“Centaur” Human/AI Teams to Guard Nasdaq

The Nasdaq will now be protected by a centaur team of human analysts and deep learning systems. The broader context of autonomous network and data system defence is clearly an accelerating arms race. If there is sufficient perceived benefit to be derived to offset the cost of development, which - as the pursuit of profit…

Cyber Security and Governance: to Centralise or not to Centralise?

Cyber security is a fascinating and r rapidly evolving problem-space. What possible solutions exist in regards to coordinated governance and oversight? If a centralised software and hardware development methodology iss used - compliance to formal standards could be assured but the (logically and materially inevitable) emergence of vulnerability and exploit would mean that this systemic…

Monday mornings…

...a vast and yawning abyss of commuter futility only partially masked by the endless distraction of engorging ourselves on information artefacts, channels, opinions, fiction and repetition. It is as though we can not even savour our loneliness and feelings of dispossession or pointlessness at all of this cyclical and directionless repetition. The cognitive landscape of…

Engaging Fake News: Information Security, Journalism and Artificial Intelligence

Here is some interesting content on the topic of identifying fake news and media content Verifying online information: The absolute essentials. Related to this - AI is rapidly becoming proficient at generating compelling, targeted falsehoods and dissimulating sources across diverse media artefacts, channels and contexts.  In information security there is a turn towards entirely automated…

Taxonomies, Marmalade and Technology

Taxonomies, the branching logic of binary algorithms and decision-trees that - as though by the stealth of cultural (and commercial) entrainment and that generally unwitting human self-obsession which rarely notices that the rising tide and hyper-inflating menu of choice has become anything but an augmentation of freedom - have flooded us with logical paths and…

The Necessity of Proliferating Vulnerabilities: a General Philosophy of Cyber Security

Compressed: It is something of an inevitability of both logic and of physics that the more components a material system has - including the diverse and recombinatory abstractions and logic of algorithmic, information and energy-processing (i.e. computational) systems - the more disordered states of entropy that are also possible, indeed - probable within and as…

The Reflexive Isolation of this Digital Life

The more technology connects us, the more it isolates us and the more these tools of information and communication allow us to define ourselves and our lives, the more uncertain they leave as to who we are and what (if any) purpose we have in life.  We do not use information technology so much as…

Broken Machines

The image in the mirror of the world is that limited comprehension and linear system by which we might successfully (or at least partially) render our own selves. Taking our own projected image and anachronistic mechanical logic of causal intent or purpose as being a self-evident and unquestionable intuition of the way the world functions,…

Evolving Organisational and Conceptual Systems

A fascinating feature of contemporary organisational systems, and at all scales of magnitude, is the various ways in which they subscribe to a simplistic mechanical and linear model of ontology and operation. It is as though, while everyone and everywhere is more than happy to commercially and politically exploit the Post-Newtonian and Post-Industrial Revolution technologies…

Trapped

As you get older it seems that your options diminish, quite literally and as entropy takes hold the vast numbers of disordered states that you might end up in become less improbable, more certain. It is not so much a matter of age as it is of experience and an aggregate burden of negotiating the…