Government Cloud Authors: Liz McMillan, Gopala Krishna Behara, Raju Myadam, Kevin Jackson, Carmen Gonzalez

Related Topics: Cloud Security, Government Cloud

Cloud Security: Blog Feed Post

How Cyberpunk Killed Cybersecurity

Remaining stuck in the cyberpunk view of cyberspace makes us miss the solution

This post is co-written by and Alex Olesker.

Before we begin, please understand just how hard it is for us to write this blog. I’ve read Neuromancer countless times, enthusiastically used Snow Crash in undergrad to talk about the future of international relations, and watched both Ghost in the Shell movies and the Stand Alone Complex (seasons 1 and 2) countless times. I am psyched for the Robocop remake and even (if you get me started) rave about obscure movies like Strange Days. I’ve convinced countless friends and significant others to watch Blade Runner and used to have a Tachikoma toy. And recently, Alex and I rewatched a large chunk of the series and compared the “Laughing Man Incident” to the birth of Anonymous.

But as I was discussing with Alex one day, we both came to realize that the movies, television shows, and manga comics that inspired us to write and work in this area were also holding us back. That’s right. Cyber is, as we’ve discussed before here at CTOVision, a very future-oriented field. It’s not surprising that our basic perceptions of it would also be formed by science fiction. But this has some adverse effects for defense policymakers, CTOs, and other people interested in cyber. I wrote a piece for Mike Tanji’s site a long time ago about the problem of “legacy futures” in cyberspace. Essentially, legacy futures are old visions of the past that no longer keep pace with the present. But they act as a deadweight drag on the policy process because they have essentially colonized our imaginations. This manifests itself not only half-baked ideas like “cyber arms control” that rely on Cold War legacy futures that compare code to nuclear missiles, but also in fundamental aspects of how we think about cyberspace.

In his essay, “The Myth of Cyberspace,” PJ Rey argues that William Gibson conceptualized cyberspace in a fundamentally wrongheaded way that still influences cyber policy:

Gibson’s cyberspace is an imaginary setting where information takes on some of the properties of matter. Yet, cyberspace is transcendent; it requires leaving behind the body and the physical world that contains it. When hackers “jack in,” they are no longer conscious of the physical world. The hacker trades a physical body and environment for one constructed of digital information. It is important to note that, as the cyberpunk genre evolved, it increasingly wrestled with forms of consciousness that blended sensory inputs from physical and digital sources. Nevertheless, cyberspace, as an ideal type, involves total separation of physical and digital.

The logical implications of this metaphysical perspective on cyberspace are a perspective of “digital dualism.”  The problem for digital dualists is that, despite sci-fi visions of hackers floating in an ethereal cyberspace that is completely distinctive from “meatspace,” our digital interactions are fundamentally embodied. As Sam Liles has often noted, we interact with other people in cyberspace through devices. Cyberspace is only as much of an artificial or “man-made” environment as the sea is. And just like nations control the sea around them, real world experiences, laws, and regulations create digital outcomes, as SOPA opponents unhappily discovered. Mexicans killed by cartel henchmen for their social media use also are a data point that suggests that there is no real separation between cyberspace and “meatspace.” Rey has an excellent discussion in his article on how the entire market of location-based services on mobile devices and the way people can be tracked through geolocating is in and of itself proof that we are embodied in cyberspace.

As Rey suggests, Bruce Sterling is more realistic in describing cyberspace as a function of a human need to overcome the alienation induced by long-range communications. We want to imagine something in between the space in which our telegraph, telephone, or Google Chat conversations occur. Such a space does not really exist, but we have a psychological need to fill that space to overcome our sense of alienation at conducting a conversation with someone else we can neither see nor directly interact with. Cyberspace is a fantasy, but it’s made real in our minds and actions by us treating it as such.  Rey again explains it:

The fantasy of cyberspace is “serious” because it is cognitively necessary. It relieves us of the burden of having to parse the seemingly infinite complexity of the systems that make such communication possible. This kind of fantasizing is a counterpart to what sociologist Anthony Giddens calls the “bargain with modernity.” Giddens believes that our modern lives are characterized by an endless series of risks (e.g., driving a car, stepping into an elevator, taking medicine, etc.) because it is not possible for any one individual to understand all the minute complexities of the myriad technological systems we depend on every day, we must place our trust (and our very lives) in the hands of experts. Trust is our basic conscious mechanism for dealing with such complexities; denial is its unconscious counterpart. Fantasy gives substance to this denial. Part of the seductiveness of the cyberspace fantasy is that, by denying the complex, mutually determining relationship between our society and the Web, it makes our lives and our everyday judgments simpler.

