{"id":2521,"date":"2020-07-28T08:56:13","date_gmt":"2020-07-28T12:56:13","guid":{"rendered":"https:\/\/zzzptm.com\/wordpress\/?p=2521"},"modified":"2020-07-28T08:56:13","modified_gmt":"2020-07-28T12:56:13","slug":"upside-down-evolution-and-security","status":"publish","type":"post","link":"https:\/\/zzzptm.com\/wordpress\/?p=2521","title":{"rendered":"Upside-Down Evolution and Security"},"content":{"rendered":"\n<p>I promise the dear reader that this will not be just a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/rant\">rant<\/a>&nbsp;about how nobody takes security seriously or anything in that vein. Read on, and I&#8217;ll get to the actionable items. I just need to set some things up in order to give credence to my conclusions.<\/p>\n\n\n\n<p>Some years ago, the Polish science fiction author Stanislaw Lem wrote an essay about weapons&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/development\">development<\/a>&nbsp;titled &#8220;The Upside-Down Evolution&#8221;. In it, Lem called out several interesting&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/trends\">trends<\/a>: miniaturization, dehumanization, and deformalization. The&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/key\">key<\/a>&nbsp;trend gave the essay its title: rather than developing smarter and smarter&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ai\">AI<\/a>, the true breakthrough Lem foresaw was not in&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/artificial-intelligence\">artificial intelligence<\/a>, but in artificial&nbsp;<em>instinct.<\/em>&nbsp;Lem postulated that a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/weapon\">weapon<\/a>&nbsp;need not be coded to handle all types of situations. It only needed to be able to perform a certain range of tasks under certain conditions, nothing more.<\/p>\n\n\n\n<p>Combined with miniaturization and dehumanization, limited weapons&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/systems\">systems<\/a>&nbsp;&#8211; artificial insects, in Lem&#8217;s parlance &#8211; also allowed for the deformalization of war. No more a matter of exchanged ultimatums and formal declarations,&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/war\">war<\/a>&nbsp;in Lem&#8217;s future would be constant and acts of aggression difficult to attribute. Consider a swarm of artificial insects each carrying a fractional amount of fissile material that converge on a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/location\">location<\/a>&nbsp;to create a critical mass for a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/nuclear\">nuclear<\/a>&nbsp;explosion. If all the artificial insects are destroyed in the explosion, who could say what actor or actors was behind the event? Could it be an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/attack\">attack<\/a>&nbsp;by a foreign&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/power\">power<\/a>&nbsp;or a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/false-flag\">false flag<\/a>&nbsp;attack used to justify an attack on another foreign power? Or could it be done to frame a third party?<\/p>\n\n\n\n<p>Once deformalized like that, warfare would be constant. Natural disasters could be no more than just that, or they could be the products of an attack by a hostile party. There would be no way to tell the difference.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/res.cloudinary.com\/peerlyst\/image\/upload\/c_limit,dpr_2.0,f_auto,fl_lossy,h_471.011,q_auto,w_320\/v1\/post-attachments\/phoca_thumb_l_2CYB-STR191_lodtnw\" alt=\"\"\/><\/figure>\n\n\n\n<p>While we are yet to see Lem&#8217;s artificial insects on a grand&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/scale\">scale<\/a>, we *do* see the next closest thing &#8211; cyberattacks.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.peerlyst.com\/tags\/cyberattacks\">Cyberattacks<\/a>&nbsp;check all the boxes of the upside-down evolution. They are mere&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/digital\">digital<\/a>&nbsp;streams of signals &#8211; miniaturized. They are often products of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/algorithms\">algorithms<\/a>&nbsp;&#8211; dehumanized. They are always out there, always attacking in the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/ways\">ways<\/a>&nbsp;they are set up to attack &#8211; deformalized. And they only do that *one* set of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/operations\">operations<\/a>&nbsp;that they have to do &#8211; artificial instinct.<\/p>\n\n\n\n<p>Lem&#8217;s essay did not go into matters of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/defense\">defense<\/a>&nbsp;except to say that the need for uniforms, marching, parade drills, and generals all went by the wayside. At best, those were worthless vestiges of another age. At worst, they hindered responses that had to be just as rapid and ruthless as the attacks. Lem only considered nation-states, but we now live in an age with a myriad of players having&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/access\">access<\/a>&nbsp;to these&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/attacks\">attacks<\/a>&nbsp;&#8211; and a myriad of defenders still trying to fight the last war.<\/p>\n\n\n\n<p>Old-timers will remember Clifford Stoll&#8217;s epic, The Cuckoo&#8217;s Egg. The story is of a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/human-1\">human<\/a>&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/tracking\">tracking<\/a>&nbsp;and trapping another human. At the time, the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/fbi\">FBI<\/a>&nbsp;was uninterested in the case, as no large sum of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/money\">money<\/a>&nbsp;was involved (less than $1) and no classified&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/files\">files<\/a>&nbsp;were&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/accessed\">accessed<\/a>&nbsp;by the attacker. While we may look back on that and shake our heads the way modern combat&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/veterans\">veterans<\/a>&nbsp;would&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/react\">react<\/a>&nbsp;to how various World War One generals dismissed the power of the machine-gun, that was the FBI still fighting the last war.