Categories
technology

Engaging Ransomware

The perceived value of any particular information system, entity or artefact is directly proportional to the combined resources applied to protect it from unauthorised access. It is only as a function of the most simply-conceived models and idealised frameworks that such a dynamical system could ever remain static and unchanging. The reality is that complex […]

Categories
technology

Information Technology is Implicitly Insecure

The discussion that no one (like  anywhere) appears willing to have is that from the very inception of these information technologies, doubt and uncertainty has been endemic and irreducible. Turing’s proof of the implicit undecidability of computation took its recursive cues from Gödel’s prime number shenanigans in the Incompleteness proof. These systems are first and […]

Categories
technology

COVID-19, Cybersecurity and an Underlying Enigma

“The joint statement did not name any of the attacked organizations, but two people familiar with the matter said one of the targets was Gilead, whose antiviral drug remdesivir is the only treatment so far proven to help patients infected with COVID-19. The hacking infrastructure used in the attempt to compromise the Gilead executive’s email […]

Categories
culture information technology

Information Age: Influence and Deception, the Omnipresence of Conflict

A game of information, influence and seeded (or targeted) turbulence is unlikely to be winnable (or won) by reproducing and reinforcing the structural, organisational components that merely reproduce and self-validate the axioms, grammars and rules of that game. These games are won by rewriting the rules; by extending an existing grammar and logical framework in […]

Categories
Digital

Unhackable Systems ?

Creating an “unhackable” system is a lofty aspiration; systemic closure is an implicit logical problem.

Categories
culture

Digital Insecurity is the new Digital Security

The reason that no one has been able to provide sufficient, comprehensive and integrated responses to digital security is that no sufficient, comprehensive and integrated response to digital security actually exists.