<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-9079742631670078384</id><updated>2026-03-29T20:48:09.596-07:00</updated><category term="cyber security"/><category term="information security"/><category term="risk"/><category term="framework"/><category term="presentations"/><category term="uncertainty"/><category term="other"/><category term="PhD work"/><category term="data analysis"/><category term="innovation"/><category term="black swans"/><category term="journals and conferences"/><category term="metrics"/><category term="probability"/><category term="surprise"/><category term="complexity"/><category term="simulation"/><category term="visualization"/><category term="statistics"/><category term="humor"/><category term="personal"/><category term="philosophy"/><category term="tools"/><category term="tutorial"/><category term="game theory"/><category term="sociology"/><category term="possibility space"/><category term="scientific method"/><category term="war chariots"/><category term="cyber insurance"/><category term="data science"/><category term="resources"/><category term="finance"/><category term="implementation"/><category term="management"/><category term="practices"/><category term="quotes"/><category term="data breach"/><category term="open access"/><category term="privacy"/><category term="social network analysis"/><category term="valuation"/><title type='text'>Exploring Possibility Space</title><subtitle type='html'>Musings on risk, innovation, data science &amp;amp; my PhD dissertation</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>129</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-1748403702244701317</id><published>2020-05-06T00:07:00.000-07:00</published><updated>2020-05-06T01:16:45.949-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="black swans"/><category scheme="http://www.blogger.com/atom/ns#" term="complexity"/><category scheme="http://www.blogger.com/atom/ns#" term="presentations"/><category scheme="http://www.blogger.com/atom/ns#" term="uncertainty"/><title type='text'>Look Papa! I&#39;m on the Loopcast! -- Talking complexity, simulation, black swans, randomness, resilience, and institutional innovation</title><content type='html'>If you have a spare 1 hr 40 min. *, you might want to listen my interview on the &lt;a href=&quot;http://www.theloopcast.com/&quot; target=&quot;_blank&quot;&gt;&quot;Loopcast&quot; podcast&lt;/a&gt; (below).&amp;nbsp; The host is Sina Kashefipour (&lt;a href=&quot;https://twitter.com/rejectionking?lang=en&quot; target=&quot;_blank&quot;&gt;@rejectionking&lt;/a&gt; on Twitter).&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;
&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;* Personally, I think I sound better at 1.5X speed, but then again I listen to most podcasts at 1.5X speed. &lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;&quot; height=&quot;440&quot; id=&quot;multi_iframe&quot; scrolling=&quot;no&quot; src=&quot;https://www.podbean.com/media/player/multi?playlist=http%3A%2F%2Fplaylist.podbean.com%2F586469%2Fplaylist_multi.xml&amp;amp;vjs=1&amp;amp;size=240&amp;amp;share=1&amp;amp;fonts=Helvetica&amp;amp;auto=0&amp;amp;download=1&amp;amp;skin=1&quot; style=&quot;border: none;&quot; title=&quot;The Loopcast&quot; width=&quot;100%&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;
&lt;br /&gt;
In this podcast, I reference the following websites and resources:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.santafe.edu/&quot; target=&quot;_blank&quot;&gt;Santa Fe Institute&lt;/a&gt; -- birthplace of Complexity Science.&amp;nbsp; &lt;a href=&quot;https://www.youtube.com/user/santafeinst&quot; target=&quot;_blank&quot;&gt;SFI on YouTube&lt;/a&gt;, and &lt;a href=&quot;https://complexity.simplecast.com/&quot; target=&quot;_blank&quot;&gt;&quot;Complexity&quot; podcast&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.complexityexplorer.org/&quot;&gt;Complexity Explorer&lt;/a&gt; -- coursework and resources for the study of complex systems,&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://ccl.northwestern.edu/netlogo/&quot;&gt;NetLogo&lt;/a&gt; -- a free and open source platform for agent-based modeling and dynamical systems.&lt;/li&gt;
&lt;li&gt;&lt;i&gt;&lt;a href=&quot;https://www.amazon.com/gp/product/0387969454/ref=dbs_a_def_rwt_bibl_vppi_i4&quot; target=&quot;_blank&quot;&gt;Ignorance and Uncertainty&lt;/a&gt;&lt;/i&gt;&amp;nbsp; -- book by Michael Smithson, out-of-print but available used&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.amazon.com/gp/product/B0081YPPBQ/ref=dbs_a_def_rwt_bibl_vppi_i1&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;Uncertainty and Risk: Multidisciplinary Perspectives&lt;/i&gt;&lt;/a&gt; -- editors  Gabriele Bammer and Michael Smithson&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
&lt;i&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/h4&gt;
&lt;h4&gt;
&lt;i&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;CORRECTION&lt;/span&gt;&lt;/i&gt;&lt;/h4&gt;
In the podcast, at 1: 09:00, I used the phrase &quot;...30 sigma event...&quot; and then went on to define the Greek character &quot;sigma&quot; &lt;i&gt;σ&lt;/i&gt;&amp;nbsp; &lt;span class=&quot;mwe-math-element&quot;&gt;&lt;span class=&quot;mwe-math-mathml-inline mwe-math-mathml-a11y&quot; style=&quot;display: none;&quot;&gt;
&lt;/span&gt;&lt;/span&gt; as the symbol used for &quot;variance&quot; in Statistics.&amp;nbsp; That is incorrect.&lt;br /&gt;
&lt;br /&gt;
Instead, &quot;sigma&quot; &lt;i&gt;σ&lt;/i&gt; is &quot;standard deviation&quot;, and &quot;variance&quot; is the square of standard deviation, or &lt;i&gt;σ&lt;/i&gt;&lt;sup&gt;2&lt;/sup&gt; &lt;span class=&quot;mwe-math-element&quot;&gt;&lt;span class=&quot;mwe-math-mathml-inline mwe-math-mathml-a11y&quot; style=&quot;display: none;&quot;&gt;&lt;math xmlns=&quot;http://www.w3.org/1998/Math/MathML&quot;&gt;
  &lt;semantics&gt;
    &lt;mrow&gt;
      &lt;mstyle displaystyle=&quot;true&quot; scriptlevel=&quot;0&quot;&gt;
        &lt;msup&gt;
          &lt;mi&gt;σ&lt;/mi&gt;
          &lt;mrow&gt;
            &lt;mn&gt;2&lt;/mn&gt;
          &lt;/mrow&gt;
        &lt;/msup&gt;
      &lt;/mstyle&gt;
    &lt;/mrow&gt;
    &lt;annotation encoding=&quot;application/x-tex&quot;&gt;{\displaystyle \sigma ^{2}}&lt;/annotation&gt;&amp;nbsp;&lt;/semantics&gt;&lt;/math&gt;&lt;/span&gt;.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;mwe-math-element&quot;&gt;Also I made some errors on &quot;one sigma&quot;, &quot;two sigma&quot;, &quot;three sigma&quot; &lt;/span&gt;&lt;span class=&quot;mwe-math-element&quot;&gt;&lt;span class=&quot;mwe-math-element&quot;&gt;for a Normal distribution&lt;/span&gt;.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;mwe-math-element&quot;&gt;Instead, it should be the &quot;&lt;a href=&quot;https://en.wikipedia.org/wiki/68%E2%80%9395%E2%80%9399.7_rule&quot; target=&quot;_blank&quot;&gt;68–95–99.7 rule&lt;/a&gt;&quot;:&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;+/− one standard deviation (&quot;one sigma&quot;) encompasses 68% of the probability mass&lt;/li&gt;
&lt;li&gt;+/− two standard deviations (&quot;two sigma&quot;) encompasses 95% of the probability mass&lt;/li&gt;