Now Rey has the cultural implications of digital dualism down cold. What are the policy implications? The first is the inability to see the very real similarities between all things “cyber” and everything else. Most petty crimes are never solved, so why should we be surprised that cybercrimes go mostly unpunished? Is there a very big difference between someone stealing your bike from the local DC bikeshare because they had figured out a vulnerability that not even the lock manufacturer suspected and a zero-day exploit? And when it comes down to who should have organizational responsibility for law enforcement or military aspects of cyber conflict, the myth of cyberspace as a corporeal thing that we enter into via digital, disembodied avatars has immense consequences.

The conception of cyberspace as a separate plane also perverts our analysis on real risks and mitigation. Just as the real strategic value of the sea is its ability to effect events on land through embargoes, bombardments, transport, and other such means, a serious cyber attack won’t disable World of Warcraft to kill digital orcs, it would disable a hospital intensive care unit to kill real patients. The reverse is also true as the physical world can affect what happens in cyberspace. Digital dualism is the fallacy behind air gapping’s poor track record. Often, the most critical networks such as industrial control systems, are not connected to the Internet and hence thought invulnerable to cyber attack. Yet as cyberspace is not a real place, you can’t actually leave an air gap, and because human beings and machines interact with both “air gapped” and connected networks, attacks still get through via removable drives, personal devices, and temporary connections. One recent example was the virus that attacked the U.S. drone fleet in September, which got into the “air gapped” cockpits via USB drives.

Along with misrepresenting the threat, remaining stuck in the cyberpunk view of cyberspace makes us miss the solution. As pioneers in cyber law enforcement have learned, just because the crime was committed electronically does not mean that the investigation has to be limited to cyberspace. Just as some of the most notable hacks are the result of social engineering, most major cyber crime investigations hinge on physical evidence, informants, and undercover officers. Similarly, while attribution may be complicated in cyberspace, it tends to be much simpler in meatspace. we can safely assume that the party which most stands to benefit is behind a cyber attack, and it will be easy to track who’s behind a “cyber Pearl Harbor” because they will be the ones massing their troops at the border.

This isn’t to deny that there are important differences between cyberspace as a domain of conflict from other forms – hence our earlier giggling at the idea that the arms control community could treat bits of code like missiles or biological weapons. You aren’t going to have Hans Blix do on-the-spot inspections of Russian and Chinese internet cafes or the UN Security Council discussing the finer points of 4chan posts with Guy Fawkes mask-wearing Anonymous hackers. But digital dualism disables us from using our best weapon against cybercriminals and enemy cyberwarriors–the common sense we’ve developed through dealing with similar technologies, crimes, weapons, and strategic situations. And for that reason, maybe it’s time that we save our mirrored shades and Depeche Mode CDs for VHS 80s’ retrospectives and look with fresh eyes at cyberspace.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder and partner at Cognitio Corp and publsher of CTOvision.com

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
DX World EXPO, LLC, a Lighthouse Point, Florida-based startup trade show producer and the creator of "DXWorldEXPO® - Digital Transformation Conference & Expo" has announced its executive management team. The team is headed by Levent Selamoglu, who has been named CEO. "Now is the time for a truly global DX event, to bring together the leading minds from the technology world in a conversation about Digital Transformation," he said in making the announcement.
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Conference Guru has been named “Media Sponsor” of the 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to gre...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develop...
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, led attendees through the exciting evolution of the cloud. He looked at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering m...
"Evatronix provides design services to companies that need to integrate the IoT technology in their products but they don't necessarily have the expertise, knowledge and design team to do so," explained Adam Morawiec, VP of Business Development at Evatronix, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. In his session at @BigDataExpo, Jack Norris, Senior Vice President, Data and Applications at MapR Technologies, reviewed best practices to ...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX Foundry is unifying the community around a common IoT edge framework and an ecosystem of interoperable components.
Large industrial manufacturing organizations are adopting the agile principles of cloud software companies. The industrial manufacturing development process has not scaled over time. Now that design CAD teams are geographically distributed, centralizing their work is key. With large multi-gigabyte projects, outdated tools have stifled industrial team agility, time-to-market milestones, and impacted P&L stakeholders.
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
22nd International Cloud Expo, taking place June 5-7, 2018, at the Javits Center in New York City, NY, and co-located with the 1st DXWorld Expo will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud ...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
"MobiDev is a software development company and we do complex, custom software development for everybody from entrepreneurs to large enterprises," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, discussed how from store operations and ...
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
SYS-CON Events announced today that Telecom Reseller has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5-7, 2018, at the Javits Center in New York, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.