AI in Cybersecurity colloquium hosted by Arizona State University, Institute for the Future of Innovation in Society 17/18 Feb. 2021
Expanded outline of my talk for the colloquium.
0) The distinction between a posteriori and a priori
knowledge: A posteriori knowledge is so-called
'evidence-based' knowing that is based on empirical knowledge
after the
facts, and thus, in an important sense, comes too late.
A priori knowledge, by contrast, is knowledge of the elementary
phenomena before the factual events of empirical
experience. It concerns how empirical facts are already
cast or framed prior to particular experience of them. A priori knowledge thus frames in advance our access to the world, i.e. how we interpret the most elementary phenomena in our age. It therefore enables insights that an empiricist mind-set, arriving after the event, cannot.
1) The
bigger picture on cybersecurity from a philosophical, i.e. a priori, pre-empirical, perspective: We
live in the age of progressive algorithmization of the world that thus increasingly becomes the cyberworld steered by
bit-strings. Algorithms
outsource a segment of our understanding of
some movement or other to the cyberworld
with the aim of automatically controlling,
mastering it. Bit-strings are the denizens
of the cyberworld that are in constant interplay
with one another, algorithms
being the bit-strings that copulate with data bit-strings (in trillions of Universal Turing
Machines) to
compute progeny bit-strings that control movement/change of
some kind, either within the cyberworld itself, where the
bit-strings circulate, or in the physical
world. UTMs therefore are conceived
within the venerable paradigm of efficient,
productive movement — everything under control! This conception is pre-empirical, and no one will ever be able go out into the cyber-network and establish the empirical existence of UTMs. Nevertheless, the cyberworld is inhabited by bit-strings in unceasing algorithmic copulation.
2) Any
algorithmic bit-string in a UTM, however, can be infiltrated
by a virus bit-string to alter how the movement
is controlled, thus subverting the paradigm of
efficient, productive movement.
Hence what was conceived as the unambiguous,
dead-certain, automated control of movement via
bit-string code is subverted into an ambiguous, uncertain
interplay among many players injecting bits of digital code
into the cyberworld. The uncontrollable interplay
with which cybersecurity is concerned can be
characterized as
algorithmic bit-strings in antagonistic
interplay (or even at war) with
one another in order to usurp control over movement
to the detriment of the opposing player, i.e.
the adversary, who may be a state, a government agency, a company, an
institution or an individual. The automated, algorithmic outsourcing of our understanding and control of movements in the world to the cyberworld that also enables the viral infection of bit-strings is a momentous, unparalleled world-historical event, by subverting, once and for all, the venerable paradigm of efficient, productive movement that is the hallmark of all Western science: automated movement controlled by a single source can now be countermanded and outsmarted by another, adversarial, automated source. If all movement in the
social world is power-interplay that
requires mutual estimation (in the
twofold, both appreciative and depreciative,
sense) to negotiate it successfully, the cyberworld of bit-strings now enables this ubiquitous power-interplay to be outsourced and thus played out also via certain things called bit-strings. Our human conflicts can now be fought out, and even automated, via bit-string surrogates.
3) Moreover, the cyberworld movement intermeshes
with the augmentative movement of
thingified value (roughly: anything that has a
price) through whose medium, in the first place,
economic interplay is played out globally today in the
gainful game in which we are all
players and have stakes, above all as income-earners of all
kinds, starting with wage-earners. The value-form transformations that thingified
value has to pass through in order to augment are
facilitated by
algorithmic steering in the cyberworld, e.g.
supply-chain management, logistics, accounting, market
information, etc. Such algorithmic control, however,
cannot guarantee that the gainful game runs smoothly
and surely, augmenting thingified value in its circular movement.
On the contrary, the gainful game interplay is
itself inherently uncertain since the value-form transformations themselves depend on an inherently uncertain, transactional interplay.
4)
Thingified value in itself also has a social power over
movement that goes beyond the global economic interplay.
It exerts its power, in particular, in politics
(lobbying, political donations, etc.) and is the medium also for cyber-criminality
whose villainous business model employs viral
bit-strings to defraud and extort thingified
value from victims, including state agencies, public
utilities, public health institutions as well as
private persons and entities. Hence the current
increasing concern over cyber-attacks and
cyber-vulnerabilities in an increasingly algorithmically steered world.
5) But even apart from the dangers of cyber-attacks
and illicit cyber-interplay, even in 'legitimate'
interplay that is not subverted by viral bit-strings, we are all captive to thingified value
as the medium of our sociation with
one another, and we are becoming increasingly
controlled in our life-movements of every kind by
what the algorithms, intermeshed with the turnover
of thingified value, dictate what we can and cannot
do. All the more reason for learning to see i) through the fetishizing veil of thingification and ii) the ambiguous, power-interplay nature of algorithmic control over movement.
Further reading: 'Turing's
cyberworld of timelessly copulating bit-strings'
Movement
and Time in the Cyberworld
and Social Ontology of Whoness.
No comments:
Post a Comment