&lt;li&gt;+/− three standard deviations (&quot;three sigma&quot;) encompasses 99.7% of the probability mass&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji7ICJnFXKodyUQe7-0hkT_A6uW1EfetA-1r0oyMobweKinZSJ4A8xzx1Jc1nAKeRHSrXy62XVBtLVRMWOi2aMdhgPJ5yK2DUc1CwyWfLs24BtFZ_xmwxWNmBcR4BzpmXUZg6wGzey99w/s1600/1106px-Empirical_rule_histogram.svg.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1096&quot; data-original-width=&quot;1106&quot; height=&quot;396&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji7ICJnFXKodyUQe7-0hkT_A6uW1EfetA-1r0oyMobweKinZSJ4A8xzx1Jc1nAKeRHSrXy62XVBtLVRMWOi2aMdhgPJ5yK2DUc1CwyWfLs24BtFZ_xmwxWNmBcR4BzpmXUZg6wGzey99w/s400/1106px-Empirical_rule_histogram.svg.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/1748403702244701317/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/05/look-papa-im-on-loopcast-talking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/1748403702244701317'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/1748403702244701317'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/05/look-papa-im-on-loopcast-talking.html' title='Look Papa! I&#39;m on the Loopcast! -- Talking complexity, simulation, black swans, randomness, resilience, and institutional innovation'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji7ICJnFXKodyUQe7-0hkT_A6uW1EfetA-1r0oyMobweKinZSJ4A8xzx1Jc1nAKeRHSrXy62XVBtLVRMWOi2aMdhgPJ5yK2DUc1CwyWfLs24BtFZ_xmwxWNmBcR4BzpmXUZg6wGzey99w/s72-c/1106px-Empirical_rule_histogram.svg.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-9045546468051256897</id><published>2020-05-04T19:03:00.000-07:00</published><updated>2020-05-04T19:03:13.258-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber insurance"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="presentations"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><title type='text'>S4x20 Video: Lessons Learned from Norsk Hydro on Loss Estimation and Cyber Insurance</title><content type='html'>I gave a talk at S4X20 in January on the Norsk Hydro ransomware attack.&amp;nbsp; The full video has now been posted on YouTube:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;iframe allow=&quot;accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;https://www.youtube.com/embed/Onxj9hw4muo&quot; width=&quot;560&quot;&gt;&lt;/iframe&gt;

&lt;br /&gt;
&lt;br /&gt;
Like all great presentations, it includes a &lt;i&gt;Seinfeld&lt;/i&gt; reference :-)&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;Image&quot; class=&quot;css-9pa8cd&quot; draggable=&quot;true&quot; height=&quot;221&quot; src=&quot;https://pbs.twimg.com/media/EO0yFxRXsAE-L5V?format=jpg&amp;amp;name=large&quot; width=&quot;400&quot; /&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/9045546468051256897/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/05/s4x20-video-lessons-learned-from-norsk.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/9045546468051256897'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/9045546468051256897'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/05/s4x20-video-lessons-learned-from-norsk.html' title='S4x20 Video: Lessons Learned from Norsk Hydro on Loss Estimation and Cyber Insurance'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/Onxj9hw4muo/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-7391684578073901098</id><published>2020-04-01T16:22:00.001-07:00</published><updated>2020-04-01T16:22:33.991-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="black swans"/><category scheme="http://www.blogger.com/atom/ns#" term="complexity"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><category scheme="http://www.blogger.com/atom/ns#" term="surprise"/><title type='text'>Splattered Swan: Collateral Damage, Friendly Fire, and Mis-fired Mega-systems</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9lKl9j6G8B0baDzDdZSUiSjQT_WY0xENL4CdYiB8iE57qqbMozAUXszj-F1ES8oIZe-CjIEdrIRE49e8NKlT7vFDnVkNYWTrwoiYc0eFFiT3-LAhYvz14_RtlgSf2TYPV8cw4xlz-0Qw/s1600/splattered+swan+small.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;577&quot; data-original-width=&quot;750&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9lKl9j6G8B0baDzDdZSUiSjQT_WY0xENL4CdYiB8iE57qqbMozAUXszj-F1ES8oIZe-CjIEdrIRE49e8NKlT7vFDnVkNYWTrwoiYc0eFFiT3-LAhYvz14_RtlgSf2TYPV8cw4xlz-0Qw/s320/splattered+swan+small.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Like Curly from the &quot;Three Stooges&quot; said, &lt;br /&gt;&quot;I&#39;m a victim of circumstances!&quot;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
There is a type of &quot;...Swan&quot; that is not surprising or extreme in its aggregate effect, but is extremely surprising to a particular entity that was considered to be outside the scope of the main process.&amp;nbsp; A bomb is supposed to kill enemy soldiers, not your own soldiers.&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
I call this type &quot;Splattered Swans&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;color: #222222; font-family: &amp;quot;Times New Roman&amp;quot;, Times, FreeSerif, serif; font-size: 15.399999618530273px; margin: 0px; position: relative;&quot;&gt;
Context: Rethinking &quot;Black Swans&quot;&lt;/h4&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;This post is &lt;i&gt;nineth&lt;/i&gt; in the series &quot;&lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2013/07/think-you-understand-black-swans-think.html&quot; target=&quot;_blank&quot;&gt;Think You Understand Black Swans? Think Again&lt;/a&gt;&quot;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;. &lt;/span&gt;T&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;he &quot;Black Swan event&quot; metaphor is a conceptual mess. &lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;color: #222222; font-family: &amp;quot;Times New Roman&amp;quot;, Times, FreeSerif, serif; font-size: 15.399999618530273px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;Summary: It
 doesn&#39;t make sense to label any set of events as &quot;Black Swans&quot;. &amp;nbsp;It&#39;s 
not the events themselves, but instead they are processes that involve 
generating mechanisms, our evidence about them, and our method of 
reasoning that make them unexpected and surprising.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Definition&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;A &quot;Splattered Swan&quot; is a process where: &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;generating process&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; involves a very powerful force (i.e. penal, constraining, or damaging force) with less than perfect aim.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;evidence&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;
 are official rules, specifications, or scope, or experience that is limited what is intended;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;The &lt;i&gt;method of reasoning&lt;/i&gt;
 are based on the assumption that the aim will be perfect and error-free, or that errors will be &quot;well behaved&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Main Features&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;A Splattered Swan arises when a very powerful system is prone to misfiring in very bad ways, causing damage to some entities that are considered &quot;safe&quot; or &quot;out of bounds&quot; by normal reasoning.&amp;nbsp; That these outcomes are extreme or surprising are basically due to failures to understand the total system and the ways it can fail.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOjPQJSeezp-irmKQ2wXQR4hauR6_kf95teIgGbUZu5LLaAZ3h3jJaPcZwg_6nNuOHSHjlQgxtukPbg8BNgP5aHPmmA1znvzCoHHLL7-oM3Vk9ttw8t2F42PWlodEm7eil8kX1_iCl8s4/s1600/what+could+possibly+go+wrong.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;329&quot; data-original-width=&quot;439&quot; height=&quot;239&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOjPQJSeezp-irmKQ2wXQR4hauR6_kf95teIgGbUZu5LLaAZ3h3jJaPcZwg_6nNuOHSHjlQgxtukPbg8BNgP5aHPmmA1znvzCoHHLL7-oM3Vk9ttw8t2F42PWlodEm7eil8kX1_iCl8s4/s320/what+could+possibly+go+wrong.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Two key features of&amp;nbsp; Splattered Swans are 1) critical error conditions are excluded from reasoning on principle &lt;i&gt;and&lt;/i&gt; 2) those errors are potentially severe, even the first time.&amp;nbsp; A lot of systems adapt by trial and error, but that only works of the magnitude of errors (i.e. aim) is relatively small and the magnitude of collateral damage is also relatively small.&amp;nbsp; Consider airplane bombers from World War II aiming to kill enemy troops that are located near allied troops.&amp;nbsp; Even though they had bomb sights, the bombers were notoriously inaccurate.&amp;nbsp; With ordinary large bombs, the risk of &quot;friendly fire&quot; (i.e. killing your own troops) is high.