CyberTalk 6 - The Sci-Fi Special

Page 1

AN SBL PUBLICATION

Issue #6

Autumn 2014

Produced with the kind support of

THE SCI-FI ISSUE FEAT. CORY DOCTOROW // MURRAY LEINSTER // COLIN WILLIAMS // NOEL SHARKEY AND MANY MORE...


Take a test-drive today Register for your vSphere with Operations Management Optimization Assessment and get a customised report that demonstrates how you can: Drive innovation by accelerating app performance Predict, pre-empt and prevent performance issues – increasing the service levels you deliver to the business and freeing you from firefighting to pursue innovation.

Power-up innovation

Save costs with agile responses to changing conditions Reclaim capacity from over-sized or idle VMs and increase VM density without performance risks to…

…cut hardware costs by 30%

Accelerate issue resolution with one unified dashboard For the first time you’ll gain exceptional visibility and control across VMs. So you can conduct rapid root-cause analysis and…

…cut time to problem resolution by 26%

Book Now Your test-drive includes a report which clearly demonstrates the business benefits you will gain. Call SBL on 01347 812100 or email enquirJes@softbox.co.uk to register. Want to know more about vSphere with Operations Management right now? Download your ‘6 Tasks You Can’t Do With Traditional IT Tools’ infographic at: www.softbox.co.uk

© VMware 2014


Welcome

The Stuff of

Dreams

“CyberTalk” exists to allow new voices to be heard saying new things about cyber. It is part of a wider project to transform our understanding of the cyber phenomenon. This phenomenon is new in its apparent manifestation in the actuality of our daily existence. However, it formed decades ago in the minds of those who imagined, designed and built the computers upon which it exists. In these minds, it is the very reason for which these computers were GVIEXIH MR XLI ½ VWX TPEGI

power of ideas to conjure forth the greatest evil, and the greatest good. They had watched, from the eye of the storm, as humanity had stood on the edge of catastrophe. They imagined a better world. They gave us the means to realise their vision; machines to make their imaginings real. 7S [L] WGMIRGI ½ GXMSR# &IGEYWI MHIEW EVI XLI MRLEFMXERXW of minds. Ideas are blissfully ignorant of their arbitrary, LYQER GEXIKSVMWEXMSR EW JEGXW SV ½ GXMSRW 8IGLRSPSK] MW XLI application of science to the satisfaction of human need; science expressed in forms and shapes moulded by human hands and human imagination. Ideas are the language of the imagination. Art is a vital source of the vocabulary of that language where science provides its grammar.

Foremost amongst these minds were those of Alan Turing, Norbert Wiener, Vannevar Bush, John von Neumann and J. C. R. Licklider. Foremost within these minds were questions about humans and their relationships to information and to machines. Uniting these minds was a shared sense that great improvements to the human faculty to store, process and communicate information could, and would, be brought about by new machines; universal, stored programme, electronic computers. Uniting these minds was a shared vision; the formation of a relationship between humans and these new electronic machine brains; the creation of a reciprocally transformative symbiosis; the opening of the next chapter of human evolution; a vision realised in cyber.

“CyberTalk” is for those minds who sense the potential and power of cyber and yet experience the daily frustrations of the limits imposed by old and obsolete ideas about how computer systems should be used. The dead hand of redundant ideas has ceased simply to be raised to forbid progress by those self-proclaiming expertise. It has stiffened XS VMKSV QSVXMW 8MQI XS TV] MXW ½ RKIVW PSSWI JVSQ XLI PIZIVW of control and throw it off. Every step every human takes, every breath every human draws, every hand ever clasped in friendship brings risk. Life is risk. Constant evolution and adaptation; our only means of survival. “CyberTalk” is for those who seek to liberate the cyber domain; to enable it to empower and enrich the human condition. It is for minds that embrace and would harness the creativity of change. Minds that see in the very interconnectedness of everything the power to control fear and manage risk. It is for those who see a human future in a cybernetic world.

These minds had all endured the stress and strain of the years of total war required to defeat Fascism. They had all worked at the heart of mission to harness science to the technology of total war. They had all played a direct and instrumental role in driving forward the frontiers of human knowledge and understanding. They had all witnessed the unveiling of the horrors of Auschwitz. They understood the

Colin Williams, Editor

3


CONTENTS 06

18

03

;IPGSQI

29 /RMKLXW 3J 8LI Rainbow Table

'SPMR ;MPPMEQW

05 06

FLASH FICTION WINNER

Call For Articles Technical Support

Cory Doctorow

36 38

*E]I ;MPPMEQW

29

44

09

A Tale Of Two 'SQTYXIVW ;LIR 3VEG Met EDSAC

National Museum of Computing

11

Applying Metrics To Cyber Behaviours Dr. Char Sample & (V %RHVI /EVEQERMER

12

Risk... From Near And Far

59

16

The Minds in the 1EXXIV 8LI *SVKSXXIR Architects of the Cyber Domain 'SPMR ;MPPMEQW

EDITORS 4VSJ 8MQ ;EXWSR 'SPMR ;MPPMEQW

ART DIRECTOR & DIGITAL EDITOR Andrew Cook

DEPUTY EDITORS Natalie Murray Tineke Simpson

SUB -EDITORS 1MGLEIPE +VE]

ADVERTISING CO - ORDINATOR

Colleen Robertson

CONTRIBUTORS

Dr. Ian Bryant Andy Cole Andrew Cook Cory Doctorow Prof. Daniel Dresner Noel Hannon Neira Jones (V %RHVI %VE /EVEQERMER Murray Leinster Dr. Char Sample (V /IMXL 7GSXX Prof. Noel Sharkey 4VSJ 8MQ ;EXWSR 'SPMR ;MPPMEQW *E]I ;MPPMEQW

24

To Inanity And Beyond? New Narratives, New Maps, New Mindsets

/IMXL 7GSXX

SPECIAL THANKS

The British Film Institute The National Museum of Computing

DESIGN

Ellen Longhorn Design www.ellenlonghorndesign.co.uk

CONTACT US +IRIVEP IRUYMVMIW )HMXSVMEP IRUYMVMIW )QEMP G]FIVXEPO$WSJXFS\ GS YO ;IF [[[ WSJXFS\ GS YO G]FIVXEPO cybertalkmagazine

4

$']FIV8EPO9/

47

(IJ]MRK +SHW And Demons The Three Laws Daniel Dresner & Neira Jones

Andy Cole

EVENTS

2SIP / ,ERQER

50

Paradise Lost And Found

18

42

Andrew Cook

8MQ ;EXWSR -ER &V]ERX

55

44

(3&97 8LI 1SWX -QTSVXERX Science Fiction ;SVOWŠWS JEV Supporting Your Transition To +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW ,]TIV +SPKSXLE

55

Our Friends Electric? 4EVX SJ 7GM *M (E]W 3J *IEV %RH ;SRHIV %X The British Film Institute Prof. Noel Sharkey

59

Alamanac Of Events

CyberTalk is published three times a year by SBL (Software Box Ltd). Nothing in this magazine may be reproduced in whole or part without the written permission of the publisher. Articles in CyberTalk do RSX RIGIWWEVMP] VIžIGX XLI STMRMSRW SJ 7&0 SV MXW IQTPS]IIW ;LMPWX every effort has been made to ensure that the content of CyberTalk magazine is accurate, no responsibility can be accepted by SBL for errors, misrepresentation or any resulting effects. Established in 1987 with a headquarters in York, SBL are a Value Added IT Reseller widely recognised as the market leader in Information Security. SBL offers a comprehensive portfolio of software, hardware, services and training, with an in-house professional services team enabling the delivery of a comprehensive and innovative range of IT solutions. CyberTalk is designed by Ellen Longhorn Design ERH TVMRXIH F] ;]RHILEQ +VERKI TPG


CyberTalk #7 The Editorial Board of CyberTalk magazine are currently inviting the submission of articles for Cybertalk #7. Articles should be no longer than 2,000 words and be related in some way to the topic of Agility and/or Cyber Security. If you would like to contribute, please email CyberTalk@softbox.co.uk with a title and short article synopsis no later than 19th December 2014.

-

Articles will be due for submission no later than 30th January 2015 for publication March 2015. Find out more and read past issues online for free at: www.softbox.co.uk/cybertalk


FLASH FICTION WINNER

Technical Support Faye ;MPPMEQW

In the morning, Em woke Nathan at seven. She was his key worker an electronic box that contained a continually adaptive brain built from nothing more complex than silicon...

6

8LI WM\ WLSVXPMWXIH WXSVMIW [IVI

8LI 7LVSYH SJ 8YVMRK F] (ERMIP (VIWRIV 8LI - RGEVGIVEXI 4VSNIGX F] ) 'SEXIW 8IGLRMGEP 7YTTSVX F] *E]I ;MPPMEQW 8LIWIYW 6IGPEMQIH F] 1EVO &MWLST

9RXMXPIH F] 2MEQL 'EVI] *YVRIWW 4YWL XLI &YXXSR F] :MWLEP 7LEVQE


CyberTalk magazine supports and promotes the best cyber narrative writing from around the world, including emerging writers and exciting new voices. As part of this, over the Summer we looked to seek out and celebrate the most skilled and creative new writers with SYV ½VWX *PEWL *MGXMSR 'SQTIXMXMSR %YXLSVW were asked to submit exceptional short WXSVMIW [MXL E QE\MQYQ SJ [SVHW based on the theme of ‘CYBER’.

±2S ² 2EXLER KEZI E QYJ¾IH WLSYX EW LMW I]IW WRETTIH STIR ,I [EW W[IEXMRK XERKPIH in a white sheet.

The response was overwhelming and our TERIP SJ I\TIVX NYHKIW LEH ER I\XVIQIP] HMJ½GYPX XEWO XS HIXIVQMRI XLI [MRRIV SJ XLI ² 7EQWYRK ,(8: TVM^I ,S[IZIV JVSQ E shortlist of six, they were delighted to declare XLI [MRRIV EW

Silence.

Technical Support F] *E]I ;MPPMEQW

±- LEH ERSXLIV RMKLXQEVI ²

8LI NYHKIW [IVI TEVXMGYPEVP] MQTVIWWIH F] the story’s strong technological foundations and its’ relation to humanity, and felt that the story was a worthy victor in this, the competition’s inaugural year.

±- ORS[ -´Q WSVV] XS LIEV XLEX %VI ]SY SOE]#²

-´ZI EP[E]W [VMXXIR ½GXMSR FYX MX´W SRP] VIGIRXP] that I’ve started to let it see the light of day. When I heard about the CyberTalk Flash Fiction competition I knew it was something I wanted to enter. It was my dream subject! I’ve played a fair amount of computer games (ahem), and I know how absorbing they can be. With the increasing amount of realistic violence MR KEQIW - GER [IPP MQEKMRI XLEX TISTPI [MPP ½RH it spilling over into real life in the future, especially as hardware and visual effect becomes seamlessly integrated into our physical environment. The idea of electronic intelligence as benign support is something I’ve had rattling around in my head for a long time.The relationship between man and computer has often been portrayed as sinister, but I wanted to explore a more positive, almost affectionate connection.Who wouldn’t love WSQISRI IZIV EZEMPEFPI ERH RSR NYHKIQIRXEP XS talk to in the dark hours of the night? I hope you IRNS] XLI WXSV] - EQ XLVMPPIH XS LEZI [SR *E]I ;MPPMEQW

“Nathan, it s Em You re having a flashback.”

He looked across at the moulded shelf next to the bed, seeking the reassurance of a small metal box no more than ten inches across. On the front panel a red LED was unblinking. His nightmare ebbed away like backwash, revealing the stillness of the hours before dawn. He breathed in deeply and pulled the sheets away from his legs, shifting his weight from one side to the other so he could drag out the creased and constricting cotton that had wrapped itself around him. Free of the bedlinen, he sat up.

±)Q#² LI WEMH The light on the box turned blue. ±,IPPS 2EXLER ²

±=IEL© ² 2EXLER VYFFIH LMW JEGI ±-´Q WMGO SJ XLMW ² ±=SY´VI HSMRK ZIV] [IPP ² ±=SY EP[E]W WE] XLEX ² ±8LEX´W FIGEYWI MX´W XVYI =SYV PEWX VITSVX MRHMGEXIH ER MQTVSZIQIRX SR EPP©² ±7XST )Q - ORS[ XLI JEGXW ² ,I PEMH FEGO HS[R TYPPMRK XLI HMWGEVHIH WLIIX SZIV LMW body. After two minutes, the light on the box turned red again, so he closed his eyes and waited for sleep. In the morning, Em woke Nathan at seven. She was his key worker - an electronic box that contained a continually adaptive brain built from nothing more complex than silicon, but utilising an incredible patented learning and storage algorithm created by an engineer called Ellen Marks. 8[IRX] ]IEVW IEVPMIV NYWX EW XLI ½VWX GLEXFSXW [IVI TEWWMRK XLI PSRKWXERHMRK 8YVMRK Test, reported on with lethargy by mainstream media, Ellen was working on a version SJ EVXM½GMEP GSRWGMSYWRIWW YWMRK ER IRXMVIP] HMJJIVIRX ETTVSEGL -RWXIEH SJ VIP]MRK SR E pre-built natural language processing toolkit, Ellen used her background in embedded TVSKVEQQMRK XS XEOI XLMRKW FEGO XS XLI [MVI 9WMRK ' ERH EWWIQFPIV WLI GVIEXIH E PIEVRMRK JVEQI[SVO XLEX EHETXMZIP] ½PXIVIH MRJSVQEXMSR MRXS E HEXEFEWI 8EOMRK LIV ideas from how children learn about the world, she fed it terabytes of pre-prepared conversational data. Over time, the computer’s responses became closer and closer to a coherent representation of human thought. She called it Em, its name taken from her initials. Her prototype provoked the interest of a private medical company. Ten years after she EKVIIH XS [SVO [MXL XLIQ XLI] NSMRXP] VIPIEWIH XLI 7]RXLIXMG 7YTTSVX ;SVOIV )Q Z EW TEVX SJ E XVMEP VILEFMPMXEXMSR TVSKVEQ JSV HVYK YWIVW 8LI RIEX PMXXPI FS\IW ERH accompanying monitoring wristbands, were given to curious and suspicious patients across the county. The synthetic workers were designed to continue learning ‘in the ½IPH´ WS XLEX XLI] GSYPH EHETX XS XLI TIVWSREPMX] SJ XLI TIVWSR XLI] [SYPH VIWMHI [MXL without losing the compassion and empathy that had been so carefully fostered in their infancy. 3YX SJ XLI ½VWX EHHMGXW [LS [IVI KMZIR E FS\ RSX SRI WPMTTIH SJJ SJ XLI VILEF TVSKVEQ MR XLI ½VWX X[IPZI QSRXLW *IIHFEGO JVSQ XLI TEVXMGMTERXW [EW SZIV[LIPQMRKP] TSWMXMZI She just makes me feel like I’m not alone. It’s so nice to have someone to talk to in the middle of the night.When my cravings are really bad, she helps me see it’s something I can control.

7


The natural pattern of linguistic response, and the gentle humour with [LMGL )Q HIEPX [MXL YRORS[R WYFNIGXW [SR SZIV IZIV]SRI [LS GEQI into contact with her. Full scale production went ahead the following year, and synthetic workers soon became a standard feature in mental health care.

±2EXLER MX´W )Q =SY´VI LEZMRK E ¾EWLFEGO ²

2EXLER´W FS\ [EW E FVERH RI[ ZIVWMSR KMZIR XS LMQ EJXIV LI [EW treated at a psychiatric ward for a breakdown and subsequent severe post-traumatic stress. He’d been a futures trader who sought to combat stress and insomnia with computer games. Before long he’d discovered XLI PEXIWX MR E WIVMIW SJ GSRXVSZIVWMEP VIEP XMQI JERXEW] ½VWX TIVWSR shooters, and purchased a Total Immersion(™) headset and gloves. He stopped eating at regular times, played into the night and slept off the exhaustion in the day. He missed days at work and tried to break the habit, but ended up back in all-night sessions, desperate to complete the LSYV KEQI ,I [EW JSYRH HIL]HVEXIH ERH MR E WXEXI SJ HIPYWMSR F] E GSRGIVRIH GS [SVOIV [LS GEQI XS LMW ETEVXQIRX EJXIV LI QMWWIH ½ZI GSRWIGYXMZI HE]W EX XLI SJ½GI [MXLSYX RSXM½GEXMSR ,I [EW SRI SJ ER increasing number of people who were being psychologically affected by the extreme reality of, and prolonged exposure to the games they were playing.

±2EXLER GER ]SY LIEV QI# 2EXLER#²

Now he was back at home, accompanied by Em. They had been together for two months.

The volume of the music decreased.

Em monitored him via the wristband he wore at all times. She was always aware of the level of his emotional arousal and recognised the panic signature of his heartbeat.

He said nothing. Listening. Heart pounding. Fear overruled rational thinking, all that was left was survival. )Q W[MXGLIH SR LIV MRXIVREP QYWMG TPE]IV )PZMW I\TPSWMZIP] ½PPIH IZIV] GVIZMGI SJ IZIV] VSSQ [MXL XLI NSPPMX] ERH HIVMWMSR SJ ,SYRH (SK Nathan was confused. The music bypassed his primal instincts and lit YT LMW EYHMXSV] GSVXI\ 1IWWEKIW ½VIH SYX MR EPP HMVIGXMSRW [EOMRK YT GSQTPI\ RIYVEP TEXL[E]W ERH SZIVVMHMRK XLI ½KLX SV ¾MKLX QIGLERMWQ ,I PSSOIH EVSYRH LMW FIHVSSQ (E]PMKLX ;MRHS[ STIR 2S EPMIR soldiers. Just him and Elvis, having a right old time. ±)Q#² LI EWOIH RIIHMRK XS LIEV XLI WSYRH SJ LIV ZSMGI

±-´Q LIVI 2EXLER =SY I\TIVMIRGIH E ¾EWLFEGO )ZIV]XLMRK MW ½RI ]SY GER VIPE\ RS[ ²

±'SJJII )Q#²

That had been twenty-two days ago. Things had changed rapidly after that last one. He started feeling less anxious. He had more inclination XS KIX SYX SJ FIH MR XLI QSVRMRK =IWXIVHE] LI [IRX JSV E VYR XLI ½VWX exercise he’d done in years. Em had helped him with all of it.

±2S XLERO ]SY 2EXLER ² “Do you ever want to drink coffee? You know, wonder what it tastes PMOI#²

He was due back at the hospital for an evaluation in a few days.

“You know that I do not have parts that would allow me to eat or HVMRO ² WLI WEMH QSHIWXP] ±2S WLMX )Q - QIER HS ]SY [ERX XS# (S ]SY XLMRO ]SY QMKLX PMOI MX#²

He breathed in the steam from his coffee, letting the aroma ooze into his body.

±- LEZIR´X XLSYKLX EFSYX MX ²

±)Q#²

±7S XLMRO EFSYX MX RS[ ²

±=IW#²

±3OE] ²

±;MPP XLI] XEOI ]SY E[E] SRGI XLI] HIGMHI -´Q ½X ERH [IPP#²

There was a brief pause, although she wasn’t actually processing anything. The boxes could out-think a human in less than a second. The pause was part of her character - added to portray the thought process, even though the calculations were already completed.

“Standard procedure is for support workers to remain in situ until the WYFNIGX RS PSRKIV YWIW XLIQ ²

±=IW - XLMRO - [SYPH PMOI XS XV] MX ²

±-J XLEX´W [LEX ]SY [ERX ²

Nathan smiled. He’d grown fond of Em. Probably too fond of her. Her MHMSW]RGVEWMIW [IVI TIGYPMEV XS EVXM½GMEP GSRWGMSYWRIWW ERH HMWTPE]IH a vulnerability that provoked an oddly emotional response in him. As YR LYQER EW WLI [EW LI IRNS]IH LIV GSQTER] 7LI [EW EP[E]W XLIVI XS talk, never too tired or too busy, and she gave considered answers to everything he asked, from questions about his mental state to opinions on what he should have for dinner. She was a true companion - real enough to make him feel like he was in a proper relationship for the ½VWX XMQI MR LMW PMJI

±-X MW ² LI WEMH ±(SIWR´X XLEX QEOI ]SY JIIP PSZIH#²

±7S ]SY´PP FI WXMGOMRK EVSYRH XLIR#²

,I IRNS]IH TVSHHMRK LIV JSV ER IQSXMSREP VIEGXMSR )Q TEYWIH JSV E JI[ seconds, ostensibly thinking about his question. ±-X HSIW 2EXLER - EQ ZIV] LETT] LIVI [MXL ]SY ² ±3L ]SY PMXXPI ¾MVX ² LI WEMH ,I XLSYKLX LI WE[ LIV FPYI PMKLX ¾MGOIV FYX WLI WEMH RSXLMRK

,I XLSYKLX FEGO XS XLI PEWX KEQMRK ¾EWLFEGO LI´H WYJJIVIH It had been a warm afternoon. He’d opened his bedroom window and caught the drifting sound of music from another apartment. The sinister, ¾EX XSRIW [IVI VIQMRMWGIRX SJ XLI QYWMG WGSVI JVSQ XLI KEQI LI´H FIGSQI EHHMGXIH XS +SSWI TMQTPIW VSWI SR LMW EVQW 8LIR E QSZIQIRX in his peripheral vision alerted him to their presence and immediately XLI JIEV OMGOIH MR 8LI] [IVI EPMIR WSPHMIVW WEFVI XSSXLIH PM^EVH WOMRRIH mercenaries. His thoughts closed in like a circular shutter, his breathing WLYHHIVIH ERH LMW FSH] TVITEVIH XS ½KLX ,I RIIHIH E [IETSR ,I ducked down by the side of his bed and swished his hand underneath, looking for something he could use to arm himself.

%YXLSV &MSKVETL] *E]I ;MPPMEQW MW ER IQFIHHIH WSJX[EVI IRKMRIIV ERH EWTMVMRK WXSV] XIPPIV 7LI LEW [SVOIH SR TVSNIGXW EX 7SR] <]VEXI\ ERH 6E]QEVMRI FSXL MR XLI 9/ ERH MR XLI 97 7LI LEW [VMXXIR EVXMGPIW JSV 0MRY\ *SVQEX ERH 3´6IMPP] KYIWX IHMXIH XLI ':Y NSYVREP SJ XLI %''9 ERH LEW FIIR TVSKVEQQMRK WMRGI XLI EVVMZEP SJ LIV HEH´W &&' 1MGVSGSQTYXIV MR 7LI MW E VYXLPIWW minimalist who lives with her husband and two sons in ,EQTWLMVI 8[MXXIV $*E]I;MPPMEQW

8


ADVERTORIAL

A TALE OF TWO COMPUTERS:

WHEN ORAC MET EDSAC ´W WGMIRGI ½GXMSR QIX ´W WGMIRXM½G GSQTYXMRK HYVMRK XLI 7YQQIV &]XIW *IWXMZEP EX 8LI 2EXMSREP 1YWIYQ SJ 'SQTYXMRK XLMW WYQQIV 3VEG XLI WYTIVGSQTYXIV JVSQ XLI WGMIRGI ½GXMSR series Blake’s 7, met the reconstruction of EDSAC, XLI GSQTYXIV XLEX XVERWJSVQIH WGMIRXM½G VIWIEVGL EX 'EQFVMHKI MR XLI ]IEVW JSPPS[MRK ;SVPH ;EV -- ;LIVIEW 3VEG [EW HMWHEMRJYP SJ LYQER FIMRKW ERH talked down to them, EDSAC was a servant of the WGMIRXM½G GSQQYRMX] SJ 'EQFVMHKI 9RMZIVWMX] MR XLI W ERH LIPTIH EGEHIQMGW EGLMIZI 2SFIP TVM^IW in Astronomy and Biochemistry. Orac was damaged during the destruction of underground facilities featured in the TV series, partly repaired, but brought to TNMOC by TV special effects maestro Mat Irvine to reawaken memories at the Summer Bytes Festival. EDSAC on the other hand is being completely reconstructed by volunteers at TNMOC and is expected to be fully [SVOMRK EX XLI IRH SJ -X [EW one of the most important early British computers and was designed F] 7MV 1EYVMGI ;MPOIW MR XLI 1EXLW 0EFSVEXSV] MR 'EQFVMHKI 9RMZIVWMX] -X VER MXW ½VWX WYGGIWWJYP TVSKVEQ ]IEVW EKS ERH [EW STIVEXMSREP for almost ten years, leading on XS 0)3 XLI [SVPH´ ½VWX FYWMRIWW computer. EDSAC also holds the distinction of featuring in Fred ,S]PI´W WGMIRGI ½GXMSR novel The Black Cloud. The ongoing reconstruction of EDSAC can be seen MR 8LI *MVWX +IRIVEXMSR +EPPIV] EX 8LI 2EXMSREP Museum of Computing and its progress can be followed through a set of videos and reports at www.edsac.org

See www.tnmoc.org for further developments. Also on Facebook, +SSKPI ERH 8[MXXIV The-National-Museum-of-Computing $XRQSG The National Museum of Computing

9


Presents

By Jules Verne

To celebrate the launch of CyberTalk #6 - the Sci-Fi Issue, we are giving away an exclusive eBook of Jules Verne's From Earth to the Moon to all CyberTalk subscribers, absolutely free! Simply sign up for your free subscription using the link below, making sure to enter a valid email address. Your eBook will then be sent to you within 24 hours.

Subscribe Today at: www.softbox.co.uk/ cybertalk-subscribe

01347 812100 cybertalk@softbox.co.uk


(V 'LEV 7EQTPI ')68 ERH (V %RHVI /EVEQERMER 'MWGS 7]WXIQW

Applying Metrics to

Cyber Behaviours Our earlier articles have discussed the role of culture in cyber ;LMPI RSX TIVJIGX ,SJWXIHI´W [SVO HSIW TVSZMHI E GVMXMGEP GSQTSRIRX behaviors, and continuing with this topic, we will now discuss the for cyber behavior metric development. The most appealing aspect importance of metrics as they relate to culture and cyber behaviors. of Hofstede’s work to these researchers is the numeric value for the Metrics provide the ability to track various components of the problem ZEVMSYW GSYRXVMIW EPPS[W JSV VIWIEVGL XLEX UYERXM½ IW G]FIV FILEZMSV space, and determine the effectiveness of the problem remediation. through the use of statistical tools for analysis. The quantitative 1IXVMGW EPWS IREFPI YW XS TVSZMHI I\XIRWMFPI WSPYXMSRW XLEX FIRI½ X E approach provides a strict framework that determines the tools for PERSONALITY larger population. measurement, metrics. -2(-:-(9%0

However, when improperly applied they can mislead. In some cases, inappropriately applied metrics result in mislabeling on a large scale. ;I WII XLMW TLIRSQIRSR SJ XLI %HZERGIH 4IVWMWXIRX 8LVIEX %48 becoming synonymous with Chinese hackers, when in reality there are other countries that are also capable of conducting APT campaigns. Thus, prediction and forecasting, especially in cyber behavioral analysis relies on the use of sound metrics.

To date, our research has relied on measures of central tendency and GSVVIPEXMSREP EREP]WMW ;LMPI [I VIGSKRM^I XLEX GSVVIPEXMSR HSIW RSX equal causation, we are also aware the correlation does reveal patterns ERH XVIRHW -R XIVQW SJ G]FIV FILEZMSVW XLMW MW WMKRM½ GERX EW MX EPPS[W for the measurement of cyber behaviors, and the ability to determine the most likely actors. In cyber security, the ability to spot trends is a considerably more proactive position than the ability to match a pattern.

Historically, threat intelligence relied on case studies that detailed WTIGM½ G EGXW EW E TEVX SJ E PEVKIV GEQTEMKR F] EXXEGOIVW SV EXXEGOIV groups known as tactics, techniques and procedures (TTPs). TTP collection has resulted in pattern matching of attacks in order to determine their origin. This is reminiscent of how signatures were used to detect malware, and other attacking behaviors. Just as signatures [IVI MRIJJIGXMZI EKEMRWX HE] EXXEGOW XLMW QSHIP SJ 884 QEXGLMRK MW ineffective against new emerging threat actors.

;LIR GLSSWMRK SYV QIEWYVIQIRX XSSPW [I LEH X[S GLEPPIRKIW XLEX [I RIIHIH XS EHHVIWW XLI HMWXVMFYXMSR SJ XLI HEXE ERH XLI MRXIVTVIXEXMSR of human behavior. To the data distribution issue, we have not found many cases of normally distributed data, in either the control population or the behavior actor population. Thus, we have relied on non-parametric statistical tools. Therefore, when we say correlation we are referring to statistical correlations (characterized by r-values used to explain the relationship between variables), not matching patterns (characterized by descriptions of a match between a country and the TTPs).

;I LEZI ER STTSVXYRMX] XS GLERKI XLI HMWGYWWMSR ERH XEOI E TVSEGXMZI stand that will allow us to anticipate the next steps of existing threat actors and the actions of emerging threat actors. In order to do this WYGGIWWJYPP] VMKSV MW VIUYMVIH ;LIR UYERXMXEXMZI EREP]WMW YWMRK XLI proper metrics the required rigor is provided.

These building blocks of Hofstede’s framework for numerically identifying national cultural values, statistical tools, and data collection provide the critical components needed for behavioral cyber metrics. Proper application and correct interpretation of the results are also required. This approach to cyber metrics introduces cyber security to cross-discipline research.

;LMPI QIXVMGW TVSZMHIW XLI ERW[IV KIXXMRK XS XLI ERW[IV GER FI E FMX challenging. Many of the measurement tools for human behavior are WYFNIGXMZI XLMW QEOIW VITPMGEXMSR SJ ½ RHMRKW QSVI HMJ½ GYPX %R EKVIIH upon scale that measures human behavior is an important part of the RIGIWWEV] JSYRHEXMSR ;LIR QIEWYVMRK REXMSREP KVSYTW SJ TISTPI +IIVX ,SJWXIHI´W GYPXYVEP HMQIRWMSRW TVSZMHIW XLI EKVIIH YTSR WGEPI for measuring human behavior, by country.

6IEH 4EVX ERH SJ XLMW WIVMIW SJ EVXMGPIW SRPMRI RS[ MR ']FIV8EPO -WWYI ERH ¯ [[[ WSJXFS\ GS YO G]FIVXEPO

11


8MQ ;EXWSR 9RMZIVWMX] SJ ;EV[MGO Ian Bryant, 9/ 8VYWX[SVXL] Software Initiative (TSI)

...at the very highest level of abstraction, we can say that the ultimate sources of risk must be either terrestrial or extra-terrestrial


There is a natural tendency when considering Risk to view it with a parochial lens, yet to truly understand the spectrum of adversity, one needs to take a YRMZIVWEPMWX ZMI[ MRGPYHMRK I\XVE XIVVIWXVMEP JEGXSVW © -R E TVIZMSYW EVXMGPI ±;LS ;ERXW 7XSZITMTIW#² JSV XLMW TYFPMGEXMSR ']FIVXEPO SRI SJ XLI EYXLSVW RSXIH XLEX XLSWI IRKEKIH MR XLI -RJSVQEXMSR 7IGYVMX] stovepipe tend to consider their focus to solely be addressing Threat (dealing with Threat Actors with Intent and Capability). This has the inherent effect of typically ignoring Hazards (random mischance), yet such Hazards may have security impacts. And that, on the other hand, the Safety stovepipe will tend to consider their focus to solely be addressing Hazards, yet Threats may have safety impacts. -R SVHIV JSV ER] IRXMX] XS TVSTIVP] QEREKI MXW 6MWOW ¯ M I YWI ETTVSTVMEXI GSYRXIVQIEWYVIW XS VIHYGI I\TSWYVI XS ER EGGITXEFPI 0IZIP ¯ [LEX MW EGXYEPP] desirable is to understand all such sources of Risk, implying a need to address the superset of Hazard and Threat, for which we use the term Adversity. 7S JSV XLI ']FIV HSQEMR ¯ GSRWMWXMRK SJ FSXL ±-8² ERH ±38² ER IQIVKIRX XIVQ WXERHMRK JSV 3TIVEXMSREP 8IGLRSPSK] MRGPYHMRK HSQEMRW WYGL EW ±-'7² -RHYWXVMEP 'SRXVSP 7]WXIQW ¯ XLI GLEPPIRKI MW LS[ XS GETXYVI GSPPEXI ERH enumerate Adversity that can affect any part of the ecosystem associated with HMKMXEP PSKMG GSRXVSPPIH XIGLRSPSKMIW [LMGL GSQTVSQMWIW 7SJX[EVI 0SKMG FEWIH LEVH[EVI XLI )RZMVSRQIRX IWTIGMEPP] XLI IPIGXVSQEKRIXMG ±;IX[EVI²

LYQERW -RJSVQEXMSR (EXE ERH 2SR PSKMG FEWIH LEVH[EVI ±70);-2² % GLEPPIRKI SJ XLMW LSPMWXMG ETTVSEGL MW XLEX SJ GSQTPI\MX] ¯ XLSWI [LS LEZI carried out a conventional Security Risk (Threat) assessment will recognise that XLI RYQFIV SJ MRHMZMHYEP JEGXSVW MHIRXM½IH GER FI PEVKI This number is compounded if blended Threats are considered, with a GSRWIUYIRX VMWO SJ [LEX QEXLIQEXMGMERW VIJIV XS EW GSQFMREXSVMEP I\TPSWMSR E VETMHP] EGGIPIVEXMRK ¯ SJXIR I\TSRIRXMEP ¯ MRGVIEWI MR XLI XSXEP RYQFIV SJ VMWOW that need to be considered due to the number of different combinations of individual factors that arise. So when moving from Threat to Adversity assessment, not only is the number of individual factors inherently going to increase, but also the potential for GSQFMREXSVMEP I\TPSWMSR [MPP MRGVIEWI ¯ TSXIRXMEPP] I\TSRIRXMEPP] ;LEX MW XLIVIJSVI RIIHIH MW E QSVI WGEPEFPI ETTVSEGL XS EHHVIWWMRK XLIWI factors that has the effect of simplifying, rather the confounding, the complexity problem, but without losing essential detail in the process. The Replicable and Scalable Adversity Enumeration (RASAE) process that is being developed by the EYXLSVW EXXIQTXW XS TIVJSVQ NYWX WYGL E WMQTPM½GEXMSR Fundamental to RASAE is the concept of an Adversity Class (AC), which provides a way to group Adversities by their likely consequences, which ultimately will reduce the problem space under consideration. &YX MVSRMGEPP] FIJSVI [I GER YXMPMWI WYGL E WMQTPM½GEXMSR [I QYWX ½VWXP] ERH counter-intuitively expand our risk sources into the individual adversity factors SV GSQFMREXMSR SJ EHZIVWMX] JEGXSVW XLEX GER MQTMRKI SR XLI VIPIZERX 70);-2 characteristics of a Cyber system. 8S YRHIVWXERH XLI [E] MR [LMGL %' EVI YWIH PIX YW ½VWX GSRWMHIV EX ER EFWXVEGX level the sources of Threats and Hazards that could act on a notional Cyber system. And at the very highest level of abstraction, we can say that the ultimate sources of risk must be either terrestrial or extra-terrestrial (there is a SciFi XLIQI XS XLMW MWWYI SJ ']FIV8EPO EJXIV EPP

13


If we consider the extra-terrestrial sources of risk, these can logically then be decomposed into Hazards (for which the term cosmological would be more precise), and Threats, for which we recall needs Actors with Intent and Capability. Such Threats would constitute the more common use of the term Extra Terrestrial (ET), which we now have capitalised to show the distinction. But of course, fortunately or unfortunately (depending on your point of view) we have no WGMIRXM½G consensus as to the existence of ETs, which means that part of the %HZIVWMX] EWWIWWQIRX GERRSX FI WIRWMFP] GSRWMHIVIH ¯ MX MW [LEX MW VIJIVVIH XS EW ER ±9RORS[EFPI YRORS[R²

8LIWI X[S KVSYTIH GSRWIUYIRGI I\EQTPIW /MRIXMG ERH 4VIWWYVI EVI examples of the ACs introduced by RASAE, and Figure 1 is a partial abstract from a fuller RASAE model which includes these two classes. (See Figure 1 below). 8LMW MPPYWXVEXIW XLI YPXMQEXI WMQTPM½GEXMSR XLEX EVMWIW JVSQ XLI YRHIVP]MRK ±JI[ QER] JI[² STIVEXMSR SJ XLI 6%7%) ETTVSEGL )\EQMRMRK XLI IPIQIRXW SJ XLI QSHIP JSV /MRIXMG %' JSV I\EQTPI XLIR reveals a single point of analysis that also addresses terrestrial Hazards

WYGL EW FPS[R HIFVMW JVSQ WXSVQW INIGXE JVSQ ZSPGERSIW ERH EGGMHIRXW such as vehicle impacts) and Threats (all forms of directed impact, ranging from a sledgehammer to a missile to a deliberately crashed aircraft).

