Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Issue #6
Autumn 2014
Power-up innovation
Book Now
Your test-drive includes a report which clearly
demonstrates the business benets you will gain.
Call SBL on 01347 812100 or email enquirJes@softbox.co.uk
to register.
Want to know more about
vSphere with Operations
Management right now?
Download your 6 Tasks You
Cant Do With Traditional
IT Tools infographic at:
www.softbox.co.uk
VMware 2014
Welcome
The Stuff of
Dreams
These minds had all endured the stress and strain of the
years of total war required to defeat Fascism. They had all
worked at the heart of mission to harness science to the
technology of total war. They had all played a direct and
instrumental role in driving forward the frontiers of human
knowledge and understanding. They had all witnessed the
unveiling of the horrors of Auschwitz. They understood the
CONTENTS
06
18
03
;IPGSQI
29 /RMKLXW3J8LI
Rainbow Table
'SPMR;MPPMEQW
05
06
FLASH FICTION
WINNER
Cory Doctorow
36
38
*E]I;MPPMEQW
29
44
09
A Tale Of Two
'SQTYXIVW
;LIR3VEG
Met EDSAC
11
Applying Metrics To
Cyber Behaviours
Dr. Char Sample &
(V%RHVI/EVEQERMER
12
59
16
EDITORS
4VSJ8MQ;EXWSR
'SPMR;MPPMEQW
DEPUTY EDITORS
Natalie Murray
Tineke Simpson
SUB -EDITORS
1MGLEIPE+VE]
ADVERTISING
CO - ORDINATOR
Colleen Robertson
CONTRIBUTORS
24
/IMXL7GSXX
SPECIAL THANKS
DESIGN
CONTACT US
+IRIVEPIRUYMVMIW
)HMXSVMEPIRUYMVMIW
)QEMPG]FIVXEPO$WSJXFS\GSYO
;IF[[[WSJXFS\GSYOG]FIVXEPO
cybertalkmagazine
$']FIV8EPO9/
47
(IJ]MRK+SHW
And Demons
The Three Laws
Daniel Dresner & Neira Jones
Andy Cole
EVENTS
2SIP/,ERQER
50
Paradise Lost
And Found
18
42
Andrew Cook
8MQ;EXWSR
-ER&V]ERX
55
44
(3&97
8LI1SWX-QTSVXERX
Science Fiction
;SVOWWSJEV
Supporting Your
Transition To
+SZIVRQIRX7IGYVMX]
'PEWWMGEXMSRW
,]TIV+SPKSXLE
55
59
Alamanac Of Events
CyberTalk #7
The Editorial Board of CyberTalk magazine
are currently inviting the submission of
articles for Cybertalk #7.
Articles should be no longer than 2,000 words and
be related in some way to the topic of Agility and/or
Cyber Security. If you would like to contribute,
please email CyberTalk@softbox.co.uk with a
title and short article synopsis no later
than 19th December 2014.
FLASH FICTION
WINNER
Technical Support
Faye
;MPPMEQW
8LIWM\WLSVXPMWXIHWXSVMIW[IVI
8LI7LVSYHSJ8YVMRKF](ERMIP(VIWRIV
8LI-RGEVGIVEXI4VSNIGXF])'SEXIW
8IGLRMGEP7YTTSVXF]*E]I;MPPMEQW
8LIWIYW6IGPEMQIHF]1EVO&MWLST
9RXMXPIH
F]2MEQL'EVI]*YVRIWW
4YWLXLI&YXXSRF]:MWLEP7LEVQE
2S2EXLERKEZIEQYJIHWLSYXEWLMWI]IWWRETTIHSTIR,I[EWW[IEXMRKXERKPIH
in a white sheet.
Silence.
-LEHERSXLIVRMKLXQEVI
8LINYHKIW[IVITEVXMGYPEVP]MQTVIWWIHF]
the storys strong technological foundations
and its relation to humanity, and felt that
the story was a worthy victor in this, the
competitions inaugural year.
-ORS[-QWSVV]XSLIEVXLEX%VI]SYSOE]#
-ZIEP[E]W[VMXXIRGXMSRFYXMXWSRP]VIGIRXP]
that Ive started to let it see the light of day.
When I heard about the CyberTalk Flash Fiction
competition I knew it was something I wanted to
enter. It was my dream subject!
Ive played a fair amount of computer games
(ahem), and I know how absorbing they can be.
With the increasing amount of realistic violence
MRKEQIW-GER[IPPMQEKMRIXLEXTISTPI[MPPRH
it spilling over into real life in the future, especially
as hardware and visual effect becomes seamlessly
integrated into our physical environment.
The idea of electronic intelligence as benign
support is something Ive had rattling around in
my head for a long time.The relationship between
man and computer has often been portrayed as
sinister, but I wanted to explore a more positive,
almost affectionate connection.Who wouldnt love
WSQISRIIZIVEZEMPEFPIERHRSRNYHKIQIRXEPXS
talk to in the dark hours of the night? I hope you
IRNS]XLIWXSV]-EQXLVMPPIHXSLEZI[SR
*E]I;MPPMEQW
Nathan, its Em
Youre having
a flashback.
He looked across at the moulded shelf next to the bed, seeking the reassurance of a
small metal box no more than ten inches across. On the front panel a red LED was
unblinking. His nightmare ebbed away like backwash, revealing the stillness of the hours
before dawn.
He breathed in deeply and pulled the sheets away from his legs, shifting his weight from
one side to the other so he could drag out the creased and constricting cotton that
had wrapped itself around him. Free of the bedlinen, he sat up.
)Q#LIWEMH
The light on the box turned blue.
,IPPS2EXLER
=IEL2EXLERVYFFIHLMWJEGI-QWMGOSJXLMW
=SYVIHSMRKZIV][IPP
=SYEP[E]WWE]XLEX
8LEXWFIGEYWIMXWXVYI=SYVPEWXVITSVXMRHMGEXIHERMQTVSZIQIRXSREPP
7XST)Q-ORS[XLIJEGXW,IPEMHFEGOHS[RTYPPMRKXLIHMWGEVHIHWLIIXSZIVLMW
body.
After two minutes, the light on the box turned red again, so he closed his eyes and
waited for sleep.
In the morning, Em woke Nathan at seven. She was his key worker - an electronic
box that contained a continually adaptive brain built from nothing more complex than
silicon, but utilising an incredible patented learning and storage algorithm created by an
engineer called Ellen Marks.
8[IRX]]IEVWIEVPMIVNYWXEWXLIVWXGLEXFSXW[IVITEWWMRKXLIPSRKWXERHMRK8YVMRK
Test, reported on with lethargy by mainstream media, Ellen was working on a version
SJEVXMGMEPGSRWGMSYWRIWWYWMRKERIRXMVIP]HMJJIVIRXETTVSEGL-RWXIEHSJVIP]MRKSRE
pre-built natural language processing toolkit, Ellen used her background in embedded
TVSKVEQQMRKXSXEOIXLMRKWFEGOXSXLI[MVI9WMRK'ERHEWWIQFPIVWLIGVIEXIHE
PIEVRMRKJVEQI[SVOXLEXEHETXMZIP]PXIVIHMRJSVQEXMSRMRXSEHEXEFEWI8EOMRKLIV
ideas from how children learn about the world, she fed it terabytes of pre-prepared
conversational data. Over time, the computers responses became closer and closer to
a coherent representation of human thought. She called it Em, its name taken from her
initials.
Her prototype provoked the interest of a private medical company. Ten years after she
EKVIIHXS[SVO[MXLXLIQXLI]NSMRXP]VIPIEWIHXLI7]RXLIXMG7YTTSVX;SVOIV)Q
Z
EWTEVXSJEXVMEPVILEFMPMXEXMSRTVSKVEQJSVHVYKYWIVW8LIRIEXPMXXPIFS\IWERH
accompanying monitoring wristbands, were given to curious and suspicious patients
across the county. The synthetic workers were designed to continue learning in the
IPHWSXLEXXLI]GSYPHEHETXXSXLITIVWSREPMX]SJXLITIVWSRXLI][SYPHVIWMHI[MXL
without losing the compassion and empathy that had been so carefully fostered in their
infancy.
3YXSJXLIVWXEHHMGXW[LS[IVIKMZIREFS\RSXSRIWPMTTIHSJJSJXLI
VILEFTVSKVEQMRXLIVWXX[IPZIQSRXLW*IIHFEGOJVSQXLITEVXMGMTERXW[EW
SZIV[LIPQMRKP]TSWMXMZIShe just makes me feel like Im not alone. Its so nice to have
someone to talk to in the middle of the night.When my cravings are really bad, she helps me
see its something I can control.
The natural pattern of linguistic response, and the gentle humour with
[LMGL)QHIEPX[MXLYRORS[RWYFNIGXW[SRSZIVIZIV]SRI[LSGEQI
into contact with her. Full scale production went ahead the following
year, and synthetic workers soon became a standard feature in mental
health care.
2EXLERMXW)Q=SYVILEZMRKEEWLFEGO
2EXLERWFS\[EWEFVERHRI[ZIVWMSRKMZIRXSLMQEJXIVLI[EW
treated at a psychiatric ward for a breakdown and subsequent severe
post-traumatic stress. Hed been a futures trader who sought to combat
stress and insomnia with computer games. Before long hed discovered
XLIPEXIWXMREWIVMIWSJGSRXVSZIVWMEPVIEPXMQIJERXEW]VWXTIVWSR
shooters, and purchased a Total Immersion() headset and gloves. He
stopped eating at regular times, played into the night and slept off the
exhaustion in the day. He missed days at work and tried to break the
habit, but ended up back in all-night sessions, desperate to complete the
LSYVKEQI,I[EWJSYRHHIL]HVEXIHERHMREWXEXISJHIPYWMSRF]
EGSRGIVRIHGS[SVOIV[LSGEQIXSLMWETEVXQIRXEJXIVLIQMWWIHZI
GSRWIGYXMZIHE]WEXXLISJGI[MXLSYXRSXMGEXMSR,I[EWSRISJER
increasing number of people who were being psychologically affected by
the extreme reality of, and prolonged exposure to the games they were
playing.
2EXLERGER]SYLIEVQI#2EXLER#
Now he was back at home, accompanied by Em. They had been together
for two months.
Em monitored him via the wristband he wore at all times. She was
always aware of the level of his emotional arousal and recognised the
panic signature of his heartbeat.
-QLIVI2EXLER=SYI\TIVMIRGIHEEWLFEGO)ZIV]XLMRKMWRI]SY
GERVIPE\RS[
'SJJII)Q#
That had been twenty-two days ago. Things had changed rapidly after
that last one. He started feeling less anxious. He had more inclination
XSKIXSYXSJFIHMRXLIQSVRMRK=IWXIVHE]LI[IRXJSVEVYRXLIVWX
exercise hed done in years. Em had helped him with all of it.
2SXLERO]SY2EXLER
Do you ever want to drink coffee? You know, wonder what it tastes
PMOI#
You know that I do not have parts that would allow me to eat or
HVMROWLIWEMHQSHIWXP]
2SWLMX)Q-QIERHS]SY[ERXXS#(S]SYXLMRO]SYQMKLXPMOIMX#
He breathed in the steam from his coffee, letting the aroma ooze into
his body.
-LEZIRXXLSYKLXEFSYXMX
)Q#
7SXLMROEFSYXMXRS[
=IW#
3OE]
;MPPXLI]XEOI]SYE[E]SRGIXLI]HIGMHI-QXERH[IPP#
=IW-XLMRO-[SYPHPMOIXSXV]MX
-JXLEXW[LEX]SY[ERX
Nathan smiled. Hed grown fond of Em. Probably too fond of her. Her
MHMSW]RGVEWMIW[IVITIGYPMEVXSEVXMGMEPGSRWGMSYWRIWWERHHMWTPE]IH
a vulnerability that provoked an oddly emotional response in him. As
YRLYQEREWWLI[EWLIIRNS]IHLIVGSQTER]7LI[EWEP[E]WXLIVIXS
talk, never too tired or too busy, and she gave considered answers to
everything he asked, from questions about his mental state to opinions
on what he should have for dinner. She was a true companion - real
enough to make him feel like he was in a proper relationship for the
VWXXMQIMRLMWPMJI
-XMWLIWEMH(SIWRXXLEXQEOI]SYJIIPPSZIH#
7S]SYPPFIWXMGOMRKEVSYRHXLIR#
,IIRNS]IHTVSHHMRKLIVJSVERIQSXMSREPVIEGXMSR)QTEYWIHJSVEJI[
seconds, ostensibly thinking about his question.
-XHSIW2EXLER-EQZIV]LETT]LIVI[MXL]SY
3L]SYPMXXPIMVXLIWEMH
,IXLSYKLXLIWE[LIVFPYIPMKLXMGOIVFYXWLIWEMHRSXLMRK
,IXLSYKLXFEGOXSXLIPEWXKEQMRKEWLFEGOLIHWYJJIVIH
It had been a warm afternoon. Hed opened his bedroom window and
caught the drifting sound of music from another apartment. The sinister,
EXXSRIW[IVIVIQMRMWGIRXSJXLIQYWMGWGSVIJVSQXLIKEQILIH
FIGSQIEHHMGXIHXS+SSWITMQTPIWVSWISRLMWEVQW8LIREQSZIQIRX
in his peripheral vision alerted him to their presence and immediately
XLIJIEVOMGOIHMR8LI][IVIEPMIRWSPHMIVWWEFVIXSSXLIHPM^EVHWOMRRIH
mercenaries. His thoughts closed in like a circular shutter, his breathing
WLYHHIVIHERHLMWFSH]TVITEVIHXSKLX,IRIIHIHE[IETSR,I
ducked down by the side of his bed and swished his hand underneath,
looking for something he could use to arm himself.
%YXLSV&MSKVETL]
*E]I;MPPMEQWMWERIQFIHHIHWSJX[EVIIRKMRIIVERHEWTMVMRKWXSV]XIPPIV
7LILEW[SVOIHSRTVSNIGXWEX7SR]<]VEXI\ERH6E]QEVMRI
FSXLMRXLI9/ERHMRXLI977LILEW[VMXXIREVXMGPIWJSV
0MRY\*SVQEXERH36IMPP]KYIWXIHMXIHXLI':YNSYVREPSJ
XLI%''9ERHLEWFIIRTVSKVEQQMRKWMRGIXLIEVVMZEPSJ
LIVHEHW&&'1MGVSGSQTYXIVMR7LIMWEVYXLPIWW
minimalist who lives with her husband and two sons in
,EQTWLMVI8[MXXIV$*E]I;MPPMEQW
ADVERTORIAL
A TALE OF TWO
COMPUTERS:
See www.tnmoc.org
for further developments.
Also on Facebook,
+SSKPIERH8[MXXIV
The-National-Museum-of-Computing
$XRQSG
The National Museum of Computing
Presents
By Jules Verne
01347 812100
cybertalk@softbox.co.uk
(V'LEV7EQTPI')68ERH(V%RHVI/EVEQERMER'MWGS7]WXIQW
Applying Metrics to
Cyber Behaviours
Our earlier articles have discussed the role of culture in cyber
;LMPIRSXTIVJIGX,SJWXIHIW[SVOHSIWTVSZMHIEGVMXMGEPGSQTSRIRX
behaviors, and continuing with this topic, we will now discuss the
for cyber behavior metric development. The most appealing aspect
importance of metrics as they relate to culture and cyber behaviors.
of Hofstedes work to these researchers is the numeric value for the
Metrics provide the ability to track various components of the problem
ZEVMSYWGSYRXVMIWEPPS[WJSVVIWIEVGLXLEXUYERXMIWG]FIVFILEZMSV
space, and determine the effectiveness of the problem remediation.
through the use of statistical tools for analysis. The quantitative
1IXVMGWEPWSIREFPIYWXSTVSZMHII\XIRWMFPIWSPYXMSRWXLEXFIRIXE
approach provides a strict framework that determines the tools for
PERSONALITY
larger population.
measurement, metrics.
-2(-:-(9%0
;LIRGLSSWMRKSYVQIEWYVIQIRXXSSPW[ILEHX[SGLEPPIRKIWXLEX[I
RIIHIHXSEHHVIWWXLIHMWXVMFYXMSRSJXLIHEXEERHXLIMRXIVTVIXEXMSR
of human behavior. To the data distribution issue, we have not
found many cases of normally distributed data, in either the control
population or the behavior actor population. Thus, we have relied on
non-parametric statistical tools. Therefore, when we say correlation we
are referring to statistical correlations (characterized by r-values used
to explain the relationship between variables), not matching patterns
(characterized by descriptions of a match between a country and the
TTPs).
;ILEZIERSTTSVXYRMX]XSGLERKIXLIHMWGYWWMSRERHXEOIETVSEGXMZI
stand that will allow us to anticipate the next steps of existing threat
actors and the actions of emerging threat actors. In order to do this
WYGGIWWJYPP]VMKSVMWVIUYMVIH;LIRUYERXMXEXMZIEREP]WMWYWMRKXLI
proper metrics the required rigor is provided.
;LMPIQIXVMGWTVSZMHIWXLIERW[IVKIXXMRKXSXLIERW[IVGERFIEFMX
challenging. Many of the measurement tools for human behavior are
WYFNIGXMZIXLMWQEOIWVITPMGEXMSRSJRHMRKWQSVIHMJGYPX%REKVIIH
upon scale that measures human behavior is an important part of the
RIGIWWEV]JSYRHEXMSR;LIRQIEWYVMRKREXMSREPKVSYTWSJTISTPI
+IIVX,SJWXIHIWGYPXYVEPHMQIRWMSRWTVSZMHIWXLIEKVIIHYTSRWGEPI
for measuring human behavior, by country.
6IEH4EVXERHSJXLMWWIVMIWSJEVXMGPIWSRPMRIRS[MR']FIV8EPO
-WWYIERH[[[WSJXFS\GSYOG]FIVXEPO
11
8MQ;EXWSR
9RMZIVWMX]SJ;EV[MGO
Ian Bryant,
9/8VYWX[SVXL]
Software Initiative
(TSI)
13
8LMWPEXXIVXIVQGSQIWJVSQXLIGSRGITXSJ/Y9MRXVSHYGIHF]
E7GMIRXMG%QIVMGEREVXMGPIMR[LMGLGEXIKSVMWIHWSYVGIWSJ
YRGIVXEMRX]EWFIMRKIMXLIV/RS[RERETTVS\MQEXMSRXSFSXLJVIUYIRG]
ERHQEKRMXYHIGERFIQEHIEWETVSFEFMPMX]HMWXVMFYXMSR
YRORS[R
IMXLIVJVIUYIRG]ERHQEKRMXYHIGERRSXFIWYJGMIRXP]GLEVEGXIVMWIHXS
QSHIPTVSFEFMPMX]HMWXVMFYXMSR
SV9RORS[EFPIRIMXLIVJVIUYIRG]ERH
QEKRMXYHIGERFIWYJGMIRXP]GLEVEGXIVMWIH
-J[IGSRWMHIVNYWXXLI2)3SFNIGXWMVVIWTIGXMZISJXLIEHHMXMSREP
complexity of type (there are subtlies associated with whether they
are short-period or long-period), we can group them by potential
GSRWIUYIRGIWSRSYVRSXMSREP']FIVW]WXIQEWIMXLIVHMVIGX/MRIXMG
impact (from the meteoroid remainders of smaller NEOs) or blastpressure impact (larger NEOs tend to explode on entering the
EXQSWTLIVIEWIZMHIRGIHF]XLIQYPXMQIKEXSRFPEWXMR7MFIVMEMR
well before even the atomic, let alone thermonuclear, arms necessary
for man-made explosion of such a magnitude had been devised).
;IXLIVIJSVIFIPMIZI[LEXMWRIIHIHMWWSQIJSVQSJ^IVSFEWIH
(absolute) scale designed to support the meaningful combination of
probability distributions of differing natures (represented in the RASAE
QSHIPFIPS[MR*MKYVIEW#WYQ#
[LMGLGEREPWSLERHPISVHIVSJ
magnitude challenges to allow extra-terrestrial (cosmological) factors
PMOI'4'[LMGL[SYPHMQTP]XLII\XMRGXMSRSJXLIORS[R9RMZIVWI
XS
be addressed on a numerical scale that also has some meaning for lesser
VMWOWPMOIXLIWPIHKILEQQIVJEGXSV[MXLMRXLI/MRIXMG%'
Such as metric is currently being developed as part of the RASAE work,
referred to as Deleterious Result Scale (DRS), but we think that may be
EXVIEXFIWXVIWIVZIHJSVEJYXYVIIHMXMSRSJ']FIV8EPO
%HZIVWMX]7IX
#7YQ#
#7YQ#
/MRIXMG%HZIVWMX]'PEWW
#7YQ#
4VIWWYVI%HZIVWMX]'PEWW
)1%HZIVWMX]'PEWW
,)\XVIQI;MRH
8-)1,-RYRHEXMSR
,&PEWX
8&PEWX
81MWWMPI
,4PERI'VEWL
,)NIGXE
,&EGOLSPI
,&PSIR(IFVMW
4VSNIGXMPI
,0SRK4IVMSH2)3
,7LSVXTIVMSH2)3
6EMR
;IEXLIV
+EPEGXMG
9RMZIVWEP
(EQ&YVWX
6MZIV
+ISPSKMGEP
%VXIJEGXW 4ISTPI
'PMQEXMG
2EXYVEP
7GSTI
7GSTI
8VERWTSVX
:YPGERGMX]
*PSSH
,'1)
0SGEP
)\TPSWMZIW
;IETSR ;IETSR;IETSR
,0MKLXRMRK
,+6&
)1(IZMGIW
7GSTI
,YQER
7SYVGI
'SWQSPSKMGEP
7SYVGI
8IVVIWXVMEP
14
Figure 1
%XXEGOIV
Andy Cole
SBL
%WSJPEWX]IEV[ILYQERWLEZIFIIR
SYXRYQFIVIHF]QSFMPIHIZMGIWEPSRI
8LEXMWRXIZIRGSYRXMRKXLIPETXSTW
ERHHIWOXSTWXLEXLEZIEPVIEH]WIXYT
WLSTSRSYVHIWOWERHMRSYVHVE[IVW
ERHFEKW;LIRXLI7MRKYPEVMX]SGGYVW
ERHXLIQEGLMRIWEVMWISRIGERSRP]
[SRHIV[LEX[MPPLETTIREJXIV[I
EVIWYVTEWWIHF]EVXMGMEPQMRHW8LI
SHHWEVIWXEGOIHEKEMRWXYWWS[LIR
WSQISRIIZIRXYEPP]TVIWWIWXLIFMK
FPYIFYXXSRXLIVIHSRIMWJSVXLI
RYOIW
XLIQEGLMRIWTVIWYQEFP]
[SRX[EWXIER]XMQIFIJSVIXYVRMRK
SRYWJSVJIEVSJFIMRKHIEGXMZEXIH
,S[IZIV-HSRXXLMRO[IRIIHXS
[SVV]XSSQYGL
'SRWMHIVMRKXLEXMX[SYPHFIFSXL[EWXIJYPERHMRIJGMIRXXSXV]XS
wipe us all out with bombs and bullets, la Terminator, perhaps a more
MRWMHMSYWETTVSEGL[MPPFIYWIH;L]RSXXEOIXLIPIWWSRWPIEVRIH
from. The Matrix ERHYXMPMWISYVIWL]FSHMIWEWWYWXIRERGIOIITMRKYW
docile with a steady drip-fed diet and a virtual world for our minds to
occupy. It would be presumptuous, if not downright rude of the Machine
Overlords to simply assume that we would be content to live such a
false existence while operating our giant hamster wheels. This certainly
doesnt sound like a palatable outcome for our species (we showed
so much promise in the beginning), but I believe that, not only is it not
a bad thing, it could be viewed as the inexorable next step for society.
