SlideShare a Scribd company logo
1 of 81
(H)ac(k)tivism 6
Assange, Network Theory, and
Conspiracy
The Plan
1. A Primer on Network Theory
2. Assange, Networks, and Conspiracy
3. Analysis of Assange on Conspiracy
Then…
4. A primer on Dynamic Systems in the Military
5. The Empire Strikes Back!
Assange, Networks and Conspiracy
• What are Conspiracies?
• What are their Harms?
• How Can they be dismantled?
What are conspiracies? (for JA)
• he doesn't mean 'conspiracy' in the usual
sense of people sitting around in a room
plotting some crime or deception.
What are conspiracies? (for JA)
• he doesn't mean 'conspiracy' in the usual
sense of people sitting around in a room
plotting some crime or deception.
• As I understand Assange's view it is entirely
possible that there could be a conspiracy in
which no person in the conspiracy was aware
that they were part of the conspiracy.
What are conspiracies? (for JA)
• he doesn't mean 'conspiracy' in the usual
sense of people sitting around in a room
plotting some crime or deception.
• As I understand Assange's view it is entirely
possible that there could be a conspiracy in
which no person in the conspiracy was aware
that they were part of the conspiracy.
• How is this possible?
Conspiracy as an emergent property
Suppose that you have some information that
is valuable -- say some inside information
about the financial state of a corporation.
Conspiracy as an emergent property
Suppose that you have some information that
is valuable -- say some inside information
about the financial state of a corporation.
If you immediately make that information
public without acting on it, it is worth nothing
to you.
Conspiracy as an emergent property
Suppose that you have some information that
is valuable -- say some inside information
about the financial state of a corporation.
If you immediately make that information
public without acting on it, it is worth nothing
to you.
On the other hand, if you keep it to yourself
you may not fully profit from the information.
Conspiracy as an emergent property
Ideally, you would like to seek out someone
that you could trade the information with, and
who you could be sure would keep the
information close so that it remained valuable.
Let's say that I have similar information and
that we trade it.
Conspiracy as an emergent property
You may trade with other friends and I may do
likewise. In each case we have simply traded
information for our own benefit, but we have
also built a little network of information
traders who, hopefully, are keeping the
information relatively close and are giving us
something equally valuable in kind.
Conspiracy as an emergent property
We may not know the scope of the network
and we may not even realize we are part of a
network, but we are, and this network
constitutes a conspiracy as Assange
understands it.
Conspiracy as an emergent property
We may not know the scope of the network and
we may not even realize we are part of a
network, but we are, and this network
constitutes a conspiracy as Assange understands
it.
No one sat down and agreed to form a network
of inside information traders -- the network has
simply naturally emerged from our local
individual bargains. We can say that the network
is an emergent property of these bargains.
Emergent Conspiracies: example 2
• Suppose that I am a reporter. I would like to
have some hot news to report. You agree to
give me the inside information, but you do so
with the understanding that you and your
network friends will act on your information
before you give it to me and it becomes
worthless when published.
Emergent Conspiracies: example 2
• I get my scoop, and you get to control the
conditions under which the information is
made public. I, as reporter, am now
unknowingly part of the conspiracy.
Emergent Conspiracies: example 2
• I get my scoop, and you get to control the
conditions under which the information is made
public. I, as reporter, am now unknowingly part of
the conspiracy.
• I am participating in the conspiracy by respecting
the secrets that the network wishes to keep, and
releasing the secrets (and sometimes
misinformation) only when it is in the interest of
the network to do so. I have become a part of the
network, and hence part of the conspiracy.
Emergent Conspiracies: example 3
• The network need not start out as a
conspiracy.
Emergent Conspiracies: example 3
• The network need not start out as a
conspiracy.
• Suppose that the leader of an Arab country
wants the United States to take strong action
against Iran. If the Arab leader's people knew
he took such a position there would be strong
political blowback and resistance (and
possible political risk for him), hence he
conducts his discussions with the United
States in secret.
Emergent Conspiracies: example 3
• The network need not start out as a conspiracy.
• Suppose that the leader of an Arab country wants
the United States to take strong action against
Iran. If the Arab leader's people knew he took
such a position there would be strong political
blowback and resistance (and possible political
risk for him), hence he conducts his discussions
with the United States in secret.
• He has become part of a conspiracy.
Assange on Conspiracy Again
• These three illustrations all show the central
feature of what Assange takes to be a conspiracy
-- secrecy and exchange of information within a
closed network.
• this is conspiracy in the sense of the original
etymology of 'conspire' -- as in "breathe with" or
"breathe together".
• The individuals are acting in concert, whether by
plan or not, and the secrecy ensures that the
benefits of the network accrue to those inside
the network and not outside it.
Assange on Networks
• “We will use connected graphs as a way to
apply our spatial reasoning abilities to political
relationships. First take some nails
("conspirators") and hammer them into a
board at random. Then take twine
("communication") and loop it from nail to
nail without breaking.”
Assange on Networks
• “Call the twine connecting two nails a link [in
network theory an ‘edge’]. Unbroken twine
means it is possible to travel from any nail to
any other nail via twine and intermediary
nails...Information flows from conspirator to
conspirator [in network theory a ‘path’].”
Assange on Networks
• “Not every conspirator trusts or knows every
other conspirator even though all are
connected. Some are on the fringe of the
conspiracy, others are central and
communicate with many conspirators and
others still may know only two conspirators
but be a bridge between important sections or
groupings of the conspiracy…” [Conspiracy as
Governance, p. 2] [i.e. it is a ‘small worlds
network’]
Illustration from John Danaher
Those outside network are outside conspiracy
Assange on Networks
• “Conspirators are often discerning, for some
trust and depend each other, while others say
little. Important information flows frequently
through some links, trivial information
through others. So we expand our simple
connected graph model to include not only
links, but their "importance.””
Assange on Networks
• “Return to our board-and-nails analogy.
Imagine a thick heavy cord between some
nails and fine light thread between others. Call
the importance, thickness or heaviness of a
link its weight. Between conspirators that
never communicate the weight is zero. The
"importance" of communication passing
through a link is difficult to evaluate apriori,
since its true value depends on the outcome
of the conspiracy.”
Conspiracies as Cognitive Devices
“Conspiracies are cognitive devices. They are able
to outthink the same group of individuals acting
alone. Conspiracies take information about the
world in which they operate (the conspiratorial
environment), pass through the conspirators and
then act on the result. We can see conspiracies as
a type of device that has inputs (information
about the environment), a computational
network (the conspirators and their links to each
other) and outputs (actions intending to change
or maintain the environment).” ["Conspiracy as
Govenance", p. 3]
What’s Wrong with Conspiracies?
1) Problems arise when networks become
extremely powerful, because whatever the
intentions of the individuals within the
network, the network itself is optimized for its
own success, and not for the benefit of those
outside of the network. Again, this is not by
design, it is just an emergent property of such
systems that they function in this way.
What’s Wrong with Conspiracies?
People that do not act to benefit their
neighbor nodes in the network will eventually
be expunged from the system because their
neighbor nodes will minimize contact. Those
acting in concert with their neighbor
node/conspirators will form stronger ties and
will benefit from the information and financial
goods that participation in the network
delivers.
What’s Wrong with Conspiracies?
• This is true even at the edges of the network.
Reporters that violate the trust of their
neighbor nodes in the network will be cut off
from the network -- they will no longer get
their hot scoops.
What’s Wrong with Conspiracies?
• Conspirators in the network may think they
are working for the benefit of others (the
individuals in the
