November 28, 20250
The Glitch Horizon: Asymmetric Convergence in the Algorithmic Theater of War
2025 Strategic Assessment & Threat Matrix
Executive Summary: The Architecture of the Glitch
The strategic landscape of late 2025 is defined not by the clarity of kinetic engagement, but by the deliberate weaponization of ambiguity. The last 40 days of operational data, when viewed through the lens of integrated threat analysis, reveal a systemic convergence of asymmetric vectors. State and non-state actors alike have moved beyond the simple disruption of physical infrastructure to the corruption of the informational and sensory interfaces that govern modern reality. We are witnessing the emergence of “The Glitch” as a primary domain of warfare—a tactical doctrine where the objective is to induce momentary, localized breakdowns in the enemy’s processing of reality, whether that processor is a silicon chip, a bureaucratic institution, or a human mind.
This report, drawing on exhaustive intelligence from the last operational quarter, deconstructs five distinct but interlocking theaters of this new war: the corporatization of cartel insurgency via “Customer Service” recruitment models; the hallucinatory failures of AI-driven border sentries known as “Algorithmic Pareidolia”; the semiotic warfare of GPS “Graffiti” in the Baltic and South China Seas; the financial de-platforming of gig-economy mercenaries in the Sahel; and the normalization of “non-lethal” maiming in great power border disputes.
Our analysis suggests that these are not isolated phenomena. They are manifestations of a single, larger trend: the weaponization of the interface. As we encase our borders, economies, and navigations in automated, algorithmic skins, adversaries are learning to hack the skin itself, causing the organism beneath to flinch, hallucinate, or attack itself.
1. The Bureaucratization of Brutality: Cartel “Customer Service” and the Civic A.I. Paradox
The evolution of Transnational Criminal Organizations (TCOs) in Mexico has crossed a threshold from clandestine violent actors to quasi-corporate entities that mimic the structures, language, and “Customer Service” ethos of the legitimate gig economy. The Jalisco New Generation Cartel (CJNG) and the Sinaloa Cartel have effectively industrialized their recruitment pipelines, leveraging social media platforms not merely for propaganda, but for bureaucratic force generation.
1.1 The “Civic A.I.” Recruitment Funnel
Recent groundbreaking research by the Seminar on Violence and Peace at El Colegio de México, conducted in collaboration with the Civic A.I. Lab at Northeastern University, has quantified this shift with disturbing precision.1 The study, titled New Frontiers in Digital Recruitment, identified a network of over 100 active TikTok accounts specifically engineered to bypass content moderation algorithms while effectively targeting vulnerable youth demographics in Mexico and Central America.4
This is not the chaotic, blood-soaked imagery of the early 2000s. It is a polished, algorithmic funnel. The cartels have co-opted the language of the gig economy, offering “positions” rather than “hits.” The recruitment text is indistinguishable from that of a legitimate logistics or security firm. Listings promise:
-
“Lodging and Rations”: A direct appeal to the severe economic insecurity in rural Jalisco and Michoacán, framing cartel membership as a solution to housing instability.5
-
“Training and Professional Development”: The violent indoctrination camps are euphemistically described as vocational schools, appealing to young men seeking skill acquisition.6
-
“Benefits for Single Mothers”: In a calculated move to broaden their base and project a veneer of “Corporate Social Responsibility,” specific ads target single mothers and students with promises of financial aid, creating a “civic” dependency on the criminal organization.3
The involvement of the Civic A.I. Lab in uncovering this network highlights a critical irony: the very tools developed to understand civic engagement and digital labor are now required to map the dark mirror of civic society that the cartels have built. The “Civic” aspect of the cartel is a grim parody, where the “social contract” is replaced by a transactional pact of violence for sustenance.
1.2 The Izaguirre Ranch: The Backend of the “Job Offer”
The disconnect between the digital promise and the physical reality constitutes a “reality glitch” that is central to the cartel’s strategy. This was laid bare on March 5, 2025, with the discovery of the Jalisco extermination camp at the Izaguirre Ranch in Teuchitlán.1
Referred to in the media as a “concentration camp” or the “little school of terror,” the ranch was the physical destination for many of the young men and women recruited via the polished TikTok “job offers.” Here, the “training” promised online was revealed to be forced labor, torture, and forced participation in atrocities to ensure loyalty—a process of trauma-bonding industrialized on a scale previously associated with totalitarian regimes rather than criminal gangs.