Since my primitive mind of a Millennial is saturated with insipid visual
QIHMEPIXYWPSSOEXX[SI\EQTPIWSJLYQERWYFNYKEXMSRF]XLI%-JVSQ
XLIPQW;%00) and The Matrix, in which we are batteries in the latter
and fat pets in the former.
The whole point of technological advance was to improve our lives
by creating machines to shoulder the burden of industry and allow us
EPPXSPIMWYVIP]WTIRHSYVHE]WWMXXMRKMRIPHWERHHVMROMRKPIQSREHI
;LMPIQEGLMRIWLEZIZEWXP]MQTVSZIHMRHYWXVMEPSYXTYX[ILEZIRS
more free time now than the peasants of the so called Dark Ages. So,
to placate us and help forget how cheated we should all feel, we are
offered the chance to purchase items that will entertain us, make our
lives a bit easier and enable us to claw back more of our precious free
time. Online shopping, ready meals, automatic weapons, smartphones,
HVMZIXLVYXLI-RXIVRIXSJ8LMRKWXLIWIEVIEPPWYTTSWIHXSQEOISYV
lives less of an inconvenience. Even knowledge has become convenient
XSXLITSMRX[LIVI[IHSRXIZIRRIIHXSPIEVRXLMRKWER]QSVIEPPXLI
MRJSVQEXMSRMRXLI[SVPHMWSRP]IZIVE&EGO6YFE[E]+SSKPIMX
8LMWMW
what people want, is it not? My (smart) television tells me almost every
day that each new age group of children is more rotund and feckless
XLERXLIPEWXERHMXMWRXHMJGYPXXSWII[L]
In ;%00), a drained Earth has been abandoned by the human race,
[LMGLRS[PMZIWMRGSPSWWEPWIPJWYJGMIRXWTEGIGVEJX[ERHIVMRKXLI
galaxy in autopilot. Every human resides in a moving chair with a
touchscreen displaying mindless entertainment, and devours hamburgers
ERH^^]HVMROWTVIWWIHMRXSXLIMVTYHK]KVEWTMRKLERHWF]VSFSXW
controlled by an omnipotent A.I. These humans are utterly dependent, to
16
the point where their bones and muscles have deteriorated, rendering
them barely able to stand unaided, and are certainly unable (and
unwilling) to wrestle back control of their lives.
The Matrix, as Im sure you know, takes place in a world where machines
have taken over as the dominant force on the planet. Most of the
LYQERVEGIMWMQTVMWSRIHMRIRHPIWWIPHWSJIRHPIWWXS[IVWPMRIH
[MXLYMHPPIHGETWYPIWMR[LMGLIEGLLYQERWFSH]LIEXMWYWIHXS
fuel the machines in the absence of solar energy. These humans are
placed in a collective dream world, called the Matrix, which mimics
their society of old, and most of them will never even suspect that their
world is anything other than real. Those who do are sometimes found
F]VIWMWXERGIKLXIVW[LSJVIIXLIQXSPMZIMRE[SVPHSJVIPIRXPIWW
pursuit by robotic sentinels, living in cold, crude hovercrafts, and bowls
of snot for breakfast.
+SMRKFEGOXSSYV[SVPHQIHMEMWIZIVQSVITVIZEPIRXERHXIGLRSPSK]
is giving us more and more immersion in that media. Film began as
FPEGOERH[LMXIXLIRGSPSYVXLIR,(XLIR(ERHRS[/[LMGL
is approaching the maximum resolution that our eyes can perceive,
depending on distance. In search of even greater immersion, we are
RS[XYVRMRKSYVEXXIRXMSRXS:6ERH%+%YKQIRXIH6IEPMX]
[LMGL
GSYPH[IPPFIXLIQSWXI\GMXMRKSJXLIQEPP+SSKPIVIGIRXP]PEYRGLIH
+SSKPI+PEWW%+KPEWWIW[LMGLHMWTPE]ZEVMSYWTMIGIWSJMRJSVQEXMSR
in the corner of your vision, such as reminders or directions. They will
IZIRXEOITMGXYVIWMJ]SYXIPPXLIQXS6IKEVHPIWWSJ[LIXLIV+PEWW
takes off, the potential in this technology is astounding. Not too long
JVSQRS[]SY[MPPFIEFPIXS[EPOEVSYRH[MXLE,IEHW9T(MWTPE]
,9(
HMWTPE]MRKEPPSJ]SYVZMXEPMRJSVQEXMSREW[IPPEWEPMXXPIFEVXS
indicate how full your bladder is. A somewhat less exciting version of
XLMWMWEPVIEH]FIMRKHIZIPSTIHF]+SSKPIERH2SZEVXMWMRXLIJSVQSJ
a contact lens for diabetes sufferers, which monitors glucose levels and
XVERWQMXWVIEHMRKWXSEWQEVXTLSRISVGSQTYXIV&EGOXSXLI,9(
when you drive somewhere (assuming you actually do the driving, we
are trying to automate that bit as well), you are guided by arrows in
your vision. If you visit a racetrack, you can compete against the ghostly
image of a friends car that follows the same path and speed as they
SRGIHMH=SYGSYPHRHSYXLS[]SYWXEGOYTEKEMRWXER]FSH][LSLEW
HVMZIRXLEXXVEGOFIJSVITIVLETWIZIRXLI7XMK
8STEVETLVEWI2ISJVSQXLIEJSVIQIRXMSRIHZMWYEPQIHME-ORS[]SYVI
out there, I can feel you. I can feel that youre afraid, afraid of change. I
didnt come here to tell you how the world is going to end, rather to
WLS[]SYLS[MXWKSMRKXSFIKMR-QKSMRKXSRMWLXLMWTEVEKVETLERH
then Im going to show you a world without me. A world without rules
and controls, without borders or boundaries, a world where anything is
TSWWMFPI;LIVI]SYKSJVSQXLIVIMWEGLSMGI-PIEZIXS]SY
3JGSYVWIXLIWII\EQTPIWYWI%+EWETIVMTLIVEPXSIZIV]HE]PMJI
and with this arm of progress will come the other,Virtual Reality. The
videogame industry has looked into this before, particularly Nintendo
[MXLXLIMV:MVXYEP&S]MRFYXRS[XLEXXLIXIGLRSPSK]LEWGEYKLX
up, it is being revisited with substantially more impressive results. A
famous example of this is the Oculus Rift VR headset, which potentially
allows you to become completely immersed in whatever world your
virtual avatar occupies, moving its viewpoint as you move your head.
From there, it is a short step to imagine places where people go to
IRNS]PS[GSWXZMVXYEPLSPMHE]WWYGLEW[LEX]SYQE]LEZIWIIRMRTotal
Recall or Inception, albeit the latter is literally a dream rather than a
virtual world. From holidays will come the possibility of extended stays
17
Colin
Williams
SBL
8,)1-2(7-28,)1%88)6
The Forgotten Architects of the Cyber Domain
18
.YP]8LI7IGSRH;SVPH;EVMWHVE[MRKXSMXWREPGPSWI
%PXLSYKLXLI97%[MPPGSRXMRYIXSGSRHYGXSTIVEXMSRWMRXLI
4EGMGXLIEXVIYRXMPEVEHMSFVSEHGEWXF])QTIVSV,MVSLMXSSR
7ITXIQFIVXLERRSYRGIW.ETERWWYVVIRHIVXLISYXGSQI
is assured. Victory in Europe had already been achieved.
+IVQER]LEHWYVVIRHIVIHYRGSRHMXMSREPP]XSXLI%PPMIWEX
SR1E]XL&].YP]XSXEP%PPMIHZMGXSV][EWEREFWSPYXI
inevitability. Peace loomed.
8LIWIIHWSJXLI'SPH;EVLEHEPVIEH]FIIRTPERXIHTIVLETW
as early as the Nazi-Soviet Non-Aggression Pact of 1939.
'IVXEMRP]F]XLIJVERXMGVEGIXS&IVPMRFIX[IIRXLI9776JVSQ
XLI)EWXERHXLI9/ERHXLI97%JVSQXLI;IWXJSPPS[MRK
the Normandy landings and the Allied invasion of Europe.
From these seeds, the roots of the continuing, global, and
I\MWXIRXMEPWXVYKKPIXLEX[EWXSHIRIERHWLETIXLILYQER
story for what remained of the twentieth century were
EPVIEH]KVS[MRKERHEXEVIQEVOEFPIVEXI,S[IZIVMX[SYPH
RSXFIYRXMP1EVGLXLXLEX'LYVGLMPP[SYPHHIGPEVI
from Stettin in the Baltic to Trieste in the Adriatic an iron curtain
has descended across the Continent.
-R.YP]XLIHIITXIVVSVWSJXLI'SPH;EV[IVIJSVQSWX
SJLYQERMX]YRJSVIWIIRERHYRMQEKMRIH-R.YP]QER]
SJLYQERMXMIWRIWXQMRHW[IVIGSQTIPPIHXSGSRXIQTPEXI
on the ruins of the world and, more importantly, on the
new world that they would make to replace and improve
that which had been destroyed. Fascism had been defeated.
Democracy had prevailed. A high price had been paid by
victor and vanquished alike. Cities, nations and empires lay in
the ruins of victory as well as of defeat. Amongst the victors,
IPEXMSR[EWXIQTIVIH[MXLI\LEYWXMSR8LI9/IGSRSQ]MR
particular having been dealt a beating from which it would
never recover.
The world had witnessed the capacity of human science
and technology to mechanise and industrialise wholesale
WPEYKLXIVSJWSPHMIVWERHGMZMPMERWEPMOILEH[EXGLIHXLI
QEWWTVSHYGXMSRSJHIEXLTPE]IHSYXSREKPSFEPWXEKI;EV
ERHKIRSGMHILEHFIIRVIRIHF][IWXIVRGMZMPMWEXMSRXS
a grotesquely clinical exercise in accountancy and modern
QEREKIQIRX8LIPIKMXMQEG]SJXLI)YVSTIERMQTIVMEPTVSNIGX
perished in the barbarity and horror of Auschwitz and
Stalingrad.
In order to secure this victory, the entirety of the will, energy
and treasure of the greatest nations on Earth had been
HIZSXIHXSSRIWMRKPIEMQZMGXSV]8LMWLEHFIIREXSXEP[EV
in every sense of the word. Now that the victory had been
EXXEMRIH[LEXRI\X#;LEX[EWXLIRI[[SVPHXSFIVIQEHI
from the ruins of the old to look like?
19
-RXLI7YQQIVSJXLIVI[EWEWIRWIXLEXKVIEXXLMRKW
must now be done in order to ensure that the new world
[SYPHFISRI[SVXL]SJXLIWEGVMGIWXLEXLEHFIIRQEHI
a peace worth the price. All of this had to have been for
something. Amongst the great minds of humanity a sense
had grown of the power of human agency and spirit to create
great effect. These were the minds that had harnessed the
power of the atom, through technology, to the human will.
These were the minds that had created machines of vast
power and sophistication to make and break the deepest of
secrets. These were the minds that sensed the expectations
of history upon them. It was their responsibility, individually
ERHGSPPIGXMZIP]XSWIGYVIXLITIEGINYWXEWMXLEHFIIRXS[MR
the war. It was their duty to enhance and improve the human
condition. And, they knew it.
-RXLI.YP]MWWYISJXLIAtlantic Monthly, the man who
LEHWTIRXLMW[EVHMVIGXMRKERHGLERRIPPMRKXLIWGMIRXMG
research required to secure victory in arms, responded to
the imperatives of the peace, and the call of history, with the
TYFPMGEXMSRSJXLIWIQMREPTETIV%W;I1E]8LMRO%WVWX
the chairman of the National Defense Research Committee,
ERHXLIRXLIHMVIGXSVSJXLI3JGISJ7GMIRXMG6IWIEVGLERH
Development,Vannevar Bush was responsible for directing and
co-ordinating the prodigious and ground breaking research
required to enable the prosecution of total war on an
industrial scale.
In his paper, Bush openly acknowledges that, for scientists,
MXLEWFIIRI\LMPEVEXMRKXS[SVOMRIJJIGXMZITEVXRIVWLMTMR
SVHIVXSEXXEMREGSQQSRGEYWI,ITSWIWXLIUYIWXMSR
[LEXEVIXLIWGMIRXMWXWXSHSRI\XRS[XLEXXLII\LMPEVEXMSR
of the war has ebbed away? His answer is that the scientists
of the peace must turn their attentions to making real the
radical transformation in the relationships between humanity
and information promised by the technology developed at
such pace and cost during the war. For Bush this is about
far more than computers as great calculators for scientists;
a much larger matter than merely the extraction of data for the
TYVTSWIWSJWGMIRXMGVIWIEVGLMXMRZSPZIWXLIIRXMVITVSGIWWF]
[LMGLQERTVSXWF]LMWMRLIVMXERGISJEGUYMVIHORS[PIHKI
Bush proposed the creation of a device to extend and
IRLERGIXLILYQERQIQSV]EQEGLMRIXSEMHERHEYKQIRX
XLILYQERTS[IVWSJGSKRMXMSRMQEKMREXMSRERHGVIEXMSR
a computer to work in symbiosis with the human. He
proposed a device that would operate as human thought
does, by association. For Bush, the human mind can, with
one item in its grasp, link instantly to the next that is suggested
by the association of thoughts, in accordance with some intricate
web of trails carried by the cells of the brain. He describes a
future device for individual use, which is a sort of mechanized
TVMZEXIPIERHPMFVEV],IKMZIWMXEREQIXLIQIQI\
8LIQIQI\I\XIRHWXLILYQERQIQSV]ERHXLIQMRHit
is a device in which an individual stores all his books, records,
and communications, and which is mechanised so that it may be
GSRWYPXIH[MXLI\GIIHMRKWTIIHERHI\MFMPMX]
,IKMZIWXLIRI[XLMRKEJSVQMXMW a desk. For the human,
it is a piece of furniture at which he works, rather than a
Q]WXIVMSYWMREGGIWWMFPIKEVKERXYERQSRWXIVQEGLMRIPPMRK
ERIRXMVIVSSQ-XMWQSYPHIHEVSYRHLYQERMRXIVEGXMSR
it has slanting translucent screens on which material can be
projected for convenient reading. For data entry and control
there is both a keyboard, and provision for direct entry via
a transparent platen upon which can be placed longhand
notes, photographs, memoranda. These originals can then
be photographed onto the next blank space in a section of the
QIQI\PQ If at any time the user losses the thread of their
interaction with the memex, a special button transfers him
MQQIHMEXIP]XSXLIVWXTEKISJXLIMRHI\
through XMQIWLEVMRKGSQTYXIVW]WXIQW[MXLVIQSXIYWIVXIVQMREPW6.
Bushs paper lays out the essence of the core thinking upon which the
;SVPH;MHI;IF[EWXSFIGSRWXVYGXIH&YWLTVSZIHMRGSVVIGXMRLMW
preference for analogue over digital computers. However, his vision,
of the human interactions with information augmented by symbiotic
machines integrated by design in to the associative workings of human
GSKRMXMSRLEWFIIRQEHIVIEP;IWIIXLMWMRXLIEPKSVMXLQWHVMZMRK
XSHE]WWIEVGLIRKMRIWMRXLIGSRGITXWERHXIGLRSPSK]SJL]TIVPMROMRK
XLEXTVSZMHIWXLIXLVIEHWSJXLI;IFFYMPXYTSRXLIHIGEHIWSJ
EWWSGMEXMZIERHGYQYPEXMZIXLSYKLXLIMRMXMEXIHERHMRXLITVMRGMTEPW
informing the graphical user interface model of mediating human
communications with our machine counterparts.
-RXLIVWXIQEMP[EWWIRXEGVSWW%64%2)8%W]WXIQSJ
networked computers created in 1963 as a direct realisation of J. C. R.
Lickliders vision. A system conceived and moulded by human thought
ERH[MPPXLIW]WXIQXLEXWXERHWEWXLITSMRXSJKIRIWMWSJXLI-RXIVRIX%
net that provided the fabric from which Bushs web could, and would, be
woven. The foundations of a cybernetic system in which Bushs memex
morphs in to the universal machine of Turing and von Neumann.
-R[LMPWXEX%64%0MGOPMHIVIWXEFPMWLIHERETTPMIHVIWIEVGL
programme that laid the foundations for generations of research and
development, and postgraduate teaching, in computers and computing.
The programme took years if not decades to bear fruit. Directly and
indirectly, it produced some of the keystone elements of modern
computing. It continues to do so to this day.
The names of the institutions funded by this programme still reads like
a whos who of the great and the good in the realms of the teaching and
VIWIEVGLSJGSQTYXMRK&IGEYWISJ0MGOPMHIV9RMZIVWMX]SJ'EPMJSVRME
&IVOPI][EWKVERXIHJYRHWXSHIZIPSTXMQIWLEVMRKXLVSYKL4VSNIGX
+IRMI0MOI[MWIXLI1EWWEGLYWIXXW-RWXMXYXISJ8IGLRSPSK][EWIREFPIH
to research Machine Aided Cognition, or Mathematics and Computation,
or Multiple Access Computer, or Machine Aided Cognitions, or Man
ERH'SQTYXIVXLVSYKL4VSNIGX1%'7;LEX[EWXSFIGSQI'EVRIKMI
1IPPSR9RMZIVWMX]XSSOVIGIMTXSJWM\LYRHVIHQMPPMSRHSPPEVWMRSVHIVXS
GSRHYGXVIWIEVGLMRXSXLIXLISV]SJGSQTYXIVTVSKVEQQMRKEVXMGMEP
intelligence, the interactions between computers and natural languages,
the interactions between humans and computers, and, the design of
computing machinery. The Augmentation Research Center within the
Stanford Research Institute was tasked with developing technologies to
enable components of computers and elements of computer systems to
interact.
-R2SVFIVX;MIRIVTYFPMWLIWXLIVWXSJEWIVMIWSJXLVIIFSSOW
MR[LMGLLIERRSYRGIHXLIGVIEXMSRSJERI[WGMIRGICybernetics:
or Control and Communication in the Animal and the Machine. The
foundation text was followed by The Human Use of Human Beings
MRERHXLIXVMPSK][EWGSQTPIXIHMR[MXLGod and Golem,
Inc.;MIRIVWQMWWMSRMR[EWXSTVSZMHIEfresh and independent
TSMRXSJGSQQIRGIQIRXJSVXLIWXYH]SJRSRPMRIEVWXVYGXYVIWERHW]WXIQW
[LIXLIVIPIGXVMGSVQIGLERMGEP[LIXLIVREXYVEPSVEVXMGMEP. By 1964 he
[EWVIIGXMRKSRthree points in cybernetics. Firstly, machines which
learn. Secondly, machines able to make other machines in their own
image. Thirdly, the relations of the machine to the living being 3. Across
XLIWTERSJXLIWIXI\XW;MIRIVHIZIPSTWXLIGSRGITXYEPTLMPSWSTLMGEP
ERHQEXLIQEXMGEPJVEQI[SVOXLEXYRMIWERHXVERWJSVQWLYQERERH
machine in the cyber domain of today.
8LIFMVXLSJ3TIR7SYVGIMRXLIWERHXLIHIZIPSTQIRXSJXLI
6-7'EVGLMXIGXYVIMRXLIWEX9RMZIVWMX]SJ'EPMJSVRME&IVOPI]
stem from the seeds planted by Licklider. As does the genesis of social
RIX[SVOMRKQERMJIWXMRXLI'SQQYRMX]1IQSV]4VSNIGXXIVQMREP
found in Leopolds Records in Berkley in 1973. The use, in 1984, of
robots designed by Carnegie Mellon academics in the clean up of the
wreckage and debris from the partial nuclear meltdown at Three Mile
Island has the same lineage. Likewise, the continuing and growing world
PIEHMRKTSWMXMSRMRXLIEVIEWSJEVXMGMEPMRXIPPMKIRGIERHXLIXLISVMIW
SJGSQTYXEXMSRIRNS]IHF]XLI1EWWEGLYWIXXW-RWXMXYXISJ8IGLRSPSK]
Similarly, the emergence of the mouse, hyperlinks and the graphical user
interface from Stanford shares this common origin. All of this sits in
a direct causational relationship to Lickliders endeavours. All of this,
impressive though it is, leaves out the impact of the graduates from
these institutions and the creation around them of a culture and an
environment within which great things are done. Stanford nestles in
the heart of Silicon Valley and counts Sergey Brin, Larry Page and Vinton
Cerf amongst its alumni.