military/industrial/congressional complex may
well think they are acting for the benefit of
the American people, but this only so much
self-deception); they are actually acting for
the network.
What’s Wrong with Conspiracies?
2) Even if you are a member of the network it is not
clear that you ultimately benefit except in the
obvious ways that one has power and wealth -- the
cost of this Faustian bargain is that one must
surrender one's creativity.
What’s Wrong with Conspiracies?
3) Assange also talk about such networks/conspiracies
acting against "people's will to truth, love and self-
realization", and here I can only speculate that he
means members of the conspiracy are not acting for
love of other individuals or for finding truth outside
of the network but rather are acting for the survival
of the conspiracy/network. If your actions do not
ensure the health of the network the network will
expunge you.
How do we dismantle conspiracies?
• The genius insight of Assange is his
observation that these conspiracies don't have
heads. It is pointless to try and target a single
leader, or even a handful of leaders. The
conspiracy is a scale free network; it is too
hard to take down.
How do we dismantle conspiracies?
• Let's go back to Assange's illustration of the
nails connected by the twine. Imagine that
this board had 100 nails all connected by a
single length of twine wrapped around the
nails. How many nails would you have to pull
out before the network of twine fell apart?
10? 20? 50?
How do we dismantle conspiracies?
• Assange thinks that this is not the way to
target the network; Rather what we want to
do is to intercept and cut the information flow
in the network so that the twine unravels of
its own accord.
Ways leaking works
1) Once the information flowing is leaked it is no
longer closely held and is no longer valuable --
it is no longer a source of power for the
network. The network no longer has an
advantage.
Ways leaking works
1) Once the information flowing is leaked it is no
longer closely held and is no longer valuable -- it
is no longer a source of power for the network.
The network no longer has an advantage.
2) the network may detect a leak, and will act to
preserve its information. In this case the
network undergoes a kind of fission. It severs
the leaky link and in effect separates from the
part of the network where the leak occurred.
Assange:
“How can we reduce the ability of a conspiracy
to act?...We can split the conspiracy, reduce or
eliminating important communication
between a few high weight links or many low
weight links.” ["State and Terrorist
Conspiracies," Nov. 10, 2006, p. 4]
Ways leaking works
3) The more secretive or unjust an organization
is, the more leaks induce fear and paranoia in
its leadership and planning coterie. This must
result in minimization of efficient internal
communications mechanisms (an increase in
cognitive "secrecy tax") and consequent
system-wide cognitive decline resulting in
decreased ability to hold onto power as the
environment demands adaption.
Assange
• Hence in a world where leaking is easy,
secretive or unjust systems are nonlinearly hit
relative to open, just systems. Since unjust
systems, by their nature induce opponents,
and in many places barely have the upper
hand, mass leaking leaves them exquisitely
vulnerable to those who seek to replace them
with more open forms of governance. (The
Nonlinear Effects of Leaks on Unjust Systems
of Governance." Dec. 21, 2006
Open Questions
1) Is it necessarily the case that the conspiracy
can't act to the benefit of others? Arab leaders
are conspiring with the United States to defeat
Iran's nuclear program, but isn't this a good
thing?
Open Questions
1) Is it necessarily the case that the conspiracy can't act
to the benefit of others? Arab leaders are conspiring
with the United States to defeat Iran's nuclear
program, but isn't this a good thing?
Alternatively, it might be observed that rogue states
like Iran are often the product of a population's push
back against some puppet that was part of a US
involving conspiracy (e.g. the Shah of Iran). Perhaps
conspiracies end up creating the very rogue states they
refer to justify their existence?
Open Questions
2) The conspiracy relies on lots of innocent
people to do its business (Iraqi civilian
informants, for example). Leaking network
secrets may put these people at risk. What
safeguards should an operation like Wikileaks
have to protect such people?
Open Questions
2) The conspiracy relies on lots of innocent people to
do its business (Iraqi civilian informants, for example).
Leaking network secrets may put these people at risk.
What safeguards should an operation like Wikileaks
have to protect such people?
Alternatively, could you argue that if there was no
conspiracy such people would not be put at risk in the
first place? Is it credible to think that in the long run
breaking apart conspiracies protects innocent people
from being caught up in dangerous spy games?
Open Questions
• 3) While acting against the conspiracy might
place a cognitive tax on it, does it not also
make the network stronger in the end? That
is, won't the conspiracy become more
secretive and more draconian in its actions?
Open Questions
4) To what extent is Wikileaks itself a
conspiracy? To this end, are there good
conspiracies and bad conspiracies? Should we
distinguish between conspiracies of the
powerful and conspiracies of those who seek
to level the playing field? At what point would
a network like Wikileaks become too
powerful?
Open Questions
5) Suppose Assange were “neutralized.” If
Wikileaks is itself a kind of conspiracy then
only one nail has been pulled from the board.
Will the network unravel? Will it undergo
fission resulting in the proliferation of many
LittleWikileaks? Or will it lead to copycats and
possibly the emergence of Leaker culture? If
the latter, then what consequences will there
be for traditional conspiracies of the
powerful?
Danaher’s reconstruction of the
argument
(1) The goal of a democratic system of governance
(or, alternatively, an "ideal system of
governance") is to serve the common good
(i.e. the good of everybody in society).
(2) Conspiracies are self-sustaining closed
information networks.
(3) These networks will fight for their own survival,
not for the common good.
(4) Therefore, conspiracies are contrary to the
common good.
Danaher’s reconstruction of the
argument
Danaher’s Counterargument I: The
Non-Zero Sum Argument
(5) Assange's initial argument assumes that survival
is a zero-sum game: that one network's (CN's)
success comes at another network's loss (CS's)
and so must be contrary to the common good.
(6) But survival is not a zero-sum game, as is
revealed in many models of social and cultural
evolution.
(7) Therefore, (4) is not necessarily true.
Counterargument II: Principal-Agent
Alignment of Interests
(8) Assange assumes that the interests of the
network are necessarily non-aligned or
antagonistic to the interests of the broader
society.
(9) But the network may function as the agent of
some principal.
(10) Agents are, by definition, supposed to serve
the interests of the principal.
(11) Therefore, (4) is not necessarily true.
Counterargument III: Necessity of Concealed
Information in Strategic Interactions
(13) Suppose the network (i.e. the government) is
the agent of society and so is tasked with serving
the common good.
(14) Suppose further that the network is engaged in
a strategic interaction with another agent (i.e.
another government) such as in a military conflict
or international treaty negotiation.
(15) Concealment of information is often necessary
to succeed in strategic interactions.
(16) Therefore, a closed, conspiratorial network
might be necessary to serve the common good.
Aaron Brady on Assange
• He begins by positing that conspiracy and
authoritarianism go hand in hand,
• arguing that since authoritarianism produces
resistance to itself — to the extent that its
authoritarianism becomes generally known —
it can only continue to exist and function by
preventing its intentions (the authorship of its
authority?) from being generally known.
• It inevitably becomes a conspiracy
Assange quote
• Authoritarian regimes give rise to forces which
oppose them by pushing against the individual
and collective will to freedom, truth and self
realization. Plans which assist authoritarian
rule, once discovered, induce resistance. Hence
these plans are concealed by successful
authoritarian powers. This is enough to define
their behavior as conspiratorial.
A. Brady
• if the conspiracy must operate in secrecy, how
is it to communicate, plan, make decisions,
discipline itself, and transform itself to meet
new challenges?
• The answer is: by controlling information
flows.
A. Brady
• if the organization has goals that can be
articulated, articulating them openly exposes
them to resistance.
• But at the same time, failing to articulate
those goals to itself deprives the organization
of its ability to process and advance them.
• Somewhere in the middle, for the
authoritarian conspiracy, is the right balance
of authority and conspiracy.
A. Brady
• [Assange’s] model for imagining the
conspiracy, then, is not at all the cliché that