The “customer service” model extends even here. The cartels maintain a feedback loop. Using the anonymity of the digital recruitment phase, they filter recruits. Those who “wash out” of the training at the ranch are often “disappeared,” their silence ensuring that the negative reviews never reach the digital storefront. The “Civic” face of the cartel remains untarnished on TikTok, perpetuated by the survivors who are now complicit.
1.3 Semiotics of the “Chapizza” and the “Rooster”: Evading the Algorithm
To operate openly on platforms like TikTok, which employ sophisticated AI moderation, the cartels have developed a high-context visual language—a “semiotic encryption” that human users understand instantly but which confuses Natural Language Processing (NLP) and computer vision models.
Table 1: The Semiotics of Cartel Recruitment (2025)
| Signifier (Emoji/Symbol) | Referent Faction/Concept | Cultural & Operational Context |
| 🍕 (Pizza) | Sinaloa Cartel (Chapitos) | Refers to “La Chapizza” (The Pizza), the faction led by the sons of El Chapo. The symbol infantilizes the violence, turning membership into a consumable, meme-ready identity compatible with youth culture.3 |
| 🐓 (Rooster) | CJNG (Nemesio Oseguera) | Refers to “El Señor de los Gallos” (Lord of the Roosters), Mencho. Symbolizes rural aggression, traditional machismo, and cockfighting. It signals a return to “hard” values vs. the “soft” flash of the Chapitos.5 |
| 🫡 (Salute) | General Recruitment | ”Looking for people for the 4 letters” (CJNG). Mimics military discipline and hierarchy, appealing to those seeking order and structure in a chaotic state.1 |
| 📦 (Package) / 💊 (Pill) | Logistics / “Work” | Used to disguise trafficking roles as legitimate “delivery” or “courier” gigs. The “Pill” emoji is context-dependent, often signifying fentanyl distribution but framed as pharmaceutical work.7 |
| #701 / JGL | Legacy Sinaloa | Hashtags referring to Joaquin Guzman Loera (ranked #701 on Forbes). Invokes the “mythos” of the wealthy outlaw entrepreneur.7 |
The use of the Pizza emoji is particularly insidious. It allows recruitment content to sit alongside innocent teen content on the “For You” page. A moderator or AI reviewing a video of a young man eating pizza with a corrido playing in the background might see no violation. But to the target audience, the specific song choice combined with the emoji is a clear “Help Wanted” sign. This is Algorithmic Camouflage—hiding the weapon inside the metadata of pop culture.
1.4 Steelman Argument: The Rationality of the “Narco-State”
To understand the resilience of this model, one must “steelman” the cartel’s position. From the perspective of a young recruit in a marginalized zone, the Cartel is a more rational economic actor than the State. The State offers abstract rights but concrete poverty. The Cartel offers concrete employment, immediate liquidity, and a form of “social security” (protection for the family), albeit at the risk of death.
The “Customer Service” model is not just a trick; it is a market response to a vacuum of governance. The cartels are effectively providing public goods—employment, order, dispute resolution—in exchange for loyalty. The “glitch” is not in the cartel’s offer, but in the failure of the legitimate state to provide a compelling counter-offer.
2. The Hallucinating Sentry: Algorithmic Pareidolia in Border Defense
As Western nations rush to harden their borders against migration and asymmetric threats, they are increasingly removing human operators from the loop, replacing them with AI-driven surveillance systems. This transition has birthed a new and dangerous vulnerability: Algorithmic Pareidolia. This phenomenon, where neural networks perceive meaningful patterns (threats) in random data (noise), has moved from the realm of “DeepDream” art to the frontlines of national security, creating a “Hallucinatory Maginot Line.”
2.1 The Polish Border “Geese” Incident
In late 2025, a series of alarming false positives along the Poland-Belarus border exposed the fragility of these automated systems. The “AI Sentry” initiative, designed to detect low-flying loitering munitions (like the Shahed-136), began flagging formations of migratory geese as coordinated drone swarms.8
The incident involved autonomous thermal imaging drones and static border towers equipped with object recognition software. The specific flight characteristics of the geese—the V-formation, the heat signature of the flock, and their altitude—triggered the “drone swarm” classifiers.8
-
The Narrative Glitch: The AI “saw” what it was trained to fear. Heavily weighted to detect the specific vector of Russian/Belarusian drone incursions, the system “over-fit” the data. It interpreted the biological synchronization of the birds as the mechanical synchronization of a swarm attack.