&amp;nbsp; If the bomber is carrying a single atomic bomb, then the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;risk of &quot;friendly fire&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; becomes extremely high, because you only get one chance to aim and drop and there is no feedback from previous attempts.&amp;nbsp; Plus the damage process is extreme.&amp;nbsp; In the other direction, if there are several bombers, and the first bombers drop flairs instead of bombs, then the cost of error is small and the opportunity of corrective feedback has the potential to dramatically reduce the risk of &quot;friendly fire&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Another important feature of Splattered Swans are the blind spots created by the &quot;official&quot; or &quot;intended&quot; definition of the system of interest.&amp;nbsp; This can lead analysts and decision-makers to never even consider the possibility of collateral damage or unintended consequences.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;One Example&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&quot;Offensive cyber&quot; , a.k.a. &quot;hack back&quot;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; is an example from the domain of cyber security.&amp;nbsp; There are many flavors of offensive cyber, but the most extreme involve damaging the targets, either physically or digitally or both.&amp;nbsp; Such extreme attacks might also be considered acts of war, a.k.a. &quot;cyber war&quot;.&amp;nbsp; Putting aside the ethics or advisability of offensive cyber, there is immense potential for collateral damage.&amp;nbsp; First, it might be hard or impossible to attribute a given attack to the &quot;real&quot;&amp;nbsp; threat agents or groups (a.k.a. &quot;Black Hat&quot;).&amp;nbsp; They might operate through affiliates, mask or disguise their tools and infrastructure, and might even intentionally implicate a different agent or group in the &quot;Indicators of Compromise&quot; and other forensic evidence.&amp;nbsp; Even if you can correctly identify the attacking group, it may be hard to attack them in a way that doesn&#39;t also do harm to socially-important entities or resources (e.g. cloud computing resources, networks, etc.).&amp;nbsp; Finally, in corner-case situations there is also a non-zero potential for self-harm, where an offensive cyber attack backfires on the &quot;White Hat&quot; attacker.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;From a planning and on-going management viewpoint, it is much harder to anticipate and control the side-effects of cyber attacks than it is for physical attacks.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;How to Cope with Splattered Swan&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;It is relatively simple to cope with Splattered Swan systems.&amp;nbsp; Don&#39;t take the &quot;official&quot; or &quot;intended&quot; system as a strict definition of what behavior or outcomes are possible.&amp;nbsp; Use Scenario Planning or &quot;What If?&quot; analysis to look outside the &quot;official&quot; or &quot;intended&quot; to identify potential for collateral damage.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: times new roman, times, freeserif, serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Then look for ways to introduce error-correcting feedback or damage mitigations for the collateral damage.&amp;nbsp; Another good mitigation is to reduce the intensity of the damage/punishment process.&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/7391684578073901098/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/04/splattered-swan-collateral-damage.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7391684578073901098'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7391684578073901098'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/04/splattered-swan-collateral-damage.html' title='Splattered Swan: Collateral Damage, Friendly Fire, and Mis-fired Mega-systems'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9lKl9j6G8B0baDzDdZSUiSjQT_WY0xENL4CdYiB8iE57qqbMozAUXszj-F1ES8oIZe-CjIEdrIRE49e8NKlT7vFDnVkNYWTrwoiYc0eFFiT3-LAhYvz14_RtlgSf2TYPV8cw4xlz-0Qw/s72-c/splattered+swan+small.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-984907363535406501</id><published>2020-04-01T15:31:00.000-07:00</published><updated>2020-04-01T15:31:06.796-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="black swans"/><category scheme="http://www.blogger.com/atom/ns#" term="complexity"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><category scheme="http://www.blogger.com/atom/ns#" term="surprise"/><title type='text'>Swarm-as-Swan: Surprising Emergent Order or Aggregate Action</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwbSxKIV1YBmSqNZNMuY9dRjLgOuCffpLi4ItYhtFimkoNHMBZaGaPE942nyZtjMvAqkfkG0fMdv-b3H2yAOYPplC4ZlqajWlPRJaxmCcsY-Nn6h1eo46MxFPJTtiUHHat2k5PEJ6dSTA/s1600/swarm-swans+on+lake+small.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;504&quot; data-original-width=&quot;750&quot; height=&quot;215&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwbSxKIV1YBmSqNZNMuY9dRjLgOuCffpLi4ItYhtFimkoNHMBZaGaPE942nyZtjMvAqkfkG0fMdv-b3H2yAOYPplC4ZlqajWlPRJaxmCcsY-Nn6h1eo46MxFPJTtiUHHat2k5PEJ6dSTA/s320/swarm-swans+on+lake+small.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;A flock of swans in swan-shaped formation &lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
In complex systems with many interacting elements or agents, most of the time the actions of individual agents &quot;average out&quot; and remain local.&amp;nbsp; In some systems and in some circumstances, surprising aggregate or emergent behavior patterns arise. &lt;br /&gt;
&lt;br /&gt;
Emergence is a common characteristic of such systems.&amp;nbsp; But that alone doesn&#39;t qualify them as a &quot;Swan&quot;.&amp;nbsp; It requires several other factors that could, under the right circumstances, yield very surprising or cataclysmic outcomes.&amp;nbsp; I call this the &quot;Swarm-as Swan&quot;, since swarming behavior (birds, fish, insects) is one well-known type of emergent phenomena, but this category is &lt;i&gt;explicitly&lt;/i&gt; &lt;i&gt;not&lt;/i&gt; limited to swarm phenomena.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;color: #222222; font-family: &amp;quot;Times New Roman&amp;quot;, Times, FreeSerif, serif; font-size: 15.399999618530273px; margin: 0px; position: relative;&quot;&gt;
Context: Rethinking &quot;Black Swans&quot;&lt;/h4&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;This post is &lt;i&gt;eighth&lt;/i&gt; in the series &quot;&lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2013/07/think-you-understand-black-swans-think.html&quot; target=&quot;_blank&quot;&gt;Think You Understand Black Swans? Think Again&lt;/a&gt;&quot;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;. &lt;/span&gt;T&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;he &quot;Black Swan event&quot; metaphor is a conceptual mess. &lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;color: #222222; font-family: &amp;quot;Times New Roman&amp;quot;, Times, FreeSerif, serif; font-size: 15.399999618530273px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;Summary: It
 doesn&#39;t make sense to label any set of events as &quot;Black Swans&quot;. &amp;nbsp;It&#39;s 
not the events themselves, but instead they are processes that involve 
generating mechanisms, our evidence about them, and our method of 
reasoning that make them unexpected and surprising.&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Definition&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;A &quot;Swarm-as-Swan&quot; is a process where: &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;generating process&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; involves a large-scale &lt;a href=&quot;https://en.wikipedia.org/wiki/Complex_adaptive_system&quot; target=&quot;_blank&quot;&gt;Complex Adaptive System&lt;/a&gt; that has regions in the state space where collective and/or emergent phenomena become dominant, leading to collective behavior that is dramatically different from the behavior in the &quot;normal&quot; regions of state space.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;evidence&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;
