This site functions as a public research log.
It defines domains, states methodological positions, and routes readers to formal outputs, publication notices, and archival releases. Speculative discourse is excluded.
The research examines information failure, networked violence, and systemic risk through systems-level questions of feedback, control, coupling, constraint, and instability in digital environments.
“Serious, rigorous, and highly relevant to criminological efforts to understand emerging forms of technologically mediated harm.” — M Jenny Edwards, Criminologist
Networked systems fail for identifiable reasons. These failures arise from interactions among incentives, information asymmetries, propagation dynamics, governance breakdown, and the physical limits governing computation, bandwidth, and energy dissipation in distributed architectures.
This work is engineering-first in orientation. It draws from complex systems, information theory, control theory, optimization dynamics, and failure-mode analysis. The objective is structural clarity translated as definitions, tests, and formal descriptions capable of identifying when a system shifts from evidentiary function toward throughput preservation, distortion, coercion, or escalation.
The work is already legible as a synthesis of cybernetics, information theory, and online harm analysis. What is missing is not intelligibility but category stabilization.
Canonical Notes, Working Papers
“Information is inevitably tied to a physical representation and therefore to restrictions and possibilities related to the laws of physics.” — Rolf Landauer, The Physical Nature of Information (1996).
Current outputs focus on information failure in networked violence, adversarial propagation under high-entropy conditions, audit suppression and chronology breakdown, signal retention at the expense of repair, and stability and instability in large-scale socio-technical systems.
Outputs are developed through texts, formal notes, mathematical fragments, and book-length structures. Detailed derivations, novel formulations, and implementation-level mathematics are published separately in versioned repositories or formal releases.
2026/04/15 Play Darkly. ‘Information Failure Modes in Networked Violence’ 10.5281/zenodo.19599230 https://zenodo.org/records/19599231 Networked Violence, Zoosadism, Nihilistic Violent Extremism, Evidence Laundering, Audit Failure, Chronology Loss, Systemic Risk, Platform Governance
2026/04/06 Play Darkly. A control-theoretic note on harmful engagement systems. (2026). Codeberg. https://codeberg.org/PlayDarkly/regulatory-cost-offloading/src/branch/main
2026/03/26 Play Darkly. (2026). Friction Exclusion in Contamination-Tolerant Advocacy Networks. Codeberg. https://codeberg.org/PlayDarkly/ifmnv-notes/src/branch/main/lemma-friction-exclusion.md
2026/03/26 Print copies now available of: Information Failure Modes in Networked Violence, which documents an ongoing engineering research program focused on failure-mode analysis in networked systems. 1st edition (2026), Play Darkly Imprint. Systems/Platform Design, Criminology, Nihilistic Violent Extremism, Harm Propagation Analysis
2026/03/25 Forbidden Regions and Error-Inducing Inputs in Networked Systems Codeberg. https://codeberg.org/PlayDarkly/error-inducing-input-classes
2026/02/16 Play Darkly. (2026). Structural Coupling as a Stability Condition in Gradient-Optimized Systems (Version 0.1). Codeberg. https://codeberg.org/PlayDarkly/structural-coupling-stability/src/branch/main/docs/tofs-v0.1.m https://codeberg.org/PlayDarkly/structural-coupling-stability
2026/02/11 Play Darkly. (2026). Boundary-Coupled Selection in Adaptive Systems: A Minimal Formal Note (Version 0.1). Codeberg. https://codeberg.org/PlayDarkly/boundary-coupled-selection