people mean when they sneer at someone for
being a “conspiracy theorist.” After all, most
the “conspiracies” we’re familiar with are pure
fantasies, and because the “Elders of Zion” or
James Bond’s SPECTRE have never existed,
their nonexistence becomes a cudgel for
beating on people that would ever use the
term or the concept.
A. Brady
• For Assange, by contrast, a conspiracy is something
fairly banal, simply any network of associates who act
in concert by hiding their concerted association from
outsiders, an authority that proceeds by preventing its
activities from being visible enough to provoke
counter-reaction.
• It might be something as dramatic as a loose coalition
of conspirators working to start a war with Iraq/n, or it
might simply be the banal, everyday deceptions and
conspiracies of normal diplomatic procedure.
A. Brady, on Assange’s network
metaphor
• Such a network will not be organized by a flow
chart, nor would it ever produce a single
coherent map of itself (without thereby
hastening its own collapse). It is probably
fairly acephalous, as a matter of course: if it
had a single head (or a singular organizing
mind which could survey and map the
entirety), then every conspirator would be one
step from the boss and a short two steps away
from every other member of the conspiracy.
A. Brady, on Assange’s network
metaphor
• too much centralization makes the system
vulnerable.
• To use The Wire as a ready-to-hand example,
imagine if Avon Barksdale was communicating
directly with Bodie. All you would ever have to do
is turn one person — any person — and you
would be one step away from the boss, whose
direct connection to everyone else in the
conspiracy would allow you to sweep them all up
at once. Obviously, no effective conspiracy would
ever function this way.
A. Brady, on Assange’s network
metaphor
• To function effectively, the primary authority has to be
disassociated from all other members of the
conspiracy, layers of mediation which have to be as
opaque as possible to everyone concerned (which a
paper trail unhelpfully clarifies). But while the
complexity of these linkages shield the directing
authority from exposure, they also limit Avon
Barksdale’s ability to control what’s going on around
him. Businesses run on their paperwork! And the more
walls you build around him, the less he might be able
to trust his lieutenants, and the less they’ll require (or
tolerate) him.
A. Brady, on Assange’s network
metaphor
• This, Assange reasons, is a way to turn a feature
into a bug. And his underlying insight is simple
and, I think, compelling: while an organization
structured by direct and open lines of
communication will be much more vulnerable to
outside penetration, the more opaque it
becomes to itself (as a defense against the
outside gaze), the less able it will be to “think” as
a system, to communicate with itself.
• The more conspiratorial it becomes, in a certain
sense, the less effective it will be as a conspiracy.
A. Brady, on Assange’s network
metaphor
• If you’ve seen The Battle of Algiers, for
example, think of how the French counter-
terrorist people work to produce an
organizational flow chart of the Algerian
resistance movement: since they had
overwhelming military superiority, their
inability to crush the FLN resided in their
inability to find it, an inability which the FLN
strategically works to impede by
decentralizing itself
A. Brady, on Assange’s network
metaphor
• Cutting off one leg of the octopus, the FLN
realized, wouldn’t degrade the system as a
whole if the legs all operated independently. The
links between the units were the vulnerable spots
for the system as a whole, so those were most
closely and carefully guarded and most hotly
pursued by the French. And while the French won
the battle of Algiers, they lost the war, because
they adopted the tactics Assange briefly
mentions only to put aside…
the tactics Assange briefly mentions
only to put aside:
• How can we reduce the ability of a conspiracy
to act?…We can split the conspiracy, reduce or
eliminating important communication
between a few high weight links or many low
weight links. Traditional attacks on
conspiratorial power groupings, such as
assassination, have cut high weight links by
killing, kidnapping, blackmailing or otherwise
marginalizing or isolating some of the
conspirators they were connected to.
Brady on Assange on killing
conspiracies
• This is the US’s counterterrorism strategy —
find the men in charge and get ’em — but
it’s not what Assange wants to do: such a
program would isolate a specific version of the
conspiracy and attempt to destroy the form of
it that already exists, which he argues will
have two important limitations.
Brady on Assange on killing
conspiracies
• For one thing, by the time such a conspiracy has a
form which can be targeted, its ability to function
will be quite advanced. As he notes:
• “A man in chains knows he should have acted
sooner for his ability to influence the actions of
the state is near its end. To deal with powerful
conspiratorial actions we must think ahead and
attack the process that leads to them since the
actions themselves can not be dealt with.”
Brady on Assange on killing
conspiracies
• This is however, not where Assange’s
reasoning leads him. He decides, instead, that
the most effective way to attack this kind of
organization would be to make “leaks” a
fundamental part of the
conspiracy’s information environment.
How to kill conspiracies
1. Cut links, pull nails? Not so much
2. Feed it bad information? No…
So what then?
Brady on killing conspiracies.
• You destroy the conspiracy, in other words, by making
it so paranoid of itself that it can no longer conspire:
• The more secretive or unjust an organization is, the
more leaks induce fear and paranoia in its leadership
and planning coterie. This must result in minimization
of efficient internal communications mechanisms (an
increase in cognitive “secrecy tax”) and consequent
system-wide cognitive decline resulting in decreased
ability to hold onto power as the environment demands
adaption. [Assange]
Assange
• Hence in a world where leaking is easy,
secretive or unjust systems are nonlinearly hit
relative to open, just systems. Since unjust
systems, by their nature induce opponents,
and in many places barely have the upper
hand, mass leaking leaves them exquisitely
vulnerable to those who seek to replace them
with more open forms of governance.
Brady
• Wikileaks wants to provoke the conspiracy into
turning off its own brain in response to the
threat. As it tries to plug its own holes and find
the leakers, he reasons, its component elements
will de-synchronize from and turn against each
other, de-link from the central processing
network, and come undone. Even if all the
elements of the conspiracy still exist, in this
sense, depriving themselves of a vigorous flow of
information to connect them all together as a
conspiracy prevents them from acting as a
conspiracy.
Assange
• If total conspiratorial power is zero, then clearly
there is no information flow between the
conspirators and hence no conspiracy. A
substantial increase or decrease in total
conspiratorial power almost always means what
we expect it to mean; an increase or decrease in
the ability of the conspiracy to think, act and
adapt…An authoritarian conspiracy that cannot
think is powerless to preserve itself against the
opponents it induces.
4. A Primer on Dynamic Systems
in the Military
• The traditional view: Military Organizations
are structured in top-down manner.
• But are they?
Command and Control
Controller
Plant (Battlespace)
State
Esti-
mation
Control
Signals
Command and Control
(with adversary)
Adversary Controller
Plant (Battlespace)
State
Esti-
mation
Control
Signals
Friendly Controller
Control
Signals
State
Esti-
mation
Some historical examples of dynamic
military strategies.
• Napolean: “Contrary to most of the literature
which presents Napolean as a centralizer,
what actually took place was an
unprecedented decentralization of command
from General Headquarters to the corps.”
• Alexander Kott, Advanced Technology
Concepts for Command and Control
Napolean as Decentalizer
• “Though Napolean was perhaps the greatest
military genius who ever lived, even for him to
command eight corps amidst the stress of
battle could prove too much. At Jena in 1806,
for example, he only oversaw the operations
of four, forgetting about the rest, and
operating in complete ignorance of the fact
that one of them (Davout’s) was fighting and
winning a major battle against the Prussians.
Napolean (cont.)
• “At Leipzig in 1813, where he had no fewer
than 180,000 men, he only commanded one
of the three battles that were going on
simultaneously, while letting the other two
take care of themselves.”
• Kott
More Generally
• “The Roman Legions, Napoléan’s Grande
Armée, Moltke’s armies in 1866 (and 1870-
71), and Ludendorff’s storm troops all had this
in common: that they did not wait for detailed
C2 from above. To the contrary, in all four
cases they whole idea was to organize and
train the armies in such a way that they
should be capable of operating when that
command and that control broke down”. Kott,
p. 43