 are patterns of system behavior and interaction at various scales (individual, group, collective) and especially surprisingly different patterns, including downward causation and varieties of self-organization and information processing;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;The &lt;i&gt;method of reasoning&lt;/i&gt; are mental models of the system, whether formal or informal, sophisticated or common sense, and the implications of those models on what behaviors are &quot;normal&quot; and expected vs. what is surprising.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Main Features&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The field of Complexity Science has grown and blossomed over the last 30 years.&amp;nbsp; &lt;a href=&quot;https://en.wikipedia.org/wiki/Complex_adaptive_system&quot; target=&quot;_blank&quot;&gt;This Wikipedia article&lt;/a&gt; gives a good summary, along with the central theme of Complex Adaptive Systems &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;(CAS)&lt;/span&gt;&lt;/span&gt;.&amp;nbsp; From that article, the common characteristics of CAS:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;i&gt;number of elements&lt;/i&gt; is sufficiently large that conventional descriptions (e.g. a system of differential equations) are not only impractical, but cease to assist in understanding the system. Moreover, the elements interact dynamically, and the interactions can be physical or involve the exchange of information&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Such &lt;i&gt;interactions are rich&lt;/i&gt;, i.e. any element or sub-system in the system is affected by and affects several other elements or sub-systems&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;i&gt;interactions are non-linear&lt;/i&gt;: small changes in inputs, physical interactions or stimuli can cause large effects or very significant changes in outputs&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;i&gt;Interactions are primarily&lt;/i&gt; but not exclusively with &lt;i&gt;immediate neighbors&lt;/i&gt; and the nature of the influence is modulated&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;i&gt;Any interaction can feed back&lt;/i&gt; onto itself directly or after a number of intervening stages. Such feedback can vary in quality. This is known as recurrency&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;i&gt;overall behavior&lt;/i&gt; of the system of elements is &lt;i&gt;not predicted by the behavior of the individual &lt;/i&gt;elements&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Such systems &lt;i&gt;may be open&lt;/i&gt; and it may be difficult or impossible to define system boundaries&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Complex systems operate under &lt;i&gt;far from equilibrium&lt;/i&gt; conditions. There has to be a constant flow of energy to maintain the organization of the system&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Complex systems have a &lt;i&gt;history&lt;/i&gt;. They evolve and their past is co-responsible for their present behavior&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;i&gt;Elements &lt;/i&gt;in the system may be &lt;i&gt;ignorant of the behavior of the system as a whole,&lt;/i&gt; responding only to the information or physical stimuli available to them locally&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;While all CAS are, in principle, capable of emergent behavior, not all are capable of big surprises in behavior that we require for our &quot;...Swans&quot; series.&amp;nbsp; Roughly, there are three levels of emergent phenomena&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;b&gt;Level 1: Emergent behavior&lt;/b&gt; -- behavior of large numbers of individuals becomes interdependent and mutually influencing, far beyond the range of causal and information interaction, including some downward causation where the collective shapes the individuals.&amp;nbsp; Examples: flocks of birds, schools of fish.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;b&gt;Level 2: Emergent functional structures&lt;/b&gt; -- the formation of stable networks of individuals that constitute functional subsystems. &quot;Functional&quot; means they do some work beyond just collective behavior of Level 1. An excellent example is the &quot;glider&quot; phenomena in &lt;a href=&quot;https://en.wikipedia.org/wiki/Conway%27s_Game_of_Life&quot; target=&quot;_blank&quot;&gt;Conway&#39;s Game of Life&lt;/a&gt; (a type of cellular automata).&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG_o8X3WVBgKVCS9vyssGSXVUYq4PwKanlwG7YYjvupEMwydGmOKuGuh6xSlewjFPD4OxEnqFs07bGFPvVx1QOxaREjLkL550_qcyuhbv1dIXS-GxNwFtgbYq1wEnvfpZpQxUkdvVuJvA/s1600/Gospers_glider_gun.gif&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;180&quot; data-original-width=&quot;250&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjG_o8X3WVBgKVCS9vyssGSXVUYq4PwKanlwG7YYjvupEMwydGmOKuGuh6xSlewjFPD4OxEnqFs07bGFPvVx1QOxaREjLkL550_qcyuhbv1dIXS-GxNwFtgbYq1wEnvfpZpQxUkdvVuJvA/s1600/Gospers_glider_gun.gif&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;A single Gosper&#39;s glider gun creating &quot;gliders&quot;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;b&gt;Level 3: Emergence against a model&lt;/b&gt; -- similar to Level 2, but the &quot;stable functional subsystems&quot; have information processing and self-sustaining capabilities (including possibly metabolizing energy and repairing/regenerating structures).&amp;nbsp; In a real sense, Level 3 systems &quot;take on a life of their own&quot;, at least for an extended period.&amp;nbsp; Example: emergent subsystems that function as regulators (e.g. thermostat), communication systems (e.g. encoding, decoding, transmission), pattern matching, optimization, etc.&amp;nbsp; The human immune system has some of these capabilities.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;As you move up these levels, the nature of emergent phenomena changes dramatically, from mildly surprising and interesting at Level 1 up to &quot;HOLY COW&quot; at Level 3.&amp;nbsp;&amp;nbsp; But our understanding of CAS is most at Level 1, some at Level 2, and only a little at Level 3. Put another way, if you create a hundred or thousand different CAS in a computational laboratory, most would only exhibit Level 1 emergent phenomena, a few would exhibit Level 2 emergent behavior, and only a very few, under narrow circumstances, would have Level 3 capabilities.&amp;nbsp; (In his book &lt;a href=&quot;https://en.wikipedia.org/wiki/A_New_Kind_of_Science&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;A New Kind of Science&lt;/i&gt;&lt;/a&gt;, &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Stephen Wolfram &lt;/span&gt;&lt;/span&gt;did exactly this investigation for all simple cellular automata.)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Like all of the &quot;...Swans&quot;, it&#39;s just as important to understand the &lt;i&gt;evidence&lt;/i&gt; that we use to understand these systems (i.e. CAS), and also our &lt;i&gt;methods of reasoning&lt;/i&gt;. It&#39;s the combination of all three that give rise to the surprising/shocking/extreme behavior that we associate with &quot;...Swans&quot;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The most common &lt;i&gt;evidence&lt;/i&gt; people pay attention two is either individual-based behaviors and interactions and the most common collective behavior patterns and distributions.&amp;nbsp; If the states of the CAS are in &quot;low complexity&quot; regions of the state space (i.e. not in one of the three Levels, above), then people may not even recognize that the CAS is capable of complex emergent phenomena.&amp;nbsp; The reverse is also true.&amp;nbsp; If the CAS is normally in a highly coherent, highly functional state then people may not observe or understand the micro-level behavior that supports that phenomena.&amp;nbsp; The evidence we need most is the location of &quot;&lt;a href=&quot;https://en.wikipedia.org/wiki/Phase_transition&quot; target=&quot;_blank&quot;&gt;phase transitions&lt;/a&gt;&quot; in state space, where the CAS shifts dramatically from one regime to another.&amp;nbsp; Unfortunately for us mortal humans, it&#39;s almost impossible to know in advance where the important phase transitions are in CAS, especially the Level 2 and 3 CAS.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Our &lt;i&gt;methods of reasoning&lt;/i&gt; about CAS fall into three categories: 1) Intuitive (i.e patterns of &quot;normal&quot; behavior with small deviations,
