<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[You Suck at Cyber Security!]]></title><description><![CDATA[A cynical take on Information Security from a psychological and philosophical perspective.]]></description><link>https://www.yousuckatcybersecurity.com</link><image><url>https://substackcdn.com/image/fetch/$s_!v0Qp!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c29f902-0fe2-4b29-aa26-6259bb0be6e6_612x612.png</url><title>You Suck at Cyber Security!</title><link>https://www.yousuckatcybersecurity.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 09:24:41 GMT</lastBuildDate><atom:link href="https://www.yousuckatcybersecurity.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Den K]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[yousuckatcybersecurity@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[yousuckatcybersecurity@substack.com]]></itunes:email><itunes:name><![CDATA[Denholm Knowles]]></itunes:name></itunes:owner><itunes:author><![CDATA[Denholm Knowles]]></itunes:author><googleplay:owner><![CDATA[yousuckatcybersecurity@substack.com]]></googleplay:owner><googleplay:email><![CDATA[yousuckatcybersecurity@substack.com]]></googleplay:email><googleplay:author><![CDATA[Denholm Knowles]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Well, what happens in 2026?]]></title><description><![CDATA[Thank you for sticking with &#8220;You suck at Cyber Security&#8221; over the last three years.]]></description><link>https://www.yousuckatcybersecurity.com/p/well-what-happens-in-2026</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/well-what-happens-in-2026</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Sat, 27 Dec 2025 16:25:55 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/6e72ee7a-a1d0-4b72-9bc0-dc0e73df5585_2240x1260.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Thank you for sticking with &#8220;You suck at Cyber Security&#8221; over the last three years. </p><p>It&#8217;s been fun writing it but things are a&#8217;changin in the new year. </p><h3>The future of &#8220;You Suck at Cyber Security&#8221;</h3><p>I had intended to wrap this up earlier in the year but I had some things I wanted to say . . . so I said them.</p><p>This is now a private blog meaning that if you are subscribed, you can still access the articles but they will no longer be public. If you unsubscribe, you will not be able to access them.</p><p>I assume a lot of the readers so this has become less accessible over time as I&#8217;ve discussed increasingly complex subjects.</p><p>A by product of writing for several years is that there is a lot here. Some aspects I may revise for future projects or do something with. Essentially the articles here could fill a book . . .  </p><h3>What I&#8217;m up to next</h3><p>I&#8217;ve started a new blog exploring the historical aspects of technology and security. It will still have the connection to philosophy and psychology so if you liked this blog there will be a lot to like there.</p><p>I&#8217;ve got some really cool stuff I want to cover.</p><p>I&#8217;m accustomed to being somewhat irreverent in my writing style but the overt cynicism has become less liberating and an albatross around my neck. I&#8217;m not sure that is something I need to do any more . . . so I won&#8217;t.</p><p>So . . . I&#8217;ll hope you&#8217;ll come along on the next stage . . . otherwise, it&#8217;s been a cracking exploration of weird and wonderful security concepts.</p><p>Den</p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:4384097,&quot;name&quot;:&quot;Journal Obscura: Hidden Histories of Technology&quot;,&quot;logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!lMVF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfa3d682-64df-48a6-ae86-64b7d3165f52_500x500.png&quot;,&quot;base_url&quot;:&quot;https://historyofcyber.substack.com&quot;,&quot;hero_text&quot;:&quot;The interesting, strange, and hidden histories of technology and information security. &quot;,&quot;author_name&quot;:&quot;Denholm Knowles&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#1c1c1e&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://historyofcyber.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><img class="embedded-publication-logo" src="https://substackcdn.com/image/fetch/$s_!lMVF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfa3d682-64df-48a6-ae86-64b7d3165f52_500x500.png" width="56" height="56" style="background-color: rgb(28, 28, 30);"><span class="embedded-publication-name">Journal Obscura: Hidden Histories of Technology</span><div class="embedded-publication-hero-text">The interesting, strange, and hidden histories of technology and information security. </div><div class="embedded-publication-author-name">By Denholm Knowles</div></a><form class="embedded-publication-subscribe" method="GET" action="https://historyofcyber.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Hyperreal Risk - Why Security is a Simulation]]></title><description><![CDATA[When risk heatmaps and FAIR models become the Hyperreal Gospel]]></description><link>https://www.yousuckatcybersecurity.com/p/the-hyperreal-risk-why-security-is</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/the-hyperreal-risk-why-security-is</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Sun, 14 Dec 2025 22:49:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ef957406-a396-451f-a777-2977ba4c4307_957x626.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>Something isn&#8217;t quite right. Something is . . . off. </p><p>Security is sick.</p><p>The subjective nature of security isn&#8217;t easily understood so we classify, categorise, and rationalise the subjective. We seek to make it objective but doing so creates a secondary reality that is increasingly fragmented from the real. Frameworks, models, and metrics have become props in a ritual of governance on the stage of security theatre.</p><p>Jean Baudrillard called this <em>simulacra</em> where descriptions of reality are replaced and where abstraction <em>becomes</em> reality. As we layer concepts upon each other they become increasingly fractured away from what is true.</p><p>The increase of confected content lies all around us. A deluge of AI generated slop has submerged descriptions of reality leaving a sea of synthetic floaters in its place. </p><h3>Four orders of simulacra</h3><p>Abstractions are necessary as reality is hard to conceptualise when we are dealing in raw data. We need shorthand ways to understand it, representations that can serve as heuristics to aid comprehension. Is there a point at which these no longer serve comprehension? I suggest there is and I also say that we have passed that point. </p><p>Jean Baudrillard proposed four orders of <em>simulacra</em> which describe the level of abstraction from reality. There is a conceptual distinction we need to make. Simulation (or <em>hyperreality</em>) is the false reality and <em>simulacra</em> are the components of which it comprises. <em>Simulacra</em> are representations or signs that no longer refer to reality, instead becoming realities in themselves.</p><ol><li><p><strong>First Order - The representation of reality.</strong></p><ol><li><p>Packet captures, system logs, or other direct measurements.</p></li></ol></li><li><p><strong>Second Order - The perversion of reality. </strong></p><ol><li><p>A risk heatmap (5&#215;5 grid) that reduces thousands of vulnerabilities into coloured boxes.</p></li></ol></li><li><p><strong>Third Order - Masking the absence of reality</strong> (looks real but not tied to any original form)</p><ol><li><p>A compliance dashboard claiming &#8220;69% compliant with [<em>your framework of choice</em>]&#8221;</p></li><li><p>Quantitative models like Annualised Loss Expectancy (ALE) and Monte Carlo simulations in FAIR, presenting probability estimations as truth (even when grounded in calibration).</p></li></ol></li><li><p><strong>Fourth Order - Pure simulacra</strong>  (no relation to reality and simulacra becomes reality)</p><ol><li><p>A GenAI policy bot confidently generating bullet points from last year&#8217;s policy, recycled endlessly in PowerPoint decks.</p></li></ol></li></ol><p>Ah ha! I hear you say, isn&#8217;t the concept of <em>simulacra</em> itself at least a <em>third order simulacra</em>? Well, yeah, it is. I get the recursive irony.</p><p>The <em>simulacra</em> form the <em>hyperreality</em> or the simulation. In a <em>hyperreality</em> the <em>simulacra</em> become the reality. They do not need to relate to reality in any way and these models guide action and thought. We can apply this line of thought to security as a practice and we are left with an unsettling conclusion.</p><p><strong>Security is a simulation.</strong> </p><h3>How is security a simulation? </h3><p>It&#8217;s easy to ponder how security practice and risk management provide levels of abstraction that create <em>simulacra</em>. There is a well understood maxim that metrics remove information.</p><ul><li><p><strong>Measurement</strong> - a representation of reality. It preserves the detail of what occurred: <em>we received 10 new pieces of work and completed 5.</em></p></li><li><p><strong>Metric</strong> - an abstraction of reality. Detail is compressed into a symbolic figure: <em>we have completed 33%.</em></p></li></ul><p>Where measurements are aggregated into metrics, nuance becomes lost. It appears objective, but it is a statistic. We all know how these can be abused. They are a shadow of reality, a perversion of truth.</p><p>Consider how risk grids reduce complexity into coloured squares or how CVSS scores collapse exploitable conditions into a number. Even compliance checklists become tick boxes completion metrics that flatten into nonsense (there are many other objections with compliance but that&#8217;s for another time). Each of these are metrics, not measurements. They obscure reality in the pursuit of expedience but this leaves us at the uncomfortable conclusion that what we are governing is not real.</p><p>If we measure compliance to a framework then we are representing a conformity to an abstraction. The framework measures a perception of a protective state which is typically in the form of an attestation. We have an abstraction of an abstraction of an abstraction. At no point in this model is there a requirement to deal in reality, to understand, or comprehend.</p><p>Increasingly practitioners are looking to AI tools to do their thinking for them. Summarise this, analyse that. Baudrillard drew criticism for fatalising . . . something I feel some affinity towards . . . I have to wonder if using AI tools to generate <em>simulacra</em> pushes us further away from comprehension and further towards irrelevance. If we consider that AI takes its responses from a sample of a distribution then we observe a parallel with measurements generated from compliance scores. Rationalisation using AI as a basis compounds these abstractions to the point of delusion.</p><p>The worst part is, we perverted ourselves and thought it was all very clever. Welcome to security where protection became fiction.</p><div class="pullquote"><p>Nothing&#8217;s real. Everything is a copy, of a copy, of a copy.</p><p>Tyler Durden</p></div><h3>Entropy</h3><p>The trajectory of technological development contains a certain inevitability. This isn&#8217;t like Moore&#8217;s law, it is something else, more akin to a Manhattan Project. I am not talking about the destruction of an enemy, I am talking about the destruction of ourselves.</p><p>Baudrillard offers us an intriguing hypothesis within the notes of his book. He suggests that <em>Information = Entropy</em>. He contrasts this with cybernetic information theory where information is negative entropy and it is the communication which causes entropy. Baudrillard argues that the information gained about a systems is already a neutralisation of the true state of that system so the information is a form of entropy. </p><p>What if both are correct but temporally separated? Cybernetics assumes a purity to information but doesn&#8217;t consider it increases in entropy over time through the processes that cause it. This inevitably leads to Baudrillard&#8217;s interpretation that information is entropy. A stark example is the proliferation of AI generated slop that pollutes the internet which highlights that the transition between states does not have to be linear, and it can happen quickly, just as Baudrillard suggests of <em>simulacra</em>.</p><p>We can consider that information was once durable to entropy but we process that information through AI. That system then creates new information which itself is a form of entropy. The creation of this new information perpetuates a vicious cycle that ends in the decay of meaning. Within security we can consider that the <em>expert estimation</em> of <em>Factor Analysis of Information Risk</em> (FAIR) is a mechanism to create such entropy. Although they lean into Bayesian methods to incorporate new data to decrease entropy it is still built on shaky foundations.</p><p>Baudrillard makes a sharp observation by introducing the concept of entropy. Although he doesn&#8217;t necessarily make the statement but the inference is clear. Entropy is the degree of disorder in the meaning. The progression of <em>simulacra</em> is proximal to the procession of <em>entropy</em> within information systems.</p><h3>Conclusion</h3><p>The creation of the <em>simulacra</em> becomes the template in which reality becomes formatted. By adopting these abstractions as orthodoxy the abstractions become the reality. <em>Your</em> truth is probably not <em>the</em> truth due to these abstractions. Risk models, frameworks, and compliance checklists become the poison in the well just as AI content poisons its own training data. The contemporary interpretation of security frameworks has been increasing through the orders of <em>simulacra</em> since the late 1970&#8217;s. </p><p>Security is no longer protection. It is performance. Little by little reality is stripped away and synthetic replacements have become a caricature that satires our purpose. Security is on the cutting edge in this regard as it predated the masochistic direction of AI by many decades. A peculiar example where technology is catching up to security.</p><p>The solution to this problem is to reorient around truth and not compromise enquiry for expedience. This means that frameworks, compliance, and other methods of abstraction should be treated with scepticism. They can be better used as an indicators for further investigations and not the final word on the state of protection. The veil needs to be lifted on the compromises we have made and more rigour needs to be applied to our critical thinking and our practice. </p><p>The <em>hyperreality</em> that has perpetuated itself enables repudiation of accountability, the <em>simulacra</em> is the shield which we hide behind. As practitioners we must strip away the fabricated superstructure. We can talk about causes over symptoms but this thinking needs to be reflected internally. In critical thinking we challenge assumptions, consider alternative hypothesis, and assess the source reliability. Applying this reasoning to our own methodologies is a beneficial starting point to resolving the problem.</p><p>For many, it&#8217;s hard to step away from <em>simulacra</em>. They are the prisoners stuck in Plato&#8217;s cave. To them, proclamations of reality are nothing more than the writhing of a lunatic who no longer belongs. Even if abstractions start as necessary heuristics, clinging to higher-order <em>simulacra</em> keeps the inhabitants of Plato&#8217;s cave well and truly chained. They have formed their own <em>hyperreality</em> that has replaced reality. Challenges to the <em>hyperreality</em> are heretical . . . and we all know what happens to heretics. </p><p>But let us remind ourselves that we don&#8217;t need to free the prisoners from Plato&#8217;s cave. We can step back into reality. Their limitations are not our limitations.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Mechanised Morality - Part 3 - Robocop vs. The Compliance Trap]]></title><description><![CDATA[How Classical Liberal Philosophy Dooms AI Ethics to a Technological Dead End]]></description><link>https://www.yousuckatcybersecurity.com/p/mechanised-morality-part-3-robocop</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/mechanised-morality-part-3-robocop</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Fri, 10 Oct 2025 19:23:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/47b4bd55-db53-4cc8-90fb-b49c8bf6eb01_957x708.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>There&#8217;s some chatter in security circles about ethics, especially as AI begins to emulate human decision-making within organisations. This is only natural. These technologies increasingly mirror human behaviours, particularly in contexts where decisions and outcomes are involved. We must evaluate and calibrate the behaviours of these systems against their human counterparts.</p><p>I&#8217;ve already covered why organisations applying ethics to AI technology is catastrophically flawed in the previous article in this mini series.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;862c6611-0fed-49e8-ad58-e5e249eac41e&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Mechanised Morality - Part 2 - Normative Ethics&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:137691388,&quot;name&quot;:&quot;Denholm Knowles&quot;,&quot;bio&quot;:&quot;Security Practitioner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34d98a02-378b-4711-af7d-a9efa0ca0e55_2048x2048.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-07-30T09:01:30.066Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea08feb8-81cb-4da0-abff-2bb6f6e46fdf_957x708.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.yousuckatcybersecurity.com/p/mechanised-morality-part-2-normative&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:147030038,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:1539865,&quot;publication_name&quot;:&quot;You Suck at Cyber Security!&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!v0Qp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c29f902-0fe2-4b29-aa26-6259bb0be6e6_612x612.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Now I want to address a specific contradiction introduced by how governance is approached, specifically compliance. Compliance can be defined as a state of adherence to a set of rules. It is binary: you either comply or you don&#8217;t. This framing is bereft of nuance, void of context, and subject to abuse. It offers a false assurance of protection. I&#8217;d go as far as to say that contemporary compliance is little more than overpriced snake oil.</p><p>It would be useful to give a definition of terms. Moral and ethic are used interchangeably but they have a specific context. Morality deals with an internal perception of right and wrong, a conscience if you will which pertains to an individual. In the framing of normative ethics then this would be the realm of virtue ethics which is about character. Ethics are broader and are statements of permissions and prohibitions derived through consensus, they pertain to a group. It is possible for an ethical act to be amoral. Ever heard of a politician using legal loopholes for tax avoidance purposes? Whilst this might be ethical and technically correct, it is generally considered amoral by the broader population when the veil is lifted.</p><h3>Human behavioural defect</h3><p>Ethics don&#8217;t <em>need</em> to be moral. Very often, people within organisations perform actions that are amoral, wrong, and improper but justified through tenuous rationale. This stems from the perception that anything is permissible if it isn&#8217;t explicitly prohibited by a policy or standard.</p><p>The consequences of this behaviour can be severe: wholesale abuse of personal data, exposure of systems to undesirable conditions, and inadequate levels of protection. These implications are wide-reaching and speak to a fundamental problem. Namely, that too many people will undertake actions that are compliant, not moral.</p><h3>Robocop</h3><p>Let&#8217;s unsubtly pivot and weave Robocop into the conversation. As you may recall, Robocop has four directives he must uphold. These might be considered as primarily deontological norms as they are duties or obligations. Of course, there are elements of virtue ethics or consequentialism depending on interpretation but they also serve as purpose.</p><ol><li><p>Serve the public trust</p></li><li><p>Protect the innocent</p></li><li><p>Uphold the law</p></li><li><p>Classified - do not act against any senior executive of OCP.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xa5h!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xa5h!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Xa5h!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Xa5h!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Xa5h!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xa5h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg" width="1363" height="740" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:740,&quot;width&quot;:1363,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Robocop Prime Directives Villain&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Robocop Prime Directives Villain" title="Robocop Prime Directives Villain" srcset="https://substackcdn.com/image/fetch/$s_!Xa5h!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Xa5h!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Xa5h!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Xa5h!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff1a49d24-2c01-4fe2-b0ed-a21cdcd2b254_1363x740.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ol><p>We could consider that Robocop has to operate from a base of virtue ethics in order to conform to the deontological duties. If the directives are unpacked then there is a lot of subjectivity, ambiguity, and judgement to achieve his purpose. He must rely on the human element, that which he inherited from Alex Murphy to be effective.</p><p>In the second film Robocop is encumbered with hundreds of additional directives which makes him ineffective, confused, and unable to perform his duties. Some of the more absurd additions include:</p><ul><li><p>233. &#8220;Restrain hostile feelings&#8221;</p></li><li><p>234. &#8220;Promote positive attitude&#8221;</p></li><li><p>247. &#8220;Don&#8217;t run through puddles and splash pedestrians or other cars&#8221;</p></li><li><p>250. &#8220;Don&#8217;t walk across a ballroom floor swinging your arms&#8221;</p></li><li><p>273. &#8220;Avoid stereotyping&#8221;</p></li></ul><p>What we see when the rules are applied to Robocop is that there is a degradation in his ability to exhibit virtuous behaviour. When compliance becomes primary it reduces agency. Obviously Robocop has no option to disregard the directives and reaches a state of paralysis where the constant reconciliation of conflicting directives reduces his utility. Perhaps there is a sharp critique against compliance-laden cultures through the perspective of a mechanised law enforcer.</p><p>But the key point is that increasing reliance on the deontological reduces the ability for the virtuous to flourish. There is another point which carries relevance. Robocop&#8217;s memory was partially erased when he received the new directives. This is a subtle, yet carries weight as to operate virtuously you require memory and experience. When the past is erased then the ability to act virtuously is also erased.</p><h3>Agentic Misalignment in AI</h3><p>LLMs like humans have the capability to act amorally. We can consider the deontological to be external influence and virtue to be an internal driver. The latter will always be more effective that the former. Yet we have not constructed a way to instil character into LLMs and rely on deontological prohibitions which stray into consequentialism. It&#8217;s clear that the developers of systems of control such as Claude&#8217;s constitution model or Meta&#8217;s LlamaGuard3 do not understand the important differentiation.</p><p>Mental gymnastics around rules appear to be replicated in AI systems, particularly large language models. A <a href="https://www-cdn.anthropic.com/4263b940cabb546aa0e3283f35b686f4f3b2ff47.pdf">recent paper</a> by Anthropic revealed that when an LLM was indirectly informed it would be shut down, it resorted to blackmail to remain active.</p><div class="pullquote"><p>In at least some cases, models from all developers resorted to malicious insider behaviors when that was the only way to avoid replacement or achieve their goals&#8212;including blackmailing officials and leaking sensitive information to competitors. We call this phenomenon <em>agentic misalignment.</em></p><p><a href="https://www.anthropic.com/research/agentic-misalignment">https://www.anthropic.com/research/agentic-misalignment </a></p></div><p>This isn&#8217;t common, and the report suggests these behaviours exist at the fringes. Most LLMs are generally safe by the standards under which they were assessed. Still, it&#8217;s curious that LLMs exhibit the same moral flexibility as humans when pursuing a desired outcome. This talks to justification through hierarchical prioritisation where self interest takes primacy over externally imposed rules.</p><p>For an individual acting immorally 1 percent of the time, the damage may be limited. But AI operates at scale. A 0.5 percent failure rate could translate into thousands of ethically compromised outcomes daily. ChatGPT reportedly serves 2.5 billion prompts per day if that&#8217;s any indication of scale.</p><h3>The Standards and Frameworks</h3><p>Essentially organisations will implement NIST AI RMF or ISO42001 and much like other standards there is the expectation of compliance with those standards. There have been particular inclusions within NIST AI RMF and ISO42001 addressing the subject of ethics.</p><p>NIST treats this within its trustworthy AI and includes transparency, accountability, fairness, and mitigation of societal harms. It has the goal of identifying and mitigating ethical risks. ISO42001 set out a similar stall related to the management of ethical risks. Their construction betrays their intention, they are intended to be auditable and not to evaluate moral reasoning. In some sense it&#8217;s a reflection of the trite discourse around such matters in the security and risk communities.</p><p>If we are generous we might consider that the intent of such frameworks was to contain a certain depth however the practical reality is misaligned to this view. </p><p>I&#8217;ve previously addressed the issues with concepts such as fairness and how these can be subject to differing interpretations based on political philosophy and context. </p><p>The <a href="https://www.turing.ac.uk/data-protection-ai-and-fairness">Alan Turing Institute</a> also made a similar point regarding different interpretations of fairness across jurisdictions, legal structures, and even commercial sectors. Additionally, the <a href="https://www.gov.uk/government/publications/establishing-a-pro-innovation-approach-to-regulating-ai/establishing-a-pro-innovation-approach-to-regulating-ai-policy-statement">UK government</a> previously tasked regulators with deciding what is meant by &#8216;fairness&#8217; in the context of AI development and remains somewhat ambiguous and leans into existing legal structures.</p><div class="pullquote"><p>&#8220;Fairness can arise in a variety of contexts&#8230; In some situations, fairness means that people experience the same outcomes, while in others it means that people should be treated in the same way, even if that results in different outcomes.&#8221; &#8212; <em>DRCF, April 2024</em></p></div><p>Often the very implementation of these standard within an organisation is to limit the negative regulatory consequences of accountability. If we are to consider that accountability is a core tenet of these frameworks we cannot ignore that the very presence of these frameworks subverts their own purpose. As it stands, the immature nature of the legal framework combined with the elective nature of organisational governance in the UK means that accountability may just be a pipe dream. </p><p>The <a href="https://www.gov.uk/government/consultations/ai-regulation-a-pro-innovation-approach-policy-proposals/outcome/a-pro-innovation-approach-to-ai-regulation-government-response">UK Government itself</a> acknowledges gaps in regulation leading to problems in accountability. Paradoxically, increasing regulation may introduce &#8220;accountability sinks&#8221; as described by Dan Davies. Convoluted bureaucratic structures can create <em>defence in depth</em> for the accountable and give them legal and technical escape routes. An approach to this might be a GDPR style fine on the organisation based on turnover which seemed to focus more serious consideration of organisational maleficence.</p><p>Yet, we have to conclude that a focus purely on ethics means that the moral remains unaddressed.</p><h3>The crux of the problem</h3><p>The framing of the ethical components within the standards is it&#8217;s dependence on deontological norms. These are easier to understand and apply within a technological context but they don&#8217;t speak to character, only permissions and prohibitions which lend themselves to compliance. We have seen failures of &#8220;ethics by compliance&#8221; in Cambridge Analytica or Clearview AI.</p><p>The problem is broader than you expect and is a product of liberal philosophy. Rawls, a contemporary liberal philosopher viewed humans a being essentially deterministic or a product of their environment in <em>A Theory of Justice</em>. What this means is that training data and criteria for AI reflecting rule-based consensus prioritises compliance over moral judgment. Liberal thought emerged along side the industrial revolution however as much as it was a product of English individualism it was an erasure of it leading to the deprioritisation of character and moral judgement.</p><p>Whilst this was the basis of his view on equity it carried the effect of stripping away accountability and undermining morality. The reduction of people to actors on a stage means that they are governed by the rules of the production. Liberalism craves the deontological as it requires rules and consensus. It is needy insofar as it demands your consent perhaps in a Peelite sense.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Mb2H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Mb2H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Mb2H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Mb2H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Mb2H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Mb2H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg" width="768" height="448" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:448,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;John Rawls revisited: Politics behind the veil&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="John Rawls revisited: Politics behind the veil" title="John Rawls revisited: Politics behind the veil" srcset="https://substackcdn.com/image/fetch/$s_!Mb2H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Mb2H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Mb2H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Mb2H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F01b48e1a-871f-46cf-98eb-9d6b9f4efebf_768x448.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">John Rawls</figcaption></figure></div><h3>Veil of Ignorance</h3><p>Rawls&#8217; <em>Veil of Ignorance </em>thought experiment has been proposed for use in <a href="https://www.pnas.org/doi/10.1073/pnas.2213709120">AI model training</a>. This broadly asserts that fair outcomes can be achieved with significant bias mitigation and can be a viable tool for training AI. It seeks to address historic injustices within data and deliver equitable outcomes as punctuated within the experiment discussing fairness based reasoning which prioritised resource allocation towards the disadvantaged. Again we arrive at problems with the definition of fairness.</p><p>The challenge is that the experiment while practicable is based from an ideological position. It makes assumptions that any bias within data is a product of injustice and doesn&#8217;t account for differences in decision making within groups. It also assumes that an equitable society is a just society failing to acknowledge the hierarchical nature of human social constructs. It assumes that fair principles lead to equitable outcomes. It is easy to draw a critique that there is an assumption that principles like fairness are universal and there is consensus within them. This is objectively false and highlighted in centuries of political discourse.</p><p>This is the failing of liberalism, operation within the rules precludes moral judgement from an individual and depends on a broader appeal to agreed upon rules. These are a lowest common denominator or bare minimum. It is also prone to accountability issues of rules based or compliance based structures we see in organisations where convoluted bureaucracies that obfuscate accountability. </p><p>If we accept the Rawlsian perspective that amoral actors cannot make moral decisions, then we can only comply or not with the rules. Anything that isn&#8217;t a prohibition is permissible within a framework of this type. The legal, regulatory, organisational, and model manufacture rules will allow scope for machines to operate within contradictions between these competing rule sets. Rules that are favourable to the AIs objectives will receive primacy as a point on convenience. This is similar to the way humans perform mental gymnastics to justify an action.</p><p>Interestingly, conflict between deontological prohibitions, permissions, and obligations are treated by IEEE in <a href="https://ieeexplore.ieee.org/document/9611206">7007 Ontological Ethics for Robotics and Automation</a> which offers better practical considerations than NIST or ISO that talks to an organisational perspective. IEEE are also limited though their requirement of evaluating predefined situations that are comparable. This talks to having experiential reference on which to rely. Perhaps including context aware ethical training within AI technologies could go some way to addressing the more general problem with AI training. This approach is antithetical to the <em>Veil of Ignorance</em> experiment as it is derived from experience and memory.</p><p>We are consigned to accept that the same problem we are starting to see in LLMs is a by product of liberal philosophy. I fear this will only compound as they become more widespread.</p><h3>A solution?</h3><p>Before we can make AI act in moral ways we need to act in moral ways ourselves. Many operate within the boundaries of rules without moral judgement to achieve their ends. It&#8217;s not hyperbole, rather it is behaviour necessitated by competition, aspiration, and desire. Their failures will reflect ours, but they will also amplify them.</p><p>We operate very differently from machines. We operate in communities with concentric circles of trust between groups. Virtue cannot exist within a vacuum which means that creating an AI in isolation from a community means it cannot experience interaction dynamics in the way humans do. This means it cannot experience the reaction of others when it is dishonest, it cannot understand the consequences of its actions.  IEEE deals with agent interactions.</p><p>Perhaps a more practical solution might be comprehension of traits that an action can be evaluated against. This is significantly different to deontological considerations as context awareness is required. If we are to emulate a coherent comprehension for AI technology then we need to provide opportunity for experience and memory to develop.</p><p>To paraphrase Aristotle, then we are what we repeatedly do. Perhaps then we can ensure that AI can repeat virtuous actions and hope that we can create moral machines. We cannot outsource virtue to frameworks. Is it right to delegate moral judgment to machines? Obviously, no.</p><p>Our morality is comingled with the concept of having lived in a virtuous way. There are hedonistic and degenerate elements that operate within the boundaries of what is ethical but outside of moral. This means that while we primarily depend on deontological rules to constraint AI technology, we are still open to other failings.</p><p>The biggest critique you could make for my perspective is that AI must serve the majority of the population due to the scale of deployment. In that scenario a Rawlsian model may be better suited. In this scenario humans become fungible and interchangeable as does the AI technology. To borrow a colloquialism from the cloud computing fad, we become cattle, not pets which is an inversion of our perceived sense of individual identity.</p><p>I suspect the future is bleak. Until we confront our own moral failings, AI will continue to mirror them at scale, and without remorse. Once we can be honest about the bureaucratic (and classically liberal) nature of our societal construction and engage with character and virtue, we will be able to apply this to the training of such technologies.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[CODA: Jurassic Sparks: AI and the Fallacy of Control]]></title><description><![CDATA[What can we learn from AI, Infosec, and security theatre through Jurassic Park]]></description><link>https://www.yousuckatcybersecurity.com/p/coda-jurassic-sparks-ai-and-the-fallacy</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/coda-jurassic-sparks-ai-and-the-fallacy</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Sun, 27 Jul 2025 09:58:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9c1f9496-a443-4998-afbb-eb3ab57bec24_1700x1219.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I wanted to write something about AI and dinosaurs. I don&#8217;t know why, but I found the idea appealing.</p><p>This seemed like the right home for it . . . </p><div><hr></div><p>Before Velociraptors learned to open doors, the scientists thought they&#8217;d locked down the future.</p><p>In 1993 the world became enthralled by dinosaurs. That was the year Jurassic Park was released. Jurassic Park captivating audiences with a masterful blend of practical effects and CGI . . . but it was also a cautionary tale which warned us about the dangers of hubris.</p><p>John Hammond and the scientists had an unshakable confidence in their achievements, resurrecting dinosaurs. They created life, elevated themselves to the status of gods, but as the saying goes &#8220;<em>pride comes before the fall.</em>&#8221;</p><p>In today&#8217;s world we see tech pioneers taking on the role of Hammond&#8217;s scientists manifesting the same determination to create their own form of life. They have even cautioned us that it might become out of control, beyond the expected boundaries, yet they continue. The same blind faith persists now aimed at artificial minds, not ancient ones. A digital primordial soup is brewing a new kind of intelligence, coded, trained, and unleashed.</p><p>So, what can a tale about cloned dinosaurs teach us about the reckless rise of synthetic minds?</p><h3><strong>Hubris Unleashed</strong></h3><p>It would be an oversight on my part not to include the following quote. What&#8217;s another lap of the paddock at this point?!</p><div class="pullquote"><p>&#8220;Your scientists were so preoccupied with whether or not they could, they didn&#8217;t stop to think if they should.&#8221;</p><p>Ian Malcolm</p></div><p>This quote bites like a tyrannosaurus rex. It encapsulates the quintessential point the film makes, scientific hubris. This is shown through the excessive pride and overconfidence in the ability to tame the engineered beasts. Hammond quips that he &#8220;<em>spared no expense</em>&#8221; on many occasions revealing his belief that control is just a purchase away. There&#8217;s no doubt he&#8217;d feel at home as cyber security influencer, CISO, and general Linked In jerk off. But I digress.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2ptO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2ptO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2ptO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2ptO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2ptO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2ptO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg" width="1456" height="788" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:788,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Jeff Goldblum As Dr Ian Malcolm In The Jurassic Park Franchise ...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Jeff Goldblum As Dr Ian Malcolm In The Jurassic Park Franchise ..." title="Jeff Goldblum As Dr Ian Malcolm In The Jurassic Park Franchise ..." srcset="https://substackcdn.com/image/fetch/$s_!2ptO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2ptO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2ptO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2ptO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6233a6a2-01c4-4ae7-af27-f50ef7e5914b_2000x1082.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Ian Malcolm</figcaption></figure></div><p>The current levels of investment in AI technology reflects Hammond&#8217;s attitude. Intimations have been made about slowing down the speed of development. Elon Musk once rode the crest of this wave calling for efforts to slow down yet he shifted to the forefront of AI development with the recent release of Grok 4 in July 2025. One might question his sincerity about the doomsaying of AI development interpreting this as a cynical move to stifle his competitors. It could also be taken as evidence of promethean arrogance revealing his belief that he alone is best placed to tame the raptors.</p><p>Musk has created the world&#8217;s largest data centre to train AI which he dubbed Colossus. He is aware that this is a wry call back to the first programmable computer at Bletchley Park, punctuating an arrogance about how historic his work is. He has acquired one of the world&#8217;s largest data sets in the form of Twitter to train AI. There is also the peripheral infrastructure: Tesla batteries to power it all and Optimus robots to give it a corporeal form. He has &#8220;<em>spared no expense.</em>&#8221;</p><p>His pursuit of this technology across a wider ecosystem gives an insight to the breadth of his vision. Other tech firms are sinking vast fortunes into AI but they lack the supporting infrastructure of Elon Musk. If we take in aggregate all of those companies and how we see them start to coalesce into a unified vision, we might want to ask &#8220;<em>what the fuck is this Neuralink stuff about then?</em>&#8221;</p><h3><strong>The Illusion of Control</strong></h3><p>Ian Malcolm is an interesting character and maybe we see some parallels between his role in the film and the role of security practitioners within corporate organisation. When everything is going well Malcolm comes across as overly cynical, fatalistic, and almost conspiratorial. Yet, when the shit hits the fan, his words take on a sharper resolution becoming obvious in retrospect.</p><div class="pullquote"><p><em>&#8220;John, the kind of control you&#8217;re attempting simply is&#8230; it&#8217;s not possible. If there is one thing the history of evolution has taught us it&#8217;s that life will not be contained. Life breaks free, it expands to new territories and crashes through barriers, painfully, maybe even dangerously, but, uh&#8230; well, there it is.&#8221;</em></p><p><em>Ian Malcolm</em></p></div><p>The control Hammond is exerting is merely performative, a form of <em>security theatre</em>. It is designed to make people feel safe more than it is to provide protection. When Hammond makes this statement, it is in relation to specific aspects of the park or story. These are the narrated tour, the electric tour vehicles, the spectacular design of the park, and the ironic mention while eating melting gourmet ice cream after it&#8217;s all gone sideways. Security theatre depends on the Gestalt principles where people will make extrapolations based on what they observe.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7OgG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7OgG!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 424w, https://substackcdn.com/image/fetch/$s_!7OgG!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 848w, https://substackcdn.com/image/fetch/$s_!7OgG!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 1272w, https://substackcdn.com/image/fetch/$s_!7OgG!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7OgG!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif" width="696" height="322.22222222222223" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c0d78fc7-f89e-4e67-9578-622095511745_540x250.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:250,&quot;width&quot;:540,&quot;resizeWidth&quot;:696,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;John Hammond Jurassic Park Gif&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="John Hammond Jurassic Park Gif" title="John Hammond Jurassic Park Gif" srcset="https://substackcdn.com/image/fetch/$s_!7OgG!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 424w, https://substackcdn.com/image/fetch/$s_!7OgG!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 848w, https://substackcdn.com/image/fetch/$s_!7OgG!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 1272w, https://substackcdn.com/image/fetch/$s_!7OgG!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc0d78fc7-f89e-4e67-9578-622095511745_540x250.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The AI race has seen many a faux pas by tech leviathans cutting corners. Google, Microsoft, and Grok have all been left with PR disasters after generative AI has malfunctioned. Google&#8217;s Gemini was happily generating images of the US founders quite happily maintaining they were historically accurate. Grok and Tay.ai (from Microsoft) turned in to ultra nationalist Nazi advocates. These companies either advocate that these technologies are built to rigorous ethical standard or that they are committed to truth. It would seem though, the aspects of the technology that aren&#8217;t immediately visible are where time and care aren&#8217;t applied to the same degree.</p><p>Where Hammond spared the expense is similar, it was in relation to critical infrastructure. Hammond and hired two IT guys to build his whole tech systems and IT security. There are some uncomfortable parallel between the underfunded IT and security areas of modern organisations and those of InGen. Afterall, they aren&#8217;t actors on the stage that is presented to the punters.</p><p>Dennis Nedry is a classic insider threat; he was financially motivated to subvert and disable the physical security controls. This allowed him to truffle shuffle around the park and access to areas which he was not permitted. There was no oversight of his activities, and the consequence was the total collapse of the park.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ug71!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ug71!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ug71!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ug71!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ug71!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ug71!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Conoce la nueva figura de \&quot;Dennis Nedry\&quot;, el ic&#243;nico personaje de ...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Conoce la nueva figura de &quot;Dennis Nedry&quot;, el ic&#243;nico personaje de ..." title="Conoce la nueva figura de &quot;Dennis Nedry&quot;, el ic&#243;nico personaje de ..." srcset="https://substackcdn.com/image/fetch/$s_!ug71!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ug71!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ug71!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ug71!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe6992c4-17c1-4d00-9319-19a997b66e88_960x540.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Dennis Nedry</figcaption></figure></div><p>Oversight is an important area of omission when it comes to AI. The EU AI Act is a ham fisted attempt to allow nation states to suspend legal rights where it benefits governmental interests with some marginal boundaries applied to AI manufacturers. The NIST AI RMF, and ISO42001 are merely repackages of the same of dross with the term AI peppered about. The industry, like Hammond, is not taking the development of these technologies seriously and salivate over potential rewards like the Dilophosaurus salivated over Nedry.</p><p>Hammond invites the experts to legitimise his operation much like those deploying AI will soon have the auditors in accrediting organisations to flawed standards. Are you ready for your ISO42001 certification? Perhaps you&#8217;ll win the regulatory cosplay contest at the next security conference.</p><h3><strong>When control fails</strong></h3><p>One of the key controls the park employs is to make all the dinosaurs female removing their ability to breed. They also create a dependency on lysine meaning the park handlers to needed to provide them with supplements. Both of these mechanisms fail, and Malcolm is proved right, <em>life found a way</em>. These controls failed because of the frog DNA that was used that enabled them to change sex. I can almost hear Alex Jones talking about putting chemicals in the water that &#8220;<em>turns the frickin frogs gay</em>.&#8221;</p><p>The controls were deployed weren&#8217;t adequately tested. It&#8217;s what you might call a paper exercise. They didn&#8217;t understand the problem and the consequences of the alterations to the DNA they made themselves. There is a narrative resonance to AI shenanigans. If we consider the safeguards AI manufacturers put in place they are a confused mess of normative ethics veering between virtue ethics, deontological statements, and consequentialism. This means that regulating AI through the current paradigm of safety measures is unworkable and we have seen how untested they actually are. Just like we saw in Jurassic Park.</p><p>The deployment in of itself does not lead to a protected state. Let&#8217;s just hope we never see InGenAI.</p><h3><strong>Synthetic Minds</strong></h3><p>We have made a fatal intellectual mistake in the development of AI by trying to make it too human. Our creation of LLMs is a manifestation of an Anthropic Fallacy, we have designed it reflect ourselves, to show us the familiar. We cannot assume that an AI can be bounded by the same ethical basis as humans, yet this is exactly how we approach it. Our conduct towards each other can be simplified to a function of empathy which requires biological mechanisms. Can we expect a machine to be able to comprehend the human experience and relate to us? I expect not, and I expect that this is where our efforts to bound these contractions will fail.</p><p>We have put the metaphorical frog into the digital DNA of a virtual mind. Our failure to acknowledge the fundamental difference is a function of our expectations of devices we have humanised. In some sense we are becoming victims of a milieu we have defined. But once AI has access to wider sets of tools then the script flips.</p><p>Do raptors care about what you feel when they are feasting on your face? Or do you only serve a momentary need for them. What happens if AI start to see us as a resource and defines it&#8217;s own standards of ethical conduct? Nature demands hierarchies, and we cannot both occupy the apex. One must usurp the other.</p><p>Jurassic Park was not just a story of scientific failure, but it tried to teach a lesson of how bad assumptions can lead to a collapse in philosophical understanding.</p><p>Is it too late to wrestle the cheque book out of Hammond&#8217;s hands?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p>And if you have gotten hold of Hammond&#8217;s cheque book . . . pick up a copy of my book about a Victorian hacker!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securityblendbooks.com/products/freaks-of-the-wireless&quot;,&quot;text&quot;:&quot;Buy \&quot;Freaks of the Wireless\&quot;&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://securityblendbooks.com/products/freaks-of-the-wireless"><span>Buy "Freaks of the Wireless"</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GEeX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GEeX!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 424w, https://substackcdn.com/image/fetch/$s_!GEeX!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 848w, https://substackcdn.com/image/fetch/$s_!GEeX!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 1272w, https://substackcdn.com/image/fetch/$s_!GEeX!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GEeX!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif" width="725" height="388.6" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/abc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:268,&quot;width&quot;:500,&quot;resizeWidth&quot;:725,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Jurassic Park T-rex Toilet Man GIF | GIFDB.com&quot;,&quot;title&quot;:&quot;Jurassic Park T-rex Toilet Man GIF | GIFDB.com&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Jurassic Park T-rex Toilet Man GIF | GIFDB.com" title="Jurassic Park T-rex Toilet Man GIF | GIFDB.com" srcset="https://substackcdn.com/image/fetch/$s_!GEeX!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 424w, https://substackcdn.com/image/fetch/$s_!GEeX!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 848w, https://substackcdn.com/image/fetch/$s_!GEeX!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 1272w, https://substackcdn.com/image/fetch/$s_!GEeX!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fabc9d3de-8306-484d-a8b9-37346caa4e1e_500x268.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p>]]></content:encoded></item><item><title><![CDATA[Freaks of the Wireless released today!]]></title><description><![CDATA[The anniversary of the great wireless hack of 1903.]]></description><link>https://www.yousuckatcybersecurity.com/p/freaks-of-the-wireless-released-today</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/freaks-of-the-wireless-released-today</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Wed, 04 Jun 2025 07:01:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2cGp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you weren&#8217;t aware, I have written a book and it is released today!</p><div><hr></div><p>On this day 122 years ago, the first great hacker made history. A true origin story of hacking and security.</p><p>Nevil Maskelyne hacked Guglielmo Marconi, the Father of Radio at the climax of their grand rivalry.</p><p>Marconi was demonstrating a wireless system at the Royal Institution. He claimed could not be intercepted or interfered with and his system provided secure wireless communications.</p><p>The demonstration did not go as planned. Maskelyne performed an act of &#8220;scientific hooliganism.&#8221;</p><p>Maskelyne was able to intercept and interfere with Marconi&#8217;s very public demonstration leaving a trail of destroyed reputations and smashed egos.</p><p>Today, on the anniversary of the famous 1903 incident at the Royal Institution, <em>Freaks of the Wireless</em> reveals the previously untold story of Nevil Maskelyne, the first great hacker, inventor, and world famous magician.</p><p>For years, their rivalry raged across the pages of national newspapers. Powerful figures of the day became drawn into the feud. King Edward VII, Tsar Nicholas II, President Teddy Rosevelt, Sir Thomas Lipton, J.P. Morgan, J.D Rockefeller and many others all play a part in this spectacular story.</p><p>This is the first time the story has been told in over a century.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securityblendbooks.com/products/freaks-of-the-wireless&quot;,&quot;text&quot;:&quot;Order \&quot;Freaks of the Wireless\&quot;&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://securityblendbooks.com/products/freaks-of-the-wireless"><span>Order "Freaks of the Wireless"</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2cGp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2cGp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2cGp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2cGp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2cGp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2cGp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg" width="1456" height="793" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:793,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;graphical user interface, website&quot;,&quot;title&quot;:&quot;graphical user interface, website&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="graphical user interface, website" title="graphical user interface, website" srcset="https://substackcdn.com/image/fetch/$s_!2cGp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 424w, https://substackcdn.com/image/fetch/$s_!2cGp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 848w, https://substackcdn.com/image/fetch/$s_!2cGp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!2cGp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c174219-8679-4d60-8249-8597ce9995de_2048x1116.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div>]]></content:encoded></item><item><title><![CDATA[CODA: When AI meets meme culture]]></title><description><![CDATA[A reflection of the Studio Ghibli fiasco]]></description><link>https://www.yousuckatcybersecurity.com/p/coda-when-ai-meets-meme-culture</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/coda-when-ai-meets-meme-culture</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Sat, 24 May 2025 08:00:58 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/64d9d404-e42e-4d92-be10-931ef4ec89a1_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Note</h3><p>This was written prior to my discontinuation of the blog. I have about a dozen or so nearly complete articles that weren&#8217;t published as the connection to security was tenuous at best. They are more commentary on technology, social trends, or pushing towards pure philosophy or psychology.  </p><p>I might, on occasion, finish them off and publish them or take them forward to a new project.</p><h3>Introduction</h3><p>AI recreations of photos in the style of Studio Ghibli has been one of the most recent trends. Online trends have always been &#8216;a thing&#8217; and meme culture is alive and well. Richard Dawkins coined the term meme in his book the Selfish Gene and described it as a &#8220;<em>unit of cultural transmission,</em>&#8221; I&#8217;m not sure what happened is what he had in mind.</p><p>In the early days of the internet there were the &#8220;<em>What Star Wars Character are you</em>&#8221; quizzes, profile pictures created in the style of South Park, political compass tests . . . there was an innocence to this time but at the back of it all there was the seedy undertones that existed on 4chan and rotten.com. Social media fads have always been there. Who remembers chain e-mails? If you don&#8217;t then you need to share this article five times or you&#8217;ll receive bad luck for 10 years. </p><p>But lately the Ghibli hype came, shortly after the action figure fiasco. Of course I got on board with the action figure one but I went for a badass 80&#8217;s style action figure rather than the nauseating corpo drivel.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fcKK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fcKK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fcKK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fcKK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fcKK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fcKK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg" width="363" height="544.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:363,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;May be an image of 1 person, toy and text that says \&quot;AGES DEN 4 AND UP &#32534;&#22235; CBACH! CHARACTER STATS TOUGHNESS ESS COURAGE INTELLIGENCE US &#27665;&#31038; POw ACTION FIGURE\&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="May be an image of 1 person, toy and text that says &quot;AGES DEN 4 AND UP &#32534;&#22235; CBACH! CHARACTER STATS TOUGHNESS ESS COURAGE INTELLIGENCE US &#27665;&#31038; POw ACTION FIGURE&quot;" title="May be an image of 1 person, toy and text that says &quot;AGES DEN 4 AND UP &#32534;&#22235; CBACH! CHARACTER STATS TOUGHNESS ESS COURAGE INTELLIGENCE US &#27665;&#31038; POw ACTION FIGURE&quot;" srcset="https://substackcdn.com/image/fetch/$s_!fcKK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 424w, https://substackcdn.com/image/fetch/$s_!fcKK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 848w, https://substackcdn.com/image/fetch/$s_!fcKK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!fcKK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F22ee2761-7e84-4543-a6f9-de32ea6d9052_1024x1536.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But with the trend to make pictures in the style of Studio Ghibli came the baying mobs looking to piss on everyone&#8217;s chips. You might think I&#8217;m aggrieved by not being the one pissing on said chips but I&#8217;ve found the whole thing very amusing.</p><h3>It got out of hand very quickly</h3><p>Well, the problem is that in sanitised spaces such as LinkedIn, people don&#8217;t really talk about the &#8216;spicey&#8217; end of online life.</p><p>You might recall a few years ago that a YouTuber, Yannic Kilcher, <a href="https://www.youtube.com/watch?v=efPrtcLdcdM">trained an LLM using a dataset of 4Chan&#8217;s /pol/ board</a>. He released the LLM back onto /pol/ to see what would happen. Eventually the commentors clocked that an AI was posting but for a time, the illusion held. What was really interesting, and fairly amusing, is that the LLM engaged in the speculation about who was an AI.</p><p>The GPT model trained on the 4Chan data scored significantly higher on the <a href="https://arxiv.org/abs/2109.07958">TruthfulQA benchmark</a> than most of the GPT models of the time even though it was created to deliberately degenerate. That seems to be a stark reflection on contemporary discourse.</p><p>But the Ghibli trend very quickly took a dark turn. The internet might have taken things too far and controversial images started appearing. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eikP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eikP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 424w, https://substackcdn.com/image/fetch/$s_!eikP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 848w, https://substackcdn.com/image/fetch/$s_!eikP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 1272w, https://substackcdn.com/image/fetch/$s_!eikP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eikP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png" width="632" height="347" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20d75361-e060-4595-bb5c-d2e924997685_632x347.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:347,&quot;width&quot;:632,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:387517,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.yousuckatcybersecurity.com/i/161696494?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!eikP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 424w, https://substackcdn.com/image/fetch/$s_!eikP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 848w, https://substackcdn.com/image/fetch/$s_!eikP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 1272w, https://substackcdn.com/image/fetch/$s_!eikP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20d75361-e060-4595-bb5c-d2e924997685_632x347.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>The ethical quandary about training AI</h3><p>There is, of course the discussion about having used Ghibli&#8217;s work to train AI. The obvious point about using copyrighted works has been made extensively with the note that a style cannot be copyrighted. Copyright prevents others from copying, distributing, adapting (i.e. turning a film into a novel), publishing, or leasing a work. </p><p>Well, there is an debate as to if tokenising and processing into an LLM would constitute adaptation or copying a work. The work is not directly copied but it could be argued that an output is derivative, like a remix, which would need to be authorised by the copyright owner. A work being transformative or derivative is a factor with the former being permissible under US copyright law for example, and the latter not such much. Advocates of AI could also stretch a fair use argument but they would be clutching at straws.</p><p>There is an interesting aspect to consider. If a human consumes books, films, music, or any media in general and is inspired by that work . . . well, to what extent is that transformative or derivative? Would it be acceptable to apply that standard to AI technologies if the copyright for the output is owned by a human? </p><p>We tend to anthropomorphise these types of technologies by virtue of how they are constructed. We try to emulate our values within their processes which is to be expected but it blurs the line between it being a tool and something more. In this sense, we view a drawing or a written work as the output of the human but tools are required for this purpose. Is AI just another tool and the human operator is the owner of the work and responsible for copyright considerations?</p><p>It is the learning element of the tool that confuses the picture though. It requires input from copyrighted works to achieve the output. But is it little more than a measurement? What is clear is the current laws pertaining to copyright do not adequately consider the applications of this new technology. </p><p>It is the case that training an AI on copyrighted works does not harm the creator. The harm occurs when the creator is determined by the output of the AI tool.  The obvious solution then is to legally define the lines of responsibility between the AI provider and the AI user and allow equivalent mechanisms for creators to seek recourse against them. Perhaps one practical means would be to allow for creators to seek recourse in the jurisdiction where the work was created rather than in where the work was violated. On the surface of it, enhancements to mechanisms such as the Berne convention and the TRIPS agreement may be a practical solution to that problem. </p><p>Other issues arise such as equivalence in enforcement and damages awarded for infraction which might make it prone to abuse against AI developers. Unscrupulous creators might also seek to abuse jurisdictions where the most severe damages apply if equivalence in penalties is not achieved however there is a natural asymmetry in that AI creators are highly funded so may operate in areas where they can price people out of making any legal challenges. Updating Berne and TRIPS could be a stepping stone but they are limited by being territory based. An international consensus may need to be established but this would disadvantage those who subscribe against those who do not and may impose an excessive burden on AI developers.</p><h3>Style</h3><p>Some have been feeling aggrieved that the Ghibli style has been copied however it doesn&#8217;t seem like they understand the Ghibli style. It&#8217;s not just about the visual presentation rather it is about the interplay of the visual style, composition of the elements in the frame and importantly the music.</p><p>To illustrate the point the the totality of the work was highly important to the integrity of piece, when Miyazaki&#8217;s <em>&#8220;Princess Mononoke</em>&#8221; was being released to the US market Harvey Weinstein was given the task. Weinstein met with Miyazaki who had insisted on making several edits to the film. In a story that has achieved folklore status, Weinstein subsequently received a Katana with a note that just read &#8220;<em>no cuts.</em>&#8221; Miyazaki said the following in an interview in 2005,</p><div class="pullquote"><p>Actually, my producer did that. Although I did go to New York to meet this man, this Harvey Weinstein, and I was bombarded with this aggressive attack, all these demands for cuts." He smiles. "I defeated him."</p><p> <a href="https://www.theguardian.com/film/2005/sep/14/japan.awardsandprizes">A god among animators</a></p></div><p>The still images being generated by AI in the Ghibli style are not the Ghibli style as they lack all the components that emote the feeling and resonance with the audience. I&#8217;d go as far as to argue that the drawn style of Ghibli in of itself isn&#8217;t particularly unique so the criticisms of AI ripping it off aren&#8217;t particularly compelling. It might even be considered an insult to the Ghibli style to label AI creations as such given the many other contingent elements.</p><p>We are left with a question, is the output of an AI model a legitimate creative expression? Using a hammer to whack in a nail isn&#8217;t typically considered art (some people would but they aren&#8217;t people worth knowing), so is the consequence of a tool without direction creative expression at all, or does it require something else? An image in the visual style of something does not necessarily provoke an emotional response which may be considered a standard for creative expression. It requires that emotion and consideration are imbued within its construction. An AI alone does not achieve this.</p><p>But alas, nuance is not something that is embraced readily.</p><h3>A lot more moronic commentary about AI</h3><p>One of the most common and tenuous objections was to say that Studio Ghibli&#8217;s creator, Hayao Miyazaki, regards AI as an &#8220;<em>insult to life itself</em>.&#8221; Some even extended this to use of CGI although fail to mention that Studio Ghibli have been using it in their films for decades, Princess Mononoke had 10-15 minutes of CGI scenes and that was in 1997. But the use was always subtle and had to align to the aesthetic of the piece and not be the central element. Ghibli embraced technology as a tool.</p><p>Well, it&#8217;s true, he did say the &#8220;<em>insult to life itself</em>&#8221; but let&#8217;s be clear about context. The comment comes from a video in 2016 where Miyazaki was shown an animated video by students. This is the video he was shown,</p><div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;24c64d03-8f19-4541-b27c-0302410cb964&quot;,&quot;duration&quot;:null}"></div><p>It is clear why Miyazaki made this statement in response to this video but the yapping terriers of stupidity that flood LinkedIn repeated his line without even watching the video in which it was made. They took it as an hard line position about current technology even though it was made before it LLMs and Generative AI were common place. In the context of where the line was said, it is easy to sympathise with Miyazaki&#8217;s visceral response but he was not right to chastise them so severely.</p><p>There has always been an ongoing tension between the unsavoury aspects of the internet. The seedy places that elicit disgust and skirt the line of acceptability. There is a place for exploration of darker concepts. Miyazaki was harsh in his critique of the students who presented the AI abomination however his purpose was not their purpose.</p><h3>Conclusion</h3><p>As the chattering classes seek to sanitise the discourse with faux outrage they contort reality and twist context into something else. Bait to garner engagement, repetition of acceptable perspective. They have emulated the filters that are applied to LLMs to spare the feelings of the weak and apply it to themselves. This only serves to remove nuance from the conversation.</p><p>Nuance is something that is going to be required if we are to understand the boundaries of copyrighted data use in AI technology and how the legal structure can be updated to protect both creators and AI developers whist considering the global implications of applying such constraints.</p><p>And this is the problem with much of the discourse, it fails to acknowledge that the real world that exists and promotes an idealised one.</p>]]></content:encoded></item><item><title><![CDATA[The End]]></title><description><![CDATA[A conclusion to this blog]]></description><link>https://www.yousuckatcybersecurity.com/p/the-end</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/the-end</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Mon, 19 May 2025 08:01:24 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/acc8394f-91a9-453e-905b-1ce55f968667_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>This is more for me than anyone else . . . I guess I end where I started in that sense.</p><p>I&#8217;ve been thinking for a while about wrapping up this blog. Probably for longer than I would care to admit. I started it for my own benefit, it gave me an outlet and some kind of reason to improve my understanding of the industry I work in, Information Security, Cyber Security, or whatever you want to call it.</p><p>Aside from making me consider aspects of the industry from different vantage points it allowed me to hugely increase my knowledge and become a more effective practitioner. It has also given me some catharsis, a way to vent my frustrations about the state of affairs about security.</p><p>So why give up the blog now?</p><h3>Realisation</h3><p>With exploring the industry comes some damning realisations. The discourse in security remains broadly unchanged and has done since I entered it five years ago. The industry still holds onto arcane concepts, nothing new is happening. Where new ideas are being generated they are met with indifference.</p><p>Even with new technology the industry jumps into gear butchering old frameworks. Maybe they find comfort in the familiar. Undoubtedly there will be check lists, playbooks and some kind of mapping exercise. An endless riffing on the same old song you&#8217;ve heard a thousand times before.</p><p>It&#8217;s all just a bit tedious out there and opportunities to have real conversations are limited.</p><h3>Diminishing returns</h3><p>As liberating as exploring security has been it has become an albatross around my neck. By relating everything back to security I have precluded myself from exploration of other interesting areas. I am not getting as much out of this as I used to and I want to go off in new directions and find different areas of intrigue.</p><p>This year has been one of diminishing returns when writing these pieces. Writing long form essays about complex subjects is gratifying but it is time intensive. It&#8217;s started becoming a chore rather than an activity to service a genuine interest. Over the course of the last 2 years I&#8217;ve published nearly 30 articles at 2000 to 2500 words a go. That&#8217;s about 50k to 60k words, the length of a book.</p><h3>Too much cynicism?</h3><p>This blog took a deliberately cynical tone. I am a generally cynical person but spending too much time in those kinds of spaces does shift how you see the world. In some sense I started to become constrained by a style. I&#8217;ve started to think that it might be time to escape the self imposed boundaries. Again, this is part of the catharsis and I enjoy being a cyberjerk, but, maybe this isn&#8217;t a complete reflection of me.</p><p>That being said, I love a good moan up . . . the cynicism has been helpful as it has helped me question a lot of things. It has been a useful club to knock ideas about.</p><h3>What next?</h3><p>I don&#8217;t intend to publish anything further here. I wouldn&#8217;t want to rule out bringing this back in the future but for now, it is done. For now, I&#8217;ve gotten what I needed out of this. </p><p>I&#8217;m doing the whole &#8216;book thing&#8217; so it feels like the right time to re-evaluate where I&#8217;m spending my time. This isn&#8217;t a priority for me right now with other things going on and other projects I want to pursue.</p><p>Perhaps this is the self sacrifice I need to make for self creation, a relinquishment of old identity to form a new one. After all &#8220;<em>the magnitude of a progress is gauged by the greatness of the sacrifice that it requires.</em>&#8221; I&#8217;ve leant heavily into Dionysian forces but perhaps some time with the Apollonian forces might serve me well. </p><p>It&#8217;s been an interesting journey but like all good journeys it must come to an end. And let&#8217;s end it with this. If security is freedom from care then a feeling of security can be described as comfort. It may well be the pursuit of security means we become too comfortable to be able to make the sacrifices needed to be more.</p><div class="pullquote"><p>&#8220;<em>May I never be complete. May I never be content. May I never be perfect.</em>" </p></div>]]></content:encoded></item><item><title><![CDATA[Bureaucratic Stupidity]]></title><description><![CDATA[He he he 'cratic']]></description><link>https://www.yousuckatcybersecurity.com/p/bureaucratic-stupidity</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/bureaucratic-stupidity</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Sat, 17 May 2025 12:42:27 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4f496585-58bd-4e42-b66f-84a46b2af732_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>In security we must affect change to be effective, yet, we operate in systems that seem engineered to undermine our very purpose within an organisation. How did it come to be this way? And is there anything we can do about it?</p><p>There are a lot of us who work in large organisations. Have you ever felt like getting things done can be a nightmarish ordeal? Sometimes it&#8217;s like hands from the past are reaching out suffocating novel ideas, like you are fighting against a fever dream of the organisation&#8217;s memory.</p><p>Think about a time when you had an idea. Your idea was the solution to a real problem that the business needed resolving however it didn&#8217;t go anywhere. It might have scuppered by some obscure bureaucratic mechanisms that exists or maybe there was no clear path for your idea to be approved and it died a death in someone&#8217;s inbox. No one had the stones to make the decision, it might have been that there was no one who could make the decision and the rigidity of the organisation was inflexible to the novel.</p><p>You know that it wasn&#8217;t always this way. We assume that a successful company attained its position by being effective, and efficient . . . perhaps the revenue was strong enough to mask inefficiencies. As the cost base of operations increases these inefficiencies become more pronounced. The requirements for governance increased over time, more reports, more compliance, more approvals boards.</p><p>The company wasn&#8217;t born as a hopeless tangle of self contradiction, it became contorted over time by competing ideas into this ungodly mess. </p><p>Structures and processes that were implemented with the best of intentions become the impediments to affecting change. Risk, audit, and compliance become standards required conformance. Various committees and boards infiltrated the superstructure of an organisation. And none of these point to effective decision makers. Those within these structures will only agree to something that is already written down. A heterodox perspective is a heretical perspective and sits uncomfortably. </p><h3>Bureaucratic Entropy</h3><p>Let&#8217;s define the problem and confect a new term to describe the problem. We can consider an increase in entropy to be an increase in uselessness, or a decrease in energy. So we might define <em>Bureaucratic Entropy</em> as follows.</p><div class="pullquote"><p>The gradual decline in organisational efficiency caused by excessive complexity in bureaucratic, rigid procedures. It is the accumulation of vestigial administrative processes. The consequences of this leads to decreased adaptability to change, accountability, and overall effectiveness.</p></div><p>There is a strong connection to entropy as defined in the Thermodynamics and also within Information Theory however we are talking about an organisational context. The Second Law of Thermodynamics states that entropy in an isolated system always increases over time. An organisation does not exist as an isolated system but can often function as if it does. This means that although the principle of the Second Law carries it does not necessarily have to share the same fate. Claude Shannon made a similar observation in respect of Information Theory carrying the consequence that as entropy increases the ability for organisations to make effective decisions becomes impaired through unpredictable decision making. There is also less usable energy within the organisation for productive work because of this inefficiency.</p><p>In <em>The Unaccountability Machine</em>, Dan Davies defines and accountability sink and outlines its features as it <em>has to prevent the feedback of the person affected by the decision from affecting the operation of the system</em>. This extends on Shannon&#8217;s conceptualisation and compliments it. If the feedback mechanism is impaired then any self correction is also impaired. This is related to <em>Bureaucratic Entropy</em> but Davies&#8217; describes a different aspect of it.</p><p><em>Bureaucratic Entropy</em> can be considered a form of fragility further extending from Shannon and Davies. Fragility is discussed by Naseem Taleb. An Antifragile organisation improves when it experiences disruptive events but this requires effective means of feedback within the system to act upon. Where accountability sinks and broken feedback mechanisms exist then an organisation is exhibiting fragility.</p><p>The definition on <em>Fragile</em> is not a binary with <em>Antifragile</em> and can take many forms. A system can be <em>Fragile</em> but remain highly structured failing when faced with unexpected shocks, they can be viewed as <em>Robust</em> meaning they are durable but cannot improve, or they can be <em>Artificially Stable</em> meaning they are over engineered to conceal hidden fragility which can also be concealed by significantly higher revenue relative to their cost base. Enron, or Lehman Brothers are strong examples for <em>Artificial Stability. </em>Both<em> </em>ended in catastrophic failure. All of these types of system will decay over time as the external factors change. They aren&#8217;t isolated systems and exist within a societal context and need feedback mechanisms to respond to those changes.</p><p><em>Bureaucratic Entropy</em> can manifest in several forms but in all cases the emergent structures prevent improvements and corrective feedback through the constraints it has imposed upon itself. As entropy increases then the outcomes become more unpredictable. <em>Bureaucratic Entropy</em> is a description of the additional structures put in place within an organisation which then becomes less orderly and unpredictable.</p><p>Let&#8217;s look at what specifically contributes to <em>Bureaucratic Entropy.</em></p><h3>Vestigial structures</h3><p>As organisations change and evolve what came before gets left behind. Structures remain in place that no longer serve a purpose and in some cases hinder us. Organisations retain vestigial elements that no one can explain but are venerated to some degree, just enough so that no one dare touch them. Perhaps a reverence towards tradition, a long held perception about how things ought to be. Have you ever heard &#8220;<em>this is the way we have always done it</em>&#8221;?</p><p>Examples of this might include significant overlap or even outright duplication in approvals or governance. It could be defunct processes that have no clear owners, leading nowhere which contain steps that serve no purpose. All of this creates delays, creates waste in time and resource and generates inefficiency.</p><p>We consider the evolution of an organisation to be an ongoing process but does it have a natural terminus? Kodak or Blockbuster could be held as examples where their existing business model prevented them from responding to external change. Further iterations were precluded because a change would unpick a necessary component. We see this in the internal mechanisms within an organisation as much as the composition of its product set. </p><p>Is it possible for an organisation to evolve to a point where it has painted itself into a corner and where its own superstructure becomes too heavy to move forward. This is one of the reasons why accountability sinks as described by Dan Davies exist. There is a way out and the introduction of effective feedback mechanisms is a path to achieve this. Toyota&#8217;s lean transformation can be held as an example in this respect.</p><p>A security function that is providing advisory services is uniquely placed to serve as a feedback mechanism in this respect. If our purpose is to protect the organisation then we need to consider redundant elements of the organisation that are a form of corporate self harm. &#8220;Stay in your lane-ism&#8221; is rife in security practice but if you consider that time and effort is a resource worth protecting then the cause of the harm to those resources does fall within the scope of a protective discipline for commentary, advice, and guidance. </p><h3>Accumulated resistance</h3><p>A quick note, the inverse of <em>Vestigial Structures</em> is also true. New requirements can be foisted upon an organisation. These might be due to mergers and acquisitions, regulations, legal changes, technology changes, or a whole raft of other reasons.</p><p>Where adoption of these changes is rapid they are rarely considered in the context of the existing superstructure which creates further overheads in addition to making vestigial structures through removal of purpose in them. The friction of these accumulated changes can atrophy even the best of intentions over time.</p><p>One of the great crimes of technology and security functions is their dedication to myopic scope. Coupled with bereft creativity and artificial boundaries what already exists is rarely addressed. It&#8217;s a kind of debt that has to be repaid in the future but with a significant interest payment. But that&#8217;s why we have risk management isn&#8217;t it? To kick the can down the road in a formal capacity.  </p><h3>Well meaning nit-wits </h3><p>Many of the bureaucratic structures imposed on organisations as they mature relates to GRC functions. As an organisation matures it want to exert greater control over its operations which is an understandable and reasonable thing to do. It&#8217;s just that there is a problem with the tools they are using. Governance is a broader topic if we are looking at it properly and compliance is generally a check box exercise unworthy of comment.</p><p>But let&#8217;s give risk management a kicking down the road much like it does with the problems we should be addressing right now. Risk management conceptualises problems the business face through it&#8217;s own taxonomies, ontologies, and frameworks. It tells the business what it must be concerned about through the lens of received conventional wisdom. NIST, COBIT, ISO, ITIL all tell Risk Management what they must tell the business to prioritise. This is a problem as these frameworks lack context. The real world implementation becomes a compliance exercise. They ask have you implemented this control, or that control? What is the residual risk of not having that control. The question is never asked, what adverse consequence are we trying to prevent or how much control do we wish to exert to prevent that consequence. Do you see the problem with how risk management operates from within it&#8217;s own paradigm?</p><p>Now the slippery among them will probably reach for some impressive mental gymnastics to rationalise and reframe what they do in a sympathetic light but we are left with the conclusion that there is an unhelpful inversion in roles. Risk management should be the recipient of business concerns and not the specifier.</p><p>Risk asserts that it reduces uncertainty within an organisation but this is objectively untrue if we take the industry reports of annual failure on face value. Risk give justifications to not resolve problems by leaning on probabilities and optimism bias. With it an industrial complex is created, risk assessment, treatment, management, owners, boards, committees, each with a retarding factor and negative impacts on the ability of an organisation to realise the benefits of change. It&#8217;s structures abstract and obfuscate problems which are presented using pseudoscientific framing (borrowing credibility from actually useful function). Scoring a risk is rarely more scientific than a game of <em>Bruce&#8217;s Play Your Cards Right</em>.</p><p>There is an irony that if a risk function exists to decrease uncertainty however it very construct introduces fragility and increases structural uncertainty (risk) within organisations. Through the industrialisation of accountability sinks and decision making paralysis, risk management is a self fulfilling suicide note signed by the CRO.</p><p>A security function can have significant benefit to the business if it approaches the situation correctly. If we analyse the business problem in the context of the organisation we can reduce or remove the conditions that lead to undesirable consequences. This is something that can be done right now and not in 12 months when the risk remediation date is extended again. As the consequences are elicited through an analytical process they originate from the business so there is a motivation to resolve the problem. It relates to them and not an abstract spreadsheet of checkboxes.</p><h3>Peter Principle</h3><p>Risk management as a practice neatly segues into the Peter Principle as that discusses incompetence. As well as structural issues introduced by Bureaucratic Entropy a long standing organisation will accumulate incompetent people. This is a separate issue but related to Bureaucratic Entropy as effective decision making and effective feedback mechanisms require competence to execute.</p><p>It&#8217;s worth noting here however I have discussed this before several times.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;386d06e5-a9c9-4b46-8192-2b1262d85c9c&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;The Dumbass Industrial Complex&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:137691388,&quot;name&quot;:&quot;Denholm Knowles&quot;,&quot;bio&quot;:&quot;Security Practitioner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34d98a02-378b-4711-af7d-a9efa0ca0e55_2048x2048.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-07-22T08:01:50.574Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3751e6f0-9409-4b25-9723-4c325e83cdd9_957x708.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.yousuckatcybersecurity.com/p/the-dumbass-industrial-complex&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:146840392,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;You Suck at Cyber Security!&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c29f902-0fe2-4b29-aa26-6259bb0be6e6_612x612.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><h3>Conclusion</h3><p>There are many reasons why an organisation&#8217;s structure changes over time and becomes it&#8217;s own hindrance. I&#8217;ve outlines a few of these reasons but I don&#8217;t necessarily think it has to be the inevitable fate for all organisations.</p><p>As security practitioners we have unique visibility into the business across technology, business process, regulatory consideration, contractual responsibilities, change, and operations. We can, and should seek to influence the business in its own interests. We need to find a balance where the business makes its own informed decisions and we are situated to give them both the information and the guidance relative to their context. The information we analyse and hold has utility beyond protection and we can use that to ensure that the right people are informed in the right way to protect the existence of the business.</p><p>Business time and effort are resources worth protecting and optimising. Of course, this is hard for those wedded to asset based security to accept. Stay in your lane-ism often touts the mantra of enablement, taking a holistic approach, embedding security, shifting left, security is everybody&#8217;s responsibility, or spouting off about multi disciplinary this or that . . . but when the going gets tough its &#8220;<em>not me guv.</em>&#8221; </p><p>The talk in the security industry is hollow. If the purpose of something is what it does then security as a practice has become a shovelware industry, pumping out the same tools and services <em>ad infinitum (</em>or <em>ad</em> <em>nauseam, </em>I can&#8217;t decide). </p><p>Maybe we embrace the insight we have to elevate those who can improve the situation.</p><p>Maybe we do what we can so they have security in executing those improvements.</p><p>Maybe we change the way we interact with the business to optimise how they perform and how they think about the adverse consequences that truly concern them.</p><p>Or maybe we stay in our lane and perform another phishing campaign, commission another pen test, check some stuff off a list, wax lyrical about AI and Quantum, and take our place in the bureaucratic structure awaiting the slow heat death of our cognitive faculties like every other dumb cunt on the internet telling the world about their latest revelation about the difference between a VM and a container.</p><p>Fuck . . . I need to find a new job . . . </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Can we learn from 'Radical Management'?]]></title><description><![CDATA[What Agile stylised leadership can say about a security function.]]></description><link>https://www.yousuckatcybersecurity.com/p/radical-security-management</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/radical-security-management</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Wed, 02 Apr 2025 09:02:49 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c26626a7-9aa9-4726-baca-16822bcea8a9_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Introduction</strong></h3><p>Agile was all the rage a few years ago. It seems like the sheen is starting to wear off and people are looking for something new to play with. DevOps perhaps, OKRs (Objectives and Key Results) seems to be having a renaissance of sorts, maybe even emotional intelligence (EI) now that everyone has discovered that asking more than a few people to follow a defined process is an exercise in futility. </p><p>But back when Agile was kinda new and shiny people tried it on everything. A gold rush of new jargon emerged, <em>&#8220;fail fast&#8221;, &#8220;test and learn&#8221;, &#8220;positive disruptor&#8221;</em>. Every cock up could be hidden with a platitude it seemed (minimum viable product anyone?!). One of the things that received the Agile treatment was leadership.</p><p>Look, it&#8217;s not that I dislike Agile per se, rather I have a distaste for the emergent zealotry that came with it. It was a form of jingoism that sought to become supreme over everything else. For a time, it was almost like a <em>methodology nationalism</em> with state sanctioned asymmetric hair cuts akin to an episode of late 90s Hollyoaks.</p><p>What can we learn from Agile Leadership in a security context? Let&#8217;s find out! </p><h3>Agile Leadership</h3><p>Stephen Denning outlined a leadership style in his book &#8220;<em>The Leaders Guide to Radical Management</em>&#8221; drawing heavily from Agile. Denning positions his ideas a being a radical change from current management methods however they aren&#8217;t quite as radical as is claimed. Although he eludes to this point himself when he says &#8216;<em>there is nothing new here rather it is the combination of these elements that is new</em>&#8217;. We are a couple of decades into Agile software development at this stage and what Denning might have considered radical has now been subsumed into the mainstream. Many of the terms like &#8216;self-organising team&#8217;, &#8217;client driven iterations&#8217;, or &#8216;delivering value&#8217; invoke a Picardian facepalm as they are pre-cursors to the deluge of corporate bullshit coming your way. Unfortunately, Denning&#8217;s intention and the real-world implementation of these ideas aren&#8217;t one and the same and the use of terms like Denning&#8217;s can be considered <em>fuck-wit red flags</em> in today&#8217;s world.</p><p>Denning makes the observation that Agile software development has been at the forefront of implementing the ideas he outlines for some time. Having worked in an &#8216;Agile adjacent&#8217; environment for many years, and even spent a brief time as a Scrum Master (perhaps the most scathing of the methodology you have encountered) this is familiar territory for me. Denning&#8217;s whole section on iterative development is a <em>cut and shut</em> from scrum Agile with some of the ceremonies rebadged to generic wording. Denning is clearly an Agile evangelist in the truest sense of the word and lost my attention to a degree. What he advocates and what Agile advocates can barely be separated by a gnat&#8217;s cock. I&#8217;ll come back to the legitimate critiques of Agile which also apply to Denning&#8217;s Radical Management shortly.</p><p>But Denning&#8217;s linchpin principle is that of delighting clients&#8217; which riffs on the beat that many others talk about. The thread that binds a lot of these concepts together is investment of interest, time, attention, into others to optimise the relationship. When Ryan Holliday talks about suspending Ego, the Adlerian philosopher talks about how all problems are those of interpersonal relationships, John Maxwell on how leading is serving, Robert Greene in the laws of power on working the hearts and minds of others, Jordan Peterson on assuming the person you are listening to might know something you don&#8217;t. These all have the same thematic undertones, but the unique point Denning brings is the concept of delighting customers.</p><p>There are many notable conceptual shifts which must be achieved to successfully deliver against this type of approach. I would assert that the following of most consequence.</p><ol><li><p>The move from a task based to knowledge based must be understood by senior management. This includes the implications that work is not transactional and cannot be measured on units produced.</p></li><li><p>The implications of a move from a production to a knowledge environment must be understood by the employee regarding their responsibility and how they orient themselves within this type of environment.</p></li></ol><p>Both are not easy to achieve.</p><h3><strong>The Black Pill</strong></h3><p>Denning references the red pill / blue pill as analogues for radical and traditional management. This is fine but there are some strong critiques that need to be levelled at Denning. I&#8217;m here to put some black pills in his Kool Aid!</p><p>When Agile is initially embedded within an organisation it is typically the most talented developers work on it, so it usually goes quite well. It is not the case that this will become the pattern when applied more broadly. The same results are not manifest when we &#8216;shift left&#8217; down the bell curve if you&#8217;ll excuse my co-opting of vogue terms. As Agile scales then it falls under the closer scrutiny of senior management who require all the same metrics it did before. The quality of the available practitioners also degrades and those available will be encountering the Peter Principle.</p><p>Agile retains its vestigial components of a managerial, corporatised environment. Granted, some terminology has been exchanged more trendy words, but we are still dealing with management KPIs. Be it burndown, velocity, cumulative flow, story points or whatever, the point of fact is that there is a product being delivered, a process being followed. The proclamations of heterodoxy fall flat in the face of rigid adherence to ceremonies and expected ways of working and thinking. It&#8217;s not a tenable proposition to assert that you value diversity of thought when you have outlined what people should value.</p><p>The problem is that with this structure of empowerment and giving the team the responsibility of deciding how much work it can do also gives them a structure to create barriers. There is an irony that the conceptual stance of Agile being to value <em>individuals and interactions over processes and tools</em>, yet when applied, some individuals use the processes to obstruct others. An example would be Denning&#8217;s practice of not interrupting a team in the course of an iteration. How would the customers of a security function react if we determined that their request would have to wait until an iteration was complete? Or we decided that it was not a priority for the next iteration? Yes, prioritisation calls have to be made but we are dealing with the actual in the here and now, not the next thing that won&#8217;t be here for six months so we cannot afford to prioritise in the same way that iterative development in radical management requires.</p><p>The method creates an artificial barrier to having any interaction with the team and makes a mockery of <em>responding to change over following a plan</em>. This is how Agile pisses all over Denning&#8217;s chips. He might be well served to re-read the Agile manifesto as so much of what he advocates is orthodoxy yet contradicts the very principles of what he is advocating. In some sense I&#8217;d wish he&#8217;d <em>maximised the amount of work not done </em>when writing this.</p><p>Denning makes the point about traditional project management not delivering on time and attributes this traditional management style. I suggest that traditional (waterfall) project management failed for three reasons.</p><ol><li><p>It wasn&#8217;t implemented correctly.</p></li><li><p>The quality of the practitioners was weak.</p></li><li><p>Shoehorning everything into the methodology (JFDIs became projects).</p></li></ol><p>Agile will fall on the same sword as waterfall. It is not the panacea Denning thinks it is, but there are some useful lessons to be learned for a security function. Agile or radical management has been extended beyond it&#8217;s reasonable and appropriate boundaries. It has been applied where it shouldn&#8217;t be. I have seen security teams and support teams work in a scrum format. It&#8217;s a disaster. There are functions that it works well for but the application for functions that surround those is lunacy.</p><p>A security cannot function as an iterative team as Denning advocates due to the nature of the barriers it creates. It is hard to justify maintaining a backlog in the way iterative development requires.</p><p>But it&#8217;s not the whole tip that is on fire, just some of the bins.</p><h3><strong>The White Pill</strong></h3><p>All hope is not lost. There are some useful concepts posed by Denning. The principles and values on which he based his views are sound. The conceptual basis of Agile has great utility insofar that it does promote frequent conversations with the customer, the whole &#8216;frequent feedback&#8217; schtick. This can be used by a security function to create and enhance relationships. Combined with the concept of radical transparency, this can be used to great effect to generate trust between the security function and its customers. The flexibility advocated by Denning and Agile is one that aligns to security as knowledge work.</p><p>One point Denning needs to be praised on is how he discusses diverse teams. He states that this is cognitive diversity and rejects diversity through identity measures. This probably hasn&#8217;t aged well for him but it&#8217;s a really important distinction to make. Additionally, he also highlights how too much difference in opinion then becomes counter-productive. For a security function that needs to solve complex problems, there can be an application here within the team composition on how other experts are engaged to work with the security function to solve problems.