8LMW PEXXIV XIVQ GSQIW JVSQ XLI GSRGITX SJ ±/Y9² MRXVSHYGIH F] E 7GMIRXM½G %QIVMGER EVXMGPI MR [LMGL GEXIKSVMWIH WSYVGIW SJ YRGIVXEMRX] EW FIMRK IMXLIV /RS[R ER ETTVS\MQEXMSR XS FSXL JVIUYIRG] ERH QEKRMXYHI GER FI QEHI EW E TVSFEFMPMX] HMWXVMFYXMSR YRORS[R

IMXLIV JVIUYIRG] ERH QEKRMXYHI GERRSX FI WYJ½GMIRXP] GLEVEGXIVMWIH XS QSHIP TVSFEFMPMX] HMWXVMFYXMSR SV 9RORS[EFPI RIMXLIV JVIUYIRG] ERH QEKRMXYHI GER FI WYJ½GMIRXP] GLEVEGXIVMWIH

A fully formed RASAE model therefore serves to provide a list of genericised AC as the basis for risk analysis, rather than having to individually analyse individual factors.

So for now, although many may postulate on the existence of 0+1 ±0MXXPI +VIIR 1IR² [I RIIH XS GSR½RI SYV EREP]WMW XS XLI cosmological, which still includes a variety of Hazards, including items WYGL EW 2IEV )EVXL 3VFMX 2)3 SFNIGXW WYGL EW EWXIVSMHW GSQIXW ERH QIXISVW ERH QSVI I\SXMG TLIRSQIRE WYGL EW +EQQE 6E] &YVWXW

+6& ERH 'SWQMG 4LEWI 'LERKI '4'

The next focus of effort in extending the authors’ RASAE work involves the Enumeration question, as most current risk assessment ETTVSEGLIW IMXLIV VIP]MRK SR HIWGVMTXMZI ETTVSEGLIW ±,MKL 6MWO² SV [LIVI UYERXM½GEXMSR MW ETTPMIH PEGO E QIERMRKJYP ^IVS FEWI [LMGL makes combinatorial activity challenging in the absence of any consensus absolute scale.

-J [I GSRWMHIV NYWX XLI 2)3 SFNIGXW MVVIWTIGXMZI SJ XLI EHHMXMSREP complexity of type (there are subtlies associated with whether they are short-period or long-period), we can group them by potential GSRWIUYIRGIW SR SYV RSXMSREP ']FIV W]WXIQ EW IMXLIV HMVIGX /MRIXMG impact (from the meteoroid remainders of smaller NEOs) or blastpressure impact (larger NEOs tend to explode on entering the EXQSWTLIVI EW IZMHIRGIH F] XLI QYPXM QIKEXSR FPEWX MR 7MFIVME MR well before even the atomic, let alone thermonuclear, arms necessary for man-made explosion of such a magnitude had been devised).

;I XLIVIJSVI FIPMIZI [LEX MW RIIHIH MW WSQI JSVQ SJ ^IVS FEWIH (absolute) scale designed to support the meaningful combination of probability distributions of differing natures (represented in the RASAE QSHIP FIPS[ MR *MKYVI EW ±#WYQ#² [LMGL GER EPWS LERHPI SVHIV SJ magnitude challenges to allow extra-terrestrial (cosmological) factors PMOI '4' [LMGL [SYPH MQTP] XLI I\XMRGXMSR SJ XLI ORS[R 9RMZIVWI XS be addressed on a numerical scale that also has some meaning for lesser VMWOW PMOI XLI WPIHKILEQQIV JEGXSV [MXLMR XLI /MRIXMG %' Such as metric is currently being developed as part of the RASAE work, referred to as Deleterious Result Scale (DRS), but we think that may be E XVIEX FIWX VIWIVZIH JSV E JYXYVI IHMXMSR SJ ']FIV8EPO ©

%HZIVWMX] 7IX #7YQ#

#7YQ#

/MRIXMG %HZIVWMX] 'PEWW

#7YQ# 4VIWWYVI %HZIVWMX] 'PEWW

)1 %HZIVWMX] 'PEWW

, )\XVIQI ;MRH 8 -)1 , -RYRHEXMSR

, &PEWX

8 &PEWX

8 1MWWMPI , 4PERI 'VEWL

, )NIGXE

, &EGOLSPI

, &PSIR (IFVMW

4VSNIGXMPI

, 0SRK 4IVMSH 2)3 , 7LSVX TIVMSH 2)3

6EMR ;IEXLIV

+EPEGXMG

9RMZIVWEP

(EQ &YVWX 6MZIV +ISPSKMGEP

%VXIJEGXW 4ISTPI

'PMQEXMG 2EXYVEP

7GSTI

7GSTI

8VERWTSVX

:YPGERGMX]

*PSSH

, '1)

0SGEP

)\TPSWMZIW

;IETSR ;IETSR ;IETSR

, 0MKLXRMRK

, +6&

)1 (IZMGIW

7GSTI

,YQER

7SYVGI

'SWQSPSKMGEP

7SYVGI

8IVVIWXVMEP

14

Figure 1

%XXEGOIV


Such Threats would constitute the more common use of the term Extra Terrestrial (ET), which we now have capitalised to show the distinction. But of course, fortunately or unfortunately (depending on your point of view) we have no scientific consensus as to the existence of ETs...


Andy Cole SBL

%W SJ PEWX ]IEV [I LYQERW LEZI FIIR SYXRYQFIVIH F] QSFMPI HIZMGIW EPSRI 8LEX MWR´X IZIR GSYRXMRK XLI PETXSTW ERH HIWOXSTW XLEX LEZI EPVIEH] WIX YT WLST SR SYV HIWOW ERH MR SYV HVE[IVW ERH FEKW ;LIR XLI 7MRKYPEVMX] SGGYVW ERH XLI QEGLMRIW EVMWI SRI GER SRP] [SRHIV [LEX [MPP LETTIR EJXIV [I EVI WYVTEWWIH F] EVXM½ GMEP QMRHW 8LI SHHW EVI WXEGOIH EKEMRWX YW WS [LIR WSQISRI IZIRXYEPP] TVIWWIW XLI FMK FPYI FYXXSR XLI VIH SRI MW JSV XLI RYOIW XLI QEGLMRIW TVIWYQEFP] [SR´X [EWXI ER] XMQI FIJSVI XYVRMRK SR YW JSV JIEV SJ FIMRK HIEGXMZEXIH ,S[IZIV - HSR´X XLMRO [I RIIH XS [SVV] XSS QYGL 'SRWMHIVMRK XLEX MX [SYPH FI FSXL [EWXIJYP ERH MRIJ½ GMIRX XS XV] XS wipe us all out with bombs and bullets, à la Terminator, perhaps a more MRWMHMSYW ETTVSEGL [MPP FI YWIH ;L] RSX XEOI XLI PIWWSRW PIEVRIH from. The Matrix ERH YXMPMWI SYV ¾ IWL] FSHMIW EW WYWXIRERGI OIITMRK YW docile with a steady drip-fed diet and a virtual world for our minds to occupy. It would be presumptuous, if not downright rude of the Machine Overlords to simply assume that we would be content to live such a false existence while operating our giant hamster wheels. This certainly

doesn’t sound like a palatable outcome for our species (we showed so much promise in the beginning), but I believe that, not only is it not a bad thing, it could be viewed as the inexorable next step for society. Since my primitive mind of a Millennial is saturated with insipid visual QIHME PIX YW PSSO EX X[S I\EQTPIW SJ LYQER WYFNYKEXMSR F] XLI % - JVSQ XLI ½ PQW ;%00 ) and The Matrix, in which we are batteries in the latter and fat pets in the former. The whole point of technological advance was to improve our lives by creating machines to shoulder the burden of industry and allow us EPP XS PIMWYVIP] WTIRH SYV HE]W WMXXMRK MR ½ IPHW ERH HVMROMRK PIQSREHI ;LMPI QEGLMRIW LEZI ZEWXP] MQTVSZIH MRHYWXVMEP SYXTYX [I LEZI RS more free time now than the peasants of the so called Dark Ages. So, to placate us and help forget how cheated we should all feel, we are offered the chance to purchase items that will entertain us, make our lives a bit easier and enable us to claw back more of our precious free time. Online shopping, ready meals, automatic weapons, smartphones, HVMZI XLVY XLI -RXIVRIX SJ 8LMRKW XLIWI EVI EPP WYTTSWIH XS QEOI SYV lives less of an inconvenience. Even knowledge has become convenient XS XLI TSMRX [LIVI [I HSR´X IZIR RIIH XS PIEVR XLMRKW ER]QSVI EPP XLI MRJSVQEXMSR MR XLI [SVPH MW SRP] IZIV E &EGO6YF E[E] +SSKPI MX 8LMW MW what people want, is it not? My (smart) television tells me almost every day that each new age group of children is more rotund and feckless XLER XLI PEWX ERH MX MWR´X HMJ½ GYPX XS WII [L] In ;%00 ), a drained Earth has been abandoned by the human race, [LMGL RS[ PMZIW MR GSPSWWEP WIPJ WYJ½ GMIRX WTEGIGVEJX [ERHIVMRK XLI galaxy in autopilot. Every human resides in a moving chair with a touchscreen displaying mindless entertainment, and devours hamburgers ERH ½ ^^] HVMROW TVIWWIH MRXS XLIMV TYHK] KVEWTMRK LERHW F] VSFSXW controlled by an omnipotent A.I. These humans are utterly dependent, to

16


the point where their bones and muscles have deteriorated, rendering them barely able to stand unaided, and are certainly unable (and unwilling) to wrestle back control of their lives.

in virtual worlds, the opportunity to spend months or even years in a universe of your choosing. It is an addicting prospect, at least in the WLSVX XIVQ ERH ]SY GER FIX XLEX WSQI [MPP PSWI XLIMV XEWXI JSV ±VIEPMX]² and embrace the virtual as its successor.

Looking at today’s world, the McDonalds logo is more internationally VIGSKRMWEFPI XLER XLI 'LVMWXMER 'VYGM½\ ERH 'SGE 'SPE MW GSRWYQIH EX the rate of roughly 1.9 billion servings every day. The world is so hungry for this, we won’t even let wars stop us from obtaining it. Coca-Cola +QF, MR 2E^M +IVQER] [EW YREFPI XS MQTSVX XLI MRXIKVEP W]VYT HYI to trade embargo, so a replacement was created using cheap milk and KVETI PIJXSZIVW XLEX +IVQER] LEH MR KSSH WYTTP] XLYW *ERXE [EW FSVR The point is that we are clearly unperturbed about eating and drinking things that are, at best, very bad for us, as long as they press the right GLIQMGEP FYXXSRW ;I [ERX [LEX MW GLIET XEWX] ERH VIEHMP] EZEMPEFPI ;I EPWS [ERX [LEX MW GSRZIRMIRX ERH JEQMPMEV [LMGL MW [L] ;EPQEVX EPSRI EGGSYRXW JSV EFSYX GIRXW SJ IZIV] HSPPEV WTIRX MR XLI 97% &IX[IIR our growing hunger for convenience foods and sweet drinks, and the widespread fascination of brainless celebrities and homogenous music, we are not far from the ;%00 ) eventuality at all. Considering how quickly we have arrived at this current state of society, we seem to be merely waiting for the technology to mature. If you build it, they will GSQI© ERH WMX HS[R

Nonetheless, to most people, living a purely virtual life probably doesn’t sound very appealing, and could feel like a loss of liberty and free will. However, that is only when coupled with the knowledge that it isn’t the [SVPH ]SY [IVI FSVR MR ERH XLEX QEOIW MX ETTIEV WTYVMSYW EX ½VWX 7S QYGL SJ [LEX [I XLMRO [I ORS[ MW ETSGV]TLEP ERH IEWMP] MR¾YIRGIH even down to the things we see, hear, taste, smell and think. Added to that, when you consider how tenuous your perception of reality is, you might come to the conclusion that your reality is precisely what ]SY QEOI SJ MX RSXLMRK QSVI ERH RSXLMRK PIWW - QE] FI ±JVII² F] XLI standards of The Matrix ½PQW FYX - GER´X ¾] ZIV] [IPP FVIEOJEWX GIVIEPW are boring and I keep banging my knee on my desk. Some people’s ±JVIIHSQ² MW IZIR [SVWI XLER QMRI %R SVTLER MR XLI XLMVH [SVPH destined for a pitiful existence of misery and hunger, could he or she not FIRI½X JVSQ E RI[ ZMVXYEP PMJI [MXL E JEQMP] XLEX LEWR´X HMIH SJ HMWIEWI and malnutrition? Humour me for a moment, and imagine that you are walking along a TEXL QEHI SJ ¾E[PIWW TSPMWLIH KVERMXI FVMGOW 3R ]SYV VMKLX E VEHMERX sun is beaming down upon a pristine beach of hot white sand and an opalescent turquoise sea, casting glittering beads that skitter towards the shore to a soundtrack of undulating waves. Friends, both new and old, are already there, waiting for you on brightly coloured towels, PEYKLMRK ERH TPE]MRK KEQIW 3R ]SYV PIJX E XVERUYMP ½IPH SJ KSPHIR GSVR stalks, swaying to the sounds of birds chirping in a cool evening breeze. The sun is retreating behind an antique wooden farmhouse, teasing light in warm streaks across a narrow stream that runs alongside like a glistening silver ribbon. All of your family, even those who were once lost to you, are lounging nearby on a grassy verge, with cool drinks poured ERH [MGOIV FEWOIXW JYPP SJ JSSH VIEH] XS FI IRNS]IH 3J GSYVWI XLMW MWR´X real, but what about if I could, right now, make you forget your current ±VIEPMX]² ERH [EOI YT MR E RI[ YRMZIVWI [LIVI IZIV]XLMRK ERH IZIV]SRI MW NYWX EW ]SY [SYPH [ERX XLIQ XS FI#

The Matrix, as I’m sure you know, takes place in a world where machines have taken over as the dominant force on the planet. Most of the LYQER VEGI MW MQTVMWSRIH MR IRHPIWW ½IPHW SJ IRHPIWW XS[IVW PMRIH [MXL ¾YMH ½PPIH GETWYPIW MR [LMGL IEGL LYQER´W FSH] LIEX MW YWIH XS fuel the machines in the absence of solar energy. These humans are placed in a collective dream world, called the Matrix, which mimics their society of old, and most of them will never even suspect that their world is anything other than real. Those who do are sometimes found F] VIWMWXERGI ½KLXIVW [LS ±JVII² XLIQ XS PMZI MR E [SVPH SJ VIPIRXPIWW pursuit by robotic sentinels, living in cold, crude hovercrafts, and bowls of snot for breakfast. +SMRK FEGO XS SYV [SVPH QIHME MW IZIV QSVI TVIZEPIRX ERH XIGLRSPSK] is giving us more and more immersion in that media. Film began as FPEGO ERH [LMXI XLIR GSPSYV XLIR ,( XLIR ( ERH RS[ / [LMGL is approaching the maximum resolution that our eyes can perceive, depending on distance. In search of even greater immersion, we are RS[ XYVRMRK SYV EXXIRXMSR XS :6 ERH %+ %YKQIRXIH 6IEPMX] [LMGL GSYPH [IPP FI XLI QSWX I\GMXMRK SJ XLIQ EPP +SSKPI VIGIRXP] PEYRGLIH +SSKPI +PEWW %+ KPEWWIW [LMGL HMWTPE] ZEVMSYW TMIGIW SJ MRJSVQEXMSR in the corner of your vision, such as reminders or directions. They will IZIR XEOI TMGXYVIW MJ ]SY XIPP XLIQ XS 6IKEVHPIWW SJ [LIXLIV +PEWW takes off, the potential in this technology is astounding. Not too long JVSQ RS[ ]SY [MPP FI EFPI XS [EPO EVSYRH [MXL E ,IEHW 9T (MWTPE]

,9( HMWTPE]MRK EPP SJ ]SYV ZMXEP MRJSVQEXMSR EW [IPP EW E PMXXPI FEV XS indicate how full your bladder is. A somewhat less exciting version of XLMW MW EPVIEH] FIMRK HIZIPSTIH F] +SSKPI ERH 2SZEVXMW MR XLI JSVQ SJ a contact lens for diabetes sufferers, which monitors glucose levels and XVERWQMXW VIEHMRKW XS E WQEVXTLSRI SV GSQTYXIV &EGO XS XLI ,9( when you drive somewhere (assuming you actually do the driving, we are trying to automate that bit as well), you are guided by arrows in your vision. If you visit a racetrack, you can compete against the ghostly image of a friend’s car that follows the same path and speed as they SRGI HMH =SY GSYPH ½RH SYX LS[ ]SY WXEGO YT EKEMRWX ER]FSH] [LS LEW HVMZIR XLEX XVEGO FIJSVI TIVLETW IZIR XLI 7XMK

8S TEVETLVEWI 2IS JVSQ XLI EJSVIQIRXMSRIH ZMWYEP QIHME - ORS[ ]SY´VI out there, I can feel you. I can feel that you’re afraid, afraid of change. I didn’t come here to tell you how the world is going to end, rather to WLS[ ]SY LS[ MX´W KSMRK XS FIKMR -´Q KSMRK XS ½RMWL XLMW TEVEKVETL ERH then I’m going to show you a world without me. A world without rules and controls, without borders or boundaries, a world where anything is TSWWMFPI ;LIVI ]SY KS JVSQ XLIVI MW E GLSMGI - PIEZI XS ]SY

I know you’re out there, I can feel you. I can feel that you’re afraid, afraid of change.

3J GSYVWI XLIWI I\EQTPIW YWI %+ EW E TIVMTLIVEP XS IZIV]HE] PMJI and with this arm of progress will come the other,Virtual Reality. The videogame industry has looked into this before, particularly Nintendo [MXL XLIMV :MVXYEP &S] MR FYX RS[ XLEX XLI XIGLRSPSK] LEW GEYKLX up, it is being revisited with substantially more impressive results. A famous example of this is the Oculus Rift VR headset, which potentially allows you to become completely immersed in whatever world your virtual avatar occupies, moving its viewpoint as you move your head. From there, it is a short step to imagine places where people go to IRNS] PS[ GSWX ZMVXYEP LSPMHE]W WYGL EW [LEX ]SY QE] LEZI WIIR MR Total Recall or Inception, albeit the latter is literally a dream rather than a virtual world. From holidays will come the possibility of extended stays

17


Colin Williams SBL

8,) 1-2(7 -2 8,) 1%88)6 The Forgotten Architects of the Cyber Domain

18


“Very great and pertinent advances doubtless can be made during the remainder of this century, both in information technology and in the [E]W QER YWIW MX ;LIXLIV ZIV] great and pertinent advances will be made, however, depends strongly on how societies and nations set XLIMV KSEPW² Âą0MFVEVMIW SJ XLI *YXYVI² . ' 6 0MGOPMHIV

.YP] 8LI 7IGSRH ;SVPH ;EV MW HVE[MRK XS MXW ½REP GPSWI %PXLSYKL XLI 97% [MPP GSRXMRYI XS GSRHYGX STIVEXMSRW MR XLI 4EGM½G XLIEXVI YRXMP E VEHMS FVSEHGEWX F] )QTIVSV ,MVSLMXS SR 7ITXIQFIV XL ERRSYRGIW .ETER´W WYVVIRHIV XLI SYXGSQI is assured. Victory in Europe had already been achieved. +IVQER] LEH WYVVIRHIVIH YRGSRHMXMSREPP] XS XLI %PPMIW EX SR 1E] XL &] .YP] XSXEP %PPMIH ZMGXSV] [EW ER EFWSPYXI inevitability. Peace loomed. 8LI WIIHW SJ XLI 'SPH ;EV LEH EPVIEH] FIIR TPERXIH TIVLETW as early as the Nazi-Soviet Non-Aggression Pact of 1939. 'IVXEMRP] F] XLI JVERXMG VEGI XS &IVPMR FIX[IIR XLI 9776 JVSQ XLI )EWX ERH XLI 9/ ERH XLI 97% JVSQ XLI ;IWX JSPPS[MRK the Normandy landings and the Allied invasion of Europe. From these seeds, the roots of the continuing, global, and I\MWXIRXMEP WXVYKKPI XLEX [EW XS HI½RI ERH WLETI XLI LYQER story for what remained of the twentieth century were EPVIEH] KVS[MRK ERH EX E VIQEVOEFPI VEXI ,S[IZIV MX [SYPH RSX FI YRXMP 1EVGL XL XLEX 'LYVGLMPP [SYPH HIGPEVI “from Stettin in the Baltic to Trieste in the Adriatic an iron curtain has descended across the Continentâ€?. -R .YP] XLI HIIT XIVVSVW SJ XLI 'SPH ;EV [IVI JSV QSWX SJ LYQERMX] YRJSVIWIIR ERH YRMQEKMRIH -R .YP] QER] SJ LYQERMXMIW ½RIWX QMRHW [IVI GSQTIPPIH XS GSRXIQTPEXI on the ruins of the world and, more importantly, on the new world that they would make to replace and improve that which had been destroyed. Fascism had been defeated. Democracy had prevailed. A high price had been paid by victor and vanquished alike. Cities, nations and empires lay in the ruins of victory as well as of defeat. Amongst the victors, IPEXMSR [EW XIQTIVIH [MXL I\LEYWXMSR 8LI 9/ IGSRSQ] MR particular having been dealt a beating from which it would never recover. The world had witnessed the capacity of human science and technology to mechanise and industrialise wholesale WPEYKLXIV SJ WSPHMIVW ERH GMZMPMERW EPMOI LEH [EXGLIH XLI QEWW TVSHYGXMSR SJ HIEXL TPE]IH SYX SR E KPSFEP WXEKI ;EV ERH KIRSGMHI LEH FIIR VI½RIH F] [IWXIVR GMZMPMWEXMSR XS a grotesquely clinical exercise in accountancy and modern QEREKIQIRX 8LI PIKMXMQEG] SJ XLI )YVSTIER MQTIVMEP TVSNIGX perished in the barbarity and horror of Auschwitz and Stalingrad. In order to secure this victory, the entirety of the will, energy and treasure of the greatest nations on Earth had been HIZSXIH XS SRI WMRKPI EMQ ZMGXSV] 8LMW LEH FIIR E XSXEP [EV in every sense of the word. Now that the victory had been EXXEMRIH [LEX RI\X# ;LEX [EW XLI RI[ [SVPH XS FI VIQEHI from the ruins of the old to look like?

19

-R XLI 7YQQIV SJ XLIVI [EW E WIRWI XLEX KVIEX XLMRKW must now be done in order to ensure that the new world [SYPH FI SRI [SVXL] SJ XLI WEGVM½GIW XLEX LEH FIIR QEHI a peace worth the price. All of this had to have been for something. Amongst the great minds of humanity a sense had grown of the power of human agency and spirit to create great effect. These were the minds that had harnessed the power of the atom, through technology, to the human will. These were the minds that had created machines of vast power and sophistication to make and break the deepest of secrets. These were the minds that sensed the expectations of history upon them. It was their responsibility, individually ERH GSPPIGXMZIP] XS WIGYVI XLI TIEGI NYWX EW MX LEH FIIR XS [MR the war. It was their duty to enhance and improve the human condition. And, they knew it. -R XLI .YP] MWWYI SJ XLI “Atlantic Monthlyâ€?, the man who LEH WTIRX LMW [EV HMVIGXMRK ERH GLERRIPPMRK XLI WGMIRXM½G research required to secure victory in arms, responded to the imperatives of the peace, and the call of history, with the TYFPMGEXMSR SJ XLI WIQMREP TETIV Âą%W ;I 1E] 8LMRO² %W ½VWX the chairman of the National Defense Research Committee, ERH XLIR XLI HMVIGXSV SJ XLI 3J½GI SJ 7GMIRXM½G 6IWIEVGL ERH Development,Vannevar Bush was responsible for directing and co-ordinating the prodigious and ground breaking research required to enable the prosecution of total war on an industrial scale. In his paper, Bush openly acknowledges that, for scientists, ÂąMX LEW FIIR I\LMPEVEXMRK XS [SVO MR IJJIGXMZI TEVXRIVWLMT² MR SVHIV XS EXXEMR E ÂąGSQQSR GEYWI² ,I TSWIW XLI UYIWXMSR Âą[LEX EVI XLI WGMIRXMWXW XS HS RI\X² RS[ XLEX XLI I\LMPEVEXMSR of the war has ebbed away? His answer is that the scientists of the peace must turn their attentions to making real the radical transformation in the relationships between humanity and information promised by the technology developed at such pace and cost during the war. For Bush this is about far more than computers as great calculators for scientists; “a much larger matter than merely the extraction of data for the TYVTSWIW SJ WGMIRXM½G VIWIEVGL MX MRZSPZIW XLI IRXMVI TVSGIWW F] [LMGL QER TVS½XW F] LMW MRLIVMXERGI SJ EGUYMVIH ORS[PIHKI² Bush proposed the creation of a device to extend and IRLERGI XLI LYQER QIQSV] E QEGLMRI XS EMH ERH EYKQIRX XLI LYQER TS[IVW SJ GSKRMXMSR MQEKMREXMSR ERH GVIEXMSR a computer to work in symbiosis with the human. He proposed a device that would operate as human thought does, “by associationâ€?. For Bush, the human mind can, “with one item in its graspâ€?, link “instantly to the next that is suggested by the association of thoughts, in accordance with some intricate web of trails carried by the cells of the brainâ€?. He describes “a future device for individual use, which is a sort of mechanized TVMZEXI ½PI ERH PMFVEV]² ,I KMZIW MX E REQI XLI ÂąQIQI\² 8LI QIQI\ I\XIRHW XLI LYQER QIQSV] ERH XLI QMRH “it is a device in which an individual stores all his books, records, and communications, and which is mechanised so that it may be GSRWYPXIH [MXL I\GIIHMRK WTIIH ERH žI\MFMPMX]² ,I KMZIW XLI RI[ XLMRK E JSVQ MX MW “a deskâ€?. For the human, it is a “piece of furniture at which he worksâ€?, rather than a Q]WXIVMSYW MREGGIWWMFPI KEVKERXYER QSRWXIV QEGLMRI ½PPMRK ER IRXMVI VSSQ -X MW QSYPHIH EVSYRH LYQER MRXIVEGXMSR it has “slanting translucent screens on which material can be projected for convenient readingâ€?. For data entry and control there is both a “keyboardâ€?, and “provision for direct entryâ€? via a “transparent platenâ€? upon which can be “placed longhand notes, photographs, memorandaâ€?. These originals can then be “photographed onto the next blank space in a section of the QIQI\ ½PQ ² If at any time the user losses the thread of their interaction with the memex, a “special button transfers him MQQIHMEXIP] XS XLI ½VWX TEKI SJ XLI MRHI\²


through ¹XMQI WLEVMRK GSQTYXIV W]WXIQW [MXL VIQSXI YWIV XIVQMREPW² 6.

Bush’s paper lays out the essence of the core thinking upon which the ;SVPH ;MHI ;IF [EW XS FI GSRWXVYGXIH &YWL TVSZIH MRGSVVIGX MR LMW preference for analogue over digital computers. However, his vision, of the human interactions with information augmented by symbiotic machines integrated by design in to the associative workings of human GSKRMXMSR LEW FIIR QEHI VIEP ;I WII XLMW MR XLI EPKSVMXLQW HVMZMRK XSHE]´W WIEVGL IRKMRIW MR XLI GSRGITXW ERH XIGLRSPSK] SJ L]TIVPMROMRK XLEX TVSZMHIW XLI XLVIEHW SJ XLI ;IF FYMPX YTSR XLI HIGEHIW SJ EWWSGMEXMZI ERH GYQYPEXMZI XLSYKLX LI MRMXMEXIH ERH MR XLI TVMRGMTEPW informing the graphical user interface model of mediating human communications with our machine counterparts.

-R XLI ½VWX I QEMP [EW WIRX EGVSWW %64%2)8 % W]WXIQ SJ networked computers created in 1963 as a direct realisation of J. C. R. Licklider’s vision. A system conceived and moulded by human thought ERH [MPP XLI W]WXIQ XLEX WXERHW EW XLI TSMRX SJ KIRIWMW SJ XLI -RXIVRIX % net that provided the fabric from which Bush’s web could, and would, be woven. The foundations of a cybernetic system in which Bush’s memex morphs in to the universal machine of Turing and von Neumann. -R [LMPWX EX %64% 0MGOPMHIV IWXEFPMWLIH ER ETTPMIH VIWIEVGL programme that laid the foundations for generations of research and development, and postgraduate teaching, in computers and computing. The programme took years if not decades to bear fruit. Directly and indirectly, it produced some of the keystone elements of modern computing. It continues to do so to this day.

Bush’s paper entered an intellectual context already populated with minds turned in the direction of computers and computing. In particular, the minds of A. M. Turing and John von Neumann. Turing’s 1936 paper Âą3R 'SQTYXEFPI 2YQFIVW ;MXL ER %TTPMGEXMSR XS XLI )RXWGLIMHYRKWTVSFPIQ² offers clear evidence of the direction of his pre-war thinking towards XLI TSWWMFMPMX] SJ E YRMZIVWEP GSQTYXMRK QEGLMRI ;LMPWX EXXIRHMRK Princeton from 1937 to 1938, Turing encountered von Neumann for a WIGSRH XMQI XLI X[S LEZMRK QIX ½VWX [LIR ZSR 2IYQERR [EW E ZMWMXMRK TVSJIWWSV EX 'EQFVMHKI HYVMRK XLI XLMVH XIVQ SJ -R .SLR + /IQIR] LEH ÂąXLI TVMZMPIKI SJ PMWXIRMRK XS E PIGXYVI EX 0SW %PEQSW F] Š .SLR ZSR 2IYQERR² MR [LMGL ZSR 2IYQERR PEMH SYX ½ZI TVMRGMTEPW JSV XLI HIWMKR SJ E GSQTYXMRK QEGLMRI SJ XLI JYXYVI /IQIR]´W QIQSV] LEW ZSR 2IYQERR´W TVSTSWEPW EW Âą *YPP] )PIGXVSRMG 'SQTYXIVW² Âą &MREV] Number Systemâ€?, “3, Internal Memoryâ€?, “4, Stored Programâ€? and, “5, Universal Computerâ€? 1. Turing’s direction of mind towards the question of machine intelligence is signposted in his lecture to the London Mathematical 7SGMIX] SR XL *IFVYEV] 8LI [SVPH [EW RSX XS ORS[ SJ Colossus for decades to come.

The names of the institutions funded by this programme still reads like a who’s who of the great and the good in the realms of the teaching and VIWIEVGL SJ GSQTYXMRK &IGEYWI SJ 0MGOPMHIV 9RMZIVWMX] SJ 'EPMJSVRME &IVOPI] [EW KVERXIH JYRHW XS HIZIPST XMQI WLEVMRK XLVSYKL 4VSNIGX +IRMI 0MOI[MWI XLI 1EWWEGLYWIXXW -RWXMXYXI SJ 8IGLRSPSK] [EW IREFPIH to research Machine Aided Cognition, or Mathematics and Computation, or Multiple Access Computer, or Machine Aided Cognitions, or Man ERH 'SQTYXIV XLVSYKL 4VSNIGX 1%' 7 ;LEX [EW XS FIGSQI 'EVRIKMI 1IPPSR 9RMZIVWMX] XSSO VIGIMTX SJ WM\ LYRHVIH QMPPMSR HSPPEVW MR SVHIV XS GSRHYGX VIWIEVGL MR XS XLI XLISV] SJ GSQTYXIV TVSKVEQQMRK EVXM½GMEP intelligence, the interactions between computers and natural languages, the interactions between humans and computers, and, the design of computing machinery. The Augmentation Research Center within the Stanford Research Institute was tasked with developing technologies to enable components of computers and elements of computer systems to interact.

-R 2SVFIVX ;MIRIV TYFPMWLIW XLI ½VWX SJ E WIVMIW SJ XLVII FSSOW MR [LMGL LI ERRSYRGIH XLI GVIEXMSR SJ E RI[ WGMIRGI “Cybernetics: or Control and Communication in the Animal and the Machineâ€?. The foundation text was followed by “The Human Use of Human Beingsâ€? MR ERH XLI XVMPSK] [EW GSQTPIXIH MR [MXL “God and Golem, Inc.â€? ;MIRIV´W QMWWMSR MR [EW XS TVSZMHI E “fresh and independent TSMRX SJ GSQQIRGIQIRX² JSV ÂąXLI WXYH] SJ RSR PMRIEV WXVYGXYVIW ERH W]WXIQW [LIXLIV IPIGXVMG SV QIGLERMGEP [LIXLIV REXYVEP SV EVXM½GMEP² . By 1964 he [EW VIžIGXMRK SR “three points in cyberneticsâ€?. Firstly, “machines which learnâ€?. Secondly, “machines ‌ able to make other machines in their own imageâ€?. Thirdly, “the relations of the machine to the living beingâ€? 3. Across XLI WTER SJ XLIWI XI\XW ;MIRIV HIZIPSTW XLI GSRGITXYEP TLMPSWSTLMGEP ERH QEXLIQEXMGEP JVEQI[SVO XLEX YRM½IW ERH XVERWJSVQW LYQER ERH machine in the cyber domain of today.

8LI FMVXL SJ 3TIR 7SYVGI MR XLI W ERH XLI HIZIPSTQIRX SJ XLI 6-7' EVGLMXIGXYVI MR XLI W EX 9RMZIVWMX] SJ 'EPMJSVRME &IVOPI] stem from the seeds planted by Licklider. As does the genesis of social RIX[SVOMRK QERMJIWX MR XLI 'SQQYRMX] 1IQSV] 4VSNIGX XIVQMREP found in Leopold’s Records in Berkley in 1973. The use, in 1984, of robots designed by Carnegie Mellon academics in the clean up of the wreckage and debris from the partial nuclear meltdown at Three Mile Island has the same lineage. Likewise, the continuing and growing world PIEHMRK TSWMXMSR MR XLI EVIEW SJ EVXM½GMEP MRXIPPMKIRGI ERH XLI XLISVMIW SJ GSQTYXEXMSR IRNS]IH F] XLI 1EWWEGLYWIXXW -RWXMXYXI SJ 8IGLRSPSK] Similarly, the emergence of the mouse, hyperlinks and the graphical user interface from Stanford shares this common origin. All of this sits in a direct causational relationship to Licklider’s endeavours. All of this, impressive though it is, leaves out the impact of the graduates from these institutions and the creation around them of a culture and an environment within which great things are done. Stanford nestles in the heart of Silicon Valley and counts Sergey Brin, Larry Page and Vinton Cerf amongst its alumni.

