tactical objectives, and is of only moderate value for advancing towards the achievement of strategic objectives. Throughout the paper, analysis is made of the advantages and limitations of this strategy, and a typology of the various cyber proxies is proposed based on their relation to the State utilizing them.
Research Interests:
Resumen: El propósito de este artículo es analizar el impacto del factor individual sobre la actividad propagandística del terrorismo, tomando como objeto de estudio los grupos de inspiración yihadista. Se mantiene la tesis de que la... more
Resumen: El propósito de este artículo es analizar el impacto del factor individual sobre la actividad propagandística del terrorismo, tomando como objeto de estudio los grupos de inspiración yihadista. Se mantiene la tesis de que la principal variable que influye en la acción comunicativa de estas organizaciones es la personalidad y habilidades de los individuos que desempeñan estas funciones. Este sesgo personal es fruto de las limitaciones estructurales del terrorismo, entre las que destaca el reducido número de personas que componen su militancia. Se analiza como la actividad propagandística se ve constreñida igualmente por la insuficiente cualificación de los propagandistas, su desconexión con el liderazgo del grupo, y la elevada rotación originada por la insatisfacción que producen estas tareas.

Abstract: The purpose of this article is to analyze the impact of individual factors on the terrorism's propaganda activity, using the subject of groups inspired by the jihadism. The thesis is that the main variable that influences the communicative action of these organizations is the personality and abilities of individuals performing these functions. This personal bias is the result of the terrorism's structural limitations, most notably the small number of people that make up its membership. This analyses how the propaganda activity is constrained by insufficient qualifications of propagandists, their disconnection with the leadership of the group, and the high rotating caused by the dissatisfaction that produced these tasks.
Research Interests:
Research Interests:
This work analyzes some of the key lessons learned from the use of the Internet by jihadist groups over the last twenty years: 1) Online activism can be a substitute for commitment to armed jihad. 3) Terrorists are "early adopters" of new... more
This work analyzes some of the key lessons learned from the use of the Internet by jihadist groups over the last twenty years: 1) Online activism can be a substitute for commitment to armed jihad. 3) Terrorists are "early adopters" of new technologies, to enjoy spaces of impunity. 4) The investigation of terrorist activities on the Internet becomes increasingly difficult as a result of the adoption of measures of self-protection 5). The terrorist message on the Internet has the capacity to transcend the intentions of its creators.
Research Interests:
This article analyses the internet functionality used by the terrorists responsible for the Madrid bombings of March 11, 2004. The computers and USB memory drives seized by the Spanish police form the main source for the analysis. This... more
This article analyses the internet functionality used by the terrorists responsible for the Madrid bombings of March 11, 2004. The computers and USB memory drives seized by the Spanish police form the main source for the analysis. This case study is contrasted with the contemporary theoretical framework of the relation between terrorism and the internet.
Research Interests:
Research Interests:
Research Interests:
This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the non-visible part of the forum contributes to a... more
This article offers a descriptive analysis of the private interactions which took place on the jihadist Internet forum known as Ansar Al Mujahideen between 2008 and 2010. The analysis of the non-visible part of the forum contributes to a more robust
underpinning of some current assumptions regarding the jihadist Internet infrastructure and its hierarchical dependence on, and subordination to, formal terrorist organisations and charismatic leaders. In addition, it offers a new perspective on other aspects such as the many conflicts and rivalries between the different forums, the operational constraints caused by the lack of human and material resources, and the considerable vulnerability of the forums to cyber-sabotage and infiltration attempts.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
This article undertakes a descriptive analysis of the jihadist group, the Global Islamic Media Front. Using information obtained from cells broken up in the West, it argues that, in addition to its propaganda actions in support of... more
