— Teodor Mitew (@tedmitew) February 25, 2018
Here are the prezi slides from a guest lecture I gave on the Fail Early Fail Often philosophy [#fefo], as well as the methodology of Fast, Inexpensive, Simple, Tiny [#fist].
And below are some related gifs I made for the occasion:
— Teodor Mitew (@tedmitew) March 4, 2018
— Teodor Mitew (@tedmitew) March 4, 2018
— Teodor Mitew (@tedmitew) March 8, 2018
This is a third paper in a cycle on distributed swarms, OODA loops and stigmergy co-authored with a PhD student of mine. The paper is titled Distributed Swarming and Stigmergic Effects on ISIS Networks: OODA Loop Model, and was published in the Journal of Media and Information Warfare. This is probably the densest and most interesting paper in the series, as we analyse information warfare waged by distributed swarms in the context of network-centric warfare theory, stigmergic adaptation, and John Boyd’s work on the OODA loop concept. For me the most interesting elements of the paper involve our discussion of Von Moltke’s concept of auftragstactic in the context of maneuver warfare in the information domain.
This is a paper I co-authored with two collaborators, one of which is a PhD student of mine, titled Encrypted Jihad: Investigating the Role of Telegram App in Lone Wolf Attacks in the West, and published in the Journal of Strategic Security. We examine the role played by Telegram, one of the most popular social media apps offering end-to-end encrypted communications, in the command and control [C2] operations of distributed terrorist organizations. Specifically, I was interested in illustrating how encrypted platforms such as Telegram can be used as part of a complex stigmergic communications strategy relying on memetic impact both within the distributed network and outside of it. In brief, Telegram acts as a standalone communication platform where core C2 vectors are encrypted and obfuscated from counter-terrorism efforts, while all other communication is built for maximum memetic potential, relying on stigmergic impact among otherwise unconnected nodes acting as lone wolves.
This is a paper I co-wrote with a PhD student of mine, titled Black-boxing the Black Flag: Anonymous Sharing Platforms and ISIS Content Distribution Tactics, currently in peer review. We analyse ISIS’ use of anonymous sharing portals in its content distribution operations as part of a broader information warfare strategy focused on withstanding degrading attacks by popular social media portals. What is interesting about this paper is that we use a key notion from actor network theory – the black box – to conceptualise the role of anonymous sharing portals in the propaganda operations of distributed terrorist networks.
These are some loosely organized observations about the nature of network topologies in the wild.
In terms of both agency and information, all entities, be they singular [person], plural [clan/tribe/small company], or meta-plural [nation/empire/global corporation] are essentially stacks of various network topologies. To understand how the entities operate in space these topologies can be simplified to a set of basic characteristics. When networks are mapped and discussed, it is usually at this 2-dimensional level. However, in addition to operating in space, all entities have to perform themselves in time.
This performative aspect of networks is harder to grasp, as it involves a continuously looping process of encountering other networks and adapting to them. In the process of performative adaptation all networks experience dynamic changes to their topologies, which in turn challenge their internal coherence. This process is fractal, in that at any one moment there is a vast multiplicity of networks interacting with each other across the entire surface of their periphery [important qualification here – fully distributed networks are all periphery]. There are several important aspects to this process, which for simplicity’s sake can be reduced to an interaction of two networks and classified as follows:
1] the topology of the network we are observing [A];
2] the topology of network B, that A is in the process of encountering;
3] the nature of the encounter: positive [dynamic collaboration], negative [dynamic war], zero sum [dynamic equilibrium].
All encounters are dynamic, and can collapse into each other at any moment. All encounters are also expressed in terms of entropy – they increase or decrease it within the network. Centralized networks cannot manage entropy very well and are extremely fragile to it.
Positive encounters are self explanatory, in that they allow networks to operate in a quasi-symbiotic relationship strengthening each network. These encounters are dynamically negentropic for both networks, in that they enable both networks to increase coherence and reduce entropy.
Negative encounters can be offensive or defensive, whereby one or both [or multiple] networks attempt to undermine and/or disrupt the internal coherency of the other network/s. These encounters are by definition entropic for at least one of the networks involved [often for all], in that they dramatically increase entropy in at least one of the combatants. They can however be negentropic for some of the participants. For example, WW2 was arguably negentropic for the US and highly entropic for European states.
Zero sum encounters are interesting, in that they represent a dynamic cancelling out of networks. There is neither cooperation nor war, but a state of co-presence without an exchange of entropy in a dynamic time-space range. I believe this is a rare type of encounters, because the absence of entropy exchange can appear only if 1] there is no exchange of information or agency, or 2] the amount of agency/information exchanged is identical from both sides. Needless to say, this process cannot be easily stabilized over a long time period and either morphs into one of the other two states or the networks stop encountering each other.
This is a YouTube playlist of my lectures in BCM206 Future Networks, covering the story of information networks from the invention of the telegraph to the internet of things. The lecture series begins with the invention of the telegraph and the first great wiring on the planet. I tie this with the historical context of the US Civil War, the expansion of European colonial power, the work of Charles Babbage and Ada Lovelace, followed by the work of Tesla, Bell, and Turing. I close with the second world war, which acts as a terminus and marker for the paradigm shift from telegraph to computer. Each of the weekly topics is big enough to deserve its own lecture series, therefore by necessity I have to cover a lot, and focus on key tropes emergent from the new networked society paradigm – i.e. separation of information from matter, the global brain, the knowledge society, the electronic frontier – and examine their role in our complex cyberpunk present.
Here are the slides to the paper co-authored with Travis Wall, presented at IAMCR 2017 in Cartagena, Colombia.
Swarm networks and the design process of a distributed meme warfare campaign
This is a draft of a paper titled Swarm networks and the design process of a distributed meme warfare campaign, which I co-authored with my PhD student Travis Wall, to be presented at the IAMCR 2017 conference in Cartagena, Colombia, July 16-20, 2017.
This paper aims to develop a systemic perspective of the mechanics of generation of targeted memes forming a meme warfare campaign, by analyzing the swarm-like topology of 4chan’s /pol/ forum, and the logistics of the swarm’s rapid prototyping, coordination, production, and dissemination of content. The paper uses as its case study the #DraftOurDaughters campaign, which is documented in its entirety from inception to completion. The main focus of the argument is in developing a coherent and systemic perspective on the logistics of distributed memetic production in online spaces potentiating swarm-like behavior in their user-base. We examine this process in its entirety, from the logistics of swarm formation to the rapid prototyping of ideas leveraging short feedback loops, and the collaborative creation of semantically targeted media. Anonymous online spaces such as 4chan are identified as environments fostering a powerful feedback loop of distributed ideation, content production and dissemination. Through examining these phenomena, the paper also provides perspective on the manifestation of collaborative design practice in online participatory media spaces.