More Related Content

Similar to Hacktivism 6: Networks and Conspiracy

2600 - V01 N01 (january 1984)
2600 - V01 N01 (january 1984)2600 - V01 N01 (january 1984)
2600 - V01 N01 (january 1984)Felipe Prado
 
004 6Na1Pphnb7 Thesis In Essay Thatsnotus
004 6Na1Pphnb7 Thesis In Essay Thatsnotus004 6Na1Pphnb7 Thesis In Essay Thatsnotus
004 6Na1Pphnb7 Thesis In Essay ThatsnotusMelissa Buckley
 
Net governance digital natives newsletter
Net governance   digital natives newsletterNet governance   digital natives newsletter
Net governance digital natives newsletterNilofar Ansher
 
Frankenstein Essay Intro. Online assignment writing service.
Frankenstein Essay Intro. Online assignment writing service.Frankenstein Essay Intro. Online assignment writing service.
Frankenstein Essay Intro. Online assignment writing service.Vickie Weis
 
Walter Mitty Essay.pdf
Walter Mitty Essay.pdfWalter Mitty Essay.pdf
Walter Mitty Essay.pdfKaty Langley
 
Writing Research Papers Ecousarecycling.Com
Writing Research Papers Ecousarecycling.ComWriting Research Papers Ecousarecycling.Com
Writing Research Papers Ecousarecycling.ComErin Rivera
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)Felipe Prado
 
Mathematics and Social Networks
Mathematics and Social NetworksMathematics and Social Networks
Mathematics and Social NetworksMason Porter
 
Funnel paragraph mlk
Funnel paragraph mlkFunnel paragraph mlk
Funnel paragraph mlknstearns
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)Felipe Prado
 
Distributing information in small world networks: Four cases of proves contagion
Distributing information in small world networks: Four cases of proves contagionDistributing information in small world networks: Four cases of proves contagion
Distributing information in small world networks: Four cases of proves contagionSimone Belli
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)Felipe Prado
 
Essay On If Pigs Could Fly. Online assignment writing service.
Essay On If Pigs Could Fly. Online assignment writing service.Essay On If Pigs Could Fly. Online assignment writing service.
Essay On If Pigs Could Fly. Online assignment writing service.Tonya Lomeli
 
Welcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars MagazineWelcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars Magazineinfowarrior78
 
Synthesis Journal Example. How To
Synthesis Journal Example. How ToSynthesis Journal Example. How To
Synthesis Journal Example. How ToCheryl Brown
 
Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.Cola Gigli
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkPeter Wang
 
How To Read And Review A Scientific Journal Article
How To Read And Review A Scientific Journal ArticleHow To Read And Review A Scientific Journal Article
How To Read And Review A Scientific Journal ArticleLuz Martinez
 
