Categories
Philosophy

The thing about cyber and conflict…

Insecurity is implicit to – and irreducible in – technology. There is absolutely no way to guarantee complete and permanent closure of *any* communications system because the indefinitely-extensible logical and material basis of accelerating technological innovation is simultaneously the proliferation of increased probabilities of vulnerability and critical incidents. While there is something of a booming […]

Categories
technology

Ransomware Attacks On Hospitals: Acts of War?

Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]

Categories
technology

Countering Influence Operations: An Enigma?

Context: Facebook: Recommended Principles for Regulation or Legislation to Combat Influence Operations It is a fascinating issue. I suggest that the complexity of the problem far outstrips these assertions of interdiction and oversight. We have seen pretty much the same thing happen in cyber security. Where a property or quality, if not the actual content, […]

Categories
Philosophy

Semantic Ambiguity

The dynamism and flexibility of language is simultaneously its strength and its weakness. This is a corollary of the abstract/logical and concrete/material extensibility that haunts technology as cyber (in)security but is by no means limited there. It is an irreducibly discontinuous symmetry of uncertainty that plagues all organisations and institutional contexts. The incessant invention of […]

Categories
technology

Cyber: The House Always Wins

Is cyber security a complex game? Of course, it (i.e cyber) is all a game – of probability, of information entropy, of indefinitely-extensible logical or material systems and of successfully negotiating the vast and hyper-inflating, self-gravitating referential spaces of technology, communication and psychological or socioeconomic and ideological motivations that provide momentum here. To attenuate an […]

Categories
technology

Cyber: Hidden Patterns

Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]

Categories
technology

Is it Secure to Store Private Mobile Device COVID Tracking Data with Foreign-Owned Corporations ?

Context: Like many other Governments around the world, the Australian Government is seeking to use mobile device tracking technology to assist suppressing the COVID-19 virus through contact tracing. The Australian Government has found itself as a valuable pawn in a corporate game of power and profiteering. The Australian people have found themselves and their data […]

Categories
technology

COVID-19, Cybersecurity and an Underlying Enigma

“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]

Categories
Philosophy

Cyber: Technology, Information, Identity and Conflict

…as a general observation: All of this (shared) online aspiration to reflexively self-validating identity-construction and participatory meaning-generation masks a howling vacuum of dissimulated subjectivity. We seek self-expression but no such endpoint exists, no epistemogical closure or certainty and (certainly) nothing even vaguely approximating to that monster-image of projected, illusory control that stares back at us […]

Categories
culture technology

The Constancy and Enduring Paranoia of Digital Security Updates

Cyber security is now just a part of everyday life. Update, update, update… all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical […]

Categories
technology

Impenetrable Online Encryption: Logic Seeks to Differ

An encrypted internet for all? An impressive technology, to be sure, but the nature and the essence of this game of information assurance and technological systems is surely that – not only does a ratchet up the ladder of sophisticated security add complexity (and an associated information entropy regarding degrees of freedom) to a context […]

Categories
technology

Technological Overextension: Security, Entropy, Logical Hyperinflation

The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and […]