AI in Cybersecurity colloquium hosted by Arizona State University, Institute for the Future of Innovation in Society 17/18 Feb. 2021
Expanded outline of my talk for the colloquium.
      
      0) The distinction between a posteriori and a priori
          knowledge: A posteriori knowledge is so-called
          'evidence-based' knowing that is based on empirical knowledge
        after the
          facts, and thus, in an important sense, comes too late.
          A priori knowledge, by contrast, is knowledge of the elementary
          phenomena before the factual events of empirical
          experience. It concerns how empirical facts are already
          cast or framed prior to particular experience of them. A priori knowledge thus frames in advance our access to the world, i.e. how we interpret the most elementary phenomena in our age. It therefore enables insights that an empiricist mind-set, arriving after the event, cannot.
          
        1) The
                  bigger picture on cybersecurity from a philosophical, i.e. a priori, pre-empirical, perspective: We
                  live in the age of progressive algorithmization of the world that thus increasingly becomes the cyberworld steered by
                  bit-strings. Algorithms
                            outsource a segment of our understanding of
                            some movement or other to the cyberworld
                            with the aim of automatically controlling,
                            mastering it. Bit-strings are the denizens
                            of the cyberworld that are in constant interplay
                            with one another, algorithms
being the bit-strings that copulate with data bit-strings  (in trillions of Universal Turing
                            Machines) to
                  compute progeny bit-strings that control movement/change of
                  some kind, either within the cyberworld itself, where the
                  bit-strings circulate, or in the physical
                  world. UTMs therefore are conceived
                            within the venerable paradigm of efficient,
                              productive movement — everything under control! This conception is pre-empirical, and no one will ever be able go out into the cyber-network and establish the empirical existence of UTMs. Nevertheless, the cyberworld is inhabited by bit-strings in unceasing algorithmic copulation. 
                            
                          2) Any
                  algorithmic bit-string in a UTM, however, can be infiltrated
                    by a virus bit-string to alter how the movement
                  is controlled, thus subverting the paradigm of
                                          efficient, productive movement.
                  Hence what was conceived as the unambiguous,
                  dead-certain, automated control of movement via
                  bit-string code is subverted into an ambiguous, uncertain
                  interplay among many players injecting bits of digital code
                  into the cyberworld. The uncontrollable interplay
                        with which cybersecurity is concerned can be
                        characterized as
                         algorithmic bit-strings in antagonistic
                          interplay (or even at war) with
                          one another in order to usurp control over movement
                        to the detriment of the opposing player, i.e.
                        the adversary, who may be a state, a government agency, a company, an
                        institution or an individual. The automated, algorithmic outsourcing of our understanding and control of movements in the world to the cyberworld that also enables the viral infection of bit-strings is a momentous, unparalleled world-historical event, by subverting, once and for all, the venerable paradigm of efficient, productive movement that is the hallmark of all Western science: automated movement controlled by a single source can now be countermanded and outsmarted by another, adversarial, automated source. If all movement in the
                        social world is power-interplay that
                        requires mutual estimation (in the
                        twofold, both appreciative and depreciative,
                        sense) to negotiate it successfully, the cyberworld of bit-strings now enables this ubiquitous power-interplay to be outsourced and thus played out also via certain things called bit-strings. Our human conflicts can now be fought out, and even automated, via bit-string surrogates.
                        
                       3) Moreover, the cyberworld movement intermeshes
                  with the augmentative movement of
                    thingified value (roughly: anything that has a
                  price) through whose medium, in the first place,
                  economic interplay is played out globally today in the
                  gainful game in which we are all
                  players and have stakes, above all as income-earners of all
                  kinds, starting with wage-earners. The value-form transformations that thingified
                  value has to pass through in order to augment are
                  facilitated by
                   algorithmic steering in the cyberworld, e.g.
                  supply-chain management, logistics, accounting, market
                  information, etc. Such algorithmic control, however,
                  cannot guarantee that the gainful game runs smoothly
                  and surely, augmenting thingified value in its circular movement.
                  On the contrary, the gainful game interplay is
                            itself inherently uncertain since the value-form transformations themselves depend on an inherently uncertain, transactional interplay. 
                            
                          4)
                  Thingified value in itself also has a social power over
                  movement that goes beyond the global economic interplay.
                  It exerts its power, in particular, in politics
                  (lobbying, political donations, etc.) and is the medium also for cyber-criminality
                  whose villainous business model employs viral
                    bit-strings to defraud and extort thingified
                  value from victims, including state agencies, public
                  utilities, public health institutions as well as
                  private persons and entities. Hence the current
                  increasing concern over cyber-attacks and
                  cyber-vulnerabilities in an increasingly algorithmically steered world.
                  
                  5) But even apart from the dangers of cyber-attacks
                  and illicit cyber-interplay, even in 'legitimate'
                  interplay that is not subverted by viral bit-strings, we are all captive to thingified value
                    as the medium of our sociation with
                      one another, and we are becoming increasingly
                    controlled in our life-movements of every kind by
                    what the algorithms, intermeshed with the turnover
                    of thingified value, dictate what we can and cannot
                    do. All the more reason for learning to see i) through the fetishizing veil of thingification and ii) the ambiguous, power-interplay nature of algorithmic control over movement.
                    
                  Further reading: 'Turing's
cyberworld of timelessly copulating bit-strings' 
 Movement
                      and Time in the Cyberworld 
and Social Ontology of Whoness.
