Context: ‘This is not science fiction,’ say scientists pushing for ‘neuro-rights’ Dystopian authoritarian visions notwithstanding, there is a strong philosophical argument to be made that consciousness, sentience or intelligence only possesses the value (and, indeed, the substantive reality) it does because there are aspects of self and indeed of complex systems self-organisation that are not […]
Insecurity is implicit to – and irreducible in – technology. There is absolutely no way to guarantee complete and permanent closure of *any* communications system because the indefinitely-extensible logical and material basis of accelerating technological innovation is simultaneously the proliferation of increased probabilities of vulnerability and critical incidents. While there is something of a booming […]
Is cyber security a complex game? Of course, it (i.e cyber) is all a game – of probability, of information entropy, of indefinitely-extensible logical or material systems and of successfully negotiating the vast and hyper-inflating, self-gravitating referential spaces of technology, communication and psychological or socioeconomic and ideological motivations that provide momentum here. To attenuate an […]
Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]
Context: Like many other Governments around the world, the Australian Government is seeking to use mobile device tracking technology to assist suppressing the COVID-19 virus through contact tracing. The Australian Government has found itself as a valuable pawn in a corporate game of power and profiteering. The Australian people have found themselves and their data […]
During this shared Global challenge that is the COVID-19 pandemic and now – much more than ever before – the internet is our critical information lifeline and tether to the world. How well is the internet coping with such a sudden and massive hyper-inflation of demand? The internet of popular imagination is an omnipresent amorphous […]
The endless unravelling of assurance at one end of this cryptographic tapestry is simultaneously the enduring incentive, obligation and functional necessity of creating more sophisticated and impermeable logical entanglements at the other end. A question which springs to mind is as to the plausible inevitability of an acceleration of applied human or machine intelligence overtaking […]
Cyber security is now just a part of everyday life. Update, update, update… all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical […]
It may be a matter of social and psychological necessity that this kind of monumental existential threat – to which we have perhaps long been desensitised by repetition and the droning monotony of unnecessarily adversarial ideological and political competition – carry more impact, more information entropy and cultural gravity when they become a tangible, material, […]
It is so often the case that the strength and the weakness of a technological or organisational system exist in (and as) that same structural and logical artefacts. The indefinite (recursive) extensibility of all material and logical systems is the foundation of, and cause for, this enigmatic duality.
The whole cybersecurity enterprise seems to be built upon a suite of psychological and culturally-reflexive assumptions that assert that there exists even a possibility of logical or systemic closure. No such closure or completion is possible and this is rarely acknowledged.
The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which – as the pursuit of profit […]