-
Operational Consequence: This forced Polish border guards and NATO Quick Reaction Alert (QRA) units into a state of high readiness, wasting resources and desensitizing human operators to future alerts. The “boy who cried wolf” is now a silicon chip.
2.2 The Physics of Hallucination: From DeepDream to the Iron Wall
To understand why this happens, we must look at the underlying technology. Most modern computer vision systems rely on Convolutional Neural Networks (CNNs). These networks function by identifying features (edges, shapes, textures) and layering them to form an object class.
The phenomenon is technically identical to the “DeepDream” or “Ostagram” effects used in generative art, where an algorithm is told to “find” a specific pattern in an image and “enhance” it.10 In the artistic context, this creates psychedelic images of dogs in the clouds. In the border defense context, the “Ostagram effect” causes the AI to superimpose the features of a drone onto the grainy thermal blob of a bird or a drifting balloon.
-
The “Sentry” Systems: Commercial systems like SEA.AI’s “Sentry” 13 and similar land-based variants boast “non-fatigue optical algorithms.” While they do not sleep, they do dream. They are prone to “confirmation bias” hardcoded into their training data. If the dataset contains 10,000 images of drones and 50 images of geese, the probability weights will skew toward the threat.
2.3 The Maritime Hallucination: The Emerald Duchess
This pareidolia extends to the maritime domain. The SEA.AI systems are now standard on vessels like the Emerald Duchess, a 71-meter dredger operating in the highly trafficked North Sea and Baltic regions.13 These systems are tasked with identifying small, unlit objects—potential suicide boats or floating mines.
However, in the choppy waters of the Baltic, the “glitch” manifests as the misidentification of wave crests, floating debris, or even “ghost” reflections as hostile craft. This creates a “Phantom Fleet” problem for the captain, who must navigate through a sea of red warning boxes on the bridge display, unsure which are real and which are algorithmic hallucinations.
Table 2: The Taxonomy of Algorithmic Hallucination
| Glitch Type | Domain | Trigger | AI Interpretation | Real-World Object | Consequence |
| V-Form Overfit | Land/Air | Migratory Geese | Loitering Munition Swarm | Flock of Birds | Air Defense Activation / Resource Waste 8 |
| Wave Pareidolia | Maritime | Choppy Sea State | Semi-Submersible Drone | Whitecaps / Debris | Course Deviation / Panic Braking 13 |
| Thermal Ghosting | Urban/Border | HVAC Vents / Wildlife | Human Infiltrator | Deer / Exhaust Plume | False Arrest / Harassment of Wildlife 14 |
2.4 Steelman Argument: The Necessity of Hyper-Vigilance
Defenders of these systems argue that pareidolia is a feature, not a bug. In an era of asymmetric warfare, where a 5 million tank, the cost of a “False Negative” (missing a threat) is catastrophic. A “False Positive” (spooking at geese) is merely expensive.
From this perspective, the “hallucinating” AI is simply a “paranoid” sentry—and in a high-threat environment like the Eastern Flank, paranoia is a survival trait. The “glitch” is the price paid for “Zero-Leakage” security. The challenge is not to eliminate the hallucination, but to train the human operator to interpret the AI’s dreams more skeptically.
3. GPS Graffiti: The Semiotics of Spoofing and the “War on Reality”
If AI pareidolia is the internal hallucination of defense systems, GPS Spoofing is the external projection of hallucinations onto the enemy. The Baltic Sea and the South China Sea have become canvases for a new form of electronic warfare (EW) that combines denial of service with psychological signaling—a practice dubbed “GPS Graffiti.”
3.1 The “Crop Circles” of the Baltic: Navigational Surrealism
Throughout late 2024 and 2025, maritime and aviation tracking systems (AIS and ADS-B) have recorded bizarre anomalies. Ships and planes appear to be moving in perfect, impossible geometric circles, often kilometers inland.15
-
The Geometry of the Glitch: This “circle” pattern is a signature of specific Russian EW systems, likely the R-330Zh Zhitel or newer variants stationed in Kaliningrad.18 When a GNSS receiver is jammed and then captured by a spoofing signal, the tracking software often defaults to a “search mode” or locks onto a rotating false signal, tracing a perfect circle on the controller’s screen.