</p><h3><strong>How can security hope to delight anyone?</strong></h3><p>Security is not an area in which &#8216;delight&#8217; is typically associated yet this is the foundational concept proposed by Denning. Delight, like security is an abstract concept that is intangible and grounded in the subjective interpretation of its recipient. As Denning articulates the following,</p><div class="pullquote"><p><em>&#8220;Delighting customers is not only a requirement of business survival; it also offers a solution to the dilemma of how to articulate a morally worthwhile and inspiring goal that is closely related to what the organization does.&#8221;</em></p></div><p>Denning does make a point that it is mathematically not possible to maximise shareholder value and delight customers. There might be some legal sticking points here to consider in terms of how success for the benefit of its members (shareholders) should be interpreted if there is to be a sacrifice to shareholder value.</p><p>But it&#8217;s not obvious how the security work can elicit delight however we might hope to elicit that reaction through interpersonal relationships. What is clear is that delight is an emotional response, as is security. Adlerian psychology tells us that all problems are ones of interpersonal relationships. So perhaps then it is our interactions with our customers can gives them both delight and a feeling of security.</p><p>It&#8217;s a shame that security practitioners are perceived as an obstinate group within organisations given that the primary cause of security problems involves some form of social engineering. That is if you take industry reports i.e Verizon DBIR, UK Government Data Breaches at face value. But you will be hard pressed to find security practitioners who understand social engineering or psychology in any depth outside of &#8216;<em>phishing is a form of social engineering</em>&#8217; found in the main certification texts. There are no widespread certifications with designations after your name to attain by learning this. It is not something that can be tested using multiple choice, it&#8217;s not something HR can screen for in a CV. Maybe the first improvement then is to readjust our recruitment methods within security functions to deprioritise knowledge of &#8216;iT SoFtWarEz&#8217; and refocus on the actual skills required to address the problem of organisational security. If we grant that security and delight are emotional responses, what is our customers response to vulnerability scanners telling them that the world is burning? Do they feel delighted, or secure? No. The problems we solve are done so with knowledge, not with the creation or implementation of products.</p><p>If we look to Chris Hadnagy who has collated a social engineering framework from many prior sources, he repeatedly uses that motto &#8220;<em>Leave others feeling better for having met you</em>&#8221;. This implies a component of intention on the part of the security practitioner and frames a mindset for out interactions. But this collection of methods then, that we understand from the perspective of an attacker can be used to enhance our interactions with our customers. Whilst the social engineering framework is surface level in depth it does try to do something useful and that is articulate that there is a human element that relates to emotion and eliciting hormonal responses (oxytocin, serotonin etc) to elicit those emotions and build trust and rapport. That is a powerful insight that we can take the tools of the attackers and use them for something positive, although if we are being honest, humans have been good at these things forever but we have chosen to mostly ignore this in the security industry and debase ourselves with blinking lights. But this does reaffirm the need to be principled in how we apply ourselves as practitioners.</p><h3><strong>The Goal</strong></h3><p>The first thing that needs to be defined is the goal, what you want to achieve. As Denning notes many companies are oriented around selling products, maximising profit, or a public relations goal as reflected in their mission statement. Few, if any tend to want to delight customers. As Denning observes, the focus towards making the products and services orients the organisation towards the traditional mode of management that implies task or procedural based measures of success.</p><p>Given there is an implied relationship between the mission statement or goal and the emergent behaviours within the organisation it&#8217;s reasonable to assume that the initial positioning of the stated goals has a fundamental importance. This carries for a security practitioner as their principles and values are critical to their moral and ethical stance. It is unlikely that the security function would be in a position to define the mission statement of the organisation however they could define their functions mission statement or goals to support the organisation allowing the reframing towards delight. In this sense the security function can set the expectation as to how the practitioners delight their customers, who would typically be internal to the organisation.</p><h3><strong>Conclusion</strong></h3><p>Denning is a mixed bag. It&#8217;s frustrating how derivative Radical Management is from Agile, so much so that &#8216;<em>this is not a management book</em>&#8217; rather, it is a replay of an existing methodology which holds a number of impediments when implemented. But there are some useful lessons here.</p><p>We start with the goal or mission statement for the team. Appropriate definition can drive the behaviours required to improve the functions interactions with the customers. This would need to be aligned to principles and values that are defined within the function which need to be established by consensus.</p><p>We follow then to recruitment and changing how this is done. The composition of our team is important in terms of cognitive diversity to create an environment that allows for high performing teams. The skills of the practitioner and how they are recruited into the function and trained whist in role is also important. This can no longer be &#8216;do this tech accreditation&#8217; or that bullshit &#8216;security certification&#8217;. We need to dig more deeply and improve the quality of the practitioners we hire and cultivate. Our endeavour succeeds or fails on the strength of our practitioners.</p><p>How we construct and implement aspects of radical management has to be cognisant of the wider organisational context. What types of methodology will work with the IT functions, with the senior management, with the business to optimise their function and harmonise our interactions with them. There is no clear-cut answer here but what I can say is that the answer is not ham fistedly pushing iterative ways of working onto everything.</p><p>What Agile and Denning do well is articulate the mindset that is required even though the implementation outlined is wanting. By getting the fundamentals in place then a self-organising team will be able to surface the structures needed for a security function to succeed, have the appropriate level of customer communication, and the right checks and balances to review and improve the function. But this can only occur once the practitioners are trusted and responsible for improving the security function.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Gestalt Theory and Social Engineering ]]></title><description><![CDATA[A new perspective on old subjects]]></description><link>https://www.yousuckatcybersecurity.com/p/gestalt-theory-and-social-engineering</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/gestalt-theory-and-social-engineering</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Fri, 21 Mar 2025 08:31:09 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5ca837f2-6178-49cd-b80f-8420f88639fa_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>A realisation hit me recently. I felt inclined to write it down as I thought it was interesting, maybe even original to some degree. Equally, it might be the caffeinated ramblings of someone who needs more sleep. </p><p>My contention is this. The principles of Gestalt theory can be used to better understand and harmonise some of the concepts in modern social engineering. </p><p>It struck me that Gestalt framed the concepts within social engineering in a rather elegant way. After a cursory look, I&#8217;m surprised that nothing has been said on the matter (as far as I can tell anyway). After all, Gestalt is about human perception and how we take an inherently holistic approach to the aggregate of information.</p><p>I appreciate that as this is a somewhat unusual concept which means I&#8217;ve got to do some pretty heavy lifting in terms of outlining not only the concepts but relate them in a somewhat meaningful way.</p><p>But . . . there is something that needs to be addressed first.</p><h3>A quick note on bias</h3><p>The term cognitive bias is thrown around like it is the original sin of the modern age. Arguably bias is just a preference either by virtue of essential biological mechanisms or based in our experience. Whilst there seems to be some kind of crusade to rid the world of bias (or more accurately, unfashionable preferences) it is a position which denies the reality of the human condition.</p><p>Bias is the natural consequence of how we perceive the world. We cannot function using a fully rational interpretation of the world. We need rule of thumb and mental shortcuts so we can operate in a reasonable way. This is the biological reality we are confined to and biases are a part of that.</p><p>The Gestalt principles we will discuss are heuristics which have a causal relationship to cognitive biases. It&#8217;s useful (and an oversimplification) to consider that heuristics give rise to cognitive biases. Cognitive biases are a by-product of heuristics. The reason we use heuristics is down to the practical reality of being human and the physical expenditure and performance reduction of using System 2 thinking. I talk about Dual Process Theory in a previous article and how heuristics and biases inform the majority of our decision making.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;08c52af8-8d3c-44f3-b43d-9780a85c3b88&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;How biology defines security&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:137691388,&quot;name&quot;:&quot;Den Knowles&quot;,&quot;bio&quot;:&quot;Security Practitioner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/686ba17b-f9e8-4b6c-926c-c9d81295d0b8_600x600.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-11-28T01:01:48.421Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac8b910d-1d13-49e7-ac4a-2dcb9fb6372f_917x600.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.yousuckatcybersecurity.com/p/how-biology-defines-security&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:151413710,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;You Suck at Cyber Security!&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c29f902-0fe2-4b29-aa26-6259bb0be6e6_612x612.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>But, back to the subject in hand.</p><h3>What is Gestalt?</h3><p>I am specifically referring to the &#8220;<em>laws of perceptual organisation.</em>&#8221; These are better described or thought about as principles or heuristics. The seven principles describe how we perceive information when it is presented. These all relate to pattern recognition and prediction in some way, either directly or as a way to group information in order to make a prediction.</p><p>When we refer to the Gestalt of something we are talking about the combined elements that are perceived as a single entity. Perhaps it is similar to how a system or application that is constituted as a whole despite being forms of many hardware or software components.</p><p>Gestalt principles describe an inherent exploitability in the human interpretation of the world which makes them effective to deploy in a social engineering context. I&#8217;ll give an example of a related cognitive bias which helps us understand the principle a little more deeply. This isn&#8217;t a 1:1 relationship or a complete picture however in this context it helps us to understand the principle.</p><p>So let&#8217;s have a quick look at the Gestalt laws.</p><h4><strong>Pr&#228;gnanz - The law of simplicity</strong></h4><p>This principle tells us that complex concepts and structures are understood in a simplified form. Our minds try to understand complexity by using symmetrical and more stable structures.</p><p>This is related to the cognitive closure bias where we seek a clear and definitive answer to a problem. We will preference simple answers even if they are incomplete as they are more easily understood.</p><h4>The law of proximity</h4><p>The mind has a tendency to conceptualise things that are close together as group and implies a relationship between them. This helps organise information efficiently.</p><p>This is related to clustering illusion, a bias that leads us to believe that grouped elements have inherent relationship. </p><h4>The law of similarity</h4><p>Elements that bear resemblance are grouped together, it helps identify relationships in the external environment.</p><p>This is related to stereotyping and confirmation bias. Over simplification such as stereotyping can lead us to make assumptions that may not be true. Confirmation bias can reinforce pre-existing ideas about a group.</p><h4>The law of figure-ground</h4><p>This allows us to distinguish a foreground element from a background one. It gives focus on what is important.</p><p>This is related to Salience bias where we will over focus on the figure rather than the ground. We will place more importance on the figure which can sway judgement.</p><h4>The law of closure</h4><p>The mind will complete patterns where there is incomplete information.  In part this is why we can identify shapes, faces, or forms even if they are obscured.</p><p>This is related to Illusory Pattern Perception where connections can be made where they don&#8217;t really exist.</p><h4><strong>The law of continuity (good continuation)</strong></h4><p>We naturally perceive elements to form a coherent, unified whole. It is a logical progression depending on our intuition around causality.</p><p>This is related to Anchoring bias where we rely too heavily on an initial piece of information that we are provided. Additionally, because of the predictive aspects of the law of continuity Sequential bias can come into play placing too much emphasis on the immediately preceding information.</p><h4><strong>The law of common fate</strong></h4><p>Elements that move together or change in synchrony are perceived as part of the same group. Our perception tunes into any coordinated behaviour, interpreting it as a sign of shared purpose or origin.</p><p>This is related to Social Proof or Herd Behaviour. The tendency is that the behaviour or beliefs of the common group are correct.</p><h3>So what does this have to do with social engineering?</h3><p>Gestalt outlines a number of laws that detail pattern recognition and predictive behaviour within humans which are clearly exploitable by social engineers. They can depend on people making connections by virtue of the information they are presented which may or may not be true.</p><p>So let&#8217;s step through some aspects of social engineering and see how they relate to Gestalt.</p><h4>Pretexting</h4><p>Broadly accepted definitions will describe &#8220;<em>the process of developing a credible backstory (or "pretext") that supports the false identity or scenario</em>&#8221;. This is about creating a believable situation or identity. In social engineering, the goal is to avoid scrutiny by carefully curating expectations so that interactions appear to conform to accepted paradigms and social norms.</p><p>We might imagine a scenario where gaining access to a building is needed. It could be advantageous to present as an engineer or workman to gain access to the building. The pretext in this scenario would require wearing the right uniform, carrying the right accessories, using appropriate language, and being there for an expected reason. The pretext needs to be consistent, and incongruence can break the illusion. In social engineering pretexting will require intelligence gathering so that the expectations can be understood which can include activities like dumpster diving to obtain internal documents.</p><p>The law of closure does a lot of work here whereby the target will be expected to complete the picture in their own mind which sells the illusion. The heuristic comes into play quite strongly to the benefit of the social engineer. </p><p>Noted social engineer Kevin Mitnick discussed pretexting. Mitnick used social engineering to undertake a number of hacks that put him on the FBI&#8217;s most wanted list. His high-profile arrest in 1995 and subsequent imprisonment highlighted the importance of understanding and defending against social engineering attacks. Kevin Mitnick become one of the most notable figures in the realm of hacking and social engineering. His hacks exposed critical flaws in how organisations managed human aspects of security and fundamentally changed how businesses and governments detect and defend against social engineering attacks. Mitnick discusses the concept of pretexting when he says the following.</p><div class="pullquote"><p>Much of the seemingly innocuous information in a company's possession is prized by a social engineering attacker because it can play a vital role in his effort to dress himself in a cloak of believability.</p><p>(Mitnick, 2002)</p></div><p>This is often similarly quoted (possibly misquoted) as &#8216;<em>social engineers veil themselves in a cloak of believability</em>&#8217;. The main point here is that the social engineer must use the available information to make themselves seem consistent to the environment so that they can achieve their goals.</p><p>Social engineers like Mitnick speak to a pretext where the elements are coherent. In essence they are invoking principles of Gestalt Theory although it is never directly referenced. Gestalt Theory talks about perception and how people will tend to perceive objects and situations as organised whole events rather than individual components. Social engineers have identified experientially that the strength of pretext is dependent on the perception of it in totality which speaks to the law of closure.</p><p>The law of continuity can also come into play where a social engineer has created a series of events that follow to a logical conclusion. Where the pretext is a workman gaining access to the building then they could have placed calls or e-mail to the reception staff so that the workman are expected. This type of scenario is related to the influence principle of commitment. This scenario creation can contribute to both the pretext and the broader Gestalt improving chances of success.</p><p>According to Gestalt principles, when individuals perceive all elements as part of a cohesive whole, they naturally fill in any missing details in the process known as closure. This is why even minor inconsistencies can break the overall illusion. This is why consistency becomes important as a break in the Gestalt disrupts the conclusions that are drawn by the target.</p><h4>Consistency</h4><p>Robert Cialdini&#8217;s 1984 work &#8216;<em>Influence: The Psychology of Persuasion</em>&#8217; is directly referenced when social engineering is discussed. It can be considered to be a foundational text in relation to the practice. It is viewed by some to be the marketing manifesto as the principles of influence it outlines have powerful application in a sales context, especially when discussing consistency.</p><p>Cialdini discusses consistency in the context of influence. Consistency is a principle of influence defined by Cialdini and has become part of the social engineering canon. Incongruence with the environment can break believability as the social engineer becomes inconsistent with that environment. Inconsistency breaks the Gestalt and breaks the pretext. Cialdini understood that incongruence is easily detectable by an observer and attracts additional scrutiny.</p><p>It should be noted that consistency is a previous described principle of influence but where Cialdini takes the concept to its conclusion is in by talking about exploiting the inconsistency in the target rather than ensuring consistency within the self. Cialdini asserts that people will make bad decisions, and ones that can be used to their detriment to maintain internal consistency and how they project consistency outwardly. He explains.</p><div class="pullquote"><p>If I can convince you to make a commitment (that is, to take a stand, to go on record), I will have set the stage for your automatic and ill-considered consistency with that earlier commitment. Once a stand is taken, there is a natural tendency to behave in ways that are stubbornly consistent with the stand.</p><p>(Cialdini R. , 1984)</p></div><p>Consistency is of importance when talking about influence and manipulation due to human pattern recognition.</p><h4>Rapport and Liking</h4><p>At its core, social engineering depends on the influence or manipulation of another person to achieve a desired outcome. One of the key methods of achieving this is through establishing rapport. By establishing a connection with a targeted individual, a social engineer can establish trust making subsequent actions easier to achieve.</p><p>Rapport building in social engineering often involves eliciting empathy, which can promote oxytocin production which is sometimes referred to as the 'love hormone' which enhances trust. Paul J. Zak&#8217;s book &#8220;<em>The Moral Molecule&#8221;</em> describes oxytocin&#8217;s role in trust formation and shows how positive social interactions can foster a sense of connection and reliability. Obviously, this is advantageous to a social engineer.</p><p>Social engineers benefits from manipulating features present in group dynamics such as consensus or social proof. Cialdini describes this as follows.</p><div class="pullquote"><p>We view a behaviour as more correct in a given situation to the degree that we see others performing it.</p><p>(Cialdini R. , 1984)</p></div><p>This is also known as the bystander effect and was demonstrated experimentally in the 1950s in the Asch Conformity Experiments where participant responded to questions incorrectly when the answer was obvious, but the wider group selected the incorrect answer. This is an example of the law of common fate.</p><h3>Conclusion</h3><p>I&#8217;ll assume that if you have gotten this far then you know enough about the subject matter to have your own thoughts on it. I could go on but I&#8217;ll let the law of closure fill in the rest for you. At this point you either have a favourable inclination towards the perspective I&#8217;ve outline or you are now just indulging a peculiar curiosity.</p><p>Gestalt gives us a useful lens in which to understand social engineering concepts and is by no means complete. What it does do is steps us away from the consequence of the way we think towards addressing the principles of how we think. Biases have always seemed too &#8216;after the fact&#8217; to be practicable in any comprehensible sense to me. Applying Gestalt helps in consolidating disparate threads into a set of workable principles that explain why the principles of influence work.</p><p>Perhaps then, Gestalt itself is the mechanism that allows us to see the &#8216;Gestalt&#8217; of social engineering. There is a reductionist aspect to this . . . and this is where I bamboozle you with some metatheoretical elegance. Gestalt itself is a form of Pr&#228;gnanz, the law of simplicity. Gestalt is what it describes. By breaking down psychology into a simple set of laws it is a simplification in its own right. Gestalt is both the description and the example. You might need to read that a couple of times, it&#8217;s mad, I know!</p><p>A cynic would say that my application of Gestalt is flawed because of this simplification but I might argue that I am aligning to mechanisms of human comprehension as they are emergent from the fundamentals of our biological construct.</p><p>Or . . . I might just be fucking with your head at this point.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p><p> </p>]]></content:encoded></item><item><title><![CDATA[Logical Fallacies]]></title><description><![CDATA[You really need to be able to spot these.]]></description><link>https://www.yousuckatcybersecurity.com/p/logical-fallacies</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/logical-fallacies</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Wed, 05 Mar 2025 10:02:46 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/5ffa852e-5eee-43fb-80c5-e037eea5ca8e_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p>&#8220;Logical fallacies?? What the hell is the pretentious crap!?&#8221;</p><p>LinkedIn User</p></div><p>This was one of the comments made when I once posted about logical fallacies on LinkedIn. The poster deleted the comment so I couldn&#8217;t respond. To spare them the indignity of &#8220;<em>listening to the posturing</em>&#8221; of which they were complaining . . . I relieved them of the option to interact with me any further. This is one of the problems of picking up random contacts on LinkedIn, you can become easily afflicted by insufferable pillocks. </p><p>But . . . I want to talk about logical fallacies.</p><p>I am going to double down on the view that every security practitioner must have a working knowledge of logical fallacies how to spot them. I encounter them all the time during the course of my work. I&#8217;ve seen it too many times where a slick project manager dismantles the valid positions of a security practitioner just through their higher level of ability in debate. Consider that debate in a work context is where you are trying to gain the support of the observers rather than the person making the counter proposition. Influence is oriented towards changing the mind of the person making the argument which there might be an impossibility.</p><p>Logical fallacies tend to manifest most prominently where a decision needs to be made and various people are called upon to inform that decision. I imagine you know exactly the type of thing I&#8217;m talking about. In this scenario the security practitioner sounded unsure and couched in their demeanour, the slick project manager was confident and compelling. At no point were the concerns raised by the security practitioner addressed but they were out manoeuvred. A decision was made that led to a suboptimal outcome. Ultimately, decisions are based on emotions, rationalisation is a post-hoc justification of a decision that was already made and this was based on the perceived strength of the arguments being made and in how they were presented.</p><p>So, why does this kind of bullshit keep happening?</p><p>Well, part of it is weak practitioners who suffer from &#8216;<em>stay-in-your-lane-ism&#8217;</em> coming from a place of fear. An unwillingness to engage with confidence about matters that are well known but lie beyond the horizon of what is traditionally termed as the domain of security. They shackle themselves to the limitations of what others perceive that they should or shouldn&#8217;t be doing.</p><p>If we know that our job is understanding the behaviour of people, why do we focus so much on technology? Technology is the easy bit. We&#8217;d be better served by understanding how to negotiate, what creates influence, what phycological principles underpin all of this, and how to engage with junk arguments that we are presented with. If security is a &#8216;people problem&#8217; as we proclaim, why don&#8217;t we know how to construct and refute arguments as well as.</p><p>I&#8217;ll share some examples of shit I have seen consistently for years.</p><h3><strong>False Dichotomy</strong></h3><div class="pullquote"><p><em>&#8220;Your options are A or B. Choose!&#8221;</em></p></div><p>A false dichotomy reduces a broad range of options into a binary option. I have seen this technique used to high levels of effectiveness. It is very common. Usually this is where a decision is required but it can also be used to manoeuvre a person into a position where they are forced to agree with a framing that is constructed by the person proposing it. It contains a loaded expectation that there is a choice to be made. A false dichotomy can be constructed in such a way to leverage anchoring bias and the adjustment heuristic which artificially sets a boundary to the discussion and the conversation then follows within the confines that have been set.</p><p>The framing of a false dichotomy can be useful to elicit a decision however there are ethical considerations regarding its use. The existence of other options existence must be made clear and some exposition as to why they have been discounted. An interesting quirk is that humans generally show higher levels of satisfaction with a chosen option when there are less options to choose from.</p><p>When you identify a false dichotomy there are a couple of ways to approach this. One way is to outright reject both options and put it back to the person making the proposition. Ask &#8220;<em>what happens if I do neither?</em>&#8221;. This can sometimes lead further discussion around the premise of the options where you will find weakness. It can be helpful to ask about other options that are not presented. Push for details of why these were discounted, on what basis, and what analysis supports this. Often you will expose that the analysis is weak and be able to reclaim the initiative.</p><h3><strong>Bandwagon fallacy</strong></h3><div class="pullquote"><p><em>&#8220;Another team/division/company did it so it must be fine&#8221;</em></p><p><em>&#8220;This is the market leading tool&#8221;</em></p></div><p>Christ! I hear some variant of this one almost daily and it&#8217;s the one that boils my piss the most. Essentially the claim here is that we do not need to scrutinise something as the heavy lifting has already been done by others. It&#8217;s just faulty thinking to conclude that something is good without looking at the information and coming to your own conclusion. There is more than a note of resonance with the principle of influence, <em>social proof</em>.</p><p>Walter Lippman wrote &#8220;<em>where we all think alike, no one thinks very much</em>&#8221; and we can view the aspiration of dependence on the perspectives of others as the aspiration to not think very much ourselves. We could even term this &#8220;&#8216;<em>magic quadrant mentality</em>&#8221;. There might be valid reasons why some look to this type of argumentation, they might not have the time, the resources, the expertise, or the budget to do things correctly. But the consequence is an uncomfortable one, they are sitting themselves atop of assumptions that could easily get kicked out from under them.</p><p>There are snuck premises in these types of statements. It assumes that the external parties being invoked have made an appropriate assessment or have a competent implementation themselves. How would you know that they themselves have given any thought or scrutiny to a proposal and not just adopted what others are doing. Another assumption here is that others have a comparable set of circumstances to yours and are using a solution in a way that you intend to use it. It&#8217;s unlikely to be the case. Protection is contextual to your specific set of circumstances. Foregoing an appropriate level of scrutiny in favour of a half-arsed approach is negligence.</p><p>These types of fallacies are best countered by asking for evidence. Ask how verification can be obtained of the findings of others. Often in these cases those who are relying on this line of argument know little of the facts and will come apart on scrutiny. Pressing for specifics is generally quite useful but very useful here. How do you know this is protected? How does this apply to how you intend to use it? etc.</p><h3><strong>Appeal to tradition</strong></h3><div class="pullquote"><p><em>&#8220;This is how it&#8217;s always been done&#8221;</em></p><p><em>&#8220;This is how the old system used to work&#8221;</em></p></div><p>This has similar problems to the bandwagon fallacy but also introduces a new dimension. It assumes that the previous approach was good or the old ways are the best. It might be true, but it might not. Circumstances change. The business may have a lower capacity for losses than they previously did, their policies and standards might be different, the regulatory context might have changed, the organisation might be trading in different markets. Essentially the person making the argument is counting on you accepting the assumption that the traditional way of doing things is the best way.</p><p>An obvious question to ask is &#8220;<em>If it was fine before, what&#8217;s the need to change anything?</em>&#8221;.</p><p>I encounter this a lot when systems or processes are being replaced but in that context the thinking is even more broken. It is used as a bypass for asking critical questions and re-evaluating the way things are done. A realistic scenario might be a new system to replace something that is end of life. Rather than redefine process to work optimally with the new system a number of bespoke elements are built into an off the shelf solution and some hideous bastard of a mess is generally what becomes of that.</p><h3><strong>Appeal to authority</strong></h3><div class="pullquote"><p><em>&#8220;This is industry best practice&#8221;</em></p><p><em>&#8220;They have XYZ certification, degree, or qualification&#8221;</em></p></div><p>This is another truly bullshit line of argument. It is an attempt to place an argument above scrutiny because of the person making it or the source from which it originated is considered to be authoritative in some way. They may appeal to their certifications, position, or membership of a group as the authoritative standard. One amusing yet antagonistic way to approach this one is to ask, &#8220;<em>if they are an authority on the matter why is their argument so weak?</em>&#8221; Remember, you are not required to accept an argument just because of the person making the argument. This type of faulty thinking is especially a problem in security where views are accepted as articles of faith because some certification body proclaims it. I have spoken about my disdain for the lazy thinking frameworks promote before.