This article undertakes a descriptive analysis of the jihadist group, the Global Islamic Media Front. Using information obtained from cells broken up in the West, it argues that, in addition to its propaganda actions in support of terrorism, the group fulfils three additional functions: (a) It serves as an “identity refuge” for individuals wishing to cultivate an identity as fighters of the jihad; (b) It offers a form of “surrogate activism” to those who fail in their attempts to join organisations engaged in terrorist violence; and (c) It is an important source of violent radicalisation for its own members who become increasingly dissatisfied with their propaganda activities.
Research Interests:
Jihadist terrorism has discovered in the Internet a valuable instrument to strengthen its activities. However, in using this technology the terrorists are exposed to new vulnerabilities. The Internet plays a leveling role: each new... more
Jihadist terrorism has discovered in the Internet a valuable instrument to strengthen its activities. However, in using this technology the terrorists are exposed to new vulnerabilities. The Internet plays a leveling role: each new advantageous use it brings is accompanied by a new opportunity to weaken terrorist groups. The present article examines the main vulnerabilities of radical groups who have accorded the Internet a central role in their strategy, namely, less anonymity and security, a loss of content visibility, a major credibility problem, and an undermining of the legitimacy of the terrorist discourse as a consequence of their use of Web 2.0.
Research Interests:
Research Interests:
This paper analyses the propaganda of the Algerian terrorist group the Salafist Group for Preaching and Combat/Al-Qaeda in the Islamic Maghreb (AQIM) from 1998 to 2009 and evaluates the repercussions of the group's merger with Al-Qaeda on... more
This paper analyses the propaganda of the Algerian terrorist group the Salafist Group for Preaching and Combat/Al-Qaeda in the Islamic Maghreb (AQIM) from 1998 to 2009 and evaluates the repercussions of the group's merger with Al-Qaeda on its discourse. The paper argues that integration into the Al-Qaeda hierarchy has had little influence on such discourse or on the group's strategies. The analysis lends support to the view that the group is lukewarm in its commitment to Al-Qaeda. Although the content of AQIM propaganda now embraces more countries, individuals and issues, the fact is that membership of Al-Qaeda has not brought about any significant turning point.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
This article offers a descriptive analysis of the evolution of the propaganda actions of the Algerian Salafist Group for Preaching and Combat (GSPC), later known as Al Qaeda in the Islamic Maghreb (AQIM). An examination of the content of... more
This article offers a descriptive analysis of the evolution of the propaganda actions of the Algerian Salafist Group for Preaching and Combat (GSPC), later known as Al Qaeda in the Islamic Maghreb (AQIM). An examination of the content of the propaganda released by the terrorist group between 1998 and 2009 allows us to identify the different stages and factors accounting for the role played by communications in the strategy of the organisation. The article argues that the AQIM has gradually become an organisation centred on the “media Jihad.”
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
The purpose of this article is to look at the importance and treatment that Spain receives in jihadist propaganda. This study offers a series of empirical observations based on a content analysis of a sample of propaganda produced by... more
The purpose of this article is to look at the importance and treatment that Spain receives in jihadist propaganda. This study offers a series of empirical observations based on a content analysis of a sample of propaganda produced by jihadist groups between January 1994 and September 2008. The analysis of this material, the context in which it was spread, and a comparison with other Western countries leads to the conclusion that the role played by this country in jihadist propaganda can only be understood by taking into account “structural factors” that have little to do with a greater or lesser level of interference in “Islamic affairs.”
Research Interests:

And 7 more

Research Interests:
Research Interests:
Sumario: I. Introducción. II. Innovaciones doctrinales. III. Reinstauración del Califato y transformación política. IV. La victimización del mundo musulmán. V. Legitimación de la violencia terrorista. VI. Necesidad de luchar contra el... more
Sumario: I. Introducción. II. Innovaciones doctrinales. III. Reinstauración del Califato y transformación política. IV. La victimización del mundo musulmán. V. Legitimación de la violencia terrorista.  VI. Necesidad de luchar contra el “enemigo lejano”. VII. Unidad de acción de todos los musulmanes frente al enemigo común.  VIII. Determinismo civilizacional e historicidad de la lucha. IX. Conclusiones.
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests: