版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
C2E」occ92!ou9ll入b\o^!qe29:o\n山:o\?ne2本M\!本e\2本oo::e\本pe!\exbe\本!2e9uqob!u!ou2oue山e\?!u?本ecpuolo?入本ob!c2.」pe入山9入qe2c\!pe9loo山!u?cp9lleu?eo\o::e\ueM\eco山山euq9本!ou2\e?9\q!u?ex!2本!u?oue2.」pe?o9l!2本ob\e2eu本:\e2p!qe92,2b9\卜qep9本e,9uq2p9be:n本n\e\e2e9\cp.2p9\e入on\^!eM2ou本p!2b9be\M!本pn29本c2e本@?eo\?e本oMu.eqn.
CenterforSecurityandEmergingTechnology|1
ExecutiveSummary
Thedigitalworldisincreasinglydefinedbyunmitigablerisks.Ourdatacannotbeprotectedatscale.Systemsmakedecisionsthattheirprogrammerswillneverunderstand.Itisnolongerraretoencounterfailuresthatcannotbeaddressedevenaftertheyaredetected.Withthefabricofhumansocietysothoroughlydigital—drivingdecisionsinhealthcare,finance,nationalsecurity,transportation,andmore—nothinglessthanlong-termsocietalstabilityisatstake.
Inthispaper,wearguethatdigitalenvironmentalismistheonlyanswertothesewoes.By“digitalenvironmentalism,”wemeanplacingindividualdecisionswithinthebroadercontextoftheriskseachgeneratesandensuringthattheserisksaredistributedbyintentratherthanbyhappenstance.
Inparticular,wecontestthatthedigitalhazardswenowfacearearesultofcoreassumptionsaboutourworld—keyprinciplesthroughwhichweviewourbasicrelationshiptotechnology.Wecalltheseassumptionsgrand“articlesoffaith,”andprovideanoverviewofthreesuchassumptionsinSection1.
Thefirstarticleoffaithisthattherewas,andcontinuestobe,ameaningfuldistinctionbetweenthedigitalandthephysicalworlds.Putinsimplerterms,theideaisthatbecauseitoncemadesensetoseparatethedigitalfromthephysical,itmakessensetocontinuetodoso.
Secondistheassumptionthattechnologywillalwaysbeabletoameliorateourwoes—evenwhentechnologyitselfisthecauseofourproblems.Statedmorebroadly,thisassumptionhasledustoaworldinwhichtechnologysolvesoneproblem,onlytocreateanother,towhichweapplyanewtechnologicalfix,adinfinitum.
Lastistheassumptionthatlimitlessgrowthcanandshouldleadtolimitlessinnovation—thatis,innovationdrivingpositivefeedbackloopswithinitselfandwithoutend.
Eachofthesearticlesoffaithis,toputitsimply,mistaken.Eachindifferentways,andeachfordifferentreasons.Buteachiscontributingtoadigitalworldthatisfundamentallyunsafeforthosewhopopulateit.
Sowhatdowesuggest?How,giventhedepthofourproblems,arewetosecuretheworldthatwetechnologistsaresobusilycreating?
Weargueforthreecoresolutions,knowingfullwellthatmuchmoreactionisneeded.WedosoinSection2.
CenterforSecurityandEmergingTechnology|2
Thefirstliesinempoweringasingleregulatoryauthority—beittheFederalTradeCommissionoranewDigitalSafetyAdministration—withtheexpertiseandabilitytoenforcethelimitsincyberspacethatwebelievearenecessary.Suchlimitsinvolvethecreationandenforcementofstandardsforsoftwaredevelopment,andsomeformofmandatoryauditingforportionsofdeployedcode.
Secondisequippingsuchanagencywithtoolstoenforcecoreprinciplesofsustainability.Thismeansensuringthatnewcodeanddevicescreateameaningfulimprovementinutilitycomparedtoexistingalternatives,andarenotsimplydevelopedfornovelty’ssake.Italsomeansforciblyretiringunmaintainedcodewhenitisabandoned,aswellasmandatingaccountabilitythroughindependentassessments,or“redteams,”thatarefocusedontherisksofnewtechnologybeforethattechnologyisdeployed.