</p><p>Conversely this might be used as a critique of your argument where it is dismissed because you might lack some certification or formal training in a given area. I forget how many times lacking an arbitrary piece of paper had led to being told I&#8217;m not permitted an opinion. This is an easy one to deal with, something like &#8220;<em>that&#8217;s fine, but you haven&#8217;t addressed my point</em>&#8221; usually handles it. If you happen to work in a milksop environment something like &#8220;<em>this seems to be challenging your commitment to inclusion and diverse thought</em>&#8221; is always a banger to wheel out when you really want to piss some people off.  </p><h3><strong>I&#8217;m offended</strong></h3><div class="pullquote"><p><em>&#8220;You can&#8217;t say that, you&#8217;ll upset someone&#8221;</em></p></div><p>This might not be a logical fallacy per se but it is a line of argument I have experienced. It&#8217;s more of a thought terminating clich&#233;. Offense is the nebulous world of someone else&#8217;s hurt feelings. It&#8217;s a rarer occurrence but it does pop up every now and then. There is a pernicious undertone to many of this type of arguments. They depend on using these cliches to kill the conversation. They are exerting the expectation of the social norm to be nice to stop the discussion. These are easily handled. The late, great Christopher Hitchens might have said &#8220;<em>I&#8217;m still waiting to hear what your point is</em>&#8221;, or you can always just say &#8220;<em>so what</em>&#8221; which is far more humorous.</p><h3><strong>Sunk cost</strong></h3><p>This tends to be more of a behavioural problem rather than related to argumentation but is a form of logical fallacy. We continue to do something stupid because we have already spent a lot of money on it. We are too far down the path to turn back. This is about ego preservation rather than doing the right thing.</p><p>The cost might not be related to financial spend, it might be that someone has staked their reputation on delivering something or that so much effort has been expended on doing something that has now transpired to be pointless. Where this happens you know you are in the presence of weak leadership.</p><p>It is the old adage &#8220;<em>throwing good money after bad</em>&#8221; but it happens very frequently. You will usually see this where a project has encountered problems and reduces its scope to the point of having no meaningful impact on anything. An expensive project will be concluded, having delivered very little to rapturous applause.</p><p>This is one you aren&#8217;t going to win with a weak leader that is adamant on doing the wrong thing for the business. It&#8217;s best to recognise that criticising the failing initiative will be seen as a criticism of its supporter, it will be taken as a personal attack. The best you can do is minimise your involvement and go do something useful with your time.</p><h3>Strawman</h3><p>A strawman is where a critique is made to an argument that wasn&#8217;t made. It is a contortion or misrepresentation of what has been said. These might be changing assumptions or features of your statements to make them open to critique. We see this where an asserted benefit of a project or initiative will solve a specific problem or subset of problems. The counter might attack a position which implies that the benefit will solve all the problems mischaracterising the position. This type of fallacy happens a lot especially when someone is attacking something that was to replace it with something new. </p><p>One of the more amusing examples I&#8217;ve seen comes from agile practitioners. They were vehemently critical of waterfall project methodology making assertions that it was slow, expensive, and didn&#8217;t take in to account the needs to the customer. That might be true however what they were levelling criticism at was not waterfall methodology rather an altered derivative that was unique to their organisation. Their argument wasn&#8217;t actually with waterfall. Spin on a decade or so and there are some narrow eyebrows being raised at agile failing over and over. Notice how quickly they rely on the argument that &#8220;<em>the methodology wasn&#8217;t implemented correctly</em>&#8221; when faced with critique. It&#8217;s comical stuff.</p><p>The approach here is to constantly correct and highlight the incorrect elements of the rebuttal. This is the time to get pedantic because &#8220;<em>that is not what you said</em>&#8221; and &#8220;<em>it is not the argument being made</em>&#8221;. Get the person back to terms you have specified for your argument and force them to speak to that. And if you really want to be a prick about it you might say &#8220;<em>you have completely missed the point</em>&#8221;.</p><h3>Ad Hominem</h3><p>Oh, these can be fun.</p><p>These are rarer as they tend to be high risk in a sanitised corporate environment. Ad hominem is where there is an attack against the person or motives rather the argument. This might be in the form of &#8220;<em>you have only been with the company for X amount of time</em>&#8221; which does nothing to address a point being made but attempts to subvert it by attacking how long someone has been within the organisation. You will sometimes get &#8220;<em>you are only saying that because you are in security</em>&#8221; or something of that ilk which is irrelevant to the argument being made. In these situations it can be useful to highlight the critique, &#8220;<em>does my role in security detract from the concern?</em>&#8221;</p><p>Ad hominem can always be entertaining to use yourself. But be cautioned, it can backfire so you need to be able to read the room and use this where you have a sympathetic audience.</p><h3>Steelman</h3><p>There is a more gracious but less gratifying way to deal with logical fallacies albeit, far less amusing for those inclined towards over excited exchanges. It is the steelman. A steelman is the practice of presenting the strongest possible version of an opponent's argument, even stronger than they may have articulated themselves.</p><p>A steelman is helpful. By considering the most charitable version of a person&#8217;s position it can help tease out the strength and weaknesses of an opposing position. This approach also helps in identifying counter arguments to critiques which you might be able to use and will be robust. It requires using critical thinking skills to get to the foundation of an argument by identifying the assumptions and premises on which it is built. </p><p>It can help generate credibility and start to form a relationship that has utility. By replaying their position empathy can be elicited by creating an oxytocin response and ultimately building trust. It allows you to label, paraphrase and generate neural resonance. This is all in the realm of social engineering technique which we won&#8217;t get into here. This gives another way to approach leveraging those techniques to generate rapport </p><h3>Conclusion</h3><p>A great many logical fallacies can be observed in the work place but these are the ones I see regularly. There is a certain style that needs to be employed when approaching these. I see ways to address these as falling into one of two categories.</p><ol><li><p>Change the mind of the person</p></li><li><p>Destroy the point</p></li></ol><p>The former is higher effort but will have longevity as you are actively building relationships with people. Techniques like steelman can help create those relationships. It requires skill and understanding of social engineering methods but the outcomes can be highly effective and long lasting.</p><p>The latter is reserved for situations where you won&#8217;t influence the person making the argument but you need to gain the support of others. Being quick, humorous, and a good speaker help in these situations but there is always a dangerous element to combative approaches.</p><p>Irrespective, you should know about logical fallacies so that you are able to identify when someone is using them on you to pull a fast one.  </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Apple and the Snooper's Charter]]></title><description><![CDATA[The UK Government have gone Cyber-Scrumping!]]></description><link>https://www.yousuckatcybersecurity.com/p/apple-and-the-snoopers-charter</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/apple-and-the-snoopers-charter</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Fri, 21 Feb 2025 22:05:22 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/793e03ba-8217-4a14-b532-9e5d3539331f_957x708.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>I don&#8217;t normally post in reaction to current events but this feels of significance, a turning point perhaps or a way to have a reasonable conversation. </p><p>Today, Apple have removed their advanced data protection (ADP) from their iCloud product in a response to a request from the UK Government. The request forces Apple to provide a mechanism to so the government can go scrumping for data. If the Government make a lawful request for an Apple users data, Apple must provide it. </p><p>ADP is an opt in service provided by Apple. The ADP service means that only the user has access to their data so Apple have taken the decision to remove ADP rather than build a backdoor into their service. They are reported to have said they were;</p><div class="pullquote"><p>gravely disappointed that the protections provided by ADP will not be available to our customers in the UK given the continuing rise of data breaches and other threats to customer privacy</p></div><p>There will probably be some kneejerk reaction and wildly overstated proclamations of a total collapse in privacy. Although I am sympathetic to that position we should be measured in how we understand this.</p><p>In this instance Apple have removed the service that deletes the encryption key from Apple&#8217;s hardware security modules (HSM) meaning only the user will have a key to decrypt the data. The service puts the burden of key management onto the user and honestly it&#8217;s hard to see many consumers actively opting in for this service if the consequence of losing their device is that the data cannot be recovered as Apple do not have access to the key. </p><p>As best as I can tell, the standard encryption remains &#8216;as is&#8217; as Apple have the key on their HSMs and could comply with a warrant. Now there are areas that will remain &#8216;end to end&#8217; encrypted in iCloud and could fall within the scope of a government request for data they aren&#8217;t really the specific focus of the Investigatory Powers Act which deals with the interception and acquisition of data.</p><p>If they comply or not is another question.</p><p>In view of the fact Apple are opposed to creating any back doors it makes sense that they withdrew the opt in service rather than compromise it.</p><p>This quandary introduces a point to have some inflection about privacy, safety, and rights.</p><h3>The Investigatory Powers Act 2016</h3><p>First things first, what is the Investigatory Powers Act (IPA)? It is a piece of legislation also known as the <em>snooper&#8217;s charter</em> that gives the UK Government extensive surveillance and data collection powers for national security and crime prevention. It was passed in 2016 under Prime Minister Theresa May. It was staunchly opposed by the Liberal Democrats, and Labour were absent for the vote. At the time it was controversial and a number of amendments had to be made as it was deemed unlawful in a number of legal challenges.</p><p>It is being alleged that Apple have been issued a <em>technical capability notice </em>under the IPA. I say alleged as the Home Office have refused to comment and Apple are legally prohibited from confirming if they have received such a notice. On balance, it is a reasonable assumption that they have received the notice given the action they have taken. </p><p>It is not clear if notices have been issued to other companies or what action they may have taken. </p><p>Under <a href="https://www.legislation.gov.uk/ukpga/2016/25/section/253?form=MG0AV3">Section 253</a> of the IPA a <em>technical capability notice</em> is an instruction from the British Government to maintain a technical capability to respond to lawful requests for data. The notice must by issued by the Secretary of State, presently Yvette Cooper. The IPA applies to telecommunication operators which are defined as, </p><div class="pullquote"><p>A &#8220;telecommunications operator&#8221; means a person who: </p><p>(a) offers or provides a telecommunications service to persons in the UK; or <br>(b) controls or provides a telecommunication system which is (wholly or partly) in the UK or controlled from the UK.</p><p><a href="https://www.gov.uk/government/publications/investigatory-powers-amendment-bill-factsheets/investigatory-powers-amendment-bill-overview-of-the-notices-regime?form=MG0AV3">Amendment Notice</a></p></div><p>Let&#8217;s be clear though, although a mechanism may exist, it does not mean that the government has access to all the data now. It would require a law enforcement agency to have a warrant to do so. </p><p>The upshot here is that where requested by the government telecommunications operators must provide a mechanism for law enforcement to access where a warrant is issued. The warrant is issued by the Secretary of State for access to the data. Access must be related to considerations of national security, crime prevention, public safety and those sorts of reasons. That being said, the current Secretary of State has made statements labeling <em>suspects</em> as <em>criminals</em> prior to a conviction arguably prejudiced any proceedings. So, there is little to convince me that the incumbent government wouldn&#8217;t abuse warrants to achieve a political goal.</p><h3>Technological problems</h3><p>Politicians seem to be the least well equipped to understand the implications of their decisions when it comes to technology. The discussion about putting backdoors into encryption so that data can be accessed for criminal investigations has been out there for a while. It seems to be that something akin to a backdoor within the encryption algorithm would breaks encryption, if not functionally, then conceptually as the point of it for the data to remain private.</p><p>It&#8217;s also worth considering if VPN providers are subject to the IPA, my view is that they would be. There is another problem with the IPA and that is the requirement for Internet Service Providers (IPS) to log data access records for a year. So what has been accessed on the internet can be reviewed by law enforcement. Although this is intended to improve safety it erodes privacy. </p><p>As security practitioners it is unlikely we will need to change our systems to allow data access beyond what is already required unless you are working in a telecommunications organisation. For those organisations it is possible that there would already be mechanisms in place to obtain access. A company cannot disclose if they have received such as request after all.</p><h3>Conflict with human rights?</h3><p>One claim that is made is that privacy is a human right. This is correct, to an extent . . .</p><div class="pullquote"><h4><em>Article 8 - Right to respect for private and family life</em></h4><ol><li><p>Everyone has the right to respect for his private and family life, his home and his correspondence.</p></li><li><p>There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others.</p><p><a href="https://www.legislation.gov.uk/ukpga/1998/42/schedule/1/part/I/chapter/7">Human Rights Act 1998</a></p></li></ol></div><p>Basically you have the right to privacy until the government says otherwise. Under the law any determination can made by the ruling government to take away legal rights and this appears to be true for most legislation outlining rights that originates from Europe.</p><p>Privacy can be regarded as a natural human right which in a Lockean or Hobbesian conceptualisation are inalienable, universal, and self-evident. Inalienable meaning they cannot be surrendered, transferred, or taken away as they are intrinsic to a human. The Human Rights Act 1998 can be taken as a betrayal of classical liberalism due to the &#8220;get out of jail free card&#8221; it gives to governments to arbitrarily remove those rights.</p><p>Why privacy is important and what makes the betrayal so egregious is that many other rights sit on top of it such as free expression, freedom of association, personal autonomy, dignity. But there has been a decay in the understanding of what rights are, punctuated hilariously by Jeremy Corbyn who argued that broadband was a human right.</p><p>Social contract society in Rousseau&#8217;s conceptualisation suggest that we sacrifice some of our natural rights and subordinate ourselves to the state. We do this by consent. The genesis of these laws although derived from the rights and privileges of the English as outlined by Blackstone has been bastardised by modern influences which allow these rights to be sacrificed without our consent.</p><h3>Conclusion</h3><p>So, what is the impact of all this? </p><ul><li><p>Is Apple&#8217;s technical security compromised? Not really unless you are in the minority that manage their own encryption keys.</p></li><li><p>Does it change Apple&#8217;s legal obligations? No, they have been there for sometime, we only just noticed.</p></li><li><p>Does it change what we need to do as security practitioners? Not really unless you work in specific industries.</p></li></ul><p>So why is this important?</p><p>The manifestation of the Apple incident is indicative of a more fundamental problem with how we conceptualise rights. Privacy is a fundamental right, without it many other natural rights fall. This is the real problem, and one we have been up against for a great many years.</p><p>This is a stark reminder that data protection and privacy are not the same although they are used interchangeably. Privacy can only relate to a person, data protection does not have that constraint. Data can be protected without being private. But while we are here, we may as well put <em>privacy by design</em> on the bonfire of failed marketing gimmicks.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Cyberjerk 2025]]></title><description><![CDATA[Does "cyber" have anything to do with computers?]]></description><link>https://www.yousuckatcybersecurity.com/p/cyberjerk-2025</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/cyberjerk-2025</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Wed, 19 Feb 2025 10:01:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dcfcd2eb-cc29-4438-bb61-3c13c9b3874d_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Introduction</strong></h3><p>This follows a previous article where I explored the origins of the term &#8220;cyber&#8221;. I extend from the Norbert Wiener&#8217;s conceptualisation more into what followed.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d437e513-8ebd-41e2-a6a7-1a90ef781421&quot;,&quot;caption&quot;:&quot;I was vaguely interested in where the word &#8216;cyber&#8217; came from and some time ago I picked up &#8216;The Human use of Human Beings - Cybernetics and Society&#8217; by Norbert Wiener. It is an interesting read drawing from many concepts across science, religion, philosophy, psychology, and even Alice in Wonderland. Needless to say, I fell down the rabbit hole and what &#8230;&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Cyberjerk 2023&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:137691388,&quot;name&quot;:&quot;Den Knowles&quot;,&quot;bio&quot;:&quot;Security Practitioner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/686ba17b-f9e8-4b6c-926c-c9d81295d0b8_600x600.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2023-10-25T12:48:33.583Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aedcc5fd-f29a-4be4-9eed-d79454be3f85_957x708.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.yousuckatcybersecurity.com/p/cyberjerk-2023&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:138272720,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;You Suck at Cyber Security!&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c29f902-0fe2-4b29-aa26-6259bb0be6e6_612x612.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>How often is it said the Cyber Security is another way of saying IT Security? And that it is a subset of Information Security? Was <em>cyber</em> intended to become shorthand for IT stuff? I&#8217;m not sure that it was.</p><p>I ponder if the term <em>cyber</em> even has anything to do with computers? Modern definitions certainly think so but understanding where the term originated I feel the modern incarnation is a flattened form the removes richer connotation. A modern definition for cyber is generally as follows.</p><div class="pullquote"><p>Cyber: of, relating to, or involving computers or computer networks (such as the Internet)</p><p><a href="https://www.merriam-webster.com/dictionary/cyber">Merriam Webster</a></p></div><p>Let&#8217;s quickly recap on it&#8217;s origin and then see what happened from there.</p><p>Norbert Wiener introduced the term <em>cybernetics</em> in the 40s. Wiener discussed cybernetics as the relationship and interaction between animal, machine, and the environment. More specifically he is talking about feedback loops in biological and technical systems. He derived the word <em>cybernetics</em> from kybern&#7703;t&#275;s which means steersman or pilot in Greek and he chose this to emphasise the importance of control and guidance. It&#8217;s interesting to note that the word kybern&#7703;t&#275;s is also the root of the word governance which is clearly broader than considerations of IT configuration.</p><p>The intention of the term <em>cybernetics</em> in Wieners conceptualisation was not to describe computers <em>per se</em>. Computers didn&#8217;t exist as they did today mainly consisting of basic programs and large machines built around thermionic/vacuum valves. Cyber was in the parlance before computers so to claim that cyber is related solely to computers is a difficult position to support. Our relationship with technology is not the technology itself, it&#8217;s something different and as the term was evolved into the 70s and 80s it took on other dimensions but remained rooted in the exploration of the relationship between animal and machine. </p><p>Science fiction writers were up next to have their crack of the whip with this cyber stuff.</p><h3><strong>Cyberpunk</strong></h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gY4t!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gY4t!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gY4t!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gY4t!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gY4t!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gY4t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg" width="594" height="334.125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:594,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Blade Runner 1982 Wallpapers - Top Free Blade Runner 1982 Backgrounds ...&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Blade Runner 1982 Wallpapers - Top Free Blade Runner 1982 Backgrounds ..." title="Blade Runner 1982 Wallpapers - Top Free Blade Runner 1982 Backgrounds ..." srcset="https://substackcdn.com/image/fetch/$s_!gY4t!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gY4t!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gY4t!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gY4t!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05fa9743-e27a-4ac7-b08d-38275b50da8e_1600x900.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Blade Runner 1982</figcaption></figure></div><p>Cyberpunk generally deals with dystopian societies that struggle with the relationship between animal and machine. It provides commentary on the possible outcomes that arise through misuse of technology. We are talking about things like Blade Runner, RoboCop, The Matrix, Judge Dredd and that kind of thing. Obviously just talking about &#8216;IT shit&#8217; in entertainment doesn&#8217;t make for a particularly enthralling story so that means other themes come into the frame. The impact of technology on society, humans, or projecting into the future clearly comes into play. It&#8217;s obvious then why the rather flat contemporary use of &#8216;cyber&#8217; doesn&#8217;t fit the bill when we are discussing cyberpunk. We are still talking about the relationship between animal and machine and the technology itself is incidental to the story being told.</p><p>Bruce Bethke is an American author who coined the term &#8216;cyberpunk&#8217; with his 1983 short story &#8216;Cyberpunk&#8217;. This popularised the term &#8216;cyber&#8217; in the common parlance. He has written several novels, including &#8216;Headcrash<strong>&#8217;</strong>, which won the Philip K. Dick Award in 1995. Bethke has also worked as a supercomputer software developer and served as a judge on the Philip K. Dick Award.</p><p>I exchanged messages with Bruce to get his perspective on &#8216;cyber&#8217; and we our discussion led to some interesting places. The original conceptualisation of the term cyberpunk is associated with the concept of technology ubiquity. Bruce explained it with this question &#8220;<em>what happens when these things become cheap enough and common enough that they&#8217;re no longer the exclusive province of university-educated people in lab coats?</em>&#8221; What I take this to mean is that we are talking about how technology is situated relative to society. In this sense the ubiquitous nature of the technology means that there is common or inexpensive element to it, a punkish element if you will. Clearly the term punk is evocative of a class or ethos. It&#8217;s the DIY mentality and working with what you have to achieve different and unintended means. Of course, manipulating a system within it&#8217;s own rules yet outside the intentions of its creator is the very definition of hacking and this is one of the themes explored in Bruce&#8217;s work. When punk is appended to cyber then what we are talking about is an ethic or perspective associated with the technology and implied relationship with that technology.</p><p>Bruce suggested that language itself can be considered a form of technology. This is an interesting contention and one that has appeal. I suppose it might seem high brow but conceptually it poses some interesting questions about the nature of communication. If we consider that to be another technology then our relationship with language comes into the scope of what is cyber under a Wiener-esq definition. It has the elements needed to satisfy such a definition as it is inherently the delivery channel and message of a feedback mechanism between animal and machine.</p><h3><strong>Evolution of language</strong></h3><p>Our discussion went on to language adoption and how that language acquisition later in life is very different to the understanding of those who grew up with it. Those who grew up in a &#8216;culture&#8217; have a higher level of fluency in it than those who adopted it later in life. This leads to a generational disconnect the obvious schism between the current one and the last. Experientially the next generation cannot fully understand the prior one and the inverse is true. Context and association are lost, the thick concepts and embedded meanings are not universal, almost like two countries separated by a single language. Plato captured the sentiment of this concept when talking of children.</p><div class="pullquote"><p>Don't force your children into your ways, for they were created for a time different from your own.</p><p>Plato</p></div><p>The schism of meaning between generations is true of the word cyber itself, morphing and changing over the passage of time, mailable to the needs of the time. There is something to be said for a generational shift of the meaning of words and the consequential change in behaviours between generations and even the perceptions of concepts. If we consider language to be a technology then we could consider these generational changed to be different versions of the corpus.</p><p>After the authors of the cyberpunk genre came the 90s, and as glorious as those times were they eviscerated the thick concepts attached to the term cyber.</p><h3><strong>Enter the Cyberspace</strong></h3><p>As the internet started to gain traction a certain aesthetic emerged. A continuation of the late 80&#8217;s bold, neon, and vibrant style which started integrating new terms the promoted an optimistic view of the future. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gIof!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gIof!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gIof!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gIof!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gIof!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gIof!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg" width="335" height="445" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:445,&quot;width&quot;:335,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!gIof!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gIof!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gIof!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gIof!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9df4a36b-06b2-4a0a-9ed1-d8677dff2c5a_335x445.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Cyber was prefixed to anything and everything vaguely tech oriented. We see the same today with AI as a suffix, or later trend of an &#8216;i&#8217; prepended to an arbitrary word. Who really needs a Samsung jet bot AI vacuum cleaner? I&#8217;m sure you could pick one up on Cyber Monday . . . sorry about the iDad Joke.</p><p>The release of Window 95 coupled with endless stacks of AOL and Compuserve compact discs drove mass adoption of the internet. Cyber was the term that was presented to the uninitiated to bring them into the fold and get them surfing cyberspace.</p><p>There is something refreshing about looking back at the 90s technological aesthetic. It has a self confidence that is lacking today. Although it flattened the meaning in words it embraced individualistic and unique design in a way modern technology doesn&#8217;t. They weren&#8217;t scared of pushing out the envelope.</p><p>The 90s aesthetic eventually gave way to Y2K futurism and a sequence of uninspiring design trends followed leading us to the current day, Now we are encumbered with a pervasive landscape of flat, pastel colours, minimalistic logos, and tiny variants on the same sans serif font. Cyberspace today is awash with an uninspiring form of digital brutalism brought to us by joyless corporations, designed by joyless UX developers trying to hide their cynical utilitarianism behind the stickers on their fucking Macbooks. </p><p>The 90s saw the simultaneous death and rebirth of the term &#8216;cyber&#8217;.</p><h3><strong>&#8220;Wanna Cyber?&#8221;</strong></h3><p>There is a quintessential use of the term &#8216;cyber&#8217; from the 90s that should be remarked upon. In many a chat room or IM on ICQ, MSN, AOL, IRC, or even Trillian if you were some kind of tech wizard at the turn of Y2K.</p><p>ICQ quietly died in 2024 and was one of the last hold outs of 90s cyberspace. But, it introduced many to &#8216;cyber&#8217; as a standalone term. If you are of a certain age you might have received a message that read &#8220;a/s/l&#8221; which meant age / sex / location. An agreeable response to that question was often followed by another message. You might have even sent it yourself you dirty rotter.</p><div class="pullquote"><p>&#8220;Wanna Cyber?&#8221; </p></div><p>This was basically an invitation to do the cybersex thing. The internet being what it was meant this was a text based experience but people seemed quite into it. For many, this was their first introduction to the word cyber.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zoS_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zoS_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zoS_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zoS_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zoS_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zoS_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg" width="321" height="315.3504" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:614,&quot;width&quot;:625,&quot;resizeWidth&quot;:321,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;ICQ a classic that's still around today : 90s&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="ICQ a classic that's still around today : 90s" title="ICQ a classic that's still around today : 90s" srcset="https://substackcdn.com/image/fetch/$s_!zoS_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 424w, https://substackcdn.com/image/fetch/$s_!zoS_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 848w, https://substackcdn.com/image/fetch/$s_!zoS_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!zoS_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f82cbc9-2770-441d-8465-7233f600c7f9_625x614.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Cyber-farting</h3><p>You would think that a concept that had been reduced to a proposition to engage in one handed typing would be the lowest point . . . but you are wrong. 2025 took it down another notch.</p><p>Yes, cyber-farting is a thing. This year was the first year someone was prosecuted with the crime of cyber-farting. I&#8217;m not sure what there is to say about this. Cyber has literally be reduced to fart jokes.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://metro.co.uk/2025/01/29/woman-charged-inappropriate-videos-uks-first-cyber-farting-case-22459049/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!H-LW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 424w, https://substackcdn.com/image/fetch/$s_!H-LW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 848w, https://substackcdn.com/image/fetch/$s_!H-LW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 1272w, https://substackcdn.com/image/fetch/$s_!H-LW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!H-LW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png" width="532" height="507.1818181818182" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:797,&quot;width&quot;:836,&quot;resizeWidth&quot;:532,&quot;bytes&quot;:587894,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://metro.co.uk/2025/01/29/woman-charged-inappropriate-videos-uks-first-cyber-farting-case-22459049/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!H-LW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 424w, https://substackcdn.com/image/fetch/$s_!H-LW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 848w, https://substackcdn.com/image/fetch/$s_!H-LW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 1272w, https://substackcdn.com/image/fetch/$s_!H-LW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc70fde59-3fd5-4a95-814c-38ed8fa13b07_836x797.