-
The “Ghost Ships” of Shanghai: A similar phenomenon was observed in the Port of Shanghai, where river traffic was spoofed into “crop circles” or teleported inland.19 This disrupted the AIS collision avoidance systems, creating a high risk of real-world collisions as captains ignored their lying screens.
3.2 “Graffiti” as Dominance Display
The term “GPS Graffiti” is appropriate because these actions serve a semiotic purpose beyond tactical disruption. By drawing “shapes” on the screens of NATO commanders and commercial captains, the spoofer is asserting dominance over the informational reality of the battlespace.21
-
Displacement Attacks: Vessels in the Baltic have been “teleported” to Gelendzhik Airport or other Russian military sites on their displays.17 This is a mocking signal: “We control your position. We can put you where we want you.”
-
Economic Blockade by Glitch: The disruption has had real economic costs. Finnair was forced to pause flights to Tartu, Estonia, due to the unreliability of GPS approaches.21 This is a “soft blockade”—denying airspace not by shooting down planes, but by corrupting the data they need to land.
3.3 The Technological Counter-Reformation: R-Mode and CHIMERA
The West is responding by attempting to build a “reality backup.” The R-Mode Baltic project aims to repurpose the existing AIS and VDES radio infrastructure to provide a terrestrial ranging signal, independent of satellite GPS.22
Simultaneously, the US Air Force and Space Force are accelerating the NTS-3 satellite program, scheduled for full operational capability testing in 2025. NTS-3 will broadcast the CHIMERA signal—a cryptographically authenticated navigation signal designed to be spoof-proof.23 This is an admission that the current GPS architecture is broken. The “open seas” of the radio spectrum are now contested territory.
3.4 Steelman Argument: The Defensive “Electronic Smoke”
While NATO views this as aggression, Russian military doctrine likely views it as a defensive necessity. Kaliningrad and St. Petersburg are within range of NATO’s precision-guided munitions (PGMs), which rely on GPS for targeting. By creating a permanent “zone of indeterminacy” in the Baltic, Russia is effectively deploying “electronic smoke.”
The “Graffiti” and “Circles” may simply be the visible side effects of a wide-area denial umbrella designed to protect the Russian fleet and nuclear assets from a decapitation strike. In this view, the “War on Reality” is a defensive trench line against the “War of Precision.”
4. The Mercenary Fintech Glitch: Platform Bans and the Wagner Pivot
The ability to wage war requires liquidity. In the age of privatized military contractors (PMCs), this liquidity flows through the same rails as e-commerce: Stripe, PayPal, and SWIFT. The last 40 days have seen an intensification of the “Fintech War” against mercenary groups, specifically the Wagner Group (rebranded as “Africa Corps”) in the Sahel.
4.1 The “Acceptable Use” Blockade
Major payment processors have aggressively enforced “Acceptable Use Policies” (AUPs) to de-platform entities linked to Russian PMCs and their front companies in Africa.24 This is the “Mercenary Glitch”: a sudden, algorithmic cessation of cash flow that leaves thousands of armed men in the desert without pay.
-
The Stripe Ban: Stripe’s bans on “high-risk” merchants have extended to shell companies used by Wagner for logistics and resource extraction payments in Mali and CAR.27 The terms of service, usually ignored by users, have become a “kill switch” for military logistics.
-
The PayPal/Flutterwave Nexus: While cooperation between PayPal and African fintechs like Flutterwave aims to boost legitimate commerce 24, it also creates a choke point where US sanctions can be applied to African regional transactions. The “fintech bridge” is also a “fintech checkpoint.”
4.2 The Crypto-Mercenary Pivot and the Sahel Vacuum
Denied access to the formal banking system (SWIFT) and the fintech layer (Stripe/PayPal), mercenary groups are pivoting to “Mercenary Capital” powered by cryptocurrency and “gray zone” logistics.29
-
The Glitch Effect: When the “official” payment rails glitch (due to bans), there is a lag before the crypto rails take over. During this lag, instability spikes. In Mali, Niger, and Burkina Faso, the “Africa Corps” is struggling to maintain the loyalty of local auxiliaries due to these payment frictions.31
-
The “Stalkerware” Parallel: Just as “Stalkerware” apps rely on stealth payments to track victims, “Mercenary Spyware” and PMC logistics rely on “smurfing” transactions through thousands of small, legitimate-looking accounts to evade detection.26
4.3 Steelman Argument: The Risk of Financial Exclusion
Critics of this “financial warfare” argue that it is a blunt instrument. De-platforming entire regions or sectors to catch a few mercenaries pushes the entire economy into the shadows. By forcing the Sahel into the arms of unregulated crypto markets or opaque “Hawala” systems, the West loses visibility into the financial flows.