naïve causal models, &quot;folk wisdom&quot;, etc.);&amp;nbsp; 2) Linear Models (i.e. the standard tools of science up to ~1990);&amp;nbsp; 3) Non-linear Models, including Agent-based Modeling.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Methods 1) and 2) are most common, and work well in &quot;normal&quot; circumstances, but are very prone to catastrophic failures of reasoning when the CAS enters a new, unfamiliar regime of emergent behavior.&amp;nbsp; Method 3) is specifically designed to understand CAS in all their complexity, but they aren&#39;t a &quot;magic bullet&quot; that completely eliminate the potentials for surprise or extreme outcomes.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;One huge difference between Method 2) &quot;Linear Models&quot; and Method 3) &quot;Non-linear Models&quot; is that the that &lt;i&gt;Method 3) usually does not&amp;nbsp; yield a forecast or prediction&lt;/i&gt; of system behavior in the same way that Method 2) does.&amp;nbsp; Instead it can help us understand when and why the CAS will change regimes, which is still very useful information to understand potential surprises.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Examples&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;In the previous section I&amp;nbsp; mentioned some illustrative examples. But here I&#39;ll mention two &quot;biggies&quot;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The&amp;nbsp; modern economy has been characterized and studied as a Complex Adaptive System (CAS), especially to understand innovation and crises, especially societal/economic collapse.&amp;nbsp; Some of the first books published by the Santa Fe Institute in the late `80s were titled &quot;The Economy as a Complex Adaptive System&quot;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Mass uprisings and mass revolutions are other classes of phenomena that benefit from study as CAS.&amp;nbsp; I won&#39;t go into detail here, but if you are curious, you might read up on these cases:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Revolutions_of_1848&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Revolutions of 1848&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Gordon_Riots&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The Gordon Riots in London, 1780&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Haitian_Revolution&quot; target=&quot;_blank&quot;&gt;The Haitian Revolution&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;How to Cope with Swarm-as-Swan&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The first step is to recognize that the system you are dealing with has the characteristics of a Complex Adaptive System.&amp;nbsp; Start with &lt;a href=&quot;https://en.wikipedia.org/wiki/Complex_adaptive_system&quot; target=&quot;_blank&quot;&gt;the Wikipedia page&lt;/a&gt;, then read some of the general references listed at the bottom.&amp;nbsp; This will give you the basic knowledge plus some exposure to many types of CAS.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The second step is to characterize the types of emergent behavior and structures that are within the &quot;possibility space&quot; of the CAS.&amp;nbsp; But stay away from &quot;magical thinking&quot; and &quot;conspiracy theories&quot;.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The third step is to apply modeling tools that are appropriate to the complexity of the CAS.&amp;nbsp; Linear models are fine for what they do, but don&#39;t try to use them to identify &quot;phase transitions&quot; from simple to complex behavior, etc.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;If you aren&#39;t mathematically inclined or are not comfortable programming your own Agent-based Models (ABM), you can at least read books and papers that utilize these models and learn from the pros who built them and analyzed them.&amp;nbsp; Even better, you can play with them yourself using the Model Library that comes with &lt;a href=&quot;https://ccl.northwestern.edu/netlogo/&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;NetLogo&lt;/i&gt;&lt;/a&gt; (free and open source).&amp;nbsp; Each model is controlled by sliders and buttons, and comes with documentation that guides you how to use it, how to interpret it, and how to explore it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/984907363535406501/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/04/swarm-as-swan-surprising-emergent-order.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/984907363535406501'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/984907363535406501'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/04/swarm-as-swan-surprising-emergent-order.html' title='Swarm-as-Swan: Surprising Emergent Order or Aggregate Action'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwbSxKIV1YBmSqNZNMuY9dRjLgOuCffpLi4ItYhtFimkoNHMBZaGaPE942nyZtjMvAqkfkG0fMdv-b3H2yAOYPplC4ZlqajWlPRJaxmCcsY-Nn6h1eo46MxFPJTtiUHHat2k5PEJ6dSTA/s72-c/swarm-swans+on+lake+small.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-6198109774663414903</id><published>2020-01-21T08:21:00.002-08:00</published><updated>2020-01-21T08:21:13.041-08:00</updated><title type='text'>S4x20 Presentation</title><content type='html'>I am presenting today, January 21, at the &lt;a href=&quot;https://s4xevents.com/&quot; target=&quot;_blank&quot;&gt;S4x20 conference&lt;/a&gt;, 3:30-4pm on the Main Stage.&lt;br /&gt;
&lt;br /&gt;
Here are my &lt;a href=&quot;https://drive.google.com/file/d/1arF-uPElPGmfyLuMh32SK2f968cJUcfQ/view?usp=sharing&quot; target=&quot;_blank&quot;&gt;slides and notes&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
Here is a paper mentioned in the talk that gives details on breach impact estimation:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&amp;nbsp;&lt;a href=&quot;https://www.econinfosec.org/archive/weis2013/papers/ThomasWEIS2013.pdf&quot; target=&quot;_blank&quot;&gt;&quot;How Bad Is It? – A Branching Activity Model to Estimate the Impact of Information Security Breaches&quot;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/6198109774663414903/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/01/s4x20-presentation.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/6198109774663414903'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/6198109774663414903'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2020/01/s4x20-presentation.html' title='S4x20 Presentation'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-8591311009169983306</id><published>2019-11-25T13:57:00.000-08:00</published><updated>2019-11-25T14:00:34.120-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber insurance"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><title type='text'>Talk Like a Cyber Insurance Risk Analyst</title><content type='html'>In a recent class on catastrophe risk modeling, I learned the definition of terms that are common in insurance but not so well understood elsewhere:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Peril&lt;/li&gt;
&lt;li&gt;Exposure&lt;/li&gt;
&lt;li&gt;Hazard&lt;/li&gt;
&lt;li&gt;Ground-up Loss&lt;/li&gt;
&lt;li&gt;Risk&lt;/li&gt;
&lt;/ul&gt;
Read on for definitions, ending with an analogy that, hopefully, ties them all together.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Peril&lt;/h4&gt;
