Categories
technology

Machine Intelligence as Criminal Mastermind?

Context: The Criminal Potential of Artificial Intelligence Beyond autonomous cybernetic system as tool or aperture of adversarial vulnerability lies the distinct possibility of AI as malevolent criminal mastermind. Notwithstanding the current paucity of anything even vaguely resembling Artificial General Intelligence, and regardless of our best (and worst) aspirations to benchmark and bootstrap this technology into […]

Categories
technology

Cybersecurity’s Endless Spinning Wheel

Context: Utah cyberattacks on the rise as millions paid out in new ‘double-extortion’ ransomware schemes Does there ever come a point at which the accelerating combinatorial complexity of this context transcends human aptitude to comprehend and mitigate the hyper-inflating entropy of the problem-space? I imagine that as long as human brains, incentives and motivations are […]

Categories
technology

Engaging Ransomware

The perceived value of any particular information system, entity or artefact is directly proportional to the combined resources applied to protect it from unauthorised access. It is only as a function of the most simply-conceived models and idealised frameworks that such a dynamical system could ever remain static and unchanging. The reality is that complex […]

Categories
technology

Information Technology is Implicitly Insecure

The discussion that no one appears willing to have is that from the very inception of these information technologies, doubt and uncertainty has been endemic and irreducible. Turing’s proof of the implicit undecidability of computation took its recursive cues from Gödel’s prime number shenanigans in the Incompleteness proof. These systems are first and foremost open […]

Categories
technology

Ransomware Attacks On Hospitals: Acts of War?

Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]

Categories
technology

Countering Influence Operations: An Enigma?

Context: Facebook: Recommended Principles for Regulation or Legislation to Combat Influence Operations It is a fascinating issue. I suggest that the complexity of the problem far outstrips these assertions of interdiction and oversight. We have seen pretty much the same thing happen in cyber security. Where a property or quality, if not the actual content, […]

Categories
Alien Anthropology

Is Law in a Symbiotic Relationship with Crime ?

In what ways does regulation, interdiction, surveillance and retrospective analysis or definition actually and inadvertently (re)produce the problems it seeks to diminish? Distinctions between legal and illegal are clearly and self-evidently important but in terms of comprehensive analysis and aspirations towards effective problem resolution they may also be a foundational misdirection. It is becoming clear […]

Categories
Alien Anthropology

Countering Fake Brands

This issue of Fake Brands and commercial “knock-offs” represents interesting problem. These clearly exist on a spectrum that begins with the dodgy Rolex bought from a street vendor and ends with potentially life-threatening fake medicines. Most solutions appear to be retrospective, reactive and post facto attempts to influence behaviour or punish those purposefully profiting from […]

Categories
culture

Social Computation, Complexity and the Constructive Necessity of Dissonance

Some reflections occurred to me while listening to this Santa Fe Institute podcast today: Rajiv Sethi on Stereotypes, Crime, and The Pursuit of Justice, What of questions concerning the nature of social, psychological and cultural value systems when considered as a unified whole? While it is clear that the aggregate macrostate of any particular system […]

Categories
technology

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]

Categories
culture

Innovation War: Competition, Crime, AI and Security

This is a fascinating domain of analysis: artificial intelligence, cyber security and cyber crime are locked in a spiralling arc of mutual interdependence and reflexive self-definition, an evolving symmetry of mutual causation. The accelerating hyper-inflation of this logical space is complex, dynamic and non-linear.  Asserting core self-organisational principles or symmetries of the self-evident Complex Adaptive […]

Categories
Philosophy

A Science of Entropy: Anger, Bureaucracy and Systemic Self-Propagation

Complexity is a lot smarter than we are – all of our ratiobal interdictions into behavioural and sociological problems tend to amplify by displacement those problems.