z-logo
Premium
Cybersecurity’s grammars: A more‐than‐human geopolitics of computation
Author(s) -
Dwyer Andrew C.
Publication year - 2023
Publication title -
area
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.958
H-Index - 82
eISSN - 1475-4762
pISSN - 0004-0894
DOI - 10.1111/area.12728
Subject(s) - hacker , geopolitics , computer science , malware , computer security , grammar , artificial intelligence , reading (process) , rule based machine translation , politics , sociology , law , linguistics , political science , philosophy
On one June afternoon in 2017, during an autoethnography of a malware analysis and detection laboratory, NotPetya quickly caused destruction. This malware has since been characterised as a key geopolitical event in cybersecurity, causing billions of dollars in damage as it rendered inoperable computers across the world. The hunt to identify those who had written NotPetya occurred almost immediately. However, this paper rearticulates this event through grammar, in a close reading of computation, to urge for a more‐than‐human reading of cybersecurity. By exploring the written propositions of the hackers, various computational materials – including hardware, code, and machine learning algorithms – as well as their ecologies, cybersecurity is understood to be part of an ecology of language‐practice. Engaging with N. Katherine Hayles’ study of non‐human cognition and choice, computation has an ability to read, interpret, and act, and thus intervene. NotPetya is thus not only a tool of hackers but is a political actor which, alongside others, transformed the contours of the geopolitics of cybersecurity. By focusing on grammars, geopolitics does not wholly derive from the (white, male, rational) hacker, analyst, or intelligence agent, but rather from a distributed set of actors that speak to one another. Grammars permit a nuanced appreciation of cyber‐attacks, the hacker's handling of computational cognition and choice, as well as conceptualising the relation between author and computation and the risks of machine learning. Cybersecurity, through grammar, then becomes one of co‐authorship where security is not only performed by humans but is contorted by an alien politics of computation.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here