8[S]IEVWFIJSVILINSMRIHXLIRI[P]GVIEXIH%HZERGIH6IWIEVGL
4VSNIGXW%KIRG]MR.'60MGOPMHIVLEHEPVIEH]FIKYRXSHMVIGX
his thoughts towards the expected development in cooperative interaction
between man and electronic computers that will lead to a QERGSQTYXIV
symbiosis in which a very close coupling between the human and the
electronic members of the partnership will let computers facilitate
formative thinking and enable men and computers to cooperate in making
decisions and controlling complex situations 4. By 1968, Licklider predicted
[MXLEWWYVIHGSRHIRGIXLEXHIWTMXIMXFIMRKa rather startling thing to
say, nonetheless, in a few years, men will be able to communicate more
effectively through a machine than face to face. 5
8LVII]IEVWSRJVSQLMWETTSMRXQIRXXSXLIRI[EKIRG]MR
Licklider was commissioned with the production of a report in to the
Libraries of the Future. His task, not to examine new ways to store
ERHVIXVMIZIFSSOWFYXMRWXIEHXSGSRWMHIVXLIconcepts and problems
of mans interaction with the body of recorded knowledge and to explore
the use of computers in information storage, organisation, and retrieval. His
prediction was that what he called a procognitive system would evolve
based on digital computers. Outlandish though it might seem to the
VIEHIVWSJXLIVITSVXMRXLIWIGSQTYXIVW[SYPHLEZIVERHSQ
EGGIWWQIQSV]GSRXIRXEHHVIWWEFPIQIQSV]TEVEPPIPTVSGIWWMRK
GEXLSHIVE]SWGMPPSWGSTIHMWTPE]WERHPMKLXTIRWLMIVEVGLMGEPERHVIGYVWMZI
TVSKVEQWXVYGXYVIWTVSGIHYVISVMIRXEXIHERHTVSFPIQSVMIRXEXIHPERKYEKIW
and xerographic output units. 8LI][SYPHFIIRQIWLIHMRXIVGSRRIGXIH
8LI97%LEHJEPPIRFILMRH7SZMIXXIGLRSPSK][MXLSYXIZIRORS[MRKMX
;SVWIXLI97PEGOIHXLIGETEGMX]XSGSRHYGXXLIVIWIEVGLVIUYMVIHXS
GEXGLYT-R*IFVYEV]MRXLIQMHWXSJLMWTVIWMHIRG])MWIRLS[IV
GVIEXIHXLI%HZERGIH6IWIEVGL4VSNIGXW%KIRG]%64%
-R
Licklider was plucked by ARPA from his professorship in psychology at
MIT, and placed in charge of the newly created Information Processing
8IGLRMUYIW3JGIEX%64%,MWQMWWMSR[EWXSPIEHXLIHIZIPSTQIRXSJ
research and the creation of technologies to enable the military use of
GSQTYXIVWERHMRJSVQEXMSRTVSGIWWMRK-RLMWS[R[SVHWLMWNSF[EWXS
bring in to being the technology that the military needs 9.
WEPIWIQTPS]QIRXSTTSVXYRMXMIWERHRI[WLEWLERHPIHEPPTIVWSRXSTIVWSR
contacts over wires and recorded every business conversation and agreement
PMWXIRJIPPE0SKMGWGLERKIHGMZMPM^EXMSR0SKMGWEVIGMZMPM^EXMSR-J[IWLYXSJJ
logics, we go back to a kind, of civilization we have forgotten how to run!
Before the risky and radical funding and research construct Licklider
created came into being, not a single Ph.D. in computing had been
GSRJIVVIHER][LIVIMRXLI97%XLIVWXFIMRKE[EVHIHMR
Licklider operated with courage, foresight and vision. Humanity, and the
97IGSRSQ]EVIXLIVMGLIVFIGEYWILIHMH,IIWXEFPMWLIHEREGEHIQMG
GSRXI\XXLEX[SYPHFIMQTSWWMFPIXSEXXEMRMRXLI9/XSHE][MXLMR
XLIGSRRIWWIXF]XLIGYVVIRXJYRHMRKVIKMQIERHI\IQTPMIHMRXLI
Research Excellence Framework.
Our academic institutions are locked in to a funding structure that
actively militates against radical and disruptive thought. Intellectual
creativity and cross-disciplinary work are driven out by a system that
rewards conservatism, conformity and compliance, with research funding
and professional advancement. This same culture fosters a headlong
retreat in to ever narrower slivers of specialisation. The only sense in
[LMGLQEXXIVWHMJJIVJVSQ&YWLWSFWIVZEXMSRMRXLEXthere
is increasing evidence that we are being bogged down as specialization
extends 8 is that we are now worse off than they were three quarters
of a century ago.
Just as we have retreated in to the cold comfort of conformity in
WXIVMPIVIWIEVGLWS[ILEZIEPPS[IHXVEMRMRKXSYWYVTIHYGEXMSR;I
are producing generation after generation of graduates, more or less
skilled in the rote application of knowledge and processes, which are
themselves more or less relevant to the world as it is. These graduates
have no sense of the interactions between the technology of computing
ERHLYQERMX]RSWIRWISJXLISVMKMRWERHREXYVIIZIRSJXLIXIGLRSPSK]
8LI]EVIXVEMRIH8LI]EVIXIGLRMGMERWLMKLP]WOMPPIHXIGLRMGMERW[MXL
EHIQSRWXVEFPIEFMPMX]XSQEWXIVZIV]GSQTPMGEXIHTVSGIWWIWFYX
technicians nonetheless. They are, by design, bereft of the capacity for
critical or creative thought. They can exercise formal logic in response
to established patterns. They can accomplish complicated and familiar
tasks with great faculty. Yet, by virtue of the training itself, they are
incapable of adapting to change. They are closed systems, devoid of the
EFMPMX]XSEGXSRJIIHFEGO9REFPIXSGLERKIXLIMVWXEXIERHYREFPIXS
IZSPZI9RPMOIXLIG]FIVW]WXIQXLI]MRLEFMX
;IEVIFIKMRRMRKXSKVSTIXS[EVHWXLIVWXKPMQQIVMRKWSJ
comprehension of the enormity, and scale, and velocity of the
transformation to the human story that is cyber. Once more, it is
required of us to think and act with courage, foresight and vision. It
falls to us to reform and reshape both the what and the how of our
thoughts and our deeds. It is time to prove ourselves worthy of the
trust placed in us by the architects of the cyber domain.
;ISJGSYVWILEZIWSQIXLMRKEZEMPEFPIXSYWXLEXXLIEVGLMXIGXWSJXLI
HSQEMRHMHRSXXLII\MWXIRGISJXLIHSQEMRMXWIPJ%RMQQIEWYVEFP]
powerful construct conceived, designed and engineered by its makers
precisely in order to liberate human intelligence and creativity. Time to
WLIHXLIWLEGOPIWSJXLI'SPH;EVERHWIXMXJVII
-TVSTSWIXLIGVIEXMSRSJERI[MRWXMXYXI8LI4VSQIXLIYW-RWXMXYXI
for Cyber Studies. So named as a conscious invocation of all of the
GEHIRGIWEQFMKYMXMIWERHHMJGYPXMIWSJXLIWXSVMIWSJ4VSQIXLIYWERH
LMWXLIJXSJVIJVSQXLIKSHWSJ3P]QTYWLMWKMJXSJXLMWWXSPIRERH
most sacred of their possessions to humanity. The Prometheus Institute
should be based at, but operate independently from, an established
academic institution. It should be formed along the lines of the learned
and scholarly societies of the Enlightenment. It should embrace and
develop a truly trans-disciplinary approach to improving the human
understanding and experience of the cyber phenomenon through
scholarship, research and teaching. In his creation of the new science of
G]FIVRIXMGW;MIRIVPMXEXSVGLSYVXMQIXSGEVV]MXJSV[EVH
References
1
1ERERHXLI'SQTYXIV.SLR+/IQIR]/IQIR][EWXLITVIWMHIRXSJ
(EVXQSYXL'SPPIKIJVSQXS8SKIXLIV[MXL8LSQEW)/YVX^LIHIZIPSTIH
BASIC and one of the earliest systems for time-sharing networked computers. As a
graduate student he was Albert Einsteins mathematical assistant.
']FIVRIXMGWSV'SRXVSPERH'SQQYRMGEXMSRMRXLI%RMQEPERHXLI1EGLMRI2SVFIVX
;MIRIV
The choice is (probably) yours.
3
+SHERH+SPIQ-RG2SVFIVX;IMRIV
4
1ER'SQTYXIV7]QFMSWMW.'60MGOPMHIVTYFPMWLIHMR-6)8VERWEGXMSRWSR,YQER
*EGXSVWMR)PIGXVSRMGW:SPYQI,*)1EVGL
8LI'SQTYXIVEWE'SQQYRMGEXMSRW(IZMGI.'60MGOPMHIVERH6SFIVX;8E]PSV
TYFPMWLIHMR7GMIRGIERH8IGLRSPSK]%TVMP
6
0MFVEVMIWSJXLI*YXYVI.'60MGOPMHIV
7
The acronym MAC was originally formed of Mathematics and Computation but was
VIGSQTSWIHQYPXMTPIXMQIWEWXLITVSNIGXMXWIPJEHETXIHERHIZSPZIH
8
%W;I1E]8LMRO:ERRIZEV&YWL%XPERXMG1SRXLP].YP]
9
1IQSVERHYQSJVH%TVMPJVSQ.'60MGOPMHIVMR;EWLMRKXSR('XS1IQFIVW
ERH%JPMEXIWSJXLI-RXIVKEPEGXMG'SQTYXIV2IX[SVOVIKEVHMRK8STMGWJSV(MWGYWWMSREX
XLI*SVXLGSQMRK1IIXMRK
TO INANITY
AND BEYOND?
Keith Scott
De Montfort
University
;LEXMWMXXLEXEQERQE]GEPPXLIKVIEXIWXXLMRKWMR
PMJI#
,SX[EXIVKSSHHIRXMWLXV]ERHWLSJXPEZEXSV]TETIV1
More than this, think of how our everyday existence relies on a level of omnipresent, pervasive technology that
RSTVIZMSYWIVEIZIVMQEKMRIHEW;EVVIR)PPMWTYXWMX
-J-[IVIWMXXMRKRI\XXS]SYX[IRX]ZI]IEVWEKSERH
you heard a phone ring, and I took out a bar of glass and
WEMHWSVV]Q]TLSRINYWXXSPHQIMXWKSXRI[ZMHISSJ
EWSPEVEVI]SYHLEZIQIWIGXMSRIHMREEWL9WIXLI
VIEVZMI[QMVVSVXSMQEKMRIXIPPMRKWSQISRINYWXX[IRX]
ZI]IEVWEKSEFSYX+478LMWMWXLIPEWXKIRIVEXMSRMR
XLI;IWXIVR[SVPHXLEX[MPPIZIVFIPSWX0MJI7XVE[W7]R
XLIXMGFMSPSK]+IRIXMGWIUYIRGMRK7%67[EWKIRIXMGEPP]
WIUYIRGIH[MXLMRLSYVWSJMXWMHIRXMGEXMSR-QRSX
IZIRXSYGLMRKXLI[IF[MQSFMPIFVSEHFERHGPSYH
GSQTYXMRKIPIGXVSRMGGMKEVIXXIW2
How much of what Ellis talks about could you describe
to your ancestors? How much could you explain?
Before descending into a Panglossian declaration that
[IPMZIMRXLIFIWXSJEPPTSWWMFPI[SVPHWVIQIQFIVXLMW
every generation regards the one preceding it as out of
touch and less techno-savvy than their own, and sees
themselves as the acme of humanity. Every generation
is in turn overtaken by the next, as new technological
developments mark our time to stall on the information
highway. Return to the image of your family line, and picture yourself in the middle of the queue, rather than at its
LIEHLS[JEV[MPP]SYLEZIXSKSFIJSVI]SYRH]SYVWIPJ
gaping in blank incomprehension at the everyday lives of
your descendants? Ten generations? Five? Two? The past
QE]FIEW04,EVXPI]TYXMXEJSVIMKRGSYRXV]XLIJYXYVI
is terra ignota, and its closer than we think - or like.
8LIJYXYVIMWEPVIEH]LIVI[IEVIFYMPHMRKMXERHMJ7*LEWER]ZEPYI
(which I believe it does) it lies in its ability to sketch out possible ways in
[LMGLXLITVIWIRXQE]HIZIPST-RLMWEHHVIWWXS+VIWLEQ'SPPIKI2IEP
7XITLIRWSRKMZIW[LEX-JIIPMWXLIWMRKPIFIWXHIRMXMSRSJXLIJSVQ
7*XLVMZIWFIGEYWIMXMWMHIETSVR8MXGSYTPIWXSKIXLIVE[MHIVERKISJ
concepts in new and often shocking ways, and lets its readers experience the vicarious thrill of seeing what emerges from the process. It
offers us the opportunity to gaze toward the stars, or to stare into the
EF]WW.SWLYE)PPMWTIVJIGXP]WYQWYTXLIGSRMGXMRKZMWMSRWSJXLIJYXYVI
7*TVIWIRXW
the Future gets divided; the cute, insulated future that Joi Ito and Cory
Doctorow and you and I inhabit, and the grim meathook future that most
SJXLI[SVPHMWJEGMRKMR[LMGLXLI][EXGLXLIMVWUYEXWERHYRHIVHIZIP
STIHIPHWKIXXYVRIHMRXSEKMERXKEQISJ'SYRXIVWXVMOIFIX[IIRGVE^]
JEMXLVMHHIRNMLEHMWXQSXLIVWERHGVE^]JEMXLVMHHIR%QIVMGERVIHRIGO
QSXLIVWIEGLHSMRKXLIMVFIWXXSXYVRXLIIRXMVI[SVPHMRXSSRIX]TISJ
fascist nightmare or another. 9
The cybernarratives of SF privilege curiosity, questioning, and exploration of ideas (perhaps one of the reasons why it is often dismissed as
MQQEXYVISVEHSPIWGIRXMJEHSPIWGIRGIMWEFSYXER]XLMRKMXMWEFSYX
the cultivation of the imagination and the refusal to accept the status
quo). The cybernarratives of society, on the other hand, tend by their
very nature to preach conformity, stability, and obeisance to established
ZEPYIW-RXLIEHHVIWWUYSXIHIEVPMIV;EVVIR)PPMWMHIRXMIWXLIHERKIVW
SJWYGLERETTVSEGL
A writer called Ventakesh Rao recently used the term manufactured normal
cy to describe this.The idea is that things are designed to activate a psy
chological predisposition to believe that were in a static and dull continuous
TVIWIRX%XIQTSVEPMX]GSRWMHIVIHXSFIXLIGSRHMXMSRSJXLIIEVP]WXGIRXYV]
[...]
We hold up iPhones and, if were relatively conscious of history, we point out
that this is an amazing device that contains a live map of the world and
the biggest libraries imaginable and that its an absolute paradigm shift in
personal communication and empowerment. And then some knob says that it
looks like something from Star Trek Next Generation, and then someone else
says that it doesnt even look as cool as Captain Kirks communicator in the
original and then someone else says no but you can buy a case for it to make
it look like one and youre off to the manufactured normalcy races, where
RSFSH][MRWFIGEYWIIZIV]SRIKSIWXSMRKWPIIT10.
8LIVIMWRSTVEGXMGEPSFWXEGPI[LEXIZIVRS[XSXLIGVIEXMSRSJERIJGMIRX
index to all human knowledge, ideas and achievements, to the creation, that is,
of a complete planetary memory for all mankind.6
-R:ERRIZEV&YWLTYFPMWLIH%W;I1E]8LMRO[LMGLTVSTSWIH
XLI1)1)<EXIVQMREP[LMGL[SYPHEPPS[EYWIVXSEGGIWWER]MXIQSJ
ORS[PIHKIJVSQER][LIVI8LIRMR%VXLYV''PEVOITVSTSWIH
XLEXXSXLMW;SVPH0MFVEV][SYPHFIGSYTPIHEWYTIVGSQTYXIVXLI
;SVPH&VEMR
[LMGL[SYPHFIYWIHXSRHWSPYXMSRWXSEPPXLI[SVPHW
problems. Put together, these three authors appear to have predicted
XLI;IFERH;MOMTIHMERSRISJXLIQJSVIWE[PSPGEX^SVGLERSV
Twitter, or.... feel free to add to the list.
%XMXWFIWX7*MWERI\XVETSPEXMZIRSXETVIHMGXMZIQIHMYQMXMWPIWW
GSRGIVRIH[MXLXLMRKWXSGSQIXLERXLMRKWXLEXQMKLXRSX
GSQIMJ
[IHSRX
KIXSYVEGXXSKIXLIV%W8LSQEW(MWGLTYXMX
WGMIRGIGXMSRMWRSXEFSYXTVIHMGXMRKXLIJYXYVIFYXI\EQMRMRKXLITVIWIRX
The world that Aldous Huxley depicts in Brave New World is not some hypo
XLIXMGEPXSQSVVS[MXMWXLIXLVMPPIHERHLSVVMIHVIEGXMSRSJERYTTIVGPEWW
)RKPMWLQERVIEGXMRKXSLMWVWXZMWMXXS.E^^%KI%QIVMGEEREXMSRXLEXZEPYIW
the feelies (Hollywood movies) above the tragic vision of Shakespeare.The
world that George Orwell envisaged in 1984 is simply a darker version of the
year it was written, 1948. 7
How do we promote Computer Science in schools? Not through a narraXMZIXLEXWE]WXLMW[MPPFIYWIJYPKSSHJSV]SYXLIIEX]SYVKVIIRWWXVEXegy will never appeal. A more successful approach may be to leave copies
SJ'SV](SGXSVS[W0MXXPI&VSXLIVP]MRKEVSYRHXLMW]SYRKEHYPXRSZIP[MPP
teach its target audience a great deal about how technology works, and
LS[MXGER[SVOJSVXLIQMXEPWSKIXWXLIQXLMROMRKEFSYXMWWYIWSJIXLMGW
MRHMZMHYEPVIWTSRWMFMPMX]ERHIQTS[IVQIRXEGVEWLGSYVWIMRG]FIVIXLics, wrapped up in the packaging of a technothriller. Combine this with
Raspberry Pis and 3D Printers in every school (primary and secondary) in
the country, and we might actually be getting somewhere.
%REXMSREPG]FIVWOMPPWIHYGEXMSRTVSQSXMSRWXVEXIK]QYWXFITPERRIH
at governmental level, and that is where our problem lies. The current
Cabinet is overwhelmingly the product of the prevailing narrative of a
traditional ruling class, schooled in the established model of education for
the British 'PEWWMGEP+VIIOJSVLIPQWQERSVKSZIVRSV
XLIVSSXSJG]FIVRIXMGW
SYXSJ'EFMRIXQIQFIVWEVIQEPI
EVI[LMXIEVI3\FVMHKIKVEHYEXIWERHLEZIEHIKVIIMR44)RSRI
are scientists (and no, economics does not count). As a degree, PPE was
MRXVSHYGIHMRXLIWEWXLIMHIEPXVEMRMRKJSVGMZMPWIVZERXWHIWMKRIHXS
VITPEGI'PEWWMGWXLIXMQILEWWYVIP]GSQIXSHIZMWIERI[GYVVMGYPYQXS
prepare those who will inhabit and govern the realm of the digital natives.
And what should such a curriculum include? Skills and technical knowledge,
certainly, mathematics and logic without a doubt, but also a consideration
SJGYPXYVEPMWWYIWI\EQMRMRKLS[XLIXIGLRSPSK]MRYIRGIWWSGMEPERH
individual psychology, and a knowledge of the legal and moral aspects of
cyber as a domain. As the (deeply unfashionable) SF writer Robert Heinlein
TYXWMXMR8MQI)RSYKL*SV0SZI
A human being should be able to change a diaper, plan an invasion,
butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders,
cooperate, act alone, solve equations, analyze a new problem, pitch manure,
TVSKVEQEGSQTYXIVGSSOEXEWX]QIEPKLXIJGMIRXP]HMIKEPPERXP]
7TIGMEPM^EXMSRMWJSVMRWIGXW
;LEXWLEPP[IEHHXSXLIPMWX#
McAfee SIEM:
Built for Big Data
McAfee emerges as a leader in
Gartners SIEM Magic Quadrant
Best Practice
for the Big Data
Security Age
Todays advanced threat
landscape poses many
challenges for organisations.
Whether it is the volume
and sophistication of threats
across all fronts or the lack of
real-time visibility, security
appears to be blinkered to
the big data opportunity.
But this must change, and
quickly, as organisations
need to turn their attention
to harnessing and unlocking
the hidden insights of their
security data.
For three years in a row, McAfee has been designated as a leader in the
+EVXRIV1EKMG5YEHVERXJSV7IGYVMX]-RJSVQEXMSRERH)ZIRX1EREKIQIRX
reportand for great reasons.
-XWXLI&MK(EXE7-)1%GGSVHMRKXS+EVXRIV1G%JII)RXIVTVMWI7IGYVMX]
Manager, customers have experienced the highest validated event data
ingest rates and query performance levels.
We Can Help
SBL is pleased to offer you this advanced SIEM solution that is the perfect
choice for organisations that require high-performance analytics under
high-event-rate conditions.
It meets your needs by delivering an easier, faster and smarter solution
for managing and prioritising your security protection and compliance
initiatives.
But dont take our word for it. See for yourself.
:MWMX[[[WSJXFS\GSYOTEVXRIVQGEJIIXSVIEHXLIGSQTPMQIRXEV]
+EVXRIVVITSVXMagic Quadrant for Security Information and
)ZIRX1EREKIQIRX and our white paper Needle in a Datastack:
The Rise of Big Security Data.
Find out how McAfee SIEM solutions address these top issues in a broad
spectrum of industries, from government to retail.
&MK(EXE7IGYVMX]
7MXYEXMSREPE[EVIRIWW
6IEPXMQIGSRXI\X
)EWISJQEREKIQIRX
-RXIKVEXIHWIGYVMX]
SV
IQEMPIRUYMVMIW$WSJXFS\GSYO
[[[WSJXFS\GSYOTEVXRIVQGEJII
KnIghts of the
K
he
e
Rainb
in
n
abl
a
ab
bl
b
le
l
Rainbow
Table
Cory
Doctorow
Sir Tristan reached across the table and took my fork and held it up to
XLIPMKLXMRWTIGXMRKXLIXMRIWERHGSQTEVMRKMXXSLMWJSVO;SVHPIWWP]
Lady Tracey handed him her fork, too, and after some deliberation, he
picked one and passed the other two back.
Lady Tracey waited until hed carefully squared the fork up on his napkin,
keeping it evenly spaced with his knife and framed by a uniform border
of white paper napkin. Then she darted out one hand, snatched the
fork hed so carefully chosen, and licked all its tines, front and back, and
returned it to its spot.
Sir Tristan glared at her and then set the fork aside and picked up the
remaining three and chose the one with the second-most-uniform tines
and once again set to squaring it up on his napkin. I saw the demonic
glee light up Lady Traceys eyes as she made ready to lick this one, too,
ERH-TYXSYXQ]LERHERHGEYKLXLIV[VMWX(SRX-WEMH'SQISR
1]GVEGOIHWOMRVEWTIHSZIV0EH]8VEGI]WWQSSXLRKIVWERHWLI
shuddered involuntarily.