A &#39;peril&#39; is a class of &lt;i&gt;process&lt;/i&gt; in Nature or Society that &lt;i&gt;causes damage and losses&lt;/i&gt;.&amp;nbsp; It&#39;s not just the proximate mechanism (wind, water, fire, cyber breach), but instead the entire causal process.&amp;nbsp; Thus, a hurricane is a different peril from tornado, and both are different from wide-spread &quot;wind events&quot;.&lt;br /&gt;
&lt;br /&gt;
In cyber risk, we might label every loss process as a sub-class of a generic &quot;cyber&quot; peril.&amp;nbsp; You&#39;ll see that frequently in insurance industry publications, presentations, and legal documents.&amp;nbsp;&amp;nbsp; Things get trickier to label sub-types, because it is generally necessary to include threat actors, attack method, loss processes, etc. in the label.&lt;br /&gt;
&lt;br /&gt;
At RMS, the way we handle this is to define &quot;loss processes&quot; that also include some reference to the other elements.&amp;nbsp; Our loss processes include &quot;Data Exfiltration&quot;, &quot;Distributed Denial of Service&quot;, &quot;Contagious Malware/Extortion&quot;, &quot;Cloud Outage&quot;, and &quot;Financial Transaction Theft&quot;.&amp;nbsp; This allows us take a divide-and-conquer to the task of risk modeling.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Exposure&lt;/h4&gt;
&#39;Exposure&#39; is the set of the factors that determine whether a particular &quot;insured entity&quot; (person, building, or organization) will suffer losses in any particular instance of a peril event.&amp;nbsp; For physical perils, &#39;exposure&#39; also includes most of the factors that determine the magnitude of &#39;ground-up loss&#39;, given a loss event.&amp;nbsp; For physical perils, exposure is mostly determined 
by geographic location and other physical characteristics (building 
type, construction, elevation above ground floor in multi-story 
buildings, etc.)&lt;br /&gt;
&lt;br /&gt;
In cyber risk, exposure is more complicated.&amp;nbsp; At a base level, geography and demographic factors (sector, industry, size) do have some influence over whether a given organization will be attacked in a given type of cyber attack, and what magnitude of losses they might experience.&amp;nbsp; But do to both the connectivity cyber space and the relative homogeneity, it&#39;s not impossible for determined threat actors to get from any &quot;Point A&quot; to any other &quot;Point B&quot;.&lt;br /&gt;
&lt;br /&gt;
Furthermore, many factors beyond geography, industry, and size determine the magnitude of losses for a given firm to a given cyber attack, including internal network topology, security and operational practices, and even business architecture.&lt;br /&gt;
&lt;br /&gt;
At RMS we handle this complexity of exposure inside of our risk models for each loss process in what we call &#39;high resolution models&#39;.&amp;nbsp; For example, in the Financial Transaction Theft model for banks (e.g. SWIFT attacks, ATM jackpotting), we developed a high resolution model that includes attack campaign lifecycle, targeting strategy, among many other factors.&amp;nbsp; We then ran used Monte Carlo simulation on high resolution model to generate estimates for exposure at aggregate levels --&amp;nbsp; geography, industry, and size.&lt;br /&gt;
&lt;br /&gt;
In cyber risk, the concept of &#39;exposure&#39; would encompass the security concept of &#39;vulnerability&#39;, but not exactly as information security (InfoSec) specialists use the term.&amp;nbsp; In InfoSec, a &#39;vulnerability&#39; is a specific flaw, weakness, or opportunity for malfunction in some specific software or hardware that can, conceivably, be harnessed by a threat actor to do bad things, directly or indirectly.&amp;nbsp; In other words, InfoSec definition of &#39;vulnerability&#39; focuses on the &lt;i&gt;technical&lt;/i&gt; aspects and functions, and not so much on the operational or business aspects, which is what matters for cyber risk modeling.&amp;nbsp; The InfoSec community has attempted to incorporate the operational and business aspects through scoring systems such as CVSS (Common Vulnerability Scoring System), but experience and research have show it to be not well suited for risk modeling.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Hazard&lt;/h4&gt;
&#39;Hazard&#39; is is the probability that a given insured entity will suffer any loss due to a defined set of perils, in a defined time period.&amp;nbsp; Most often, hazard is estimated for a broad set -- e.g. probability of&amp;nbsp; loss in Florida for residential housing due to hurricane (wind + storm surge + local flooding) in a specified year&#39;s hurricane season. If &quot;Hazard &amp;gt; 0.0&quot; for a given residence, then there is some chance of loss because the given residence is exposed to at least some degree.&lt;br /&gt;
&lt;br /&gt;
&#39;Hazard&#39; functions also contain information about the severity of the peril at each point (wind speed, flood level) but says nothing about the probability that losses will be greater than $0, or even relative loss magnitude.&amp;nbsp; That&#39;s where &#39;exposure&#39; comes in.&lt;br /&gt;
&lt;br /&gt;
&#39;Hazard&#39; can also be estimated for a single event.&amp;nbsp; This is what is being conveyed in the maps of particular hurricanes that show the &quot;cone of uncertainty&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Ground-up Loss&lt;/h4&gt;
&#39;Ground-up loss&#39; is the total dollar amount of losses for a given insurable entity or set of entities, before all insurance payments.&amp;nbsp; It is usually calculated based on legal accounting rules, which may be different from financial reporting rules and tax accounting rules (and, of course, might be different from common sense accounting rules).&lt;br /&gt;
&lt;br /&gt;
In cyber risk, &#39;ground-up loss&#39; is generally any cost directly due to a breach event or campaign that someone has to pay out of pocket or might be recoverable in a lawsuit.&amp;nbsp; This would include costs of PR, forensics, extra legal costs, and loss of intellectual property (usually valued at recovery cost, not market value). But it almost always excludes cost of &quot;technical debt&quot; -- IT and security spending that a firm should have been paying but didn&#39;t, but then had to spend post-breach to bring IT and security up to standard.&lt;br /&gt;
&lt;br /&gt;
Of course, in &#39;ground-up loss&#39; there is the distinction between &#39;first party&#39; (the firm that got attacked) and &#39;third party&#39; (people or firms who experienced losses, but were not directly attacked or responsible for security).&amp;nbsp; For systemically important firms, there may even be losses attributed to &#39;public harm&#39; in the context of class action lawsuits or regulatory action, as a catchall for all externalized costs.&lt;br /&gt;
&lt;br /&gt;
Reputation harm, including brand damage, is tricky territory.&amp;nbsp; While many experts assert that this is the largest category of cost in data exfiltration attacks, I personally would be surprised to see &#39;reputation harm&#39; included in insurance contracts for cyber risk, except maybe if it narrowly defined.&lt;br /&gt;
&lt;br /&gt;
The insurance industry uses &#39;ground-up loss&#39; as a basis their calculations of insurance coverage, deductibles, limits, attachment points, and all the rest.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Risk&lt;/h4&gt;
When used as a noun in the insurance industry, the term &#39;risk&#39; combines all of the above elements:&amp;nbsp; &lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;Risk&lt;/i&gt; (noun)&amp;nbsp; -- an insurable entity (property, person, organization, etc) with associated exposure(s) and hazard(s), for a given a set of perils (usually one, but could be more).&lt;/blockquote&gt;
