Categories
technology

Cyber: Hidden Patterns

Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]

Categories
technology

COVID-19, Cybersecurity and an Underlying Enigma

“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]

Categories
technology

Technological Overextension: Security, Entropy, Logical Hyperinflation

The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and […]

Categories
technology

Active Measures: information, physics, influence and censorship in cyberspace

It is interesting that active intervention, interdiction and an assertion of ideological self-interest through campaigns of enthusiastic (technologically-facilitated) censorship are probably the most expensive and least efficient ways of achieving information-centric goals. It is like attempting to cool a building by adding cold air – far more expensive in terms of energy, resources and information-processing […]

Categories
technology

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]

Categories
communication culture technology

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this – AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated […]

Categories
communication Philosophy technology

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has – including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems – the more disordered states of entropy that are also possible, indeed – probable within and as […]

Categories
technology

Cyber Insecurity: Endless Breaches

Context: New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report There is an enigma here, far beyond the rank foolishness of keeping vast quantities of such sensitive data in an unencrypted format (see the linked article), there is a deeper problem. The more valuable any data is, the more incentive there […]

Categories
Digital

Unhackable Systems ?

Creating an “unhackable” system is a lofty aspiration; systemic closure is an implicit logical problem.

Categories
culture

Stealthy Hackers

Cybersecurity is an iterative, recombinatory and open-ended logical process.