%PPVMKLXGLMPHVIR1SW^OS[WOMWEMH)RSYKL=SYVIFIMRKEVVEMKRIH
tomorrow and I need you all to be on your best behavior. The
Computer Fraud and Abuse charges are bad, add the conspiracy count
and theres a serious chance youre going to end up in a cell until your
XVMEP2SRISJYW[ERXXLEXHS[I#
,IVIEXPEWX[EWWSQIXLMRKXLEXEPPXLIWXSVMIH/RMKLXWSJXLI6EMRFS[
Table could agree upon.
;I/RMKLXWSJXLI6EMRFS[8EFPILEHEP[E]WLEHETVSFPIQ[MXL
VIWXEYVERXWXLEXTVSFPIQWREQI[EW7MV8VMWXER)VOOS[LS[EW
intolerant of lactose, processed carbohydrates, salt, vegans, forks with
bent tines and people with poor grammar. Tristan never spoke above a
whisper, and he affected a huge mustache that made it impossible for
waitresses to read his lips, which made the lengthy negotiations even
PSRKIV2SVQEPP]XLI/RMKLXWSJXLI6EMRFS[8EFPIXVMIHXSRHUYMIX
restaurants where Sir Tristan could dicker at length without having to
whisper directly into the servers ear, but Moszkowski had chosen the
TPEGIEFYW]TM^^ETEVPSVSR8IPIKVETL,MPPPPIH[MXLRSMW]&IVOIPI]
kids. I suppose he thought it would allow us to converse without being
SZIVLIEVH,I[EWETEVERSMHSPHGMZMPVMKLXW\IVFYX/RMKLXWSJXLI
Rainbow Table could have taught him volumes about the practical limits
of privacy.
The three of us stared uncomfortably at one another until Tristan had
conveyed his exacting pizza parameters, Lady Tracey and Moszkowski
took their turns, and then it was my turn.
,IVIWXLIXVYXL-QMKLXQEOIJYRSJ7MV8VMWXERWSVHIVMRKTIGGEHMPPSIW-
might sneer at Moszkowskis privacy naivet, I might turn up my nose at
the pineapple and anchovies that Lady Tracey eats with such gusto, but
the fact is, at least they can all *eat,* which is more than you can say for
me.
So my idea was why not build something you know useful out of all
XLISPHGSQTYXIVNYROEVSYRHLIVIPMOIEGPYWXIVSVWSQIXLMRK#8VMWXER
always had the least punctuation of anyone I knew, but he made up for
this by inserting extra excited spittle between his words as he talked.
-PPLEZIEKPEWWSJ[EXIV-WEMHERHIRHYVIHXLVIITEMVWSJI]IWPSSOMRK
at me with that mixture of pity and disgust Ive come to know so well.
My stomach growled at me, a sound I felt to my eyebrows, and I touched
Q]QMHVMJJ[MXLSRIFSR]RKIVEJIIPMRKPMOIEHVMIHSYXHVYQLIEHXLI
skin stretched so tight and desiccated that it rustled.
;LIVI[SYPH[IOIITMX#-WEMH%XXLIXMQI8VMWXERERH-[IVIWLEVMRK
ESRIFIHVSSQETEVXQIRXRIEVGEQTYW-WPITXMRXLIPMZMRKVSSQ;LIR
we had houseguests (itinerant hackers, mostly), they slept on an air
QEXXVIWWSRXLIOMXGLIRSSV
8LI[EMXVIWWVIEGLIHSYX[MXLEGLI[IHRKIVREMPERHXETTIH
XLIWGVEXGLIHWMKRSRXLIXEFPIXLEXWEMHQMRMQYQSVHIVTIV
GYWXSQIV-HEPVIEH]RSXMGIHXLIWMKR-WPMHSYXXLIFMPP-HTPEGIH
YRHIVQ]JSVOERHORMJIERHTEWWIHMXXSLIV-XWGSSP-WEMH
;LEXEFSYXXLIIPIGXVMGFMPP#8VEGI]WEMH7LIHFSWWIHEGSPSMR8I\EW
before she moved to Berkeley for college. She could quote the formula
JSVGEPGYPEXMRKXLIRIXEQTIVEKITIVSTJSVXLIGLMPPIVWJVSQQIQSV]
;LEXEFSYXEHQMRMWXVEXMSR#;LEXEFSYXFEGOLEYP#
She rolled her eyes with youthful eloquence and walked off, leaving our
conspiracy to get back to business.
=SYORS[-WEMHJSVEKERKSJWYTIVGVMQMREPW[IVIETVIXX]WSVV]
FYRGL1SW^OS[WOMWEMH-QKSMRKXSTVIXIRH]SYHMHRXWE]XLEX
;IEHQMXXIHXLMW[EWWSERH[IRXSRXSXLIRI\X
thing and the next and several days went by before
Tracey forwarded us both an email about the
engineering faculty inheriting a semi-derelict brick
factory near the docklands as a bequest on the
GSRHMXMSRXLEXXLI]RSXWIPPMXJSV]IEVW8VMWXER
wrote most of the proposal (he was much better
MRTVMRXXLERLI[EWMRTIVWSR
8VEGI]PPIHMRXLI
technical details, and I made the pitch to a prof we all
liked and he passed it up the food chain and we ended
YT[MXLWUYEVIJIIXEFSYXSRIXIRXLSJXLI
available square footage.
;IVMKKIHXLI[EXIVGSSPMRKSYVWIPZIWYWMRKWIE
water. Our faculty supervisor carefully ensured that
LIHMHRXORS[[LEX[I[IVIHSMRK%XVWXXLIVI
were a few other groups that applied for space in the
Brick Shithouse (as the factory was instantly dubbed,
thanks in part to the faint sewage smell that no
amount of airing could get rid of ). But no one really
wanted to haul ass out to the Shithouse and soon
[ILEHXLITPEGIEPPXSSYVWIPZIW3YVWUYEVI
feet quickly grew to nearly the whole building, row
on row of PCs of every description salvaged from
campus and nearby, wiped and enlinuxed, networked
and left to wheeze for as long as they went on
[SVOMRK%XER]KMZIRXMQIEFSYXTIVGIRXSJXLI
cluster was nonfunctional, and we made good use
of impressionable freshmen whom we sourced via
Craigslist and threw at the problem machines, letting
XLIQOIIT[LEXIZIVXLI]GSYPH\8LMWWSYRHW
^IVSWYQMJXLI]XSSOIZIV]XLMRKXLI]\IH[SYPHRX
that mean that the dead machines would disappear?
&YX\MRKGSQTYXIVWMWPMOIIEXMRKTSXEXSGLMTWQSWX
TISTPIGERXWXSTEXNYWXSRI)EGLSRIMWETIVJIGX
puzzle of vendor defects, material wear, capricious
software ghouls, and emergent phenomena. The brainreward for restoring a genuinely threadbare PC to
active duty was more psychotropic than anything for
sale in Peoples Park.
So my idea
was why
not build
something you
know useful
out of all the
old computer
junk around
here like a
cluster or
something?
,S[QYGLTS[IVHMH[ILEZI#0IWWXLER+SSKPI
more than all the radio astronomers in Europe,
GSQFMRIH8LIRYQFIVMWRXMQTSVXERXXSFY]ER
LSYVW[SVXLSJEWQYGL'49EW[IEWWIQFPIHMR
todays cloud marketplace, youd have to work for two
hours at minimum wage. Our pizza waitress could
blow us out of the water and still have enough left for
rent, assuming she had a roommate.
;LEXHMH[IHS[MXLEPPXLEXTS[IV#%XVWX[INYWX
IRXIVIHZEVMSYWFMKGSQTYXEXMSRTVSNIGXWXLVS[MRK
SYVJEVQEX*SPHMRK$,SQIXSHSWSQILERHMP]
parallelizable fast Fourier transforms in order to help
KLX%-(7ERHGERGIVERHWYGL8LMWMWI\XVIQIP]
altruistic work, but its not very interesting from
a research perspective. As interesting as it was to
step into the frigid Shithouse and be engulfed in the
[LMXIRSMWINIX[EWLSJEPPXLIGSQTYXIVW[I[IVIRX
learning anything about our cluster or its individual
components.
It was Tracey who decided to go after rainbow tables,
these being something of a holy grail in the security
IPH-X[EW8VEGI][LSQEHIYWXLI/RMKLXWSJXLI
Rainbow Table, and set our destiny in motion. But I
forgive her.
an Erkko
Sir Trist
31
To understand rainbow tables, you need to understand hashfunctions. These are fundamental units of the cryptographic
arts, and what they do is easy to grasp but requires either
a large amount of math or a large amount of faith. For the
purposes of this account, I will go with faith.
Take it on faith, if you will that there is a way to convert one
blob of text (the password) into another blob of text (the
LEWL
WYGLXLEXMXMWQEXLIQEXMGEPP]GIVXEMRXLEX
a)
Youre
joking,
right? Once
youve got
swords,
you cant
*not* have
swords. Are
you going
to take
apart the
Shithouse?
Lady Tracey
Combine that with the screaming doubling curve that computer power
rides and you got our shelves, where a given computer might be, quite
literally, a million times faster than its neighbor (and like as not, it would
FIGSRWYQMRKEXIRXLSJXLITS[IVXEPOEFSYXIGSKYMPX[I[IVIE
SRIFYMPHMRKGEVFSRGVMQI[EZI
;ILEHLIXIVSKIRIMX]JSVHE]WERH
with that salmagundi came any number of chewy, interesting clustering
TVSFPIQW;LMGLGSQTYXIVWWLSYPHFIMRGLEVKISJ[SVOMRKXVERWPEXMRK
passwords into hashes), and which computers should be in charge of
apportioning work? How do you index whats on which
Enter the rainbow table. Imagine that you fed a dictionary into the
hashing algorithm and made a table of the hashed equivalent of every
word, and even non-words, such as words in combination, words with
simple substitutions, slang, vernacular, foreign words, common phrases.
Then, having captured a passwords hash, you could compare it with
every one of those hashed words look it up in your handy English,EWLIWI,EWLIWI)RKPMWLHMGXMSREV]ERHSYXTSTWXLIWIGVIXTEWW[SVH
no longer a secret. Now you have the password, which is all you need
to successfully impersonate its owner to some naive computer, and
mischief awaits.
;LEX[SYPH[IHS[MXLVEMRFS[XEFPIW-QRSGVSSO8VMWXER
muttered from under his mustache, as he idly punched the product ID
SJJETSXIRXMEPP]JEYPX]RIX[SVOGEVHMRXS+SSKPIXSWIIMJER]SRILEH
written alternative drivers for it.
8VEGI]WXEVXIHXSERW[IVFYXNYWXXLIRSRISJSYVYRHIVKVEHXIGLRMGMERW
GEQIXSXLIHSSVSJXLI7LMXLSYWIWPMXXPISJGIVITSVXMRKEJEYPXMR
the cooling system. The cooling system had a *lot* of faults, because
[EXIVGSSPMRKW]WXIQWXLEXYWIWIE[EXIVEVINYWXWXYTMHKMZIRXLEX
sea-water gradually eats everything that contains it, and what it doesnt
eat, it chokes with a sclerotic crust of dried salts. Not that we had any
choice, because running traditional chillers would have clobbered the
Shithouses annual budget in a matter of weeks, and without aggressive
GSSPMRKXLITPEGI[SYPHWTMOIEX'MREFSYXZIQMRYXIWERHXLIR
it would be a race to see whether the assembled computers fused and
HMIHFIJSVIXLI]GSYPHWXEVXEVIXLEXOMPPIHYWEPP
Cooling took priority.
;LIR8VEGI]GEQIFEGOMX[EWEQMRSVTYQTTVSFPIQXLEX[IHEPP
\IHEHS^IRXMQIWERHMX[EWQSWXP]NYWXEQEXXIVSJORS[MRK[LIVI
XSOMGOERHLS[LEVHWLIWEMH;L]VEMRFS[XEFPIW#8[SVIEWSRWVWX
XLI]EVIGSSPERHWIGSRHXLI]TEVEPPIPM^I
And he was right. Tracey saw it right away and helped me with a formal
TVSSJ&YXIZIRFIJSVI-HRMWLIHXLEX8VMWXER[EWGSHMRKMX8VEGI][EW
debugging it and I was writing test cases for it and you know what? It
worked.
The Shithouse was full of computers which were, basically, that guy.
;IHMHRXHMWGVMQMREXI[LIRMXGEQIXSXLIVIWGYIERMQEPW[IXSSOMR
nursed to health and set to productive use. The basements and dorm
rooms and storage lockers of Berkeley vomited forth a steady stream of
NYROLEVH[EVIWXYJJXLEXXLIKVERSPSMHQEWWIWGSYPHRXFIEVXSWIRHXS
EPERHPP)ZIV]XMQI'22WLS[IHERSXLIVI\TSWqJIEXYVMRKFPMWXIVIH
engoitered Chinese kids laboring over acid vats to strip apart ewaste,
we got a fresh shipment of guilt and shame and obsolescence.
The conversation that transpired afterwards is encrypted to a nicety, because we know that passwords are a dead letter.
33
You see, one day, our cluster got so big that we could
factor every single password that a human being could
VIQIQFIVIZIV]TLVEWIIZIV]RSRWIRWIWXVMRKYT
XSGLEVEGXIVW2S[WSQI[LIVISYXXLIVIMWE
memnist freak or stage performer who can do better
than that, but he probably doesnt have any secrets
worth keeping.
+IXXMRKXLI7LMXLSYWIXSXLEXWGEPIVIUYMVIHHMWGMTPMRI
At a certain point, we needed to actually go around
and pull the plug on a lot of old-school gear, rescind
SYVEPPGSQIVW[IPGSQITSPMG];IVITPEGIHMX[MXLE
four-cores-or- go-home rule, and then bumped that
XSWM\GSVIWXLIRIMKLX-XHMHRXQEXXIVSYXMRXLIVIEP
world of retail hardware, they were shoving cores into
cheapass consumer hardware so fast that we could
afford to monotonically raise the bar for donations and
still never run short.
Justice League
of the Rainbow
Table isnt
nearly so cool as
Knights
of the
Rainbow
Table,
is it?
;IVERMXEKEMRWXXLIWEPXWYWIH
JSV[IPPORS[R;M*MVSYXIVW
and produced tables that we
uploaded to cheap cloud storage,
clearing the hard-drives for the
RI\XVSYRHTEWW[SVHLEWLIWJSV
QENSV37IWLEWLIWJSVIQFIHHIH
systems, photocopiers, keyless entry
door-locks . . . Theoretically, the
manufacturers could have made these much stronger
but they werent thinking ahead to the day when three
weirdos might build themselves a cluster that could
KVMRHGIEWIPIWWP]XLVSYKLXLI[LSPIYRMZIVWISJEXS
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
And after a while, the cluster got big enough to
recompute against any new salt in pretty short
time, especially with our information about the
QSWXGSQQSRTEWW[SVHW;I[IVITVIXX]WIPJ
GSRKVEXYPEXSV]-QYWXEHQMXZIV]TVSYHXSLEZISYX
thought all those silly engineers and product managers.
Of course, none of *us* had the foresight to imagine
that the day was coming when you could replicate our
[SVOJSV[SVXLSJXMQISREGLIIW]GPSYHLSWXMR
Bulgaria or some other exotic place. No, we were too
busy forming an order of knights.
/RMKLXLSSH#8VEGI]ERH8VMWXERPSSOIHEXQIPMOI-
was insane.
-JIPXQ]GLMRNYXSYXEXEFIPPMKIVIRXERKPIERH-VIIPIH
it back in. Its either that or a league of super-heroes.
Look, with great power comes great responsibility.
;IRIIHEQSVEPGSQTEWWXSIRWYVIXLEX[IYWI
SYVTS[IVWJSVKSSH;IRIIHGLMZEPV]EGSHI2S[
superheroes are cool and all, but the Justice League of
XLI6EMRFS[8EFPIMWRXRIEVP]WSGSSPEW/RMKLXWSJ
XLI6EMRFS[8EFPIMWMX#
Narrator
To be continued at
www.softbox.Co.uk/
knightsoftherainbowtable
34
ADVERTORIAL
)LQG2XW0RUH
01347 812100
cloud@softbox.co.uk
www.softbox.co.uk
The need for Patching has never been so important with the need for PSN
compliance, CESG Guidance for End user devices and the threat it poses
to your network, data and organisation if you do not keep your software and
hardware patches up to date. SBLs Secure Patching Service, DOBUS, has
been unrivaled in its service to the whole of the MoD since 2003, and more
recently to the Police and Counter Terrorism agencies via PSN.
DOBUSHQDEOHVWKHGHOLYHU\RIUHDOWLPHFOHDQDQGYHULHGSDWFKHVWRHQG
point Security, Infrastructure, and Application Software over a secure bearer.
The DOBUS service operates
24x7x365, performs at 99.999% uptime, and
(3&97%HZIVXSVMEP
has received over 18 million visitors in the last four months alone. It delivers
'SRXIRXWYTTPMIH
FULWLFDOSDWFKHVHJDQWLYLUXVVLJQDWXUHXSGDWHVLQGHSHQGHQWRIWKHLQWHUQHW
through secured links into Vendor laboratories, and therefore protects users
IURPWKHWKUHDWVSRVHGE\ZHEVLWHVSRRQJDQGWKHLVVXHVRIGRZQORDGORFDWLRQ
RYHUVXEVFULSWLRQERWKFRPPRQFKDUDFWHULVWLFVZLWKLQPDMRUPDOZDUHHYHQWV
This unique and innovative service has been delivered via a highly robust,
KLJKO\ DFFUHGLWHG DQG KLJKO\ YHUVDWLOH DUFKLWHFWXUH9DULRXV UHVHDUFK SURMHFWV
and pilots are currently underway to scope the delivery of the next generation
of Community Cloud Services via the DOBUS platform. These will include
Secure Email and Rights Management Services, Hosted Collaboration
(QYLURQPHQWV'LJLWDO&HUWLFDWH,VVXDQFH6HUYLFHV6HFXUH)LOH7UDQVIHU2Q
line Backup services and many more.
DOBUSSURYLGHV\RXU3DWFKHV3DUWRI&(6*VVWHSVWR
cyber security
DOBUSPDNHVWKHSURFHVVHDVLHUDOOSDWFKHV\RXQHHG
available under a single URL, all from a trusted and assured source
so you can deploy patches more quickly across your environment.
www.softbox.co.uk/cloud-based-it-services/dobus
36
)LQG2XW0RUH
01347 812100
cloud@softbox.co.uk
www.softbox.co.uk
The need for Patching has never been so important with the need for PSN
compliance, CESG Guidance for End user devices and the threat it poses
to your network, data and organisation if you do not keep your software and
hardware patches up to date. SBLs Secure Patching Service, DOBUS, has
been unrivaled in its service to the whole of the MoD since 2003, and more
recently to the Police and Counter Terrorism agencies via PSN.
DOBUSHQDEOHVWKHGHOLYHU\RIUHDOWLPHFOHDQDQGYHULHGSDWFKHVWRHQG
point Security, Infrastructure, and Application Software over a secure bearer.
The DOBUS service operates 24x7x365, performs at 99.999% uptime, and
has received over 18 million visitors in the last four months alone. It delivers
FULWLFDOSDWFKHVHJDQWLYLUXVVLJQDWXUHXSGDWHVLQGHSHQGHQWRIWKHLQWHUQHW
through secured links into Vendor laboratories, and therefore protects users
IURPWKHWKUHDWVSRVHGE\ZHEVLWHVSRRQJDQGWKHLVVXHVRIGRZQORDGORFDWLRQ
RYHUVXEVFULSWLRQERWKFRPPRQFKDUDFWHULVWLFVZLWKLQPDMRUPDOZDUHHYHQWV
This unique and innovative service has been delivered via a highly robust,
KLJKO\ DFFUHGLWHG DQG KLJKO\ YHUVDWLOH DUFKLWHFWXUH9DULRXV UHVHDUFK SURMHFWV
and pilots are currently underway to scope the delivery of the next generation
of Community Cloud Services via the DOBUS platform. These will include
Secure Email and Rights Management Services, Hosted Collaboration
(QYLURQPHQWV'LJLWDO&HUWLFDWH,VVXDQFH6HUYLFHV6HFXUH)LOH7UDQVIHU2Q
line Backup services and many more.
DOBUSSURYLGHV\RXU3DWFKHV3DUWRI&(6*VVWHSVWR
cyber security
DOBUSPDNHVWKHSURFHVVHDVLHUDOOSDWFKHV\RXQHHG
available under a single URL, all from a trusted and assured source
so you can deploy patches more quickly across your environment.
37
www.softbox.co.uk/cloud-based-it-services/dobus
t
s
o
M
5
The 2 nt
Importa
e
c
n
e
i
c
S
Fiction
s
k
r
o
W
so far!
=*%6
0%<
-2A +%
3
+
%
8-1)
%032+
%=
*%6%;
In terms of helping
drive human advancement and the
development of our species, Science Fiction
LVXQSDUDOOHOHG,WVLQXHQFHRQWKHJHQHUDOSXEOLFLVVR
great because the best examples of it quite literally shape the
world we live in.
Science Fiction is often described as the literature of change and for good reason.
Strangely for a genre so often set in alien worlds, more than any other, Science Fiction
centres on humanity. It paints grave, often dystopian, pictures of future societies and sends
warnings of the, hitherto unprecedented, consequences of our actions today. Whether for better
RUZRUVH6FL)LKDVDQXQFDQQ\NQDFNRIDFFXUDWHO\SUHGLFWLQJDQGLQXHQFLQJIXWXUHWHFKQRORJLHVDQG
RSLQLRQV)URPWKHHDUOLHVWQRYHOVWKURXJKWRWKHEORFNEXVWLQJOPVRIWKHSUHVHQWGD\ZKDWZDVRQFH
FWLRQKDVQRZEHFRPHIDFW
38
'SQTMPMRKEPMWXWYGLEWXLMWMWVMWO]JSVER]KIRVISJGXMSRFYXJSV7GM*M
it is near impossible. The genre is so vast and all encompassing, and the
fans so passionate and vociferous, that the task is viewed as being even
QSVIHMJGYPXXLERWYVZMZMRKER977)RXIVTVMWIWGSYXMRKQMWWMSR[LMPWX
wearing red.