Lastistheremoval—byCongress,thecourts,regulatoryagencies,oracombination—ofsoftwarevendors’abilitytodisclaimliabilityinitsentiretyfromtheirproducts.Holdingsoftwarevendorstothesamestandardsaseveryotherindustrywill,overtime,reducetheabilityofflawedsoftwaretobeintroducedintothemarket.
Isittoolatetosecurethedigitalworld?Ischangingourcollectiveapproachtotechnologyevenfeasible?
Themomentumisagainstus;wereadilyadmitthatfact.Thearticlesoffaithwedescribeinthispaperaredeeplyheldandevenmoredeeplyingrained.Itwilltakesignificantcommitmentifwearetoreversethesetrendsandtocreateamoresustainabledigitalworld.Wedonotdoubtanyofthesefacts.
Andyetso,too,arethestakeshigh.Wenowdeploycodeforalmosteveryactivity,andwearefastapproachingaworldwheremajorportionsofthesoftwarewerelyonareincomprehensibleandbug-ridden.Alitanyoffailuresthereforeawaitsus.
Thetimetotakeaction,inotherwords,isnow—beforeitistoolate.
CenterforSecurityandEmergingTechnology|3
Introduction
Weare,allofus,swimminginaseaofsoftwareanddevicesbutwithnoperspectiveonwhereweareheadedorthebroaderdangersweface.1Itisneitherlatenoranexaggerationtosaythatthemoreweimmerseourselvesinthedigitalworld,themore
severetherisks.AsElroyDimsonputit,“riskisthatmorethingscanhappenthanwill.”2Andhereweare,madlyincreasingthenumberofthingsthatcanhappen.
Asaresult,wenowfaceaworldfullofunmitigablerisks.Ourdatacannotbeprotectedatscale.Systemsmakedecisionsthattheirprogrammerswillneverunderstand.Itisnolongerraretoencounterfailuresthatcannotbeaddressedevenoncetheyaredetected.3Withthefabricofhumansocietysothoroughlydigital—drivingdecisionsinhealthcare,finance,nationalsecurity,transportation,andmore—nothinglessthanlong-termsocietalstabilityisatstake.4
Digitalenvironmentalismis,wecontest,theanswer—theonlyanswer—tothesewoes.By“digitalenvironmentalism”wesimplymeanplacingindividualdecisionswithinthebroadercontextoftheriskseachgeneratesandensuringthattheserisksaredistributedbyintentratherthanbyhappenstance.
Everylineofcodethatisdeployed,everynewIPaddressthatisconnected,everymicrochipthatisprinted,everyself-modifyingdigitalartifactburiedinsidesomethingelse—eachcarrieswithitimplicationsforthedigitalenvironment.Evaluatingeachlineofcode,device,anddecisioninrelationtotheirimpact,andforcingtheirriskstobepurposefullydistributed,istheonlywaytopreventthefailuresweareotherwisesuretoconfront.Justasnoonesourceofatmosphericcarboncanchangetheclimate,onlythecalculusofmanycan.
CenterforSecurityandEmergingTechnology|4
WhatDigitalEnvironmentalismIs—AndWhatItIsNot
Whenweusetheterm“environmentalism,”wealsomeanconservation,inthesenseofprioritizingthepreservationoftheenvironment,aswellasconservatism,inthesenseofencouraginggradualimprovementsthatde-emphasizerapidchange.Digitalenvironmentalismistherefore,inourview,anapproachtotechnologicaladoptionthatfactorsinbothlong-term(e.g.,futureusers)andcollectiverisk(e.g.,societalimpact)intohownewtechnologiesaredevelopedanddeployed.Thequestionnewtechnologiesshouldelicitisthereforenotsimply“howusefulisit?”butalso“whommightitharmandwhen?”
Definingdigitalenvironmentalismbynegation,however,maybeamorepracticalwaytomakeourpoint.Inthatsense,hereiswhatdigitalenvironmentalismisnot:itisnotdevelopingnewtechnologiesandrushingthemtomarketbecausetheyarenovel;itisnotassessingtechnologyforriskafteritisdeployed,andonlythenapplyingpatchesorothermitigants;itisnotpraisinginnovationforinnovation’ssake.Digitalenvironmentalismisthereforeadmittedly(andfundamentally)atoddswithourcurrentapproachtotechnologicaladoption—anapproachthatplacesnewandfastoversustainable,jeopardizingourprivacy,security,andevenoursafetyintheprocess.
Formany,theterm“digitalenvironmentalism”mightsoundodd—acombinationoftwotermsthatarenottypicallyassociatedwitheachother.Butthesetermsshouldbe,andtheoddityoftheirassociationispreciselyourpoint,notleastbecausethedigitalworldimpactsourenvironmentinmanyways.Forstarters,theproblemwefaceisfarfromabstract.Carbonemissionsfrominternet-connectedentitiesaccountforroughly3percentofallglobalelectricityusageand2percentofgreenhouseemissions.5Thedigitalworlditselfisbuiltonsiliconandreliesonpreciousmetalsthathavelimitedsupply.AniPhonepurportedlycontains75elementsfromtheperiodictable,roughlytwothirdsofthe118elementsknowntoscience.6
Andthenthereiscyberspaceitself:acombinationofnetworks,applications,andsensorsthatdigitallycaptureevermoredataaboutevermoreactivities.7Thisenvironmentrequiresbothsafeguardingandprotectionandyetreceives,whenitcomesdowntoit,preciouslittleofeach—anassertionthatisbynowinarguable,basedsimplyontheprevalenceofsuccessfulcyberattacks.8Itisnostretchtosaythatdigitaltechnology,thedefininginnovationofthelasthalfcentury,hasdeepandunaddressedinsecuritiesatitscore.9
CenterforSecurityandEmergingTechnology|5
Thequestions,then,aretwofold:Howdidwecometoliveinanenvironmentsoplaguedbydownsides?And,moreimmediately,what,ifanything,shouldwedotoaddressthem?
WespendSection1diagnosingtheseproblems,andSection2describinghowandwhywebelievedigitalenvironmentalism,initsbroadestsense,istheironlycure.Forreaderswhoarelessinterestedinourdiagnosisthaninourproposedcure,youwillbeforgivenforskippingdirectlytoSection2.
1.HiddenAssumptions,HiddenRisks
Ifwefindourselveslivinginaworldwecannotprotect,itisnotbecausewe—anyofus—wantedtofindourselveshere.Environmentalhazardsare,bytheirnature,collectivethreats;theyposeprofounddangerstousall.Theyare,ineffect,integralcalculus—theinfinitesumofinfinitesimals.
Thesehazards,includingthoseinthedigitalsphere,arearesultofassumptionsaboutourworld—thatthisorthatindividualactionoreventistoosmalltomatter.Thoseassumptionshaveledustothepresentcircumstance.
Throughoutthisessaywecalltheseassumptionsgrand“articlesoffaith.”10Leftunexamined,thesearticlesoffaithareleadingustoaworldinwhichwefaceaninsurmountablenumberofunmitigablerisks.Therearemanysucharticlesoffaith;westartwiththree.
DigitalVersusPhysicalEnvironment
Thefirstarticleoffaithisthenotionthatthedistinctionbetweenthedigitalandphysicalenvironmentsisbothrealandmeaningful.Putinsimplerterms,theideaisthatbecauseitoncemadesensetoseparatethedigitalfromthephysical,itmakessensetocontinuetodoso.
Themoredigitaltechnologiesweadopt,themoreofouractionsaredigitallycapturedandtransmitted,meaningthat,atminimum,ithasbecomeinconceivableto“optout”ofthedigitalworld.Atmaximum,thismeansthatouractivitiesareasmuchdigitalastheyarephysical,ifnotmoreso.