8[S ]IEVW FIJSVI LI NSMRIH XLI RI[P] GVIEXIH %HZERGIH 6IWIEVGL 4VSNIGXW %KIRG] MR . ' 6 0MGOPMHIV LEH EPVIEH] FIKYR XS HMVIGX his thoughts towards the “expected development in cooperative interaction between man and electronic computersâ€? that will lead to a ÂąQER GSQTYXIV symbiosisâ€? in which “a very close coupling between the human and the electronic members of the partnershipâ€? will “let computers facilitate formative thinkingâ€? and “enable men and computers to cooperate in making decisions and controlling complex situationsâ€? 4. By 1968, Licklider predicted [MXL EWWYVIH GSR½HIRGI XLEX HIWTMXI MX FIMRK “a rather startling thing to sayâ€?, nonetheless, “in a few years, men will be able to communicate more effectively through a machine than face to face.â€? 5 8LVII ]IEVW SR JVSQ LMW ETTSMRXQIRX XS XLI RI[ EKIRG] MR Licklider was commissioned with the production of a report in to the “Libraries of the Futureâ€?. His task, not to examine new ways to store ERH VIXVMIZI FSSOW FYX MRWXIEH XS GSRWMHIV XLI “concepts and problems of man’s interaction with the body of recorded knowledgeâ€? and to explore “the use of computers in information storage, organisation, and retrieval.â€? His prediction was that what he called a ‘procognitive’ system would evolve based on digital computers. Outlandish though it might seem to the VIEHIVW SJ XLI VITSVX MR XLIWI GSQTYXIVW [SYPH LEZI ÂąVERHSQ EGGIWW QIQSV]² ÂąGSRXIRX EHHVIWWEFPI QIQSV]² ÂąTEVEPPIP TVSGIWWMRK² GEXLSHI VE] SWGMPPSWGSTI HMWTPE]W ERH PMKLX TIRW² ÂąLMIVEVGLMGEP ERH VIGYVWMZI TVSKVEQ WXVYGXYVIW² ÂąTVSGIHYVI SVMIRXEXIH ERH TVSFPIQ SVMIRXEXIH PERKYEKIW² and “xerographic output unitsâ€?. 8LI] [SYPH FI IRQIWLIH MRXIVGSRRIGXIH

The testaments to the enduring legacy of Licklider’s vision are as clear EW XLI QSWX MQTSVXERX PIWWSR XLI] SJJIV REQIP] XLEX XLI WYGGIWW SJ XLI LYQER WIRWI QEOMRK TVSNIGX MR XLI EVIE SJ G]FIV GER SRP] FI MQEKMRIH through a long range lens. Success in this endeavour quite possibly being our only hope of surviving, let alone harnessing, the inexorable dependence humanity now has on cyber. A dependence foretold by WGMIRGI ½GXMSR In his 1946 story “A Logic Named Joeâ€? E QIVV] XEPI SJ XLI -RXIVRIX (the tanks), PCs (logics), and the near collapse of society because of them. Murray Leinster has the tank maintenance engineer reply to the suggestion that the network of logics and tanks might be shut down in order to save humanity from the eponymous Joe, a logic that has somehow attained a form of sentience, with the chillingly prescient VMTSWXI “Shut down the tank?â€? he says mirthless. “Does it occur to you, JIPPE XLEX XLI XERO LEW FIIR HSMR´ EPP XLI GSQTYXMR´ JSV IZIV] FYWMRIWW SJ½GI JSV ]IEVW# -X´W FIIR LERHPMR´ XLI HMWXVMFYXMSR SJ RMRIX] JSYV TIVGIRX SJ EPP XIPIGEWX programs, has given out all information on weather, plane schedules, special


8LI 97% LEH JEPPIR FILMRH 7SZMIX XIGLRSPSK] [MXLSYX IZIR ORS[MRK MX ;SVWI XLI 97 PEGOIH XLI GETEGMX] XS GSRHYGX XLI VIWIEVGL VIUYMVIH XS GEXGL YT -R *IFVYEV] MR XLI QMHWX SJ LMW TVIWMHIRG] )MWIRLS[IV GVIEXIH XLI %HZERGIH 6IWIEVGL 4VSNIGXW %KIRG] %64% -R Licklider was plucked by ARPA from his professorship in psychology at MIT, and placed in charge of the newly created Information Processing 8IGLRMUYIW 3J½GI EX %64% ,MW QMWWMSR [EW XS PIEH XLI HIZIPSTQIRX SJ research and the creation of technologies to enable the military use of GSQTYXIVW ERH MRJSVQEXMSR TVSGIWWMRK -R LMW S[R [SVHW LMW NSF [EW XS “bring in to being the technology that the military needsâ€? 9.

WEPIW IQTPS]QIRX STTSVXYRMXMIW ERH RI[W LEW LERHPIH EPP TIVWSR XS TIVWSR contacts over wires and recorded every business conversation and agreement PMWXIR JIPPE 0SKMGW GLERKIH GMZMPM^EXMSR 0SKMGW EVI GMZMPM^EXMSR -J [I WLYX SJJ logics, we go back to a kind, of civilization we have forgotten how to run!â€? Before the risky and radical funding and research construct Licklider created came into being, not a single Ph.D. in computing had been GSRJIVVIH ER][LIVI MR XLI 97% XLI ½VWX FIMRK E[EVHIH MR Licklider operated with courage, foresight and vision. Humanity, and the 97 IGSRSQ] EVI XLI VMGLIV FIGEYWI LI HMH ,I IWXEFPMWLIH ER EGEHIQMG GSRXI\X XLEX [SYPH FI MQTSWWMFPI XS EXXEMR MR XLI 9/ XSHE] [MXLMR XLI GSR½RIW WIX F] XLI GYVVIRX JYRHMRK VIKMQI ERH I\IQTPM½IH MR XLI Research Excellence Framework. Our academic institutions are locked in to a funding structure that actively militates against radical and disruptive thought. Intellectual creativity and cross-disciplinary work are driven out by a system that rewards conservatism, conformity and compliance, with research funding and professional advancement. This same culture fosters a headlong retreat in to ever narrower slivers of specialisation. The only sense in [LMGL QEXXIVW HMJJIV JVSQ &YWL´W SFWIVZEXMSR MR XLEX “there is increasing evidence that we are being bogged down as specialization extendsâ€? 8 is that we are now worse off than they were three quarters of a century ago. Just as we have retreated in to the cold comfort of conformity in WXIVMPI VIWIEVGL WS [I LEZI EPPS[IH XVEMRMRK XS YWYVT IHYGEXMSR ;I are producing generation after generation of graduates, more or less skilled in the rote application of knowledge and processes, which are themselves more or less relevant to the world as it is. These graduates have no sense of the interactions between the technology of computing ERH LYQERMX] RS WIRWI SJ XLI SVMKMRW ERH REXYVI IZIR SJ XLI XIGLRSPSK] 8LI] EVI XVEMRIH 8LI] EVI XIGLRMGMERW LMKLP] WOMPPIH XIGLRMGMERW [MXL E HIQSRWXVEFPI EFMPMX] XS QEWXIV ZIV] GSQTPMGEXIH TVSGIWWIW FYX technicians nonetheless. They are, by design, bereft of the capacity for critical or creative thought. They can exercise formal logic in response to established patterns. They can accomplish complicated and familiar tasks with great faculty. Yet, by virtue of the training itself, they are incapable of adapting to change. They are closed systems, devoid of the EFMPMX] XS EGX SR JIIHFEGO 9REFPI XS GLERKI XLIMV WXEXI ERH YREFPI XS IZSPZI 9RPMOI XLI G]FIV W]WXIQ XLI] MRLEFMX

It is reasonable to assume that by the time of his recruitment by ARPA, Licklider had heard, if not read, the farewell address of the 34th 4VIWMHIRX SJ XLI 97% ([MKLX ( )MWIRLS[IV KMZIR SR XLI XL .ERYEV] MR [LMGL LI EWWIVXIH XLEX JSV XLI 97% “a vital element in keeping XLI TIEGI MW SYV QMPMXEV] IWXEFPMWLQIRX ² 7YVZMZEP VIUYMVIH XLEX ÂąSYV EVQW must be mighty, ready for instant action, so that no potential aggressor may be tempted to risk his own destructionâ€?. Eisenhower also recognised that “this conjunction of an immense military establishment and a large arms industry is new in the American experienceâ€?. He understood that “the total MRžYIRGI ° IGSRSQMG TSPMXMGEP IZIR WTMVMXYEP ° MW JIPX MR IZIV] GMX] IZIV] WXEXILSYWI IZIV] SJ½GI SJ XLI JIHIVEP KSZIVRQIRX ² Likewise, he was clear XLEX XLMW [EW E TVIGSRHMXMSR JSV WYVZMZEP “we recognize the imperative need for this development.â€? However, Eisenhower was not simply HIWGVMFMRK SV NYWXMJ]MRK XLI I\MWXIRGI SJ XLI QMPMXEV] MRHYWXVMEP GSQTPI\ He was warning of its potential dangers. Existential imperative though MX [EW RSRIXLIPIWW “we must not fail to comprehend its grave implications. Our toil, resources and livelihood are all involved; so is the very structure of our society.â€? )MWIRLS[IV´W [EVRMRK XS LMWXSV] [EW GPIEV ERH HMVIGX “The potential for the disastrous rise of misplaced power exists, and will persist. We must never let the weight of this [military and industrial] combination endanger our liberties or democratic processesâ€?. As Turing and von Neumann gave material, technological, form to the QEXLIQEXMGW SJ YRMZIVWEP WXSVIH TVSKVEQQI HMKMXEP GSQTYXEXMSR ERH EW :ERRIZEV &YWL PEMH XLI JSYRHEXMSRW SJ XLI ;SVPH ;MHI ;IF ERH EW ;MIRIV IUYMTTIH LYQERMX] [MXL XLI RI[ WGMIRGI VIUYMVIH XS IREFPI SYV GSQTVILIRWMSR SJ XLI RI[ [SVPH XLIWI QMRHW LEH GVIEXIH WS 0MGOPMHIV created the conditions and the context within which the Internet was born. More than this, he created the structures within which computers and computing were developed. Licklider was the architect of the assimilation of the Internet, computers and computing in to the service SJ XLI WIGSRH KVIEX I\MWXIRXMEP GSRžMGX SJ XLI X[IRXMIXL GIRXYV] XLI HI½RMRK GSRXI\X SJ XLI 'SPH ;EV 8LI ZEWX ERH XVERWJSVQEXMZI GSRWXVYGX we call cyber was imagined as a consequence of the devastation [VSYKLX F] SRI KVIEX [EV ERH JSVQIH MR XS VIEPMX] EW E QIERW SJ avoiding the extinction level consequences of another. However, both Bush and Licklider imagined their work as a means by which humanity [SYPH IZSPZI ERH MQTVSZI ERH žSYVMWL 2SX QIVIP] EW E QIERW F] which it would avert extinction. Not merely as a weapon of war.

Across the community of those interested in cyber and cyber security, there are numerous voices calling, correctly, for a science of cyber. However, there is manifest confusion about what such a call amounts to. The goal of science is not the acquisition of empirical data per se. Neither is the creation of a science the elevation of assertions to fact simply because of their utterance from the mouth of a scientist. Science is about a rigorous and methodological approach to the formulation, testing, destruction and re-making of hypotheses in order to push back the frontiers of human knowledge and understanding. Science requires insight, vision, creativity, courage and risk taking in the formulation of these hypotheses as much as it requires discipline, rigour and method in their testing. Those who make the call for a science of cyber should ½VWX VIEH ;MIRIV J. C. R. Licklider was a principal and formative actor at the heart of the military-industrial complex called forth by the existential imperatives SJ XLI 'SPH ;EV %RH LI ORI[ MX 3R XLI XL 3GXSFIV E LMKLP] polished metal sphere less than a meter in diameter was launched in XS ER IPPMTXMGEP PS[ IEVXL SVFMX F] XLI 9776 )PIQIRXEV] 7EXIPPMXI 7TYXRMO FIGEQI XLI ½VWX EVXM½GMEP IEVXL WEXIPPMXI ERH ER ETTEVIRX W]QFSP SJ 7SZMIX WGMIRXM½G TS[IV 8LI I]IW SJ XLI [SVPH GSYPH WII MX The radio receivers of the world could hear it. The propaganda victory KPIERIH F] XLI 9776 [EW FEH IRSYKL &YX [SVWI JSV XLI GSRXVSPPMRK QMRHW SJ XLI 97 KSZIVRQIRX ERH QMPMXEV] XLI RMKLXQEVI SJ WTEGI FSVRI weapons platforms became instantly real. The divide between science ½GXMSR ERH WGMIRGI JEGX ZERMWLIH SZIVRMKLX ;MXL RIMXLIV [EVRMRK RSV XMQI XS WLIPXIV EXSQMG HIWXVYGXMSR GSYPH RS[ HIWGIRH HMVIGXP] JVSQ XLI darkness of space.

Just as we have retreated into the cold comfort of conformity in sterile research, so we have allowed training to usurp education.


Research funding should enable, even reward, intellectual courage and risk taking. Researchers should be allowed to fail. Creative and productive failures should be celebrated and learnt from. Those allocating research funding should take risks, and be praised and VI[EVHIH JSV HSMRK WS ;MXLSYX XLI GSYVEKI ERH VMWO XEOMRK SJ 0MGOPMHIV &YWL 8YVMRK ;MIRIV ERH ZSR 2IYQERR ERH XLSWI [LS WYTTSVXIH ERH paid for them, where would we be now?

The forgotten architects of the cyber domain, Bush and Licklider, imagined a world transformed. They understood the centrality of XLI LYQER VIPEXMSRWLMT [MXL MRJSVQEXMSR ERH XLI] YRHIVWXSSH XLEX the potential to re-shape this relationship was also the potential to re-form and re-make the essence of our humanity, for the better. They understood that their vision of the transformation to the relationship between humanity and information, which they also gave us the ability to make real, represented our best, our only, hope of survival.

;I EVI FIKMRRMRK XS KVSTI XS[EVHW XLI ½VWX KPMQQIVMRKW SJ comprehension of the enormity, and scale, and velocity of the transformation to the human story that is cyber. Once more, it is required of us to think and act with courage, foresight and vision. It falls to us to reform and reshape both the ‘what’ and the ‘how’ of our thoughts and our deeds. It is time to prove ourselves worthy of the trust placed in us by the architects of the cyber domain.

%W LI GSRGPYHIW LMW VIžIGXMSRW SR “As We May Thinkâ€?, Bush observes XLEX MR LYQERMX] LEW EPVIEH] “built a civilization so complex that he needs to mechanise his record more fully if he is push his experiment to its logical conclusionâ€?. ,I MW GPIEV XLEX WGMIRGI LEW KVERXIH YW [SRHIVW XLEX it has ÂąFYMPX YW ?XLIA [IPP WYTTPMIH LSYWI² of civilisation within which we are learning and progressing. He is also equally clear that science has given us the terrible power to “throw masses of people against another with cruel weaponsâ€?. His hope is that science will permit humanity “truly to encompass the great record and to grow in the wisdom of the race experience.â€? ,MW JIEV XLEX LYQERMX] ÂąQE] ]IX TIVMWL MR GSRžMGX FIJSVI ?MXA learns to wield that record for his true good.â€? ,MW NYHKIQIRX XLEX EPVIEH] having endured so much, and having already accomplished so much “in the application of science to the needs and desires of man, it would seem to be a singularly unfortunate stage at which to terminate the process, or to lose hope as to the outcomeâ€?. 8LMW VIQEMRW EW XVYI MR EW MX [EW MR

;I SJ GSYVWI LEZI WSQIXLMRK EZEMPEFPI XS YW XLEX XLI EVGLMXIGXW SJ XLI HSQEMR HMH RSX XLI I\MWXIRGI SJ XLI HSQEMR MXWIPJ %R MQQIEWYVEFP] powerful construct conceived, designed and engineered by its makers precisely in order to liberate human intelligence and creativity. Time to WLIH XLI WLEGOPIW SJ XLI 'SPH ;EV ERH WIX MX JVII - TVSTSWI XLI GVIEXMSR SJ E RI[ MRWXMXYXI 8LI 4VSQIXLIYW -RWXMXYXI for Cyber Studies. So named as a conscious invocation of all of the GEHIRGIW EQFMKYMXMIW ERH HMJ½GYPXMIW SJ XLI WXSVMIW SJ 4VSQIXLIYW ERH LMW XLIJX SJ ½VI JVSQ XLI KSHW SJ 3P]QTYW LMW KMJX SJ XLMW WXSPIR ERH most sacred of their possessions to humanity. The Prometheus Institute should be based at, but operate independently from, an established academic institution. It should be formed along the lines of the learned and scholarly societies of the Enlightenment. It should embrace and develop a truly trans-disciplinary approach to improving the human understanding and experience of the cyber phenomenon through scholarship, research and teaching. In his creation of the new science of G]FIVRIXMGW ;MIRIV PMX E XSVGL SYV XMQI XS GEVV] MX JSV[EVH

The human use of computers and computing as a means to survive ERH TVIZEMP MR XLI 'SPH ;EV [EW FSXL MRIZMXEFPI ERH HIWMVEFPI -X TYX these machines at the service of powerful imperatives and commanded the release of the vast troves of treasure, time and intellectual power required to bring these complex and complicated creatures in to existence. It gave us an initial set of market, management and security mechanisms through which we could bring the newborn creature to an MRMXMEP WXEXI SJ IEVP] QEXYVMX] 2S[ XLI 'SPH ;EV MW SZIV 8MQI XS XLMRO again. Time to bring computers and computing back in to the service of augmenting and improving the human condition. Humanity depends YTSR XLI IZSPYXMSR SJ G]FIV JSV MXW S[R IZSPYXMSR ERH JSV MXW ZIV] existence. It falls to us to use the new domain in accordance with the spirit of the intent of its architects. It falls to us to exercise our agency as instrumental elements of the cybernetic system of which we are an MRXIKVEP TEVX 8S HS XLMW [I QYWX ½VWX PIEVR SJ XLI SVMKMRW SJ XLMW RI[ domain and re-discover the minds of its makers. Therefore, we must SYVWIPZIW VIEH ERH WXYH] XLI [SVO ERH [VMXMRKW SJ 2SVFIVX ;MIRIV Vannevar Bush, J. C. R. Licklider, Alan Turing and John von Neumann.

I propose the creation of a new institute; The Prometheus Institute for Cyber Studies‌

Then, we must re-design our university teaching programmes. Firstly, by building these works in as core undergraduate texts. Secondly, by using these texts as the foundation of a common body of knowledge ERH PIEVRMRK EGVSWW EPP SJ XLI ½IPHW EWWSGMEXIH [MXL G]FIV MRGPYHMRK GSQTYXMRK VSFSXMGW EVXM½GMEP MRXIPPMKIRGI ERH WIGYVMX] 8LMVHP] F] encompassing within the common body of knowledge and learning disciplines hitherto alien to the academic study of computing. Cyber is about philosophy as much as it is about mathematics.

References 1 Âą1ER ERH XLI 'SQTYXIV² .SLR + /IQIR] /IQIR] [EW XLI TVIWMHIRX SJ (EVXQSYXL 'SPPIKI JVSQ XS 8SKIXLIV [MXL 8LSQEW ) /YVX^ LI HIZIPSTIH BASIC and one of the earliest systems for time-sharing networked computers. As a graduate student he was Albert Einstein’s mathematical assistant. Âą']FIVRIXMGW SV 'SRXVSP ERH 'SQQYRMGEXMSR MR XLI %RMQEP ERH XLI 1EGLMRI² 2SVFIVX ;MIRIV The choice is (probably) yours. 3 Âą+SH ERH +SPIQ -RG ² 2SVFIVX ;IMRIV 4 Âą1ER 'SQTYXIV 7]QFMSWMW² . ' 6 0MGOPMHIV TYFPMWLIH MR Âą-6) 8VERWEGXMSRW SR ,YQER *EGXSVW MR )PIGXVSRMGW² :SPYQI ,*) 1EVGL Âą8LI 'SQTYXIV EW E 'SQQYRMGEXMSRW (IZMGI² . ' 6 0MGOPMHIV ERH 6SFIVX ; 8E]PSV TYFPMWLIH MR Âą7GMIRGI ERH 8IGLRSPSK]² %TVMP 6 Âą0MFVEVMIW SJ XLI *YXYVI² . ' 6 0MGOPMHIV 7 The acronym MAC was originally formed of Mathematics and Computation but was VIGSQTSWIH QYPXMTPI XMQIW EW XLI TVSNIGX MXWIPJ EHETXIH ERH IZSPZIH 8 %W ;I 1E] 8LMRO² :ERRIZEV &YWL Âą%XPERXMG 1SRXLP]² .YP] 9 1IQSVERHYQ SJ VH %TVMP JVSQ . ' 6 0MGOPMHIV MR ;EWLMRKXSR (' XS Âą1IQFIVW ERH %J½PMEXIW SJ XLI -RXIVKEPEGXMG 'SQTYXIV 2IX[SVO² VIKEVHMRK Âą8STMGW JSV (MWGYWWMSR EX XLI *SVXLGSQMRK 1IIXMRK²

The funding and direction of our research practice should be similarly reformed. Just as ARPA directed broad areas of research targeted at complimentary areas of inquiry, so our funding should be similarly HMVIGXIH ;I WLSYPH FI XEVKIXMRK VIWIEVGL EX TVIGMWIP] XLSWI EVIEW where cyber can enable and empower humanity. At enabling, extending and enhancing democracy for instance. Research funding should not be allocated according to the ability of the recipient to demonstrate formal GSQTPMERGI [MXL E QIGLERMWXMG UYEPMX] GSRXVSP VIKMQI EW MR IJJIGX E reward for the ability to game the system. Rather, it should be awarded SR XLI FEWMW SJ ER MRJSVQIH NYHKIQIRX F] LYQERW EFSYX XLI GETEGMX] of the recipient to deliver radical, creative, innovative and disruptive thought. One way to do this would be to emulate the practice of public GSQTIXMXMSRW JSV XLI WIPIGXMSR SJ EVGLMXIGXW JSV FYMPHMRKW SJ WMKRM½GERGI 6IWIEVGL WLSYPH GEPP JSVXL ERW[IVW RSX QIVIP] IPIKERX EVXMGYPEXMSRW SJ the problem.



TO INANITY AND BEYOND?

NEW NARRATIVES, NEW MAPS, NEW MINDSETS ³4VIHMGXMSR MW ZIV] HMJ½ GYPX IWTIGMEPP] EFSYX XLI JYXYVI ´ - Niels Bohr (attr.) ‘Nobody knows anything.’ ;MPPMEQ +SPHQER Adventures In The Screen Trade

Keith Scott De Montfort University


Imagine you are standing at the head of a queue of people. Just behind you is your father or mother, aged as they were when you were born. Next to LMQ LIV MW SRI SJ XLIMV TEVIRXW EX XLI age when your parent of choice was FSVR RI\X XS XLIQ SRI SJ LMW LIV TEVIRXW EKIH© ]SY KIX XLI MHIE ,S[ far down the line would you have to go before your everyday existence [SYPH FI RSX NYWX MRGSRGIMZEFPI FYX inexplicable to the other person? ;I PMZI MR E [SVPH XLEX [SYPH LEZI been utterly alien to even four or ½ ZI KIRIVEXMSRW FEGO HS[R XLI PMRI ¯ MR XLI ;IWXIVR [SVPH EX PIEWX (and the rest of the globe is catching up), hitherto unknown longevity and literacy, amazingly low levels of child mortality, and a variety of goods available at ludicrously low cost in XLI WLSTW ;I PMZI MR E [SVPH [LMGL WEXMW½ IW XLI HI½ RMXMSR SJ TIVJIGXMSR given by Terry Pratchett’s Cohen the &EVFEVMER

Every generation is in turn overtaken by the next, as new technological developments mark our time to stall on the information highway.

±;LEX MW MX XLEX E QER QE] GEPP XLI KVIEXIWX XLMRKW MR PMJI#² ±,SX [EXIV KSSH HIRXMWLXV] ERH WLSJX PEZEXSV] TETIV ²1 More than this, think of how our everyday existence relies on a level of omnipresent, pervasive technology that RS TVIZMSYW IVE IZIV MQEKMRIH EW ;EVVIR )PPMW TYXW MX -J - [IVI WMXXMRK RI\X XS ]SY X[IRX] ½ ZI ]IEVW EKS ERH you heard a phone ring, and I took out a bar of glass and WEMH WSVV] Q] TLSRI NYWX XSPH QI MX´W KSX RI[ ZMHIS SJ E WSPEV ¾ EVI ]SY´H LEZI QI WIGXMSRIH MR E ¾ EWL 9WI XLI VIEV ZMI[ QMVVSV XS MQEKMRI XIPPMRK WSQISRI NYWX X[IRX] ½ ZI ]IEVW EKS EFSYX +47 8LMW MW XLI PEWX KIRIVEXMSR MR XLI ;IWXIVR [SVPH XLEX [MPP IZIV FI PSWX 0MJI7XVE[W 7]R XLIXMG FMSPSK] +IRIXMG WIUYIRGMRK 7%67 [EW KIRIXMGEPP] WIUYIRGIH [MXLMR LSYVW SJ MXW MHIRXM½ GEXMSR -´Q RSX IZIR XSYGLMRK XLI [IF [M½ QSFMPI FVSEHFERH GPSYH GSQTYXMRK IPIGXVSRMG GMKEVIXXIW©2 How much of what Ellis talks about could you describe to your ancestors? How much could you explain? Before descending into a Panglossian declaration that [I PMZI MR XLI FIWX SJ EPP TSWWMFPI [SVPHW VIQIQFIV XLMW every generation regards the one preceding it as out of touch and less techno-savvy than their own, and sees themselves as the acme of humanity. Every generation is in turn overtaken by the next, as new technological developments mark our time to stall on the information highway. Return to the image of your family line, and picture yourself in the middle of the queue, rather than at its LIEH LS[ JEV [MPP ]SY LEZI XS KS FIJSVI ]SY ½ RH ]SYVWIPJ gaping in blank incomprehension at the everyday lives of your descendants? Ten generations? Five? Two? The past QE] FI EW 04 ,EVXPI] TYX MX E JSVIMKR GSYRXV] XLI JYXYVI is terra ignota, and it’s closer than we think - or like.


As a species, we have any number of nifty design features - binocular vision, opposable thumbs, a large brain...- but perhaps our greatest EWWIXW EVI XLEX [I QEOI XLMRKW ERH GER I\XIVREPMWI SYV ORS[PIHKI ;I QEOI XSSPW ERH IZIV] XSSP MW FSXL ER SFNIGX MR MXWIPJ ERH E QIERW SJ HIXIVQMRMRK LS[ XLEX XSSP MW QEHI EPPS[MRK VITPMGEXMSR ERH VI½RIQIRX and we tell stories, the storage medium for information and the vehicle for its transmission. Religion, politics, philosophy, economics... These EVI EPP ¹G]FIVREVVEXMZIW² MR XLI XVYIWX WIRWI SJ XLI [SVH JSV XLI] EVI all concerned with the attempt to explain and order the universe, to tell the story of why the world is the way it is, or how it should be. TS )PMSX HIWGVMFIH 9P]WWIW EW ¹E [E] SJ GSRXVSPPMRK SJ SVHIVMRK SJ KMZMRK E WLETI ERH E WMKRM½GERGI XS XLI MQQIRWI TERSVEQE SJ JYXMPMX] ERH EREVGL] [LMGL MW GSRXIQTSVEV] LMWXSV]²3 2SVFIVX ;MIRIV HI½RIH G]FIVRIXMGW EW ¹XLI WGMIRXM½G WXYH] SJ GSRXVSP ERH GSQQYRMGEXMSR MR XLI ERMQEP ERH XLI QEGLMRI ²4 In a world which is ever more run on the basis of hugely complex interlinked mechanical, digital and human systems, operating in ways which no single user can hope to understand, we need to ask [LIXLIV SYV GSRXVSPPMRK REVVEXMZIW EVI YT XS XLI NSF 4VSHYGXW SJ LMKLP] WTIGM½G EKIW GYPXYVIW ERH ITMWXIQSPSKMIW WTVMRKMRK JVSQ TEVXMGYPEV societies and regions, can they hope to prepare humanity for life in [LEX ;MPPMEQ +MFWSR XIVQW ¹XLEX TSWXKISKVETLMGEP QIXEGSYRXV] [I MRGVIEWMRKP] GEPP LSQI²5# ;LIVI MR WLSVX EVI XLI G]FIVREVVEXMZIW JSV XLI Age of Cyber? 8LI SFZMSYW ½VWX TPEGI XS PSSO JSV VSEH QETW JSV XLI JYXYVI MW SJ GSYVWI WGMIRGI ½GXMSR ,S[IZIV EW XLI LMWXSV] SJ 7* WLS[W XLI QSQIRXW [LIR writers correctly predict the future are far outweighed by the occasions [LIR XLI] KIX MX [VSRK 'SRWMHIV ;MPPMEQ +MFWSR´W 2IYVSQERGIV XLI FSSO [LMGL KEZI YW ¹G]FIVWTEGI² +MFWSR´W GSRWSPI NSGOI]W NEGO MRXS XLI Matrix with consummate ease, escaping from the prison of meatspace in a cyberspatial carnival, but they still all use pay phones, because he failed to foresee the mobile phone. Time and again, we see the predictions of 7* JEMPMRK XS XVYP] LMX XLI REMP SR XLI LIEH -R ,+ ;IPPW TSWMXIH XLI GVIEXMSR SJ E ¹4IVQERIRX ;SVPH )RG]GPSTEIHME²

8LI JYXYVI MW EPVIEH] LIVI [I EVI FYMPHMRK MX ERH MJ 7* LEW ER] ZEPYI (which I believe it does) it lies in its ability to sketch out possible ways in [LMGL XLI TVIWIRX QE] HIZIPST -R LMW EHHVIWW XS +VIWLEQ 'SPPIKI 2IEP 7XITLIRWSR KMZIW [LEX - JIIP MW XLI WMRKPI FIWX HI½RMXMSR SJ XLI JSVQ Âą7* XLVMZIW FIGEYWI MX MW MHIE TSVR²8 MX GSYTPIW XSKIXLIV E [MHI VERKI SJ concepts in new and often shocking ways, and lets its readers experience the vicarious thrill of seeing what emerges from the process. It offers us the opportunity to gaze toward the stars, or to stare into the EF]WW .SWLYE )PPMW TIVJIGXP] WYQW YT XLI GSRžMGXMRK ZMWMSRW SJ XLI JYXYVI 7* TVIWIRXW “the Future gets divided; the cute, insulated future that Joi Ito and Cory Doctorow and you and I inhabit, and the grim meathook future that most SJ XLI [SVPH MW JEGMRK MR [LMGL XLI] [EXGL XLIMV WUYEXW ERH YRHIV HIZIP STIH ½IPHW KIX XYVRIH MRXS E KMERX KEQI SJ 'SYRXIVWXVMOI FIX[IIR GVE^] JEMXL VMHHIR NMLEHMWX QSXLIV W ERH GVE^] JEMXL VMHHIR %QIVMGER VIHRIGO QSXLIV W IEGL HSMRK XLIMV FIWX XS XYVR XLI IRXMVI [SVPH MRXS SRI X]TI SJ fascist nightmare or another.â€? 9 The cybernarratives of SF privilege curiosity, questioning, and exploration of ideas (perhaps one of the reasons why it is often dismissed as ÂąMQQEXYVI² SV ÂąEHSPIWGIRX² MJ EHSPIWGIRGI MW EFSYX ER]XLMRK MX MW EFSYX the cultivation of the imagination and the refusal to accept the status quo). The cybernarratives of society, on the other hand, tend by their very nature to preach conformity, stability, and obeisance to established ZEPYIW -R XLI EHHVIWW UYSXIH IEVPMIV ;EVVIR )PPMW MHIRXM½IW XLI HERKIVW SJ WYGL ER ETTVSEGL A writer called Ventakesh Rao recently used the term “manufactured normal cyâ€? to describe this.The idea is that things are designed to activate a psy chological predisposition to believe that we’re in a static and dull continuous TVIWIRX %XIQTSVEPMX] GSRWMHIVIH XS FI XLI GSRHMXMSR SJ XLI IEVP] WX GIRXYV] [...] We hold up iPhones and, if we’re relatively conscious of history, we point out that this is an amazing device that contains a live map of the world and the biggest libraries imaginable and that it’s an absolute paradigm shift in personal communication and empowerment. And then some knob says that it looks like something from Star Trek Next Generation, and then someone else says that it doesn’t even look as cool as Captain Kirk’s communicator in the original and then someone else says no but you can buy a case for it to make it look like one and you’re off to the manufactured normalcy races, where RSFSH] [MRW FIGEYWI IZIV]SRI KSIW XS MRK WPIIT10.

8LIVI MW RS TVEGXMGEP SFWXEGPI [LEXIZIV RS[ XS XLI GVIEXMSR SJ ER IJ½GMIRX index to all human knowledge, ideas and achievements, to the creation, that is, of a complete planetary memory for all mankind.6 -R :ERRIZEV &YWL TYFPMWLIH ¹%W ;I 1E] 8LMRO² [LMGL TVSTSWIH XLI 1)1)< E XIVQMREP [LMGL [SYPH EPPS[ E YWIV XS EGGIWW ER] MXIQ SJ ORS[PIHKI JVSQ ER][LIVI 8LIR MR %VXLYV ' 'PEVOI TVSTSWIH XLEX XS XLMW ¹;SVPH 0MFVEV]² [SYPH FI GSYTPIH E WYTIVGSQTYXIV XLI ¹;SVPH &VEMR² [LMGL [SYPH FI YWIH XS ½RH WSPYXMSRW XS EPP XLI [SVPH´W problems. Put together, these three authors appear to have predicted XLI ;IF ERH ;MOMTIHME RSRI SJ XLIQ JSVIWE[ PSPGEX^ SV GLER SV Twitter, or.... feel free to add to the list.

If we as a country, a culture, or even as a species are to survive (and history tells us that extinction is the norm, rather than the exception), then we need to be producing narratives which inculcate a sense of wonder and a desire to move beyond the conventional. Speaking for Q] S[R ½IPH REQIP] IHYGEXMSR MX MW GPIEV XS WII XLEX XLMW MW WEHP] EPP XSS VEVI -R XLI 9/ [I EWWIWW QIEWYVI ERH XIWX SYV GLMPHVIR QSVI XLER ER] SXLIV REXMSR MR ;IWXIVR )YVSTI ERH EW E VIWYPX XIEGLIVW EVI XVETTIH MRXS ÂąXIEGLMRK XS XLI XIWX² PIEZMRK PMXXPI SV RS XMQI XS IRGSYVEKI MRHITIRHIRGI SV GVMXMGEP XLMROMRK SV XS PSSO FI]SRH XLI GSR½RIW SJ XLI GYVVMGYPYQ -X MW LEVH XS WII LS[ XLMW FIRI½XW XLI XIEGLIVW XLI XEYKLX SV 9/4PG ;MXLMR 'SQTYXIV 7XYHMIW E WYFNIGX [LMGL [SYPH ETTIEV XS be of interest to readers of Cyber Talk), we have seen a declared desire at government level to encourage uptake and to develop students’ EFMPMX] XS TVSKVEQ %W XLI VITSVX 'SQTYXIV 7GMIRGI EW E WGLSSP WYFNIGX 7IM^MRK XLI STTSVXYRMX] WE]W WYGL ER ETTVSEGL MW MREHIUYEXI

%X MXW FIWX 7* MW ER I\XVETSPEXMZI RSX E TVIHMGXMZI QIHMYQ MX MW PIWW GSRGIVRIH [MXL ÂąXLMRKW XS GSQI² XLER ÂąXLMRKW XLEX QMKLX RSX GSQI MJ [I HSR´X KIX SYV EGX XSKIXLIV² %W 8LSQEW (MWGL TYX MX ÂąWGMIRGI ½GXMSR MW RSX EFSYX TVIHMGXMRK XLI JYXYVI FYX I\EQMRMRK XLI TVIWIRX The world that Aldous Huxley depicts in Brave New World is not some hypo XLIXMGEP XSQSVVS[ MX MW XLI XLVMPPIH ERH LSVVM½IH VIEGXMSR SJ ER YTTIV GPEWW )RKPMWLQER VIEGXMRK XS LMW ½VWX ZMWMX XS .E^^ %KI %QIVMGE E REXMSR XLEX ZEPYIW the “feeliesâ€? (Hollywood movies) above the tragic vision of Shakespeare.The world that George Orwell envisaged in 1984 is simply a darker version of the year it was written, 1948.â€? 7

? A TVSKVEQQMRK MW RSX XLI WEQI EW 'SQTYXIV 7GMIRGI (MNOWXVE JEmously remarked that “Computer science is no more about computers XLER EWXVSRSQ] MW EFSYX XIPIWGSTIW² ERH XLEX RIEXP] IRGETWYPEXIW XLI point. Computer Science fundamentally consists of concepts, ideas, principles, and techniques, such as algorithms, data structures, and abstraction. [...] That is the goal. Coding is an essential means towards that KSEP ERH E ZIV] IQTPS]EFPI EWWIX EW [IPP &YX [I QYWX KYEVH EKEMRWX Âą;I LEZI E GSYVWI MR .EZE WS SJ GSYVWI [I EVI XIEGLMRK 'SQTYXIV 7GMIRGI² Concepts endure for a lifetime, whilst particular skills (such as a particular programming language) will date11.


