Categories
Complexity

Power Laws in Cybersecurity

Great graphic (from the people at Information is Beautiful) but it immediately raises a question of just how we measure severity, extent and consequence in this context. Is there an offset and identifiable boundary between naive analysis that concentrates on common as relatively unproblematic or pragmatic metrics and more detailed (yet broader spectrum) analysis that […]

Categories
culture history technology

The Toss of a Coin

All civilisation is built upon the toss of a coin.

Categories
Philosophy

Technological Vulnerability

As every new systemic weakness and information system vulnerability emerges, I can never quite escape a wistful philosophical reflection on the core problems and generalised solutions which might yet exist in this complex space. If vulnerability and insecurity is an endemic and irreducible property of information systems as a function of the intractable presence of […]

Categories
technology

Cybersecurity’s Endless Spinning Wheel

Context: Utah cyberattacks on the rise as millions paid out in new ‘double-extortion’ ransomware schemes Does there ever come a point at which the accelerating combinatorial complexity of this context transcends human aptitude to comprehend and mitigate the hyper-inflating entropy of the problem-space? I imagine that as long as human brains, incentives and motivations are […]

Categories
Philosophy

War

Sunday morning brought this little documentary gem of existential anxiety to my digital doorstep: The future of modern warfare: How technology is transforming conflict. Long gone are the days when a newspaper delivery, thrown from a footpath and having missed its mark might shatter our living room window, allowing us the superficially satisfying retort of […]

Categories
technology

Engaging Ransomware

The perceived value of any particular information system, entity or artefact is directly proportional to the combined resources applied to protect it from unauthorised access. It is only as a function of the most simply-conceived models and idealised frameworks that such a dynamical system could ever remain static and unchanging. The reality is that complex […]

Categories
technology

Information Technology is Implicitly Insecure

The discussion that no one appears willing to have is that from the very inception of these information technologies, doubt and uncertainty has been endemic and irreducible. Turing’s proof of the implicit undecidability of computation took its recursive cues from Gödel’s prime number shenanigans in the Incompleteness proof. These systems are first and foremost open […]

Categories
technology

Hardening Democracies against Disinformation and Cyber Vulnerabilities

Context: The next pandemic may be cyber — How Biden administration can stop it Interesting article, but the centralisation of resources and administrative control is a limited and piecemeal assertion over a global and overall systemic problem: • the irreducible, implicit and generally unacknowledged insecurity of digital technologies represents something of a leaking bucket that could […]

Categories
Philosophy

The thing about cyber and conflict…

Insecurity is implicit to – and irreducible in – technology. There is absolutely no way to guarantee complete and permanent closure of *any* communications system because the indefinitely-extensible logical and material basis of accelerating technological innovation is simultaneously the proliferation of increased probabilities of vulnerability and critical incidents. While there is something of a booming […]

Categories
technology

Ransomware Attacks On Hospitals: Acts of War?

Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]

Categories
technology

Countering Influence Operations: An Enigma?

Context: Facebook: Recommended Principles for Regulation or Legislation to Combat Influence Operations It is a fascinating issue. I suggest that the complexity of the problem far outstrips these assertions of interdiction and oversight. We have seen pretty much the same thing happen in cyber security. Where a property or quality, if not the actual content, […]

Categories
Philosophy

Semantic Ambiguity

The dynamism and flexibility of language is simultaneously its strength and its weakness. This is a corollary of the abstract/logical and concrete/material extensibility that haunts technology as cyber (in)security but is by no means limited there. It is an irreducibly discontinuous symmetry of uncertainty that plagues all organisations and institutional contexts. The incessant invention of […]