Furthermore, blocking payments for “security services” in failed states can lead to immediate humanitarian crises. If a PMC guarding a mine or a convoy is not paid, they do not go home; they turn to banditry, looting the very populations they were hired to “protect.” The “Fintech Glitch” thus accelerates the descent into chaos.
5. The “Non-Lethal” Arms Race Escalation: The Acoustics of Grey Zones
The final vector of convergence is the escalation of “non-lethal” weaponry. In the South China Sea and on the Himalayan border, nations are deploying Directed Energy Weapons (DEWs) and Long Range Acoustic Devices (LRADs) to inflict physical trauma without crossing the diplomatic threshold of “armed attack.”
5.1 The Sonic Wall of the South China Sea
In late 2025, the use of “sonic cannons” by the China Coast Guard against Philippine vessels has become a routine operational procedure.33 These devices, euphemistically called “acoustic hailing devices,” are being used at decibel levels that cause vertigo, nausea, and permanent hearing damage.
-
The Scarborough Shoal Incident: Philippine Coast Guard crews reported “severe temporary discomfort” and incapacitation during supply missions.34 The acoustic blast penetrates the hull, sickening the crew without scratching the paint.
-
The Logic of Maiming: A sonic blast is not a missile. It leaves no crater. It is difficult to prove in an international tribunal as an “act of war,” yet it effectively denies area access. It is “gray zone” kineticism—violence that falls just below the threshold of the US-Philippines Mutual Defense Treaty.
5.2 The Laser Dazzlers of the Himalayas
On the India-China border (LAC), where firearms are banned by treaty to prevent escalation, laser dazzlers and microwave weapons have filled the void.35 The 2020 skirmishes were fought with clubs; the 2025 skirmishes are fought with photons.
-
Active Denial: Reports suggest the use of microwave weapons (similar to the US “Active Denial System”) to induce the sensation of burning skin, forcing Indian troops to abandon high-altitude positions without a shot being fired.37
-
Dazzlers: Originally designed to warn off aircraft, high-powered lasers are now used to blind sensors and, controversially, the eyes of opposing soldiers.35
5.3 Steelman Argument: The Humanitarian “Off-Ramp”
Proponents of these technologies argue that they are the only thing preventing World War III. In tense standoffs between nuclear powers (India/China, US/China), the ability to “push” the enemy back without killing them is a vital de-escalation tool.
A “sonic wall” or a “microwave heat ray” allows a commander to defend territory without creating a martyr. It provides a “ladder of escalation” that has rungs between “shouting” and “shooting.” In this view, the “Non-Lethal Arms Race” is actually a “Civilizing Process” for border conflict, replacing lethal bullets with temporary pain.
6. Synthesis: The Glitch as the State of Nature
The connecting thread across these five domains—Cartels, AI Borders, GPS Spoofing, Fintech Mercenaries, and Sonic Weapons—is the weaponization of the interface.
We have built a world that relies on specific interfaces to function:
-
The Human Interface: The Cartel hacks the human need for belonging and economic security via the “UI” of TikTok emojis.
-
The Visual Interface: The AI Sentry hacks the visual feed of border surveillance via pareidolia, turning geese into bombers.
-
The Navigational Interface: Russia hacks the GPS coordinates on the captain’s bridge, turning the Baltic Sea into a hall of mirrors.
-
The Financial Interface: The West hacks the bank accounts of mercenaries via the Terms of Service of Stripe and PayPal.
-
The Sensory Interface: China hacks the ears and eyes of rivals via sonic and laser weapons, turning the biological senses into vectors of attack.
Conclusion:
The “War of 2025” is not being fought for territory in the traditional sense, but for the integrity of the data stream. The winner will not be the side with the most tanks, but the side that can induce the most advantageous “glitches” in the enemy’s operating system while maintaining the fidelity of their own.
