Cyber: Technology, Information, Identity and Conflict

...as a general observation: All of this (shared) online aspiration to reflexively self-validating identity-construction and participatory meaning-generation masks a howling vacuum of dissimulated subjectivity. We seek self-expression but no such endpoint exists, no epistemogical closure or certainty and (certainly) nothing even vaguely approximating to that monster-image of projected, illusory control that stares back at us…

The Constancy and Enduring Paranoia of Digital Security Updates

Cyber security is now just a part of everyday life. Update, update, update... all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical…

Impenetrable Online Encryption: Logic Seeks to Differ

An encrypted internet for all? An impressive technology, to be sure, but the nature and the essence of this game of information assurance and technological systems is surely that - not only does a ratchet up the ladder of sophisticated security add complexity (and an associated information entropy regarding degrees of freedom) to a context…

Technological Overextension: Security, Entropy, Logical Hyperinflation

The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and…

“Centaur” Human/AI Teams to Guard Nasdaq

The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which - as the pursuit of profit…

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used - compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence…

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this - AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated…

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has - including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems - the more disordered states of entropy that are also possible, indeed - probable within and as…

Cyber Insecurity: Endless Breaches

Context: New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report There is an enigma here, far beyond the rank foolishness of keeping vast quantities of such sensitive data in an unencrypted format (see the linked article), there is a deeper problem. The more valuable any data is, the more incentive there…