In contrast, in InfoSec the term &#39;risk&#39; as a noun rarely includes all of these factors and instead can be interpreted as &quot;something bad that might happen, associated with some IT assets, vulnerabilities, threats, etc.&quot;&amp;nbsp; In &lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2013/08/risk-management-out-with-old-in-with-new.html&quot; target=&quot;_blank&quot;&gt;a blog post&lt;/a&gt;, I call these &quot;little &#39;r&#39; risks&#39;, and I propose an alternative &quot;Big &#39;R&#39; risk&quot; which is more compatible with the insurance industry definition.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
An Analogy -- Gambling Casino&lt;/h4&gt;
To help understand this view of risks, think of special kind of gambling casino.&lt;br /&gt;
&lt;br /&gt;
Think of each insurance company as the &quot;House&quot; in a gambling game (e.g. Black Jack).&amp;nbsp; &quot;Nature&quot; is the deck of cards.&amp;nbsp; &quot;Players&quot; are insured entities -- e.g. firms. Every &quot;bet&quot; by Players is a premium payment (lets assume that players can only bet in fixed amounts).&lt;br /&gt;
&lt;br /&gt;
Every time a Player losses a bet, the House pockets the money (premium).&amp;nbsp; Every time the&amp;nbsp; Player wins, the House (insurance company) pays the Player (the insured).&lt;br /&gt;
&lt;br /&gt;
The House aims to make money in the long run by taking in more money than they pay out and -- &lt;i&gt;very important &lt;/i&gt;-- not run out of money in the case of large &quot;winning streaks&quot; by Players.&lt;br /&gt;
&lt;br /&gt;
The key to this analogy is that &lt;i&gt;the House gets to pick and choose what types of bets (a.k.a. &quot;risks&quot;) it will payoff&lt;/i&gt; for any given Player or set of Players.&amp;nbsp; This is how our &quot;Insurance Casino&quot; is different from regular casinos, where every player is offered the same choice of bets and rules (roughly speaking;&amp;nbsp; high rollers get more favorable rules and bets!).&lt;br /&gt;
&lt;br /&gt;
To an insurance company, a &#39;risk&#39; (noun) is a bet they are either willing to cover or not, depending on the needs and priorities of the insurance company itself, as a profit seeking, survival-oriented agent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/8591311009169983306/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/11/talk-like-insurance-risk-analyst.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/8591311009169983306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/8591311009169983306'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/11/talk-like-insurance-risk-analyst.html' title='Talk Like a Cyber Insurance Risk Analyst'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-7608959354882516559</id><published>2019-06-14T20:24:00.001-07:00</published><updated>2019-06-14T20:24:31.319-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="innovation"/><title type='text'>RESET: &quot;Data-driven Security Smashup&quot; will launch in Fall 2019</title><content type='html'>Big change of plans for the &quot;&lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2019/04/announcing-data-driven-security-smashup.html&quot; target=&quot;_blank&quot;&gt;Data-driven Security Smashup&lt;/a&gt;&quot;:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;b&gt;We are canceling the live event in Las Vegas, August 3 - 5.&amp;nbsp;&lt;/b&gt;&lt;/blockquote&gt;
Instead, we aim to launch one or more Virtual Smashup projects in the Fall of 2019, followed by one or more live events early in 2020, perhaps one in the US and one in UK.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Why?&lt;/h3&gt;
Basically, we ran out of time as we were trying to organize the event: sponsorship, organizer recruiting and on-boarding, Call for Participation, legal structure, venue. &amp;nbsp;No fault to anyone. &amp;nbsp;We started relatively late, and our standards are high. &amp;nbsp;We didn&#39;t want to just throw it together and risk having things fall apart during the event.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Benefits&lt;/h3&gt;
This new schedule gives us time to do it right, starting with the basics. &amp;nbsp;For example, we will secure a &quot;&lt;a href=&quot;http://www.fiscalsponsorship.com/images/WCTEO_Gregory-Colvin.pdf&quot; target=&quot;_blank&quot;&gt;fiscal sponsorship&lt;/a&gt;&quot; relationship so we have the legal, financial, and operational infrastructure to take donations, manage risk, and to spend money responsibly.&lt;br /&gt;
&lt;br /&gt;
Another &quot;basic&quot; that needs attention is contact and relationship management for all the people who have expressed interest, asked questions, or need responses. &amp;nbsp;This includes a dedicated website instead of this blog.&lt;br /&gt;
&lt;br /&gt;
The new schedule gives us the lead time to recruit organizers and collaborators in academia, professional associations, industry, independent consultants, and government, both in US and internationally (mostly UK, Europe, Switzerland).&lt;br /&gt;
&lt;br /&gt;
Personally, I&#39;m not disappointed. The core idea is solid. &amp;nbsp;Lots of interest. &amp;nbsp;This change makes some space for some of my other priorities (dissertation!).&lt;br /&gt;
&lt;br /&gt;
Stay tuned!</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/7608959354882516559/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/06/reset-data-driven-security-smashup-will.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7608959354882516559'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7608959354882516559'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/06/reset-data-driven-security-smashup-will.html' title='RESET: &quot;Data-driven Security Smashup&quot; will launch in Fall 2019'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-6237423451397293520</id><published>2019-05-15T18:52:00.002-07:00</published><updated>2019-05-15T18:52:50.248-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="data analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="probability"/><category scheme="http://www.blogger.com/atom/ns#" term="simulation"/><title type='text'>SIRAcon: &quot;Probabilistic models of breach impact – combining theory and empirical data&quot;</title><content type='html'>Here are my&amp;nbsp;&lt;a href=&quot;https://drive.google.com/file/d/1reNuyHahVLdvwFo8SXcbG-zhMErUbGS2/view?usp=sharing&quot; target=&quot;_blank&quot;&gt;slides&lt;/a&gt; from my SIRAcon talk.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s a slide that got a lot of attention. &amp;nbsp;(Humorous, of course)&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLuKeItuSPq_sIJ1KztrZu9rJh-txCSpGkvAZS6CdiI0LdiNgu2a0lxlV9UZNyPjmD-DUZg6PyBQ0e7honpd43TdEp0q4iwZ81q-i9TUzMQQq7VVG8uLu6Mq4fFaGC8zTR0L1BTdhWQTs/s1600/Jay+-+ad+hominem.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;574&quot; data-original-width=&quot;1008&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLuKeItuSPq_sIJ1KztrZu9rJh-txCSpGkvAZS6CdiI0LdiNgu2a0lxlV9UZNyPjmD-DUZg6PyBQ0e7honpd43TdEp0q4iwZ81q-i9TUzMQQq7VVG8uLu6Mq4fFaGC8zTR0L1BTdhWQTs/s400/Jay+-+ad+hominem.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/6237423451397293520/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/05/siracon-probabilistic-models-of-breach.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/6237423451397293520'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/6237423451397293520'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/05/siracon-probabilistic-models-of-breach.html' title='SIRAcon: &quot;Probabilistic models of breach impact – combining theory and empirical data&quot;'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLuKeItuSPq_sIJ1KztrZu9rJh-txCSpGkvAZS6CdiI0LdiNgu2a0lxlV9UZNyPjmD-DUZg6PyBQ0e7honpd43TdEp0q4iwZ81q-i9TUzMQQq7VVG8uLu6Mq4fFaGC8zTR0L1BTdhWQTs/s72-c/Jay+-+ad+hominem.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-6679038210516384306</id><published>2019-04-15T03:00:00.000-07:00</published><updated>2019-06-14T20:27:02.473-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="innovation"/><category scheme="http://www.blogger.com/atom/ns#" term="scientific method"/><title type='text'>Announcing: Data-driven Security Smashup</title><content type='html'>&lt;h2 style=&quot;text-align: center;&quot;&gt;
Data-driven Security Smashup&lt;/h2&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;