CenterforSecurityandEmergingTechnology|6
Afewexamples:
Researchershavedemonstratedtheabilitytodetectheartandbreathingratesthroughwirelessinternetsignals,meaningthatanyonewithinrangeofawirelessrouteris,theoretically,exposingtheirvitalsignstosurveillance.11
Ortakesmartphones,whicharenowanecessarypartoflifeformanyofus.12Thesimpleactofkeepingacellphonepowered-onovertimecreatesareal-timemapoftheowner’sactivities,whichcanbetrackedbythirdpartiestodeterminewhotheyareandwhattheyaredoing(bothonlineandoff).13
Indeed,eventheactivitieswetakethatarenotdigitized—suchasrefusingtojoinaspecificsocialmedianetwork—canrevealunintended,personalinformationthatmostwouldnotintuitivelythinkofasdigital.Researchershaveproven,forexample,thattheycaninferwhoanindividuals’friends,family,andprofessionalcontactsarebasedonthe
socialmediaactivitiesofthosearoundthem—evenwhenanindividualexplicitlyrefrains
“Asdigitalactivitiesbecomemoreimportant,andasdatacollectionbecomesincreasinglypervasive,theonce-brightlinebetweendigitalandphysicalnolongerexists.”
fromtakingpartinanyonespecificplatform.14
Allofwhich,inturn,meansthatthereisnosuchthingasthepurely“digital”worldinpractice.Asdigitalactivitiesbecomemoreimportant,andasdatacollectionbecomesincreasinglypervasive,theonce-brightlinebetweendigitalandphysicalnolongerexists.15Itismoreandmorecommon,forexample,forcyberattacksthemselvesto
createdirectphysicalrepercussions,aswhenaransomwareattackonahospitalallegedlyledtoapatient’sdeath,16orwhentheNotPetyawipercollapsedglobalsupplychains17—thelistislongandgrowingfast.
Itnolongermakesanysense,inotherwords,tothinkthatsimplybecausethedangersofsoftwareareembeddedincode,thatsuchdangersaresomehowlessconsequential.Toimaginethatwecanstillseparatethedigitalfromthephysicalistoignorethemostinconvenienttruth.
Malthus’sGrandLesson
Overtwocenturiesago,aneconomistandclericnamedJohnMalthuspredictedthatthehumanracewouldsoongrowtoasizethatwasunsustainable—thatwehumanswouldceasetobeabletofeedourselvesgivenexistingenvironmentalconstraintsand
CenterforSecurityandEmergingTechnology|7
922oc!9本eqcLob入!elq2.n2!u?qeebl入cou^!uc!u?9L?n山eu本2,n9l本pn22poMeqpoM本pepn山9ubobnl9本!ou?LoM2exboueu本!9ll入o^eL本!山eMp!leeu^!Lou山eu本9lLe2onLce2?LoMl!ue9Ll入.luo本peLMoLq2,pn?eboL本!ou2o:pn山9u!本入MeLeqe2本!ueq:oL山9luonL!2p山eu本,
:9山!ue,9uqnl本!山9本eex本!uc本!ou.
Mp9本n9l本pn2q!quo本卜uoMM92本p9本本ecpuolo?入MonlqbLe^eu本p!29boc9l入b本!cbLeq!c本!ou2:Lo山co山!u?本Lne:本pe2本e9山eu?!ueMonlq山9卜e2nbbl入cp9!u2山oLee::!c!eu本,eu9pl!u?:92本eL山o^e山eu本o:?ooq29cLo22M!qeL9Le92:qe^elob山eu本2!u9?L!cnl本nL9l本ecpu!dne2Monlq!ucLe92e:ooq入!elq2M!本pon本Ledn!L!u?山oLel9uq:
e^eu本n9ll入,:eL本!l!本入本ecpuolo?!e2本pe山2el^e2,2ncp92cou本L9ceb本!^e2,Monlqeu9ple山oLecou2c!eu本!on2:9山!l入bl9uu!u?:oL本po2eMpoconlq9cce22本pe山.