Essay On Life History Of Mahatma Gandhi In Hindi
Essay On Life History Of Mahatma Gandhi In HindiEssay On Life History Of Mahatma Gandhi In Hindi
Essay On Life History Of Mahatma Gandhi In HindiTrina Locklear
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Amber Butler
 

Similar to Hacktivism 6: Networks and Conspiracy (20)

2600 - V01 N01 (january 1984)
2600 - V01 N01 (january 1984)2600 - V01 N01 (january 1984)
2600 - V01 N01 (january 1984)
 
004 6Na1Pphnb7 Thesis In Essay Thatsnotus
004 6Na1Pphnb7 Thesis In Essay Thatsnotus004 6Na1Pphnb7 Thesis In Essay Thatsnotus
004 6Na1Pphnb7 Thesis In Essay Thatsnotus
 
Net governance digital natives newsletter
Net governance   digital natives newsletterNet governance   digital natives newsletter
Net governance digital natives newsletter
 
Frankenstein Essay Intro. Online assignment writing service.
Frankenstein Essay Intro. Online assignment writing service.Frankenstein Essay Intro. Online assignment writing service.
Frankenstein Essay Intro. Online assignment writing service.
 
Walter Mitty Essay.pdf
Walter Mitty Essay.pdfWalter Mitty Essay.pdf
Walter Mitty Essay.pdf
 
Writing Research Papers Ecousarecycling.Com
Writing Research Papers Ecousarecycling.ComWriting Research Papers Ecousarecycling.Com
Writing Research Papers Ecousarecycling.Com
 
2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)2600 v08 n2 (summer 1991)
2600 v08 n2 (summer 1991)
 
Mathematics and Social Networks
Mathematics and Social NetworksMathematics and Social Networks
Mathematics and Social Networks
 
Funnel paragraph mlk
Funnel paragraph mlkFunnel paragraph mlk
Funnel paragraph mlk
 
2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)2600 v11 n4 (winter 1994)
2600 v11 n4 (winter 1994)
 
Distributing information in small world networks: Four cases of proves contagion
Distributing information in small world networks: Four cases of proves contagionDistributing information in small world networks: Four cases of proves contagion
Distributing information in small world networks: Four cases of proves contagion
 
2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)2600 v13 n2 (summer 1996)
2600 v13 n2 (summer 1996)
 
Essay On If Pigs Could Fly. Online assignment writing service.
Essay On If Pigs Could Fly. Online assignment writing service.Essay On If Pigs Could Fly. Online assignment writing service.
Essay On If Pigs Could Fly. Online assignment writing service.
 
Welcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars MagazineWelcome to Planet Hoax 8th Issue Infowars Magazine
Welcome to Planet Hoax 8th Issue Infowars Magazine
 
Synthesis Journal Example. How To
Synthesis Journal Example. How ToSynthesis Journal Example. How To
Synthesis Journal Example. How To
 
Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.Synthesis Journal Example. How To. Online assignment writing service.
Synthesis Journal Example. How To. Online assignment writing service.
 
Stories, Myth, and the Humane Network
Stories, Myth, and the Humane NetworkStories, Myth, and the Humane Network
Stories, Myth, and the Humane Network
 
How To Read And Review A Scientific Journal Article
How To Read And Review A Scientific Journal ArticleHow To Read And Review A Scientific Journal Article
How To Read And Review A Scientific Journal Article
 
Essay On Life History Of Mahatma Gandhi In Hindi
Essay On Life History Of Mahatma Gandhi In HindiEssay On Life History Of Mahatma Gandhi In Hindi
Essay On Life History Of Mahatma Gandhi In Hindi
 
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
 

More from Peter Ludlow

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Peter Ludlow
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative GuidancePeter Ludlow
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Peter Ludlow
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismPeter Ludlow
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfarePeter Ludlow
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Peter Ludlow
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in troublePeter Ludlow
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.Peter Ludlow
 

More from Peter Ludlow (10)

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)
 
Digital humanities: Narrative Guidance
Digital humanities: Narrative GuidanceDigital humanities: Narrative Guidance
Digital humanities: Narrative Guidance
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivism
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfare
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018
 
Truth in fanfic
Truth in fanficTruth in fanfic
Truth in fanfic
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in trouble
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Hacktivism 6: Networks and Conspiracy