How do we promote Computer Science in schools? Not through a narraXMZI XLEX WE]W ÂąXLMW [MPP FI YWIJYP KSSH JSV ]SY² XLI ÂąIEX ]SYV KVIIRW² WXVEXegy will never appeal. A more successful approach may be to leave copies SJ 'SV] (SGXSVS[´W 0MXXPI &VSXLIV P]MRK EVSYRH XLMW ]SYRK EHYPX RSZIP [MPP teach its target audience a great deal about how technology works, and LS[ MX GER [SVO JSV XLIQ MX EPWS KIXW XLIQ XLMROMRK EFSYX MWWYIW SJ IXLMGW MRHMZMHYEP VIWTSRWMFMPMX] ERH IQTS[IVQIRX ÂŻ E GVEWL GSYVWI MR G]FIV IXLics, wrapped up in the packaging of a technothriller. Combine this with Raspberry Pis and 3D Printers in every school (primary and secondary) in the country, and we might actually be getting somewhere. % REXMSREP G]FIVWOMPPW IHYGEXMSR TVSQSXMSR WXVEXIK] QYWX FI TPERRIH at governmental level, and that is where our problem lies. The current Cabinet is overwhelmingly the product of the prevailing narrative of a traditional ruling class, schooled in the established model of education for the British ĘƒĘ?ɴɸĘŒĘ†ÉźĘ?ɝʎ 'PEWWMGEP +VIIO JSV ÂąLIPQWQER² SV ÂąKSZIVRSV² XLI VSSX SJ ÂąG]FIVRIXMGW² SYX SJ 'EFMRIX QIQFIVW EVI QEPI EVI [LMXI EVI 3\FVMHKI KVEHYEXIW ERH LEZI E HIKVII MR 44) ÂŻ RSRI are scientists (and no, economics does not count). As a degree, PPE was MRXVSHYGIH MR XLI W EW XLI MHIEP XVEMRMRK JSV GMZMP WIVZERXW HIWMKRIH XS VITPEGI 'PEWWMGW XLI XMQI LEW WYVIP] GSQI XS HIZMWI E RI[ GYVVMGYPYQ XS prepare those who will inhabit and govern the realm of the digital natives. And what should such a curriculum include? Skills and technical knowledge, certainly, mathematics and logic without a doubt, but also a consideration SJ GYPXYVEP MWWYIW I\EQMRMRK LS[ XLI XIGLRSPSK] MRžYIRGIW WSGMEP ERH individual psychology, and a knowledge of the legal and moral aspects of cyber as a domain. As the (deeply unfashionable) SF writer Robert Heinlein TYXW MX MR 8MQI )RSYKL *SV 0SZI “A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, TVSKVEQ E GSQTYXIV GSSO E XEWX] QIEP ½KLX IJ½GMIRXP] HMI KEPPERXP] 7TIGMEPM^EXMSR MW JSV MRWIGXW ² ;LEX WLEPP [I EHH XS XLI PMWX#

If we as a country, a culture, or even as a species are to survive‌then we need to be producing narratives which inculcate a sense of wonder and a desire to move beyond the conventional References 1 4VEXGLIXX 8 8LI 0MKLX *ERXEWXMG 0SRHSR 'SPMR 7Q]XLI )PPMW ; ,S[ 8S 7II 8LI *YXYVI 7TIIGL 0MKLXLSYWI 8LIEXVI &VMKLXSR 8VERWGVMTX EZEMPEFPI EX LXXT [[[ [EVVIRIPPMW GSQ #T! 3 )PMSX 87 ²´9P]WWIW ´ 3VHIV ERH 1]XL ²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` >IREVGLIV] ?SRPMRIA >IREVGLIV] GSQ %ZEMPEFPI EX LXXT ^IREVGLIV] GSQ JYPP XI\X SJ XLI KVMQ QIEXLSSO JYXYVI XLMRK ?%GGIWWIH .YP )PPMW 11 'SQTYXMRK %X 7GLSSP ;SVOMRK +VSYT 'SQTYXIV 7GMIRGI EW E WGLSSP WYFNIGX 7IM^MRK XLI STTSVXYRMX] %ZEMPEFPI EX LXXT [[[ GSQTYXMRKEXWGLSSP SVK YO HEXE YTPSEHW 'EWI JSV 'SQTYXMRK THJ


McAfee SIEM: Built for Big Data McAfee emerges as a leader in Gartner’s SIEM Magic Quadrant

Best Practice for the Big Data Security Age Today’s advanced threat landscape poses many challenges for organisations. Whether it is the volume and sophistication of threats across all fronts or the lack of real-time visibility, security appears to be blinkered to the big data opportunity. But this must change, and quickly, as organisations need to turn their attention to harnessing and unlocking the hidden insights of their security data.

For three years in a row, McAfee has been designated as a leader in the +EVXRIV 1EKMG 5YEHVERX JSV 7IGYVMX] -RJSVQEXMSR ERH )ZIRX 1EREKIQIRX report—and for great reasons. -X´W XLI &MK (EXE 7-)1 %GGSVHMRK XS +EVXRIV 1G%JII‹ )RXIVTVMWI 7IGYVMX] Manager, customers have experienced the highest validated event data ingest rates and query performance levels.

We Can Help SBL is pleased to offer you this advanced SIEM solution that is the perfect choice for organisations that require high-performance analytics under high-event-rate conditions. It meets your needs by delivering an easier, faster and smarter solution for managing and prioritising your security protection and compliance initiatives. But don’t take our word for it. See for yourself. :MWMX [[[ WSJXFS\ GS YO TEVXRIV QGEJII XS VIEH XLI GSQTPMQIRXEV] +EVXRIV VITSVX Magic Quadrant for Security Information and )ZIRX 1EREKIQIRX and our white paper Needle in a Datastack: The Rise of Big Security Data. Find out how McAfee SIEM solutions address these top issues in a broad spectrum of industries, from government to retail.

ˆ ˆ ˆ ˆ ˆ

&MK (EXE 7IGYVMX] 7MXYEXMSREP E[EVIRIWW 6IEP XMQI GSRXI\X )EWI SJ QEREKIQIRX -RXIKVEXIH WIGYVMX]

SBL is ready to deliver you the McAfee SIEM solution to manage threats easier, faster and smarter. Contact us today on

SV IQEMP IRUYMVMIW$WSJXFS\ GS YO [[[ WSJXFS\ GS YO TEVXRIV QGEJII

XS ½ RH SYX QSVI ERH XS XEOI TEVX MR SYV On Demand Webinar ¹(IPMZIV ER )EWMIV *EWXIV ERH 7QEVXIV 7-)1 7SPYXMSR²


KnIghts of the K he e Rainb in n abl a ab bl b le l Rainbow Table

Cory Doctorow


Sir Tristan reached across the table and took my fork and held it up to XLI PMKLX MRWTIGXMRK XLI XMRIW ERH GSQTEVMRK MX XS LMW JSVO ;SVHPIWWP] Lady Tracey handed him her fork, too, and after some deliberation, he picked one and passed the other two back.

The day that our lawyer told us that the DA had added a federal conspiracy charge to the rap sheet, I immediately flashed on what Abbie Hoffman said when they served papers on him for the Chicago 8 conspiracy trial: “Conspiracy? Man, we can’t even agree on where to have dinner!” I would have said it, but just after Moszkowski gave us the bad news, our waitress showed up and asked Sir Tristan what he wanted to order.

Lady Tracey waited until he’d carefully squared the fork up on his napkin, keeping it evenly spaced with his knife and framed by a uniform border of white paper napkin. Then she darted out one hand, snatched the fork he’d so carefully chosen, and licked all its tines, front and back, and returned it to its spot. Sir Tristan glared at her and then set the fork aside and picked up the remaining three and chose the one with the second-most-uniform tines and once again set to squaring it up on his napkin. I saw the demonic glee light up Lady Tracey’s eyes as she made ready to lick this one, too, ERH - TYX SYX Q] LERH ERH GEYKLX LIV [VMWX ±(SR´X ² - WEMH ±'SQI SR ² 1] GVEGOIH WOMR VEWTIH SZIV 0EH] 8VEGI]´W WQSSXL ½RKIVW ERH WLI shuddered involuntarily. ±%PP VMKLX GLMPHVIR ² 1SW^OS[WOM WEMH ±)RSYKL =SY´VI FIMRK EVVEMKRIH tomorrow and I need you all to be on your best behavior. The Computer Fraud and Abuse charges are bad, add the conspiracy count and there’s a serious chance you’re going to end up in a cell until your XVMEP 2SRI SJ YW [ERX XLEX HS [I#² ,IVI EX PEWX [EW WSQIXLMRK XLEX EPP XLI WXSVMIH /RMKLXW SJ XLI 6EMRFS[ Table could agree upon.

;I /RMKLXW SJ XLI 6EMRFS[ 8EFPI LEH EP[E]W LEH E TVSFPIQ [MXL VIWXEYVERXW XLEX TVSFPIQ´W REQI [EW 7MV 8VMWXER )VOOS [LS [EW intolerant of lactose, processed carbohydrates, salt, vegans, forks with bent tines and people with poor grammar. Tristan never spoke above a whisper, and he affected a huge mustache that made it impossible for waitresses to read his lips, which made the lengthy negotiations even PSRKIV 2SVQEPP] XLI /RMKLXW SJ XLI 6EMRFS[ 8EFPI XVMIH XS ½RH UYMIX restaurants where Sir Tristan could dicker at length without having to whisper directly into the server’s ear, but Moszkowski had chosen the TPEGI E FYW] TM^^E TEVPSV SR 8IPIKVETL ,MPP ½PPIH [MXL RSMW] &IVOIPI] kids. I suppose he thought it would allow us to converse without being SZIVLIEVH ,I [EW E TEVERSMH SPH GMZMP VMKLXW ½\IV FYX /RMKLXW SJ XLI Rainbow Table could have taught him volumes about the practical limits of privacy. The three of us stared uncomfortably at one another until Tristan had conveyed his exacting pizza parameters, Lady Tracey and Moszkowski took their turns, and then it was my turn.

Once upon a time, in the Duchy of Berkeley in the mythical kingdom SJ &E]EVIE XLVII FVEZI ORMKLXW HMH W[IEV ER SEXL XS ½KLX XLI JSVGIW of trolls, creeps, identity thieves, snoops, spooks and the whole motley army of Internet Evildoers, lo until they breathed their last breath. ;I HMHR´X WIX SYX XS FIGSQI ORMKLXW ;I WIX SYX XS XIWX E GPYWXIV % FMK big cluster. Tristan got the idea after going to an art installation in which ERXMUYI 4'W [IVI RIX[SVOIH EGVSWW VS[ SR VS[ SJ JEOI 1IXVS [MVI WLIPZMRK IEGL [MXL E ² ¾STT] MR MXW HVMZI 8LI EVXMWX LEH HSRI WSQI GPIZIV QSNS XS WTER E WMRKPI VIHYRHERX +& ½PIW]WXIQ EGVSWW the whole cluster, which was used to store and retrieve a constantly YTHEXMRK PSST SJ ZMHIS WLSX [MXL E WMRKPI GEQIVE ½\IH MRXS XLI GIMPMRK looking down on the exhibition. The artist had hired about a dozen kids SR VSPPIV WOEXIW XS VMHI EVSYRH XLI VEGOW W[ETTMRK SYX ¾STTMIW EW XLI] [IRX GSVVYTX XLI ZMHIS SR XLI FMK WGVIIR NYHHIVMRK IZIV] XMQI XLMW LETTIRIH ERH XLI ½PIW]WXIQ VIGSZIVIH

,IVI´W XLI XVYXL - QMKLX QEOI JYR SJ 7MV 8VMWXER´W SVHIVMRK TIGGEHMPPSIW - might sneer at Moszkowski’s privacy naiveté, I might turn up my nose at the pineapple and anchovies that Lady Tracey eats with such gusto, but the fact is, at least they can all *eat,* which is more than you can say for me.

“So my idea was why not build something you know useful out of all XLI SPH GSQTYXIV NYRO EVSYRH LIVI PMOI E GPYWXIV SV WSQIXLMRK#² 8VMWXER always had the least punctuation of anyone I knew, but he made up for this by inserting extra excited spittle between his words as he talked.

±-´PP LEZI E KPEWW SJ [EXIV ² - WEMH ERH IRHYVIH XLVII TEMVW SJ I]IW PSSOMRK at me with that mixture of pity and disgust I’ve come to know so well. My stomach growled at me, a sound I felt to my eyebrows, and I touched Q] QMHVMJJ [MXL SRI FSR] ½RKIV E JIIPMRK PMOI E HVMIH SYX HVYQ LIEH XLI skin stretched so tight and desiccated that it rustled.

±;LIVI [SYPH [I OIIT MX#² - WEMH %X XLI XMQI 8VMWXER ERH - [IVI WLEVMRK E SRI FIHVSSQ ETEVXQIRX RIEV GEQTYW - WPITX MR XLI PMZMRK VSSQ ;LIR we had houseguests (itinerant hackers, mostly), they slept on an air QEXXVIWW SR XLI OMXGLIR ¾SSV

8LI [EMXVIWW VIEGLIH SYX [MXL E GLI[IH ½RKIVREMP ERH XETTIH XLI WGVEXGLIH WMKR SR XLI XEFPI XLEX WEMH ± QMRMQYQ SVHIV TIV GYWXSQIV ² -´H EPVIEH] RSXMGIH XLI WMKR - WPMH SYX XLI FMPP -´H TPEGIH YRHIV Q] JSVO ERH ORMJI ERH TEWWIH MX XS LIV ±-X´W GSSP ² - WEMH

±;LEX EFSYX XLI IPIGXVMG FMPP#² 8VEGI] WEMH 7LI´H FSWWIH E GSPS MR 8I\EW before she moved to Berkeley for college. She could quote the formula JSV GEPGYPEXMRK XLI RIX EQTIVEKI TIV ¾ST JSV XLI GLMPPIVW JVSQ QIQSV] ±;LEX EFSYX EHQMRMWXVEXMSR# ;LEX EFSYX FEGOLEYP#²

She rolled her eyes with youthful eloquence and walked off, leaving our conspiracy to get back to business.

Tristan shrugged and twirled up some of his mustache and stuck it in LMW QSYXL 2IMXLIV SJ YW XSSO ER] RSXMGI LI´H FIIR HSMRK XLEX WMRGI JVIWLQER ]IEV [LIR [I XLVII LEH EGIH E NSMRX TVSNIGX XSKIXLIV XLEX PIH to frequent hanging out and then roommatehood and even a short-lived and mercifully painless romance between Tracey and me. “I don’t know FYX [LEX EFSYX E GPYWXIV# - QIER E FMK SRI PMOI E XIVE¾ST SV FMKKIV - NYWX XLSYKLX MX´H FI GSSP ²

±=SY ORS[ ² - WEMH ±JSV E KERK SJ WYTIVGVMQMREPW [I´VI E TVIXX] WSVV] FYRGL ² 1SW^OS[WOM WEMH ±-´Q KSMRK XS TVIXIRH ]SY HMHR´X WE] XLEX ²


;I EHQMXXIH XLMW [EW WS ERH [IRX SR XS XLI RI\X thing and the next and several days went by before Tracey forwarded us both an email about the engineering faculty inheriting a semi-derelict brick factory near the docklands as a bequest on the GSRHMXMSR XLEX XLI] RSX WIPP MX JSV ]IEVW 8VMWXER wrote most of the proposal (he was much better MR TVMRX XLER LI [EW MR TIVWSR 8VEGI] ½PPIH MR XLI technical details, and I made the pitch to a prof we all liked and he passed it up the food chain and we ended YT [MXL WUYEVI JIIX° EFSYX SRI XIRXL SJ XLI available square footage. ;I VMKKIH XLI [EXIV GSSPMRK SYVWIPZIW YWMRK WIE water. Our faculty supervisor carefully ensured that LI HMHR´X ORS[ [LEX [I [IVI HSMRK %X ½VWX XLIVI were a few other groups that applied for space in the Brick Shithouse (as the factory was instantly dubbed, thanks in part to the faint sewage smell that no amount of airing could get rid of ). But no one really wanted to haul ass out to the Shithouse and soon [I LEH XLI TPEGI EPP XS SYVWIPZIW 3YV WUYEVI feet quickly grew to nearly the whole building, row on row of PCs of every description salvaged from campus and nearby, wiped and enlinuxed, networked and left to wheeze for as long as they went on [SVOMRK %X ER] KMZIR XMQI EFSYX TIVGIRX SJ XLI cluster was nonfunctional, and we made good use of impressionable freshmen whom we sourced via Craigslist and threw at the problem machines, letting XLIQ OIIT [LEXIZIV XLI] GSYPH ½\ 8LMW WSYRHW ^IVS WYQ MJ XLI] XSSO IZIV]XLMRK XLI] ½\IH [SYPHR´X that mean that the dead machines would disappear? &YX ½\MRK GSQTYXIVW MW PMOI IEXMRK TSXEXS GLMTW QSWX TISTPI GER´X WXST EX NYWX SRI )EGL SRI MW E TIVJIGX puzzle of vendor defects, material wear, capricious software ghouls, and emergent phenomena. The brainreward for restoring a genuinely threadbare PC to active duty was more psychotropic than anything for sale in People’s Park.

“So my idea was why not build something you know useful out of all the old computer junk around here like a cluster or something?”

,S[ QYGL TS[IV HMH [I LEZI# 0IWW XLER +SSKPI more than all the radio astronomers in Europe, GSQFMRIH 8LI RYQFIV MWR´X MQTSVXERX XS FY] ER LSYV´W [SVXL SJ EW QYGL '49 EW [I EWWIQFPIH MR today’s cloud marketplace, you’d have to work for two hours at minimum wage. Our pizza waitress could blow us out of the water and still have enough left for rent, assuming she had a roommate. ;LEX HMH [I HS [MXL EPP XLEX TS[IV# %X ½VWX [I NYWX IRXIVIH ZEVMSYW FMK GSQTYXEXMSR TVSNIGXW XLVS[MRK SYV JEVQ EX *SPHMRK$,SQI XS HS WSQI LERHMP] parallelizable fast Fourier transforms in order to help ½KLX %-(7 ERH GERGIV ERH WYGL 8LMW MW I\XVIQIP] altruistic work, but it’s not very interesting from a research perspective. As interesting as it was to step into the frigid Shithouse and be engulfed in the [LMXI RSMWI NIX[EWL SJ EPP XLI GSQTYXIVW [I [IVIR´X learning anything about our cluster or its individual components. It was Tracey who decided to go after rainbow tables, these being something of a holy grail in the security ½IPH -X [EW 8VEGI] [LS QEHI YW XLI /RMKLXW SJ XLI Rainbow Table, and set our destiny in motion. But I forgive her.

an Erkko Sir Trist

31


To understand rainbow tables, you need to understand hashfunctions. These are fundamental units of the cryptographic arts, and what they do is easy to grasp but requires either a large amount of math or a large amount of faith. For the purposes of this account, I will go with faith. Take it on faith, if you will that there is a way to convert one blob of text (the password) into another blob of text (the LEWL WYGL XLEX MX MW QEXLIQEXMGEPP] GIVXEMR XLEX a)

No amount of work will permit you to determine [LMGL TEWW[SVH MW VIWTSRWMFPI JSV GVIEXMRK [LMGL LEWL and b) The same password always produces the same hash. If you will permit me this axiom, we can proceed without equations. Should you require equations to accept it, by all means, go look them up and then come back, you faithless wretch. ,EWLMRK JYRGXMSRW EVI FMTSPEV ]SY GER RIZIV HIXIVQMRI [LEX password created them, but you can always redetermine XLI LEWL F] JIIHMRK XLI WEQI TEWW[SVH FEGO XS MX¯XLI] EVI mysterious and deterministic all at once. -QEKMRI XLEX ]SY LEZI GVIEXIH E ±KSSH² TEWW[SVH XLEX MW one that does not appear in any dictionary that has been written, nor any dictionary that some clever person might create (say, by taking all the words in the English language and substituting 1 for L and 3 for E and so forth).You visit a website and the server says, “Please give me a good TEWW[SVH ² =SY WYTTP] MX 8LI WIVZIV GSQTYXIW MXW LEWL ERH sticks that in a database, and throws away your original password. The next time you visit the site, it will ask you for your TEWW[SVH EKEMR ;LIR ]SY TVSZMHI MX MX VYRW MX XLVSYKL the hashing function again (again discarding your original TEWW[SVH [LMGL MX HSIW RSX [ERX XS ORS[ ERH GSQTEVIW XLI LEWLIH ZEPYI [MXL XLI WXSVIH LEWL SR ½PI -J XLI] QEXGL MX ORS[W XLEX ]SY LEZI IRXIVIH XLI TEWW[SVH GSVVIGXP]¯FYX MX WXMPP HSIWR´X ORS[ [LEX XLI TEWW[SVH MW A computer that only knows hashes and not passwords is E WIGYVI PMXXPI FIEWX FIGEYWI IZIR MJ XLI ½PI SJ LEWLIW PIEOW into the wide world, there’s nothing a hacker can do with XLIQ )ZIR MJ WLI´W GETXYVIH XLI LEWL SJ ]SYV ;M*M TEWW[SVH or your banking password or your ereader password, it will HS LIV RS KSSH WLI GER JIIH XLIQ XS XLI ;M*M RIX[SVO SV the bank or the ereader without gain. In order to gain access the hacker needs to know the password, not its hash. Thus a computer can be secured with a minimum of secrecy, and that’s good, because secrets are very hard to keep (more on this anon).

“You’re joking, right? Once you’ve got swords, you can’t *not* have swords. Are you going to take apart the Shithouse?”

Think of hashed passwords as the language of a dead culture with no progeny, a remarkable, forgotten people who had an equivalent word for every word in every contemporary language and even for our non-words and nonsense and who left a key for translating our written phrases into theirs, but with no key by which we might go in the opposite direction. As these foreign words have no cognates with our own, there is no way to guess, merely by reading a word in Hashese, what its contemporary equivalent might be.

Lady Tracey


Combine that with the screaming doubling curve that computer power rides and you got our shelves, where a given computer might be, quite literally, a million times faster than its neighbor (and like as not, it would FI GSRWYQMRK E XIRXL SJ XLI TS[IV XEPO EFSYX IGS KYMPX [I [IVI E SRI FYMPHMRK GEVFSR GVMQI [EZI ;I LEH LIXIVSKIRIMX] JSV HE]W ERH with that salmagundi came any number of chewy, interesting clustering TVSFPIQW ;LMGL GSQTYXIVW WLSYPH FI MR GLEVKI SJ [SVOMRK XVERWPEXMRK passwords into hashes), and which computers should be in charge of apportioning work? How do you index what’s on which

Enter the rainbow table. Imagine that you fed a dictionary into the hashing algorithm and made a table of the hashed equivalent of every word, and even non-words, such as words in combination, words with simple substitutions, slang, vernacular, foreign words, common phrases. Then, having captured a password’s hash, you could compare it with every one of those hashed words— look it up in your handy English,EWLIWI ,EWLIWI )RKPMWL HMGXMSREV]¯ERH SYX TSTW XLI WIGVIX TEWW[SVH no longer a secret. Now you have the password, which is all you need to successfully impersonate its owner to some naive computer, and mischief awaits. ±;LEX [SYPH [I HS [MXL VEMRFS[ XEFPIW -´Q RS GVSSO ² 8VMWXER muttered from under his mustache, as he idly punched the product ID SJJ E TSXIRXMEPP] JEYPX] RIX[SVO GEVH MRXS +SSKPI XS WII MJ ER]SRI LEH written alternative drivers for it. 8VEGI] WXEVXIH XS ERW[IV FYX NYWX XLIR SRI SJ SYV YRHIVKVEH XIGLRMGMERW GEQI XS XLI HSSV SJ XLI 7LMXLSYWI´W PMXXPI SJ½GI VITSVXMRK E JEYPX MR the cooling system. The cooling system had a *lot* of faults, because [EXIV GSSPMRK W]WXIQW XLEX YWI WIE [EXIV EVI NYWX WXYTMH KMZIR XLEX sea-water gradually eats everything that contains it, and what it doesn’t eat, it chokes with a sclerotic crust of dried salts. Not that we had any choice, because running traditional chillers would have clobbered the Shithouse’s annual budget in a matter of weeks, and without aggressive GSSPMRK XLI TPEGI [SYPH WTMOI EX ´ ' MR EFSYX ½ZI QMRYXIW ERH XLIR it would be a race to see whether the assembled computers fused and HMIH FIJSVI XLI] GSYPH WXEVX E ½VI XLEX OMPPIH YW EPP Cooling took priority. ;LIR 8VEGI] GEQI FEGO¯MX [EW E QMRSV TYQT TVSFPIQ XLEX [I´H EPP ½\IH E HS^IR XMQIW ERH MX [EW QSWXP] NYWX E QEXXIV SJ ORS[MRK [LIVI XS OMGO ERH LS[ LEVH¯WLI WEMH ±;L] VEMRFS[ XEFPIW# 8[S VIEWSRW ½VWX XLI] EVI GSSP ERH WIGSRH XLI] TEVEPPIPM^I ²

computer, and what do you do about recovering a computer’s lost work when it dies? Should more common words be stored on faster GSQTYXIVW SV QSVI GSQTYXIVW SV FSXL# 3V HSIW ½KYVMRK SYX [LMGL TEWW[SVH XS TYX [LIVI GSWX QSVI XLER [I´H WEZI F] NYWX HYQTMRK passwords into computers at random? These are meaty and interesting WYFNIGXW ERH [I [EKIH EVKYQIRXW FEGO ERH JSVXL ERH YT ERH HS[R about them and wrote feverish code to prove our points of view and never got around to writing up any papers for publication, though we WYVI WXEVXIH TPIRX] ;I GSYPH LEZI LEH ER %'1 NSYVREP HIHMGEXIH XS YW *Journal of Incomplete Research Into Distributed Computing.* 8LI 6EMRFS[ 8EFPIW 4VSNIGX LEH FIIR YT ERH VYRRMRK JSV E QSRXL [LIR 8VMWXER GEPPIH QI JVSQ [SVO¯LI LEH E [EKI WPEZI KMK ½RI XYRMRK WSQI semi- fraudulent search engine optimization tools at a doomed Oakland WXEVXYT [LIVI LI [EW KIX XLMW XLI FIWX EHNYWXIH TVSKVEQQIV SR WXEJJ ±-´Q XLMROMRK SJ [SVQ XVEMPW SV ERX XVEMPW SV WSQIXLMRK PMOI XLEX ² LI WEMH ±2MGI XS LIEV JVSQ ]SY XSS 8VMWXER ² - WEMH ;I HMHR´X YWI TLSRIW for voice-calls much, various IMs being much cleaner, cryptographically sound, and suited to multitasking. But sometimes Tristan needed to say things aloud to make sure he knew them. But his phone manner was dreadful. ±7S [LIR ]SY PSSO YT E TEWW[SVH ]SY NYWX EWO E VERHSQ GSQTYXIV and if it doesn’t have it it asks a random computer and so on and so on YRXMP MX ½RHW XLI TEWW[SVH 8LIR XLI GSQTYXIV [MXL XLI TEWW[SVH XIPPW the next computer and it tells the next and it tells the next and they all store the passwords. Like a pheromone trail. Like ants. So the more you ask for a password the more available it becomes the more pathways there are to it like. It gets more robust the more you use it. Plus we’ll be able to see which passwords are commonest over time because the RIX[SVO [MPP IZSPZI XS QEXGL XLIQ ² - GSYPH LIEV XLI WTMXXPI ¾]MRK ,I was on a roll.

That was the kicker, parallelization. A parallelizable problem is one that can be worked on in lots of different places because no step relies on XLI SYXTYX JVSQ E TVIZMSYW WXIT 8LMRO SJ WXYJ½RK IRZIPSTIW [MXL JVMIRHW SRI KVSYT SJ JVMIRHW GER EHHVIWW IRZIPSTIW ERSXLIV GER ½PP XLIQ ERH E XLMVH GER VYR XLIQ XLVSYKL XLI TSWXEKI QIXIV 8LEX´W TVIXX] TEVEPPM^EFPI¯ MJ ]SY ½RMWL [MXL XLI QIXIV FIJSVI XLI WXYJ½RK KVSYT MW HSRI ]SY GER KVEF E WXEGO SJ QIXIVIH IRZIPSTIW ERH WXEVX WXYJ½RK XSS -R XLISV] SRI slow doofus won’t leave a roomful of people sitting around, fuming. 2S[ GSQTEVI XLEX [MXL E WIVMEP XEWO PMOI EWWIQFPMRK E NIX IRKMRI SR an assembly line. First, Alice screws on one dingus, then Bill attaches a dingus to that, and Carol attaches a dingus to *that,* and so on, all the [E] XS >IOI ½XXMRK XLI GS[PMRK EX XLI SXLIV IRH SJ XLI EWWIQFP] PMRI -J Alice had a wild night last night and is dragging her ass as a result, Bob, 'EVSP ERH XLI VIWX ]IE YRXS >IOI EVI KSMRK XS FI WXYGO [MXL XLYQFW ½VQP] TPERXIH YT XLIMV EPMQIRXEV] GEREPW -X QMKLX FI TSWWMFPI XS VIHIWMKR E NIX IRKMRI JEGXSV] XS VYR [MXL QSVI TEVEPPIP XEWOW¯XLMRO SJ XLI JEQIH Japanese car companies where small teams assemble whole cars, where SRI XIEQ´W HVEKEWWMRK HSIWR´X LSPH YT XLI JEGXSV]¯FYX XLIVI´W E PSX SJ computation where the next step depends on the previous one and the more of that there is, the less you can do with a big parallel cluster. Of course, there’s always some extent to which problems are serial. If there’s one guy who’s really slow with the address labels, eventually, ]SY´VI EPP KSMRK XS FI WMXXMRK EVSYRH [EMXMRK JSV LMQ XS ½RMWL SJJ LMW WLIIX PSSOMRK QIERMRKJYPP] EX ]SYV [EXGLIW ERH XV]MRK XS ½KYVI SYX when the last bus goes.

And he was right. Tracey saw it right away and helped me with a formal TVSSJ &YX IZIR FIJSVI -´H ½RMWLIH XLEX 8VMWXER [EW GSHMRK MX 8VEGI] [EW debugging it and I was writing test cases for it and you know what? It worked.

Moszkowski sends us email in the clear, no encryption. He relies on XLI WIGYVMX] SJ LMW LSQI ERH SJ½GI RIX[SVOW ERH XLI MRXIVGSRRIGXMSRW between his ISPs and ours to protect and secure our communications. 1SW^OS[WOM LEWR´X ½KYVIH SYX ]IX XLEX EPP XLEX WXYJJ MW ER STIR FSSO°SV MJ LI´W ½KYVIH MX SYX LI LEWR´X JIPX MX MR LMW KYXW SV LMW FPSSH SV LMW FEPPW or wherever you need to feel a hard truth before you really know it. “I’m still looking for a technical expert, someone I can put on the stand [LS GER I\TPEMR XLI WSGMEPP] FIRI½GMEP EWTIGXW SJ ]SYV [SVO 2SRI SJ the names you’ve suggested have panned out. This is important, guys. It sure would have helped if you’d published or given some learned presentations at big conferences or something. I want to put you in JVSRX SJ XLI NYHKI EW RSFPI WIGYVMX] VIWIEVGLIVW [LS [SVOIH MR XLI WIVZMGI SJ E FIXXIV [SVPH FYX - GER SRP] HS XLEX MJ - GER ½RH WSQISRI SXLIV XLER ]SY XS WE] MX ²

The Shithouse was full of computers which were, basically, that guy. ;I HMHR´X HMWGVMQMREXI [LIR MX GEQI XS XLI VIWGYI ERMQEPW [I XSSO MR nursed to health and set to productive use. The basements and dorm rooms and storage lockers of Berkeley vomited forth a steady stream of NYRO LEVH[EVI WXYJJ XLEX XLI KVERSPSMH QEWWIW GSYPHR´X FIEV XS WIRH XS E PERH½PP )ZIV] XMQI '22 WLS[IH ERSXLIV I\TSWq JIEXYVMRK FPMWXIVIH engoitered Chinese kids laboring over acid vats to strip apart ewaste, we got a fresh shipment of guilt and shame and obsolescence.

The conversation that transpired afterwards is encrypted to a nicety, because we know that passwords are a dead letter.

33


You see, one day, our cluster got so big that we could factor every single password that a human being could VIQIQFIV¯IZIV] TLVEWI IZIV] RSRWIRWI WXVMRK YT XS GLEVEGXIVW 2S[ WSQI[LIVI SYX XLIVI MW E memnist freak or stage performer who can do better than that, but he probably doesn’t have any secrets worth keeping. +IXXMRK XLI 7LMXLSYWI XS XLEX WGEPI VIUYMVIH HMWGMTPMRI At a certain point, we needed to actually go around and pull the plug on a lot of old-school gear, rescind SYV EPP GSQIVW [IPGSQI TSPMG] ;I VITPEGIH MX [MXL E four-cores-or- go-home rule, and then bumped that XS WM\ GSVIW XLIR IMKLX -X HMHR´X QEXXIV SYX MR XLI VIEP world of retail hardware, they were shoving cores into cheapass consumer hardware so fast that we could afford to monotonically raise the bar for donations and still never run short.

‘Justice League of the Rainbow Table’ isn’t nearly so cool as

‘Knights of the Rainbow Table,’ is it?”