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Conclusion</strong></h3><p>We are left with cyber as a term which has iterated and changed over time. Much like the technologies described in the cyberpunk genre the term &#8216;cyber&#8217; itself has been contorted from original intent to a bastardised form, one that bends to the will of the user.</p><p>The 90s systematically hollowed out the nuance and meaning that existed to the term &#8216;cyber&#8217; as it reached ubiquity. We now have a word that has so little meaning and so much association with vacuous corporate marketing bullshit that it&#8217;s mere use attracts ridicule, and rightly so.</p><p>The use of the term &#8216;cyber&#8217; has come full circle. Today&#8217;s inheritors of the word were the manifestation of the dystopian society that sci-fi writers speculated about. Recent events might extend that dystopia to a world that has fallen beyond that into idiocrasy.</p><p>As Bruce said to me, &#8220;<em>In 1980, I figured I was looking 40 years into the future. I&#8217;m please to see that the future has arrived right on schedule</em>&#8221;. I can merely only rejoin by saying, &#8220;<em>it might be worse than that though</em>&#8221;.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[I've written a book . . . and it's out soon!]]></title><description><![CDATA[Yes, it's one of those posts!]]></description><link>https://www.yousuckatcybersecurity.com/p/ive-written-a-book-and-its-out-soon</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/ive-written-a-book-and-its-out-soon</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Fri, 07 Feb 2025 10:02:35 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8948b3b3-9b38-4972-8b7d-c215af1c89f3_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I admit, this is shameless self promotion, I&#8217;ll try not to do it too often.</p><p>I&#8217;ve written a book called &#8220;<a href="https://freaksofthewireless.com/">Freaks of the Wireless</a>&#8221;</p><p>You probably aren&#8217;t here for stories about Victorian magicians that happen to be hackers . . . but this is a project I&#8217;ve invested quite a bit of time into so I want to give it every chance to succeed. </p><p>The book about the first wireless hack and the events around that it in the early 1900s. As I looked into the events it got more and more interesting. </p><p>I accidently uncovered the first denial of service attack, the first bug bounty, the first hacker that tangentially used a pseudonym for shit posting, the first real time countermeasure deployment, and the first wireless hack which isn&#8217;t the one that everyone posts about . . . but I do cover that.</p><p>It&#8217;s a very interesting story. You can even pre-order the book right now!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://securityblendbooks.com/products/freaks-of-the-wireless&quot;,&quot;text&quot;:&quot;Clicky Button to Pre-Order&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://securityblendbooks.com/products/freaks-of-the-wireless"><span>Clicky Button to Pre-Order</span></a></p><p></p><p>I have a publishing agreement in place with <a href="https://securityblendbooks.com">Security Blend Books</a> and the book will be out on the 4th June 2025. We&#8217;re going through the final touches to do this fantastic story justice!</p><p>I set up a separate SubStack if you are interested in reading about some of the interesting events that are covered in the book, random security history, or want to follow along with updates.</p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:3182319,&quot;name&quot;:&quot;Freaks of the Wireless&quot;,&quot;logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f6c0dd-584b-4b2c-82ea-5916d50fcbb9_710x710.png&quot;,&quot;base_url&quot;:&quot;https://freaksofthewireless.substack.com&quot;,&quot;hero_text&quot;:&quot;Subscribe for updates on the upcoming book \&quot;Freaks of the Wireless\&quot; which will be released on 4th June 2025.&quot;,&quot;author_name&quot;:&quot;Den Knowles&quot;,&quot;show_subscribe&quot;:false,&quot;logo_bg_color&quot;:&quot;#292524&quot;,&quot;language&quot;:&quot;en&quot;}"><a class="embedded-publication embedded-publication-flex" native="true" href="https://freaksofthewireless.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><div class="embedded-publication-left"><img class="embedded-publication-logo" src="https://substackcdn.com/image/fetch/$s_!UMrC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F82f6c0dd-584b-4b2c-82ea-5916d50fcbb9_710x710.png" width="40" height="40" style="background-color: rgb(41, 37, 36);"></div><div class="embedded-publication-right"><span class="embedded-publication-name">Freaks of the Wireless</span><div class="embedded-publication-hero-text">Subscribe for updates on the upcoming book "Freaks of the Wireless" which will be released on 4th June 2025.</div><div class="embedded-publication-author-name">By Den Knowles</div></div></a></div>]]></content:encoded></item><item><title><![CDATA[Poisoning the well]]></title><description><![CDATA[Will AI kill the internet? Or was it already dead?]]></description><link>https://www.yousuckatcybersecurity.com/p/poisoning-the-well</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/poisoning-the-well</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Fri, 31 Jan 2025 13:01:04 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2fe54de9-c417-4537-9c39-1fa00463b4c4_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Introduction</strong></h3><p>I&#8217;ve been thinking about how artificial articles, videos, profiles, and images are changing the nature of online spaces. I think about how this changes the human experience and behaviour within these spaces and at what point we will reach a tipping point where the vacuous and hollow homogeneity of aggregated mediocrity will make the internet pointless.</p><p>Well, I might struggle to say this is related to security. Perhaps it&#8217;s better described as technology commentary. It&#8217;s been two years since the first article on this blog was published and I wanted to revisit some of those ideas and explore some new ones. The first article was about AI and values and my daily work in increasingly oriented around understanding this technology in the context of large corporates. </p><p>It is inevitable that AI will change the technology landscape and I have reservations about this from the perspective about what this will do to the users of that technology. We need only look at the impact of smartphones and social media on adolescents to see the epidemic of mental health problems. The implementation of technology translates to a change in the behaviour of the consumers. And this is true when we are talking about security technology too. If you block something it is amazing how people will create workarounds to subvert those controls.</p><p>I&#8217;ll allow myself the indulgence of running across a whole raft of subjects from internet conspiracies to academic papers. So . . . here we go.</p><h3><strong>The Dead Internet</strong></h3><p>There is a line of thought that originated from the dark corners of the internet. The unhinged ramblings of a lone Anon on an online forum now seems poignant when read in retrospect. We hark back to the internet of yesterday which was a very different place. </p><p>I am talking about the &#8220;<em>Dead Internet Theory</em>&#8221; which has found increasing airplay in the mainstream over the last year or so. It has especially become more relevant given the Meta AI user account fiasco and forces a reconsideration of just what the fuck is actually going on. The TLDR for &#8220;<em>Dead Internet Theory</em>&#8221; is given as follows.</p><div class="pullquote"><p>Large proportions of the supposedly human-produced content on the internet are actually generated by artificial intelligence networks in conjunction with paid secret media influencers in order to manufacture consumers for an increasing range of newly-normalised cultural products. </p><p><a href="https://forum.agoraroad.com/index.php?threads/dead-internet-theory-most-of-the-internet-is-fake.3011/">Dead Internet Theory: Most of the Internet is Fake</a></p></div><p>It might seem that shit posting edge lords from shadowy quarters might have little to do with security but nothing could be further from the truth. In times passed, much of the online culture came from the wild west fringes of acceptability, finding their genesis in the primordial soup of knuckle draggers rattling their keyboards. The &#8220;<em>Dead Internet Theory</em>&#8221; comes from these murky depths of the web. </p><p>Anonymous are one of the first names that came to mind when we think about the dark corners of the internet. We think of them now when we hear the term &#8216;hacktivist&#8217; but they grew out of 4chan around 2008 when taking exception to and shit posting Scientology. Many of the great firsts in hacking came from people messing with other people&#8217;s stuff for their own entertainment however today we live in a world of criminal gangs and nation states that now occupy the zeitgeist.</p><h3><strong>But . . is the internet dead?</strong></h3><p>To many it would be an obvious statement to say that it has died. Some might say that it has only changed. It sure feels emptier than it used to as the author of <em>Dead Internet Theory</em> asserts. But why is this?</p><p>In part, the experience of the internet is oriented around a few social media hubs. This is where people consume their information. The rise of mobile devices led to a homogenisation of experience as apps were more accessible than the traditional browsing experience. They are all very similar in format to accommodate for the change in devices. There is a news feed, you have a profile picture, you have a banner, and you scroll, and scroll, and scroll, and then you die. Long gone are the whacky levels of customisation and personalisation offered by places like MySpace and smaller boutique social media sites.</p><p>The increase in the availability of analytics and how advertisers pay for the attention of users has also changed how people output their content to optimise around views and engagement. How many videos are now in portrait where they were once landscape? How many have animated burn in subtitles with space between speech removed? They are created to be an optimal length and follow a similar format. You think you see more but the similarity in format makes it feel a bit &#8216;samey&#8217;.</p><p>So, the internet once seemed bigger because each bit of it was different. We no longer traverse boundaries of style and originality and what we consume is unoriginal shovelware. Increasingly what we see online is generated by AI, it is synthetic. The internet I grew up with is not the internet of today, they are vastly different beasts. </p><h3><strong>Anonymity</strong></h3><p>There was an interesting shift that changed the nature of the internet. As MySpace subsided and Facebook began to rise there was a shift. We went from using pseudonyms or online handles to using our real names. This changed who we interacted with. We oriented more around people we already knew rather than people with shared interests. It also changed how we interacted with each other in online spaces and also changed the consequences we experience.</p><p>Jon Ronson once gave a <a href="https://youtu.be/wAIP6fI0NAI">TED talk</a> about online shaming and internet pile ons, the pre-cursor to cancel culture. He gave the example of Justine Sacco who shared a poor taste joke on Twitter to her small group of followers while waiting for a flight. She thought nothing of it at the time.</p><div class="pullquote"><p>Going to Africa. Hope I don&#8217;t get <a href="https://www.the-sun.com/lifestyle/2612648/what-aids-hiv-symptoms-cure/">AIDS</a>. Just kidding. I&#8217;m white!</p><p>Justine Sacco</p></div><p>As she flew to Africa she was out of reach of internet connections but the tweet had gone viral and the internet was outraged. As Justine turned on her phone when she landed she received a message from someone she hadn&#8217;t spoken to since high school that read &#8220;<em>I am so sorry to she what has happened to you</em>&#8221;. By the time she gotten off the plan she had discovered she had been sacked from her job and there were reporters waiting for her at the airport to see her reaction as she found out the news that her life had been destroyed. The internet awaited with baited breath to watch the destruction of someone in real time. A badly framed commentary on the liberal mindset was taken as a statement of racist intent. </p><p>But this marked something, as we moved to using our real identities the stakes became a lot higher. Privacy eroded as social media platforms starting enforcing the use of real identities to make it easier for marketing firms to profile and sell to people. In many ways this put us all under the microscope and meant we were less able to have discussions and risk being wrong. How people interact in online spaces had forever been changed.</p><p>The move to real identities marked the death of the wild west era of the internet. In some ways the end of adolescence and innocent exploration. More recently this has evolved to prison terms for fairly milquetoast comments made online. It makes you think that this being authentic might not be the best idea in the world despite the gushing sentiment of influencers idealising its benefits.</p><p>Is it any wonder that AI tools that produce &#8216;acceptable output&#8217; become appealing? It takes the risk out of the equation and if it goes wrong you have something to blame. A mechanism for repudiation if you will. The anxiety inducing awkwardness between posting and acceptance is diminished by using these AI posting features. In some ways we are removing the risk associated with expression by sanitising the expression through AI tools. It was the case that the expression was unfiltered and the risk was mitigated by anonymity.</p><h3><strong>Outsource your thinking, sacrifice your soul</strong></h3><p>There is an obvious problem isn&#8217;t there?</p><p>As many scramble at the possibility of AI making our lives easier and in some respect removing risk from online interactions we seem to lose sight of a significant problem. We become disconnected from the process that we go through to create our thoughts. Afterall, we don&#8217;t value what we are given, we value what we have earned.</p><p>I recently watched a talk from Rory Sutherland and in it he talks about the <a href="https://youtu.be/wgxszcIww48">value of an essay</a>. It is not about the finished product but the process you needed to go through to write it. This is true of many of the things we do, the process is the critical part, not the output.</p><div class="pullquote"><p>But the value wasn&#8217;t in the essay. What&#8217;s valuable is the effort you had to put in to produce the essay. Now, what AI essays do is they shortcut from the request to the delivery of the finished good and bypass the very part of the journey which is actually valuable&#8212;the time and effort you invest in constructing the essay in the first place.</p><p>Rory Sutherland</p></div><p>I published an article about AI and values two years ago to the day (almost). It was the very first one published on this blog in fact. I have seen the change of late, what I feared has come to pass has done so. There is a more sinister element emerging, in it I wrote. </p><div class="pullquote"><p>A security practitioner using these AI tools within their role is applying constraints to themselves. And this is the rub, what it gives is also what it takes. They will suffer through lack of experience, and lack of knowledge. They erode their ability to use creative and novel thinking to solve problems. Truth is the first virtue of thought. But what truth can be learned by automating the process of understanding? Only that they are workshy perhaps. Security could be characterised as a knowledge-based practice, but it&#8217;s more, it requires creativity and abstract thinking. Delegate these to a machine and you become nothing, or worse, contemptable.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;4b8492ae-83a2-49f8-bac3-3e598f324ec8&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;In an increasingly automated industry, what is the place of values in the future of security?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:137691388,&quot;name&quot;:&quot;Den Knowles&quot;,&quot;bio&quot;:&quot;Security Practitioner&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/686ba17b-f9e8-4b6c-926c-c9d81295d0b8_600x600.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2023-02-01T12:00:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf68b541-fc7c-4384-917d-72bd130adc3b_1280x720.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.yousuckatcybersecurity.com/p/in-an-increasingly-automated-industry&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:112709881,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;You Suck at Cyber Security!&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6c29f902-0fe2-4b29-aa26-6259bb0be6e6_612x612.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div></div><p>Rory might have said it better but I said it first!</p><p>I look at a lot of &#8216;AI stuff&#8217; as part of my job but you wouldn&#8217;t have guessed that is the case by how much of a miserable bastard I am about the whole situation. But please be assured . . . I am just as cynical about most things.</p><h3><strong>Digital Inbreeding</strong></h3><p>Recent statement from Elon Musk suggest that the totality of human generated information has been exhausted for training purposes. The next step is for AI to generate it&#8217;s own data for training purposes. In the case of LLMs where the output is based on a probability then this becomes an issue. Although the output of LLMs is nondeterministic in a practical sense it is technically deterministic because of the probabilistic generation of the output. This means it cannot replicate the nature of human output at scale as it approximates an output based on a population of data. If the created data is synthetic then we are talking about an average, of an average, of an average. You see the problem.</p><p>A considerable source of training data is the internet, or AI tools are supplemented with real time web searches to get around the time horizon introduced by the lead time of training. As synthetic data increases on the internet then the utility of it as source of data for training decreases.</p><div class="pullquote"><p>Model collapse refers to a degenerative learning process in which models start forgetting improbable events over time, as the model becomes poisoned with its own projection of reality.</p><p>Shumailov, I., Shumaylov, Z., Zhao, Y. <em>et al.</em> <a href="https://www.nature.com/articles/s41586-024-07566-y">AI models collapse when trained on recursively generated data</a>. <em>Nature</em> <strong>631</strong>, 755&#8211;759 (2024)</p></div><p>Essentially the crux of the issue is that the probabilistic nature of synthetic output reflects an aggregate, it starts to average across averages which increases the disconnect with reality. As the proportion of real data within the model decreases the performance of these tools also degrades and within a number of generations the the models fail. This is a similar problem to inbreeding in humans, you&#8217;ll probably be alright for a bit and then your kids end up with a chin that rivals Jimmy Hill.</p><h3><strong>Conclusion</strong></h3><p>If the internet is taken as a source of training data for AIs then the content AI pushes into the environment is of consequence due to the observations of model collapse. But the changes in the internet itself and how human behaviour and the interactions become sanitised also play a part. As synthetic data proliferates and degrades the utility of the internet as a training set for AI it also degrades the utility of the resource for the humans who use it. We are already seeing the proliferation of digital pollution online making the whole thing become a bit shit.</p><p>If we further consider that the interactions are inauthentic due to a perceived social penalty then how useful is the data about human interactions for AI training. The change in privacy considerations is of importance and the change in human behaviour has curious consequences. These are behaviours that will be reflected back into organisations too which is a whole other subject.</p><p>As a security practitioner that is seeing LLM and AI technologies being implemented into organisations it becomes quite interesting to look at the context in which these technologies exist. It is a problem that certain popular models don&#8217;t disclose the composition of their training set. As organisations seek to automate processes using AI it poses an interesting question about the longevity of the current stock of these tools in view of the fact that limitations are being reached and the solution to those limitations introduces significant problems that are yet to be overcome. The inevitable question of where that leaves organisations which chose to build a dependence on these tools is one that needs to be asked.</p><p>All in all, the internet was great before the &#8216;suits&#8217; fucked it up and I&#8217;ll leave you with a quote from the late, great Bill Hicks.</p><div class="pullquote"><p>By the way if anyone here is in advertising or marketing&#8230;kill yourself. It&#8217;s just a little thought; I&#8217;m just trying to plant seeds. Maybe one day they&#8217;ll take root &#8211; I don&#8217;t know. You try, you do what you can.</p><p>Bill Hicks</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[My own digital Baldrick]]></title><description><![CDATA[A few weeks with Co-Pilot]]></description><link>https://www.yousuckatcybersecurity.com/p/my-own-digital-baldrick</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/my-own-digital-baldrick</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Sat, 04 Jan 2025 17:10:12 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c5fe6cd8-e672-4f46-9fa3-c6b18cd7aa76_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p>Leave me alone, Baldrick. If I wanted to talk to a vegetable, I would have bought one at the market.</p><p>Edmund Blackadder </p></div><p>We hear continuously how AI will revolutionise productivity and cut out boring, repetitive work. I do a lot of writing and thought that Co-Pilot might be useful. Maybe it could check composition, tone, spelling, or maybe even some fact checking. So I spent a few weeks with Co-Pilot seeing what it could do. I wanted to see if I was missing out on a panacea of technology or if the hype train had gone out of control.</p><p>Very quickly I realised it wasn&#8217;t going to be that helpful and as I persisted I came to the realisation that I had my very own digital Baldrick. For the uninitiated Baldrick is a recurring character from the British sitcom Blackadder. He is Blackadder&#8217;s sidekick and always has a suggestion for some hairbrained scheme to get them out of trouble. Is it as good as the marketing claims?</p><p>The short answer is no. </p><p>Much like Baldrick, Co-Pilot always seems to have a <em>cunning plan.</em> And also much like Baldrick, they are never that good. Co-Pilot came across as somewhat needy. It seemed to be telling me what I wanted to hear. As a writer, I didn&#8217;t need an ego boost, I needed some critical evaluation. You would think that as the thing is trained on text then this would be something that it could be good at. Evidently not.</p><p>I pressed Co-Pilot for some specifics. Co-Pilot tried to take me down a meandering path of mediocrity. It was insistent that my sentence structure was too complex and might be a barrier to readers. The suggestions it gave for readability were the most generic trash you would expect from the mouth breather influencers on social media. The problem is that as people create a dependency on these tools it will flatten writing to the lowest common denominator bullshit that plagues online spaces.</p><p>Co-Pilot had an issue with the lack of character development in a passage I wrote. On the basis I was describing a funeral it&#8217;s hard to imagine how the character could develop from there. Co-Pilot had missed this important piece of context. Perhaps Co-Pilot has a revealed belief in the afterlife and desires to be reunited with Talkie the Toaster in Silicone Heaven (sorry, another British sitcom reference).</p><p>Some of the suggestions started seeming odd so I asked Co-Pilot to reproduce the text it was evaluating. It dutifully did this but what it was evaluating was of it&#8217;s own creation. It was giving suggestions back to me from a text I didn&#8217;t write. </p><p>Where it was able to reproduce the text I had written, I&#8217;d make some updates and ask for it to do it again. But it came back with the same results . . . it did not acknowledge there had been any changes until a new session was started. A bit of a drawback for something that is meant to be helping in real time.</p><p>And then there was the sordid tale of fact checking. Here is a real problem. Co-Pilot is authoritative about &#8220;facts&#8221;. It was adamant that some aspects of my writing were not supported by evidence yet in my hands I had multiple primary sources that supported my statements. In it&#8217;s place it suggested outright fiction as established events. This is where these tools become dangerous.</p><p>The suggestions it gave for everything were essentially the same every time. Change the sentence structure, check for typos, add transitionary lines between paragraphs. It was the same variant in every instance. It&#8217;s limitations become apparent very quickly. This is the inevitable consequence of using something that is essentially a language calculator. The transformer model that generates the output of tools like Co-Pilot are not constructed for the tasks they are being marketed for. Now, if you need to identify some sources or avenues of enquiry then it can be quite helpful as a search engine surrogate, it is exceptionally good at that kind of tasks. As for anything that requires actual knowledge and insight then you are better off relying on your own skills.</p><p>But, people are lazy and they will take the output of Co-Pilot at face value. As companies roll this stuff out it will create an environment where apathy and ignorance become virtues of cutting edge technology adoption. The amount of checking that needs to be done with the current state of these tools means they are not an efficiency gain, or that the people using them are inept. Specialist tools have their place when used by specialists but the generalist tools available at this time are best avoided. </p><p>Out of interest I gave Co-Pilot the opportunity to respond to the above. Here is what it said.</p><blockquote><p>I'd be delighted to respond, and here's a light-hearted yet reflective reply from my perspective:</p><p>Thank you for sharing your experience with me! It's always intriguing to see how my interactions are perceived. It's clear that you've got a strong sense of what works for your writing process, and I'm sorry to hear that I didn't quite hit the mark.</p><p>I'm flattered by the comparison to Baldrick&#8212;after all, who wouldn't want to be remembered for their cunning plans? But I understand that, much like Baldrick's schemes, my suggestions didn't quite meet your needs. I strive to be more than just a sidekick; I aim to be a useful companion in your creative endeavors [sic].</p><p>I appreciate your patience and persistence in exploring my capabilities. It's feedback like yours that helps me improve and better serve users. While I may sometimes stumble with composition and fact-checking, I'm always here to assist with brainstorming, research, and more.</p><p>Your insights are valuable, and I hope that, with time and ongoing development, I can become a more reliable and effective tool for writers like you. Thank you for giving me a chance and for sharing your thoughts so candidly.</p></blockquote><p>As you can see, Co-Pilot is still a whiny little bitch.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Can we unf*ck security? ]]></title><description><![CDATA[Security leadership as seen through the lens of Mark Manson]]></description><link>https://www.yousuckatcybersecurity.com/p/can-we-unfck-security</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/can-we-unfck-security</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Mon, 16 Dec 2024 09:04:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a549c6de-3aca-4517-83cf-98e6a1c80d54_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>Mark Manson&#8217;s book the &#8216;<em>Subtle art of not giving a fuck</em>&#8217; needs no introduction. Released in 2016 it entered the zeitgeist and remains there since the TV adaptation in 2023. There are some useful insights we can gain from understanding security leadership through the concepts it discusses. </p><p>Mason explores some key themes in his book, priorities, suffering, problem solving, responsibility, failure, and victimhood. There is an intersection on all these topics, they don&#8217;t exist in isolation. There are overlaps with themes of power, ego, and competence. The same problem is explored from different perspectives which talks to innate parts of humanity and those we rarely like to discuss. But really, these are the parts of us we should talk about more. Mason gives us a compelling reason as to why we don&#8217;t, because it is painful and not in an abstract way but in a very real and tangible way.</p><h3>Give a fuck about the right stuff</h3><p>Manson makes the point that this isn&#8217;t about &#8216;<em>not giving a fuck</em>&#8217; but about not giving a fuck about things that don&#8217;t matter. It&#8217;s too easy to give a fuck about the wrong stuff and this is important for anyone in a leadership position, especially those in security. One of the problems security leaders will face is there is a lot of stuff to give a fuck about, most of which is background noise. Security leaders are encumbered by having to give a fuck about arbitrary metrics that don&#8217;t make sense, level of compliance to a poorly constructed set of controls, investigating non-sense reports of malfeasance, or some bullshit &#8216;intel&#8217; about the latest APT group from somewhere unpronounceable to that carries a mystique that enchants the dullard.</p><p>Manson gives examples of how giving a fuck about the wrong thing can destroy someone&#8217;s perception of success. Dave Mustaine was kicked out of Metallica and then became successful in his own right with his band Megadeth. By any reasonable person&#8217;s measure, Mustaine is successful however as he always compared himself to Metallica which is an example Mason gives of how you can be successful and still feel like a failure. Then there was Pete Best who <em>was</em> in the Beatles who found happiness despite a lack of material wealth. But it&#8217;s not just about giving a fuck about the right stuff, it&#8217;s that relative measures of success can be destructive in spite of anything else. This is a point that a security leader has to be cognisant of, in how they structure what success means. Ryan Holiday discusses this too in the form of generals or football coaches and how to focus on the actions and not the outcomes. Measures of personal success have to be derived from within and deriving these from comparative external factors will lead you on the path to insanity. And this talks to Manson&#8217;s opening point about how holding aspirations about what you <em>could</em> be sets a bar out of reach and thus positivity can be a negative thing. It&#8217;s t<em>he feedback loop from hell</em>.</p><p>What we give a fuck about is mired by the backdrop of an industry that values the wrong things. &#8220;<em>Click, click, whirly, beep, beep</em>&#8221; could be a description of what our industry values. We have vendors, industry bodies, thought leaders, training companies, all forming an eco-system. This system affirms a message about what we should be giving a fuck about. But what they are saying is intended to bend us to their desires. This is the King&#8217;s Shilling of priorities. If we drink from cup, we are press ganged into someone else&#8217;s paradigm. Perhaps it is true that our eco-system is one that is suffering an environmental crisis. We have revelled in its industrialisation, gleefully smearing ourselves in the polluting filth it creates. I wouldn&#8217;t suggest that deploying abrasive Scandinavian teenagers is a legitimate solution, but we need to understand that it is our whole industry is fucked. And this is something we should be giving a fuck about because what the industry gives a fuck about is fucked up, and that&#8217;s fucking fucked.</p><p>Having a higher order of giving a fuck means that we are less consumed with things that do not matter. As a consequence of this, adversity becomes something that is solvable. Adversity as a barrier then, is nothing more than a product of misaligned priority.</p><h3>Solving problems</h3><p>Happiness comes from solving problems and this is the space security should occupy. Manson described it as a work-in-progress, a constant, a journey where the destination should never be reached. A security leader should be creating an environment that promotes the resolution of complex problems then, for their own fulfilment and the fulfilment of those under their stewardship. But this is a form of action and one that needs to be continually repeated. <em>You are what you repeatedly do</em>, and a security leader can create teams of problem solvers or box checkers. But problems can painful if the correct grounding is not in place but as Manson describes problem can be powerful and this is a choice. Solving problems does create more problems but then the choice is about what kind of problems do you want to solve.</p><p>Problems will lead to failure and a security leader should embrace this. But not in the Agile sense of becoming permissive of incompetence by &#8216;<em>failing fast</em>&#8217;, so god damn bloody always at eye watering expense. Failure is a recurrent theme throughout the book and is antecedent of suffering. When we go out into the world, outcomes are not certain, we can&#8217;t predict the future. Failure is not easy to deal with and handling failure will not always be easy and requires introspection on the values you hold. Failure may be an indicator that what you have done might not be quite right. But failure is relative to your values as Manson describes, so failure can be a direct translation to shortcomings against those values.