Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]
Context: Facebook: Recommended Principles for Regulation or Legislation to Combat Influence Operations It is a fascinating issue. I suggest that the complexity of the problem far outstrips these assertions of interdiction and oversight. We have seen pretty much the same thing happen in cyber security. Where a property or quality, if not the actual content, […]
In what ways does regulation, interdiction, surveillance and retrospective analysis or definition actually and inadvertently (re)produce the problems it seeks to diminish? Distinctions between legal and illegal are clearly and self-evidently important but in terms of comprehensive analysis and aspirations towards effective problem resolution they may also be a foundational misdirection. It is becoming clear […]
This issue of Fake Brands and commercial “knock-offs” represents interesting problem. These clearly exist on a spectrum that begins with the dodgy Rolex bought from a street vendor and ends with potentially life-threatening fake medicines. Most solutions appear to be retrospective, reactive and post facto attempts to influence behaviour or punish those purposefully profiting from […]
Some reflections occurred to me while listening to this Santa Fe Institute podcast today: Rajiv Sethi on Stereotypes, Crime, and The Pursuit of Justice, What of questions concerning the nature of social, psychological and cultural value systems when considered as a unified whole? While it is clear that the aggregate macrostate of any particular system […]
Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]
This is a fascinating domain of analysis: artificial intelligence, cyber security and cyber crime are locked in a spiralling arc of mutual interdependence and reflexive self-definition, an evolving symmetry of mutual causation. The accelerating hyper-inflation of this logical space is complex, dynamic and non-linear. Asserting core self-organisational principles or symmetries of the self-evident Complex Adaptive […]
Complexity is a lot smarter than we are – all of our ratiobal interdictions into behavioural and sociological problems tend to amplify by displacement those problems.
Context: New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report There is an enigma here, far beyond the rank foolishness of keeping vast quantities of such sensitive data in an unencrypted format (see the linked article), there is a deeper problem. The more valuable any data is, the more incentive there […]
Broken things and imperfect people are often far more interesting than are complete and whole ones…
Identity theft is so rampant now that the oversupply of data makes it quite cheap to purchase.
The road to hell is paved with populist simplicities.