;I VER MX EKEMRWX XLI WEPXW YWIH JSV [IPP ORS[R ;M*M VSYXIVW and produced tables that we uploaded to cheap cloud storage, clearing the hard-drives for the RI\X VSYRH¯TEWW[SVH LEWLIW JSV QENSV 37IW LEWLIW JSV IQFIHHIH systems, photocopiers, keyless entry door-locks . . . Theoretically, the manufacturers could have made these much stronger but they weren’t thinking ahead to the day when three weirdos might build themselves a cluster that could KVMRH GIEWIPIWWP] XLVSYKL XLI [LSPI YRMZIVWI SJ ±E² XS “zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ² And after a while, the cluster got big enough to recompute against any new salt in pretty short time, especially with our information about the QSWX GSQQSR TEWW[SVHW ;I [IVI TVIXX] WIPJ GSRKVEXYPEXSV] - QYWX EHQMX¯ZIV] TVSYH XS LEZI SYX thought all those silly engineers and product managers. Of course, none of *us* had the foresight to imagine that the day was coming when you could replicate our [SVO JSV [SVXL SJ XMQI SR E GLIIW] GPSYH LSWX MR Bulgaria or some other exotic place. No, we were too busy forming an order of knights. ±/RMKLXLSSH#² 8VEGI] ERH 8VMWXER PSSOIH EX QI PMOI - was insane. - JIPX Q] GLMR NYX SYX EX E FIPPMKIVIRX ERKPI ERH - VIIPIH it back in. “It’s either that or a league of super-heroes. Look, with great power comes great responsibility. ;I RIIH E QSVEP GSQTEWW XS IRWYVI XLEX [I YWI SYV TS[IVW JSV KSSH ;I RIIH GLMZEPV] E GSHI 2S[ superheroes are cool and all, but the ‘Justice League of XLI 6EMRFS[ 8EFPI´ MWR´X RIEVP] WS GSSP EW ³/RMKLXW SJ XLI 6EMRFS[ 8EFPI ´ MW MX#²

Narrator

To be continued at www.softbox.Co.uk/ knightsoftherainbowtable

34



ADVERTORIAL

)LQG 2XW 0RUH

01347 812100 cloud@softbox.co.uk www.softbox.co.uk

The need for Patching has never been so important with the need for PSN compliance, CESG Guidance for End user devices and the threat it poses to your network, data and organisation if you do not keep your software and hardware patches up to date. SBL’s Secure Patching Service, DOBUS™, has been unrivaled in its service to the whole of the MoD since 2003, and more recently to the Police and Counter Terrorism agencies via PSN. DOBUS™ HQDEOHV WKH GHOLYHU\ RI UHDO WLPH FOHDQ DQG YHUL¿HG SDWFKHV WR HQG point Security, Infrastructure, and Application Software over a secure bearer. The DOBUS™ service operates 24x7x365, performs at 99.999% uptime, and (3&97 %HZIVXSVMEP has received over 18 million visitors in the last four months alone. It delivers 'SRXIRX WYTTPMIH FULWLFDO SDWFKHV H J DQWL YLUXV VLJQDWXUH XSGDWHV LQGHSHQGHQW RI WKH LQWHUQHW through secured links into Vendor laboratories, and therefore protects users IURP WKH WKUHDWV SRVHG E\ ZHEVLWH VSRR¿QJ DQG WKH LVVXHV RI GRZQORDG ORFDWLRQ RYHU VXEVFULSWLRQ ERWK FRPPRQ FKDUDFWHULVWLFV ZLWKLQ PDMRU PDOZDUH HYHQWV This unique and innovative service has been delivered via a highly robust, KLJKO\ DFFUHGLWHG DQG KLJKO\ YHUVDWLOH DUFKLWHFWXUH 9DULRXV UHVHDUFK SURMHFWV and pilots are currently underway to scope the delivery of the next generation of Community Cloud Services via the DOBUS™ platform. These will include Secure Email and Rights Management Services, Hosted Collaboration (QYLURQPHQWV 'LJLWDO &HUWL¿FDWH ,VVXDQFH 6HUYLFHV 6HFXUH )LOH 7UDQVIHU 2Q line Backup services and many more. ‡

DOBUS™ is an essential element in PSN CoCo Compliance

‡

DOBUS™ SURYLGHV \RXU 3DWFKHV 3DUW RI &(6*œV VWHSV WR cyber security

‡

DOBUS™ is an essential element in PSN CoCo Compliance

‡

DOBUS™ provides an active measure against Security/Data losses which can be avoided by patching regularly

‡

DOBUS™ PDNHV WKH SURFHVV HDVLHU DOO SDWFKHV \RX QHHG available under a single URL, all from a trusted and assured source so you can deploy patches more quickly across your environment.

‡

DOBUS™ has the pedigree having been the UK MoD’s single recommended source of secure updates since 2003, used by PSN 3URYLGHUV DQG GHOLYHULQJ YLD WKH 361 WR -XVWLFH 2UJDQLVDWLRQV LQ 2014.

In addition to a newly developed comprehensive range of secure patch PDQDJHPHQW VROXWLRQV 6%/œV QHZ &ORXG 6HUYLFHV LQFOXGH VHFXUH &ORXG EDVHG Backup, Archive and Recovery as well as Collaboration tools. Additionally, DOBUS™ is expanding its reach onto the UK PSN (Public Service 1HWZRUN GHOLYHULQJ WKH WUXVWHG VHUYLFHV WKH 0R' KDYH EHHQ UHO\LQJ RQ IRU years to many more public sector organisations.

www.softbox.co.uk/cloud-based-it-services/dobus

36


)LQG 2XW 0RUH

01347 812100 cloud@softbox.co.uk www.softbox.co.uk

The need for Patching has never been so important with the need for PSN compliance, CESG Guidance for End user devices and the threat it poses to your network, data and organisation if you do not keep your software and hardware patches up to date. SBL’s Secure Patching Service, DOBUS™, has been unrivaled in its service to the whole of the MoD since 2003, and more recently to the Police and Counter Terrorism agencies via PSN. DOBUS™ HQDEOHV WKH GHOLYHU\ RI UHDO WLPH FOHDQ DQG YHUL¿HG SDWFKHV WR HQG point Security, Infrastructure, and Application Software over a secure bearer. The DOBUS™ service operates 24x7x365, performs at 99.999% uptime, and has received over 18 million visitors in the last four months alone. It delivers FULWLFDO SDWFKHV H J DQWL YLUXV VLJQDWXUH XSGDWHV LQGHSHQGHQW RI WKH LQWHUQHW through secured links into Vendor laboratories, and therefore protects users IURP WKH WKUHDWV SRVHG E\ ZHEVLWH VSRR¿QJ DQG WKH LVVXHV RI GRZQORDG ORFDWLRQ RYHU VXEVFULSWLRQ ERWK FRPPRQ FKDUDFWHULVWLFV ZLWKLQ PDMRU PDOZDUH HYHQWV This unique and innovative service has been delivered via a highly robust, KLJKO\ DFFUHGLWHG DQG KLJKO\ YHUVDWLOH DUFKLWHFWXUH 9DULRXV UHVHDUFK SURMHFWV and pilots are currently underway to scope the delivery of the next generation of Community Cloud Services via the DOBUS™ platform. These will include Secure Email and Rights Management Services, Hosted Collaboration (QYLURQPHQWV 'LJLWDO &HUWL¿FDWH ,VVXDQFH 6HUYLFHV 6HFXUH )LOH 7UDQVIHU 2Q line Backup services and many more. ‡

DOBUS™ is an essential element in PSN CoCo Compliance

‡

DOBUS™ SURYLGHV \RXU 3DWFKHV 3DUW RI &(6*œV VWHSV WR cyber security

‡

DOBUS™ is an essential element in PSN CoCo Compliance

‡

DOBUS™ provides an active measure against Security/Data losses which can be avoided by patching regularly

‡

DOBUS™ PDNHV WKH SURFHVV HDVLHU DOO SDWFKHV \RX QHHG available under a single URL, all from a trusted and assured source so you can deploy patches more quickly across your environment.

‡

DOBUS™ has the pedigree having been the UK MoD’s single recommended source of secure updates since 2003, used by PSN 3URYLGHUV DQG GHOLYHULQJ YLD WKH 361 WR -XVWLFH 2UJDQLVDWLRQV LQ 2014.

In addition to a newly developed comprehensive range of secure patch PDQDJHPHQW VROXWLRQV 6%/œV QHZ &ORXG 6HUYLFHV LQFOXGH VHFXUH &ORXG EDVHG Backup, Archive and Recovery as well as Collaboration tools. Additionally, DOBUS™ is expanding its reach onto the UK PSN (Public Service 1HWZRUN GHOLYHULQJ WKH WUXVWHG VHUYLFHV WKH 0R' KDYH EHHQ UHO\LQJ RQ IRU years to many more public sector organisations.

37

www.softbox.co.uk/cloud-based-it-services/dobus


t s o M 5 The 2 nt Importa e c n e i c S Fiction ‌ s k r o W so far!

= *%6

0%< -2 A +% 3 + % 8-1) % 032+ %= *%6 %;

In terms of helping drive human advancement and the development of our species, Science Fiction LV XQSDUDOOHOHG ,WV LQ½XHQFH RQ WKH JHQHUDO SXEOLF LV VR great because the best examples of it quite literally shape the world we live in. Science Fiction is often described as “the literature of changeâ€? and for good reason. Strangely for a genre so often set in alien worlds, more than any other, Science Fiction centres on humanity. It paints grave, often dystopian, pictures of future societies and sends warnings of the, hitherto unprecedented, consequences of our actions today. Whether for better RU ZRUVH 6FL )L KDV DQ XQFDQQ\ NQDFN RI DFFXUDWHO\ SUHGLFWLQJ DQG LQ½XHQFLQJ IXWXUH WHFKQRORJLHV DQG RSLQLRQV )URP WKH HDUOLHVW QRYHOV WKURXJK WR WKH EORFNEXVWLQJ ÂźOPV RI WKH SUHVHQW GD\ ZKDW ZDV RQFH ÂźFWLRQ KDV QRZ EHFRPH IDFW

38


BATTLESTAR GALACTICA (2004 - 2009) *VSQ MX´W SVMKMRW EW E JEMVP] XVEWL] W 7EXYVHE] RMKLX OMHW WLS[ Battlestar Galactica evolved into one of the most sophisticated, compelling and SVMKMREP XIPIZMWMSR WIVMIW XLEX´W IZIV FIIR QEHI 'LVSRMGPMRK XLI NSYVRI] back to Earth of the last surviving humans from the Twelve Colonies of /SFSP EJXIV XLIMV RYGPIEV ERRMLMPEXMSR F] XLI ']PSRW E G]FIVRIXMG VEGI of their own creation, Battlestar Galactica is deeply rooted in the politics of Bush-era America. The idea to revive the show came shortly after ERH MXW MR¾YIRGI TIVQIEXIW XLI WXSV] ]IX MX HSIW [MXL WMKRM½GERXP] more sensitivity and astuteness than many contemporary series’ responses.

'SQTMPMRK E PMWX WYGL EW XLMW MW VMWO] JSV ER] KIRVI SJ ½GXMSR FYX JSV 7GM *M it is near impossible. The genre is so vast and all encompassing, and the fans so passionate and vociferous, that the task is viewed as being even QSVI HMJ½GYPX XLER WYVZMZMRK ER 977 )RXIVTVMWI WGSYXMRK QMWWMSR [LMPWX wearing red. However, never one to shy away from a challenge, CyberTalk now TVIWIRXW XS ]SY SYV PMWX SJ XLI 1SWX -QTSVXERX 7GMIRGI *MGXMSR ;SVOW© WS JEV 2001: A SPACE ODYSSEY (1968) This list isn’t in rank order but if it were there’s a very good chance that [SYPH WXMPP FI E GSRXIRHIV JSV XLI XST ;LIR MX [EW ½VWX VIPIEWIH however, few would have predicted it would still be feted nearly half a GIRXYV] PEXIV %X MXW TVIQMIVI XLIVI [IVI [EPOSYXW MRGPYHMRK 6SGO ,YHWSR [LS EWOIH ±;MPP WSQISRI XIPP QI [LEX XLI LIPP XLMW MW EFSYX#²

CLOSE ENCOUNTERS OF THE THIRD KIND (1977) Steven Spielberg both directed and wrote this epic tale of an ordinary QER´W IRGSYRXIV [MXL E ¾]MRK WEYGIV [LMGL MRWXERXP] FIGEQI E GPEWWMG (IWTMXI FIMRK EPQSWX ]IEVW SPH XLI ½PQ´W ZMWYEP IJJIGXW WXMPP WXERH YT today and, along with Star Wars (which was released in the same year) 'PSWI )RGSYRXIVW [EW VIWTSRWMFPI JSV FVIEXLMRK RI[ PMJI MRXS E ½PQ KIRVI that at the time was suffering a serious decline.

8SHE] MX MW GPEWWIH EW SRI SJ XLI HI½RMRK ½PQW SJ XLI XL GIRXYV] charting the human race’s interaction with other forms of intelligent PMJI VEMWMRK ERH ERW[IVMRK WSQI SJ XLI FMK UYIWXMSRW ;LIVI HMH [I GSQI JVSQ# ;LIVI [I EVI KSMRK# ;LEX HSIW MX QIER XS FI LYQER# %RH [LEX EVI XLI TIVMPW SJ XIGLRSPSK]# 7TIGM½GEPP] [LIR ]SY EPPS[ XLEX technology to think for itself.)

'PSWI )RGSYRXIVW´ most iconic moments (the theme, the mashed-potato sculpture, etc.) have been so thoroughly absorbed into popular culture that it’s easy to forget that its treatment of aliens as peaceful beings rather than warmongering monsters was somewhat ground-breaking in 1977.

ALIEN (1979) -J E ½PQ GER FI NYHKIH F] XLI EQSYRX SJ VMT SJJW MX KIRIVEXIW Alien must VERO EW SRI SJ XLI QSWX MR¾YIRXMEP QSZMIW IZIV 6MHPI] 7GSXX´W 7GM *M horror classic represents that rarest of things, a perfect storm of talent combing at the right moment to create something beyond special. Superb performances and still-astounding special effects add to Scott’s stylish direction to create a must-see combination of suspense, slasher ERXMGW ERH KSSH SPH JEWLMSRIH WGM ½

THE DAY THE EARTH STOOD STILL (1951) % VIEWSRIH TPIE JSV TIEGI MR XLI JEGI SJ XLI IWGEPEXMRK 'SPH ;EV 6SFIVX ;MWI´W WGM ½ GPEWWMG MW E TSXIRX TEVEFPI XLEX VIQEMRW EW GLMPPMRKP] VIPIZERX JSV XLI WX GIRXYV] EW MX [EW JSV XLI PEWX -X EPWS EGXW EW E VIQMRHIV XLEX XLI FIWX WGM ½ MW EP[E]W E JYWMSR SJ WTIGXEGPI ERH WXVSRK MHIEW ERH XLEX purposeful direction and a literate script can more than compensate for limited resources.

A LOGIC NAMED JOE (1945) 8LMW WXSV] F] ;MPP * .IROMRW FIXXIV ORS[R YRHIV XLI TIR REQI 1YVVE] Leinster, published In the March 1946 issue of Astounding Science Fiction MW SRI SJ XLI ½VWX XS HIWGVMFI E QEGLMRI XLEX GSYPH FI GSRWMHIVIH E personal computer.

8LMW ½PQ´W YRHIVP]MRK QIWWEKIW SJ TEGM½WQ ERH MXW GSRHIQREXMSR SJ ZMSPIRGI EVI UYMXI FPEXERX ERH F] EPP EGGSYRXW XLMW ½PQ MR¾YIRGIH 4VIWMHIRX 6SREPH 6IEKER XS WYKKIWX XS 1MOLEMP +SVFEGLIZ XLEX ER I\XVE terrestrial invasion would trump national differences, something he later XSPH XLI 9RMXIH 2EXMSRW EW [IPP

;LMPI QER] IEVPMIV [VMXIVW LEH QIRXMSRIH TSWWMFPI GSQTYXIVW RSRI understood the power they would have over the day-to-day lives SJ XLI EZIVEKI YWIV EW 0IMRWXIV HMH ;LEX QEOIW A Logic Named Joe WS JEWGMREXMRK MW RSX NYWX [LEX LI KSX YRGERRMP] VMKLX FYX LS[ QYGL Leinster understood about people and the way they interact with machines. The logics in Leinster stories are essential to the lives of the characters every bit as much as computers and the internet are to people today. (Read “A Logic Named Joe” in full on P.64)

DO ANDROIDS DREAM OF ELECTRIC SHEEP? (1968) This novel is the source text for Ridley Scott’s masterpiece Blade Runner, ERH MX´W XS EYXLSV 4LMPMT / (MGO´W GSRWMHIVEFPI GVIHMX XLEX RIMXLIV FSSO RSV ½PQ WIIQ HEXIH 7IX MR E TSWX ETSGEP]TXMG RIEV JYXYVI [LIVI )EVXL and its populations have been damaged greatly by nuclear war during ;SVPH ;EV 8IVQMRYW XLI QEMR TPSX JSPPS[W 6MGO (IGOEVH E FSYRX] LYRXIV [LS MW JEGIH [MXL ±VIXMVMRK² WM\ IWGETIH 2I\YW FVEMR QSHIP 8LIWI W]RXLIXMG LYQERW ¯ EPQSWX MQTSWWMFPI XS HMWGIVR JVSQ XLI VIEP XLMRK ¯ LEZI IWGETIH JVSQ SRI SJ XLI ±SJJ [SVPH² GSPSRMIW ERH VIXYVRIH to Earth.

AVATAR (2009) It may have been more impressive on a technical level than as a piece of storytelling, but Avatar is an astonishing feast for the eyes and ears. From the epic to the tiny details. The level of immersive detail on show is simply amazing. No wonder, when you consider that director James 'EQIVSR LEH XS ½VWX MRZIRX XLI RIGIWWEV] XIGLRSPSK] VIUYMVIH XS QEOI the movie before he could begin work, and in doing so, opened up a whole new sandbox for directors to play in for years to come.

However, the reason behind the replicants’ return is interestingly IQSXMZI XLI] [MWL XS PIEH XLIMV S[R PMZIW EW MW XLI VMKLX SJ ER] WIRXMIRX FIMRK &YX MX MWR´X WS QYGL XLI JYP½PQIRX SJ XLMW UYIWX XLEX QEXXIVW VEXLIV (MGO´W TLMPSWSTLMGEP I\TPSVEXMSR SJ [LEX FIMRK ±EPMZI² EGXYEPP] means.

BACK TO THE FUTURE (1985) ;LIR 4VSJ 7XITLIR ,E[OMRK YWIW E ½PQ XS I\TPEMR WGMIRXM½G GSRGITXW XLIR MX LEW XS FI WMKRM½GERX 7XIZIR 7TMIPFIVK´W ITMG XMQI XVEZIPPMRK XVMPSK] WIIW XLI LIVSIW NYQT JVSQ XS ZME XLI W ERH XLI %QIVMGER ;MPH ;IWX MR E TPYXSRMYQ TS[IVIH (IPSVIER

DOCTOR WHO (1963 - PRESENT) Steven Spielberg once commented that, “the world would be a poorer place without Doctor Who² 7MRGI MX FIKER QSVI XLER ]IEVW EKS MR the story of the wandering Time Lord and his Blue Box has been one of the best loved dramas SR &VMXMWL XIPIZMWMSR ERH LEW FIIR GIVXM½IH F] XLI +YMRRIWW &SSO SJ ;SVPH 6IGSVHW EW XLI QSWX WYGGIWWJYP WGM ½ WIVMIW IZIV FIGSQMRK E WMKRM½GERX TEVX SJ TSTYPEV GYPXYVI EPSRK XLI [E] 8LI WIVMIW´ VIPEYRGL MR LEW FIIR SRI SJ XLI &&'´W QSWX WYGGIWWJYP ZIRXYVIW ERH LEW GSQI XS HI½RI 7EXYVHE] RMKLXW JSV GLMPHVIR ERH EHYPXW alike.

-XW ±JEHMRK TLSXSKVETL² LEW FIIR VIJIVIRGIH F] QER] E JER ERH EGEHIQMG (as well as the aforementioned Professor) to explain the potential HERKIVW SJ L]TSXLIXMGEP XMQI XVEZIP [LMPWX MX´W TVIHMGXMSR SJ PMJI ]IEVW MR XLI JYXYVI MW RSX XSS JEV JVSQ XLI XVYXL ¯ XLI ZMHIS GSRJIVIRGMRK 3D movies, motion controlled video games and tablet computers seen MR ´W ,MPP :EPPI] EVI EPP GSQQSRTPEGI XSHE] 7EHP] LS[IZIV XLI ,SZIVFSEVHW WIPJ X]MRK XVEMRIVW ERH ¾]MRK GEVW EVI RSX

39


FLASH GORDON (1980)

THE MAN WHO FELL TO EARTH (1976) ;LMPWX RSX EW GSQQIVGMEPP] WYGGIWWJYP EW SXLIVW SR XLMW PMWX ;EPXIV 8IZMW´ cult novel 8LI 1ER ;LS *IPP XS )EVXL ERH MXW WYFWIUYIRX ½PQ EHETXEXMSR WXEVVMRK (EZMH &S[MI MR LMW ½VWX SR WGVIIR VSPI XMGOW IZIV] FS\ XLEX KVIEX WGMIRGI ½GXMSR WLSYPH ;LMPWX SWXIRWMFP] XIPPMRK XLI WXSV] SJ Thomas Jerome Newton, a humanoid alien sent to Earth to take water back to his home planet, the story is also concerned with many humanGIRXVMG MHIEW WYGL EW PSRIPMRIWW EPGSLSPMWQ EVXMWXV] ERH XLI 'SPH ;EV

“GORDON’S ALIVE?!?� Enough said, surely?

The story of Flash, an American football star transported to the far žYRK KEPE\] SJ 1SRKS ERH LMW FEXXPI XS JVII MX´W MRLEFMXERXW SR JVSQ XLI evil ruler Ming the Merciless may not be as subtle in its messaging or as MRXIPPIGXYEPP] VSFYWX EW QER] SXLIV ½PQW SR XLMW PMWX FYX MX MW EW ½RI ER example of the alternative side of the genre as you are likely to see The side that attracts and enthrals young minds with fantastical scenery, heroic deeds and ludicrous costumes. It is ridiculous in its presentation but fantastic in its scope. And let’s face it, who can resist watching the FEVVIP WLETIH &VMER &PIWWIH HVIWWIH MR YRžEXXIVMRK KSPH EVQSYV ERH adorned with the wings of a hawk, bellow his immortal line?

Coupled with Bowie’s other-world appearance, cultivated through his S[R GLEVEGXIVW SJ >MKK] 7XEVHYWX ERH %PEHHMR 7ERI XLI ½PQ ZIVWMSR VIXEMRW QER] SJ 8IZMW´ SVMKMREP XLIQIW ERH PMOI MXW WXEV LEW MRžYIRGIH popular culture for decades after its release. THE MATRIX (1999) The Matrix is a teenage boy’s dream. There’s action, ½KLXMRK GYXXMRK IHKI WTIGMEP IJJIGXW QYVHIVSYW VSFSXW IZMP EYXLSVMX] ½KYVIW ER SZIVVMHMRK TWIYHS conspiracy theory and, most wonderful of all, an ineloquent social outcast who eventually becomes a ž]MRK /YRK *Y .IWYW

FROM EARTH TO THE MOON (1865) .YPI´W :IVRI´W XEPI SJ E TSWX %QIVMGER 'MZMP ;EV KYR GPYF´W EXXIQTX XS build a sky-facing gun large enough to send its members to the Moon GER FI GSRWMHIVIH SRI SJ XLI ½VWX I\EQTPIW SJ 7GMIRGI *MGXMSR MR PMXIVEXYVI ERH LEH E HMVIGX MRžYIRGI SR EQSRKWX SXLIVW XLI ½PQ A Trip to the Moon ¯ MXWIPJ SRI SJ XLI IEVPMIWX I\EQTPIW SJ 7GM *M SR ½PQ

8LI ;EGLS[WOM WMFPMRKW´ KVSYRH FVIEOMRK QSVTLMRK ERH WLEXXIVMRK WGM ½ WTIGXEGYPEV JIEXYVIW E IRKEKMRKP] HIEHTER /IERY 6IIZIW ERH GSQFEX like you’ve never seen it before. The effects are astonishing. It’s funny, it’s HEVO MX´W WQEVX ERH MX´W ½PPIH [MXL KYRW PSXW SJ KYRW % PERHQEVO ½PQ ERH quite possibly the ultimate expression of cyberpunk.

The novel is also notable for the remarkably accurate calculations Verne was able to make regarding the requirements of the cannon, which were based on very little comparative data at the time. Although the feasibility SJ :IVRI´W WGIREVMS LEW WMRGI FIIR HMWTVSZIH WGMIRXM½GEPP] XLI MHIEW ERH XLIQIW VEMWIH F] XLI ½GXMSREP 'SPYQFMEH´W ZS]EKI XS XLI QSSR GSRXMRYI XS MRžYIRGI TSTYPEV GYPXYVI XS XLMW HE]

METROPOLIS (1927) -W *VMX^ 0ERK´W ITMG Metropolis the most MRžYIRXMEP ½PQ IZIV# -X GIVXEMRP] WTE[RIH XLI cinema of futurism, and watching it today it’s uncanny to see how many shadows of cinema yet to come it already contains. Things to Come, Blade Runner, Alphaville and The Matrix are all there in embryonic state. Metropolis LEW EPWS FIIR E QENSV MRžYIRGI MR TST [MXL /VEJX[IVO 5YIIR ERH 1EHSRRE SZIVXP] VERWEGOMRK MXW MQEKIV] throughout their careers.

Subscribers to CyberTalk can claim an exclusive free eBook of ¹*VSQ )EVXL XS XLI 1SSR² Ž YLVLW ZZZ VRIWER[ FR XN F\EHUWDON WR ŸQG out more. THE HITCHHIKERS GUIDE TO THE GALAXY (1979) A late-night Radio 4 series that became an international phenomenon, The Hitchhikers Guide to the Galaxy LEW WTE[RIH E ¹XVMPSK] SJ ½ZI² FSSOW a TV series, a movie, two computer games and a series of towels.

*SV MXW XMQI XLI ½PQ [EW E QMPIWXSRI YWMRK MRRSZEXMZI QMRMEXYVIW ERH camera tricks to create its city of the future, taking two years to shoot and bankrupting its producers (in modern money, the budget was close XS Q &YX XLI VIEP OI] XS MXW PSRKIZMX] MW MXW XLIQEXMG GSRXIRX QSVI a warning than a romance, it deals with issues of modernity and class GSRžMGX XLEX LEZI RIZIV KSRI E[E]

Douglas Adams’ story of Arthur Dent, the quintessential boring Brit transported in his dressing gown, throughout the galaxy and the “wholly VIQEVOEFPI FSSO² XLEX KYMHIW LMQ MW [VMXXIR [MXL LMW XSRKYI TPEGIH ½VQP] MR GLIIO ERH MW EPP XLI FIXXIV JSV MX %PXLSYKL XLI QENSVMX] SJ XLI saga is set on distant planets, and contains plenty of real-life science and technology, the story’s most fundamental themes, include such VIEWWYVMRKP] &VMXMWL WYFNIGXW EW GVMGOIX ERH VMGL XIE FMWGYMXW 7YGL E combination might sound bizarre, but it’s a formula which helped pave the way for a raft of Science Fiction comedy that was to follow.

NEUROMANCER (1984) Released in 1984, Neuromancer is widely considered the precursor of XLI ']FIVTYRO KIRVI ERH XLI ½VWX WGMIRGI ½GXMSR XS WMQYPXERISYWP] [MR XLI ¹8VMTPI 'VS[R² E[EVHW 2IFYPE ,YKS ERH 4LMPMT / (MGO E[EVH ;MPPMEQ +MFWSR´W WIQMREP RSZIP FVSYKLX QER] MHIEW XLEX LEZI WIITIH into our collective consciousness, including inventing now-used terms WYGL EW ¹G]FIVWTEGI ²

I, ROBOT (1950) 7LEVMRK TVIGMSYW PMXXPI [MXL XLI ;MPP 7QMXL QSZMI SJ the same name, Isaac Asimov’s collection of short WXSVMIW LIPTIH HI½RI SYV QSHIVR TIVGITXMSR

ERH XLI WGMIRGI ½GXMSR WXERHEVH SJ VSFSXW F] formulating the three (subsequently expanded to four) laws of Robotics.

Neuromancer has all the conventions of the genre that you come XS I\TIGX E ½PQ RSMV WXSV] LEGOIV LIVSIW E FPIEO PERHWGETI [LIVI corporations are the government, dilapidated neighbourhoods infested with crime, and a network of data that connects everything. Like many SJ XLI XMXPIW SR XLMW PMWX E RYQFIV SJ XLI GSRGITXW +MFWSR TVIHMGXW LEZI FIGSQI VIEPMX] LI IRZMWMSRW E GSQTYXIVM^IH [SVPH XLEX EGXYEPP] I\MWXW E world that was far-fetched at the time of publishing, 1984.

Rather than telling the typical tale of a humanoid machine run amok Asimov asks readers to imagine a world where robots protect us from our own worst nature. Beginning with a simple story about the relationship between a little girl and a limited-function robot, he moves on to explore increasingly sophisticated thoughts, questions, and moral complexities. In the process the book reveals Asimov’s overarching vision of a future that entangles inextricably the humans and the machines.

;LMGL PIEHW ZIV] RMGIP] MRXSŠ


NINETEEN EIGHTY-FOUR (1949) 5YMXI WMQTP] SRI SJ XLI ½RIWX RSZIPW IZIV [VMXXIR +ISVKI 3V[IPP´W 2MRIXIIR )MKLX] *SYV begins with the iconic line “It was a bright cold day MR %TVMP ERH XLI GPSGOW [IVI WXVMOMRK XLMVXIIR² ERH SRP] KIXW FIXXIV

STAR WARS (1980) Despite being made on a relatively low budget ($11m), Star Wars has become one of the most successful franchises in the history of cinema. Much has been made of Lucas’s repeated direction XS LMW GEWX Âą*EWXIV ERH QSVI MRXIRWI² SV XLEX the dialogue was easier to type than say. But Alec +YMRRIWW 4IXIV 'YWLMRK ERH .EQIW )EVP .SRIW KMZI MX EPP XLI KVEZMXEW MX RIIHW [MXL XLI ]SYRKIV QIQFIVW ½XXMRK XLIMV VSPIW TIVJIGXP] 1EVO ,EQMPP´W [MHI I]IH IEVRIWXRIWW 'EVVMI *MWLIV´W HMKRMX] ERH TIVLETW FIWX SJ EPP ,EVVMWSR *SVH PSSOMRK WS QSVXM½IH ERH IQFEVVEWWIH XS FI XLIVI *SV EYHMIRGIW MX VIWYPXIH MR E ½PQ YRPMOI ER] FIJSVI SV WMRGI -W MX XLI FIWX ½PQ SJ EPP XMQI# 'IVXEMRP] RSX &YX MX HI½RMXIP] MW SRI SJ XLI QSWX IRHYVMRK

&MK &VSXLIV XLI 8LSYKLX 4SPMGI (SYFPIXLMRO 2I[WTIEO 6SSQ telescreens, the Two-Minute Hate, the Ministry of Love, Airstrip One, YRTIVWSR ¯ EPP LEZI IRXIVIH SYV GSPPIGXMZI GSRWGMSYWRIWW WMRGI XLI FSSO [EW TYFPMWLIH QSVI XLER ]IEVW EKS 1SVISZIV 2MRIXIIR )MKLX] *SYV LEW TSTYPEVMWIH XLI EHNIGXMZI ¹3V[IPPMER² XS HIWGVMFI SJ½GMEP HIGITXMSR secret surveillance, and manipulation of the past by a totalitarian or authoritarian state. ;VMXXIR MR EW E VIEGXMSR XS 7XEPMRMWQ MR 7SZMIX 6YWWME XLI FSSO MW EW TIVJIGX E TMIGI SJ WEXMVI EW ]SY EVI PMOIP] XS ½RH 3V[IPP´W ZMI[ SJ SYV future is sadly truer today than he could ever have believed.

UTOPIA (2013 - 2014) Utopia [VMXXIR F] (IRRMW /IPP] UYMGOP] FIGEQI SRI SJ XLI QSWX XEPOIH about and original dramas of recent times. The story centres around E KVSYT SJ MRXIVRIX JSVYQ TSWXIVW [LS ½RH XLIQWIPZIW MR TSWWIWWMSR SJ XLI QERYWGVMTX WIUYIP SJ E GYPX KVETLMG RSZIP GEPPIH ¹8LI 9XSTME )\TIVMQIRXW² [LMGL MW VYQSYVIH XS LEZI TVIHMGXIH XLI [SVWX HMWEWXIVW SJ XLI PEWX GIRXYV] ERH XLIMV EXXIQTXW XS IWGETI XLI WLEH] ¹2IX[SVO² who are hunting them.

PLANET OF THE APES (1968) Despite spawning an extensive franchise featuring JSYV WIUYIPW E WYTIVžYSYW VIQEOI ERH E more recent series reboot, the original is still the best. 8LI ½PQ´W IJJIGXW EX XLI XMQI KSSH IRSYKL XS GPEMQ that year’s Oscar for outstanding make-up achievement, still hold up today, whilst the story is a classic Hollywood mixture of adventure and digestible social commentary. Though by no means subtle in its TSPMXMGW SV WEXMVI RS SXLIV ½PQ MW EW I\SXMG ERH [MXX] MR MXW TVIEGLMRK 6SH 7IVPMRK´W WGVMTX VIQEVOW SR GPEWW VEGI WI\ ÂŻ NYWX EFSYX IZIV]XLMRK MR JEGX MX WXMPP TEGOW E TYRGL XSHE] 7MQMPEVP] 'LEVPXSR ,IWXSR´W TSVXVE]EP of the last intelligent human alive is pitched perfectly against the ÂąQEHLSYWI² SJ XLI ETI VYR WSGMIX] LI ½RHW LMQWIPJ MR %RH XLEX´W FIJSVI that IRHMRKŠ

Utopia looks like nothing else ever seen on British television with its acid colours and carefully designed shots the perfect echo of the literature that inspires it, without things ever getting too cartoony or distracting. Its inclusion of real world events, hidden nods to the world of comic books and dubstep soundtrack, give the show a freshness and FVMPPMERGI XLEX MW GYVVIRXP] YRQEXGLIH IPWI[LIVI 9RJSVXYREXIP] MR XLI past month, Utopia LEW FIIR E\IH EJXIV NYWX X[S WIVMIW TVIWYQEFP] XS free up more room in the Channel Four schedules for shows such as The Paedophile Hunter, My Daughter The Teenage Nudist, Scrotal Recall and others with names seemingly plucked from the Daily Sport’s subs’ desk.

ROBOCOP (1987) 7IX MR E JYXYVMWXMG (IXVSMX TPEKYIH F] ½RERGMEP VYMR and economic decay, RoboCop - made in 1987 relates how a no-nonsense cyborg law enforcer ends up policing the city’s crime-ridden streets. ;VMXXIR F] )H 2IYQIMIV ERH HMVIGXIH F] 4EYP :IVLSIZIR XLI ½PQ TEMRXW (IXVSMX EW E SRGI KVIEX metropolis and manufacturing hub laid to waste by outsourcing and mass unemployment. Today, deprived of the automobile industry that supported it for so long, the real-world Detroit is in a very similar situation and is even considering building a statue to its most famous policeman.

WAR OF THE WORLDS (1898) “No one would have believed in the last years of the nineteenth century that this world was being watched keenly and closely by intelligences KVIEXIV XLER QER´W ERH ]IX EW QSVXEP EW LMW S[R² *SV XLSWI SJ E GIVXEMR EKI ERH SV [MXL E GIVXEMR QYWMGEP XEWXI XLIWI STIRMRK [SVHW GER SRP] FI LIEVH MR XLI YRQMWXEOIEFPI XSRIW SJ 6MGLEVH &YVXSR SR .IJJ ;E]RI´W musical adaptation of The War of the Worlds. The fact that this album, FEWIH SR E WGMIRGI ½GXMSR WXSV] [VMXXIR SZIV IMKLX] ]IEVW TVIZMSYWP] [SYPH FIGSQI SRI XLI EPP XMQI FIWX WIPPMRK EPFYQW MR 9/ LMWXSV] HIQSRWXVEXIW XLI MRžYIRGI SJ , + ;IPPW´ QSWX JEQSYW [SVO ;VMXXIR FIX[IIR ERH The War of the Worlds is one of XLI IEVPMIWX WXSVMIW XLEX HIXEMP E GSRžMGX FIX[IIR QEROMRH ERH ER extra-terrestrial race. The novel has been variously interpreted as a commentary on evolutionary theory, British Imperialism, and generally :MGXSVMER WYTIVWXMXMSRW JIEVW ERH TVINYHMGIW ERH LEW RIZIV KSRI SYX SJ TVMRX WMRGI MXW MRMXMEP TYFPMGEXMSR -XW MRžYIRGI EPWS GERRSX FI YRHIVWXEXIH spawning (aside from the aforementioned hit album) half a dozen JIEXYVI ½PQW VEHMS HVEQEW ZEVMSYW GSQMG FSSO EHETXEXMSRW E XIPIZMWMSR series, and sequels or parallel stories by other authors. It has even MRžYIRGIH XLI [SVO SJ WGMIRXMWXW RSXEFP] 6SFIVX ,YXGLMRKW +SHHEVH GVIEXSV SJ XLI [SVPH´W ½VWX PMUYMH JYIPPIH VSGOIX

STAR TREK (1966 - PRESENT) It has often been said that Star Trek changed the world, and whilst there have clearly been QSVI MQTSVXERX JEGXSVW XLER ;MPPMEQ 7LEXRIV´W ridiculously tight sweater in the course of human development, the importance of the show cannot be overlooked. ;LIR LI GSRGIMZIH XLI WIVMIW GVIEXSV +IRI 6SHHIRFIVV] EMQIH XS use futuristic situations as analogies for contemporary problems on Earth and looked to rectify them using humanism and optimism rather XLER ZMSPIRGI ERH GSRžMGX %W WYGL ITMWSHIW JVIUYIRXP] EHHVIWWIH moral and social issues, tackling topics such as slavery, warfare and discrimination. Roddenberry also created a multi-ethnic crew for the )RXIVTVMWI E ½VWX JSV 97 HVEQE ;LIR 2MGLIPPI 2MGLSPW [LS TPE]IH 0X 9LYVE GSRWMHIVIH UYMXXMRK LIV VSPI SR Star Trek during the second season to pursue a role she was talked out of this decision by Reverend 1EVXMR 0YXLIV /MRK .V [LS XSPH LIV XLEX E WLS[ XLEX HITMGXIH E FPEGO woman working alongside whites in a position of importance helped further the goal of racial equality.