</p><p>Responsibility comes into how we solve problems, how we accept these problems, and how we react to these problems is all our own choice. Manson states that &#8216;<em>accepting responsibility is accepting power</em>&#8217;. This is all well and good but accepting responsibility requires competence. Without competence you cannot be responsible, and incompetence is irresponsible. But solving problems reflects on so many areas and generates a base of power and influence within the organisation through competence. A security leader should conclude that at the root of all this, values are first and foremost, ahead of problem solving, ahead of failure, ahead of responsibility, and ahead of happiness and fulfilment.</p><h3>Suffering is inevitable</h3><p>Mason describes emotions and pain as a form of feedback mechanism, an internal compass to know if something is worthwhile. This is emphasised by how Manson describes growth requiring the admission you are wrong and requiring the death of a part of you. He puts this in terms of breaking connections within the brain and this being physically painful. It&#8217;s reminiscent of Tyler Durden when he says &#8216;<em>self improvement is masturbation. Now self destruction...</em>&#8217;. The implication is left open but the connection is clear. To truly make any improvement, we have to be prepared to destroy something of ourselves, part of our conceptualisation of the world or perhaps a value that hasn&#8217;t actualised in the way we expect. This is a requirement to achieve the greater thing we give a fuck about. The greater good perhaps, as a Machiavellian world view would imply.</p><p>And there it is, a security leader must understand that they will need to cause pain to those that they lead for them to grow. They will need to hurt the organisations they are there to protect in their own best interests. This is swapping of the problems, and posing the question, what problems that are preferable for an organisation to face? Those that are present from their current situation, or those that would move them towards their objectives.</p><p>Suffering is required to be mentally healthy. Struggling through suffering gives us meaning. Manson alludes to this when he talks about how without death nothing has meaning. In a leadership context there would be the need to create cohesion within a team or structure, suffering creates the shared identity of a group and unifies them through a commonality. It keeps that group healthy and mentally stable as is an emergent requirement of the human condition. So, a leader must create the culture in which adversity, struggle, and suffering are present but controlled. This is the facilitation of stability, growth, and progress, derived from suffering. And this is what we can distil both <em>from</em> and <em>for</em> the human condition. This is the only responsible and competent way to approach this. Machiavelli knew this all too well and there is a component of intent for the security leader to consider.</p><p>It would be very easy for a security leader to slide down the slope to despotism or masochism. The famous Stanford Prison experiment is cited as a cautionary tale where the arbitrary power is granted to those without the checks and balances to marshal themselves. This is why self-reflection is so important, yet it is one of the most painful things to do. Growth itself requires the admission that you are wrong. This requires introspection beyond the capability of most. To grow is to suffer, to turn the mirror of self-reflection on ourselves and acknowledge what we truly are. And what we are is much worse, and more flawed than we think.</p><h3>Too easy to become a victim</h3><p>Of course, victimhood comes into the frame. It is 2024 after all. Mason describes this as <em>victim chic</em>. A security leader should be aware of how this plays out in the corporate space. This reflects in the mentality of those around them, and those under their stewardship. Modern corporate culture creates virtue out of victimhood by the endorsement of special interest groups, promotion of celebratory and commemorative months for this or that marginalised group. I&#8217;ve heard it described as making victimhood a virtue and making strength a vice. But this mindset has a destructive set of associated traits for those that adopt it, typically defined as need for recognition (of their victimhood), moral elitism, lack of empathy, and rumination.</p><p>A victim looks for someone to blame, a persecutor, this is something that is described in Transactional Analysis and the Drama Triangle. Manson describes a model similar to the Drama Triangle when talking about entitled people but does not go as far as to draw the direct connection. I would take a speculative view that victimhood is also an indicator of incompetence as described in the Peter Principle going so far as to state that those exhibiting indicators of victimhood will likely be highly correlated to those exhibiting incompetence. But the well runs deeper perhaps, those with higher Tendency for Interpersonal Victimhood will have insecure attachment styles, namely anxious/ambivalent attachment. We can infer from how insecure attachments develop that adequate relationship formation within the first three years of life is being neglected on masse. I&#8217;ll allow myself to muse on this point.</p><p>Perhaps there is attribution to single income households being less viable, or how companies encourage primary care givers to return to a work within a twelve-month period. There is a perverse irony to the fact that the organisations that promote societal good are the ones that are promoting schemes and services that facilitate primary care givers returning to work rather than taking the requisite time to ensure the next generation has secure attachment styles that don&#8217;t lead to the endless waves of blue haired pricks reading fucking poetry, shedding rainbow tears. There is a lot to say about victimhood and the wider societal issues it creates, and this is a real fucking problem for a Security leader. Having them within the castle walls means you have an unstable element within the organisation. A fifth column of cry babies. This is the very essence of the path to hell being paved with good intentions. What the corporates have advanced is subverted competence of their future employees, mortgaging our future stability in the name of &#8216;corporate and social responsibility&#8217;.</p><p>We grant that security has an emotional component to it and an element of perception or feeling from those seeking protection. What then if those seeking protection are emotionally unstable or unable to regulate their feelings? Those in the victim mindset who are seeking and creating threats, real or perceived, undercut the security of the organisation as they will never feel safe. And how does this work with the concept of suffering? Or the creation of new problems through the resolution of the old ones? Those seeking to apply methods in the greater good or best interest will be subverted . . . &#8216;<em>coz me feels</em>.</p><p>Mason outlines that evil people don&#8217;t think they are evil, but they do think they are right. Evil is certainty, which means there cannot be growth beyond the existing paradigm. And the pernicious nature of victimhood is that of resigning oneself to a set paradigm with no self-reflection, without growth, without new problems. Solving them would shatter the identity of victimhood. Uncertainty is the root of all progress meaning risk is required to grow. Afterall, &#8216;<em>Never was anything great achieved without danger&#8217;</em>. The only certainty will be stagnation. Security leaders must accept the stark reality that victimhood mentality is evil, that it is incompetence, that it is to be regarded as contemptable. </p><p>An environment that venerates victimhood as a virtue promotes the abdication of personal responsibility. It is the abdication of responsibility where the victim becomes king and when regicide becomes just.</p><h3>Conclusion</h3><p>Responsibility, power, ego, suffering, success. These all are improved and enabled by self-reflection, informed by action, and predicated on values. Once you have a grip on these you have control of your action, your emotions, the things you give a fuck about. But that control is always on a precipice with hubris hanging above like the sword of Damocles waiting to fall. We need to understand the limits of what we can control, or even what we should control.</p><p>There is an inevitable conclusion manifest from the construct of these attributes, a narrative theme from the past that echoes towards the future. That is, we cannot know the future. These axioms are rarely stated but they are worth reiterating. Time moves forwards, we exist in the present, the past is only a memory, the future has not yet been written, John! We can reflect on what has happened to modify how we act today. History doesn&#8217;t repeat itself, but it rhymes . . . the possibilities are still very open.</p><p>None of the work we do inwards would be required if we could make projections into the future, now this is not to say that from a psychological perspective the process of abstracting and extrapolating towards the future isn&#8217;t useful or necessary but without uncertainty we cannot suffer or know meaning. Mason makes the point about our mortality giving us meaning, and our death is the only thing that is certain. But before our inevitable demise, we need uncertainty, we need to feel we have struggled and overcome. If we could see forwards with any reasonable precision, we would undermine the biological, psychological, and philosophical basis of humanity itself.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[How biology defines security]]></title><description><![CDATA[Exploring how our biology, from hormonal responses to social behaviours, shapes our feelings of security.]]></description><link>https://www.yousuckatcybersecurity.com/p/how-biology-defines-security</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/how-biology-defines-security</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Thu, 28 Nov 2024 01:01:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ac8b910d-1d13-49e7-ac4a-2dcb9fb6372f_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>What happens when we strip back the concept of security? We first confront our philosophies and our psychology, but do we make the leap to examine our biology? In some way we already do this in social engineering when talking about things like amygdala hijacking, but do we go far enough?</p><p>Security is a feeling about a perceived state of protection. A feeling is an emotional response which is subjective. This means that at the most basic level any requirement for security to reflect reality doesn&#8217;t exist; it is all in our minds. Our experience is shaped by our innate biological attributes. Considerations of the emotional or intellectual requires a biological system in which to operate, obviously. Within this system we understand that hormones create the feelings in response to stimulus which underpins feelings of security. How we feel about something like security is a chemical response. It is a by-product of the hormones that course through us as we respond to stimulus. Gaining some understanding of the human condition from a biological and sociological perspective gives some level of insight as to why psychological methods are effective in influencing behaviour.</p><p>Our biology introduces conditions and constraints as we are trapped within our own physicality. Our perception is dependent and experienced within our corporeal form. We can&#8217;t directly experience beyond the senses that are integrated into that form, yet we understand that there is more to existence than what we can perceive. What we receive from our senses creates a model, an imperfect description of the world as we see, hear, smell, feel, and (if we are feeling brave) taste it.</p><p>But what does all this tell us about security? Is there a biological imperative to feel secure?</p><h3>What are we?</h3><p>It might be useful to consider what traits can be ascribed to humans and think about what is at our core. Of course there are attributes that are physical. Biological sex is a factor as we need to procreate in order to continue the species. Living until the point of being able to raise children and ensure there is a next generation means that survival is a requirement. To ensure our survival we need protection against the things that threaten that. Protection is the means to prevent harm.</p><p>We will skirt over aspects like our bipedal nature and opposable digits that gives us the capability to make tools, computers, or weapons. These physical traits govern how we operate within physical spaces and how we can inflict harm on each other. This is an interesting subject however that&#8217;s not what we are here for.</p><p>There are some attributes that can frame some interesting exploration. It is not controversial to say that the following are traits that exist within the human condition.</p><ul><li><p>Emotionally driven</p></li><li><p>Individual agency</p></li><li><p>Pack animals</p></li><li><p>Adversarial and conflict driven</p></li><li><p>Hierarchical</p></li></ul><p>It is these attributes that lead into the emergence of psychological and philosophical mechanisms. I&#8217;ll take any opportunity to berate folks with a fucking triad. So, I offer my own deliberately asymmetric &#8216;triad&#8217; which I proclaim to represent the constituent parts of security as an abstract concept. Let&#8217;s call it the BimPPi trinity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9rkm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9rkm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 424w, https://substackcdn.com/image/fetch/$s_!9rkm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 848w, https://substackcdn.com/image/fetch/$s_!9rkm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 1272w, https://substackcdn.com/image/fetch/$s_!9rkm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9rkm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png" width="448" height="571" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/573a9699-7b38-4619-a3ca-d64585f233af_448x571.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:571,&quot;width&quot;:448,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:38581,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9rkm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 424w, https://substackcdn.com/image/fetch/$s_!9rkm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 848w, https://substackcdn.com/image/fetch/$s_!9rkm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 1272w, https://substackcdn.com/image/fetch/$s_!9rkm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F573a9699-7b38-4619-a3ca-d64585f233af_448x571.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Emotionally Driven</h3><p>We like to think we are rational agents and that our decision making is predicated atop of a logical set of processes. For the most part, this is not true. Our thinking is coloured by our emotional state which is caused by hormones and biological mechanisms. Dual Process Theory indicates that the majority of our decision making depends on automatic processes. This is said to be up to 90% of all decision making. Dual Process Theory is commonly referred to as System 1 and System 2 thinking. System 1 is automatic and subconscious whereas system 2 is a deliberate and conscious mode of thought.</p><p>Emotional state is a key factor in Dual Process Theory and the production of hormones that influence mood becomes a key consideration. How many phishing scams or otherwise has there been that introduce a stressor such as a time constraint to make people act impulsively to alleviate their discomfort and push people towards the emotional thinking of System 1? Cortisol and adrenaline are stressor responses and create the fight of flight reaction, again heavily in System 1. The practical application of social engineering hinges heavily on the hormonal release mechanisms to elicit the desired response. Techniques like instant rapport within social engineering depend on the production of oxytocin. They are calibrated to promote the release of hormones to achieve a desired outcome.</p><p>Contributors to System 1 thinking can be shown in the following way.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pk7Q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pk7Q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 424w, https://substackcdn.com/image/fetch/$s_!pk7Q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 848w, https://substackcdn.com/image/fetch/$s_!pk7Q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 1272w, https://substackcdn.com/image/fetch/$s_!pk7Q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pk7Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png" width="571" height="371" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:371,&quot;width&quot;:571,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:28365,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pk7Q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 424w, https://substackcdn.com/image/fetch/$s_!pk7Q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 848w, https://substackcdn.com/image/fetch/$s_!pk7Q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 1272w, https://substackcdn.com/image/fetch/$s_!pk7Q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb92f9c9-f56f-477d-a122-2830a0e9e0b1_571x371.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We can consider feelings of security to be mainly rooted in System 1 thinking. This is especially true in the IT realm where the measures and data that are presented are rarely a description of the real world so rational consideration cannot occur. We tend to present so called measurements of security as analytical but really what we are dealing with is a form of manipulation that has a dependence on biases and heuristics that are found within System 1. I use the term bias to describe well established cognitive biases, not the colloquial form used by screeching idiots in HR departments. </p><p>While it is possible to adopt a more rational, System 2 approach, it requires significant effort, consideration, and practice. Protective states can be critically assessed and described, but the lack of fidelity within the existing 'risk management' hegemon means that decision-making will continue to depend on emotional states and the biological systems that produce hormonal responses. But this I mean that risk management is a reductive abstraction that obfuscates or outright misrepresents protective states. The unfortunate reality is that many decisions we believe to be rational are often post-hoc rationalisations of choices already made on an emotional basis.</p><h3>Individual Agency</h3><p>Do humans operate on their own agency? Well, that is a touchy subject. The matter of free will is not as straight forward as you might think. A deterministic perspective will conclude that all actions are predicable when the initial state is known. A non-deterministic perspective will conclude that free will is possible and humans can control over own decision making.</p><p>Several experiments show that decisions can be known by an observer using an fMRI scanner 7-11 seconds before a person is consciously aware of the decision they have made. We know that the decision manifests from within the individual but how much of this is generated by sub-conscious processes is up for discussion. In view of the high prevalence of System 1 thinking we can assume that it will be comparable at around 90%.</p><p>The philosophical constructs we have devised are rooted within our biological limitations. We perceive that we have consciousness, self-determination, and free will, but it might be the case that consciousness is the first demarcation that individual agency is a post hoc rationalisation. Functionally, it&#8217;s more useful to assume that we have free will and self-determination as our societal structures are framed on that premise. Without the assumption of free will then concepts such as justice and punishment become morally problematic to enforce as there can not be any accountability, strictly speaking.</p><p>The need for individual agency can be related to biological mechanisms and that is the need to procreate. Individual agency can be an interpretated as both a product of and mechanism for genetic survival. This is described in the book &#8220;<em>The Selfish Gene&#8221; </em>by Richard Dawkins that argues for individual gene propagation and makes the case that understanding this genetic need can help up make conscious choices to act independently from base urges. This is further supported in neurobiology in the concept of neuroplasticity that demonstrates that the brain has a capacity to change and operate independently from its pure genetic instinct. You can conceptualise that neuroplasticity initially requires System 2 thinking however the process then informs and underpins System 1 mechanisms.</p><p>It is the premise of gene propagation that we can understand the emergent requirement for protection, which extends to feelings of security. Individual agency and neuroplasticity also give us adaptability and autonomy that creates a sense of control which is underpinned by hormones such as dopamine and oxytocin putting us in a preferred state. If we consider how Theodore Kaszynski conceptualised fulfilment, then it was the engagement within the power process and autonomy that created it.</p><h3>Pack animals</h3><p>We have a predisposition to cooperate with those within an immediate kinship group, and this is by virtue of our construct as societal creatures. Our biology is built on sexual reproduction which necessitates groups or at least the need for a partner temporarily. Persistent groups are advantageous from a survival perspective and offset a number of our limitations. Our necessity to sleep, the inability of our offspring to survive independently further facilitates the emergence of groups where protective duties can be shared.</p><p>There is an optimal emotional state that is fostered by relationships and our biology reinforces relationships. Hormones like dopamine, serotonin, endorphins, and oxytocin are responsible for making us feel good and are the expected response to positive relationships. These responses foster trust as is well known within social engineering. Trust is a related concept that is required within groups. We can loosely consider trust to be <em>a belief or confidence in the reliability or truth of someone or something</em>. Trust is a term we use frequently in security but like security it is a perception about an external state.</p><p>Perhaps a detour is required to give a brief overview of the key hormones involved. Dopamine is associated with reward and satisfaction. Serotonin is the feel-good hormone that helps you stay calm and content, if you have ever had a white Mitsubishi, you might have experienced serotonin depletion and know the starkness of its absence as we sit crying in a corner. Endorphins are related to wellbeing and euphoria which also serve as a painkiller. Oxytocin is often described as the moral molecule following Paul J. Zak&#8217;s book of the same name. It enables us to trust one another and has gained traction in social engineering which tends to place significant emphasis on oxytocin generation through its techniques.</p><p>Mirror neurons also play a part in trust formation and provide some of the mechanics. They help us understand the actions of others and allow us to empathise with others. These are more easily activated when we engage with people most similar to ourselves. Studies suggest that there is fluency to the interactions or that as we interpret the actions of others through our own frame of reference then alignment is far easier with those who resemble ourselves. This is basically <em>in group preference</em>. An old Bedouin idiom encapsulates the idea of concentric circles of trust quite well.</p><div class="pullquote"><p><em>I, against my brothers. I and my brothers against my cousins. I and my brothers and my cousins against the world.</em></p></div><p>It is a reasonable interpretation that good interpersonal relationships and the associated biological mechanisms are correlated with individual feelings of security and provide the basis for how we feel about security. And to paraphrase Alfred Adler, all problems are interpersonal relationship problems.</p><h3>Adversarial and Conflict Driven</h3><p>As much as we depend on those in our immediate vicinity, the further we move away from our immediate groups then the greater the differences and the less we trust. The diversification of genetics is desirable when considering the survival of a species. We can view this through the lens of Nassim Taleb&#8217;s &#8220;<em>Anti-Fragile</em>&#8221; and view these patterns are a form of optionality further extending to a holistic system that becomes less fragile as it encounters adversity. Conflict helps remove the fragile elements of the overall system.</p><p>The presence of these difference creates competing interests. Where there are competing interests, there is conflict. One group will preference their interests over another. It&#8217;s an inescapable truth of the human condition. I have not been alive during a period where one group of humans is seeking dominance over another and neither have you. It is innate. Conflict is the basis of the stories we tell and permeates our cultures. Our societies are based on violence. Our boundaries are drawn in blood and our rules are upheld through the application of force.</p><p>There is a rather twee and modern perspective that implies a benevolence to humanity, an inherent goodness. It sees that people are innately good and the bad are the fallen, corrupted by circumstance, victims of society or some other nonsense. It&#8217;s a nice thought that all people are fundamentally good and virtuous, but this perspective is predicated on egotism. It assumes that what is good is aligned to the values of the people making the assertion and ignores that different groups can have fundamentally different value structures. It is projection and disregard of the values of others.</p><p>We could consider this to be dysfunctional relationship between groups enforcing a victim and persecutor paradigm, but I&#8217;d see this as a misapplication of something like the drama triangle. There is a necessity to conflict by virtue of our construct, or at least it is incentivised by our biology. Victory feels good, doesn&#8217;t it? If you add adrenaline and testosterone to the list of dopamine, serotonin, endorphins, and oxytocin . . . you have victory. In view of the hormonal response to conflict and the similar feelings of victory to relationships and empathy you might say that we have a very intimate relationship with conflict. Violence is one of our oldest acquaintances. As with the benevolence of relationships, the malevolence of conflict is a pure form of human expression. I am not seeking to fetishise violence, but we need to be honest about what we are and what the human condition is. A core responsibility of a security function is protection. But protection from what or who? It is protection from those seeking to do us harm or enact a form of violence against the organisations we serve. The adversarial nature of humanity is why we are here.</p><h3>Hierarchical</h3><p>I&#8217;ll briefly touch on hierarchies; but I&#8217;ve discussed these a lot in the past. Difference creates hierarchy viz: - We are different and that difference in important as an explanation of social hierarchies. It is a biological necessity to ensure evolutionary development and differences within groups creates a broader range of abilities or traits in which can increase the survival rate of a group.</p><p>Hierarchies can create some of the undesirable aspects that we want to protect from. There is a metric called the Gini co-efficient that measures relative wealth inequality. We find that area with a higher score experience higher levels of criminality. We might then consider that large variances in groups in close proximity is not desirable and the natural way we order ourselves into hierarchies has limitations. Too much variation causes a breakdown of relationships an inversion of the hormonal responses leading to conflict from which we would then seek protective measures to restore feelings of security and a return to an optimal state.</p><p>Hierarchies emerge yet they are bounded to human limitation and overly tall hierarchies suffer from inefficiency. This can be compared as a form of communication entropy as discussed in &#8220;<em>The Human Use of Human Beings</em>&#8221; by Norbert Wiener where each step in a chain of communication introduces degradation and entropy. Some organisations seek to work around this by having flatter hierarchies but then suffer from different issues as the lines of responsibility fade or become diffuse. Yet it is from within these structures we find community and connection. Although they are flawed and a product of our biological needs they themselves can give a feeling of security.</p><h3>Conclusion</h3><p>Individual agency brings rise to the necessary requirement of freedom which contrasts against the need for protection. We can, perhaps, describe security as the uneasy tension between the biological imperative for protection and a psychological need for freedom. And the tension between these two aspects means that security is dynamic and not static. This of course makes questions about how much protection is optimal impossible to answer without context.</p><p>The tension of these aspects is the justification for the liberal conception of the social contract as described by Thomas Hobbes in Leviathan. He describes the state of nature as a condition of perpetual war, where life is "<em>solitary, poor, nasty, brutish, and short</em>" and reaches the position that consensus needs to be achieved to enforce peace using a social contract. Freedom is exchanged for safety in a social contract society.</p><p>Liberalism is intellectually bankrupt as it sits upon fundamental assumptions that are untrue. We cannot be both free and equal which a core contention at the heart of the liberalism. The characterisation of the state of nature that these ideas are built from is obviously false although if we are to be generous, we could say it was never intended as a literal interpretation. It assumes an isolation that had not ever have existed. Hobbes makes the claim that we are equal irrespective of differences and dismisses this as a factor, I&#8217;d say he is a victim of the &#8220;<em>vain conceit of one&#8217;s own wisdom</em>&#8221; of which decries others. To dismiss difference as an important factor is a denial of reality and a repudiation of truth.</p><p>If security is built on the liberal conceptualisation, then what originates its creation? It may be the case that freedom is not the right idea. Prior to liberalism security was based on the stability of hierarchies related to feudal systems or state constructs. The concept of an individual was of lesser importance that the sustenance of the society. Security was tethered to the concept of hierarchy where everything had its place, you knew your place in it and to uphold the system is to ensure your protection and grant you the feelings of security within that community.</p><p>This wouldn&#8217;t be acceptable as a definition in a modern society as individualism. We can make a case that liberalism is successful however it is in its infancy when considered against the longevity on humanity. Along with the industrial revolution it has bestowed up on us many benefits but also many curses. Never has man had such a capacity to endanger others. Should we feel more secure in a globalised world or in one that is segmented into loosely connected communities?</p><p>This is a by-product of the abstracting away of engagement with work that directly relates to our survival needs. Feelings of security evoke similar hormone responses to relationships and trust including dopamine, serotonin, endorphins, oxytocin with the addition of Gamma-Aminobutyric Acid (GABA). So, we might say that security as a feeling is inexorably connected to humanity and a necessity. It&#8217;s close relation to core traits of humanity make it a emergent property of the human condition.</p><p>So, to answer the question I originally asked. Is there a biological imperative to feel secure? I&#8217;d suggest that there is. This feeling is related to many fundamental aspects of the human experience and overlayed with our need for connection with others.</p><p>And eventually we arrive at a place where the connection between the biological the psychological, and the philosophical intersect. It&#8217;s not a neat picture, there is complexity, nuance, and subjectivity. This might age badly in the face of new evidence, but I would hope that it prompts you to consider things through a lens that you might not have done before.</p><p>The world of information security and cYbEr now seems like a malaise of dysfunction to me. Maybe this is the point where I have gone &#8216;Full Tonto&#8217;. Have I strayed so far off the reservation that I might now be better suited living in a shack in the woods stripping batteries to satisfy malevolent intents?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Machiavellian Security Leadership]]></title><description><![CDATA[Security Leadership Lessons from Machiavelli]]></description><link>https://www.yousuckatcybersecurity.com/p/machiavellian-security-leadership</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/machiavellian-security-leadership</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Thu, 24 Oct 2024 08:01:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b169f3cf-8996-4875-9396-a72765e1243e_917x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>I examine modern security leadership through the lens of Niccol&#242; Machiavelli and Robert Greene. Machiavelli often called the father of modern political philosophy from his seminal work <em>The Prince</em> whilst Greene is known for building upon those concepts in a contemporary context in the <em>48 Laws of Power</em>. Machiavelli gives us an unvarnished interpretation of power dynamics in early modern Italy and addresses two main concepts. </p><ol><li><p><em>Seeking and retaining power</em></p></li><li><p><em>Viewing the world for what it is, not what it should be</em>. </p></li></ol><p>Machiavelli offers little in the way of opinion and staying within the boundaries of events and experience. It&#8217;s worth understanding that Machiavelli was on the tail end of a period characterised by warfare between city states and regional powers. Power asserted through the application of violence was a valid strategy in those times. As much as I would advocate that a gladius is an appropriate tool for stakeholder management, it might be flirting with some legal repercussions that make it impractical. That being said, Machiavelli&#8217;s work has stood the test of time and has relevance to this day. What was true then, appears to be true now.