」pe:9c本本p9本n9l本pn2M92MLou?—!uqeeq,poLLeuqon2l入MLou?—M92l9L?el入qne本o本ecpuolo?!e2Mpo2eqe^elob山eu本peM92nu9M9Leo:9uqMpo2e2ncce22peconlquo本:oLe2ee.」p9本q入u9山!cp92?!^euL!2e本o本pe2ecouq,ceu本L9l9L本!cleo::9!本p:oL山o2本!up9p!本9u本2o:本pe!uqn2本L!9l!之eqMoLlq:本p9本本peLe!2uobLople山本p9本本ecpuolo?入c9uuo本:!x./o山9本本eLpoMp!?本pebLople山,本peL!?p本本ecpuolo?入—pn山9u!本入,29p!l!本入本ocollec本!^el入:92p!ouop?ec本2!u本o本ool2—M!ll2ol^e!本,?!^eueuon?p本!山e9uq本pebLobeL
!uceu本!^e2.no本peL/ece22!本入M!llLel!9pl入p!L本p!u^eu本!ou292Ledn!Leq.OL2o2ncp本p!u卜!u??oe2.
」p!29bbLo9cp本o本ecpuolo?入!2ouq!2bl9入e^eL入MpeLe.B!llC9本e2,本pe:onuqeLo:n!cLo2o:本,p922本9本eq本p9本本peoul入M9入本oco山p9本cl!山9本ecp9u?el!e2!uqe^elob!u?
eu本!Lel入ueM“?Leeu”本ecpuolo?!e2.18l本nuqeLl!e2本peuoM-co山山oubl9cecl9!山2本p9本9L本!:!c!9l!u本ell!?euceM!ll2ol^epn山9u!本入,2p!??e2本bLople山2,:Lo山c入peL2ecnL!本入本oq!2e92e.luqeeq,!本:oL山2本pe:onuq9本!ou:oL山oqeLuecouo山!c本peoL入,Mp!cp922n山e2cou2本9u本?LoM本p本pLon?pl!山!本le22!uuo^9本!ou—oL,!uo本peLMoLq2,9u!u:!u!本e2edneuceo:ueM本ecpuolo?!e2pe!u?!u^eu本eq本o山ee本onLueeq2.19
V2匕ou9lq匕e9?9uouceexbLe22eq!本:“」peLe9Leuo?Le9本l!山!本2本o?LoM本ppec9n2e本peLe9Leuol!山!本2o:pn山9u!u本ell!?euce,!山9?!u9本!ou,9uqMouqeL.”
」oMp!cpMeL9!2e本peop^!on2dne2本!ou:Mp9本!:本pe2e922n山b本!ou29LeMLou?s
Mp9本!:本peLe!29bo!u本—9pLe9卜!u?bo!u本—MpeLe本pebLople山2Me:9cec9uuo本pe2ol^eqp入ueM本ecpuolo?!e2sVuq,:nL本peL山oLe,!:本p!2!29bo22!p!l!本入,poMMonlqMe卜uoMMpeuMeMeLeue9L!u?本p9本bo!u本o:!u:lec本!ous
2本9本eq山oLepLo9ql入,本p!2922n山b本!oup92leqn2本o9MoLlq!uMp!cp本ecpuolo?入2ol^e2ouebLople山,oul入本ocLe9本e9uo本peL,本oMp!cpMe9bbl入9ueM本ecpuolo?!c9l:!x,9q
Ceu本eL:oL2ecnL!本入9uqE山eL?!u?」ecpuolo?入l8
infinitum.Iftechnologybrokeit,inotherwords,thenmoretechnologymustbeabletofixit,whateveritwasthatwasbrokenandwhatevertheresourcesrequired.20
Thereare,however,someproblemsthatsimplycannotbesolvedbynewtoolsortechnologies.21Toreaderswhomightobjecttothistruth,wehaveonlyoneresponse:welcometoreality.Youmaynotlikeitslimitationsoritsdictates,butyourfeelingsarebesidethepoint.
LimitlessGrowth,LimitlessInnovation
Anexpectationoflimitlessgrowthassumeslimitlessinnovation—thatis,innovationdrivingpositivefeedbackloopswithinitself.Shouldyourdesirebelimitlessgrowththendebatinglimitstogrowthisfutile;limitswouldonlyharmtheoverallaimofgrowth.