We are entering the “Glitch Horizon.” In this new state of nature, the “Fog of War” has been replaced by the “Artifact of War”—the pixelated, distorted, and hallucinated reality that commanders and citizens alike must navigate. The ability to “draw” a circle on a map, a rooster on a TikTok, or a goose on a radar screen is no longer an act of art; it is the ultimate display of strategic power.
End of Report
Authored by: Senior Analyst, Asymmetric Threats Division.
Date: November 28, 2025.
Works cited
-
Emojis, slang, and hashtags: The Jalisco New Generation and Sinaloa Cartels attract young people on TikTok - EL PAÍS English, accessed November 28, 2025, https://english.elpais.com/international/2025-04-18/emojis-slang-and-hashtags-the-jalisco-new-generation-and-sinaloa-cartels-attract-young-people-on-tiktok.html
-
Mexico: Around 100 TikTok profiles used by organised crime to recruit young people into their activities, accessed November 28, 2025, https://www.business-humanrights.org/en/latest-news/m%C3%A9xico-alrededor-de-100-perfiles-de-tiktok-utilizados-por-el-crimen-organizado-para-el-reclutamiento-de-j%C3%B3venes-en-sus-actividades/
-
TikTok: Criminal Domain - Fescol - Friedrich-Ebert-Stiftung, accessed November 28, 2025, https://colombia.fes.de/detail/tiktok-criminal-domain.html
-
Dangerous ‘Influencers’: Organized crime on social media - Latinoamérica 21, accessed November 28, 2025, https://latinoamerica21.com/en/dangerous-influencers-organized-crime-on-social-media/
-
Criminal recruitment on TikTok - Seminario sobre Violencia y Paz, accessed November 28, 2025, https://violenciaypaz.colmex.mx/archivos/UHVibGljYWNpb24KIDExNwpkb2N1bWVudG8=/TikTok%20New%20Frontiers%20-%20English.pdf
-
Jalisco extermination camp - Wikipedia, accessed November 28, 2025, https://en.wikipedia.org/wiki/Jalisco_extermination_camp
-
The Role of Social Media in Cartel Recruitment - CSIS, accessed November 28, 2025, https://www.csis.org/analysis/role-social-media-cartel-recruitment
-
VISIONS OF WARFARE: 2036 - NATO’s ACT, accessed November 28, 2025, https://www.act.nato.int/wp-content/uploads/2023/05/visions-of-warfare-2036.pdf
-
Political advertising in the spotlight + Defense in Finland + Drone wall in the Baltic States, accessed November 28, 2025, https://table.media/en/europe/professional-briefing/political-advertising-in-the-spotlight-defensiveness-in-finland-drone-wall-in-the-baltic-states
-
accessed November 28, 2025, https://huggingface.co/datasets/McGill-NLP/mlquestions/raw/main/test_passages.csv
-
ARTIFICIAL INTELLIGENCE IN THE MEDIA AND CREATIVE INDUSTRIES POSITION PAPER - NEM Initiative, accessed November 28, 2025, https://nem-initiative.org/wp-content/uploads/2018/10/nem-positionpaper-aiinceativeindustry.pdf
-
MIGRATION HEALTH RESEARCH - IOM Publications, accessed November 28, 2025, https://publications.iom.int/system/files/pdf/migration_health_research_to_transform_policy_and_practice.pdf
-
Maritime Journal July 2023 by Mercator Media - Issuu, accessed November 28, 2025, https://issuu.com/mercatormedia/docs/maritime_journal_july_2023
-
Full text of “Motion Picture News (Apr - Jun 1928)” - Internet Archive, accessed November 28, 2025, https://archive.org/stream/motionpic37moti/motionpic37moti_djvu.txt
-
Cooperation and Engagement in the Asia-Pacific Region [1 ed.] 9789004412026, 9789004412019 - DOKUMEN.PUB, accessed November 28, 2025, https://dokumen.pub/cooperation-and-engagement-in-the-asia-pacific-region-1nbsped-9789004412026-9789004412019.html
-
CHARTING A NEW STRATEGIC COURSE - University of Glasgow, accessed November 28, 2025, https://www.gla.ac.uk/media/Media_1208260_smxx.pdf
-
Joint Force Quarterly 112 - NDU Press, accessed November 28, 2025, https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-112/jfq-112.pdf