However, never one to shy away from a challenge, CyberTalk now
TVIWIRXWXS]SYSYVPMWXSJXLI1SWX-QTSVXERX7GMIRGI*MGXMSR
;SVOWWSJEV
2001: A SPACE ODYSSEY (1968)
This list isnt in rank order but if it were theres a very good chance that
[SYPHWXMPPFIEGSRXIRHIVJSVXLIXST;LIRMX[EWVWXVIPIEWIH
however, few would have predicted it would still be feted nearly half a
GIRXYV]PEXIV%XMXWTVIQMIVIXLIVI[IVI[EPOSYXWMRGPYHMRK6SGO
,YHWSR[LSEWOIH;MPPWSQISRIXIPPQI[LEXXLILIPPXLMWMWEFSYX#
8SHE]MXMWGPEWWIHEWSRISJXLIHIRMRKPQWSJXLIXLGIRXYV]
charting the human races interaction with other forms of intelligent
PMJIVEMWMRKERHERW[IVMRKWSQISJXLIFMKUYIWXMSRW;LIVIHMH[I
GSQIJVSQ#;LIVI[IEVIKSMRK#;LEXHSIWMXQIERXSFILYQER#
%RH[LEXEVIXLITIVMPWSJXIGLRSPSK]#7TIGMGEPP][LIR]SYEPPS[XLEX
technology to think for itself.)
ALIEN (1979)
-JEPQGERFINYHKIHF]XLIEQSYRXSJVMTSJJWMXKIRIVEXIWAlien must
VEROEWSRISJXLIQSWXMRYIRXMEPQSZMIWIZIV6MHPI]7GSXXW7GM*M
horror classic represents that rarest of things, a perfect storm of talent
combing at the right moment to create something beyond special.
Superb performances and still-astounding special effects add to Scotts
stylish direction to create a must-see combination of suspense, slasher
ERXMGWERHKSSHSPHJEWLMSRIHWGM
8LMWPQWYRHIVP]MRKQIWWEKIWSJTEGMWQERHMXWGSRHIQREXMSRSJ
ZMSPIRGIEVIUYMXIFPEXERXERHF]EPPEGGSYRXWXLMWPQMRYIRGIH
4VIWMHIRX6SREPH6IEKERXSWYKKIWXXS1MOLEMP+SVFEGLIZXLEXERI\XVE
terrestrial invasion would trump national differences, something he later
XSPHXLI9RMXIH2EXMSRWEW[IPP
;LMPIQER]IEVPMIV[VMXIVWLEHQIRXMSRIHTSWWMFPIGSQTYXIVWRSRI
understood the power they would have over the day-to-day lives
SJXLIEZIVEKIYWIVEW0IMRWXIVHMH;LEXQEOIWA Logic Named Joe
WSJEWGMREXMRKMWRSXNYWX[LEXLIKSXYRGERRMP]VMKLXFYXLS[QYGL
Leinster understood about people and the way they interact with
machines. The logics in Leinster stories are essential to the lives of the
characters every bit as much as computers and the internet are to
people today. (Read A Logic Named Joe in full on P.64)
AVATAR (2009)
It may have been more impressive on a technical level than as a piece
of storytelling, but Avatar is an astonishing feast for the eyes and ears.
From the epic to the tiny details. The level of immersive detail on show
is simply amazing. No wonder, when you consider that director James
'EQIVSRLEHXSVWXMRZIRXXLIRIGIWWEV]XIGLRSPSK]VIUYMVIHXSQEOI
the movie before he could begin work, and in doing so, opened up a
whole new sandbox for directors to play in for years to come.
-XWJEHMRKTLSXSKVETLLEWFIIRVIJIVIRGIHF]QER]EJERERHEGEHIQMG
(as well as the aforementioned Professor) to explain the potential
HERKIVWSJL]TSXLIXMGEPXMQIXVEZIP[LMPWXMXWTVIHMGXMSRSJPMJI]IEVW
MRXLIJYXYVIMWRSXXSSJEVJVSQXLIXVYXLXLIZMHISGSRJIVIRGMRK
3D movies, motion controlled video games and tablet computers seen
MRW,MPP:EPPI]EVIEPPGSQQSRTPEGIXSHE]7EHP]LS[IZIVXLI
,SZIVFSEVHWWIPJX]MRKXVEMRIVWERH]MRKGEVWEVIRSX
39
GORDONS
ALIVE?!?
Enough said, surely?
8LI;EGLS[WOMWMFPMRKWKVSYRHFVIEOMRKQSVTLMRKERHWLEXXIVMRKWGM
WTIGXEGYPEVJIEXYVIWEIRKEKMRKP]HIEHTER/IERY6IIZIWERHGSQFEX
like youve never seen it before. The effects are astonishing. Its funny, its
HEVOMXWWQEVXERHMXWPPIH[MXLKYRWPSXWSJKYRW%PERHQEVOPQERH
quite possibly the ultimate expression of cyberpunk.
The novel is also notable for the remarkably accurate calculations Verne
was able to make regarding the requirements of the cannon, which were
based on very little comparative data at the time. Although the feasibility
SJ:IVRIWWGIREVMSLEWWMRGIFIIRHMWTVSZIHWGMIRXMGEPP]XLIMHIEW
ERHXLIQIWVEMWIHF]XLIGXMSREP'SPYQFMEHWZS]EKIXSXLIQSSR
GSRXMRYIXSMRYIRGITSTYPEVGYPXYVIXSXLMWHE]
METROPOLIS (1927)
-W*VMX^0ERKWITMGMetropolis the most
MRYIRXMEPPQIZIV#-XGIVXEMRP]WTE[RIHXLI
cinema of futurism, and watching it today its
uncanny to see how many shadows of cinema
yet to come it already contains. Things to Come,
Blade Runner, Alphaville and The Matrix are all there
in embryonic state. Metropolis LEWEPWSFIIREQENSVMRYIRGIMRTST
[MXL/VEJX[IVO5YIIRERH1EHSRRESZIVXP]VERWEGOMRKMXWMQEKIV]
throughout their careers.
*SVMXWXMQIXLIPQ[EWEQMPIWXSRIYWMRKMRRSZEXMZIQMRMEXYVIWERH
camera tricks to create its city of the future, taking two years to shoot
and bankrupting its producers (in modern money, the budget was close
XSQ
&YXXLIVIEPOI]XSMXWPSRKIZMX]MWMXWXLIQEXMGGSRXIRXQSVI
a warning than a romance, it deals with issues of modernity and class
GSRMGXXLEXLEZIRIZIVKSRIE[E]
NEUROMANCER (1984)
Released in 1984, Neuromancer is widely considered the precursor of
XLI']FIVTYROKIRVIERHXLIVWXWGMIRGIGXMSRXSWMQYPXERISYWP][MR
XLI8VMTPI'VS[RE[EVHW2IFYPE,YKSERH4LMPMT/(MGOE[EVH
;MPPMEQ+MFWSRWWIQMREPRSZIPFVSYKLXQER]MHIEWXLEXLEZIWIITIH
into our collective consciousness, including inventing now-used terms
WYGLEWG]FIVWTEGI
I, ROBOT (1950)
7LEVMRKTVIGMSYWPMXXPI[MXLXLI;MPP7QMXLQSZMISJ
the same name, Isaac Asimovs collection of short
WXSVMIWLIPTIHHIRISYVQSHIVRTIVGITXMSR
ERHXLIWGMIRGIGXMSRWXERHEVH
SJVSFSXWF]
formulating the three (subsequently expanded to
four) laws of Robotics.
Neuromancer has all the conventions of the genre that you come
XSI\TIGXEPQRSMVWXSV]LEGOIVLIVSIWEFPIEOPERHWGETI[LIVI
corporations are the government, dilapidated neighbourhoods infested
with crime, and a network of data that connects everything. Like many
SJXLIXMXPIWSRXLMWPMWXERYQFIVSJXLIGSRGITXW+MFWSRTVIHMGXWLEZI
FIGSQIVIEPMX]LIIRZMWMSRWEGSQTYXIVM^IH[SVPHXLEXEGXYEPP]I\MWXWE
world that was far-fetched at the time of publishing, 1984.
Rather than telling the typical tale of a humanoid machine run amok
Asimov asks readers to imagine a world where robots protect us
from our own worst nature. Beginning with a simple story about the
relationship between a little girl and a limited-function robot, he moves
on to explore increasingly sophisticated thoughts, questions, and moral
complexities. In the process the book reveals Asimovs overarching
vision of a future that entangles inextricably the humans and the
machines.
;LMGLPIEHWZIV]RMGIP]MRXS
&MK&VSXLIVXLI8LSYKLX4SPMGI(SYFPIXLMRO2I[WTIEO6SSQ
telescreens, the Two-Minute Hate, the Ministry of Love, Airstrip One,
YRTIVWSREPPLEZIIRXIVIHSYVGSPPIGXMZIGSRWGMSYWRIWWWMRGIXLIFSSO
[EWTYFPMWLIHQSVIXLER]IEVWEKS1SVISZIV2MRIXIIR)MKLX]*SYV
LEWTSTYPEVMWIHXLIEHNIGXMZI3V[IPPMERXSHIWGVMFISJGMEPHIGITXMSR
secret surveillance, and manipulation of the past by a totalitarian or
authoritarian state.
;VMXXIRMREWEVIEGXMSRXS7XEPMRMWQMR7SZMIX6YWWMEXLIFSSOMW
EWTIVJIGXETMIGISJWEXMVIEW]SYEVIPMOIP]XSRH3V[IPPWZMI[SJSYV
future is sadly truer today than he could ever have believed.
Utopia looks like nothing else ever seen on British television with
its acid colours and carefully designed shots the perfect echo of the
literature that inspires it, without things ever getting too cartoony or
distracting. Its inclusion of real world events, hidden nods to the world
of comic books and dubstep soundtrack, give the show a freshness and
FVMPPMERGIXLEXMWGYVVIRXP]YRQEXGLIHIPWI[LIVI9RJSVXYREXIP]MRXLI
past month, UtopiaLEWFIIRE\IHEJXIVNYWXX[SWIVMIWTVIWYQEFP]XS
free up more room in the Channel Four schedules for shows such as
The Paedophile Hunter, My Daughter The Teenage Nudist, Scrotal Recall and
others with names seemingly plucked from the Daily Sports subs desk.
ROBOCOP (1987)
7IXMREJYXYVMWXMG(IXVSMXTPEKYIHF]RERGMEPVYMR
and economic decay, RoboCop - made in 1987 relates how a no-nonsense cyborg law enforcer
ends up policing the citys crime-ridden streets.
;VMXXIRF])H2IYQIMIVERHHMVIGXIHF]4EYP
:IVLSIZIRXLIPQTEMRXW(IXVSMXEWESRGIKVIEX
metropolis and manufacturing hub laid to waste by outsourcing and
mass unemployment. Today, deprived of the automobile industry that
supported it for so long, the real-world Detroit is in a very similar
situation and is even considering building a statue to its most famous
policeman.
41
;LEXWXLIVMWOSJRSRGSQTPMERGI#
-QTEGXSJHEXEFVIEGLIWSR2EXMSREP7IGYVMX]
0SWWSJVITYXEXMSRJSVSVKERMWEXMSR
YRJEZSYVEFPITVIWWGSZIVEKI
,IEZ]EYHMXMRKF]XLI-RJSVQEXMSR'SQQMWWMSRIVW3JGI-'3
4SXIRXMEPJSVRIWPIKEPEGXMSRSVPSWWSJJYRHMRK
;LEXEVIXLIVIUYMVIQIRXW#
3VKERMWEXMSRW[MPPRIIHXS
(QVXUHXVHUVDUHDZDUHRIWKHQHZFODVVLFDWLRQVDQGXQGHUVWDQGKRZWRXVHWKHP
%WWXEXIHMRPEWXQSRXLW'EFMRIX3JGIYTHEXIETTP]MRKXSSLMKLEQEVOMRKGERMRLMFMX
sharing and lead to unnecessary and expensive protective controls, but applying too low a
marking may result in inappropriate controls and potentially put sensitive assets at greater
risk of compromise.
%VI=SY6IEH]JSV+SZIVRQIRX7IGYVMX]
'PEWWMGEXMSRW#
8LI+SZIVRQIRX7IGYVMX]'PEWWMGEXMSRWWIIOWXSWMQTPMJ]
administration and reduce costs, empower people to
XEOIXSTMGEPHIGMWMSRWEFSYXLS[XSVIPIEWI3JGMEP
information and help those entrusted with valuable assets
to pragmatically do business in a cost-effective way.
6LPSOLI\LQJWKH&ODVVLFDWLRQ6\VWHP
For some, this is an exciting opportunity to simplify the
GPEWWMGEXMSRW]WXIQVEXMSREPMWITVSXIGXMSRQIGLERMWQW
ERHEPMKRXLI[E]XLEXXLI9/HSIWFYWMRIWW[MXLMRHYWXV]
and international partners. For others, its more of a
challenge.
As a trusted adviser, SBL is uniquely placed to ensure
compliance with current requirements and deliver a
WIEQPIWWGLERKISZIVXSXLIRI[+SZIVRQIRX7IGYVMX]
'PEWWMGEXMSRWWGLIQI;IEVIEPVIEH][SVOMRK[MXL
existing customers to help them transition from decades
SJYWMRKXLI+417ERHWYTTSVXXLIMV+SZIVRQIRX
7IGYVMX]'PEWWMGEXMSRWMQTPIQIRXEXMSRTVSKVEQQIW
with pragmatic solutions, as well as expert advice and
assistance.
8SRHSYXQSVIEFSYXXLIRI[
+SZIVRQIRX7IGYVMX]'PEWWMGEXMSRW
system, and how SBL can help make
your transition as smooth as possible
TPIEWIGSRXEGXYWSR
IRUYMVMIW$WSJXFS\GSYO
www.softbox.co.uk
43
Noel K
Hannan
44
Maybe it had been a mistake asking her to Jerusalem for the launch.
Bryard wanted to break the news gently but he did still love her, in his
S[R[E][LMGLSJGSYVWI[SYPHRIZIVFIIRSYKL;EWMXGVYIPPIVXS
announce the end of a marriage in an exotic foreign city rather than
rainy Manchester?
,IHMHRXXLMROMX[EWETTVSTVMEXIXSXIPPLIVSRXLIVWXRMKLX-XLEH
been a wonderful evening, Jerusalem was such a romantic city with its
fantastic, ancient architecture, its resonant place names, and the dusky
QSHIPKMVPWSPHMIVW[LSMVXIHSRWXVIIXGSVRIVW[MXLXLI92XVSSTW
Judy chattered over dinner about her day, and never once asked Bryard
about his. They ate a wonderful chicken dish and the most delicious
pitta bread Bryard had ever tasted, drank white wine and listened
to a barmitzvah procession make its way through the street below
the rooftop restaurant. As Judy wittered Bryard laughed or tutted
at appropriate places. Sometimes he would do the wrong thing at
the wrong moment and then he would have to admit that he wasnt
listening, leaning across the table to touch her hand and explain that
he was tired. But she would sulk and again he understood why he was
leaving her. It would be so easy to tell her at a moment like this, when
she was most unreasonable. But there was always tomorrow. He didnt
want whatever histrionics she would perform to interfere with his work.
Not before it was complete, at least.
She had accepted in her usual bored manner, and gone straight out to
buy a selection of clothes and travelling accessories, while he worked
overtime debugging at Hyperrealitys complex in the Pennines, preparing
XLIREPXSYGLIWERHQIIXMRKZEVMSYW-WVEIPMHMKRMXEVMIWEWXLI]XVSSTIH
through the consultations and presentations. They were invariably
impressed, to say the least. Moments of public adulation for computer
programmers were few and far between. Bryard was determined to
IRNS]XLIRI\XJI[[IIOW,EZMRK.YH]SYXSJLMWPMJI[EWTEVXSJXLEX
His employers, along with the Israeli cabinet and the Jerusalem city
PIEHIVWLEHGLSWIRERI\XVIQIP]LMKLTVSPIHEXIXSPEYRGLLMWGVIEXMSR
YTSRXLI[SVPH+SSH*VMHE]%(&V]EVHLEHFEPOIHEXXLMWXLI
streets of the Via Dolorosa would be choked with crowds, where would
they install the beamers to ensure maximum opacity? How could they
WIGYVIGEFPMRK[LIRWSQER]TMPKVMQWJIIX[SYPHXVEQTPIMX#;LEX
would become of him - and Hyperreality - if it failed? The directors
had taken him to dinner and reassured him that the tests carried out
in the eerie full-size mock up buried deep beneath the Pennines (it
always reminded him of the stories of doppleganger towns built by
Soviet Russia to train deep cover agents) had been more than adequate
ERHXLI][IVIGSRHIRXXLEXXLI+SSH*VMHE]PEYRGLMRXLILIEVXSJ
Old Jerusalem would be an enormous success. As they smiled at him
with dollar-signed eyes, he knew he was still carrying the weight of this
TVSNIGXSRLMWWLSYPHIVW-JER]XLMRKER]XLMRK[IRX[VSRK&V]EVH
[SYPHFIGVYGMIH
But still his decision to invite Judy nagged at him. They took the
suborbital from Ringway on Monday, which would give them three days
MR.IVYWEPIQFIJSVI+SSH*VMHE]HE]WPPIH[MXLW]WXIQWMRWXEPPEXMSRJSV
Bryard and his team, shopping and sightseeing for Judy. He promised
her he would be back in the hotel no later than nine each evening so
they could have a late dinner and maybe go dancing, if he was not too
tired. She had pouted and demanded assurances that they would go
dancing every night no matter how tired he pretended to be, and he
remembered one of the reasons he was going to leave her. She was an
insensitive bitch, and she forgot all too easy how hard he had to work
to maintain the kind of lifestyle to which she had become accustomed.
(MHWLIXLMROWLI[SYPHFINIXXIHSJJXSXLI,SP]0ERHERHMRHYPKIH
F]EQER[LSGSYPHKYEVERXIILMW[SVOMRKHE]RMWLIH[LIRLMW[MJI
wanted to go dancing? Such a man, thought Bryard as he left her asleep
MRXLIEMVGSRHMXMSRIHLSXIPVSSQERH[IRXXSNSMRLMWXIEQMRXLI3PH
'MX]HMHRSXI\MWX;SQIRMRZIRXIHXLIQXSXSVXYVILSRIWXLEVH
working husbands.
The test went better than he had ever imagined. One of his team, a
talented young technician whom he knew to be deeply religious and
[LSLEHPSFFMIHVIPIRXPIWWP]XS[SVOSRXLITVSNIGX[EWWSSZIVGSQI
with fervour that he fainted. Even Bryard felt a lump at his throat in
seeing his creation in pixel-perfect motion on the Via Dolorosa, instead
of the fascia board mock up under the Pennine hill. Later, the young
man claimed he had been overcome by heatstroke after staying in the
sun for too long. Bryard noted this and commented on the incident at
length in his email to the directors that night, sending it from the public
terminal in the hotel before Judy returned from Bethlehem. He told
XLIQXSI\TIGXEGEWYEPX]VEXMSJSVXLIRI\XHE]SJEVSYRHSRIMRJX]
and to ensure that the medical services in Jerusalem were alerted. It
seemed as if even the creator had underestimated the emotional power
of his creation.
Judy returned much later than he expected, slightly drunk from too
much red wine on the trip back from Bethlehem, and found Bryard
sitting on the balcony in the warm evening air. Jerusalem, old and new,
stretched out below them. Tomorrow, he would show it something it
had not seen for over two thousand years. But right now, there was
something else that he had to do.
&YXXLIVI[EWWSPMXXPIJSVLMQXSHSLIVI,ILEHERIXIEQSJ
enthusiastic young men (all, he observed, happily unmarried) who
stripped down to shorts and t-shirts and installed the complex system
SJFIEQIVWGEQIVEWTVSNIGXSVWVIIGXSVWERHGEFPIWEPSRKXLI:ME
(SPSVSWEW[IEXMRKMRXLIWXMMRKLIEXERHW[IEVMRKKSSHREXYVIHP]
when things didnt go to plan. Bryard supervised the construction of a
microwave link, then walked through the cool alleys of the Arab quarter
to visit the other end of the link, a Cray supercomputer situated in the
/MRK(EZMH,SXIP8LMW[EWRXWXVMGXP]LMWNYVMWHMGXMSR,]TIVVIEPMX]LEH
poached a dedicated Cray expert from the parent company - but as
SZIVEPPTVSNIGXQEREKIVLIGSYPHFILIPHVIWTSRWMFPIMJER]XLMRK[IRX
wrong. He viewed the installation in the air conditioned room situated
in an empty suite next to the huge walk-in freezer, and chatted on
professional matters to Nbele, the Nigerian Cray man. There seemed to
be no problems. Nbele appreciated the chance to meet and chat with
Bryard. Among his peers, his reputation was preceding him.
-XWSZIV.YH]-[ERXEHMZSVGI
7LIPEYKLIHEXVWXEWWYQMRKLI[EWNSOMRKSVNYWXERRS]IHEXLIVJSV
coming back late and drunk. But when he launched into a bitter, long
pent-up tirade of reasons why he was leaving her, she sat dumbstruck
SRXLIGSVRIVSJXLIFIHERHEFWSVFIHXLIIRSVQMX]SJMX;MXLSYX
responding to him she tearfully collected up a few clothes and toiletries
and dashed from the apartment, slamming the door. He waited for
half an hour then phoned reception. They told him that they had given
LMW[MJIEREPXIVREXMZIVSSQ,I[IRXXSFIHWEXMWIHXLEXWLI[EW
safe and that he had done what had to be done. Now, only tomorrow
mattered.
&V]EVHWGLIWXPPIH[MXLTVMHI,ILEH[SVOIHSRXLMWTVSNIGXJSVXIR
years. Only his marriage to Judy had taken up a greater part of his life.
,IWPITXXJYPP]ERHVSWIIEVP]FVIEOJEWXIHMRLMWVSSQ,IWLSYPHLEZI
felt buoyant, this was to be the greatest moment of his career, perhaps
the greatest day in his life, but Judy had tainted it, even by her absence.
He regretted breaking the news to her last night, he felt sorry for her
even after the years of heartache she had caused him. Leaving the hotel,
he left a message at reception with a pass that would give her access to
LMWGSQQERHTSWXSRXLI:ME(SPSVSWEPEXIVXLEXHE]XSNSMRLMQJSVXLI
launch if she wished. He hoped she would choose to do so.
1IWQIVMWIHF]LMWS[RGVIEXMSRLIHMHRSXRSXMGIEXVWXXLIHSSVXS
the command centre opening, and when he did he was surprised to see
Judy, immaculately dressed in a pale green skirt and blouse, but her eyes
darkly rimmed with smeared mascara. She had been crying. She didnt
say a word. Instead, she reached forward and took an Israeli agents gun
from his holster as casually if she was taking a drink from his hand. She
stepped back, the gun in her hands. The agent turned and froze. His
colleague reached for his own weapon and paused when he saw Judy
already had hers in the aim.
Jerusalem was a pulsing, living organism. The hot, dry streets were
packed with bodies as Bryard made his way to the temporary command
centre in a militaristic tower positioned high above the Via Dolorosa.
