Government Cloud Authors: Elizabeth White, Liz McMillan, Gopala Krishna Behara, Raju Myadam, Kevin Jackson

Related Topics: Cloud Security, Government Cloud

Cloud Security: Blog Feed Post

How Cyberpunk Killed Cybersecurity

Remaining stuck in the cyberpunk view of cyberspace makes us miss the solution

This post is co-written by and Alex Olesker.

Before we begin, please understand just how hard it is for us to write this blog. I’ve read Neuromancer countless times, enthusiastically used Snow Crash in undergrad to talk about the future of international relations, and watched both Ghost in the Shell movies and the Stand Alone Complex (seasons 1 and 2) countless times. I am psyched for the Robocop remake and even (if you get me started) rave about obscure movies like Strange Days. I’ve convinced countless friends and significant others to watch Blade Runner and used to have a Tachikoma toy. And recently, Alex and I rewatched a large chunk of the series and compared the “Laughing Man Incident” to the birth of Anonymous.

But as I was discussing with Alex one day, we both came to realize that the movies, television shows, and manga comics that inspired us to write and work in this area were also holding us back. That’s right. Cyber is, as we’ve discussed before here at CTOVision, a very future-oriented field. It’s not surprising that our basic perceptions of it would also be formed by science fiction. But this has some adverse effects for defense policymakers, CTOs, and other people interested in cyber. I wrote a piece for Mike Tanji’s site a long time ago about the problem of “legacy futures” in cyberspace. Essentially, legacy futures are old visions of the past that no longer keep pace with the present. But they act as a deadweight drag on the policy process because they have essentially colonized our imaginations. This manifests itself not only half-baked ideas like “cyber arms control” that rely on Cold War legacy futures that compare code to nuclear missiles, but also in fundamental aspects of how we think about cyberspace.

In his essay, “The Myth of Cyberspace,” PJ Rey argues that William Gibson conceptualized cyberspace in a fundamentally wrongheaded way that still influences cyber policy:

Gibson’s cyberspace is an imaginary setting where information takes on some of the properties of matter. Yet, cyberspace is transcendent; it requires leaving behind the body and the physical world that contains it. When hackers “jack in,” they are no longer conscious of the physical world. The hacker trades a physical body and environment for one constructed of digital information. It is important to note that, as the cyberpunk genre evolved, it increasingly wrestled with forms of consciousness that blended sensory inputs from physical and digital sources. Nevertheless, cyberspace, as an ideal type, involves total separation of physical and digital.

The logical implications of this metaphysical perspective on cyberspace are a perspective of “digital dualism.”  The problem for digital dualists is that, despite sci-fi visions of hackers floating in an ethereal cyberspace that is completely distinctive from “meatspace,” our digital interactions are fundamentally embodied. As Sam Liles has often noted, we interact with other people in cyberspace through devices. Cyberspace is only as much of an artificial or “man-made” environment as the sea is. And just like nations control the sea around them, real world experiences, laws, and regulations create digital outcomes, as SOPA opponents unhappily discovered. Mexicans killed by cartel henchmen for their social media use also are a data point that suggests that there is no real separation between cyberspace and “meatspace.” Rey has an excellent discussion in his article on how the entire market of location-based services on mobile devices and the way people can be tracked through geolocating is in and of itself proof that we are embodied in cyberspace.

As Rey suggests, Bruce Sterling is more realistic in describing cyberspace as a function of a human need to overcome the alienation induced by long-range communications. We want to imagine something in between the space in which our telegraph, telephone, or Google Chat conversations occur. Such a space does not really exist, but we have a psychological need to fill that space to overcome our sense of alienation at conducting a conversation with someone else we can neither see nor directly interact with. Cyberspace is a fantasy, but it’s made real in our minds and actions by us treating it as such.  Rey again explains it:

The fantasy of cyberspace is “serious” because it is cognitively necessary. It relieves us of the burden of having to parse the seemingly infinite complexity of the systems that make such communication possible. This kind of fantasizing is a counterpart to what sociologist Anthony Giddens calls the “bargain with modernity.” Giddens believes that our modern lives are characterized by an endless series of risks (e.g., driving a car, stepping into an elevator, taking medicine, etc.) because it is not possible for any one individual to understand all the minute complexities of the myriad technological systems we depend on every day, we must place our trust (and our very lives) in the hands of experts. Trust is our basic conscious mechanism for dealing with such complexities; denial is its unconscious counterpart. Fantasy gives substance to this denial. Part of the seductiveness of the cyberspace fantasy is that, by denying the complex, mutually determining relationship between our society and the Web, it makes our lives and our everyday judgments simpler.