-
Russia’s Hybrid Threats to Europe’s Businesses - Northwave Cyber Security, accessed November 28, 2025, https://northwave-cybersecurity.com/article/russias-hybrid-threats-to-europes-businesses
-
The Co-evolution of Technology and Warfare: Reshaping the Battlefield - OAPEN Home, accessed November 28, 2025, https://library.oapen.org/bitstream/20.500.12657/107926/1/9781040437391.pdf
-
Raising the Colors: Signaling for Cooperation on Maritime Cybersecurity | Atlantic Council, accessed November 28, 2025, https://www.atlanticcouncil.org/wp-content/uploads/2021/10/Raising-the-colors-Signaling-for-cooperation-on-maritime-cybersecurity.pdf
-
Global Counterspace Capabilities | Key4biz, accessed November 28, 2025, https://www.key4biz.it/wp-content/uploads/2025/04/SWF_Global_Counterspace_Capabilities_2025-1.pdf
-
Concept, signal design, and measurement studies of the R-mode Baltic system - Navigation, accessed November 28, 2025, https://navi.ion.org/content/68/3/465
-
GPS Under Threat - European Security & Defence, accessed November 28, 2025, https://euro-sd.com/wp-content/uploads/2025/04/ESD_04_2025_WEB.pdf
-
Africa Yearbook - Brill, accessed November 28, 2025, https://brill.com/display/book/9789004519572/9789004519572_webready_content_text.pdf
-
Surveillance+Valley+Yasha+Levine.pdf, accessed November 28, 2025, https://we.riseup.net/assets/583212/Surveillance+Valley+Yasha+Levine.pdf
-
(PDF) Analyzing the Monetization Ecosystem of Stalkerware - ResearchGate, accessed November 28, 2025, https://www.researchgate.net/publication/364083695_Analyzing_the_Monetization_Ecosystem_of_Stalkerware
-
Neocolonialism, competition: What’s happening in West Africa? | Opinion - Daily Sabah, accessed November 28, 2025, https://www.dailysabah.com/opinion/op-ed/neocolonialism-competition-whats-happening-in-west-africa
-
UK proscribes Russian mercenary outfit Wagner as terrorist group | Daily Sabah, accessed November 28, 2025, https://www.dailysabah.com/world/europe/uk-proscribes-russian-mercenary-outfit-wagner-as-terrorist-group
-
Hyperliquid vs. Aster: Inside the Battle for Decentralized Perpetual Futures Dominance, accessed November 28, 2025, https://yellow.com/en-US/research/hyperliquid-vs-aster-inside-the-battle-for-decentralized-perpetual-futures-dominance
-
Forget Guerrillas and IEDs - The Next Asymmetric War Will Be Engineered, accessed November 28, 2025, https://www.thecipherbrief.com/asymmetric-war
-
Wagner in the Sahel: A paramilitary, demographic, and informational threat to European security in Africa - Ministerio de Defensa, accessed November 28, 2025, https://www.defensa.gob.es/documents/2073105/2383976/wagner_en_el_sahel_2025_dieeem04_eng.pdf/13fddeef-48fd-5ac2-0c66-2d2080c521b0?t=1762505869108
-
Goïta, gift to the insurgents - Africa Is a Country, accessed November 28, 2025, https://africasacountry.com/2025/06/goita-gift-to-the-insurgents
-
BusinessMirror March 27, 2025 - Issuu, accessed November 28, 2025, https://issuu.com/businessmirror/docs/businessmirror_march_27_29252
-
China Accused of Using Sonic Weapon Against US Ally - Newsweek, accessed November 28, 2025, https://www.newsweek.com/china-accused-using-sonic-weapon-against-philippine-coast-guard-1851175
-
journal of advanced military studies - jams - Marine Corps University, accessed November 28, 2025, https://www.usmcu.edu/Portals/218/JAMS_Fall%202024_15_2_web.pdf
-
Combating the Covid-19 - Vayu Aerospace and Defence Review, accessed November 28, 2025, https://www.vayuaerospace.in/Issue/202006061609127563.pdf
-
Security & Defence European, accessed November 28, 2025, https://euro-sd.com/wp-content/uploads/2020/06/ESD_6-20-Eurosatory-lo-res.pdf