A police patrol brought him in a dusty Toyota four-wheel drive, its
impatient driver leaning on his horn and urging people out of the way.
Bryard sat in the back, impassive, hands folded in his lap.
,EZI]SYGSQIXSOMPPQI#&V]EVHEWOIHLIV[IEOP]EPQSWX
whispering.
2SWLIWEMH=SYVQMWXVIWW
The dignitaries began arriving a little later. First, the two directors of
,]TIVVIEPMX]&IRRIXXERH,IRHIVWSR[IEV]JVSQXLIWYFSVFMXEPMKLX
but in a near frenzy of excitement. Then the Israeli prime minister,
Rukab, and several of his cabinet and Jerusalem city councillors,
accompanied by secret service agents openly sporting weapons. A
member of Bryards team depolarised the long window on the wall
unoccupied by screens and equipment, offering a breathtaking panoramic
ZMI[SJXLI:ME(SPSVSWE*EVFIPS[XLIQXLIWXVIIXWPPIH4MPKVMQW
holidaymakers, market traders, citizens of Jerusalem, and many television
crews, all vying for space in the narrow alleyways. Helicopters clattered
SZIVLIEHQSWXP]92ERH-WVEIPMTEXVSPWERHERIRXIVTVMWMRKXIPIZMWMSR
crew, who had to be warned off from hovering directly over the Via
Dolorosa by a Cobra gunship.
&IPS[[LIVIXLIGVYGM\MSRSJ.IWYWSJ2E^EVIXL/MRKSJXLI.I[W[EW
XEOMRKTPEGIMRXLIWXMPPLSXEMVEFSZIXLILMPPORS[REW+SPKSXLEXLI
hyper illusion began to falter. The animation of Jesus froze with his eyes
GEWXWO][EVHPSSOMRKJSVLIPTSVJSVKMZIRIWWJVSQ+SHSV&V]EVH
And she discharged the gun methodically into each of the computer
controllers arranged neatly around the room. The directors and the
cabinet members turned slowly, almost unwilling to tear themselves
away from the scene below, even in the face of such danger. Bryards
team were already under their seats, sheltering.
Rukabs bodyguards came to their senses and realised Judy had emptied
XLIKYR8LI]FYRHPIHLIVXSXLISSVERHHMWEVQIHLIV&V]EVHWXSSH
over her, tears streaming down his face.
8IR]IEVWLIWEMH=SYLEZIVSFFIHQISJXIR]IEVW
She looked him squarely in the face as the agents pulled her to her feet,
hands bound behind her back.
8LIR[IEVIIZIRWLIWEMHERHXLI]XSSOLIVE[E]
1MWXIV4VMQI1MRMWXIVWEMH&V]EVHPSSOMRKEXLMW[EXGL-XMWXMQI
;SYPH]SYGEVIXSHSXLILSRSYVW#
Later, Bryard sat alone in the command centre. The cabinet had gone,
discussing in grave tones how this would effect their chances of reelection. The directors of Hyperreality had vanished swiftly, muttering
concerns over share options. Even Bryards team had deserted him,
heading for the bars to drown their sorrows. In the darkness above
the city, electric ghosts of two thousand year old martyrs, whores and
WSPHMIVWMGOIVIHEGVSWWXLIWO]FVMRKMRKWEPZEXMSRXSRSSRI
6YOEFWXITTIHJSV[EVHERHTPEGIHLMWRKIVPMKLXP]SREPEVKIVIH
button.
0IXXLI[SVPHWIILIWEMH
%PSYHIVLYQQMRKPPIHXLIVSSQEWXLIQMGVS[EZIPMRO[MXLXLI
Cray V cycled up, and began transmitting millions of lines of code to
the beamers and opacitors in the streets below. The grid of hardware
spread out across the city like an invisible nervous system, and a twenty
metre Jesus Christ began his long, last walk up the dusty cobbles of the
Via Dolorosa.
Silence descended upon the city, tangible even behind the walls of the
command centre. Rukab spluttered as he had forgotten to breath. This
[EWRSQIVILSPSKVEQSVTEPIPMKLXTVSNIGXMSR%X[SXLSYWERH]IEV
old story was being acted out in front of them, as real as if they had
been transported back in time.
46
LIVES
000850
g
n
i
y
f
e
D
Gods and
emons
Andrew
Cook
SBL
*-2(-2+6)%0,)63)7-2%:-689%0;360(
47
3ZIVXLITEWXHE]W-LEZIEGLMIZIHQER]
XLMRKW-LEZIGSQQERHIH8LI.EGOHE[E
stolen brig on the Caribbean seas, defeated
innumerable cartoon supervillains inside of
a dilapidated insane asylum, led an elite band
SJWSPHMIVWXLI+LSWXW
XSWEZIEH]WXSTMER
future-earth from the machinations of a postnuclear-war South American Federation, and
[SRXLI*-*%;SVPH'YTFSXLEWQEREKIVERH
player. All this whilst also holding down a full
XMQINSFERHPIEHMRKEVIPEXMZIP]RSVQEPMJRSX
somewhat insular, life.
The question of female leads (or lack of) is another pressing issue
facing games studios, aside from the aforementioned Ms. Croft, it is very
HMJGYPXXSGSQIYT[MXLERSXLIVGSQTIPPMRKJIQEPIPIEHMREZMHIS
game. Even Lara has taken 17 years and a series reboot to become
anything close to resembling a relatable woman. This shows that the
industry is changing, but slowly. There are countless reasons why video
games have failed to produce many convincing female characters, enough
XSPPXLITEKIWSJXLMWQEKE^MRIERYQFIVSJXMQIWSZIVFYXMXMWJEMVXS
say that for a long time the problem has been something of an endless
cycle. The male dominated landscape of video gaming dissuades many
[SQIRJVSQTMGOMRKYTENS]TEHPIEHMRKXSJI[IV[SQIRLEZMRKER
interest in taking roles in the production of video games, which leads
to a slanted view of how women in video games should behave, which
leads to more women becoming disenfranchised and so on and so on ad
MRRMXYQ
That this has also happened to millions of gamers across the world
matters little, such is the sophistication and depth of todays video
games each players experience is now inexorably different. Open-world
WERHFS\KEQIWEVIRS[XLIRSVQEPPS[MRKREVVEXMZIWXSQSVTLERH
evolve through the actions and decisions taken by the user, not the
programmer.
But now for the tricky part. Subsuming a character in the way that
VWXTIVWSRERHWMQYPEXMSRKEQIWJSVGI]SYXSHSMWEPPZIV][IPPMJ]SY
see events unfold through a characters eyes and make decisions on
their behalf.You can apply your own moralities and rationale to what is
going on and why you have acted in that way. But what happens if that
backstory is already provided? And worse still, what happens if you dont
like it?
;MXLXLII\GITXMSRSJELERHJYPSJ[SVOWMRGPYHMRKEWIVMIWSJ
[SRHIVJYPGLMPHVIRWFSSOWMRXLIW
RSZIPWERHPQHSRSXEPPS[
their audience to choose their own adventure with anything like the
same level of meaning and perception as video games do. That is not
XSWE]XLEXZMHISKEQIWEVIRIGIWWEVMP]FIXXIVXLERPQSVPMXIVEXYVI
MRJEGXXLIVIEVIZIV]QER]I\EQTPIWMR[LMGLXLI]EVIWMKRMGERXP]
worse. It is more that they provide a greater sense of inclusion and self
for the audience, and that these feelings invariably eliminate the notion
SJEGXMSREPGLEVEGXIV)WWIRXMEPP]]SYGERI\TIVMIRGIIZIRXWEPSRKWMHI
Frodo, but you are Lara.
*SVQIXLIKEQI&MSWLSGO-RRMXITVSZMHIWXLMWZIV]GSRYRHVYQ8LI
GIRXVEPGLEVEGXIV&SSOIV(Y;MXXMWE[MHS[IH%QIVMGER'MZMP[EV
ZIXIVER[LSWIEGXMSRWEXXLI&EXXPISJ;SYRHIH/RIILEZIGEYWIHLMQ
intense emotional scarring and turned him to excessive gambling and
alcohol. Now working as a private investigator, Booker is continually
haunted by his past and struggles internally with questions of faith
and religion. All very interesting stuff but there is nothing within the
personality of this 19th century American soldier that I could relate to,
and as such, I struggled to form the same kind of emotional connection
[MXLXLIGLEVEGXIVXLEX-HMH[MXLSXLIVPIWWIWLIHSYXLIVSIW
Honestly, I even connected to a blue hedgehog in running shoes more
than I did with Booker.
8LIWLMRMRKI\EQTPISJNYWXLS[MQQIVWIH[MXLMREGSQTYXIVKEQI
players can become is the football management simulation series
Football Manager which puts gamers into the hotseat of any one of
SZIVJSSXFEPPGPYFW[SVPH[MHI8LIKEQIMWWSEHHMGXMZIXLEXMX
LEWFIIRGMXIHMRRSJI[IVXLERHMZSVGIGEWIWERHXLIVIEVIWGSVIW
of online communities, each telling stories of how they hold fake press
conferences in the shower, wear three-piece suits for important games
and have deliberately ignored real life footballers because of their ingame counterparts indiscretions.
0YHSREVVEXMZIHMWWSRERGIMWXLIXIVQ[MHIP]FERHIHEVSYRHXLI
games industry to describe the disconnect gamers feel when playing
such titles. It is both debated and derided in equal measure, yet there
is some substance to the argument. The term was originally coined in a
VIZMI[SJXLIVWX&MSWLSGOEKEQI[LIVIXLIGYXWGIRIWSTIRP]VMHMGYPI
the notion of a society built upon self-interest and men becoming gods
yet the gameplay appears to reward these exact behaviours creating a
NEVVMRKGSRMGXSJMRXIVIWX;LIRIZIRMRKEQIREVVEXMZIWJEMPXSXMIYT
XLIUYIWXMSRSJMHIRXMGEXMSRERHEWWSGMEXMSRMWFSYRHXSEVMWI
The area becomes even greyer when referring to third person games,
whereby the entirety of the character being controlled is visible on
screen (albeit usually from behind). Here the character becomes more
PMOIXLSWI[IEVIYWIHXSJVSQRSZIPWERHPQXLI]EVITEXIRXP]E
separate entity from the player, with their own voice and backstory, yet
they are still manipulated by the player. Then, during cutscenes and the
like, control is wrested away from you and handed back to the character
EPPS[MRKXLIQXSTSXIRXMEPP]EGXMRE[E]IRXMVIP]HMJJIVIRXXSLS[]SY
controlled them previously. So what exactly is your relationship with
XLIQ#'SQTERMSR#7YTTSVXXIEQ#+SH#
=IXXLIWIRWISJWIPJMWRIZIVQSVIETTEVIRXXLERMRXLIVWXTIVWSR
genre of games, such as the Call of Duty and Far Cry franchises, which,
more often than not, mirror the rare second-person literary narrative
by placing the gamer themselves in the centre of the action. In novels,
[LIRXLIVIEHIVWIIW-XLI]YRHIVWXERHMXXSVITVIWIRXXLIZSMGI
SRXLITEKIERHRSXXLIQWIPZIW-RVWXTIVWSRKEQIWLS[IZIV-
becomes whoever is controlling the character and the camera position
MWWTIGMGEPP]HIWMKRIHXSQMQMGXLEXZMI[TSMRX-RWSQISJXLIFIWX
I\EQTPIWSJVWXTIVWSRKEQIWKEQIVWHSRSXGSRXVSPXLITVSXEKSRMWX
rather they are the protagonist. As such they are addressed by the
supporting cast either directly by their own name which they supply
EWTEVXSJXLISVQSVIGSQQSRP]F]ERMGOREQIYWYEPP]6SSOMISV
/MH
8LMWKMZIWXLIYWIVEJEVKVIEXIVWIRWISJMRGPYWMSRMRXLIWXSV]
and subsequent empathy with their character and its allies than in any
SXLIVJSVQSJGXMSR%WIZIRXWYRJSPH]SYPMZIXLIQEWMJXLI][IVI
taking place in real life and begin to base decisions not on your own
SJMRITIVWSREFYXVEXLIVEWEVIWYPXSJ]SYVSRPMRIFEGOWXSV]
;LMPIMRVIEPPMJI]SY[SYPHTVSFEFP]FIWSQI[LEXVIPYGXERXXSGLSSWI
[LMGLSJ]SYVXVEZIPPMRKGSQTERMSRWWLSYPHFIWEGVMGIHXSETTIEWIXLI
ZSSHSSTVMIWX[LS[EWLSPHMRK]SYGETXMZIMRXLIZMVXYEPVIEPQSRI
slightly off comment twelve levels ago can mean that your childhood
W[IIXLIEVXMWOMGOIHSJJEGPMJJJEWXIVXLER]SYGERWE]4VIWW8VMERKPI
(Although, this being video games, they will no doubt reappear twenty
minutes later as leader of an army of the undead).
48
LIVES 0
The very nature of video games does, of course, make drawing
EGGYVEXIVITVIWIRXEXMSRWSJGLEVEGXIVWHMJGYPX8LI[LSPITSMRXSJ
a game is to allow the player to encounter events that they would
otherwise never be able to - Its highly doubtful that well be seeing
3JGI7YTTPMIW1EREKIVLMXXMRKSYVWLIPZIWMRXLIRIEVJYXYVIJSV
example. Instead the events depicted occur at the very extremes of
human experience, amid theatres of war, apocalypse and fantasy. As the
ZEWXQENSVMX]SJXLITSTYPEXMSRXLEROJYPP]LEZIRIZIVFIIRI\TSWIHXS
these types of environments, and with the parameters of the reality in
which these characters operate being so much wider than our own, it
is tough to imagine, and subsequently depict, how any of us would truly
react if faced with say, nuclear Armageddon or an invasion of mutated
insects. Many of the tabloid newspapers like to blame various acts of
violence on these types of emotive video games as they are an easy,
ERHPE^]WGETIKSEX-RXVYXLXLI]HMHMXFIGEYWIXLI]WE[MXMREKEQI
is a weak argument at best. There is a case to be made that games like
+VERH8LIJX%YXSERH'EPPSJ(YX]HIWIRWMXMWITPE]IVWXSZMSPIRGIXS
some extent, but in most cases there are various factors involved in
these types of crime and as such, to blame it solely on a computer
game which has sold millions of copies worldwide is tenuous.
GAME
OVER
49
Acknowledgements
1
Acknowledgement: the
authors would like to thank
Yolanda Woolf for her helpful
and critical review of an early
draft of this paper, and Mike
St John-Green for his useful
suggestions about the relative
value of system assets.
Our three laws create a universal baseline from which change and innovation
GERLETTIRWEJIP]MRXLIWLEHS[SJ8LI8S]RFII'SRMGX8LI]ETTP]XSXLI
technological innovations which simultaneously bring a wealth of opportunities and
a new set of risks.
MRNYV]MRXLIGEWISJEWIGYVMX]FVIEGLSJQIHMGEPHIZMGISVEREMVTPERIGSRXVSP
W]WXIQ
SVMQTPMIHLEVQJSVI\EQTPIRERGMEPPSWWXLVSYKLEGVIHMXGEVHHEXE
breach or identity theft through the fabrication of credentials, or IP theft which
would harm a corporation).
The system must preserve itself during the protection of, and delivery to human(s)
MX]
MRXLVIIPIZIPWSJEFWXVEGXMSR
Our three universal, systemic laws enable risk managers to apply measured
GSRXVSPWXSVIKYPEXIW]WXIQW[MXLMRHIRIHEGGITXEFPIFSYRHEVMIWSJGSQTPMERGI
3YVXLVIIPE[WEVIWMQTPIIRSYKLXSOIITFYWMRIWWSFNIGXMZIWMRTIVWTIGXMZI
VEXLIVXLERWQSXLIVMRKXLIQ[MXLGSRXVSPW[LMGLQE]FIQMWXEOIRJSVSFNIGXMZIW
The three laws recognize the importance of tracing the maturity of the
environment in which a system is created, used, and ultimately decommissioned.
;I[MPPWLS[LS[XLIVWXPE[HIRIWXLIGETEFMPMXMIWJSVEWWIXTVSXIGXMSRXLI
WIGSRHPE[EWHIRMRKXLIGETEFMPMXMIWJSVSTIVEXMSRERHXLIXLMVHPE[HIRMRKXLI
capabilities for self-preservation.
8LIWIGSVVIWTSRHXSXLIXLVIIEXXVMFYXIWSJWIGYVMX]GSRHIRXMEPMX]MRXIKVMX]ERH
availability.
7XSVMRKERHTVSGIWWMRKMRJSVQEXMSREWWIXWEFSYXXLILYQEREWWIXEWTEVXSJ
the delivery of a service (for example, credit card information).
1SHIPPMRKMRJSVQEXMSREFSYXXLIEWWIXJSVLMWXSVMGEPVIGSVHSVHIGMWMSR
support (for example, medical records).
(MVIGXP]EJJIGXMRKXLIEWWIXJSVI\EQTPIEHNYWXMRKETEGIQEOIVXVIEXMRKXLI
water supply, getting the chocolate on confectionary to the correct
thickness).
- 8,)43;)63*8,6))
%WMQSZWVSFSXWXSVMIWERXLSPSKM^IHTEVXMGYPEVP]MR-6SFSXERH8LI6IWXSJ
XLI6SFSXWWIXSYXXLVIIJYRHEQIRXEPKSZIVRMRKPE[WJSVVSFSXW[MXLVIWTIGX
XSXLIMVLYQERGVIEXSVWYWIVWERHFIRIGMEVMIW%PEXIVJSYVXLSV^IVSXLPE[
extrapolated the duty of robots to protect the human collective.)
;IQE]GSRWMHIVXLISVMKMREPXLVIIPE[WEWXLIFEWMWJSVVIKYPEXMRKEYXSQEXMSRERH
the input to the cybernetic response of the machinery. This is the context within
which the robot must control its actions to achieve an overall prime directive no
QEXXIV[LEXXEWOWQE]FII\TIGXIHSJMX8LIPE[WEVI
%VSFSXQE]RSXMRNYVIELYQERFIMRKSVXLVSYKLMREGXMSREPPS[ELYQER
being to come to harm.
%VSFSXQYWXSFI]XLISVHIVWKMZIRXSMXF]LYQERFIMRKWI\GITX[LIVI
WYGLSVHIVW[SYPHGSRMGX[MXLXLI*MVWX0E[
3. A robot must protect its own existence as long as such protection does not
GSRMGX[MXLXLI*MVWXSV7IGSRH0E[W
8LIWIGSVVIWTSRHXSXLIXLVIIEXXVMFYXIWSJWIGYVMX]GSRHIRXMEPMX]MRXIKVMX]ERH
availability.
Primary cybernetics are the commands and feedback which validate the systems
EGXMZMX][LMGLVIUYMVIMXXSSTIVEXIMRXLIFIWXMRXIVIWXWSJXLIEWWIXWYFNIGXWSV
the systems thrall.
7IGSRHEV]G]FIVRIXMGWEVIEWXVMGXIVPXIVJSVXLIGSQQERHWXSHIXIVQMRI
whether control remains with the system or other actors.
-- ()*-2-2+;36(7
8LI7XERHEVHW'SSVHMREXMSR+VSYTSJXLI8VYWXIH7SJX[EVI-RMXMEXMZILEW
VIGSKRM^IHXLEXG]FIVWIGYVMX]MW[MXLSYXEKIRIVEPP]EGGITXIHHIRMXMSRHMJJIVIRX
WXERHEVHWQEOIVWYWIHMJJIVIRXHIRMXMSRW-XMWSYVSFWIVZEXMSRXLEXG]FIVERH
information security are two different things. And this is why it is perhaps not
surprising that those who appreciate the history are unhappy with the term cyber
being appended to all things touching on information technology in general and the
Internet in particular. Medical records, credit card numbers, credentials, and such,
RIIHXSFITVSXIGXIH;LIVI[IEVIMRXIVIWXIHMRXLIFILEZMSYVSJXLIW]WXIQ
and the necessary monitoring and protective or corrective feedback then it is
cyber and it is permissible to borrow the term. So when the SCADA engineers
XEPOEFSYXG]FIVWIGYVMX]XLI]VIEPP]QIERMX
;IETTP]XLIXIVQXIVXMEV]G]FIVRIXMGWXSGSZIVXLIGSQQERHERHGSRXVSPSJXLI
system to make the necessary responses to continue to be.
%XXLIVYHMQIRXEV]PIZIP[IQE]EWWMKRXLIJSPPS[MRKHIRMXMSRW
a) A robot is a system, either physical or virtual, that is built by a human being
and operated by a human being, either directly or indirectly (that is by a
VSFSXMQQIHMEXIP]MRXVSHYGMRKWSQITIVZIVWIVIGYVWMSR
b) A human being is an entity capable of building and operating a robot, either
directly or indirectly (again, another robot may be involved).
Primary cybernetics
Secondary cybernetics
%PXIVJSVXLIGSQQERHWXSHIXIVQMRI[LIXLIV
control remains with the system or other actors.
(Operate)
Tertiary cybernetics
8EFPI']FIVRIXMGWPE]IVW
ERHREPP]XLEX
c)
The three laws are evident as regulators, shaping and guiding activity along a path
[MXLXLIFIPMIJXLEXXLIHIWMVIHKSEPXLIFYWMRIWWSFNIGXMZIW[MPPFIEGLMIZIH
--- 8)78-2+8-1)7
As a practical example, we view the information technology components of the
W]WXIQ[IQE]ETTP]XLIXLVIIPE[WXSXLVIIHMZIVWIQERMJIWXEXMSRWERSRPMRI
shop, a customer database, and malicious software (malware). The three laws
govern how feedback from a dynamic approach to risk management is applied to
VIKYPEXIXLIGSRHIRXMEPMX]MRXIKVMX]ERHEZEMPEFMPMX]SJXLIMRJSVQEXMSREWWIXW;I
will then discuss how the capabilities of respective systems interact with these
attributes.
An interesting level of risk modeling is apparent here. Are the controls of the
W]WXIQVIUYMVIHXSTVSXIGXXLIMRJSVQEXMSREWEREWWIXMRMXWIPJXLEXMWXLIQIXE
TIVWSRGSQTVMWMRKWE]
QIHMGEPLMWXSV]RERGMEPHEXEERHGVIHIRXMEPWSVXS
TVSXIGXXLIIWLERHFPSSHWYFNIGXSJXLIMRJSVQEXMSR#
8EOMRKXLMWMRXSGSRWMHIVEXMSR[ILEZIIWXEFPMWLIHXLIYRMZIVWEPIXLMGXLEX
Assets must be protected according to their value and sensitivity with respect to
the human collective.