  • 1. (H)ac(k)tivism 6 Assange, Network Theory, and Conspiracy
  • 2. The Plan 1. A Primer on Network Theory 2. Assange, Networks, and Conspiracy 3. Analysis of Assange on Conspiracy Then… 4. A primer on Dynamic Systems in the Military 5. The Empire Strikes Back!
  • 3. Assange, Networks and Conspiracy • What are Conspiracies? • What are their Harms? • How Can they be dismantled?
  • 4. What are conspiracies? (for JA) • he doesn't mean 'conspiracy' in the usual sense of people sitting around in a room plotting some crime or deception.
  • 5. What are conspiracies? (for JA) • he doesn't mean 'conspiracy' in the usual sense of people sitting around in a room plotting some crime or deception. • As I understand Assange's view it is entirely possible that there could be a conspiracy in which no person in the conspiracy was aware that they were part of the conspiracy.
  • 6. What are conspiracies? (for JA) • he doesn't mean 'conspiracy' in the usual sense of people sitting around in a room plotting some crime or deception. • As I understand Assange's view it is entirely possible that there could be a conspiracy in which no person in the conspiracy was aware that they were part of the conspiracy. • How is this possible?
  • 7. Conspiracy as an emergent property Suppose that you have some information that is valuable -- say some inside information about the financial state of a corporation.
  • 8. Conspiracy as an emergent property Suppose that you have some information that is valuable -- say some inside information about the financial state of a corporation. If you immediately make that information public without acting on it, it is worth nothing to you.
  • 9. Conspiracy as an emergent property Suppose that you have some information that is valuable -- say some inside information about the financial state of a corporation. If you immediately make that information public without acting on it, it is worth nothing to you. On the other hand, if you keep it to yourself you may not fully profit from the information.
  • 10. Conspiracy as an emergent property Ideally, you would like to seek out someone that you could trade the information with, and who you could be sure would keep the information close so that it remained valuable. Let's say that I have similar information and that we trade it.
  • 11. Conspiracy as an emergent property You may trade with other friends and I may do likewise. In each case we have simply traded information for our own benefit, but we have also built a little network of information traders who, hopefully, are keeping the information relatively close and are giving us something equally valuable in kind.
  • 12. Conspiracy as an emergent property We may not know the scope of the network and we may not even realize we are part of a network, but we are, and this network constitutes a conspiracy as Assange understands it.
  • 13. Conspiracy as an emergent property We may not know the scope of the network and we may not even realize we are part of a network, but we are, and this network constitutes a conspiracy as Assange understands it. No one sat down and agreed to form a network of inside information traders -- the network has simply naturally emerged from our local individual bargains. We can say that the network is an emergent property of these bargains.
  • 14. Emergent Conspiracies: example 2 • Suppose that I am a reporter. I would like to have some hot news to report. You agree to give me the inside information, but you do so with the understanding that you and your network friends will act on your information before you give it to me and it becomes worthless when published.
  • 15. Emergent Conspiracies: example 2 • I get my scoop, and you get to control the conditions under which the information is made public. I, as reporter, am now unknowingly part of the conspiracy.
  • 16. Emergent Conspiracies: example 2 • I get my scoop, and you get to control the conditions under which the information is made public. I, as reporter, am now unknowingly part of the conspiracy. • I am participating in the conspiracy by respecting the secrets that the network wishes to keep, and releasing the secrets (and sometimes misinformation) only when it is in the interest of the network to do so. I have become a part of the network, and hence part of the conspiracy.
  • 17. Emergent Conspiracies: example 3 • The network need not start out as a conspiracy.
  • 18. Emergent Conspiracies: example 3 • The network need not start out as a conspiracy. • Suppose that the leader of an Arab country wants the United States to take strong action against Iran. If the Arab leader's people knew he took such a position there would be strong political blowback and resistance (and possible political risk for him), hence he conducts his discussions with the United States in secret.
  • 19. Emergent Conspiracies: example 3 • The network need not start out as a conspiracy. • Suppose that the leader of an Arab country wants the United States to take strong action against Iran. If the Arab leader's people knew he took such a position there would be strong political blowback and resistance (and possible political risk for him), hence he conducts his discussions with the United States in secret. • He has become part of a conspiracy.
  • 20. Assange on Conspiracy Again • These three illustrations all show the central feature of what Assange takes to be a conspiracy -- secrecy and exchange of information within a closed network. • this is conspiracy in the sense of the original etymology of 'conspire' -- as in "breathe with" or "breathe together". • The individuals are acting in concert, whether by plan or not, and the secrecy ensures that the benefits of the network accrue to those inside the network and not outside it.
  • 21. Assange on Networks • “We will use connected graphs as a way to apply our spatial reasoning abilities to political relationships. First take some nails ("conspirators") and hammer them into a board at random. Then take twine ("communication") and loop it from nail to nail without breaking.”
  • 22. Assange on Networks • “Call the twine connecting two nails a link [in network theory an ‘edge’]. Unbroken twine means it is possible to travel from any nail to any other nail via twine and intermediary nails...Information flows from conspirator to conspirator [in network theory a ‘path’].”
  • 23. Assange on Networks • “Not every conspirator trusts or knows every other conspirator even though all are connected. Some are on the fringe of the conspiracy, others are central and communicate with many conspirators and others still may know only two conspirators but be a bridge between important sections or groupings of the conspiracy…” [Conspiracy as Governance, p. 2] [i.e. it is a ‘small worlds network’]
  • 24. Illustration from John Danaher Those outside network are outside conspiracy
  • 25. Assange on Networks • “Conspirators are often discerning, for some trust and depend each other, while others say little. Important information flows frequently through some links, trivial information through others. So we expand our simple connected graph model to include not only links, but their "importance.””
  • 26. Assange on Networks • “Return to our board-and-nails analogy. Imagine a thick heavy cord between some nails and fine light thread between others. Call the importance, thickness or heaviness of a link its weight. Between conspirators that never communicate the weight is zero. The "importance" of communication passing through a link is difficult to evaluate apriori, since its true value depends on the outcome of the conspiracy.”
  • 27. Conspiracies as Cognitive Devices “Conspiracies are cognitive devices. They are able to outthink the same group of individuals acting alone. Conspiracies take information about the world in which they operate (the conspiratorial environment), pass through the conspirators and then act on the result. We can see conspiracies as a type of device that has inputs (information about the environment), a computational network (the conspirators and their links to each other) and outputs (actions intending to change or maintain the environment).” ["Conspiracy as Govenance", p. 3]
  • 28. What’s Wrong with Conspiracies? 1) Problems arise when networks become extremely powerful, because whatever the intentions of the individuals within the network, the network itself is optimized for its own success, and not for the benefit of those outside of the network. Again, this is not by design, it is just an emergent property of such systems that they function in this way.
  • 29. What’s Wrong with Conspiracies? People that do not act to benefit their neighbor nodes in the network will eventually be expunged from the system because their neighbor nodes will minimize contact. Those acting in concert with their neighbor node/conspirators will form stronger ties and will benefit from the information and financial goods that participation in the network delivers.
