Context: The next pandemic may be cyber — How Biden administration can stop it Interesting article, but the centralisation of resources and administrative control is a limited and piecemeal assertion over a global and overall systemic problem: • the irreducible, implicit and generally unacknowledged insecurity of digital technologies represents something of a leaking bucket that could […]
Tag: cybersecurity
The thing about cyber and conflict…
Insecurity is implicit to – and irreducible in – technology. There is absolutely no way to guarantee complete and permanent closure of *any* communications system because the indefinitely-extensible logical and material basis of accelerating technological innovation is simultaneously the proliferation of increased probabilities of vulnerability and critical incidents. While there is something of a booming […]
Implicit and endemic grey-zone ambiguities mean that this might never be attributed to anything other than (yet) another heartlessly self-serving criminal enterprise that is leveraging the inflated value of hospitals and health data during a public health crisis. I expect there are some logical and legal hurdles in defining acts of war this way. Not […]
Cyber: Hidden Patterns
Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]
“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]
The accelerating hyper-inflation of information and communications technology networks and systems is an overextended structural entity. The primary reason it does not immediately collapse back upon itself is the existence of uncertainty, useful ambiguity and logical entropy. The more components and logical relationships we have, the more those systems themselves generate further artefacts, abstractions and […]
It is interesting that active intervention, interdiction and an assertion of ideological self-interest through campaigns of enthusiastic (technologically-facilitated) censorship are probably the most expensive and least efficient ways of achieving information-centric goals. It is like attempting to cool a building by adding cold air – far more expensive in terms of energy, resources and information-processing […]
Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]
Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this – AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts. In information security there is a turn towards entirely automated […]
Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has – including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems – the more disordered states of entropy that are also possible, indeed – probable within and as […]
Cyber Insecurity: Endless Breaches
Context: New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report There is an enigma here, far beyond the rank foolishness of keeping vast quantities of such sensitive data in an unencrypted format (see the linked article), there is a deeper problem. The more valuable any data is, the more incentive there […]
Unhackable Systems ?
Creating an “unhackable” system is a lofty aspiration; systemic closure is an implicit logical problem.