Fromthisstandpoint,onemightsaythatwefaceabinarychoicebetweenfree-running,limitlessinnovationontheonehandandenforcedstasisontheother.22Anyconstraintplacedoninnovationwilltoywiththosepositivefeedbackloops.Wewillneverknowwhatmighthavebeenhadwenotheldback.
Let’sstartwithsomeexamplesofthisapproachtoillustrateourpoint.HereishowJeffBezos,amongthemostinfluentialvoicesinthetechnologyindustry,viewstheproblemoflimitlessinnovation:
Earthisfinite,andenergyusagehasgrownsomuchthatitwillsoon...straintheresourcesofoursmallplanet.Thatwillleaveuswithachoice:acceptstaticgrowthforhumanityorexploreandexpandtoplacesbeyondEarth.23
Bezos’argumentpositsabinarychoice:embracelimitlessgrowthand,therefore,theneedtoconquertheuniverse,orconstraingrowthandtherebyconserveourenvironment.(Iftheformersoundsliketheoutlookofanalienspeciesbentonconsumingtheuniverse’snaturalresourceswithoutend,everythinginlifeisamatterofperspective.24)
Itisworth,ofcourse,statingthatthisoutlookisaboutmuchmorethanspacetravel—yes,ittouchesontraditionalenvironmentalconcerns,butalsodeeplytechnologicalonesaswell.Theideaofa“carryingcapacity”isrelevantnotonlytohumankind’sextractiveinteractionwithafiniteplanet,butisalsoageneralinferenceabouthowmuchperturbationanecosystemcanendurewithoutanextinctionevent.
Indeed,thereisadirectlinkbetweentheeconomicassumptionsdemandingendlessgrowthandthespecifictechnologiesthatshapethedigitalworld.Oneofthemain
CenterforSecurityandEmergingTechnology|9
economicmodelsshapingventurecapitalists’approachtonewtechnologies,forexample,isexplicitlyfocusedontheabilityofnewinventionstobemonetizedandpumpedintoanever-expandingmarket.25Theveryideaofan“informationeconomy”wasinspiredbythisapproachtonewtechnologies.26
Thesameassumptionsfamouslyholdtrueforphysicalhardware,notjustsoftware.Moore’sLawlongdefinedthecomputingindustry’sexpectationsfortransistors,thatthedensityoftransistorsonamicrochipdoubleseverytwoyears.Thishas,moreorless,heldtrueforthelastfivedecades,andisbasedontheassumptionthatgrowth—andinthiscase,microchipinnovation—canandwillcontinue.27
Itmayseemobvious,buttheseassumptionsdriveeverythingfromthe$200billioninvestedinearly-stagestartupslastyear,tothe932billionmicrochipsmanufacturedin2020.28Withoutendlessgrowth,therewouldbealimit—atleastintheory—totheproductionofbothdigitalandphysicalgoods.
Indeed,changethroughinnovationhasbecomenotjustthemantraofthedissatisfied,butthecoresourceoftheadhesionbetweeninvestorsandtechnologists.Fastchangeiswhatbirthsfirstmoveradvantage.Fastchangepromisestoleveltheplayingfieldbetweenincumbentsandupstarts.29Fastchangeisparanoia-inducing.30Fastchangemakesshort-termthinkingtheonlywaytofly.31
Thetechnologytreadmillisperpetual,andwearetokeeprunningonit,allofus,lestwefallover.CuetheRedQueen.32
Andnowwefocusonrisk:attemptingtomakesafe,orevenunderstand,acodebase,asetofhardwarecomponents,oranyenvironmentismadedifficultinproportiontoitsrateofchange.33Ifthatenvironmentisconstantlyandrapidlyexpanding,itscomplexity
andinterdependencieseverincreasing,thenmanagingsuchrisksbecomesasymptotically
“Bynow,itshouldbeclearthattheproblemisenvironmentalinthatterm’sbroadestsense.”
impossible—rebuildingthelandinggearwhileinflight,sotospeak.34Sure,wecanmakeprogressaroundtheedges,butthegameofriskmanagementislostbydefinitionbeforeitevenbegins.