  • 30. What’s Wrong with Conspiracies? • This is true even at the edges of the network. Reporters that violate the trust of their neighbor nodes in the network will be cut off from the network -- they will no longer get their hot scoops.
  • 31. What’s Wrong with Conspiracies? • Conspirators in the network may think they are working for the benefit of others (the individuals in the military/industrial/congressional complex may well think they are acting for the benefit of the American people, but this only so much self-deception); they are actually acting for the network.
  • 32. What’s Wrong with Conspiracies? 2) Even if you are a member of the network it is not clear that you ultimately benefit except in the obvious ways that one has power and wealth -- the cost of this Faustian bargain is that one must surrender one's creativity.
  • 33. What’s Wrong with Conspiracies? 3) Assange also talk about such networks/conspiracies acting against "people's will to truth, love and self- realization", and here I can only speculate that he means members of the conspiracy are not acting for love of other individuals or for finding truth outside of the network but rather are acting for the survival of the conspiracy/network. If your actions do not ensure the health of the network the network will expunge you.
  • 34. How do we dismantle conspiracies? • The genius insight of Assange is his observation that these conspiracies don't have heads. It is pointless to try and target a single leader, or even a handful of leaders. The conspiracy is a scale free network; it is too hard to take down.
  • 35. How do we dismantle conspiracies? • Let's go back to Assange's illustration of the nails connected by the twine. Imagine that this board had 100 nails all connected by a single length of twine wrapped around the nails. How many nails would you have to pull out before the network of twine fell apart? 10? 20? 50?
  • 36. How do we dismantle conspiracies? • Assange thinks that this is not the way to target the network; Rather what we want to do is to intercept and cut the information flow in the network so that the twine unravels of its own accord.
  • 37. Ways leaking works 1) Once the information flowing is leaked it is no longer closely held and is no longer valuable -- it is no longer a source of power for the network. The network no longer has an advantage.
  • 38. Ways leaking works 1) Once the information flowing is leaked it is no longer closely held and is no longer valuable -- it is no longer a source of power for the network. The network no longer has an advantage. 2) the network may detect a leak, and will act to preserve its information. In this case the network undergoes a kind of fission. It severs the leaky link and in effect separates from the part of the network where the leak occurred.
  • 39. Assange: “How can we reduce the ability of a conspiracy to act?...We can split the conspiracy, reduce or eliminating important communication between a few high weight links or many low weight links.” ["State and Terrorist Conspiracies," Nov. 10, 2006, p. 4]
  • 40. Ways leaking works 3) The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive "secrecy tax") and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption.
  • 41. Assange • Hence in a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. Since unjust systems, by their nature induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance. (The Nonlinear Effects of Leaks on Unjust Systems of Governance." Dec. 21, 2006
  • 42. Open Questions 1) Is it necessarily the case that the conspiracy can't act to the benefit of others? Arab leaders are conspiring with the United States to defeat Iran's nuclear program, but isn't this a good thing?
  • 43. Open Questions 1) Is it necessarily the case that the conspiracy can't act to the benefit of others? Arab leaders are conspiring with the United States to defeat Iran's nuclear program, but isn't this a good thing? Alternatively, it might be observed that rogue states like Iran are often the product of a population's push back against some puppet that was part of a US involving conspiracy (e.g. the Shah of Iran). Perhaps conspiracies end up creating the very rogue states they refer to justify their existence?
  • 44. Open Questions 2) The conspiracy relies on lots of innocent people to do its business (Iraqi civilian informants, for example). Leaking network secrets may put these people at risk. What safeguards should an operation like Wikileaks have to protect such people?
  • 45. Open Questions 2) The conspiracy relies on lots of innocent people to do its business (Iraqi civilian informants, for example). Leaking network secrets may put these people at risk. What safeguards should an operation like Wikileaks have to protect such people? Alternatively, could you argue that if there was no conspiracy such people would not be put at risk in the first place? Is it credible to think that in the long run breaking apart conspiracies protects innocent people from being caught up in dangerous spy games?
  • 46. Open Questions • 3) While acting against the conspiracy might place a cognitive tax on it, does it not also make the network stronger in the end? That is, won't the conspiracy become more secretive and more draconian in its actions?
  • 47. Open Questions 4) To what extent is Wikileaks itself a conspiracy? To this end, are there good conspiracies and bad conspiracies? Should we distinguish between conspiracies of the powerful and conspiracies of those who seek to level the playing field? At what point would a network like Wikileaks become too powerful?
  • 48. Open Questions 5) Suppose Assange were “neutralized.” If Wikileaks is itself a kind of conspiracy then only one nail has been pulled from the board. Will the network unravel? Will it undergo fission resulting in the proliferation of many LittleWikileaks? Or will it lead to copycats and possibly the emergence of Leaker culture? If the latter, then what consequences will there be for traditional conspiracies of the powerful?
  • 49. Danaher’s reconstruction of the argument (1) The goal of a democratic system of governance (or, alternatively, an "ideal system of governance") is to serve the common good (i.e. the good of everybody in society). (2) Conspiracies are self-sustaining closed information networks. (3) These networks will fight for their own survival, not for the common good. (4) Therefore, conspiracies are contrary to the common good.
  • 51. Danaher’s Counterargument I: The Non-Zero Sum Argument (5) Assange's initial argument assumes that survival is a zero-sum game: that one network's (CN's) success comes at another network's loss (CS's) and so must be contrary to the common good. (6) But survival is not a zero-sum game, as is revealed in many models of social and cultural evolution. (7) Therefore, (4) is not necessarily true.
  • 52. Counterargument II: Principal-Agent Alignment of Interests (8) Assange assumes that the interests of the network are necessarily non-aligned or antagonistic to the interests of the broader society. (9) But the network may function as the agent of some principal. (10) Agents are, by definition, supposed to serve the interests of the principal. (11) Therefore, (4) is not necessarily true.
  • 53. Counterargument III: Necessity of Concealed Information in Strategic Interactions (13) Suppose the network (i.e. the government) is the agent of society and so is tasked with serving the common good. (14) Suppose further that the network is engaged in a strategic interaction with another agent (i.e. another government) such as in a military conflict or international treaty negotiation. (15) Concealment of information is often necessary to succeed in strategic interactions. (16) Therefore, a closed, conspiratorial network might be necessary to serve the common good.
  • 54. Aaron Brady on Assange • He begins by positing that conspiracy and authoritarianism go hand in hand, • arguing that since authoritarianism produces resistance to itself — to the extent that its authoritarianism becomes generally known — it can only continue to exist and function by preventing its intentions (the authorship of its authority?) from being generally known. • It inevitably becomes a conspiracy
  • 55. Assange quote • Authoritarian regimes give rise to forces which oppose them by pushing against the individual and collective will to freedom, truth and self realization. Plans which assist authoritarian rule, once discovered, induce resistance. Hence these plans are concealed by successful authoritarian powers. This is enough to define their behavior as conspiratorial.
  • 56. A. Brady • if the conspiracy must operate in secrecy, how is it to communicate, plan, make decisions, discipline itself, and transform itself to meet new challenges? • The answer is: by controlling information flows.
  • 57. A. Brady • if the organization has goals that can be articulated, articulating them openly exposes them to resistance. • But at the same time, failing to articulate those goals to itself deprives the organization of its ability to process and advance them. • Somewhere in the middle, for the authoritarian conspiracy, is the right balance of authority and conspiracy.