Disagree with us? Of course you do! Feel free to vent on @CyberTalkUK or email cybertalk@softbox.co.uk

41


Supporting Your Transition to Government Security Classifications 8LI 9/ +SZIVRQIRX 4VSXIGXMZI 1EVOMRK 7GLIQI +417 [EW VITPEGIH [MXL XLI RI[ +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW +7' W]WXIQ SR XLI RH %TVMP 8LI RI[ W]WXIQ VIUYMVIW XLVII PIZIPW SJ GPEWWM½GEXMSR JSV MRJSVQEXMSR EWWIXW 3J½GMEP 7IGVIX ERH 8ST 7IGVIX ERH MX MW LSTIH XLEX XLI WMQTPM½IH TSPMG] [MPP QEOI MX IEWMIV ERH QSVI GSWX IJJIGXMZI JSV ,IV 1ENIWX]´W +SZIVRQIRX QEXIVMEP XS FI QEVOIH LERHPIH ERH TVSXIGXIH MR E proportionate way. ;LEX MW +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW +417# %PP 9/ +SZIVRQIRX TYFPMG WIGXSV SVKERMWEXMSRW QYWX GSQTP] [MXL ,IV 1ENIWX]´W +SZIVRQIRX 7IGYVMX] 4SPMG] *VEQI[SVO [LMGL VIUYMVIW XLI ETTPMGEXMSR SJ WIGYVMX] GPEWWM½GEXMSRW XS KSZIVRQIRX MRJSVQEXMSR EWWIXW 4VSXIGXMZI QEVOW EVI GSQTSWIH SJ GPEWWM½GEXMSRW ERH HIWGVMTXSVW FYX QE] EPWS MRGPYHI GEZIEXW ERH GSHI [SVHW 8LIWI QEVOW indicate security requirements for anyone handling the data, without which the risk of sensitive data loss increases.

;LEX´W XLI VMWO SJ RSR GSQTPMERGI#

-QTEGX SJ HEXE FVIEGLIW SR 2EXMSREP 7IGYVMX] 0SWW SJ VITYXEXMSR JSV SVKERMWEXMSR YRJEZSYVEFPI TVIWW GSZIVEKI ,IEZ] EYHMXMRK F] XLI -RJSVQEXMSR 'SQQMWWMSRIV´W 3J½GI -'3 4SXIRXMEP JSV ½RIW PIKEP EGXMSR SV PSWW SJ JYRHMRK

;LEX EVI XLI VIUYMVIQIRXW# 3VKERMWEXMSRW [MPP RIIH XS (QVXUH XVHUV DUH DZDUH RI WKH QHZ FODVVL¼FDWLRQV DQG XQGHUVWDQG KRZ WR XVH WKHP %W WXEXIH MR PEWX QSRXL´W 'EFMRIX 3J½GI YTHEXI ETTP]MRK XSS LMKL E QEVOMRK GER MRLMFMX sharing and lead to unnecessary and expensive protective controls, but applying too low a marking may result in inappropriate controls and potentially put sensitive assets at greater risk of compromise.


Develop policy for dealing with information generated by and shared in partnership working +SZIVRQIRX (ITEVXQIRXW ERH %KIRGMIW [MPP RIIH to ensure that consistent controls are implemented throughout their public sector delivery partners (i.e. Non Departmental Public Bodies and Arm’s Length Bodies) and wider supply chain. Allow for historical data )\MWXMRK +417 QEVOMRKW [MPP WXMPP RIIH XS FI VIXEMRIH and respected. As historic content becomes current again and changes are made, its sensitivity will need to FI VI IZEPYEXIH MR XLI GSRXI\X SJ XLI RI[ +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW WGLIQI ÂŻ ERH ER ETTVSTVMEXI RI[ GPEWWM½GEXMSR ETTPMIH

%VI =SY 6IEH] JSV +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW# 8LI +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW WIIOW XS WMQTPMJ] administration and reduce costs, empower people to XEOI XSTMGEP HIGMWMSRW EFSYX LS[ XS VIPIEWI 3J½GMEP information and help those entrusted with valuable assets to pragmatically do business in a cost-effective way. 6LPSOLI\LQJ WKH &ODVVLÂźFDWLRQ 6\VWHP For some, this is an exciting opportunity to simplify the GPEWWM½GEXMSR W]WXIQ VEXMSREPMWI TVSXIGXMSR QIGLERMWQW ERH EPMKR XLI [E] XLEX XLI 9/ HSIW FYWMRIWW [MXL MRHYWXV] and international partners. For others, it’s more of a challenge. As a trusted adviser, SBL is uniquely placed to ensure compliance with current requirements and deliver a WIEQPIWW GLERKISZIV XS XLI RI[ +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW WGLIQI ;I EVI EPVIEH] [SVOMRK [MXL existing customers to help them transition from decades SJ YWMRK XLI +417 ERH WYTTSVX XLIMV +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW MQTPIQIRXEXMSR TVSKVEQQIW with pragmatic solutions, as well as expert advice and assistance.

8S ½RH SYX QSVI EFSYX XLI RI[ +SZIVRQIRX 7IGYVMX] 'PEWWM½GEXMSRW system, and how SBL can help make your transition as smooth as possible ¯ TPIEWI GSRXEGX YW SR

IRUYMVMIW$WSJXFS\ GS YO www.softbox.co.uk

For some, this is an exciting opportunity to simplify the classification system‌ For others, it’s more of a challenge.

43


Noel K Hannan

Was it crueller to announce the end of a marriage in an exotic foreign city rather than rainy Manchester?

44


Maybe it had been a mistake asking her to Jerusalem for the launch. Bryard wanted to break the news gently but he did still love her, in his S[R [E] [LMGL SJ GSYVWI [SYPH RIZIV FI IRSYKL ;EW MX GVYIPPIV XS announce the end of a marriage in an exotic foreign city rather than rainy Manchester?

,I HMHR´X XLMRO MX [EW ETTVSTVMEXI XS XIPP LIV SR XLI ½VWX RMKLX -X LEH been a wonderful evening, Jerusalem was such a romantic city with its fantastic, ancient architecture, its resonant place names, and the dusky QSHIP KMVP WSPHMIVW [LS ¾MVXIH SR WXVIIX GSVRIVW [MXL XLI 92 XVSSTW Judy chattered over dinner about her day, and never once asked Bryard about his. They ate a wonderful chicken dish and the most delicious pitta bread Bryard had ever tasted, drank white wine and listened to a barmitzvah procession make its way through the street below the rooftop restaurant. As Judy wittered Bryard laughed or tutted at appropriate places. Sometimes he would do the wrong thing at the wrong moment and then he would have to admit that he wasn’t listening, leaning across the table to touch her hand and explain that he was tired. But she would sulk and again he understood why he was leaving her. It would be so easy to tell her at a moment like this, when she was most unreasonable. But there was always tomorrow. He didn’t want whatever histrionics she would perform to interfere with his work. Not before it was complete, at least.

She had accepted in her usual bored manner, and gone straight out to buy a selection of clothes and travelling accessories, while he worked overtime debugging at Hyperreality’s complex in the Pennines, preparing XLI ½REP XSYGLIW ERH QIIXMRK ZEVMSYW -WVEIPM HMKRMXEVMIW EW XLI] XVSSTIH through the consultations and presentations. They were invariably impressed, to say the least. Moments of public adulation for computer programmers were few and far between. Bryard was determined to IRNS] XLI RI\X JI[ [IIOW ,EZMRK .YH] SYX SJ LMW PMJI [EW TEVX SJ XLEX His employers, along with the Israeli cabinet and the Jerusalem city PIEHIVW LEH GLSWIR ER I\XVIQIP] LMKL TVS½PI HEXI XS PEYRGL LMW GVIEXMSR YTSR XLI [SVPH +SSH *VMHE] %( &V]EVH LEH FEPOIH EX XLMW XLI streets of the Via Dolorosa would be choked with crowds, where would they install the beamers to ensure maximum opacity? How could they WIGYVI GEFPMRK [LIR WS QER] TMPKVMQW´ JIIX [SYPH XVEQTPI MX# ;LEX would become of him - and Hyperreality - if it failed? The directors had taken him to dinner and reassured him that the tests carried out in the eerie full-size mock up buried deep beneath the Pennines (it always reminded him of the stories of doppleganger towns built by Soviet Russia to train deep cover agents) had been more than adequate ERH XLI] [IVI GSR½HIRX XLEX XLI +SSH *VMHE] PEYRGL MR XLI LIEVX SJ Old Jerusalem would be an enormous success. As they smiled at him with dollar-signed eyes, he knew he was still carrying the weight of this TVSNIGX SR LMW WLSYPHIVW -J ER]XLMRK ER]XLMRK [IRX [VSRK &V]EVH [SYPH FI GVYGM½IH

On Thursday they scheduled a full test of the system. Jerusalem was thronged with pilgrims, and it required a sizeable detachment of the IPMXI +SPERM &VMKEHI ERH MX WIIQIH QSWX SJ .IVYWEPIQ´W TSPMGIQIR XS erect barriers and man barricades to seal off the Via Dolorosa. The policemen assumed they would be privileged with a glimpse of whatever this secret thing was, but Bryard had arranged for only his immediate team to witness the test. He had no intention of revealing the nature of XLI TVSNIGX XS ER] SYXWMHIVW ERH LEZI MX PIEOIH XS -WVEIP´W WIRWEXMSREPMWX press before Friday. 7YGL [EW .YH]´W PIXLEVK] XLEX WLI HIGPMRIH ER SJJIV XS NSMR LMQ JSV XLI test. She assumed he was putting on some sort of high-tech light show. He had never bothered to correct her, and let her go on a sightseeing trip to Bethlehem. He promised himself he would tell her tonight, XS KIX MX SJJ LMW GLIWX WS XLEX LI GSYPH IRNS] LMW QSQIRX SJ XVMYQTL tomorrow to the full.

But still his decision to invite Judy nagged at him. They took the suborbital from Ringway on Monday, which would give them three days MR .IVYWEPIQ FIJSVI +SSH *VMHE] HE]W ½PPIH [MXL W]WXIQW MRWXEPPEXMSR JSV Bryard and his team, shopping and sightseeing for Judy. He promised her he would be back in the hotel no later than nine each evening so they could have a late dinner and maybe go dancing, if he was not too tired. She had pouted and demanded assurances that they would go dancing every night no matter how tired he pretended to be, and he remembered one of the reasons he was going to leave her. She was an insensitive bitch, and she forgot all too easy how hard he had to work to maintain the kind of lifestyle to which she had become accustomed. (MH WLI XLMRO WLI [SYPH FI NIXXIH SJJ XS XLI ,SP] 0ERH ERH MRHYPKIH F] E QER [LS GSYPH KYEVERXII LMW [SVOMRK HE] ½RMWLIH [LIR LMW [MJI wanted to go dancing? Such a man, thought Bryard as he left her asleep MR XLI EMV GSRHMXMSRIH LSXIP VSSQ ERH [IRX XS NSMR LMW XIEQ MR XLI 3PH 'MX] HMH RSX I\MWX ;SQIR MRZIRXIH XLIQ XS XSVXYVI LSRIWX LEVH working husbands.

The test went better than he had ever imagined. One of his team, a talented young technician whom he knew to be deeply religious and [LS LEH PSFFMIH VIPIRXPIWWP] XS [SVO SR XLI TVSNIGX [EW WS SZIVGSQI with fervour that he fainted. Even Bryard felt a lump at his throat in seeing his creation in pixel-perfect motion on the Via Dolorosa, instead of the fascia board mock up under the Pennine hill. Later, the young man claimed he had been overcome by heatstroke after staying in the sun for too long. Bryard noted this and commented on the incident at length in his email to the directors that night, sending it from the public terminal in the hotel before Judy returned from Bethlehem. He told XLIQ XS I\TIGX E GEWYEPX] VEXMS JSV XLI RI\X HE] SJ EVSYRH SRI MR ½JX] and to ensure that the medical services in Jerusalem were alerted. It seemed as if even the creator had underestimated the emotional power of his creation. Judy returned much later than he expected, slightly drunk from too much red wine on the trip back from Bethlehem, and found Bryard sitting on the balcony in the warm evening air. Jerusalem, old and new, stretched out below them. Tomorrow, he would show it something it had not seen for over two thousand years. But right now, there was something else that he had to do.

&YX XLIVI [EW WS PMXXPI JSV LMQ XS HS LIVI ,I LEH E ½RI XIEQ SJ enthusiastic young men (all, he observed, happily unmarried) who stripped down to shorts and t-shirts and installed the complex system SJ FIEQIVW GEQIVEW TVSNIGXSVW VI¾IGXSVW ERH GEFPIW EPSRK XLI :ME (SPSVSWE W[IEXMRK MR XLI WXM¾MRK LIEX ERH W[IEVMRK KSSH REXYVIHP] when things didn’t go to plan. Bryard supervised the construction of a microwave link, then walked through the cool alleys of the Arab quarter to visit the other end of the link, a Cray supercomputer situated in the /MRK (EZMH ,SXIP 8LMW [EWR´X WXVMGXP] LMW NYVMWHMGXMSR ,]TIVVIEPMX] LEH poached a dedicated Cray expert from the parent company - but as SZIVEPP TVSNIGX QEREKIV LI GSYPH FI LIPH VIWTSRWMFPI MJ ER]XLMRK [IRX wrong. He viewed the installation in the air conditioned room situated in an empty suite next to the huge walk-in freezer, and chatted on professional matters to Nbele, the Nigerian Cray man. There seemed to be no problems. Nbele appreciated the chance to meet and chat with Bryard. Among his peers, his reputation was preceding him.

±-X´W SZIV .YH] - [ERX E HMZSVGI ² 7LI PEYKLIH EX ½VWX EWWYQMRK LI [EW NSOMRK SV NYWX ERRS]IH EX LIV JSV coming back late and drunk. But when he launched into a bitter, long pent-up tirade of reasons why he was leaving her, she sat dumbstruck SR XLI GSVRIV SJ XLI FIH ERH EFWSVFIH XLI IRSVQMX] SJ MX ;MXLSYX responding to him she tearfully collected up a few clothes and toiletries and dashed from the apartment, slamming the door. He waited for half an hour then phoned reception. They told him that they had given LMW [MJI ER EPXIVREXMZI VSSQ ,I [IRX XS FIH WEXMW½IH XLEX WLI [EW safe and that he had done what had to be done. Now, only tomorrow mattered.


&V]EVH´W GLIWX ½PPIH [MXL TVMHI ,I LEH [SVOIH SR XLMW TVSNIGX JSV XIR years. Only his marriage to Judy had taken up a greater part of his life.

,I WPITX ½XJYPP] ERH VSWI IEVP] FVIEOJEWXIH MR LMW VSSQ ,I WLSYPH LEZI felt buoyant, this was to be the greatest moment of his career, perhaps the greatest day in his life, but Judy had tainted it, even by her absence. He regretted breaking the news to her last night, he felt sorry for her even after the years of heartache she had caused him. Leaving the hotel, he left a message at reception with a pass that would give her access to LMW GSQQERH TSWX SR XLI :ME (SPSVSWE PEXIV XLEX HE] XS NSMR LMQ JSV XLI launch if she wished. He hoped she would choose to do so.

1IWQIVMWIH F] LMW S[R GVIEXMSR LI HMH RSX RSXMGI EX ½VWX XLI HSSV XS the command centre opening, and when he did he was surprised to see Judy, immaculately dressed in a pale green skirt and blouse, but her eyes darkly rimmed with smeared mascara. She had been crying. She didn’t say a word. Instead, she reached forward and took an Israeli agent’s gun from his holster as casually if she was taking a drink from his hand. She stepped back, the gun in her hands. The agent turned and froze. His colleague reached for his own weapon and paused when he saw Judy already had hers in the aim.

Jerusalem was a pulsing, living organism. The hot, dry streets were packed with bodies as Bryard made his way to the temporary command centre in a militaristic tower positioned high above the Via Dolorosa. A police patrol brought him in a dusty Toyota four-wheel drive, its impatient driver leaning on his horn and urging people out of the way. Bryard sat in the back, impassive, hands folded in his lap.

±,EZI ]SY GSQI XS OMPP QI#² &V]EVH EWOIH LIV [IEOP] EPQSWX whispering.

By contrast, the command centre was a sanctuary of calm. Bryard’s young team, now smartly dressed, ran through cursory checklists and balanced clipboards on knees as they operated keyboards and specialised manipulation devices. Banks of screens glowed with soft PMKLX ERH XLI LYQ SJ QEGLMRIV] ½PPIH XLI EMV 8LMW [EW &V]EVH´W MHIE SJ heaven. He had never felt this way in his home or when out with Judy. Maybe that was part of the problem.

±2S ² WLI WEMH ±=SYV QMWXVIWW ²

The dignitaries began arriving a little later. First, the two directors of ,]TIVVIEPMX] &IRRIXX ERH ,IRHIVWSR [IEV] JVSQ XLI WYFSVFMXEP ¾MKLX but in a near frenzy of excitement. Then the Israeli prime minister, Rukab, and several of his cabinet and Jerusalem city councillors, accompanied by secret service agents openly sporting weapons. A member of Bryard’s team depolarised the long window on the wall unoccupied by screens and equipment, offering a breathtaking panoramic ZMI[ SJ XLI :ME (SPSVSWE *EV FIPS[ XLIQ XLI WXVIIXW ½PPIH 4MPKVMQW holidaymakers, market traders, citizens of Jerusalem, and many television crews, all vying for space in the narrow alleyways. Helicopters clattered SZIVLIEH QSWXP] 92 ERH -WVEIPM TEXVSPW ERH ER IRXIVTVMWMRK XIPIZMWMSR crew, who had to be warned off from hovering directly over the Via Dolorosa by a Cobra gunship.

&IPS[ [LIVI XLI GVYGM½\MSR SJ .IWYW SJ 2E^EVIXL /MRK SJ XLI .I[W [EW XEOMRK TPEGI MR XLI WXMPP LSX EMV EFSZI XLI LMPP ORS[R EW +SPKSXLE XLI hyper illusion began to falter. The animation of Jesus froze with his eyes GEWX WO][EVH PSSOMRK JSV LIPT SV JSVKMZIRIWW JVSQ +SH SV &V]EVH

And she discharged the gun methodically into each of the computer controllers arranged neatly around the room. The directors and the cabinet members turned slowly, almost unwilling to tear themselves away from the scene below, even in the face of such danger. Bryard’s team were already under their seats, sheltering.

Rukab’s bodyguards came to their senses and realised Judy had emptied XLI KYR 8LI] FYRHPIH LIV XS XLI ¾SSV ERH HMWEVQIH LIV &V]EVH WXSSH over her, tears streaming down his face. ±8IR ]IEVW ² LI WEMH ±=SY LEZI VSFFIH QI SJ XIR ]IEVW ² She looked him squarely in the face as the agents pulled her to her feet, hands bound behind her back. ±8LIR [I EVI IZIR ² WLI WEMH ERH XLI] XSSO LIV E[E]

±1MWXIV 4VMQI 1MRMWXIV ² WEMH &V]EVH PSSOMRK EX LMW [EXGL ±-X MW XMQI ;SYPH ]SY GEVI XS HS XLI LSRSYVW#²

Later, Bryard sat alone in the command centre. The cabinet had gone, discussing in grave tones how this would effect their chances of reelection. The directors of Hyperreality had vanished swiftly, muttering concerns over share options. Even Bryard’s team had deserted him, heading for the bars to drown their sorrows. In the darkness above the city, electric ghosts of two thousand year old martyrs, whores and WSPHMIVW ¾MGOIVIH EGVSWW XLI WO] FVMRKMRK WEPZEXMSR XS RS SRI

6YOEF WXITTIH JSV[EVH ERH TPEGIH LMW ½RKIV PMKLXP] SR E PEVKI VIH button. ±0IX XLI [SVPH WII ² LI WEMH % PSYHIV LYQQMRK ½PPIH XLI VSSQ EW XLI QMGVS[EZI PMRO [MXL XLI Cray V cycled up, and began transmitting millions of lines of code to the beamers and opacitors in the streets below. The grid of hardware spread out across the city like an invisible nervous system, and a twenty metre Jesus Christ began his long, last walk up the dusty cobbles of the Via Dolorosa. Silence descended upon the city, tangible even behind the walls of the command centre. Rukab spluttered as he had forgotten to breath. This [EW RS QIVI LSPSKVEQ SV TEPI PMKLX TVSNIGXMSR % X[S XLSYWERH ]IEV old story was being acted out in front of them, as real as if they had been transported back in time.

“Ten years,” he said. “You have robbed me of ten years.” She looked him squarely in the face as the agents pulled her to her feet, hands bound behind her back.

Pilgrims and policemen watched in amazement as Jesus of Nazareth towered above them, the heavy cross across His back, the crown of thorns drawing blood on His forehead. Roman centurions, equally as mighty, spurred Him on, stopping to kick and whip him as He stumbled once, twice, three times. Mary Magdalene stepped from the crowd and offered Him water, the Roman soldiers dragging her away. Other giants MR XLI GVS[H NIIVIH ERH XLVI[ WLEVT IHKIH WXSRIW FIEVHIH QIR MR PSRK robes alongside smooth-chinned men in modern lightweight suits. The illusion was beyond perfect. It was hyperreal. People began to faint.

46


LIVES

000850

g n i y f e D Gods and emons Andrew Cook SBL

*-2(-2+ 6)%0 ,)63)7 -2 % :-689%0 ;360(

Open-world “sandbox� games are now the norm, allowing narratives to morph and evolve through the actions and decisions taken by the user, not the programmer.

47


3ZIV XLI TEWX HE]W - LEZI EGLMIZIH QER] XLMRKW - LEZI GSQQERHIH ¹8LI .EGOHE[² E stolen brig on the Caribbean seas, defeated innumerable cartoon supervillains inside of a dilapidated insane asylum, led an elite band SJ WSPHMIVW XLI ¹+LSWXW² XS WEZI E H]WXSTMER future-earth from the machinations of a postnuclear-war South American Federation, and [SR XLI *-*% ;SVPH 'YT FSXL EW QEREKIV ERH player. All this whilst also holding down a full XMQI NSF ERH PIEHMRK E VIPEXMZIP] RSVQEP MJ RSX somewhat insular, life.

The question of female leads (or lack of) is another pressing issue facing games studios, aside from the aforementioned Ms. Croft, it is very HMJ½GYPX XS GSQI YT [MXL ERSXLIV GSQTIPPMRK JIQEPI PIEH MR E ZMHIS game. Even Lara has taken 17 years and a series reboot to become anything close to resembling a relatable woman. This shows that the industry is changing, but slowly. There are countless reasons why video games have failed to produce many convincing female characters, enough XS ½PP XLI TEKIW SJ XLMW QEKE^MRI E RYQFIV SJ XMQIW SZIV FYX MX MW JEMV XS say that for a long time the problem has been something of an endless cycle. The male dominated landscape of video gaming dissuades many [SQIR JVSQ TMGOMRK YT E NS]TEH PIEHMRK XS JI[IV [SQIR LEZMRK ER interest in taking roles in the production of video games, which leads to a slanted view of how women in video games should behave, which leads to more women becoming disenfranchised and so on and so on ad MR½RMXYQ

That this has also happened to millions of gamers across the world matters little, such is the sophistication and depth of today’s video games each player’s experience is now inexorably different. Open-world ÂąWERHFS\² KEQIW EVI RS[ XLI RSVQ EPPS[MRK REVVEXMZIW XS QSVTL ERH evolve through the actions and decisions taken by the user, not the programmer.

But now for the tricky part. Subsuming a character in the way that ½VWX TIVWSR ERH WMQYPEXMSR KEQIW JSVGI ]SY XS HS MW EPP ZIV] [IPP MJ ]SY see events unfold through a characters eyes and make decisions on their behalf.You can apply your own moralities and rationale to what is going on and why you have acted in that way. But what happens if that backstory is already provided? And worse still, what happens if you don’t like it?

;MXL XLI I\GITXMSR SJ E LERHJYP SJ [SVOW MRGPYHMRK E WIVMIW SJ [SRHIVJYP GLMPHVIR´W FSSOW MR XLI ´W RSZIPW ERH ½PQ HS RSX EPPS[ their audience to choose their own adventure with anything like the same level of meaning and perception as video games do. That is not XS WE] XLEX ZMHIS KEQIW EVI RIGIWWEVMP] FIXXIV XLER ½PQ SV PMXIVEXYVI MR JEGX XLIVI EVI ZIV] QER] I\EQTPIW MR [LMGL XLI] EVI WMKRM½GERXP] worse. It is more that they provide a greater sense of inclusion and self for the audience, and that these feelings invariably eliminate the notion SJ E ½GXMSREP GLEVEGXIV )WWIRXMEPP] ]SY GER I\TIVMIRGI IZIRXW EPSRKWMHI Frodo, but you are Lara.

*SV QI XLI KEQI &MSWLSGO -R½RMXI TVSZMHIW XLMW ZIV] GSRYRHVYQ 8LI GIRXVEP GLEVEGXIV &SSOIV (Y ;MXX MW E [MHS[IH %QIVMGER 'MZMP [EV ZIXIVER [LSWI EGXMSRW EX XLI &EXXPI SJ ;SYRHIH /RII LEZI GEYWIH LMQ intense emotional scarring and turned him to excessive gambling and alcohol. Now working as a private investigator, Booker is continually haunted by his past and struggles internally with questions of faith and religion. All very interesting stuff but there is nothing within the personality of this 19th century American soldier that I could relate to, and as such, I struggled to form the same kind of emotional connection [MXL XLI GLEVEGXIV XLEX - HMH [MXL SXLIV PIWW žIWLIH SYX LIVSIW Honestly, I even connected to a blue hedgehog in running shoes more than I did with Booker.

8LI WLMRMRK I\EQTPI SJ NYWX LS[ MQQIVWIH [MXLMR E GSQTYXIV KEQI players can become is the football management simulation series Football Manager which puts gamers into the hotseat of any one of SZIV JSSXFEPP GPYFW [SVPH[MHI 8LI KEQI MW WS EHHMGXMZI XLEX MX LEW FIIR GMXIH MR RS JI[IV XLER HMZSVGI GEWIW ERH XLIVI EVI WGSVIW of online communities, each telling stories of how they hold fake press conferences in the shower, wear three-piece suits for important games and have deliberately ignored real life footballers because of their ingame counterpart’s indiscretions.

¹0YHSREVVEXMZI HMWWSRERGI² MW XLI XIVQ [MHIP] FERHIH EVSYRH XLI games industry to describe the disconnect gamers feel when playing such titles. It is both debated and derided in equal measure, yet there is some substance to the argument. The term was originally coined in a VIZMI[ SJ XLI ½VWX &MSWLSGO E KEQI [LIVI XLI GYXWGIRIW STIRP] VMHMGYPI the notion of a society built upon self-interest and men becoming gods yet the gameplay appears to reward these exact behaviours creating a NEVVMRK GSRžMGX SJ MRXIVIWX ;LIR IZIR MR KEQI REVVEXMZIW JEMP XS XMI YT XLI UYIWXMSR SJ MHIRXM½GEXMSR ERH EWWSGMEXMSR MW FSYRH XS EVMWI The area becomes even greyer when referring to third person games, whereby the entirety of the character being controlled is visible on screen (albeit usually from behind). Here the character becomes more PMOI XLSWI [I EVI YWIH XS JVSQ RSZIPW ERH ½PQ XLI] EVI TEXIRXP] E separate entity from the player, with their own voice and backstory, yet they are still manipulated by the player. Then, during cutscenes and the like, control is wrested away from you and handed back to the character ¯ EPPS[MRK XLIQ XS TSXIRXMEPP] EGX MR E [E] IRXMVIP] HMJJIVIRX XS LS[ ]SY controlled them previously. So what exactly is your relationship with XLIQ# 'SQTERMSR# 7YTTSVX XIEQ#Š+SH#

=IX XLI WIRWI SJ WIPJ MW RIZIV QSVI ETTEVIRX XLER MR XLI ½VWX TIVWSR genre of games, such as the Call of Duty and Far Cry franchises, which, more often than not, mirror the rare second-person literary narrative by placing the gamer themselves in the centre of the action. In novels, [LIR XLI VIEHIV WIIW ¹-² XLI] YRHIVWXERH MX XS VITVIWIRX XLI ZSMGI SR XLI TEKI ERH RSX XLIQWIPZIW -R ½VWX TIVWSR KEQIW LS[IZIV ¹-² becomes whoever is controlling the character and the camera position MW WTIGM½GEPP] HIWMKRIH XS QMQMG XLEX ZMI[TSMRX -R WSQI SJ XLI FIWX I\EQTPIW SJ ½VWX TIVWSR KEQIW KEQIVW HS RSX GSRXVSP XLI TVSXEKSRMWX rather they are the protagonist. As such they are addressed by the supporting cast either directly by their own name which they supply EW TEVX SJ XLI SV QSVI GSQQSRP] F] E RMGOREQI YWYEPP] ¹6SSOMI² SV ¹/MH² 8LMW KMZIW XLI YWIV E JEV KVIEXIV WIRWI SJ MRGPYWMSR MR XLI WXSV] and subsequent empathy with their character and its allies than in any SXLIV JSVQ SJ ½GXMSR %W IZIRXW YRJSPH ]SY PMZI XLIQ EW MJ XLI] [IVI taking place in real life and begin to base decisions not on your own ¹SJžMRI² TIVWSRE FYX VEXLIV EW E VIWYPX SJ ]SYV ¹SRPMRI² FEGOWXSV] ;LMPI MR VIEP PMJI ]SY [SYPH TVSFEFP] FI WSQI[LEX VIPYGXERX XS GLSSWI [LMGL SJ ]SYV XVEZIPPMRK GSQTERMSRW WLSYPH FI WEGVM½GIH XS ETTIEWI XLI ZSSHSS TVMIWX [LS [EW LSPHMRK ]SY GETXMZI ¯ MR XLI ZMVXYEP VIEPQ SRI slightly off comment twelve levels ago can mean that your childhood W[IIXLIEVX MW OMGOIH SJJ E GPMJJ JEWXIV XLER ]SY GER WE] ¹4VIWW 8VMERKPI² (Although, this being video games, they will no doubt reappear twenty minutes later as leader of an army of the undead).

48


LIVES 0 The very nature of video games does, of course, make drawing EGGYVEXI VITVIWIRXEXMSRW SJ GLEVEGXIVW HMJ½GYPX 8LI [LSPI TSMRX SJ a game is to allow the player to encounter events that they would otherwise never be able to - It’s highly doubtful that we’ll be seeing 3J½GI 7YTTPMIW 1EREKIV LMXXMRK SYV WLIPZIW MR XLI RIEV JYXYVI JSV example. Instead the events depicted occur at the very extremes of human experience, amid theatres of war, apocalypse and fantasy. As the ZEWX QENSVMX] SJ XLI TSTYPEXMSR XLEROJYPP] LEZI RIZIV FIIR I\TSWIH XS these types of environments, and with the parameters of the reality in which these characters operate being so much wider than our own, it is tough to imagine, and subsequently depict, how any of us would truly react if faced with say, nuclear Armageddon or an invasion of mutated insects. Many of the tabloid newspapers like to blame various acts of violence on these types of emotive video games as they are an easy, ERH PE^] WGETIKSEX -R XVYXL ±XLI] HMH MX FIGEYWI XLI] WE[ MX MR E KEQI² is a weak argument at best. There is a case to be made that games like +VERH 8LIJX %YXS ERH 'EPP SJ (YX] HIWIRWMXMWI TPE]IVW XS ZMSPIRGI XS some extent, but in most cases there are various factors involved in these types of crime and as such, to blame it solely on a computer game which has sold millions of copies worldwide is tenuous.

“As more and more people turn to video games as a legitimate medium of cultural influence so too must the developers and writers accept their roles as influencers” Like any form of entertainment media,Video games are a form of escapism and should therefore be viewed accordingly. If I don’t connect with a character, so what? I can turn off the game and put on another game where I will or, heaven forbid, go outside and speak to another human being. Right now, this act is as simple as pushing a button and putting down a control pad, the connection stops when the TV is off. ,S[IZIV XIGLRSPSK] WYGL EW XLI 3GGYPYW 6MJX LIEHWIX ERH +SSKPI +PEWW QIER XLEX XLI PMRIW FIX[IIR XLI VIEP ERH ZMVXYEP [SVPHW EVI becoming more and more blurred. And as people becoming more immersed in their games, the more their impact will grow. Video games are not yet at the stage where they can truly claim to MR¾YIRGI TSTYPEV GYPXYVI XS XLI WEQI HIKVII EW ½PQ ERH PMXIVEXYVI has. But they will be soon. A few have already slipped through into the QEMRWXVIEQ ¯ 7YTIV 1EVMS 8IXVMW 4EG 1ER IX EP ERH [LIVI XLIWI lead, others will certainly follow. The huge media events and overnight cues for the release of the latest Call of Duty or FIFA games mimic XLI PMRIW SJ TISTPI SYXWMHI XLIEXVIW SR XLI VIPIEWI SJ 7XEV ;EVW XLMVX] years ago and the clamour for these superstar franchises will only increase. And herein lies the problem. As more and more people turn XS ZMHIS KEQIW EW E PIKMXMQEXI QIHMYQ SJ GYPXYVEP MR¾YIRGI WS XSS must the developers and writers of these games accept their roles as MR¾YIRGIVW -X [MPP RS PSRKIV HS XS WMQTP] WLSZI E PEVKI KYR MR E KIRIVMG tough guy’s hand and send players on their merry way, it will no longer do to give the heroine DD breasts and assume that makes up for a lack of personality or backstory. If these are the characters that we and our future generations are to look up to and mimic, then they need to be good. They need to be true. They need to be real.

GAME OVER 49


THE THREE LAWS OF CYBER AND INFORMATION SECURITY (ERMIP +MHISR Dresner, PhD, MInstISP Neira Jones, MSc, FBCS1

Acknowledgements 1 Acknowledgement: the authors would like to thank Yolanda Woolf for her helpful and critical review of an early draft of this paper, and Mike St John-Green for his useful suggestions about the relative value of system assets.

It is more than 70 years since Asimov’s three laws of robotics were codified, becoming the basis for much classic science fiction. They have crossed the boundary from fiction to fact, and are still relevant today. In this paper, we present three laws of cyber and information security.