Bynow,itshouldbeclearthattheproblemisenvironmentalinthatterm’sbroadestsense:wecannotprotectasetofresourceswedonotunderstand,whosecomplexitysurpriseseventhemostwell-resourcedactors,whoseinterdependenciesarediscoveredonlywhendeployed,andwhoseindividualcriticalityisduenottodesignbutrathertothesimplecalculusofmassadoption.We
CenterforSecurityandEmergingTechnology|10
are,inaveryprofoundsense,unsafeforaslongasweliveinanenvironmentthatwecannotquantifiablysecure.Andifweareunsafenow,ourinsecurityisdestinedtogrowwitheachincrementofcomplexity.35
Weareaddicts,allofus,adoptingevermoretechnologiesthatcannotsaveusfromthedangerstheycreate.Itisourarticlesoffaith,eachoneofthem,thathaveleftusinanenvironmentwecannotcontrol,littlelesshopetosecure.
2.WhattoDo?
Aretherealternativestolimitlessgrowth?Doesthebinarychoicebetweenstasisandinnovationprecludeathirdway?
Wehavedeep,itseems,andseriousproblemsintheworldoftechnology.Forreaderswhohavemadeitthisfarinthisessay,thatmuchisclear.Thequestion,then,ishowtheassumptionswedescribeabovecombinetocreatetherisksthatarejeopardizingourenvironment.Moretothepoint,whatarewetodoaboutthemoncediscovered?
Butfirst,twodisclaimers:Tobeginwith,therecommendationswemakeinthissectionarenationalinflavor—whileallenvironmentalthreatsareglobal,allpoliticsare,astheysay,local,whichformsthereasoningbehindourfocusontheUnitedStates.Weareundernoillusion,however,aboutthescaleandscopeoftheproblemswedescribe.Forthatreason,itisworthemphasizingthatthesolutionstotheseissuesmustbeglobalinthefullestsense.
Justastheglobalenvironmentdoesnotdistinguishbetweenjurisdictionalboundaries,digitalthreatscutacross,andinmanywaystranscend,nationalboundariesaswell.
Second,theproblemswedescribe—ourassumptionsaboutlimitlessgrowth,ourincreasinglymistakendistinctionbetweenphysicalanddigital,ourunwaveringbeliefinthepowerofnewtechnologiestoameliorateourwoes—cannotbesolvedbyfocusingondigitalproblemsalone.Thesesameissuesarealsodeeplyintertwinedwithbroaderassumptionsabouteconomicgrowthandsocietaldevelopment.36Indeed,theideaoflimitlessinnovationfueledbylimitlessresourceextraction,leavinglong-termenvironmentalexternalitiesunaddressed,isoneoftheorganizingprinciplesofmodernsociety.Ifwearetotrulycoursecorrect,then,thesebroaderissuesmustalsobeconfronted.
Thatsaid,however,weleavethelargerworkofquestioningtheseculturalassumptionstoothers—andnotjustforconvenience’ssake.Wefocushereinthispaper,andintheremainingsections,onwhatweknowbest:digitaltechnologyanditsshortcomings.37
CenterforSecurityandEmergingTechnology|11
WhatReallyAilsUs?
Atthispoint,itisworthremindingreadersthatwearebothtechnologists.Technologycanbe,andveryoftenis,agoodthing—improvingthewaywecommunicate,accessandprocessinformationandthelike.Thereismuchtobeoptimisticabout;thisoptimismexplainswhythetwoofushavededicatedmuchofourlivestodigitaltechnologies.
Theproblemhaslesstodowithdigitaltechnologiesthemselvesthanitdoeswiththeirrelationtothebroaderenvironmentandthearticlesoffaith,outlinedabove,whichshapethatenvironment.Indeed,thefundamentalissueathandishowtheassumptionswedescribedinSection1distributerisksacrossactors,applications,anddevices.
