Categories
technology

Cyber: Hidden Patterns

Consider the many ways that the cyber arms-race is precisely this – a procedurally-incremental measure, counter-measure, counter-counter-measure. The hyper-inflating combinatorial possibility space of attack and defence as a gestalt creates it’s own momentum and self-propagating, patterned structure(s) and open or extensible system(s). The evolutionary nature of this process is inescapable. Each act of interdiction then […]

Categories
technology

Is it Secure to Store Private Mobile Device COVID Tracking Data with Foreign-Owned Corporations ?

Context: Like many other Governments around the world, the Australian Government is seeking to use mobile device tracking technology to assist suppressing the COVID-19 virus through contact tracing. The Australian Government has found itself as a valuable pawn in a corporate game of power and profiteering. The Australian people have found themselves and their data […]

Categories
technology

Coronavirus Pandemic effects on the Internet and Virtualisation

During this shared Global challenge that is the COVID-19 pandemic and now – much more than ever before – the internet is our critical information lifeline and tether to the world.  How well is the internet coping with such a sudden and massive hyper-inflation of demand? The internet of popular imagination is an omnipresent amorphous […]

Categories
technology

Unravelling Tapestries of Cryptographic Entropy

The endless unravelling of assurance at one end of this cryptographic tapestry is simultaneously the enduring incentive, obligation and functional necessity of creating more sophisticated and impermeable logical entanglements at the other end. A question which springs to mind is as to the plausible inevitability of an acceleration of applied human or machine intelligence overtaking […]

Categories
culture technology

The Constancy and Enduring Paranoia of Digital Security Updates

Cyber security is now just a part of everyday life. Update, update, update… all this requires is a sufficiently entertaining marketing campaign to elaborate and celebrate the fulfilment of a life spent in the gamified Panopticon of endless technical paranoia and system updates; sitcoms and lifestyle gurus explaining the invaluable personal experience of incessant technical […]

Categories
environment

Climate Change In Security: Insecurity

It may be a matter of social and psychological necessity that this kind of monumental existential threat – to which we have perhaps long been desensitised by repetition and the droning monotony of unnecessarily adversarial ideological and political competition – carry more impact, more information entropy and cultural gravity when they become a tangible, material, […]

Categories
Organisation systems technology

Enigma: When Strength is also Weakness

It is so often the case that the strength and the weakness of a technological or organisational system exist in (and as) that same structural and logical artefacts. The indefinite (recursive) extensibility of all material and logical systems is the foundation of, and cause for, this enigmatic duality.

Categories
systems technology

Cybersecurity’s Unacknowledged Truth

The whole cybersecurity enterprise seems to be built upon a suite of psychological and culturally-reflexive assumptions that assert that there exists even a possibility of logical or systemic closure. No such closure or completion is possible and this is rarely acknowledged.

Categories
technology

“Centaur” Human/AI Teams to Guard Nasdaq

The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which – as the pursuit of profit […]

Categories
technology

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used – compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic coherence […]

Categories
communication culture technology

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this – AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated […]

Categories
culture

Innovation War: Competition, Crime, AI and Security

This is a fascinating domain of analysis: artificial intelligence, cyber security and cyber crime are locked in a spiralling arc of mutual interdependence and reflexive self-definition, an evolving symmetry of mutual causation. The accelerating hyper-inflation of this logical space is complex, dynamic and non-linear.  Asserting core self-organisational principles or symmetries of the self-evident Complex Adaptive […]