Categories
technology

Information Technology is Implicitly Insecure

The discussion that no one (like  anywhere) appears willing to have is that from the very inception of these information technologies, doubt and uncertainty has been endemic and irreducible. Turing’s proof of the implicit undecidability of computation took its recursive cues from Gödel’s prime number shenanigans in the Incompleteness proof. These systems are first and […]

Categories
technology

Hardening Democracies against Disinformation and Cyber Vulnerabilities

Context: The next pandemic may be cyber — How Biden administration can stop it Interesting article, but the centralisation of resources and administrative control is a limited and piecemeal assertion over a global and overall systemic problem: • the irreducible, implicit and generally unacknowledged insecurity of digital technologies represents something of a leaking bucket that could […]

Categories
Philosophy

The thing about cyber and conflict…

Insecurity is implicit to – and irreducible in – technology. There is absolutely no way to guarantee complete and permanent closure of *any* communications system because the indefinitely-extensible logical and material basis of accelerating technological innovation is simultaneously the proliferation of increased probabilities of vulnerability and critical incidents. While there is something of a booming […]

Categories
technology

Ransomware Attacks On Hospitals: Acts of War?

Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]

Categories
technology

Countering Influence Operations: An Enigma?

Context: Facebook: Recommended Principles for Regulation or Legislation to Combat Influence Operations It is a fascinating issue. I suggest that the complexity of the problem far outstrips these assertions of interdiction and oversight. We have seen pretty much the same thing happen in cyber security. Where a property or quality, if not the actual content, […]

Categories
Philosophy

Semantic Ambiguity

The dynamism and flexibility of language is simultaneously its strength and its weakness. This is a corollary of the abstract/logical and concrete/material extensibility that haunts technology as cyber (in)security but is by no means limited there. It is an irreducibly discontinuous symmetry of uncertainty that plagues all organisations and institutional contexts. The incessant invention of […]

Categories
technology

Cyber: The House Always Wins

Is cyber security a complex game? Of course, it (i.e cyber) is all a game – of probability, of information entropy, of indefinitely-extensible logical or material systems and of successfully negotiating the vast and hyper-inflating, self-gravitating referential spaces of technology, communication and psychological or socioeconomic and ideological motivations that provide momentum here. To attenuate an […]

Categories
technology

Cyber: Hidden Patterns

Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]

Categories
technology

Is it Secure to Store Private Mobile Device COVID Tracking Data with Foreign-Owned Corporations ?

Context: Like many other Governments around the world, the Australian Government is seeking to use mobile device tracking technology to assist suppressing the COVID-19 virus through contact tracing. The Australian Government has found itself as a valuable pawn in a corporate game of power and profiteering. The Australian people have found themselves and their data […]

Categories
technology

COVID-19, Cybersecurity and an Underlying Enigma

“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]

Categories
Philosophy

Cyber: Technology, Information, Identity and Conflict

…as a general observation: All of this (shared) online aspiration to reflexively self-validating identity-construction and participatory meaning-generation masks a howling vacuum of dissimulated subjectivity. We seek self-expression but no such endpoint exists, no epistemogical closure or certainty and (certainly) nothing even vaguely approximating to that monster-image of projected, illusory control that stares back at us […]

Categories
culture technology

The Constancy and Enduring Paranoia of Digital Security Updates

Cyber security is now just a part of everyday life. Update, update, update… all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical […]