SlideShare a Scribd company logo
1 of 10
CYBER
1948 Norbert Weiner coins the term cybernetics: The control of complex systems in the animal world and in mechanical networks; in particular self-regulating control systems Cybernetics or Control and Communication in the Animal and the Machine (MIT Press, 1948).
1960 The cyborgwas born: Medicalresearch into surgically or mechanically augmenting humans or animals Then zeitgeisty talk of cybernation & cybernocracy to describe the encroach of computers into administrative affairs
Sci-fi gave birth to cyberspace (and cyberpunk) 1982
Late 90s By the time of the dot-com boom and the Millennium Bug, cyber has become a media fad: Cybersex Cybercafes Douglas Rushkoff& cyberculture
2010 Today the head of GCHQ Iain Lobbensaid: “I, as a national security official, am giving a speech about cyber” [sic] "Cyberspace is contested every day, every hour, every minute, every second. I can vouch for that from the displays in our own operations centre of minute-by-minute cyberattemptsto penetrate systems around the world."
Iain Lobben: "There is an opportunity which we can seize if government and the telecommunications sector, hardware and software vendors, and managed service providers can come together. "It's an opportunity to develop a holistic approach to cyber security that makes UK networks intrinsically resilient in the face of cyber threats. Cyber threat Cyber attack Cyber terrorism Cyber strategy Stuxnet worm heralds new era of cyberwar The biggest threat was from "state actors," said Lord West, but the threat from terrorists was also growing and he warned that future targets could include key businesses, the national power grid, financial markets and Whitehall departments. Lib Dem home affairs spokesman Tom Brake: "The cyber security strategy uses broad, undefined terms that risk creating panic among the public and a demand for further government powers.”
The history of the word CYBER
We can only think using language. Words have histories. Meaning is defined by use. Does this mean the higher ranks of the military are thinking about their own technology through the lens of science fiction?
(We already know they’re reading post-structuralist social theory...)

More Related Content

Similar to CYBER

Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
 
Cyber security
Cyber securityCyber security
Cyber securitysafeedu
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsDr David Probert
 

Similar to CYBER (20)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Malwares
MalwaresMalwares
Malwares
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and CybersecurityMetanomics: Federal Interest in Virtual Worlds and Cybersecurity
Metanomics: Federal Interest in Virtual Worlds and Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Cyber War
Cyber WarCyber War
Cyber War
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Cyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future TrendsCyber-Pandemic: Current Reality & Future Trends
Cyber-Pandemic: Current Reality & Future Trends
 

CYBER

  • 2. 1948 Norbert Weiner coins the term cybernetics: The control of complex systems in the animal world and in mechanical networks; in particular self-regulating control systems Cybernetics or Control and Communication in the Animal and the Machine (MIT Press, 1948).
  • 3. 1960 The cyborgwas born: Medicalresearch into surgically or mechanically augmenting humans or animals Then zeitgeisty talk of cybernation & cybernocracy to describe the encroach of computers into administrative affairs
  • 4. Sci-fi gave birth to cyberspace (and cyberpunk) 1982
  • 5. Late 90s By the time of the dot-com boom and the Millennium Bug, cyber has become a media fad: Cybersex Cybercafes Douglas Rushkoff& cyberculture
  • 6. 2010 Today the head of GCHQ Iain Lobbensaid: “I, as a national security official, am giving a speech about cyber” [sic] "Cyberspace is contested every day, every hour, every minute, every second. I can vouch for that from the displays in our own operations centre of minute-by-minute cyberattemptsto penetrate systems around the world."
  • 7. Iain Lobben: "There is an opportunity which we can seize if government and the telecommunications sector, hardware and software vendors, and managed service providers can come together. "It's an opportunity to develop a holistic approach to cyber security that makes UK networks intrinsically resilient in the face of cyber threats. Cyber threat Cyber attack Cyber terrorism Cyber strategy Stuxnet worm heralds new era of cyberwar The biggest threat was from "state actors," said Lord West, but the threat from terrorists was also growing and he warned that future targets could include key businesses, the national power grid, financial markets and Whitehall departments. Lib Dem home affairs spokesman Tom Brake: "The cyber security strategy uses broad, undefined terms that risk creating panic among the public and a demand for further government powers.”
  • 8. The history of the word CYBER
  • 9. We can only think using language. Words have histories. Meaning is defined by use. Does this mean the higher ranks of the military are thinking about their own technology through the lens of science fiction?
  • 10. (We already know they’re reading post-structuralist social theory...)