Andrew C Dwyer
Cybersecurity’s Grammars: A More‐than‐Human Geopolitics of Computation
Dwyer, Andrew C
Authors
Abstract
On one June afternoon in 2017, during an autoethnography of a malware analysis and detection laboratory, NotPetya quickly caused destruction. This malware has since been characterised as a key geopolitical event in cybersecurity, causing billions of dollars in damage as it rendered inoperable computers across the world. The hunt to identify those who had written NotPetya occurred almost immediately. However, this paper rearticulates this event through grammar, in a close reading of computation, to urge for a more-than-human reading of cybersecurity. By exploring the written propositions of the hackers, various computational materials – including hardware, code, and machine learning algorithms – as well as their ecologies, cybersecurity is understood to be part of an ecology of language-practice. Engaging with N. Katherine Hayles’ study of non-human cognition and choice, computation has an ability to read, interpret, and act, and thus intervene. NotPetya is thus not only a tool of hackers but is a political actor which, alongside others, transformed the contours of the geopolitics of cybersecurity. By focusing on grammars, geopolitics does not wholly derive from the (white, male, rational) hacker, analyst, or intelligence agent, but rather from a distributed set of actors that speak to one another. Grammars permit a nuanced appreciation of cyber-attacks, the hacker's handling of computational cognition and choice, as well as conceptualising the relation between author and computation and the risks of machine learning. Cybersecurity, through grammar, then becomes one of co-authorship where security is not only performed by humans but is contorted by an alien politics of computation.
Citation
Dwyer, A. C. (2023). Cybersecurity’s Grammars: A More‐than‐Human Geopolitics of Computation. Area, 55(1), 10-17. https://doi.org/10.1111/area.12728
Journal Article Type | Article |
---|---|
Acceptance Date | May 6, 2021 |
Online Publication Date | May 15, 2021 |
Publication Date | 2023-03 |
Deposit Date | May 16, 2021 |
Publicly Available Date | Mar 1, 2023 |
Journal | Area |
Print ISSN | 0004-0894 |
Electronic ISSN | 1475-4762 |
Publisher | Wiley |
Peer Reviewed | Peer Reviewed |
Volume | 55 |
Issue | 1 |
Pages | 10-17 |
DOI | https://doi.org/10.1111/area.12728 |
Files
Published Journal Article
(453 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
Copyright Statement
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited
You might also like
Digital geographies
(2023)
Book Chapter
What Can a Critical Cybersecurity Do?
(2022)
Journal Article
Zoom Obscura: Counterfunctional Design for Video-Conferencing
(2022)
Conference Proceeding
Cloud Ethics: Algorithms and the Attributes of Ourselves and Others
(2021)
Journal Article
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search