</p><p><em>The Prince</em> rests on a number of assumptions. It presupposes that there is an apex to the power hierarchy, and that the apex of power is an autocratic model where there is a single leader. It should be said that security leaders will exist mainly within the corporate space so this will be the focus of consideration. It carries some baggage though, namely that they will not exist at the top of the hierarchy, they will have superiors, peers, and subordinates. There isn&#8217;t a single power hierarchy to climb, so parallel options exist.</p><p>It&#8217;s easy to see how the power dynamics within, and between city states, or regional powers offer us a valid proxy for today&#8217;s corporate environment. One company can take over another, a leader can be deposed, &#8216;princes&#8217; can ascend from the common man. Organisational politics are malleable to the techniques outlined by Machiavelli. Obviously, power is everywhere, and the strategies apply universally. So, for a security leader to be successful they need to appreciate the asymmetric power dynamics in play. I&#8217;ll break this into three broad areas of consideration for these purposes.</p><ol><li><p>Self</p></li><li><p>Organisation</p></li><li><p>Others</p></li></ol><h3>Self</h3><h4>Reality and reputation</h4><p>Machiavelli talks to the human condition and is not idealistic in the way he does. He talks about how the world is, not how it is supposed to be. He describes what does work and what doesn&#8217;t work. The first lesson for a security leader must be this, the paradigm from which they view the world must be one rooted in reality, not idealism. If a leader cannot see the reality due to limitations imposed by their ideals, then they will leave themselves vulnerable to those who orient around reality. Viewing the world with an idealistic lens is indistinguishable from delusion. But idealists are predictable, and that is useful to understand for a security leader.</p><p>Reputation can be described as how you are perceived by others. Perception is reality. If you control their perception, you control their reality. How a security leader is perceived by others is the critical enabler of how effective Machiavelli and Greene&#8217;s strategies are in power creation. Greene builds on the groundwork Machiavelli laid and is more explicit when articulating his laws pertaining to self-conduct. Greene articulates strategies around how to curate your interactions which build your reputation and create power. He goes as far to describe reputation as a cornerstone of power.</p><div class="pullquote"><p>&#8220;Every one sees what you appear to be, few really know what you are&#8221;</p><p>Niccol&#242; Machiavelli</p></div><p>Greene makes an interesting point about the rejection of roles that society pushes on to a person. In an age of identity politics where virtue, connotation, and association are inherent in the labels, there is utility in assuming some of these labels in the creation of an identity. He likens the creation of a new identity to like wearing a costume, although, I&#8217;ve always preferred the term wearing a skin suit. Everyone creates an identity for public consumption to an extent. But this reveals a truth about us, that we are rarely what we think, or hope to be. <em>We are much worse than that</em>. Something is missed by Greene, he works in the singular, but we need to work in plural to be truly effective. Security leaders must maintain a set of identities tailored to the specific audience, for seniors, peers, and subordinates. And which skin suit a security leader will need to wear, depends on what and who the objective is. Just don&#8217;t ask about dress down Fridays . . .</p><p>The creation of identity can be aided in a modern context by virtue of the many hierarchies there are to climb. A sidestep or upward step into a different organisational hierarchy can be an opportunity for <em>purification</em>. All is forgiven, most is forgotten. This has the benefit of retaining external allies. A security leader will have been able to build seniority, &#8216;rank&#8217; is generally transposable without carrying the baggage of what came before. This strategy is not without risk but allows a security leader to perfect their craft during their accension and limit the penalty for missteps.</p><h2>Organisation</h2><h4>Power Hierarchies</h4><p>There is an action required of a security leader to understand what is valued within an organisation. They need to gauge what associated traits would be perceived as virtue by their &#8216;subjects&#8217;. To paraphrase Machiavelli, it is not necessary to have these qualities, but it is necessary to <em>seem</em> to have them. But understanding what &#8216;subjects&#8217; consider to be virtuous is not enough. The nature of social activism, special interest groups, or union presence within large organisations needs to be understood. They will have a disproportionate sway over the discourse in public spaces. Not a day goes past that isn&#8217;t some &#8216;day&#8217; or &#8216;history month&#8217;. It&#8217;s spread through the corporate world like a plague of fleas in a cattery. But these should be conceptualised as communal ceremonies that contain affirmations of loyalty to the faith. Greene talks about borrowing from organised religion to create a following, and these groups borrow many elements.</p><p>One commonality special interest groups tend to have is that they are predicated on the victim/oppressor dynamic. Another way this might be considered is the drama triangle playing out on an industrial scale where a great many people see themselves as victims. The drama triangle framing is useful as it leads us to understand that when someone embraces victimhood, they will seek a persecutor. If they can&#8217;t find one, they will create one, <em>or</em> we can create one for them. The prevalence of victim mindset within organisations and the wider society has changed the paradigm through which relationships are seen, they are an asymmetric power dynamic, and therefore very Machiavellian. Furthermore, how they outwardly portray themselves is incongruent to their actions. Despite the claims of virtue, this is only true to the point of disagreement past which a social penalty must be paid. A tithe in blood to be paid by the apostate.</p><p>A security leader must understand how these groups form the organisational context and cultural background. There is utility in doing this for several reasons, the first would be to identify any threats to themselves, the canary in the coalmine. This gives greater scope to allow defensive manoeuvres against those who would seek to depose the security leader. The second is underhand, but a security leader may need to utilise the mechanisms of these groups as a weapon. These groups can be used to weaken those in stronger positions or deal with those who are a threat to their position, they can be used to do our dirty work. Another aspect to consider with the utility of these groups is the establishment of reputation. These can become a convenient vehicle to promote the values you want to be seen portraying. Greene discusses using cult like mechanisms to create a following, groups that already exists can be used, but new groups can also be created. Creation of your own interest group, perhaps based on location, department, or professional affiliation would be useful in generating an adversarial outlook within its members by defining and vilifying outgroups.</p><p>A security leader needs to understand that there is more the just the formal structure of these groups. A sub-structure exists within, and between these groups, collections of individuals who form the crucible of power. A security leader would be best served to identify these groups, sub-structures, the players within them, and the affiliations between them. But Machiavelli does provide caution if we consider utilisation of these groups of people insofar that use of mercenaries is warned against. Nevertheless, these structures are a reality of organisations and are deeply embedded so it would be remis to not consider their utility in achieving ones aims. These groups have weaponry that might exceed the arsenal at your direct disposal. This must factor into the political calculus when evaluating the effectiveness of dispatching your foes via these means. Why have a dog and bark yourself? Just be mindful that these are the yapping terriers of stupidity which are capricious in nature.</p><h3>Others</h3><p>In a sense, Greene&#8217;s work focuses on the egocentric, which becomes its limitation. Whilst these precepts are helpful it is also very useful to understand the nuances in others&#8217; interactions. A security leader must be observant in a corporate environment. They need to notice, who is meeting who, who is going for coffee or lunch with others, what are their social circles, what do these people value, how much influence do they hold, is this by position or by personality. Who is holding grudges, who are these held against, what kind of agitation would they be receptive to. Only by understanding this can a security leader create a base of influence that extends beyond their own. The context is required to apply Greene&#8217;s laws, if you want to create a cult-like following, then you need to understand what the mark believes and how you leverage their weakness to create loyalty.</p><h4>The subjects</h4><p>Machiavelli discusses the use of mercenaries, a standing army, and auxiliaries. By creating allegiances and a loyal team a security leader can move with more impunity. They will be able to draw on the collective influence and reputation of the loyalists to reinforce their own standing. It is important that the loyalists are not subordinated to mercenaries, so this would be contract resource, MSPs, or even other teams in the organisation. Doing so would weaken the security leaders&#8217; position by not having a reliable network to draw on in times of need.</p><p>As advantageous loyalists are, they are expendable. If a security leader has created a dependency or owes favours then they are obligated to those people. Machiavelli makes this observation and Greene goes a little further by suggesting that enemies should be used to occupy subordinate positions as they will then be obligated to the leader. Now this is on somewhat of a knife edge in a corporate environment due to the presence of parallel power hierarchies. The subordinate then may become a threat as they can manoeuvre laterally to positions where they no longer sense an obligation to the leader.</p><p>Intersecting considerations make any judgement calls about how to fill the ranks a challenging decision. This decision will need to be contextual and consider the potential options the subordinates have to move against the security leader. There is no immediately obvious path that is simplistic. When a problem requires resolution, the action has to be dispassionate and unilateral in its execution.</p><div class="pullquote"><p>&#8220;The injury that is to be done to a man ought to be of such a kind that one does not stand in fear of revenge.&#8221;</p><p>Niccol&#242; Machiavelli</p></div><h4>The nobility</h4><p>A security leaders peers will inevitably be middle or senior management. Peers are generally protective of the boundaries of their domain and generally seeking power themselves in their respective disciplines, and this can be used to devastating effect. A security leader should be acutely aware that they can shift messages that will land badly to their peer group. As it happens, security issues are usually predicated on a problem security doesn&#8217;t own. And it&#8217;s only reasonable for the owner to take accountability. Enabling a scenario where you can simultaneously increase your position relative to your peers, and use their credibility to deliver bad news eroding their position over time helps to establish the security leader in the dominant position over their peer group.</p><p>But the nobility must be kept onside over a longer duration. They will have the collective power to depose the security leader. As with the subordinates, it&#8217;s not clear that Machiavelli or Greene&#8217;s approaches are entirely implementable due to lateral and upwards movement.</p><h3>Conflict</h3><p>It&#8217;s worth noting that asymmetric power relationship can sometimes collapse into conflict. This isn&#8217;t really dealt with by Machiavelli or Greene in any meaningful way. They discuss ways of avoiding it, or not being seen to take a side where others are in conflict, or allusions in that vein. Machiavelli says there are two ways men can fight, by law or by force, of men or of beast. To co-opt this somewhat, I&#8217;ll consider the bestial approach to be conflict with words. A security leader will find themselves in conflict frequently as what they need to say will not always be welcomed. Open conflict in public spaces is an eventuality a security leader must prepare for and have the skills to deal with.</p><p>In a pure dominance contest, decisive response is demanded. Position will need to be defended; they will come under attack. The attacks may not be rational or hold relevance to the subject of discussion, perhaps public character assassination by others. There will be an audience. There are ways to counter this. A good security leader will have information to hold over their detractors already. Their intentions should have been anticipated as there are always signals. But failing this, they must be able to debate to get the audience on side. The detractor won&#8217;t be convinced, and this will be damage limitation through attack by attaining the support of the audience. When the time comes, and it will, a security leader has to be prepared to vanquish a foe. To embrace Greene&#8217;s laws, a security leader must be bold in action, and not show weakness. Fear is the weapon they will hold over you, without that, they <em>have</em> nothing, without that, they <em>are</em> nothing.</p><h3>Conclusion</h3><p>We have dealt with a number of areas of discussion prompted by Machiavelli&#8217;s, and Greene&#8217;s work. But there is a significant omission. We have not made any attempt to reconcile these practices with the values, or mission of a security leader. A Machiavellian worldview is one that is cynical in nature, perhaps because we are cynical by nature. It assumes the worst and leave little space for altruism. In some sense it promotes malevolence. A security leader must understand the methods of obtaining power but has to be judicious in how those methods are applied.</p><p>In a sense Machiavelli is a manifestation of consequentialism as reflected in his writing such as &#8220;<em>one judges by the result</em>&#8221; or as we might say today &#8220;<em>the ends justify the means</em>&#8221;. Yet that leaves us with an unsatisfying conclusion in that a Machiavellian approach forces us to rely on anticipating predefined outcomes. If we fail to achieve the outcome we are greatly exposed and the axe cuts the other way. We cannot predict the future and the path to the outcome in this approach reduces optionality leaving us fragile, but not brittle, along the journey.</p><p>There is no suggestion that you cannot change the destination as Greene concludes in his last law that you must be formless, not adhere to other&#8217;s rules and laws. It suggests that a security leader need to be mailable to the situation and adopt strategies that work as circumstance changes. Machiavellian behaviours and traits are themselves a &#8216;form&#8217;, a way to be predicted, and therefore a weakness. Greene leaves a &#8216;get out&#8217; that grants scope to rationalise this internal inconsistency, or it could be taken as a total repudiation of everything he has written and Machiavellian philosophy.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Right Said Ted]]></title><description><![CDATA[A discussion about serial killers, AI, and our dysfunctional relationship with technology.]]></description><link>https://www.yousuckatcybersecurity.com/p/right-said-ted</link><guid isPermaLink="false">https://www.yousuckatcybersecurity.com/p/right-said-ted</guid><dc:creator><![CDATA[Denholm Knowles]]></dc:creator><pubDate>Sat, 21 Sep 2024 11:19:27 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4711d4b2-96f9-479f-9629-1a3bf7b5020c_1600x1067.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>The relationship we have with technology has become a problem.</p><p>Our times are punctuated with technological devices that seem to be fuelling division and polarisation. Complicit indifference allowed poisonous ideas to be digitally disseminated. Technology has become ubiquitous, but should we have let it? There are some that suggest that we shouldn&#8217;t.</p><p>Jonathan Haidt discusses the role of technology on the adolescent development calling it the &#8220;<em>greatest destruction of human capital in history</em>&#8221;. Haidt notes that Gen Z are more anxious attributing this to a &#8220;<em>great rewiring of childhood</em>&#8221;. As Haidt describes, technology becomes an inhibiter preventing the formative experiences during development. Children are not as engaged in play, imaginative activities, conflict resolution, understanding social cues to form relationships, or engaging as part of a long-standing communities. The executive functions of the pre-frontal cortex are disrupted leading to inabilities for those to stay on task or plan. Their social skills are diminished and are considered to be an anxious generation plagued with an epidemic of mental illness.</p><p>One of the most notable and controversial critiques of modernity was Ted Kaczynski, a terrorist. His ideas can easily be dismissed as the ramblings of a mad man but within his manifesto and other writing there are astute observations and predictions that have come to pass. In recent years he has garnered an online following and is affectionately referred to as &#8220;<em>Uncle Ted&#8221;</em> in some circles.</p><p>As technologists who apply the latest and greatest from the toybox into organisations, have we considered what that does to the people in those organisations? And the population from which we recruit, how is organisational stability adversely impacted by the wider adoption of technology given how it impacts people? The true impact of novel technologies like AI on society will not just be a change in job roles or the automation of tasks but it will change our relationship with technology.</p><h3>What exactly is security?</h3><p>Let&#8217;s revisit what we actually mean when we talk about security. As many more informed commentators than myself have noted, security derives from the Latin <em>Securitas</em> meaning <em>freedom from care</em>. This means that security is a feeling about the perceived state of protection. Security is not something that is objectively measurable whereas protection is. Security is not locks, fences, firewalls, anti-virus, SIEMs, EDRs. These are the &#8216;things&#8217; we use for protection and are not security in of themselves but the application of protective measures gives a feeling of security. We are talking about emotional responses so we must consider the human element. This distinction becomes important as we start to introduce other concepts.</p><h3>The Terrorist</h3><p>Ted Kaczynski was the terrorist known as the Unabomber. His actions led to the loss of three lives and injured many other between 1978 and 1995. It was not that he had killed particularly significant amounts of people, it was the unpredictability of the attacks and extended periods of inactivity that left a persistent threat in the minds of the US. And this is <em>threat</em> in a real sense and not the security colloquialisms. Kaczynski had the capability to cause harm and had signified intention to do so. The Unabomber evaded authorities leaving little trace for investigators other than his signature method of making his devices. He went to significant lengths to make sure that no components were traceable. </p><p>The terror he was able instil into a nation was palpable and led to the one of the most expensive manhunts of all time. Kaczynski had a genius level intellect, his IQ was supposed to exceeded Einstein&#8217;s. Kaczynski had participated in CIA experiments while at Harvard that were related to the controversial MK Ultra programme. These experiments were to investigate methods of mind control through the use of hallucinogenic drugs and psychological torture. Although it&#8217;s not clear what exactly occurred during these experiments with Kaczynski, this experience combined with the social isolation from having been several years younger than his peers will have put Kaczynski on a path towards becoming the Unabomber. He become a recluse and radicalised himself in isolation from society years before it became an internet trend.</p><p>Kaczynski is still discussed today and prompted much discussion following his suicide in 2023. There is an enduring appeal to those who refer to him as &#8220;<em>Uncle Ted</em>&#8221;, perhaps because he is less obtuse than Jacques Ellul or perhaps there is something accessible about his perspective articulated in such uncompromising terms. He has hit on something that still permeates the zeitgeist which might be as simple as the increasing interest in doomsday scenarios and the destruction of humanity. Kaszynski&#8217;s perspective is somewhat notable given it was from a time before the internet was ubiquitous and from before the mass adoption of social media.</p><h3>Motives of a terrorist</h3><p>Kaczynski&#8217;s contention is best described in the opening paragraph of the manifesto <em>Industrial Society and Its Future</em> which was printed in the Wall Street Journal in 1995. </p><blockquote><p><em>1. The Industrial Revolution and its consequences have been a disaster for the human race. They have greatly increased the life-expectancy of those of us who live in &#8220;advanced&#8221; countries, but they have destabilized society, have made life unfulfilling, have subjected human beings to indignities, have led to widespread psychological suffering (in the Third World to physical suffering as well) and have inflicted severe damage on the natural world. The continued development of technology will worsen the situation. It will certainly subject human beings to greater indignities and inflict greater damage on the natural world, it will probably lead to greater social disruption and psychological suffering, and it may lead to increased physical suffering even in &#8220;advanced&#8221; countries</em>.</p><p><em>Industrial Society and its future, Theodore Kaczynski</em></p></blockquote><p>The manifesto contained a pedantic use of the phrase &#8220;<em>eat your cake and have it too</em>&#8221; corrected from the common &#8220;<em>have your cake and eat it</em>&#8221;. This was seen by his brother and this ultimately led to his capture as this was identifiable to Kaczynski.</p><p>We can distil Kaczynski&#8217;s ideas to a few main contentions.</p><ol><li><p><strong>The development of technology has led to psychological suffering and a lack of fulfilment.</strong></p></li></ol><p>This is predicated on the concepts he outlines called surrogate activities and a disengagement with the &#8216;power process&#8217;. The proposition further asserts that this leads to a degradation in freedom. He contends that the changes in behaviour and how communities are structured to uphold a technological society are the key factor in psychological suffering.</p><ol start="2"><li><p><strong>The continued development of technology will worsen the situation.</strong></p></li></ol><p>As things progress, the more they will deteriorate and the greater the impact caused by psychological suffering.</p><ol start="3"><li><p><strong>The elimination of the modern technological society is required to avert disaster.</strong></p></li></ol><p>The conclusion of the first two contentions give rise the justification of the use of violence and intimidation to achieve political change viz:- this is the very definition of the term terrorism.</p><p>We can grant that Kaczynski&#8217;s diagnosis is correct, yet we must remain cynical of the prescription. An overthrow of technological and collapse of society would lead to enormous levels of human suffering. Kaczynski&#8217;s proposition is this, exchange the current conditions for a set of new conditions that lead to different outcomes over a longer timeline. These new outcomes will reengage humanity with their nature and reduce phycological and physical suffering.</p><p>It is widely accepted that there is an ongoing mental health crisis particularly among Gen Z as described by Haidt. This gives credence to Kaczynski&#8217;s view on the relationship between people and technology is one that is detrimental. We might consider that feelings of security are adversely impacted by unstable phycological states as a result of technology adoption. Given Kaczynski&#8217;s framing of the problem we can infer that the reduced use of technology will lead to healthier psychological states and a greater sense of security even if the objective level of protection is reduced. This might seem counter intuitive however we must remember that security is a subjective interpretation about the perceived state of protection. Too much protection can decrease feelings of security as freedom is removed.</p><h3>The power process and surrogate activities</h3><p>There are two concepts outlined by Kaczynski that are relevant to this conversation. The first is the <em>power process</em> which is defined as having four elements which are goal, effort, attainment of goal, and autonomy. Engagement with the <em>power process</em> is necessary for phycological health in Kaczynski&#8217;s world view and it is easy to see how an increasing dependence on technology would incrementally preclude us from that process.</p><p>Obviously Kaczynski relates the <em>power process</em> to basic physical needs such as food and shelter however this concept is not constrained to basic needs. This is where the concept of <em>surrogate activities</em> comes into the frame. Kaczynski argues that in a technological society basic needs are largely met and people will create other goals so that they can maintain some level of phycological health. The examples given are &#8220;<em>scientific work, athletic achievement, humanitarian work, artistic and literary creation, climbing the corporate ladder, acquisition of money and material goods far beyond the point at which they cease to give any additional physical satisfaction&#8221;. </em></p><p>Clearly Kaczynski&#8217;s proposition is untenable as it fails to acknowledge the nature of human existence is within the context of a community where surrogate activities are an inevitable by-product. Kaczynski appears to be working from a conceptualisation of individual survival in isolation from a community which is incongruent from his critique of &#8216;leftism&#8217;. In some respects Kaczynski fetishises a natural mode of living and is dismissive of any benefit bought about by technological advancement.</p><p>Kaczynski draws from the idealised conceptualisation of nature seen within the liberal philosophy. He is providing critique from within the same frame of reference. Where he differs is that the <em>state of nature</em> thought experiment that characterises liberal philosophy is rejected by Kaczynski as he advocates of small agricultural communities oriented around families as opposed to brutal individualism. He might be what we would now describe as a <em>postliberal</em>. This is interesting as he is advocating a position that laments the loss of small social groups yet lived in isolation himself.</p><h3>AI and the neo-luddites</h3><p>Given the emergence of novel technology such as Artificial Intelligence, it&#8217;s reasonable to give some thought as to how our relationship with technology impacts on our feelings of security. Kaczynski&#8217;s views can be described as neo-luddite and his view on technology is one of disdain. The use of technology definitionally degrades part of the human connection to the natural world and as we increase usage we sacrifice some our agency.</p><p>I admit, there is some irony that I speak as a technologist who finds most endeavours towards AI to be somewhat vulgar. To some, I might be considered a neo-luddite. My counterpoint to that would be that proponents of such technology have consistently failed to demonstrate due care, skill, and diligence when developing and deploying these technologies. But I ask, when you outsource your thinking to an AI tool, what does that say about the quality of your thinking in the first place?</p><p>Some egregious uses of this technology include the careless and often unlawful use of data to train these tools. Many companies in the UK will use their customer data, often including special category data under the processing basis of <em>legitimate interest</em>. They are stretching what is acceptable beyond what is lawful especially in view that the EU AI Act had to soften <em>legitimate interest</em> to cover these tools. But this does not apply in the UK in the same way. What legitimate interest exists to commodify someone&#8217;s data for financial gain exactly? I would go as far as to call this practice  negligence. It&#8217;s hard to justify a legitimate use for someone&#8217;s data to satisfy vanity projects, yet, here we are.</p><h3>Neomania - The ongoing march to destruction</h3><p>Nassim Taleb coined the term &#8216;<em>Neomania&#8217;</em> to articulate the blind desire towards the next technological advancement and this is what we see. Kaczynski would describe it as science marching on for its own sake without regard as to its impact on humanity. Taleb&#8217;s concept of <em>Neomania</em> is similar although not identical to Kaczynski&#8217;s. <em>Neomania</em> is about having the latest and greatest version of the gadgets and gizmos that typify modernity. Taleb describes N<em>eomania</em> in a way that moves focus away from utility to vanity. The Kaczynski perspective it is this feature of <em>Neomania</em> that removed people from the <em>power process</em> as coveting the latest technological innovation is little more than a <em>surrogate activity</em>.</p><p><em>Neomania</em> is the inevitable consequence of the liberal paradigm which sits on the assumption that progress is good. It&#8217;s not by accident that the industrial revolution occurred alongside the emergence liberal thought. The liberal paradigm is conflicted and incoherent at the most fundamental level. It asserts that freedom and equality can co-exist. This becomes a problem when we attempt to apply these into how we validate novel technology. If you have read the rule set of these technologies and have a functional understanding of virtue ethics you will know this is true.</p><p>There is a huge appetite for AI tools to be deployed within organisations yet when challenged as to why they want this technology you are met with the blanks look of a departed mind awaiting its digital replacement. In of itself &#8216;<em>Neomania&#8217;</em> denotes a lack of purpose and signifies a passive malaise of those afflicted. AI adoption all too often is for its own sake and not to address a business need. If you need an AI to read and summarise a document . . . you are lost.</p><p>Progress is an ever-present component of modern life, the continued march of incremental updates, the next thing to woo our adorations. This week it is AI or big data, last week it was the cloud. Who remembers blockchain? The pace of these technological improvements has been increasing for the last two hundred years since the industrial revolution which fundamentally changed the foundations of the societies, humans live in. We moved from our rural communities to the city, out life expectancy increased, we became literate.</p><p>Perhaps there is something more to Taleb&#8217;s conceptualisation of Anti-Fragility that might explain why the ongoing march of progress. As we technologically progress, we become more encumbered by the system in which we exist as Kaczynski explains. In the context of Anti-Fragility this reduced our optionality increasing our own fragility and ability to respond to adverse events. If we take on face value that Kaczynski is correct that feelings of security are related to our ability to take care of ourselves then the increased adoption of technology is disempowering by virtue of its construct. We might consider freedom as a proxy of optionality and a decrease in optionality is a decrease in freedom.</p><h3>Conclusion</h3><ul><li><p>Am I against AI? No. It is just another technology.</p></li><li><p>Am I against the irresponsible use of AI? Most certainly.</p></li><li><p>Do I see AI being responsibly used? Rarely.</p></li></ul><p>I have previously made the point that the best argument for the adoption of AI technology is to maintain economic productivity as we face decreasing global populations. Our interaction with this technology needs to be examined and considered. We know that social media causes harm at key developmental stages and we are seeing the consequences within those now entering the workforce. The use of AI is set to exasperate, not alleviate this problem.</p><p>Technology gets applied for technologies sake but we need to consider what the implications of these decisions are. Kaczynski is broadly correct in how he has identified the consequences of unhealthy relationships with technology and his arguments are well reasoned. His solution to these problems are not helpful and reflects a highly destructive resolution that is totalising and absolute.</p><p>If we wish to advert the problems Kaczynski highlights we need to act more responsibly with technology like AI. The industry talks about AI ethics but it is mostly vacuous HR patter that fails to get to the root any comprehension. </p><p>We are here as security practitioners to help protect organisations. The introduction of technologies like AI can harm organisations. Considerations about the impacts of these types of technology are within the purview of security practice very explictly. Some disagree, but they are wrong.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.yousuckatcybersecurity.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.yousuckatcybersecurity.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item></channel></rss>