Richard Thieme, Author, Media Commentator and Speaker
"Living in a Glass House when Everyone Has Stones"
Identity-shift is well under way. When the context of our lives changes, all of the contents are jumbled, including who we think we are and meta-national structures. We can’t help thinking inside paradigms that emerged from prior technologies but we also can’t help acting as new paradigms demand. The end of secrecy and the end of privacy are two sides of the same coin. Hackers appoint themselves as a Fifth Estate, while security and intelligence professionals tell themselves a story that filters out as much reality as it allows in. But reality won’t go away, and protocols, policies, and legalities lag behind. Add “biohacking” to the mix and the weird turn pro, pros feel weird, and ... what can we do to stay in the game?
Richard introduced the importance of cross-disciplinary learning, and the networking concepts that support this, and that we don't need to know everything, but just how to get that knowledge.
A checklist of everything in the "cyber arsenal" and motivations that should scare us was worked through,
A black hat hacker is a hacker. A grey hat hacker is a wily hacker who will manipulate the truth. A white hat hacker is one who put the truth down somewhere and forgot where it was.
Nation state no longer means what it once did, the boundaries were drawn for purposes that have since disintegrated, as the speed of information flow and complexity of socio-economic boundaries have shifted dramatically.
Human rights did not exist until it became an emergent property that the majority agreed upon; the same is the case with individual intellectual property rights. This was projected as a cognitive artefact that we accept as a reality because we were raised with the concept. The masses become religious about those who provide them the cognitive artefacts - see Steve Jobs as an example.
The new technologies will continue to stretch us and allow us to be redefined in new ways and improve ourselves. New social attacks don't require the technology, but as the majority becomes more dependent on technology and social networks. Inference attacks can move people unwittingly to a conclusion they don't hold, because analysis of vast quantities of data the 80% has provided has given the information to be analysed and concluded in a new social attack.
We need to allow ourselves to shift to the first 10% of the bell curve and see what is coming down the road before the 80% in the hump. We need to not be stuck in the cognitive artefacts we grew up with, to protect ourselves and those we care about from the threats shared in the beginning.
The DYIBio is the next revision of social engineering, and it only takes someone with the mental state of a suicide bomber to create a
We need to keep the cognitive dissonance at the right level to use the real fears to motivate us, and the unreal ones from crippling us; even if the unreal ones occur we can be prepared to adapt.
We need to not be afraid to be honest about where we are, where we need to go, and get business and government leaders to accept this and commit the funds to move us to the right places to manage the risks. Be mindful, be supremely aware, and be vigilant.
- Posted using BlogPress from my iPad
Location:13th Privacy & Security Conference
No comments:
Post a Comment