<\/p>\n\n\n\n<p>Well, Stoll went on to write in 1995 that the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/internet\">Internet<\/a>&nbsp;was just a fad and would never catch on as a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/platform\">platform<\/a>&nbsp;for commerce and information exchange. Yes, he still kicks himself over that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/article\">article<\/a>, but at least he&#8217;s aware of the irony and how outdated that thinking was. And though I talk of a mindset fighting the last war, that was the 1986 mindset. People today may have moved beyond that, but not much. Most are still expecting a Stoll-like boffin to do the investigative work to catch the baddies and bring them to justice. That&#8217;s because the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/events\">events<\/a>&nbsp;described in The Cuckoo&#8217;s Egg are those of a previous war.<\/p>\n\n\n\n<p>To be perfectly honest, most firms aren&#8217;t even thinking about fighting a war. They&#8217;re not built to do so. At no point is there an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/mba\">MBA<\/a>&nbsp;class on Sun Tzu&#8217;s Art of War that ever tells the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/students\">students<\/a>, &#8220;You know, this really isn&#8217;t allegorical when it comes to IT.&#8221; I know this because I have yet to work with a&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/customer\">customer<\/a>&nbsp;in the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/business\">business<\/a>&nbsp;world that doesn&#8217;t underline the principle that security won&#8217;t interrupt business as usual.<\/p>\n\n\n\n<p>I&#8217;m sorry, but that&#8217;s quite the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/paradox\">paradox<\/a>, Mr. Customer. Do you want business as usual without security, or do you want to change how you do business in order to have security? Are you still forming soldiers into phalanxes of spearmen for operations on an open field of battle, or do you plan to tell them about the need to disperse and entrench so as to avoid being overwhelmed by large-area effect weapons? If still the masses of spearmen, I have a rude surprise waiting for them when the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/drone\">drone<\/a>&nbsp;with a fuel-air explosive arrives on the scene&#8230;<\/p>\n\n\n\n<p>&#8230; and even that analogy is out of date, as the actual attacks coming at us every day are not even needing&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/drones\">drones<\/a>&nbsp;in order to do their damage. Worse, because we put emphasis on doing business first, we&#8217;re only looking at security as a bolt-on. That means the underlying systems will always be more&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/vulnerable\">vulnerable<\/a>&nbsp;that necessary.<\/p>\n\n\n\n<p>So what keeps this article from being another mass of groanings about how things are? What are my fixes, my takeaways that&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/businesses\">businesses<\/a>&nbsp;can put into place? All right, all right, I&#8217;m ready to get to my point.<\/p>\n\n\n\n<p>You&#8217;ve got to apply upside-down&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/evolution\">evolution<\/a>&nbsp;to your systems. Doing so will give them higher immunity and better&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/resiliency\">resiliency<\/a>&nbsp;against attacks. It will mean more interruptions to business, but of less total time than what would happen to your business if there was a successful&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/denial-of-service-attack\">denial of service attack<\/a>&nbsp;against it. Moreover, the interruptions will be localized, not general.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.peerlyst.com\/tags\/automate\">Automate<\/a>&nbsp;your responses to any&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/breach\">breach<\/a>&nbsp;of&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/standards\">standards<\/a>, and make those responses harsh. Do not exempt anything. I grant that the last sentence is more a starting negotiation position than a final state, but I stand by it, all the same. When the&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/endpoint\">endpoint<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/server-2009\">server<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/application\">application<\/a>&nbsp;goes wrong, shut it down immediately and get it fixed just as fast. Then, when it comes back&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/online\">online<\/a>, it is fresh and ready to defend itself.<\/p>\n\n\n\n<p>And if your shutdown actually caught an&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/attacker\">attacker<\/a>, so much the better. The swift action meant limited damage. Do you know how Taiwan had such a low&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/infection\">infection<\/a>&nbsp;rate in the recent pandemic? It shut down ALL travel to the island. Nations that made exceptions got hit hard. Taiwan made no exceptions, and that swiftness and harshness saved lives.<\/p>\n\n\n\n<p>What is your return on investment? Your business stays open, allowing you to continue to get returns on all your other investments, that&#8217;s the ROI. The coming years will see attacks that are more miniaturized, more dehumanized, more deformalized, and more artificially instinctful. Trying to stay open 24\/7 in that world will be like leading those spearmen in a charge against a tactical nuclear warhead. Automate, be strict, and accept small downtimes now instead of permanent downtimes later. Fight the current, upside-down evolution-born war, not the one where we trace a 1200 baud&nbsp;<a href=\"https:\/\/www.peerlyst.com\/tags\/modem\">modem<\/a>&nbsp;connection back to Bremen after months of investigation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I promise the dear reader that this will not be just a&nbsp;rant&nbsp;about how nobody takes security seriously or anything in that vein. Read on, and I&#8217;ll get to the actionable items. I just need to set some things up in order to give credence to my conclusions. Some years ago, the Polish science fiction author [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2521","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2521","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2521"}],"version-history":[{"count":1,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2521\/revisions"}],"predecessor-version":[{"id":2522,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/2521\/revisions\/2522"}],"wp:attachment":[{"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2521"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2521"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zzzptm.com\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2521"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}