(IRMRKSYVW]WXIQJSVWGVYXMR]EWXLISRPMRIWLST[LMGLMRXIVEGXW[MXL
GYWXSQIVMRJSVQEXMSREWEREWWIX[IVIUYMVIXLIW]WXIQXSI\LMFMXXLIJSPPS[MRK
asset protection, operational, and self-preservation capabilities.
,EVQXSEWWIXWF]XLMWHIRMXMSRIUYEXIWXSTVSTSVXMSREPLEVQXSELYQER
being or collective of human beings (which may be, for example, a nation state, a
community, or a business), either actual harm (for example resulting in physical
As another example, let us consider the three laws at component level and
consider the customer database as a component of the online shop (amongst the
complexity of applications, host networks, the network, the APIs, the maintenance
console, the testing environment, the security suite, and so on) and the customer
MRJSVQEXMSR[MXLMRMXEWXLIEWWIX;IGERWE]XLEXWEJIX]VIPMIWSRXLIGYWXSQIV
database displaying the quality characteristics that would have it comply with the
three laws.
(EXEGPEWWMGEXMSRMWRSXMRYWISVMWMRWYJGMIRXP]GSVVIPEXIH[MXLXLIMQTEGX
of the risks to associate regulating controls.
%GGITXEFPIYWEKITSPMGMIWEVIRSXMRTPEGIERHFEPERGIH[MXLXIGLRMGEP
countermeasures.
'%4%&-0-8=4638)'8-2+%2%77)8%+%-27892%98,36-7)(
(-7'03796)
The risk of system behaviour that will cause breaking of the First Law is increased
[LIR
%W]WXIQHSIWRSXEPPS[JSVQSRMXSVMRKSJEWWIXYWEKI
%W]WXIQHSIWRSXEPIVXS[RIVWSVGYWXSHMERWSJYREYXLSVMWIHEWWIXYWEKI
%W]WXIQHSIWRXTVIZIRXSVHSIWRSXORS[EFSYXYREYXLSVMWIHHEXE
leakage.
0EGOSJEWWIXGPEWWMGEXMSRXLYWTVIZIRXMRKEGGITXEFPIYWIHIRMXMSRSV
adequate protection.
%W]WXIQHSIWRXVIRHIVEWWIXWYRYWEFPIEJXIVMPPIKEPYREYXLSVMWIHEGGIWW
IRGV]TXMSRXSOIRMWEXMSREKKVIKEXMSRERSR]QMWEXMSRIXG
'%4%&-0-8=4638)'8-2+%2%77)8*631&)-2+92%:%-0%&0)83
%98,36-7)(%2(0)+%097%+)
The risk of system behaviour that will cause breaking of the First Law is increased
[LIR
%W]WXIQMWYREFPIXSTVSXIGXEWWIXWEKEMRWXEHIRMEPSJWIVZMGI(37
EXXEGO
%W]WXIQMWYREFPIXSTVSXIGXMXWIPJJVSQYREYXLSVMWIHIRGV]TXMSRSJMXW
information assets lending its user vulnerable to ransom for the decryption
key(s).
So, from the three laws we may extract actions required to protect assets (the
VWXPE[
STIVEXIMREQERRIVXLEXEWWYVIWXLIMRXIKVMX]SJXLIW]WXIQXLIWIGSRH
PE[
ERHEPPS[XLIW]WXIQXSVIKYPEXIMXWVIWMPMIRGIWIPJTVIWIVZEXMSRXLIXLMVH
law) at a very early stage, thus reducing cost.
From this we may say that, the level of security maturity is shown by a systems
capability to protect, operate, and self-preserve.
:- 34)6%8)'%4%&-0-8-)7837%8-7*=8,)7)'32(0%;
For the second law, a system must be capable of the following operational
GETEFMPMXMIWXEOIRMRXLIGSRXI\XSJXLISRPMRIWLST
8EOMRKSVHIVWJVSQMXWFYMPHIVWERHSTIVEXSVW[LS[MPPMRGPYHIWSJX[EVI
developers, operators, maintenance staff and their physical or virtual agents).
8EOMRKSVHIVWJVSQXLIS[RIVW
SJXLIGYWXSQIVMRJSVQEXMSR[MXL[LMGLMX
interacts (that is, people, or the consumers).
8EOMRKSVHIVWJVSQMXWS[RIVSVGYWXSHMERXLEXMWXLIVIXEMPIVERHMXWEKIRXW
physical or virtual).
8EOMRKSVHIVWJVSQXLIGYWXSHMERSJXLIGYWXSQIVMRJSVQEXMSRXLEXMWXLI
retailer and its agents, physical or virtual).
6IJYWMRKSVHIVWJVSQYREYXLSVMWIHSVYRVIGSKRMWIHTEVXMIW
Let us consider the operational capabilities of the online shop according to the
governance expected by the second law.
'%4%&-0-8=
8%/-2+36()67*631-87&9-0()67%2(34)6%8367
The risk of system behaviour that will cause breaking of the Second Law is
MRGVIEWIH[LIR
8LIW]WXIQHSIWRXEPPS[STIVEXSVWXSETTP]TEXGLIWSRXMQIHYIXS
operational release constraints.
8LIW]WXIQMWSTIVEXIHMRERIRZMVSRQIRX[LIVIGSRXVEGXYEPSVWSGMEP
constraints allow operators to bypass agreed controls either
technical or procedural.
8LISTIVEXSVWHSRSXVIGIMZIRSXMGEXMSRSJGSRKYVEXMSRQEREKIQIRX
changes which impact the service they are expected to receive or deliver.
Let us consider the asset protection capabilities of the online shop according to
XLIKSZIVRERGII\TIGXIHF]XLIVWXPE[
'%4%&-0-8=
4638)'8-2+%2%77)8%+%-278-00)+%097%+)
The risk of system behaviour that will cause breaking of the First Law is increased
[LIR
7SJX[EVIHIZIPSTIVW[VMXIGSHIXLEXMWMRXVMRWMGEPP]MRWIGYVIEWEVIWYPXSJ
containing security defects.
7SJX[EVIXIWXMRKMWRSXGEVVMIHSYX[MXLSYXXLIRIGIWWEV]WIKVIKEXMSRSV
other precautions causing harm to an operational system.
2I[VIPIEWIWSJWSJX[EVIEVIEPPS[IHXSMRXVSHYGIRI[ZYPRIVEFMPMXMIWXSXLI
GSRKYVEXMSR
'SVVIGXMZIWSJX[EVITEXGLIWEVIRSXETTPMIHSRXMQIXLVSYKLRIKPMKIRGI
%W]WXIQMWMQTPIQIRXIH[MXLSYXEHIUYEXIJVEYHTVSXIGXMSR
capabilities.
%W]WXIQHSIWRXEYXLIRXMGEXIMRXIVREPSVI\XIVREPYWIVWSVYWIW[IEO
authentication, or authentication that can be bypassed, and so on).
'%4%&-0-8=
8%/-2+36()67*6318,)3;2)67
3*8,)'97831)6-2*361%8-32
;-8,;,-',-8-28)6%'87
The risk of system behaviour that will cause breaking of the Second Law is
MRGVIEWIH[LIR
8LIW]WXIQHSIWRSXEPPS[GSRWYQIVWXSHIPIXIXLIMVMRJSVQEXMSR
8LIW]WXIQHSIWRSXEPPS[GSRWYQIVWXSKMZIXLIMVGSRWIRXJSVWXSVEKISV
reuse of their information.
8LIW]WXIQHSIWRSXEPPS[GSRWYQIVWXSSTXSYXSJHMWGPSWMRKGIVXEMR
personal information.
8LIW]WXIQHSIWRSXEPPS[GSRWYQIVWXSWII[LEXMRJSVQEXMSRMWLIPHEFSYX
them.
'%4%&-0-8=
4638)'8-2+%2%77)8%+%-27892%98,36-7)(97%+)
The risk of system behaviour that will cause breaking of the First Law is increased
[LIR
%W]WXIQEPPS[WYRWIGYVIVIQSXIEGGIWW
%W]WXIQEPPS[WTVMZMPIKIEGGIWWGVIHIRXMEPWXSFIWLEVIH
%W]WXIQMWYREFPIXSTVSXIGXEWWIXWEKEMRWXQEP[EVIWYGLEWZMVYWIW8VSNERW
and worms.
'%4%&-0-8=4638)'8-2+%2%77)8%+%-27892%98,36-7)(
',%2+)
The risk of system behaviour that will cause breaking of the First Law is increased
[LIR
%W]WXIQHSIWRSXEPPS[JSVGSRVQEXMSRSJGLERKIF]EWWIXS[RIVW
*MPIMRXIKVMX]QSRMXSVMRKSVWMQMPEVP]MRXIRHIHXIGLRSPSK]
MWRSXHITPS]IHSV
not actively used.
%YXLIRXMGEXMSRERHMHIRXMGEXMSRTVSGIHYVIWEVIRSXWYJGMIRXJSVGLERKIWXS
assets.
'%4%&-0-8=
8%/-2+36()67*631-873;2)636'9783(-%2
The risk of system behaviour that will cause breaking of the Second Law is
MRGVIEWIH[LIR
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSGVIEXIWXVSRKTEWW[SVHWSVSXLIV
MHIRXMGEXMSREYXLIRXMGEXMSRQIGLERMWQW
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSGLERKIXLIEHQMRMWXVEXSVW
TEWW[SVHSVSXLIVMHIRXMGEXMSREYXLIRXMGEXMSRQIGLERMWQW
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSGLERKIXLIHIJEYPXTEWW[SVHWSV
SXLIVMHIRXMGEXMSREYXLIRXMGEXMSRQIGLERMWQW
8LIW]WXIQHSIWRSXEPPS[VIXEMPIVXSVSXEXITEWW[SVHWSVSXLIVWMQMPEVP]
MRXIRHIHMHIRXMGEXMSREYXLIRXMGEXMSRQIGLERMWQW
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSVIUYIWXIRGV]TXMSRSJMRJSVQEXMSR
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSGLERKITEVEQIXIVW
'%4%&-0-8=
8%/-2+36()67*6318,)'9783(-%23*8,)'97831)6
INFORMATION
The risk of system behaviour that will cause breaking of the Second Law is
MRGVIEWIH[LIR
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSHIPIXIGYWXSQIVMRJSVQEXMSR
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSVIUYIWXGYWXSQIVGSRWIRXJSV
storage, reuse, deletion or other processing of their information.
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSKMZIGYWXSQIVWSTXSYXSJ
disclosing certain personal information.
8LIW]WXIQHSIWRSXEPPS[XLIVIXEMPIVXSKMZIGSRWYQIVWXLIMRJSVQEXMSR
held about them.
'%4%&-0-8=
,%:-2+8,)'%4%&-0-8=83*%-07)'96)0=
The risk of system behaviour that will cause breaking of the Third Law is increased
[LIR
8LIW]WXIQMWYREFPI[LIRMXJEMPWXSJEMPMRE[E]XLEX[MPPGEYWIRSLEVQSV
at least minimum harm to other devices, assets or systems or danger to
humans, without causing the system to be insecure.
8LIW]WXIQHSIWRSXMQTPIQIRXWIGYVIHIJEYPXWHIJEYPXMWXSHIR]EGGIWW
3RJEMPYVIXLIW]WXIQWHSIWRXYRHSGLERKIWERHVIWXSVIXSEWIGYVIWXEXI
3RJEMPYVIXLIW]WXIQHSIWRXGLIGOVIXYVRZEPYIWJSVJEMPYVI
'SRHMXMSREPGSHIPXIVWHSRSXEPPS[JSVEHIJEYPXGEWIXLEXHSIWXLIVMKLX
thing.
8LIW]WXIQHSIWRXTVIWIVZIGSRHIRXMEPMX]ERHMRXIKVMX][LIREZEMPEFMPMX]LEW
been lost.
8LIW]WXIQEPPS[WEXXEGOIVWXSKEMREGGIWWVMKLXWXSTVMZMPIKIHSFNIGXWHYVMRK
a failure.
8LIW]WXIQVIZIEPWWIRWMXMZIMRJSVQEXMSREFSYXXLIJEMPYVIXSTSXIRXMEP
attackers and supplies them with additional knowledge for creating an attack.
'%4%&-0-8=
6)*97-2+36()67*63192%98,36-7)(36926)'3+2-7)(4%68-)7
The risk of system behaviour that will cause breaking of the Second Law is
MRGVIEWIH[LIR
8LIW]WXIQHSIWRSXVIGSKRMWIYREYXLSVMWIHYWIVW
8LIW]WXIQHSIWRSXEYXLIRXMGEXIYWIVW
8LIW]WXIQEPPS[WYREYXLSVMWIHTVMZMPIKIIWGEPEXMSR
8LIW]WXIQHSIWRSXVIGSKRMWIYRYWYEPFILEZMSYVXLEXGSYPHPIEHXS
fraudulent activity.
'%4%&-0-8=
(-7%&0-2+-87)0*;,)2-87%77)84638)'8-323634)6%8-32%0
'%4%&-0-8-)7%6)'314631-7)(36;,)6)8,6)%870)%(83%,-+,
6-7/3*'314631-7)
The risk of system behaviour that will cause breaking of the Third Law is increased
[LIR
8LIW]WXIQHSIWRXHMWEFPIMXWIPJMRXLIIZIRXSJW]WXIQMGJEMPYVI
8LIW]WXIQHSIWRSXTVIZIRXLEVQXSMXWEWWIXWJSVI\EQTPIEGYWXSQIV
database) in the event of unauthorised access.
8LIW]WXIQHSIWRSXTVSXIGXMXWIRGV]TXMSROI]W
8LIW]WXIQHSIWRSXVIEGXXSMRJSVQEXMSRXLEXWLS[WERIIHXSVEMWIMXWPIZIP
of assurance.
:-- 7)0*46)7)6:%8-32'%4%&-0-8-)7837%8-7*=8,)8,-6(0%;
So for the third law, a system must be capable of the following self-preservation
GETEFMPMXMIW
4VSXIGXMRKMXWIPJEKEMRWXMPPIKEPYWEKISJMXWVIWSYVGIW
4VSXIGXMRKMXWIPJEKEMRWXYREYXLSVMWIHQSHMGEXMSR
4VSXIGXMRKMXWIPJJVSQFIMRKYREZEMPEFPIXSEYXLSVMWIHERHPIKEPYWEKI
,EZMRKXLIGETEFMPMX]XSJEMPWIGYVIP]
(MWEFPMRKMXWIPJ[LIRMXWEWWIXTVSXIGXMSRSVSTIVEXMSREPGETEFMPMXMIWEVI
compromised or where threats lead to a high risk of compromise.
:--- 83)66-7,91%2
Considering the system as technology can be too narrow to effect control with
due regard for the human factors which themselves become part of the system.
;IQE]GSRWMHIVXLIWIJEGXSVWJVSQX[SEWTIGXWXLIGVIEXSVWSVFYMPHIVWSJ
the system who establish operational principles of the system which allow it
to do their will by proxy, and the users of the system who may each have their
S[R[IPXERWGLEYYRK[LMGLQE]FIMQQSZEFPISVMRY\8LIVIQE]FIEHHIH
complexity with likely divisions of responsibility and accountability between the
system owners, the information owners, and the users of the system. Due regard
is needed to protect the people or things that the information represents and the
information assets themselves (which may be labeled meta-people, or meta-things).
If we consequently build in the concern for the positivistic course and allow for
PIZIVWSJG]FIVRIXMGEHNYWXQIRX[II\XIRHXLIJSYRHEXMSRWIXSJPE[WXSFIGSQI
1. An information system may not store, process or transmit an information
EWWIXMRWYGLE[E]XLEX[MPPEPPS[LEVQXSGSQIXSXLEXEWWIXXLIWYFNIGXW
of the information asset, or the thrall of that system, or through inaction or
negligence, allow any of them to come to harm.
%RMRJSVQEXMSRW]WXIQQYWXSRP]WXSVITVSGIWWSVXVERWQMXERMRJSVQEXMSR
asset as instructed by its builders or operators and by owners or custodians
of the information asset with which the information system interacts, except
[LIVIWYGLSVHIVW[SYPHGSRMGX[MXLXLI*MVWX0E[
3. An information system must protect its own existence as long as such
TVSXIGXMSRHSIWRSXGSRMGX[MXLXLI*MVWXSV7IGSRH0E[W
%KEMR[I[MPPHVE[ETEVEPPIP[MXLWGMIRGIGXMSRVIGEPPMRK8IVQMREXSV.YHKIQIRX
(E]-RXLIREPWGIRIXLI8IVQMREXSVVSFSXWEGVMGIWMXWIPJEWOMRKXLILIVSMRIXS
lower it into a cauldron of molten steel so that its technology cannot be used to
create the dystopian future of Skynet. Entertaining temporal paradox perhaps but
certainly a model application of the third law of cyber security.
Meanwhile, reality reminds us that organisations continue to lose portable devices
with sensitive information and without the protection afforded by encryption or
a facility to remotely delete the data. This leads at best to embarrassment, and at
worst, identity theft, intellectual property leakage, or other more serious damage.
So with this in mind, let us consider the self-preservation capabilities of the online
shop according to the governance expected by the third law.
'%4%&-0-8=
4638)'8-2+-87)0*%+%-278-00)+%097%+)3*-876)7396')7
The risk of system behaviour that will cause breaking of the Third Law is increased
[LIR
8LIW]WXIQMWRSXQSRMXSVIHERHLEWEPPS[IHGVMQMREPWXSLSWXMPPIKEPEGXMZMX]
on its servers.
8LIW]WXIQEPPS[WGVMQMREPWXSVIHMVIGXEGXMZMX]XSMPPIKEPWMXIW
'%4%&-0-8=
4638)'8-2+-87)0*%+%-27892%98,36-7)(13(-*-'%8-32
The risk of system behaviour that will cause breaking of the Third Law is increased
[LIR
8LIW]WXIQHSIWRSXTVIZIRXQERMRXLIQMHHPIEXXEGOW
8LIW]WXIQHSIWRSXTVIZIRXHIJEGIQIRX
8LIW]WXIQHSIWRSXTVIZIRXLMNEGOMRK
-< 86%274%6)2'='328630%2(3:)67-+,81-2(8,)+%4
8SVIGSRGMPIXLIXLVIIPE[W[MXLEREPVIEH]WXERHEVHMWIHQSHIPSJKSZIVRERGI
and promote the environment in which the laws may be applied with consistency
XSEW]WXIQ[ILEZIGSRWMHIVIHXLIJSPPS[MRKGLEPPIRKI;LIRGSRWMHIVMRKXLI
complexity of understanding and managing requirements that can be met through
actors in the system and the transformations expected from the system, to the
WEXMWJEGXMSRSJMXWGYWXSQIVWERHXLIW]WXIQWS[RIV
XLIVII\MWXWXLIVMWOWMG
SJXLIVIKYPEXMRKGSRXVSPWFIGSQMRKXLISFNIGXMZIWSZIVVMHMRKXLISFNIGXMZIWSJ
XLIW]WXIQMXWIPJ8LMWFIGSQIWQERMJIWXMRXLIGSQTPI\MX]SJQEREKMRKWYJGMIRX
ZEVMIX]MRXLIQSHIPXSIRWYVIXLIVIGSRGMPMEXMSRSJGSRMGXMRKZMI[WSJVMWOXS
assets held by the owner and customers and actors in the system (including users).
The owner, the actors, and the customers of the system may be any part of a
supply chain.
'%4%&-0-8=
4638)'8-2+-87)0**631&)-2+92%:%-0%&0)83%98,36-7)(%2(
0)+%097%+)
The risk of system behaviour that will cause breaking of the Third Law is increased
[LIR
%W]WXIQMWYREFPIXSTVSXIGXMXWIPJEKEMRWXEHIRMEPSJWIVZMGI(37
EXXEGO
%W]WXIQMWYREFPIXSTVSXIGXMXWIPJJVSQYREYXLSVMWIHIRGV]TXMSRSJMXW
information assets lending its user vulnerable to ransom for the decryption
key(s).
Drawing on the model for the corporate governance of IT, Table 3 shows the
propose-direct-monitor life cycle of IT governance and translates it into three
EGXMSRWVIUYMVIHXSEWWYVIXLIGSRXMRYIHGSQTPMERGI[MXLSYVXLVIIPE[W
transparency (of goals), control (to manage business process) and oversight (to
FIRGLQEVOVIWYPXWEKEMRWXXLISVMKMREPSFNIGXMZIW
8LMWMWEXSSPXSERGLSVXLIW]WXIQXSMXWSFNIGXMZIWERHTVIZIRXXLIGSRXVSPW
FIGSQMRKXLISFNIGXMZIWSJXLIW]WXIQ3YVEREP]WMWMR8EFPIWYKKIWXWXLEX
current practice may take protection and operation its stride but that there is an
inherent weakness in systemic application of the third law of self-preservation.
6IXYVRMRKXSXLIGSRWMHIVEXMSRSJWXERHEVHQSHIPW[IRHXLEXXLIEXXVMFYXISJ
survivability is not included therein.
People aspects of
WIGYVMX]LYQER
factor
+SZIVRMRK
processes
Technological
controls
Access is
controlled by
physical and
logical means.
Non-functional
requirements
must be
articulated
however obscure
their level of
abstraction.
First law
TVSXIGX
%XXVMFYXI
security
Access control
and the use of
systems are
managed within
a culture of
responsibilities.
Security policy is
VIEPMWIHMXMWRSX
NYWXEHSGYQIRXIH
aspiration. The
boundaries of
acceptable use
are at best well
HIRIHERHEX
worst easily
divined.
Second law
STIVEXI
%XXVMFYXI
quality of
service
Fair and
comfortable
working
conditions are
provided to meet
achievable goals.
The interfaces
between roles
EVIHIRIHERH
understood to
encourage the
transition of
tasks from one
responsibility to
another.
Between
protection and
self-preservation,
technology
supports the
safe working
environment
Protective (and
active) monitoring
and forensic
readiness. Enabled
by technology.
%PWSXLMRO
incident response
and business
continuity
planning.
A compromised
system has
failed. Think
availability. So
that an example
of a technological
control would
be protocols
that fend off
distributed
denial of service
(DDOS) attacks
on the system.
This brings us full
GMVGPIXSXLIVWX
PE[TVSXIGXMSR
8LMVHPE[
self-preserve
%XXVMFYXI
survivability
< '32'097-328,)83=2&))'32*0-'8
The proliferation of control measures create a danger where they become
divorced from the risks that they were created to mitigate (like destroying
computer mice and keyboards out of fear of virus infection). In the three laws, we
have created a common goal for the implementation of standards, reducing the
latter to important checklists.