Now Rey has the cultural implications of digital dualism down cold. What are the policy implications? The first is the inability to see the very real similarities between all things “cyber” and everything else. Most petty crimes are never solved, so why should we be surprised that cybercrimes go mostly unpunished? Is there a very big difference between someone stealing your bike from the local DC bikeshare because they had figured out a vulnerability that not even the lock manufacturer suspected and a zero-day exploit? And when it comes down to who should have organizational responsibility for law enforcement or military aspects of cyber conflict, the myth of cyberspace as a corporeal thing that we enter into via digital, disembodied avatars has immense consequences.

The conception of cyberspace as a separate plane also perverts our analysis on real risks and mitigation. Just as the real strategic value of the sea is its ability to effect events on land through embargoes, bombardments, transport, and other such means, a serious cyber attack won’t disable World of Warcraft to kill digital orcs, it would disable a hospital intensive care unit to kill real patients. The reverse is also true as the physical world can affect what happens in cyberspace. Digital dualism is the fallacy behind air gapping’s poor track record. Often, the most critical networks such as industrial control systems, are not connected to the Internet and hence thought invulnerable to cyber attack. Yet as cyberspace is not a real place, you can’t actually leave an air gap, and because human beings and machines interact with both “air gapped” and connected networks, attacks still get through via removable drives, personal devices, and temporary connections. One recent example was the virus that attacked the U.S. drone fleet in September, which got into the “air gapped” cockpits via USB drives.

Along with misrepresenting the threat, remaining stuck in the cyberpunk view of cyberspace makes us miss the solution. As pioneers in cyber law enforcement have learned, just because the crime was committed electronically does not mean that the investigation has to be limited to cyberspace. Just as some of the most notable hacks are the result of social engineering, most major cyber crime investigations hinge on physical evidence, informants, and undercover officers. Similarly, while attribution may be complicated in cyberspace, it tends to be much simpler in meatspace. we can safely assume that the party which most stands to benefit is behind a cyber attack, and it will be easy to track who’s behind a “cyber Pearl Harbor” because they will be the ones massing their troops at the border.

This isn’t to deny that there are important differences between cyberspace as a domain of conflict from other forms – hence our earlier giggling at the idea that the arms control community could treat bits of code like missiles or biological weapons. You aren’t going to have Hans Blix do on-the-spot inspections of Russian and Chinese internet cafes or the UN Security Council discussing the finer points of 4chan posts with Guy Fawkes mask-wearing Anonymous hackers. But digital dualism disables us from using our best weapon against cybercriminals and enemy cyberwarriors–the common sense we’ve developed through dealing with similar technologies, crimes, weapons, and strategic situations. And for that reason, maybe it’s time that we save our mirrored shades and Depeche Mode CDs for VHS 80s’ retrospectives and look with fresh eyes at cyberspace.

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Archi...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...
JETRO showcased Japan Digital Transformation Pavilion at SYS-CON's 21st International Cloud Expo® at the Santa Clara Convention Center in Santa Clara, CA. The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
"Akvelon is a software development company and we also provide consultancy services to folks who are looking to scale or accelerate their engineering roadmaps," explained Jeremiah Mothersell, Marketing Manager at Akvelon, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
DXWorldEXPO LLC announced today that ICC-USA, a computer systems integrator and server manufacturing company focused on developing products and product appliances, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of ...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
Founded in 2000, Chetu Inc. is a global provider of customized software development solutions and IT staff augmentation services for software technology providers. By providing clients with unparalleled niche technology expertise and industry experience, Chetu has become the premiere long-term, back-end software development partner for start-ups, SMBs, and Fortune 500 companies. Chetu is headquartered in Plantation, Florida, with thirteen offices throughout the U.S. and abroad.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...