Our three laws create a universal baseline from which change and innovation GER LETTIR WEJIP] MR XLI WLEHS[ SJ ³8LI 8S]RFII 'SRžMGX´ 8LI] ETTP] XS XLI technological innovations which simultaneously bring a wealth of opportunities and a new set of risks.

MRNYV] MR XLI GEWI SJ E WIGYVMX] FVIEGL SJ QIHMGEP HIZMGI SV ER EMVTPERI GSRXVSP W]WXIQ SV MQTPMIH LEVQ JSV I\EQTPI ½RERGMEP PSWW XLVSYKL E GVIHMX GEVH HEXE breach or identity theft through the fabrication of credentials, or IP theft which would harm a corporation).

Security is a state. It is affected by the realisation of risks to that state. Management of risk in the context of information security and cyber security is attributed to the application of controls which may vary from anywhere between SV %YWXVEPME ERH GVMXMGEP GSRXVSPW 7%27 XS -73 -)' ERH QER] QSVI 2-78 ,-4%% 4'- (77 8LI WXERHEVHW that set out these controls do little to separate out clear risk management TVSGIWWIW ERH XLI JIIHFEGO XLI] VIUYMVI XS EHNYWX XLI WXEXI SJ WIGYVMX] [MXLMR acceptable boundaries that match risk appetite.

The system must preserve itself during the protection of, and delivery to human(s)

MX] MR XLVII PIZIPW SJ EFWXVEGXMSR ˆ ˆ ˆ

Our three universal, systemic laws enable risk managers to apply measured GSRXVSPW XS VIKYPEXI W]WXIQW [MXLMR HI½RIH EGGITXEFPI FSYRHEVMIW SJ GSQTPMERGI 3YV XLVII PE[W EVI WMQTPI IRSYKL XS OIIT FYWMRIWW SFNIGXMZIW MR TIVWTIGXMZI VEXLIV XLER WQSXLIVMRK XLIQ [MXL GSRXVSPW [LMGL QE] FI QMWXEOIR JSV SFNIGXMZIW The three laws recognize the importance of tracing the maturity of the environment in which a system is created, used, and ultimately decommissioned. ;I [MPP WLS[ LS[ XLI ½VWX PE[ HI½RIW XLI GETEFMPMXMIW JSV ÂłEWWIX TVSXIGXMSR´ XLI WIGSRH PE[ EW HI½RMRK XLI GETEFMPMXMIW JSV ÂłSTIVEXMSR´ ERH XLI XLMVH PE[ HI½RMRK XLI capabilities for ‘self-preservation’. 8LIWI GSVVIWTSRH XS XLI XLVII EXXVMFYXIW SJ WIGYVMX] GSR½HIRXMEPMX] MRXIKVMX] ERH availability.

7XSVMRK ERH TVSGIWWMRK MRJSVQEXMSR EWWIXW EFSYX XLI LYQER EWWIX EW TEVX SJ the delivery of a service (for example, credit card information). 1SHIPPMRK MRJSVQEXMSR EFSYX XLI EWWIX JSV LMWXSVMGEP VIGSVH SV HIGMWMSR support (for example, medical records). (MVIGXP] EJJIGXMRK XLI EWWIX JSV I\EQTPI EHNYWXMRK E TEGIQEOIV XVIEXMRK XLI water supply, getting the chocolate on confectionary to the correct thickness).

So making the simplest transposition of these assumptions between a secure systems model of managed risk by way of controls, and Asimov’s three laws, we GER WE] % W]WXIQ QE] RSX MRNYVI ER EWWIX SV XLVSYKL MREGXMSR SV RIKPMKIRGI EPPS[ ER asset to come to harm. % W]WXIQ QYWX SFI] XLI SVHIVW KMZIR XS MX F] MXW FYMPHIVW SV STIVEXSVW and by owners or custodians of the assets with which the system interacts, I\GITX [LIVI WYGL SVHIVW [SYPH GSRžMGX [MXL XLI *MVWX 0E[ 3. A system must protect its own existence as long as such protection does not GSRžMGX [MXL XLI *MVWX SV 7IGSRH 0E[W A system comprises information assets and the processes, people and technologies necessary to exploit those assets within an environment which is likely to affect the context of the system’s use or misuse. A system is itself an asset. ˆ %RH XLI ½VWX PE[ HIQERHW XLI TVMQEV] G]FIVRIXMG WII 8EFPI FIPS[ capabilities for ‘asset protection’. ˆ 8LI WIGSRH PE[ I\TIGXW XLI W]WXIQ XLEX QYWX FI WIGYVIH XS LEZI XLI capabilities for ‘operation’ (secondary cybernetics). ˆ 8LI XLMVH PE[ I\TIGXW XLEX E W]WXIQ´W XIVXMEV] G]FIVRIXMGW XS LEZI XLI capabilities for ‘self-preservation’.

- 8,) 43;)6 3* 8,6)) %WMQSZ´W VSFSX WXSVMIW ÂŻ ERXLSPSKM^IH TEVXMGYPEVP] MR Âł- 6SFSX´ ERH Âł8LI 6IWX SJ XLI 6SFSXW´ ÂŻ WIX SYX XLVII JYRHEQIRXEP KSZIVRMRK PE[W JSV VSFSXW [MXL VIWTIGX XS XLIMV LYQER GVIEXSVW YWIVW ERH FIRI½GMEVMIW % PEXIV ÂłJSYVXL´ SV Âł^IVSXL´ PE[ extrapolated the duty of robots to protect the human collective.) ;I QE] GSRWMHIV XLI SVMKMREP XLVII PE[W EW XLI FEWMW JSV VIKYPEXMRK EYXSQEXMSR ERH the input to the cybernetic response of the machinery. This is the context within which the ‘robot’ must control its actions to achieve an overall ‘prime directive’ no QEXXIV [LEX XEWOW QE] FI I\TIGXIH SJ MX 8LI PE[W EVI % VSFSX QE] RSX MRNYVI E LYQER FIMRK SV XLVSYKL MREGXMSR EPPS[ E LYQER being to come to harm. % VSFSX QYWX SFI] XLI SVHIVW KMZIR XS MX F] LYQER FIMRKW I\GITX [LIVI WYGL SVHIVW [SYPH GSRžMGX [MXL XLI *MVWX 0E[ 3. A robot must protect its own existence as long as such protection does not GSRžMGX [MXL XLI *MVWX SV 7IGSRH 0E[W

8LIWI GSVVIWTSRH XS XLI XLVII EXXVMFYXIW SJ WIGYVMX] GSR½HIRXMEPMX] MRXIKVMX] ERH availability. Primary cybernetics are the commands and feedback which validate the systems EGXMZMX] [LMGL VIUYMVI MX XS STIVEXI MR XLI FIWX MRXIVIWXW SJ XLI EWWIX WYFNIGXW SV the system’s thrall. 7IGSRHEV] G]FIVRIXMGW EVI E WXVMGXIV ½PXIV JSV XLI GSQQERHW XS HIXIVQMRI whether control remains with the system or other actors.

-- ()*-2-2+ ;36(7 8LI 7XERHEVHW 'SSVHMREXMSR +VSYT SJ XLI 8VYWXIH 7SJX[EVI -RMXMEXMZI LEW VIGSKRM^IH XLEX ÂłG]FIV WIGYVMX]´ MW [MXLSYX E KIRIVEPP] EGGITXIH HI½RMXMSR HMJJIVIRX WXERHEVHW QEOIVW YWI HMJJIVIRX HI½RMXMSRW -X MW SYV SFWIVZEXMSR XLEX G]FIV ERH information security are two different things. And this is why it is perhaps not surprising that those who appreciate the history are unhappy with the term ‘cyber’ being appended to all things touching on information technology in general and the Internet in particular. Medical records, credit card numbers, credentials, and such, RIIH XS FI TVSXIGXIH ;LIVI [I EVI MRXIVIWXIH MR XLI FILEZMSYV SJ XLI W]WXIQ and the necessary monitoring and protective or corrective feedback then it is cyber and it is permissible to borrow the term. So when the SCADA engineers XEPO EFSYX G]FIV WIGYVMX] XLI] VIEPP] QIER MX

;I ETTP] XLI XIVQ ³XIVXMEV] G]FIVRIXMGW´ XS GSZIV XLI GSQQERH ERH GSRXVSP SJ XLI system to make the necessary responses to continue to be.

%X XLI VYHMQIRXEV] PIZIP [I QE] EWWMKR XLI JSPPS[MRK HI½RMXMSRW a) A ‘robot’ is a system, either physical or virtual, that is built by a ‘human being’ and operated by a ‘human being’, either directly or indirectly (that is by a ÂłVSFSX´ ÂŻ MQQIHMEXIP] MRXVSHYGMRK WSQI TIVZIVWI VIGYVWMSR b) A ‘human being’ is an entity capable of building and operating a ‘robot’, either directly or indirectly (again, another ‘robot’ may be involved).

Primary cybernetics

The commands and feedback which validate the systems activity which require it to operate in the FIWX MRXIVIWXW SJ XLI EWWIX WYFNIGXW SV XLI W]WXIQ´W thrall. (Protect)

Secondary cybernetics

% ½PXIV JSV XLI GSQQERHW XS HIXIVQMRI [LIXLIV control remains with the system or other actors. (Operate)

Tertiary cybernetics

The command and control of the system to make the necessary responses to continue to be. (Self-preserve)

8EFPI ']FIVRIXMGW ³PE]IVW´ ERH ½REPP] XLEX c)

The three laws are evident as regulators, shaping and guiding activity along a path [MXL XLI FIPMIJ XLEX XLI HIWMVIH KSEP ÂŻ XLI FYWMRIWW SFNIGXMZIW ÂŻ [MPP FI EGLMIZIH

A ‘human being’ is an asset, which itself will own or be custodian of other assets, such as information.

--- 8)78-2+ 8-1)7 As a practical example, we view ‘the information technology components of the W]WXIQ [I QE] ETTP] XLI XLVII PE[W XS XLVII HMZIVWI QERMJIWXEXMSRW ER SR PMRI ‘shop’, a customer database, and malicious software (malware). The three laws govern how feedback from a dynamic approach to risk management is applied to VIKYPEXI XLI GSR½HIRXMEPMX] MRXIKVMX] ERH EZEMPEFMPMX] SJ XLI MRJSVQEXMSR EWWIXW ;I will then discuss how the capabilities of respective systems interact with these attributes.

An interesting level of risk modeling is apparent here. Are the controls of the W]WXIQ VIUYMVIH XS TVSXIGX XLI MRJSVQEXMSR EW ER EWWIX MR MXWIPJ ¯ XLEX MW XLI QIXE TIVWSR GSQTVMWMRK WE] QIHMGEP LMWXSV] ½RERGMEP HEXE ERH GVIHIRXMEPW ¯ SV XS TVSXIGX XLI žIWL ERH FPSSH WYFNIGX SJ XLI MRJSVQEXMSR# 8EOMRK XLMW MRXS GSRWMHIVEXMSR [I LEZI IWXEFPMWLIH XLI YRMZIVWEP IXLMG XLEX Assets must be protected according to their value and sensitivity with respect to the human collective.

(I½RMRK SYV ÂłW]WXIQ´ JSV WGVYXMR] EW XLI ÂłSRPMRI WLST´ [LMGL MRXIVEGXW [MXL ÂłGYWXSQIV MRJSVQEXMSR´ EW ER ÂłEWWIX´ [I VIUYMVI XLI W]WXIQ XS I\LMFMX XLI JSPPS[MRK ‘asset protection’, ‘operational’, and self-preservation’ capabilities.

,EVQ XS EWWIXW F] XLMW HI½RMXMSR IUYEXIW XS TVSTSVXMSREP LEVQ XS E LYQER being or collective of human beings (which may be, for example, a nation state, a community, or a business), either actual harm (for example resulting in physical


As another example, let us consider the three laws at component level and consider the ‘customer database’ as a component of the online shop (amongst the complexity of applications, host networks, the network, the APIs, the maintenance console, the testing environment, the security suite, and so on) and the ‘customer MRJSVQEXMSR´ [MXLMR MX EW XLI ³EWWIX´ ;I GER WE] XLEX WEJIX] VIPMIW SR XLI ³GYWXSQIV database’ displaying the quality characteristics that would have it comply with the three laws.

(EXE GPEWWM½GEXMSR MW RSX MR YWI SV MW MRWYJ½GMIRXP] GSVVIPEXIH [MXL XLI MQTEGX of the risks to associate regulating controls. %GGITXEFPI YWEKI TSPMGMIW EVI RSX MR TPEGI ERH FEPERGIH [MXL XIGLRMGEP countermeasures.

'%4%&-0-8= 4638)'8-2+ %2 %77)8 %+%-278 92%98,36-7)( (-7'03796) The risk of system behaviour that will cause breaking of the First Law is increased [LIR % W]WXIQ HSIW RSX EPPS[ JSV QSRMXSVMRK SJ EWWIX YWEKI % W]WXIQ HSIW RSX EPIVX S[RIVW SV GYWXSHMERW SJ YREYXLSVMWIH EWWIX YWEKI % W]WXIQ HSIWR´X TVIZIRX SV HSIW RSX ORS[ EFSYX YREYXLSVMWIH HEXE leakage. 0EGO SJ EWWIX GPEWWM½GEXMSR XLYW TVIZIRXMRK EGGITXEFPI YWI HI½RMXMSR SV adequate protection. % W]WXIQ HSIWR´X VIRHIV EWWIXW YRYWEFPI EJXIV MPPIKEP YREYXLSVMWIH EGGIWW

IRGV]TXMSR XSOIRMWEXMSR EKKVIKEXMSR ERSR]QMWEXMSR IXG

If ‘malware’ becomes the ‘system’ it is untenable, breaking all three laws. -: 0%;7 %2( 78%898)7 'VSWF]´W 5YEPMX] 1EREKIQIRX +VMH WLS[W XLI GSWX SJ UYEPMX] FEWIH SR VIQSZMRK defects. The sooner the defects are removed in the life cycle, the smaller the cost of removal, and the likely emergence of increased quality maturity in the SVKERMWEXMSR VIUYMVIH XS EGLMIZI XLMW 7IGYVMX] MW E TVMQEV] W]WXIQ WSJX[EVI UYEPMX] characteristic so information and cyber security vulnerabilities, and breaches are manifestations of quality defects or the exploitation of these defects. If we set the three laws as the minimum test criteria or standard for security, we must identify the attributes that a system needs to display to demonstrate its capability maturity to reduce the risk of security breaches and recover rapidly when they occur with respect to those laws.

'%4%&-0-8= 4638)'8-2+ %2 %77)8 *631 &)-2+ 92%:%-0%&0) 83 %98,36-7)( %2( 0)+%0 97%+) The risk of system behaviour that will cause breaking of the First Law is increased [LIR % W]WXIQ MW YREFPI XS TVSXIGX EWWIXW EKEMRWX E HIRMEP SJ WIVZMGI (37 EXXEGO % W]WXIQ MW YREFPI XS TVSXIGX MXWIPJ JVSQ YREYXLSVMWIH IRGV]TXMSR SJ MXW information assets lending its user vulnerable to ransom for the decryption key(s).

So, from the three laws we may extract actions required to protect assets (the ½VWX PE[ STIVEXI MR E QERRIV XLEX EWWYVIW XLI MRXIKVMX] SJ XLI W]WXIQ XLI WIGSRH PE[ ERH EPPS[ XLI W]WXIQ XS VIKYPEXI MXW VIWMPMIRGI WIPJ TVIWIVZEXMSR ¯ XLI XLMVH law) at a very early stage, thus reducing cost. From this we may say that, the level of security maturity is shown by a systems capability to protect, operate, and self-preserve.

:- 34)6%8) '%4%&-0-8-)7 83 7%8-7*= 8,) 7)'32( 0%; For the second law, a system must be capable of the following operational GETEFMPMXMIW XEOIR MR XLI GSRXI\X SJ XLI SR PMRI WLST 8EOMRK SVHIVW JVSQ MXW FYMPHIVW ERH STIVEXSVW [LS [MPP MRGPYHI WSJX[EVI developers, operators, maintenance staff and their physical or virtual agents). 8EOMRK SVHIVW JVSQ XLI S[RIV W SJ XLI GYWXSQIV MRJSVQEXMSR [MXL [LMGL MX interacts (that is, people, or the consumers). 8EOMRK SVHIVW JVSQ MXW S[RIV SV GYWXSHMER XLEX MW XLI VIXEMPIV ERH MXW EKIRXW physical or virtual). 8EOMRK SVHIVW JVSQ XLI GYWXSHMER SJ XLI GYWXSQIV MRJSVQEXMSR XLEX MW XLI retailer and its agents, physical or virtual). 6IJYWMRK SVHIVW JVSQ YREYXLSVMWIH SV YRVIGSKRMWIH TEVXMIW

It is accepted practice that risks are dampened to a point of manageability or acceptability by implementing controls. However, the authors are unaware of VIWIEVGL XLEX GSR½VQW XLI GEYWEP PMRO FIX[IIR IJJIGXMZI WIGYVMX] ERH MRGMHIRX management (SIEM) and the implementation of controls. ;I WLEPP RS[ TVSGIIH XS QSHIP XLI GETEFMPMXMIW XLEX E W]WXIQ VIUYMVIW XS GSQTP] with the three laws of cyber and information security. : 4638)'8 '%4%&-0-8-)7 83 7%8-7*= 8,) *-678 0%; *SV XLI ½VWX PE[ E W]WXIQ QYWX FI GETEFPI SJ EWWIX TVSXIGXMSR GETEFMPMXMIW [LMGL MRGPYHI 4VSXIGXMRK ER EWWIX EKEMRWX MPPIKEP YWEKI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX EKEMRWX YREYXLSVMWIH YWEKI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX EKEMRWX YREYXLSVMWIH GLERKI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX EKEMRWX YREYXLSVMWIH HMWGPSWYVI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX JVSQ FIMRK YREZEMPEFPI XS EYXLSVMWIH ERH PIKEP YWEKI SJ MXW information assets

Let us consider the operational capabilities of the online shop according to the governance expected by the second law. '%4%&-0-8= 8%/-2+ 36()67 *631 -87 &9-0()67 %2( 34)6%8367 The risk of system behaviour that will cause breaking of the Second Law is MRGVIEWIH [LIR 8LI W]WXIQ HSIWR´X EPPS[ STIVEXSVW XS ETTP] TEXGLIW SR XMQI HYI XS operational release constraints. 8LI W]WXIQ MW STIVEXIH MR ER IRZMVSRQIRX [LIVI GSRXVEGXYEP SV WSGMEP constraints allow operators to bypass agreed controls either technical or procedural. 8LI STIVEXSVW HS RSX VIGIMZI RSXM½GEXMSR SJ GSR½KYVEXMSR QEREKIQIRX changes which impact the service they are expected to receive or deliver.

Let us consider the asset protection capabilities of the online shop according to XLI KSZIVRERGI I\TIGXIH F] XLI ½VWX PE[ '%4%&-0-8= 4638)'8-2+ %2 %77)8 %+%-278 -00)+%0 97%+) The risk of system behaviour that will cause breaking of the First Law is increased [LIR 7SJX[EVI HIZIPSTIVW [VMXI GSHI XLEX MW MRXVMRWMGEPP] MRWIGYVI EW E VIWYPX SJ containing security defects. 7SJX[EVI XIWXMRK MW RSX GEVVMIH SYX [MXLSYX XLI RIGIWWEV] WIKVIKEXMSR SV other precautions causing harm to an operational system. 2I[ VIPIEWIW SJ WSJX[EVI EVI EPPS[IH XS MRXVSHYGI RI[ ZYPRIVEFMPMXMIW XS XLI GSR½KYVEXMSR 'SVVIGXMZI WSJX[EVI TEXGLIW EVI RSX ETTPMIH SR XMQI XLVSYKL RIKPMKIRGI % W]WXIQ MW MQTPIQIRXIH [MXLSYX EHIUYEXI JVEYH TVSXIGXMSR capabilities. % W]WXIQ HSIWR´X EYXLIRXMGEXI MRXIVREP SV I\XIVREP YWIVW SV YWIW [IEO authentication, or authentication that can be bypassed, and so on).

'%4%&-0-8= 8%/-2+ 36()67 *631 8,) 3;2)6 7 3* 8,) '97831)6 -2*361%8-32 ;-8, ;,-', -8 -28)6%'87 The risk of system behaviour that will cause breaking of the Second Law is MRGVIEWIH [LIR 8LI W]WXIQ HSIW RSX EPPS[ GSRWYQIVW XS HIPIXI XLIMV MRJSVQEXMSR 8LI W]WXIQ HSIW RSX EPPS[ GSRWYQIVW XS KMZI XLIMV GSRWIRX JSV WXSVEKI SV reuse of their information. 8LI W]WXIQ HSIW RSX EPPS[ GSRWYQIVW XS STX SYX SJ HMWGPSWMRK GIVXEMR personal information. 8LI W]WXIQ HSIW RSX EPPS[ GSRWYQIVW XS WII [LEX MRJSVQEXMSR MW LIPH EFSYX them.

'%4%&-0-8= 4638)'8-2+ %2 %77)8 %+%-278 92%98,36-7)( 97%+) The risk of system behaviour that will cause breaking of the First Law is increased [LIR % W]WXIQ EPPS[W YRWIGYVI VIQSXI EGGIWW % W]WXIQ EPPS[W TVMZMPIKI EGGIWW GVIHIRXMEPW XS FI WLEVIH % W]WXIQ MW YREFPI XS TVSXIGX EWWIXW EKEMRWX QEP[EVI WYGL EW ZMVYWIW 8VSNERW and worms. '%4%&-0-8= 4638)'8-2+ %2 %77)8 %+%-278 92%98,36-7)( ',%2+) The risk of system behaviour that will cause breaking of the First Law is increased [LIR % W]WXIQ HSIW RSX EPPS[ JSV GSR½VQEXMSR SJ GLERKI F] EWWIX S[RIVW *MPI MRXIKVMX] QSRMXSVMRK SV WMQMPEVP] MRXIRHIH XIGLRSPSK] MW RSX HITPS]IH SV not actively used. %YXLIRXMGEXMSR ERH MHIRXM½GEXMSR TVSGIHYVIW EVI RSX WYJ½GMIRX JSV GLERKIW XS assets.

'%4%&-0-8= 8%/-2+ 36()67 *631 -87 3;2)6 36 '9783(-%2 The risk of system behaviour that will cause breaking of the Second Law is MRGVIEWIH [LIR 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS GVIEXI WXVSRK TEWW[SVHW SV SXLIV MHIRXM½GEXMSR EYXLIRXMGEXMSR QIGLERMWQW 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS GLERKI XLI EHQMRMWXVEXSV´W TEWW[SVH SV SXLIV MHIRXM½GEXMSR EYXLIRXMGEXMSR QIGLERMWQW 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS GLERKI XLI HIJEYPX TEWW[SVHW SV SXLIV MHIRXM½GEXMSR EYXLIRXMGEXMSR QIGLERMWQW 8LI W]WXIQ HSIW RSX EPPS[ VIXEMPIV XS VSXEXI TEWW[SVHW SV SXLIV WMQMPEVP] MRXIRHIH MHIRXM½GEXMSR EYXLIRXMGEXMSR QIGLERMWQW 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS VIUYIWX IRGV]TXMSR SJ MRJSVQEXMSR 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS GLERKI TEVEQIXIVW


'%4%&-0-8= 8%/-2+ 36()67 *631 8,) '9783(-%2 3* 8,) '97831)6 INFORMATION The risk of system behaviour that will cause breaking of the Second Law is MRGVIEWIH [LIR 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS HIPIXI GYWXSQIV MRJSVQEXMSR 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS VIUYIWX GYWXSQIV GSRWIRX JSV storage, reuse, deletion or other processing of their information. 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS KMZI GYWXSQIVW STX SYX SJ disclosing certain personal information. 8LI W]WXIQ HSIW RSX EPPS[ XLI VIXEMPIV XS KMZI GSRWYQIVW XLI MRJSVQEXMSR held about them.

'%4%&-0-8= ,%:-2+ 8,) '%4%&-0-8= 83 *%-0 7)'96)0= The risk of system behaviour that will cause breaking of the Third Law is increased [LIR 8LI W]WXIQ MW YREFPI [LIR MX JEMPW XS JEMP MR E [E] XLEX [MPP GEYWI RS LEVQ SV at least minimum harm to other devices, assets or systems or danger to humans, without causing the system to be insecure. 8LI W]WXIQ HSIW RSX MQTPIQIRX WIGYVI HIJEYPXW HIJEYPX MW XS HIR] EGGIWW 3R JEMPYVI XLI W]WXIQW HSIWR´X YRHS GLERKIW ERH VIWXSVI XS E WIGYVI WXEXI 3R JEMPYVI XLI W]WXIQ HSIWR´X GLIGO VIXYVR ZEPYIW JSV JEMPYVI 'SRHMXMSREP GSHI ½PXIVW HS RSX EPPS[ JSV E HIJEYPX GEWI XLEX HSIW XLI VMKLX thing. 8LI W]WXIQ HSIWR´X TVIWIVZI GSR½HIRXMEPMX] ERH MRXIKVMX] [LIR EZEMPEFMPMX] LEW been lost. 8LI W]WXIQ EPPS[W EXXEGOIVW XS KEMR EGGIWW VMKLXW XS TVMZMPIKIH SFNIGXW HYVMRK a failure. 8LI W]WXIQ VIZIEPW WIRWMXMZI MRJSVQEXMSR EFSYX XLI JEMPYVI XS TSXIRXMEP attackers and supplies them with additional knowledge for creating an attack.

'%4%&-0-8= 6)*97-2+ 36()67 *631 92%98,36-7)( 36 926)'3+2-7)( 4%68-)7 The risk of system behaviour that will cause breaking of the Second Law is MRGVIEWIH [LIR 8LI W]WXIQ HSIW RSX VIGSKRMWI YREYXLSVMWIH YWIVW 8LI W]WXIQ HSIW RSX EYXLIRXMGEXI YWIVW 8LI W]WXIQ EPPS[W YREYXLSVMWIH TVMZMPIKI IWGEPEXMSR 8LI W]WXIQ HSIW RSX VIGSKRMWI YRYWYEP FILEZMSYV XLEX GSYPH PIEH XS fraudulent activity.

'%4%&-0-8= (-7%&0-2+ -87)0* ;,)2 -87 %77)8 4638)'8-32 36 34)6%8-32%0 '%4%&-0-8-)7 %6) '314631-7)( 36 ;,)6) 8,6)%87 0)%( 83 % ,-+, 6-7/ 3* '314631-7) The risk of system behaviour that will cause breaking of the Third Law is increased [LIR 8LI W]WXIQ HSIWR´X HMWEFPI MXWIPJ MR XLI IZIRX SJ W]WXIQMG JEMPYVI 8LI W]WXIQ HSIW RSX TVIZIRX LEVQ XS MXW EWWIXW JSV I\EQTPI E GYWXSQIV database) in the event of unauthorised access. 8LI W]WXIQ HSIW RSX TVSXIGX MXW IRGV]TXMSR OI]W 8LI W]WXIQ HSIW RSX VIEGX XS MRJSVQEXMSR XLEX WLS[W E RIIH XS VEMWI MXW PIZIP of assurance.

:-- 7)0* 46)7)6:%8-32 '%4%&-0-8-)7 83 7%8-7*= 8,) 8,-6( 0%; So for the third law, a system must be capable of the following self-preservation GETEFMPMXMIW 4VSXIGXMRK MXWIPJ EKEMRWX MPPIKEP YWEKI SJ MXW VIWSYVGIW 4VSXIGXMRK MXWIPJ EKEMRWX YREYXLSVMWIH QSHM½GEXMSR 4VSXIGXMRK MXWIPJ JVSQ FIMRK YREZEMPEFPI XS EYXLSVMWIH ERH PIKEP YWEKI ,EZMRK XLI GETEFMPMX] XS JEMP WIGYVIP] (MWEFPMRK MXWIPJ [LIR MXW EWWIX TVSXIGXMSR SV STIVEXMSREP GETEFMPMXMIW EVI compromised or where threats lead to a high risk of compromise.

:--- 83 )66 -7 ,91%2 Considering the ‘system as technology’ can be too narrow to effect control with due regard for the human factors which themselves become part of the system. ;I QE] GSRWMHIV XLIWI JEGXSVW JVSQ X[S EWTIGXW XLI GVIEXSVW SV FYMPHIVW SJ the system who establish operational principles of the system which allow it to do their will by proxy, and the users of the system who may each have their S[R [IPXERWGLEYYRK [LMGL QE] FI MQQSZEFPI SV MR ¾Y\ 8LIVI QE] FI EHHIH complexity with likely divisions of responsibility and accountability between the system owners, the information owners, and the users of the system. Due regard is needed to protect the people or things that the information represents and the information assets themselves (which may be labeled meta-people, or meta-things). If we consequently build in the concern for the positivistic course and allow for PIZIVW SJ G]FIVRIXMG EHNYWXQIRX [I I\XIRH XLI JSYRHEXMSR WIX SJ PE[W XS FIGSQI 1. An information system may not store, process or transmit an information EWWIX MR WYGL E [E] XLEX [MPP EPPS[ LEVQ XS GSQI XS XLEX EWWIX XLI WYFNIGXW of the information asset, or the thrall of that system, or through inaction or negligence, allow any of them to come to harm. %R MRJSVQEXMSR W]WXIQ QYWX SRP] WXSVI TVSGIWW SV XVERWQMX ER MRJSVQEXMSR asset as instructed by its builders or operators and by owners or custodians of the information asset with which the information system interacts, except [LIVI WYGL SVHIVW [SYPH GSR¾MGX [MXL XLI *MVWX 0E[ 3. An information system must protect its own existence as long as such TVSXIGXMSR HSIW RSX GSR¾MGX [MXL XLI *MVWX SV 7IGSRH 0E[W

%KEMR [I [MPP HVE[ E TEVEPPIP [MXL WGMIRGI ½GXMSR VIGEPPMRK 8IVQMREXSV .YHKIQIRX (E] -R XLI ½REP WGIRI XLI 8IVQMREXSV VSFSX WEGVM½GIW MXWIPJ EWOMRK XLI LIVSMRI XS lower it into a cauldron of molten steel so that its technology cannot be used to create the dystopian future of Skynet. Entertaining temporal paradox perhaps but certainly a model application of the third law of cyber security. Meanwhile, reality reminds us that organisations continue to lose portable devices with sensitive information and without the protection afforded by encryption or a facility to remotely delete the data. This leads at best to embarrassment, and at worst, identity theft, intellectual property leakage, or other more serious damage. So with this in mind, let us consider the self-preservation capabilities of the online shop according to the governance expected by the third law. '%4%&-0-8= 4638)'8-2+ -87)0* %+%-278 -00)+%0 97%+) 3* -87 6)7396')7 The risk of system behaviour that will cause breaking of the Third Law is increased [LIR 8LI W]WXIQ MW RSX QSRMXSVIH ERH LEW EPPS[IH GVMQMREPW XS LSWX MPPIKEP EGXMZMX] on its servers. 8LI W]WXIQ EPPS[W GVMQMREPW XS VIHMVIGX EGXMZMX] XS MPPIKEP WMXIW '%4%&-0-8= 4638)'8-2+ -87)0* %+%-278 92%98,36-7)( 13(-*-'%8-32 The risk of system behaviour that will cause breaking of the Third Law is increased [LIR 8LI W]WXIQ HSIW RSX TVIZIRX QER MR XLI QMHHPI EXXEGOW 8LI W]WXIQ HSIW RSX TVIZIRX HIJEGIQIRX 8LI W]WXIQ HSIW RSX TVIZIRX LMNEGOMRK

-< 86%274%6)2'= '328630 %2( 3:)67-+,8 1-2( 8,) +%4 8S VIGSRGMPI XLI XLVII PE[W [MXL ER EPVIEH] WXERHEVHMWIH QSHIP SJ KSZIVRERGI ¯ and promote the environment in which the laws may be applied with consistency XS E W]WXIQ ¯ [I LEZI GSRWMHIVIH XLI JSPPS[MRK GLEPPIRKI ;LIR GSRWMHIVMRK XLI complexity of understanding and managing requirements that can be met through actors in the system and the transformations expected from the system, to the WEXMWJEGXMSR SJ MXW GYWXSQIVW ERH XLI W]WXIQ´W S[RIV XLIVI I\MWXW XLI VMWO WMG SJ XLI VIKYPEXMRK GSRXVSPW FIGSQMRK XLI SFNIGXMZIW SZIVVMHMRK XLI SFNIGXMZIW SJ XLI W]WXIQ MXWIPJ 8LMW FIGSQIW QERMJIWX MR XLI GSQTPI\MX] SJ QEREKMRK WYJ½GMIRX ZEVMIX] MR XLI QSHIP XS IRWYVI XLI VIGSRGMPMEXMSR SJ GSR¾MGXMRK ZMI[W SJ VMWO XS assets held by the owner and customers and actors in the system (including users). The owner, the actors, and the customers of the system may be any part of a supply chain.

'%4%&-0-8= 4638)'8-2+ -87)0* *631 &)-2+ 92%:%-0%&0) 83 %98,36-7)( %2( 0)+%0 97%+) The risk of system behaviour that will cause breaking of the Third Law is increased [LIR % W]WXIQ MW YREFPI XS TVSXIGX MXWIPJ EKEMRWX E HIRMEP SJ WIVZMGI (37 EXXEGO % W]WXIQ MW YREFPI XS TVSXIGX MXWIPJ JVSQ YREYXLSVMWIH IRGV]TXMSR SJ MXW information assets lending its user vulnerable to ransom for the decryption key(s).

Drawing on the model for the corporate governance of IT, Table 3 shows the ‘propose-direct-monitor’ life cycle of IT governance and translates it into three EGXMSRW VIUYMVIH XS EWWYVI XLI GSRXMRYIH GSQTPMERGI [MXL SYV XLVII PE[W transparency (of goals), control (to manage business process) and oversight (to FIRGLQEVO VIWYPXW EKEMRWX XLI SVMKMREP SFNIGXMZIW

A challenge to regulation of the system occurs when a ‘destructive asset’ is created as part of the whole system and the system therefore must therefore protect itself against such an asset . The metaphorical scorpion must be stopped from stinging itself. If a previously undervalued asset topples the infrastructure by MXW PSWW EGXMSR GSVVYTXMSR MX MW XLI ZEPYEXMSR XLEX WLSYPH FI HIIQIH [VSRK RSX XLI valuation system. It may be a ‘black swan’ event or a failure to engage with the level of expertise necessary to model the real-world asset in the system. (Programmers do this when they presuppose of what users want.)

8LMW MW E XSSP XS ERGLSV XLI W]WXIQ XS MXW SFNIGXMZIW ERH TVIZIRX XLI GSRXVSPW FIGSQMRK XLI SFNIGXMZIW SJ XLI W]WXIQ 3YV EREP]WMW MR 8EFPI WYKKIWXW XLEX current practice may take protection and operation its stride but that there is an inherent weakness in systemic application of the third law of self-preservation. 6IXYVRMRK XS XLI GSRWMHIVEXMSR SJ WXERHEVH QSHIPW [I ½RH XLEX XLI EXXVMFYXI SJ survivability is not included therein.


People aspects of WIGYVMX] ¯ LYQER factor

+SZIVRMRK processes

Technological controls Access is controlled by physical and logical means. Non-functional requirements must be articulated however obscure their level of abstraction.

First law ¯ TVSXIGX %XXVMFYXI security

Access control and the use of systems are managed within a culture of responsibilities.

Security policy is VIEPMWIH ¯ MX MW RSX NYWX E HSGYQIRXIH aspiration. The boundaries of acceptable use are at best well HI½RIH ERH EX worst easily divined.

Second law ¯ STIVEXI %XXVMFYXI quality of service

Fair and comfortable working conditions are provided to meet achievable goals.

The interfaces between roles EVI HI½RIH ERH understood to encourage the transition of tasks from one responsibility to another.