The application of standards to mitigate risk is implied in Stafford Beers work
on cybernetics and arguably from the negative reaction to standards in Toynbees
historical commentaries. Toynbee contends that standards become a risk in
themselves because a society that applies them will stagnate and lose innovation.
,S[IZIVXLMWGSRMGXW[MXL8S]RFIIWZMI[XLEXXSEGLMIZIETSWMXMZIJYXYVIE
society must keep the scenario its wants to achieve in view and work unerringly
towards that vision. Toynbee may not have appreciated that standards hold the
lessons learnt about what may prevent the realisation of that future as well as
providing key actions to shape it. The knowledge in standards may be applied
XSEZSMHQMWXEOIWXSFITSWMXMZIP]VMWOEZIVWIMRORS[REVIEWEPPS[MRKJSV
innovation to springboard from those known areas into areas of emerging risk.
Toynbee may be echoing the concerns of cybernetics that regards centralised
control as a (negative) risk to innovation. This could indeed see stagnation if
it were not for the observation that standards developed with a consensus
or central dictat tend to have localised implementation. This facilitates the
management of known risks yet allows for Ashbys requisite variety by removing
XLIG]FIVRIXMGE[SJGIRXVEPMWEXMSR
Our postulation that standards mitigate negative risk, and their implementation
as a realisation of the positive risk of success, builds on cybernetics. Beer
suggests that Ashbys variety is a measure of complexity and highlights the risk
of modeling as a variety attenuator. However, the model of actions to be taken,
or measurements to be achieved that are encapsulated in standards are strong
VYPIW[LMGLEVIWIXXSEZSMHXLIHIKVEHEXMSRSJXLIEGXMZMXMIWXLEXETVSNIGXSV
STIVEXMSREPTPEREWXLIQSHIPSJEWIXSJEGXMZMXMIWXSEGLMIZIEHIRIHSV
MQTPMIHKSEPWYGLEWEW]WXIQXLEXSFI]WXLIXLVIIPE[WQE]WYJJIV
8LIYXMPMX]SJXLIXLVIIPE[WPMIWMRMRXLIMVEFMPMX]XSQEMRXEMREGPIEVSFNIGXMZI
FEWIHZMI[MRXLIJEGISJQYPXMTPIERHGSRMGXMRKWXEOILSPHIVZMI[WQYPXMTPI
threats, and multiple controls whose complexity challenge the system according to
%WLF]WPE[SJVIUYMWMXIZEVMIX]9WMRKXLIXLVIIPE[WEWXLIZERKYEVHJSVEPPEGXMSRW
is a temper for attitude and maintaining the balance between risk appetite and risk
attitude. They are a steer for doing the right thing over doing things right.
As we move from information to cyber security, we empathise with Asimovs
HIRMXMSRJSVE^IVSXLPE[;LIVIEW%WMQSZWPE[WIZSPZIHJVSQELYQERXS
humanity, so we evolve the application of our three laws from systems to the
Internet of things. It is the transformation from information to cyber that creates
personal responsibility in the gestalt. I protect my PC to prevent it becoming a
platform to attack your bank account, pacemaker, or power station. If John Donne
were writing today, he may have mused, Each mans hack diminishes me, for I am
part of the network. So ask not for whom it is a vulnerability.... So many standards
to choose from, but three laws to ring them all and bind them to a purpose.
8EFPI8LIKSZIVRERGIQEXVM\I\TIGXIHF]XLIXLVIIPE[W
<- 7911%6=
8,)(6)72)6.32)7
8,6))0%;73*'=&)6%2(
-2*361%8-327)'96-8=
THE CAPABILITIES
%VSFSXQE]RSXMRNYVIE
human being or, through
inaction, allow a human
being to come to harm.
4VSXIGXMRKEREWWIXEKEMRWXMPPIKEPYWEKISJMXWMRJSVQEXMSREWWIXW
4VSXIGXMRKEREWWIXEKEMRWXYREYXLSVMWIHYWEKISJMXWMRJSVQEXMSREWWIXW
4VSXIGXMRKEREWWIXEKEMRWXYREYXLSVMWIHGLERKISJMXWMRJSVQEXMSREWWIXW
4VSXIGXMRKEREWWIXEKEMRWXYREYXLSVMWIHHMWGPSWYVISJMXWMRJSVQEXMSREWWIXW
4VSXIGXMRKEREWWIXJVSQFIMRKYREZEMPEFPIXSEYXLSVMWIHERHPIKEPYWEKISJ
its information assets
8EOMRKSVHIVWJVSQMXWFYMPHIVWERHSTIVEXSVW[LS[MPPMRGPYHIWSJX[EVI
developers, operators, maintenance staff and their physical or virtual agents).
8EOMRKSVHIVWJVSQXLIS[RIVW
SJXLIGYWXSQIVMRJSVQEXMSR[MXL[LMGLMX
interacts (that is, people, or the consumers).
8EOMRKSVHIVWJVSQMXWS[RIVSVGYWXSHMERXLEXMWXLIVIXEMPIVERHMXWEKIRXW
physical or virtual).
8EOMRKSVHIVWJVSQXLIGYWXSHMERSJXLIGYWXSQIVMRJSVQEXMSRXLEXMWXLI
retailer and its agents, physical or virtual).
6IJYWMRKSVHIVWJVSQYREYXLSVMWIHSVYRVIGSKRMWIHTEVXMIW
4VSXIGXMRKMXWIPJEKEMRWXMPPIKEPYWEKISJMXWVIWSYVGIW
4VSXIGXMRKMXWIPJEKEMRWXYREYXLSVMWIHQSHMGEXMSR
4VSXIGXMRKMXWIPJJVSQFIMRKYREZEMPEFPIXSEYXLSVMWIHERHPIKEPYWEKI
,EZMRKXLIGETEFMPMX]XSJEMPWIGYVIP]
(MWEFPMRKMXWIPJ[LIRMXWEWWIXTVSXIGXMSRSVSTIVEXMSREPGETEFMPMXMIWEVI
compromised or where threats lead to a high risk of compromise.
8,)%7-13:8,6))0%;7
OF ROBOTICS
PROJECT
OPERATE
SELF PRESERVE
8EFPI4VSXIGXSTIVEXIERHWIPJTVIWIVZIXLVIIPE[WJSVVSFSXWG]FIVERHMRJSVQEXMSRWIGYVMX]
OUR FRIENDS
ELECTRIC?
&7:KDWLQXHQFHGR\RXEHOLHYHWKHHOGRIURERWLFVKDVKDGRQ
VFLHQFHFWLRQDQGYLFHYHUVD"+RZKDVWKHJHQUHLQXHQFHGWKH
work youre doing today?
-XWLEHEQEWWMZIMRYIRGIMRFSXLHMVIGXMSRWERHRSXRIGIWWEVMP]EP[E]W
a good one. Certainly from the point of view of robotics itself I suppose
-GSYPHWE]MXLEWRXLEHIRSYKLMRYIRGIFYXXLI idea of robots has had
EQEWWMZIMRYIRGI
-J]SYKSFEGOXSJSVMRWXERGIXLI[SVHVSFSX[EWVWXMRZIRXIH
F]E'^IGLTPE][VMKLXGEPPIH/EVIPapek for a play called 696
Rossums Universal Robots. These robots were more biochemical, what we
would call androids today, but they took over the world in the end and
killed all the humans except one which was spared to look after them.
%RHXLEX[EWXLIFIKMRRMRK
&YX?696ALEHQEWWMZIMRYIRGISRXLI[LSPIMHIEFIGEYWIZIV]WSSR
EJXIVXLEX;IWXMRKLSYWI)PIGXVMGWXLIFMKKIWXIPIGXVMGEPGSQTER]MRXLI
97EXXLIXMQIUYMGOP]GEQIYT[MXLXLIMHIESJYWMRKVSFSXWXSWLS[
LS[XIGLRSPSKMGEPP]EHZERGIHXLI][IVI*SVXLI;SVPH8VEHIJEMV
XLI]FYMPXERIRSVQSYWVSFSXXLEXGSYPH[EPOERHXEPOGEPPIH)PIOXVS
ERHXLMWFVSYKLXEPSXSJMRXIVIWXERHMRYIRGIFSXL[E]W
-XWEP[E]WMRXVMKYIHQIXLEXMRXLIZIV]FIKMRRMRKEX;IWXMRKLSYWI
?)PIGXVMGWAXLIVIIRKMRIIV6S];IRWPI]XLIVI[LSFYMPXRSXEVSFSX
but a machine to operate switches in a power station. He had an
arrangement of whistles and, depending on what pitch was blown down
the phone, a switch would be automatically triggered. Later he was
EWOIHXSTVIWIRXXLMWQEGLMRIXSXLITVIWWMX[EWNYWXEFMKWUYEVIFS\
with a little box on top of it, and then the next day he saw on the front
of the New York Times the headline was Robot Slave will take away
EPPLYQERLSYWI[SVO8LI]HTYFPMWLIHEGEVXSSRSJLMWQEGLMRIEW
well, the two boxes, but with arms, legs and eyes. The company was so
I\GMXIHXLEXXLI]EWOIHLMQXSKSSRXSYV[MXLMXERHWSXSXMR[MXL
the press image, he rebuilt the machine to copy the cartoon and instead
SJSTIVEXMRKEWQEPPWYFWXEXMSRMXVEMWIHEPMXXPI%QIVMGEREK8LEX[EW
XLIFMVXLSJVSFSXMGWVIEPP]MXGEQIWXVEMKLXSYXSJGXMSR7SMREWIRWI
]SYGSYPHWE]XLEXXLI2I[=SVO8MQIWGVIEXIHQIXEP,YQERSMHVSFSXW
&7'R\RXWKLQNWKDWFWLRQWKHQKDVDOWHUHGWKHYLHZWKHJHQHUDO
public has on robots?
Yes it has, and especially the idea of robots killing. If you look at Elektros
MRYIRGILI[EWEFMKTS[IVJYPQIXEPQERVSFSXERH]SYHWII
XLVSYKLSYXXLIJSVXMIWERHJXMIWEPPXLILSVVSVQSZMIWLEHXLIWIFMK
WGEV]VSFSXWXLI][IVIEPPVIEPP]FEWIHSR)PIOXVS
-XEGXYEPP]IRHIHYTMRXLIQSZMIWMRXLIWM\XMIWERHWIZIRXMIWXSSMR
TSVRQSZMIWJSVWSQIWXVERKIVIEWSRFYXPIXWRSXKSMRXSXLEX
CT: So was Robby the Robot in The Forbidden Planet a reaction
to that viewpoint?
Very much so. Robby the Robot was a direct reaction to Isaac Asimovs
laws of robotics. In fact Asimov stated in an interview early on that there
was only one story in robotics and thats robots killing people and taking
over the world, and that he wanted to change that.
One of the other companies they bought was a Japanese company called
Shaft. DARPA (the research win of the Pentagon) have the DRC [DARPA
Rescue Challenge] for the most advanced humanoid-like robots in the
world, where they have a whole set of tasks to do that involve things
like manipulating spanners, pliers a saw etc. and driving a car among
other things. Shaft has built the only robot that has completed the
DARPA challenges. Its a bit slow and messy but it managed to do it.
+SSKPIFSYKLXXLEXGSQTER]ERHEXXLIXMQI
7LEJX[IVIFIMRKKMZIRQMPPMSRF](%64%XS
research and take part in the next stage of the
GSQTIXMXMSRERH+SSKPILEZIRS[[MXLHVE[R
from that so they are pulling away from the
military where they can and Id imagine they will
do that with Boston Dynamics as well.
%WJEVEW-GERWII+SSKPILEZIEWSVXSJ7GMIRGI
Fiction mentality in a good sense. Theyre an
MRGVIHMFP]GVIEXMZIGSQTER]RSXZIV]KSSH
EFSYXTE]MRKXLIMVXE\IWFYXEQE^MRKP]GVIEXMZI
WS-XLMROXLEXXLI]VINYWXXEOMRKEGLERGIXS
see what they can do. But it seems to me that
they might be looking at is how to extend their
HIPMZIV]WIVZMGIMRXSXLIJYXYVI;MXLXLIQSRI]
they have to throw at it I think they might have
EPSXSJWYGGIWW=SYGSYPHLEZIXLI+SSKPI
Autonomous car driving up to your house
and a robot get out, deliver the post to
you and get a signature.
CT: Do you think they may be going in the
direction of Honda and Asimo of household
robots?
They havent really discussed that but honestly
I dont know. Theyve bought the company Nest
that makes internet devices that all you access
to you home appliance from outside, so I think
theyre looking to get into your home alright. If
youve ever seen a humanoid robot such as the
Asimo robot, its about the size of a small child
but if it were to hit into you, itd hurt. So if you
look at the size of the robots being produced
F]XLIGSQTERMIW+SSKPILEZIFSYKLXMXHFIE
long time before youd imagine them coming into
your house.
Its one of the things thats often forgotten when
]SYWIIWGMIRGIGXMSRQSZMIWERHXLI]LEZIE
robot doing chores around the house,, its a very
different house to the type the rest of us have.
You need a lot of big spaces to allow a robot
to walk around and you cant leave any books
SVQEKE^MRIWSRXLISSVFIGEYWIMX[SYPH
NYWXWPMTSVXVMTERHWQEWL-HMQEKMRI+SSKPI
will probably head in that direction but theyre
probably thinking in a twenty to thirty year
window.
CT: In that case, are we then doomed to a
future in which robots are inherently unsafe?
No, I dont think thats the case. I think we have
to make them safe. Theres many ways to do
that, they have pretty good avoidance algorithms.
A lot of the action in terms of safety is in the
workplace, because at the moment the law is
that if you have a robot arm or similar youve
got to be a certain distance from it and it has
to be enclosed in a cage which is very sensible
because theyd rip your head off. But now people
are working very hard to make compliant robots
where you could push their arm and it would
give way for example.
The thing about Asimovs robots was that they
had positronic brains and essentially had a
LYQERQMRH-X[EWTYVIGXMSRERHXLI][IVI
FVMPPMERXWXSVMIW8LIVSFSX[EWNYWXPMOIELYQER
so it would behave and think like a human and
look at you like a human and it could have intent.
Thats what Asimov was worried about, the
EKEMR7MRGIXLIREPSXSJQSZMIWLEZI?MRYIRGIH
me]. I love all the robot movies, I absolutely
PSZI8LI8IVQMREXSVXLIVWXSRIERHMXLEW
nothing to do with my work against autonomous
weapons.
-EQTEVXSJEPEVKIGSEPMXMSRSJ2+3W
GEQTEMKRMRKEKEMRWOMPPIVVSFSX;LEX[IVI
campaigning against is not against autonomous
robots being used by the military at all, or any
OMRHSJVSFSX;LEX[IVIEKEMRWXMWVSFSXW
QEOMRKXLIOMPPHIGMWMSR7SEREYXSRSQSYW
[IETSREWHIRIHF]XLI97(ITEVXQIRXSJ
Defence is one that once its been activated
[MPPWIPIGXERHIRKEKIMI/MPPMXWXEVKIXW
without further human intervention. So its
an unsupervised killing machine essentially,
and thats what Im against. My worry is not
something like The Terminator which is highly
intelligent. These weapons carry out programs
[LMGLWSQISRILEW[VMXXIRXLI]VIRSX
adaptive, theyre not smart and obviously theyll
get better as time goes on but it is unlikely
theyll have common sense in the foreseeable
future.
I think the problem is that a lot of people
LEZI\IHMRXLIMVLIEHWTEVXMGYPEVP]EPSXSJ
American lawyers, that technology will advance
ZIV]VETMHP])ZIRMJ]SYVIRSXEWGMIRGIGXMSR
fan you cant avoid things like Short Circuit or
;EPP)-XLMROXLEXTISTPINYWXMQEKMRIXLEXMJ
we keep developing them, by the time theyre
built they will be able to discriminate between
civilians and soldiers easily, and be able to do all
XLIWIXLMRKWXLEXEVII\XVIQIP]HMJGYPX7SMXW
OMRHSJXLIQ]XLSPSK]SJWGMIRGIGXMSRXLEXW
creating that, and the problem for me is that if
]SYKSHS[RXLIWGMIRGIGXMSRXLMROMRKVSYXI
you end up investing billions of dollars in a
WTIGMGX]TISJ[IETSRERHMJMXXYVRWSYXXLEX
at the end of some period when youre involved
in a heavy war and thats where youve spent
]SYVQSRI]]SYZIKSXXSXLIRYWIMXERH
with mass proliferation, regardless of whether
it discriminates or not, whether it can make
proportionate use of force or not, its going to
have to be used and thats our worry.
Prof. Sharkey was promoting Our Friends
Electric? Robots in Cinema and Robot Design
Today, which takes place at BFI Southbank on
11 November.
Sci-Fi: Days of Fear and Wonder runs at BFI
Southbank and venues across the UK until
the end of 2014.
ZZZERUJXNVFL
EVENTS
2014
lmanac
AofEvents
SEPT-DEC
9/+VIIGI97%%YWXVEPME.ETER&VE^MP'LMRE-XEP]4SPERH
'EREHE-VIPERH%VKIRXMRE4LMPMTTMRIW6SQERME%YWXVME'SPSQFME
0Y\IQFSYVK8EM[ER+IVQER]2MKIVME
OCTOBER
1
7-9
14 - 17
18 - 19
27
7IGYVI;SVPH']FIV7IGYVMX]
Conference Indiana
-RHMERETSPMW-297%
)YVSTI4'-77'
Community Meeting
(PCI Security
Standards Council)
&IVPMR+IVQER]
,,''SRJIVIRGI
Sao Paulo-SP, Brazil
CyberSec Connection
'SPYQFME1(97%
20
3rd Ibero-American
Industrial Cybersecurity
Congress
Bogota, Colombia
27 - 29
Cornerstones of Trust
0SRHSR9/
1-3
8-9
']FIV7IGYVMX]MR6SQERME
Central European Conference
Sibiu, Romania
']FIV7IGYVMX])<43
)\'I00SRHSR9/
5
;SVOWLSTSR7YTTSVXMRK
Diversity in Systems Research
&VSSQIPH'39RMXIH7XEXIW
6
XL97)2-<7]QTSWMYQSR
Operating Systems Design and
Implementation
&VSSQIPH'39RMXIH7XEXIW
Breakpoint
Melbourne, Australia
Nigeria Emergency
Response and
Counter-Terrorism
%FYNE*'82MKIVME
10 - 11
7-6%GSR
1MRRIETSPMW1297%
11 - 12
6Y\GSR
Melbourne, Australia
16
HouSecCon
,SYWXSR8I\EW9RMXIH7XEXIW
7IGYVI;SVPH']FIV7IGYVMX]
Conference Colorado
(IRZIV'397%
16 - 17
+VV'32-RJSVQEXMSR
Security Summit & Hacker
Conference
(I:SW4PEGI+VERH6ETMHW
1-9RMXIH7XEXIW
17
Hacker Halted
%XPERXE+ISVKME97%
NOVEMBER
5
12 - 14
21 - 23
XL%RRYEP3TIR7SYVGI(MKMXEP
Forensics Conference (OSDFCon)
,IVRHSR:%97%
%:%6
Sydney, Australia
+PSFEP
Civil Engineering
& Applied Science
Conference (CEAASC)
Taipei, Taiwan
7IGYVI;SVPH']FIV7IGYVMX]
Conference California
Santa Clara Convention
'IRXIV&E]%VIE'%97%
5-7
Cybercrime Prevention Summit
0E5YMRXE'%9RMXIH7XEXIW
9 - 10
/M[MGSR
0E5YMRXE'%9RMXIH7XEXIW
13
7SYXL&]7SYXL;IWX
Cork, Ireland
18
Deep Sec
Vienna, Austria
DefCamp
Bucharest, Romania
18 - 19
ESCAR Automotive CyberSecurity Conference
,EQFYVK+IVQER]
XL0EVKI-RWXEPPEXMSR7]WXIQ
Administration Conference
7IEXXPI;%9RMXIH7XEXIW
%YWXVEPME4'-77'
Community Meeting
PCI Security Standards
Council)
Sydney, Australia
12 - 13
19 - 21
7IGYVI;SVPH']FIV7IGYVMX]
Conference Seattle
7IEXXPI;%97%
4EG7IG'SRJIVIRGI
Tokyo, Japan
NoSuchCon
Paris, France
9 - 14
28 - 29
20 - 22
SecTor (Security Training and
Conference)
Toronto, ON, Canada
20 - 23
29 - 30
SAINTCON
;IFIV7XEXI9RMZIVWMX]98
9RMXIH7XEXIW
CyberMaryland
Conference
Baltimore Convention Center,
1(9RMXIH7XEXIW
21 - 24
(EPPEW7)'96);360(
(EPPEW8<9RMXIH7XEXIW
Hack.Lu
Luxembourg
29 - 31
0%7'32
%YWXMR8<
EkoParty
Buenos Aires, Argentina
22 - 23
30 - 31
-RJSVQEXMSR
Security Summit
'PIZIPERH3LMS97%
DECEMBER
Healthcare Cyber Security
7YQQMX
San Francisco, CA
8SO]S-RXIVREXMSREP
Conference on Software
Engineering and Digital
8IGLRSPSK]7)(8
Tokyo, Japan
16 -17
27 - 30
7767IGYVMX]
Standardisation Research
6S]EP,SPPS[E]9RMZIVWMX]SJ
0SRHSR9RMXIH/MRKHSQ
Chaos Communication
Congress
,EQFYVK+IVQER]
3 -10
17 - 19
8SO]S-RXIVREXMSREP
Conference on Engineering
and Applied Sciences
8-')%7
Tokyo, Japan
Focus Security
Conference
The Venetian and The Palazzo,
2:9RMXIH7XEXIW
2/
1/
Online
In Print
CyberTalk produce and distribute over 15,000
printed copies each year across the UK, Europe and
America
4/
3/
SBL
Social Media
5/
Partnerships
CyberTalk is proud to be supported by The National Museum
of Computing, and to have been recognised by the UK Home
Office Cyber Streetwise campaign and the US Dept.of
Homeland Security
6/
Events
To date, CyberTalk has been present at over 125 events
in 2014 and this number looks set to grow significantly
in 2015.
THE
UNIVERSE
7/
Cyber
Narratives
CyberTalk supports and promotes the
best cyber narrative writing from
around the world. As part of this we
are delighted to have established the
CyberTalk Flash Fiction Prize for
Science Fiction.
www.softbox.Co.uk/knightsoftherainbowtable
G]FIV XEPO$WSJXFS\GSYO
[[[WSJXFS\GSYOG]FIV XEPO
cybertalkmagazine
$']FIV8EPO9/