  • 58. A. Brady • [Assange’s] model for imagining the conspiracy, then, is not at all the cliché that people mean when they sneer at someone for being a “conspiracy theorist.” After all, most the “conspiracies” we’re familiar with are pure fantasies, and because the “Elders of Zion” or James Bond’s SPECTRE have never existed, their nonexistence becomes a cudgel for beating on people that would ever use the term or the concept.
  • 59. A. Brady • For Assange, by contrast, a conspiracy is something fairly banal, simply any network of associates who act in concert by hiding their concerted association from outsiders, an authority that proceeds by preventing its activities from being visible enough to provoke counter-reaction. • It might be something as dramatic as a loose coalition of conspirators working to start a war with Iraq/n, or it might simply be the banal, everyday deceptions and conspiracies of normal diplomatic procedure.
  • 60. A. Brady, on Assange’s network metaphor • Such a network will not be organized by a flow chart, nor would it ever produce a single coherent map of itself (without thereby hastening its own collapse). It is probably fairly acephalous, as a matter of course: if it had a single head (or a singular organizing mind which could survey and map the entirety), then every conspirator would be one step from the boss and a short two steps away from every other member of the conspiracy.
  • 61. A. Brady, on Assange’s network metaphor • too much centralization makes the system vulnerable. • To use The Wire as a ready-to-hand example, imagine if Avon Barksdale was communicating directly with Bodie. All you would ever have to do is turn one person — any person — and you would be one step away from the boss, whose direct connection to everyone else in the conspiracy would allow you to sweep them all up at once. Obviously, no effective conspiracy would ever function this way.
  • 62. A. Brady, on Assange’s network metaphor • To function effectively, the primary authority has to be disassociated from all other members of the conspiracy, layers of mediation which have to be as opaque as possible to everyone concerned (which a paper trail unhelpfully clarifies). But while the complexity of these linkages shield the directing authority from exposure, they also limit Avon Barksdale’s ability to control what’s going on around him. Businesses run on their paperwork! And the more walls you build around him, the less he might be able to trust his lieutenants, and the less they’ll require (or tolerate) him.
  • 63. A. Brady, on Assange’s network metaphor • This, Assange reasons, is a way to turn a feature into a bug. And his underlying insight is simple and, I think, compelling: while an organization structured by direct and open lines of communication will be much more vulnerable to outside penetration, the more opaque it becomes to itself (as a defense against the outside gaze), the less able it will be to “think” as a system, to communicate with itself. • The more conspiratorial it becomes, in a certain sense, the less effective it will be as a conspiracy.
  • 64. A. Brady, on Assange’s network metaphor • If you’ve seen The Battle of Algiers, for example, think of how the French counter- terrorist people work to produce an organizational flow chart of the Algerian resistance movement: since they had overwhelming military superiority, their inability to crush the FLN resided in their inability to find it, an inability which the FLN strategically works to impede by decentralizing itself
  • 65. A. Brady, on Assange’s network metaphor • Cutting off one leg of the octopus, the FLN realized, wouldn’t degrade the system as a whole if the legs all operated independently. The links between the units were the vulnerable spots for the system as a whole, so those were most closely and carefully guarded and most hotly pursued by the French. And while the French won the battle of Algiers, they lost the war, because they adopted the tactics Assange briefly mentions only to put aside…
  • 66. the tactics Assange briefly mentions only to put aside: • How can we reduce the ability of a conspiracy to act?…We can split the conspiracy, reduce or eliminating important communication between a few high weight links or many low weight links. Traditional attacks on conspiratorial power groupings, such as assassination, have cut high weight links by killing, kidnapping, blackmailing or otherwise marginalizing or isolating some of the conspirators they were connected to.
  • 67. Brady on Assange on killing conspiracies • This is the US’s counterterrorism strategy — find the men in charge and get ’em — but it’s not what Assange wants to do: such a program would isolate a specific version of the conspiracy and attempt to destroy the form of it that already exists, which he argues will have two important limitations.
  • 68. Brady on Assange on killing conspiracies • For one thing, by the time such a conspiracy has a form which can be targeted, its ability to function will be quite advanced. As he notes: • “A man in chains knows he should have acted sooner for his ability to influence the actions of the state is near its end. To deal with powerful conspiratorial actions we must think ahead and attack the process that leads to them since the actions themselves can not be dealt with.”
  • 69. Brady on Assange on killing conspiracies • This is however, not where Assange’s reasoning leads him. He decides, instead, that the most effective way to attack this kind of organization would be to make “leaks” a fundamental part of the conspiracy’s information environment.
  • 70. How to kill conspiracies 1. Cut links, pull nails? Not so much 2. Feed it bad information? No… So what then?
  • 71. Brady on killing conspiracies. • You destroy the conspiracy, in other words, by making it so paranoid of itself that it can no longer conspire: • The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive “secrecy tax”) and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption. [Assange]
  • 72. Assange • Hence in a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. Since unjust systems, by their nature induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance.
  • 73. Brady • Wikileaks wants to provoke the conspiracy into turning off its own brain in response to the threat. As it tries to plug its own holes and find the leakers, he reasons, its component elements will de-synchronize from and turn against each other, de-link from the central processing network, and come undone. Even if all the elements of the conspiracy still exist, in this sense, depriving themselves of a vigorous flow of information to connect them all together as a conspiracy prevents them from acting as a conspiracy.
  • 74. Assange • If total conspiratorial power is zero, then clearly there is no information flow between the conspirators and hence no conspiracy. A substantial increase or decrease in total conspiratorial power almost always means what we expect it to mean; an increase or decrease in the ability of the conspiracy to think, act and adapt…An authoritarian conspiracy that cannot think is powerless to preserve itself against the opponents it induces.
  • 75. 4. A Primer on Dynamic Systems in the Military • The traditional view: Military Organizations are structured in top-down manner. • But are they?
  • 76. Command and Control Controller Plant (Battlespace) State Esti- mation Control Signals
  • 77. Command and Control (with adversary) Adversary Controller Plant (Battlespace) State Esti- mation Control Signals Friendly Controller Control Signals State Esti- mation
  • 78. Some historical examples of dynamic military strategies. • Napolean: “Contrary to most of the literature which presents Napolean as a centralizer, what actually took place was an unprecedented decentralization of command from General Headquarters to the corps.” • Alexander Kott, Advanced Technology Concepts for Command and Control
  • 79. Napolean as Decentalizer • “Though Napolean was perhaps the greatest military genius who ever lived, even for him to command eight corps amidst the stress of battle could prove too much. At Jena in 1806, for example, he only oversaw the operations of four, forgetting about the rest, and operating in complete ignorance of the fact that one of them (Davout’s) was fighting and winning a major battle against the Prussians.
  • 80. Napolean (cont.) • “At Leipzig in 1813, where he had no fewer than 180,000 men, he only commanded one of the three battles that were going on simultaneously, while letting the other two take care of themselves.” • Kott
  • 81. More Generally • “The Roman Legions, Napoléan’s Grande Armée, Moltke’s armies in 1866 (and 1870- 71), and Ludendorff’s storm troops all had this in common: that they did not wait for detailed C2 from above. To the contrary, in all four cases they whole idea was to organize and train the armies in such a way that they should be capable of operating when that command and that control broke down”. Kott, p. 43