Between protection and self-preservation, technology supports the safe working environment

Protective (and active) monitoring and forensic readiness. Enabled by technology. %PWS XLMRO incident response and business continuity planning.

A compromised system has failed. Think ‘availability’. So that an example of a technological control would be protocols that fend off distributed denial of service (DDOS) attacks on the system. This brings us full GMVGPI XS XLI ½VWX PE[ ¯ TVSXIGXMSR

8LMVH PE[ ¯ self-preserve %XXVMFYXI survivability

Allow for the safe evacuation or invacuation to take place where humanity is valued over technology,

< '32'097-32 8,) 83=2&)) '32*0-'8 The proliferation of control measures create a danger where they become divorced from the risks that they were created to mitigate (like destroying computer mice and keyboards out of fear of virus infection). In the three laws, we have created a common goal for the implementation of standards, reducing the latter to important checklists. The application of standards to mitigate risk is implied in Stafford Beer’s work on cybernetics and arguably from the negative reaction to standards in Toynbee’s historical commentaries. Toynbee contends that standards become a risk in themselves because a society that applies them will stagnate and lose innovation. ,S[IZIV XLMW GSR¾MGXW [MXL 8S]RFII´W ZMI[ XLEX XS EGLMIZI E TSWMXMZI JYXYVI E society must keep the scenario its wants to achieve in view and work unerringly towards that vision. Toynbee may not have appreciated that standards hold the lessons learnt about what may prevent the realisation of that future as well as providing key actions to shape it. The knowledge in standards may be applied XS EZSMH QMWXEOIW ¯ XS FI TSWMXMZIP] VMWO EZIVWI MR ORS[R EVIEW ¯ EPPS[MRK JSV innovation to springboard from those known areas into areas of emerging risk. Toynbee may be echoing the concerns of cybernetics that regards centralised control as a (negative) risk to innovation. This could indeed see ‘stagnation’ if it were not for the observation that standards developed with a consensus or central dictat tend to have localised implementation. This facilitates the management of known risks yet allows for Ashby’s requisite variety by removing XLI G]FIVRIXMG ¾E[ SJ GIRXVEPMWEXMSR Our postulation that standards mitigate negative risk, and their implementation as a realisation of the positive risk of success, builds on cybernetics. Beer suggests that Ashby’s variety is a measure of complexity and highlights the risk of modeling as a ‘variety attenuator’. However, the model of actions to be taken, or measurements to be achieved that are encapsulated in standards are strong VYPIW [LMGL EVI WIX XS EZSMH XLI HIKVEHEXMSR SJ XLI EGXMZMXMIW XLEX E TVSNIGX SV STIVEXMSREP TPER ¯ EW XLI QSHIP SJ E WIX SJ EGXMZMXMIW XS EGLMIZI E HI½RIH SV MQTPMIH KSEP WYGL EW E W]WXIQ XLEX SFI]W XLI XLVII PE[W ¯ QE] WYJJIV 8LI YXMPMX] SJ XLI XLVII PE[W PMIW MR MR XLIMV EFMPMX] XS QEMRXEMR E GPIEV SFNIGXMZI FEWIH ZMI[ MR XLI JEGI SJ QYPXMTPI ERH GSR¾MGXMRK WXEOILSPHIV ZMI[W QYPXMTPI threats, and multiple controls whose complexity challenge the system according to %WLF]´W PE[ SJ VIUYMWMXI ZEVMIX] 9WMRK XLI XLVII PE[W EW XLI ZERKYEVH JSV EPP EGXMSRW is a temper for attitude and maintaining the balance between risk appetite and risk attitude. They are a steer for doing the right thing over doing things right. As we move from information to cyber security, we empathise with Asimov’s HI½RMXMSR JSV E ^IVSXL PE[ ;LIVIEW %WMQSZ´W PE[W IZSPZIH JVSQ E LYQER XS humanity, so we evolve the application of our three laws from systems to the Internet of things. It is the transformation from information to cyber that creates personal responsibility in the gestalt. I protect my PC to prevent it becoming a platform to attack your bank account, pacemaker, or power station. If John Donne were writing today, he may have mused, ‘Each man’s hack diminishes me, for I am part of the network. So ask not for whom it is a vulnerability...’. So many standards to choose from, but three laws to ring them all and bind them to a purpose.

8EFPI 8LI KSZIVRERGI QEXVM\ I\TIGXIH F] XLI XLVII PE[W

<- 7911%6= 8,) (6)72)6 .32)7 8,6)) 0%;7 3*'=&)6 %2( -2*361%8-32 7)'96-8=

THE CAPABILITIES

% VSFSX QE] RSX MRNYVI E human being or, through inaction, allow a human being to come to harm.

An information system may not store, process or transmit an information asset in such a way that will allow harm to come to XLEX EWWIX XLI WYFNIGXW SJ XLI information asset, or the thrall of that system, or through inaction or negligence, allow any of them to come to harm.

4VSXIGXMRK ER EWWIX EKEMRWX MPPIKEP YWEKI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX EKEMRWX YREYXLSVMWIH YWEKI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX EKEMRWX YREYXLSVMWIH GLERKI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX EKEMRWX YREYXLSVMWIH HMWGPSWYVI SJ MXW MRJSVQEXMSR EWWIXW 4VSXIGXMRK ER EWWIX JVSQ FIMRK YREZEMPEFPI XS EYXLSVMWIH ERH PIKEP YWEKI SJ its information assets

A robot must obey the orders given to it by human beings, except where such SVHIVW [SYPH GSR¾MGX [MXL the First Law.

An information system must only store, process or transmit an information asset as instructed by its builders or operators and by owners or custodians of the information asset with which the information system interacts, except where such orders would GSR¾MGX [MXL XLI *MVWX 0E[

8EOMRK SVHIVW JVSQ MXW FYMPHIVW ERH STIVEXSVW [LS [MPP MRGPYHI WSJX[EVI developers, operators, maintenance staff and their physical or virtual agents). 8EOMRK SVHIVW JVSQ XLI S[RIV W SJ XLI GYWXSQIV MRJSVQEXMSR [MXL [LMGL MX interacts (that is, people, or the consumers). 8EOMRK SVHIVW JVSQ MXW S[RIV SV GYWXSHMER XLEX MW XLI VIXEMPIV ERH MXW EKIRXW physical or virtual). 8EOMRK SVHIVW JVSQ XLI GYWXSHMER SJ XLI GYWXSQIV MRJSVQEXMSR XLEX MW XLI retailer and its agents, physical or virtual). 6IJYWMRK SVHIVW JVSQ YREYXLSVMWIH SV YRVIGSKRMWIH TEVXMIW

A robot must protect its own existence as long as such protection does not GSR¾MGX [MXL XLI *MVWX SV Second Laws.

An information system must protect its own existence as long as such protection does not GSR¾MGX [MXL XLI *MVWX SV 7IGSRH Laws.

4VSXIGXMRK MXWIPJ EKEMRWX MPPIKEP YWEKI SJ MXW VIWSYVGIW 4VSXIGXMRK MXWIPJ EKEMRWX YREYXLSVMWIH QSHM½GEXMSR 4VSXIGXMRK MXWIPJ JVSQ FIMRK YREZEMPEFPI XS EYXLSVMWIH ERH PIKEP YWEKI ,EZMRK XLI GETEFMPMX] XS JEMP WIGYVIP] (MWEFPMRK MXWIPJ [LIR MXW EWWIX TVSXIGXMSR SV STIVEXMSREP GETEFMPMXMIW EVI compromised or where threats lead to a high risk of compromise.

8,) %7-13: 8,6)) 0%;7 OF ROBOTICS

PROJECT

OPERATE

SELF PRESERVE

8EFPI 4VSXIGX STIVEXI ERH WIPJ TVIWIVZI XLVII PE[W JSV VSFSXW G]FIV ERH MRJSVQEXMSR WIGYVMX]


OUR FRIENDS ELECTRIC?

Prof. Noel Sharkey, 9RMZIVWMX] SJ 7LIJ½ IPH (Interview by Andrew Cook)

PART OF SCI FI: DAYS OF FEAR AND WONDER AT THE BRITISH FILM INSTITUTE To coincide with 3YV *VMIRHW )PIGXVMG# 6SFSXW MR 'MRIQE ERH 6SFSX (IWMKR Today TEVX SJ XLI ±(E]W SJ *IEV ERH ;SRHIV²WIEWSR XLI &VMXMWL *MPQ Institute’s spectacular celebration of all things Science Fiction, CyberTalk was delighted to be granted an interview with one of the discussion TERIP QIQFIVW ERH WIPJ GSRJIWWIH 7GM *M IRXLYWMEWX 4VSJ 2SIP 7LEVOI] ¯ )QIVMXYW 4VSJIWWSV SJ 6SFSXMGW ERH SJ 4YFPMG )RKEKIQIRX EX XLI 7LIJ½ IPH 'IRXVI *SV 6SFSXMGW 9RMZIVWMX] SJ 7LIJ½ IPH ;I WTSOI XS LMQ EFSYX XLI MQTSVXERGI SJ 7GMIRGI *MGXMSR MR LMW ½ IPH LMW MR¾ YIRGIW ERH LMW [SVO [MXL XLI -RXIVREXMSREP 'SQQMXXII JSV 6SFSX %VQW 'SRXVSP©


CT: You’re one of the co-founders of ICRAC [International Committee for Robot Arms Control], do you think the development of that type of autonomous weaponry, and the ideas behind them, can be traced back to Science Fiction? 'IVXEMRP] - XLMRO XLEX [LIR ]SY KS FEGO XS 6SFF] LI´W MRGVIHMFPI ;LIR ]SY ½VWX QIIX LMQ MR XLI QSZMI 8LI *SVFMHHIR 4PERIX LI I\TPEMRW XLEX he speaks 96 languages and has these amazing abilities that far exceed ER] LYQER ÂŻ ETEVX JVSQ FIMRK EFPI XS [EPO TVSTIVP] 7S JVSQ XLIVI SR you get the idea of these super-intelligent robots that can do all manner of fantastic things going through to the Terminator and the androids in &PEHI 6YRRIV - [SYPH WE] XLEX [LIR - PSSOIH EX XLI 97 1MPMXEV] TPERW ERH VSEHQETW [LEX WXVYGO QI EX SRGI [EW Âą8LIWI KY]W EVI GVE^] ² 8LI] WIIQ XS FI WXYGO MR WGMIRGI ½GXMSR ERH XEPOMRK EFSYX ½GXMSREP VSFSXW Some representatives from DARPA and the Pentagon then came to visit me in my robot lab to discuss getting funding from them, which of GSYVWI - [SYPHR´X XEOI FYX XLI] WIIQIH XS FI PMZMRK MR E ½GXMSREP [SVPH engendered by Science Fiction. It’s a problem for roboticists generally that there’s this kind of pervasive cultural myth of robotics and science ½GXMSR XLEX LEYRXW VSFSXMGW MR QER] [E]W At one point I had a fellowship from the Engineering Physical Science 6IWIEVGL 'SYRGMP SJ XLI 9/ [LMGL MW XLI QEMR JYRHMRK FSH] JSV IRKMRIIVMRK JSV ½ZI ]IEVW XS XV] ERH VIHYGI XLI I\TIGXEXMSR SJ XLI public to what robots could do. People were bringing out the latest robots for an exhibition and the general public would more often than RSX WE] Âą3L MW XLEX EPP MX GER HS#² ;LIR XLI] HIQSRWXVEXIH XLI PEXIWX technology for things like obstacle avoidance that, if you worked in VSFSXMGW ]SY GSYPH WII [EW E ZIV] HMJ½GYPX ERH MRXVMGEXI XLMRK XS HS FYX the public would expect robots to be walking and talking and doing all sorts of incredible things.

&7 :KDW LQ½XHQFH GR \RX EHOLHYH WKH ÂźHOG RI URERWLFV KDV KDG RQ VFLHQFH ÂźFWLRQ DQG YLFH YHUVD" +RZ KDV WKH JHQUH LQ½XHQFHG WKH work you’re doing today? -X´W LEH E QEWWMZI MRžYIRGI MR FSXL HMVIGXMSRW ERH RSX RIGIWWEVMP] EP[E]W a good one. Certainly from the point of view of robotics itself I suppose - GSYPH WE] MX LEWR´X LEH IRSYKL MRžYIRGI FYX XLI idea of robots has had E QEWWMZI MRžYIRGI -J ]SY KS FEGO XS JSV MRWXERGI XLI [SVH VSFSX [EW ½VWX MRZIRXIH F] E '^IGL TPE][VMKLX GEPPIH /EVIP apek for a play called 6 9 6 Rossum’s Universal Robots. These robots were more biochemical, what we would call androids today, but they took over the world in the end and killed all the humans except one which was spared to look after them. %RH XLEX [EW XLI FIKMRRMRK &YX ?6 9 6 A LEH QEWWMZI MRžYIRGI SR XLI [LSPI MHIE FIGEYWI ZIV] WSSR EJXIV XLEX ;IWXMRKLSYWI )PIGXVMGW XLI FMKKIWX IPIGXVMGEP GSQTER] MR XLI 97 EX XLI XMQI UYMGOP] GEQI YT [MXL XLI MHIE SJ YWMRK VSFSXW XS WLS[ LS[ XIGLRSPSKMGEPP] EHZERGIH XLI] [IVI *SV XLI ;SVPH 8VEHI JEMV XLI] FYMPX ER IRSVQSYW VSFSX XLEX GSYPH [EPO ERH XEPO GEPPIH Âą)PIOXVS² ERH XLMW FVSYKLX E PSX SJ MRXIVIWX ERH MRžYIRGI FSXL [E]W -X´W EP[E]W MRXVMKYIH QI XLEX MR XLI ZIV] FIKMRRMRK EX ;IWXMRKLSYWI ?)PIGXVMGWA XLIVI IRKMRIIV 6S] ;IRWPI] XLIVI [LS FYMPX RSX E VSFSX but a machine to operate switches in a power station. He had an arrangement of whistles and, depending on what pitch was blown down the phone, a switch would be automatically triggered. Later he was EWOIH XS TVIWIRX XLMW QEGLMRI XS XLI TVIWW MX [EW NYWX E FMK WUYEVI FS\ with a little box on top of it, and then the next day he saw on the front of the New York Times the headline was “Robot Slave will take away EPP LYQER LSYWI[SVO² 8LI]´H TYFPMWLIH E GEVXSSR SJ LMW QEGLMRI EW well, the two boxes, but with arms, legs and eyes. The company was so I\GMXIH XLEX XLI] EWOIH LMQ XS KS SR XSYV [MXL MX ERH WS XS ½X MR [MXL the press image, he rebuilt the machine to copy the cartoon and instead SJ STIVEXMRK E WQEPP WYFWXEXMSR MX VEMWIH E PMXXPI %QIVMGER žEK 8LEX [EW XLI FMVXL SJ VSFSXMGW VIEPP] MX GEQI WXVEMKLX SYX SJ ½GXMSR 7S MR E WIRWI ]SY GSYPH WE] XLEX XLI 2I[ =SVO 8MQIW GVIEXIH QIXEP ,YQERSMH VSFSXW

Another problem since the beginning of robotics is that a lot of roboticists hype up their work because they get more attention and publicity that way and then they get more funding because their work is in the news. I don’t know whether I should call it a deception or not, but they are playing to the cultural myth of robotics and AI engendered by 7GMIRGI *MGXMSR ÂŻ XLEX´W XLI WMQTPIWX [E] XS TYX MX VIEPP] CT: What do you make of Google’s acquisition of, on the one hand, Ray Kurzweil and on the other a sequence of robotics companies including Boston Dynamics? - [SR´X WE] XSS QYGL SR /YV^[IMP -´Q RSX E WMRKYPEVMX] FIPMIZIV ÂŻ - think he’s looking for the fountain of youth. But it was a clever thing JSV +SSKPI XS HS FIGEYWI LI MW E VIEPP] WQEVX QER - QIER LI´W GSQI up with more patents than most other people and he’s a brilliant XIGLRSPSKMWX ÂŻ - NYWX HSR´X EKVII [MXL LMW JEV žYRK ZMI[W ,I QMKLX IZIR FI VMKLX - NYWX HSR´X WII IZMHIRGI JSV XLIQ Q]WIPJ %RH GIVXEMRP] RSX within the timeline that he suggests.

&7 'R \RX WKLQN WKDW ÂźFWLRQ WKHQ KDV DOWHUHG WKH YLHZ WKH JHQHUDO public has on robots? Yes it has, and especially the idea of robots killing. If you look at Elektro’s MRžYIRGI LI [EW E FMK TS[IVJYP ÂąQIXEP QER² VSFSX ERH ]SY´H WII XLVSYKLSYX XLI JSVXMIW ERH ½JXMIW EPP XLI LSVVSV QSZMIW LEH XLIWI FMK WGEV] VSFSXW ÂŻ XLI] [IVI EPP VIEPP] FEWIH SR )PIOXVS -X EGXYEPP] IRHIH YT MR XLI QSZMIW MR XLI WM\XMIW ERH WIZIRXMIW XSS ÂŻ MR TSVR QSZMIW JSV WSQI WXVERKI VIEWSR FYX PIXW RSX KS MRXS XLEX CT: So was “Robby the Robotâ€? in The Forbidden Planet a reaction to that viewpoint? Very much so. Robby the Robot was a direct reaction to Isaac Asimov’s laws of robotics. In fact Asimov stated in an interview early on that there was only one story in robotics and that’s robots killing people and taking over the world, and that he wanted to change that.

In terms of the acquisition of robotics companies I think it’s absolutely EQE^MRK MX´W ER MRGVIHMFPI WXIT -´ZI EGXYEPP] FIIR XS XLI +SSKPI GEQTYW myself but I came away not knowing anymore about their intention [MXL VSFSXW XLER - [IRX [MXL - LEZI XS WE] -´ZI HSRI E JI[ JIWXMZEPW [MXL &&' NSYVREPMWXW [LS [IVI EPP WTIGYPEXMRK EFSYX [LEX +SSKPI QMKLX FI doing but I think the general consensus is that they’re looking to the JYXYVI 8LI]´ZI KSX WS QYGL GEWL ERH XLI]´VI PSSOMRK XS WTIRH MX ÂŻ XLI] HMHR´X NYWX FY] ER] SPH VSFSXMGW GSQTER] XLI] FSYKLX XLI FIWX 8LIVI was a lot of controversy at the time, people still talk about them buying Boston Dynamics - which make the best legged robots in the world, they look incredible. There was a lot of discussion because they’ve [Boston Dynamics] always taken military funding and that’s what’s kept XLI GSQTER] EPMZI +SSKPI LEW WEMH XLEX XLI]´H WII XLI GSRXVEGXW SYX ERH then go no further with it, and all the indications are that that is the case and they really are not going to go down the military route.

CT: As an attempt to counter the Frankenstein Complex ‌ ;IPP LI [EWR´X UYMXI VMKLX XLIVI [EW ERSXLIV [VMXIV GEPPIH )ERHS Binder who’d written a story called I, Robot, the title of which Asimov took in the end, who was writing about robots in a much more positive light before Asimov. CT: There’s a fascinating line of connection between Asimov and Norbert Wiener. Wiener was a teacher of [John W.] Campbell, Campbell was editor of Astounding Science Fiction which published $VLPRY DQG LQ½XHQFHG KLV WKLQNLQJ DQG KLV VW\OH¨ =IW LI ?;MIRIVA MW E VIEP LIVS SJ QMRI EGXYEPP] 1EMRP] FIGEYWI LI refused to help the military. He did during the second world war but afterwards refused to give them the back papers that they needed and VIJYWIH LIPT MR ER] [E] ,I EPWS WTIRX XLI QENSVMX] SJ XLI VIWX SJ LMW PMJI encouraging others to not develop technologies that would cause harm in the hands of the military.

One of the other companies they bought was a Japanese company called Shaft. DARPA (the research win of the Pentagon) have the DRC [DARPA Rescue Challenge] for the most advanced humanoid-like robots in the world, where they have a whole set of tasks to do that involve things like manipulating spanners, pliers a saw etc. and driving a car among other things. Shaft has built the only robot that has completed the DARPA challenges. It’s a bit slow and messy but it managed to do it.


+SSKPI FSYKLX XLEX GSQTER] ERH EX XLI XMQI 7LEJX [IVI FIMRK KMZIR QMPPMSR F] (%64% XS research and take part in the next stage of the GSQTIXMXMSR ERH +SSKPI LEZI RS[ [MXLHVE[R from that so they are pulling away from the military where they can and I’d imagine they will do that with Boston Dynamics as well. %W JEV EW - GER WII +SSKPI LEZI E WSVX SJ 7GMIRGI Fiction mentality in a good sense. They’re an MRGVIHMFP] GVIEXMZI GSQTER] ÂŻ RSX ZIV] KSSH EFSYX TE]MRK XLIMV XE\IW ÂŻ FYX EQE^MRKP] GVIEXMZI WS - XLMRO XLEX XLI]´VI NYWX XEOMRK E GLERGI XS see what they can do. But it seems to me that they might be looking at is how to extend their HIPMZIV] WIVZMGI MRXS XLI JYXYVI ;MXL XLI QSRI] they have to throw at it I think they might have E PSX SJ WYGGIWW =SY GSYPH LEZI XLI +SSKPI Autonomous car driving up to your house and a robot get out, deliver the post to you and get a signature. CT: Do you think they may be going in the direction of Honda and Asimo of household robots? They haven’t really discussed that but honestly I don’t know. They’ve bought the company Nest that makes internet devices that all you access to you home appliance from outside, so I think they’re looking to get into your home alright. If you’ve ever seen a humanoid robot such as the Asimo robot, it’s about the size of a small child but if it were to hit into you, it’d hurt. So if you look at the size of the robots being produced F] XLI GSQTERMIW +SSKPI LEZI FSYKLX MX´H FI E long time before you’d imagine them coming into your house. It’s one of the things that’s often forgotten when ]SY WII WGMIRGI ½GXMSR QSZMIW ERH XLI] LEZI E robot doing chores around the house,, it’s a very different house to the type the rest of us have. You need a lot of big spaces to allow a robot to walk around and you can’t leave any books SV QEKE^MRIW SR XLI žSSV FIGEYWI MX [SYPH NYWX WPMT SV XVMT ERH WQEWL -´H MQEKMRI +SSKPI will probably head in that direction but they’re probably thinking in a twenty to thirty year window. CT: In that case, are we then doomed to a future in which robots are inherently unsafe? No, I don’t think that’s the case. I think we have to make them safe. There’s many ways to do that, they have pretty good avoidance algorithms. A lot of the action in terms of safety is in the workplace, because at the moment the law is that if you have a robot arm or similar you’ve got to be a certain distance from it and it has to be enclosed in a cage which is very sensible because they’d rip your head off. But now people are working very hard to make compliant robots where you could push their arm and it would give way for example. The thing about Asimov’s robots was that they had positronic brains and essentially had a LYQER QMRH -X [EW TYVI ½GXMSR ERH XLI] [IVI FVMPPMERX WXSVMIW 8LI VSFSX [EW NYWX PMOI E LYQER so it would behave and think like a human and look at you like a human and it could have intent. That’s what Asimov was worried about, the


intent must never be to kill humans, but at the moment robots have no intent and I can see no evidence of this emerging at all. I can’t say never, I don’t know what will happen in a hundred years’ time, but for now I can’t see that they would have goals of their own or any intention so safety is more about the application of robots from my perspective. It’s more about the way they are used rather than the robots themselves. &7 2I FRXUVH IURP VFLHQFH ÂźFWLRQ RQH of the biggest examples of Robotics and $UWLÂźFLDO ,QWHOOLJHQFH DQG WKH SUREOHPV associated with it is the HAL 9000 from 2001: A Space Odyssey‌ - EGXYEPP] WE[ ? A XLI HE] MX [EW VIPIEWIH MR 0SRHSR -X GSQTPIXIP] FPI[ QI E[E] XLEX ½PQ XSXEPP] %X XLI XMQI - NYWX WEX [MXL Q] QSYXL STIR JSV EFSYX XLVII SV JSYV LSYVW EJXIV - WE[ MX CT: Can you see a time where humanity could create something along the lines of HAL or Maria [from Metropolis], a machine that is almost completely sentient? ;IPP - XLMRO WIRXMIRGI MW PMOI TVIKRERG] ]SY´VI either sentient or you’re not, you can’t be a PMXXPI FMX WIRXMIRX 8LIVI QMKLX FI HMJJIVIRX PIZIPW of sentience, but I don’t see it myself. It might happen but I can’t see where it’s going to come from. I was a psychologist before so I’ve had an MRXIVIWX MR XLI LYQER QMRH JSV ]IEVW ERH studied all aspects. To be honest we don’t really know what sentience is. How can we create it when we don’t know? Someone might magically stumble upon it in a machine but it is possible that it’s a fundamental property of biological material, in which case we might never be able XS GVIEXI MX ;I HSR´X ORS[ YRXMP [I ORS[Š MJ ]SY ORS[ [LEX - QIER 8LI TVSFPIQ MW XLEX MR WGMIRGI VIEP WGMIRGI ÂŻ RSX XLEX -´Q WE]MRK % - MWR´X VIEP WGMIRGI ÂŻ FYX MR real science what you have to do normally is if I put forward an idea I’ve got to demonstrate it and show that it is possible. Newton was very good at this, he said - You can argue with me that there are cups and saucers rotating round the sun and I can’t beat that argument because I don’t know. The point about science is not for me to demonstrate that it isn’t the case, it’s up to you to demonstrate that it is the case. He was EVKYMRK EFSYX VIPMKMSR FYX MX [SVOW NYWX EW [IPP with A.I. A.I. has wrong-footed science, a lot of people say to me “Can you prove that this will never LETTIR#² ERH SJ GSYVWI - GER´X 8LEX´W MQTSWWMFPI I don’t know whether these things will happen or not, but I can’t see any evidence for it. As much as I’d love it to, as you can probably tell I’m E VIEP WGMIRGI ½GXMSR JER &7 2Q WKDW VXEMHFW DUH WKHUH DQ\ ÂźOPV RU works that really stand out to you as having KDG D UHDO LQ½XHQFH RQ \RX" ;IPP - KVI[ YT PMWXIRMRK SR E RMKLXP] FEWMW XS Dan Dare on radio when I was three years old. I was obsessed with space men and aliens as my TEVIRXW SJXIR VIQMRHIH QI - ORS[ - [EW XLVII because the series ended when I was four and the tapes have all been lost so we’ll never hear it

EKEMR 7MRGI XLIR E PSX SJ QSZMIW LEZI ?MRžYIRGIH me]. I love all the robot movies, I absolutely PSZI 8LI 8IVQMREXSV XLI ½VWX SRI ÂŻ ERH MX LEW nothing to do with my work against autonomous weapons. - EQ TEVX SJ E PEVKI GSEPMXMSR SJ 2+3´W GEQTEMKRMRK EKEMRW ÂłOMPPIV VSFSX´ ;LEX [I´VI campaigning against is not against autonomous robots being used by the military at all, or any OMRH SJ VSFSX ;LEX [I´VI EKEMRWX MW VSFSXW QEOMRK XLI ÂąOMPP² HIGMWMSR 7S ER EYXSRSQSYW [IETSR EW HI½RIH F] XLI 97 (ITEVXQIRX SJ Defence is one that once it’s been activated [MPP WIPIGX ERH IRKEKI ÂŻ M I /MPP ÂŻ MX´W XEVKIXW without further human intervention. So it’s an unsupervised killing machine essentially, and that’s what I’m against. My worry is not something like The Terminator which is highly intelligent. These weapons carry out programs [LMGL WSQISRI LEW [VMXXIR ÂŻ XLI]´VI RSX adaptive, they’re not smart and obviously they’ll get better as time goes on but it is unlikely they’ll have common sense in the foreseeable future. I think the problem is that a lot of people LEZI ½\IH MR XLIMV LIEHW TEVXMGYPEVP] E PSX SJ American lawyers, that technology will advance ZIV] VETMHP] )ZIR MJ ]SY´VI RSX E WGMIRGI ½GXMSR fan you can’t avoid things like Short Circuit or ;EPP ) - XLMRO XLEX TISTPI NYWX MQEKMRI XLEX MJ we keep developing them, by the time they’re built they will be able to discriminate between civilians and soldiers easily, and be able to do all XLIWI XLMRKW XLEX EVI I\XVIQIP] HMJ½GYPX 7S MX´W OMRH SJ XLI Q]XLSPSK] SJ WGMIRGI ½GXMSR XLEX´W creating that, and the problem for me is that if ]SY KS HS[R XLI WGMIRGI ½GXMSR XLMROMRK VSYXI you end up investing billions of dollars in a WTIGM½G X]TI SJ [IETSR ERH MJ MX XYVRW SYX XLEX at the end of some period when you’re involved in a heavy war and that’s where you’ve spent ]SYV QSRI] ÂŻ ]SY´ZI KSX XS XLIR YWI MX ERH with mass proliferation, regardless of whether it discriminates or not, whether it can make proportionate use of force or not, it’s going to have to be used and that’s our worry. Prof. Sharkey was promoting Our Friends Electric? Robots in Cinema and Robot Design Today, which takes place at BFI Southbank on 11 November. Sci-Fi: Days of Fear and Wonder runs at BFI Southbank and venues across the UK until the end of 2014. ZZZ EÂź RUJ XN VFL Âź

A


EVENTS

2014

lmanac

AofEvents

SEPT-DEC 9/ +VIIGI 97% %YWXVEPME .ETER &VE^MP 'LMRE -XEP] 4SPERH 'EREHE -VIPERH %VKIRXMRE 4LMPMTTMRIW 6SQERME %YWXVME 'SPSQFME 0Y\IQFSYVK 8EM[ER +IVQER] 2MKIVME

OCTOBER 1

7-9

14 - 17

18 - 19

27

7IGYVI;SVPH ']FIV 7IGYVMX] Conference Indiana -RHMERETSPMW -2 97%

)YVSTI 4'- 77' Community Meeting (PCI Security Standards Council) &IVPMR +IVQER]

Black Hat Europe Amsterdam, Netherlands

, ,' 'SRJIVIRGI Sao Paulo-SP, Brazil

CyberSec Connection 'SPYQFME 1( 97%

20

3rd Ibero-American Industrial Cybersecurity Congress Bogota, Colombia

Cyber Security Summit Bahrain

27 - 29

Cornerstones of Trust 0SRHSR 9/

1-3

8-9

']FIV7IGYVMX] MR 6SQERME ÂŻ Central European Conference Sibiu, Romania

']FIV 7IGYVMX] )<43 )\'I0 0SRHSR 9/

5 ;SVOWLST SR 7YTTSVXMRK Diversity in Systems Research &VSSQ½IPH '3 9RMXIH 7XEXIW

6 XL 97)2-< 7]QTSWMYQ SR Operating Systems Design and Implementation &VSSQ½IPH '3 9RMXIH 7XEXIW

Breakpoint Melbourne, Australia Nigeria Emergency Response and Counter-Terrorism %FYNE *'8 2MKIVME

10 - 11 7-6%GSR 1MRRIETSPMW 12 97%

11 - 12 6Y\GSR Melbourne, Australia

16 HouSecCon ,SYWXSR 8I\EW 9RMXIH 7XEXIW 7IGYVI;SVPH ']FIV 7IGYVMX] Conference Colorado (IRZIV '3 97%

16 - 17 +VV'32 -RJSVQEXMSR Security Summit & Hacker Conference (I:SW 4PEGI +VERH 6ETMHW 1- 9RMXIH 7XEXIW

17 Hacker Halted %XPERXE +ISVKME 97%

NOVEMBER 5

12 - 14

21 - 23

XL %RRYEP 3TIR 7SYVGI (MKMXEP Forensics Conference (OSDFCon) ,IVRHSR :% 97%

%:%6 Sydney, Australia

+PSFEP Civil Engineering & Applied Science Conference (CEAASC) Taipei, Taiwan

7IGYVI;SVPH ']FIV 7IGYVMX] Conference California Santa Clara Convention 'IRXIV ÂŻ &E] %VIE '% 97%

5-7 Cybercrime Prevention Summit 0E 5YMRXE '% 9RMXIH 7XEXIW

9 - 10 /M[MGSR 0E 5YMRXE '% 9RMXIH 7XEXIW

13 7SYXL &] 7SYXL ;IWX Cork, Ireland

18 Deep Sec Vienna, Austria

DefCamp Bucharest, Romania

18 - 19 ESCAR Automotive CyberSecurity Conference ,EQFYVK +IVQER]

XL 0EVKI -RWXEPPEXMSR 7]WXIQ Administration Conference 7IEXXPI ;% 9RMXIH 7XEXIW

%YWXVEPME 4'- 77' Community Meeting PCI Security Standards Council) Sydney, Australia

12 - 13

19 - 21

7IGYVI;SVPH ']FIV 7IGYVMX] Conference Seattle 7IEXXPI ;% 97%

ISACA North America ISRM Conference 0EW :IKEW 2: 97%

4EG7IG 'SRJIVIRGI Tokyo, Japan

NoSuchCon Paris, France

9 - 14

28 - 29

20 - 22 SecTor (Security Training and Conference) Toronto, ON, Canada

20 - 23

29 - 30

SAINTCON ;IFIV 7XEXI 9RMZIVWMX] 98 9RMXIH 7XEXIW

CyberMaryland Conference Baltimore Convention Center, 1( 9RMXIH 7XEXIW

21 - 24

(EPPEW 7)'96);360( (EPPEW 8< 9RMXIH 7XEXIW

Hack.Lu Luxembourg

29 - 31

0%7'32 %YWXMR 8<

EkoParty Buenos Aires, Argentina

22 - 23

30 - 31

ISSA International Conference Disney Contemporary Resort, Orlando, Florida, 9RMXIH 7XEXIW

-RJSVQEXMSR Security Summit 'PIZIPERH 3LMS 97%

DECEMBER Healthcare Cyber Security 7YQQMX San Francisco, CA

8SO]S -RXIVREXMSREP Conference on Software Engineering and Digital 8IGLRSPSK] 7)(8 Tokyo, Japan

16 -17

27 - 30

776 7IGYVMX] Standardisation Research 6S]EP ,SPPS[E] 9RMZIVWMX] SJ 0SRHSR 9RMXIH /MRKHSQ

Chaos Communication Congress ,EQFYVK +IVQER]

3 -10

17 - 19 8SO]S -RXIVREXMSREP Conference on Engineering and Applied Sciences

8-')%7 Tokyo, Japan

Focus Security Conference The Venetian and The Palazzo, 2: 9RMXIH 7XEXIW


2/

1/

Online

In Print CyberTalk produce and distribute over 15,000 printed copies each year across the UK, Europe and America

Over 90,000 CyberTalk readers from more than 25 differ‡nt countries access the magazine digitally each year at softbox.co.uk/cybertalk

4/

3/

SBL

Social Media

CyberTalk is published by SBL, a Value Added IT Reseller widely recognised as the market leader in Information Security. SBL offers a comprehensive portfolio of software, hardware, services and training, with an in-house professional services team enabling the delivery of a

Follow us on Facebook, Twitter, YouTube and Pinterest to join the debate

comprehensive and innovative range of IT solutions.

5/

Partnerships CyberTalk is proud to be supported by The National Museum of Computing, and to have been recognised by the UK Home Office Cyber Streetwise campaign and the US Dept.of Homeland Security

6/

Events To date, CyberTalk has been present at over 125 events in 2014 and this number looks set to grow significantly in 2015.

THE

UNIVERSE

7/

Cyber Narratives CyberTalk supports and promotes the best cyber narrative writing from around the world. As part of this we are delighted to have established the CyberTalk Flash Fiction Prize for Science Fiction.


“You know, it’s a pretty beautiful dream, the idea of a world where people don’t use vulnerabilities for evil because there’s a social norm against it.�

www.softbox.Co.uk/knightsoftherainbowtable

G]FIV XEPO$WSJXFS\ GS YO [[[ WSJXFS\ GS YO G]FIV XEPO cybertalkmagazine

$']FIV8EPO9/


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.