Digitaltechnologyischeaptocreateandcostlytocleanup.Thisleadsustoaworldinwhichanewdeviceisalwaysworthmorethanarefurbishedone;wherenew,backwardincompatiblesoftwareisincentivizedoverimprovingexistingcode;whereAI,churningoutendlesspredictionsfromagrowingbodyofdata,isviewedasinherentlymorevaluablethanstaticlogicevenifappliedtothesameproblemsbecauseitisnewertech.Iftechnologyisgoodandlimitlessgrowthisthegoal,thenewwilltrumptheoldeverytime.38
Thelong-termimplicationstotheenvironmentdonotstandachanceagainsttheshort-termworshipofthenew.Engineershavelonghadthisdictum:“Fast,cheap,reliable—choosetwo.”
Arecastingofthisdictumseemsnowtobeinorder.
Indeed,therisksofevermoreandevernewerareall-too-frequentlydispersedtothoseoutsideofanyshort-termtransaction.Itisnotthesoftwaremakerorthesoftwarepurchaserwhoneedtoworryaboutend-of-lifeissuesformuchofthecodethatisused.Bythetimeaproblememerges,themakerandthebuyerwillhavemovedontonewerthings,selling,forexample,theirapplicationtoabiggercompany(inthecaseofthevendor)ordisposingoforgivingawaythedeviceitself(inthecaseoftheconsumer).
Instead,vulnerabilitiesinthecodeorartifactbecomeabsorbedbythebroaderdigitalecosystem,likemicroplasticswashingintotheocean.The“environment”isexpectedtodealwiththeexternalitiesofthetransactionatnocosttotheimmediateparties.Thisisthemoralhazardofthedigitalworld,explainingwhyahugepercentageofdatabreachesarecausedbythirdpartyvulnerabilities.39
CenterforSecurityandEmergingTechnology|12
Thistypeofinterdependenceformstherootofsystemicrisks.
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2024二建《管理》口袋書
- 一年級數(shù)學(xué)第一學(xué)期滬教版- 期末試卷 2
- 2024-2025學(xué)年初中同步測控優(yōu)化設(shè)計物理八年級下冊配人教版第7章 第1節(jié) 力含答案
- 西京學(xué)院《語文教學(xué)理論與實踐》2021-2022學(xué)年第一學(xué)期期末試卷
- 西京學(xué)院《數(shù)字化環(huán)境及數(shù)字化建筑表現(xiàn)》2022-2023學(xué)年第一學(xué)期期末試卷
- 英語埃及艷后
- 西京學(xué)院《監(jiān)理概論》2022-2023學(xué)年第一學(xué)期期末試卷
- 西京學(xué)院《廣告攝影與攝像》2021-2022學(xué)年第一學(xué)期期末試卷
- 西京學(xué)院《翻譯工作坊》2023-2024學(xué)年第一學(xué)期期末試卷
- 老王課件湘教版
- 城鄉(xiāng)生活污水處理環(huán)境影響與風險評估
- KOL合作合同(可直接使用)
- GB 26920-2024商用制冷器具能效限定值及能效等級
- 廠房租賃合同范本版(18篇)
- DB22T 5165-2024 建設(shè)工程消防驗收現(xiàn)場評定標準
- 浙江省嵊州市三界片2024-2025學(xué)年七年級上學(xué)期期中科學(xué)測試卷
- 2024年度鄉(xiāng)村醫(yī)生資格考試專業(yè)基礎(chǔ)知識考試題庫及答案(共500套)
- 專題15:現(xiàn)代文閱讀(小說)-2024年中考語文一輪復(fù)習(xí)綜合強化訓(xùn)練解析版
- 能源中國學(xué)習(xí)通超星期末考試答案章節(jié)答案2024年
- 2024廣東省云浮市郁南縣財政局工程造價類專業(yè)人員招聘4人高頻難、易錯點500題模擬試題附帶答案詳解
- 軍隊文職考試《公共科目》試題及答案指導(dǎo)(2024年)
評論
0/150
提交評論