Categories
technology

Hardening Democracies against Disinformation and Cyber Vulnerabilities

Context: The next pandemic may be cyber — How Biden administration can stop it Interesting article, but the centralisation of resources and administrative control is a limited and piecemeal assertion over a global and overall systemic problem: • the irreducible, implicit and generally unacknowledged insecurity of digital technologies represents something of a leaking bucket that could […]

Categories
Philosophy

The thing about cyber and conflict…

Insecurity is implicit to – and irreducible in – technology. There is absolutely no way to guarantee complete and permanent closure of *any* communications system because the indefinitely-extensible logical and material basis of accelerating technological innovation is simultaneously the proliferation of increased probabilities of vulnerability and critical incidents. While there is something of a booming […]

Categories
technology

Ransomware Attacks On Hospitals: Acts of War?

Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]

Categories
technology

Cyber: Hidden Patterns

Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]

Categories
technology

COVID-19, Cybersecurity and an Underlying Enigma

“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]

Categories
technology

Technological Overextension: Security, Entropy, Logical Hyperinflation

The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and […]

Categories
technology

Active Measures: information, physics, influence and censorship in cyberspace

It is interesting that active intervention, interdiction and an assertion of ideological self-interest through campaigns of enthusiastic (technologically-facilitated) censorship are probably the most expensive and least efficient ways of achieving information-centric goals. It is like attempting to cool a building by adding cold air – far more expensive in terms of energy, resources and information-processing […]

Categories
technology

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]

Categories
communication culture technology

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this – AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated […]

Categories
communication Philosophy technology

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has – including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems – the more disordered states of entropy that are also possible, indeed – probable within and as […]

Categories
technology

Cyber Insecurity: Endless Breaches

Context: New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report There is an enigma here, far beyond the rank foolishness of keeping vast quantities of such sensitive data in an unencrypted format (see the linked article), there is a deeper problem. The more valuable any data is, the more incentive there […]

Categories
Digital

Unhackable Systems ?

Creating an “unhackable” system is a lofty aspiration; systemic closure is an implicit logical problem.