A Hackathon + Supercollider of Talent, Ideas, &amp;amp; Resources&lt;/span&gt;&lt;/h3&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Fall 2019&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;strike&gt;Las Vegas, NV; Saturday - Monday August 3-5, 2019&lt;/strike&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;[updated June 14, 2019, see &quot;&lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2019/06/reset-data-driven-security-smashup-will.html&quot;&gt;RESET...&lt;/a&gt;&quot; for more info]&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;strike&gt;&lt;i&gt;Venue&lt;/i&gt;: &lt;span style=&quot;color: #999999;&quot;&gt;rented house*, well off the Strip&amp;nbsp;&lt;/span&gt;Working on it. &amp;nbsp;Aiming for UNLV&lt;/strike&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;strike&gt;&lt;i&gt;Timing&lt;/i&gt;: just before B-Sides LV/Black Hat/Defcon&lt;/strike&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Organizers&lt;/i&gt;: Me, &lt;a href=&quot;https://twitter.com/CxOSidekick&quot; target=&quot;_blank&quot;&gt;Jon Hawkes&lt;/a&gt;, plus 2-6 others to be named (interested? &lt;a href=&quot;https://twitter.com/MrMeritology&quot; target=&quot;_blank&quot;&gt;Contact me&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strike&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;On-site capacity&lt;/i&gt;: &lt;span style=&quot;color: #999999;&quot;&gt;~30&amp;nbsp;&lt;/span&gt;30 - 60&lt;/span&gt;&lt;/strike&gt;&lt;/li&gt;
&lt;li&gt;&lt;strike&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Remote/virtual participation&lt;/i&gt;? Yes. &lt;span style=&quot;color: #999999;&quot;&gt;Details TBD&amp;nbsp;&lt;/span&gt; Also several Satellite locations&lt;/span&gt;&lt;/strike&gt;&lt;/li&gt;
&lt;li&gt;&lt;strike&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Call for Participation&lt;/i&gt;: coming soon, mid May&lt;/span&gt;&lt;/strike&gt;&lt;/li&gt;
&lt;li&gt;&lt;strike&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Call for Sponsorship&lt;/i&gt;:&amp;nbsp;coming soon, mid May&lt;/span&gt;&lt;/strike&gt;&lt;/li&gt;
&lt;li&gt;&lt;strike&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Other locations&lt;/i&gt;: if this first Smashup goes well, we&#39;d like to &#39;step-and-repeat&#39; it soon in the EU, UK, Switzerland, elsewhere in US, and maybe more&lt;/span&gt;&lt;/strike&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #999999;&quot;&gt;&lt;i&gt;Updates and news&lt;/i&gt;: &amp;nbsp;follow &lt;a href=&quot;https://twitter.com/DDS_Smashup&quot; target=&quot;_blank&quot;&gt;@dds_smashup&lt;/a&gt; on Twitter&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;h3&gt;
Summary&lt;/h3&gt;
&lt;div&gt;
The &lt;b&gt;&lt;i&gt;Data-driven Security Smashup&lt;/i&gt;&lt;/b&gt; (DDS Smashup) is a combination of hackathon and ‘supercollider’ of talent, ideas, and resources, aiming for breakthrough innovations in data-driven cyber security, especially solutions to problems that span domains of people, process, technology, institutions, and culture. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3&gt;
Theory of the Case&lt;/h3&gt;
&lt;div&gt;
Why a “Smashup” rather than a conventional hackathon or workshop? &amp;nbsp;Because we think it has a good chance of breaking through the conceptual and cognitive barriers to innovation in data-driven security. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
We aren’t short of creative ideas. &amp;nbsp;More “whacks on the side of the head” won’t make much difference. &amp;nbsp;&lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2019/04/why-is-breakthrough-innovation-in-cyber.html&quot; target=&quot;_blank&quot;&gt;Current and past approaches to innovation have been too simplistic&lt;/a&gt;. We also need something more than just ideas that bridge two different fields or methods. Example: quantitative risk methods and incentives from insurance adapted to security (incl. metrics). &amp;nbsp;People have been whacking away at this innovation for 10 to 15 years, hoping it would be revolutionary. &amp;nbsp;It hasn’t been. &amp;nbsp;Why? Because a revolutionary breakthrough probably requires simultaneous, coupled innovation in three, four, or more fields at the same time, across two or more levels of the socio-technical ecosystem.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This calls for a social invention process that is supercharged to force inventive activity in areas that seem almost impossible, especially from any single field or discipline. &amp;nbsp;That’s why we need a &lt;i&gt;‘supercollider’ of talent, ideas, and resources &lt;/i&gt;like the DDS Smashup.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;
Space of Possibilities&lt;/h3&gt;
&lt;div&gt;
For purposes of discussing scope and interactions, the solutions could include one or more: 1) participatory games (real or virtual world, tabletop), &amp;nbsp;2) software tools, 3) data sets, analytics, or visualization, or 4) frameworks, taxonomy, or ontology. This diagram shows the space of possibilities, along with existing or potential ‘docking projects’ (a.k.a. accelerators). &amp;nbsp;(This is preliminary, and subject to much change.)&lt;/div&gt;
&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp1V5OUI5-HcVP9eIV9d6Oxd596RHzUXDY_FR0G7f8amQIQtRXywr8MBcM3VK6FS0O8u97to5Fu5Uoh-jCX_i0VdjmR46trDDEsUAb2tsmUCmww1taa4WhNipvoIfIbMX19yXvTnTv0r8/s1600/Space+of+Possibilities+DDS+Smashup.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;996&quot; data-original-width=&quot;1600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp1V5OUI5-HcVP9eIV9d6Oxd596RHzUXDY_FR0G7f8amQIQtRXywr8MBcM3VK6FS0O8u97to5Fu5Uoh-jCX_i0VdjmR46trDDEsUAb2tsmUCmww1taa4WhNipvoIfIbMX19yXvTnTv0r8/s640/Space+of+Possibilities+DDS+Smashup.png&quot; width=&quot;580&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;h3&gt;
It’s Like a Hackathon...&lt;/h3&gt;
Hackathons are events where diverse people quickly “hack together” solutions in a concentrated setting (time and place), working in teams of people who they normally wouldn’t work with. &amp;nbsp;Each team will design and build one prototype solution to one specific problem. &amp;nbsp;“design and build” may involve conceptualization (visualization, animation, schematics) and/or realization (building a working prototype in software and/or hardware). &amp;nbsp;Teams then present their completed prototypes to a panel of judges who award prizes to the best designs. &amp;nbsp;Most hackathons are convened in a physical space, but some are virtual. &amp;nbsp;Often there are people who document the process, including live-action video, interviews, etc.&lt;br /&gt;
&lt;br /&gt;
Hackathons mostly embrace “techno-optimism” as a philosophy and value system, with a strong bias toward pragmatic action. The focus is on ‘the art of the possible’, spurred by creativity and improvisation. Teams are free to base their solutions on their prefered value system as long as it is explicit and it is compatible with “techno-optimism”.&lt;br /&gt;
&lt;br /&gt;
Teams own the rights to Intellectual Property they create during a hackathon, and thus could use it as a basis for commercial development afterward. &amp;nbsp;However, there is no presumption or favor for commercialization or proprietary control of IP. &amp;nbsp;IP sharing and open source are often the best path to further development of a prototype.&lt;br /&gt;
&lt;br /&gt;
Hackathons are frequently sponsored by non-profit entities for community benefit, and sometimes by for-profit firms for either community benefit and/or proprietary interest.&lt;br /&gt;
&lt;br /&gt;
The DDS Smashup will be a 3-day on-site and virtual event, hosted and facilitated in a specially designed venue. &amp;nbsp;The first DDS Smashup will be in Las Vegas, NV on Saturday - Monday August 3-5, just before B-Sides Las Vegas. &amp;nbsp;On-site capacity is limited to about 30 people.&lt;br /&gt;
&lt;br /&gt;
Everyone who participates in DDS Smashup will be a “doer” and 100% committed for the duration, including days and evenings. We will recruit a diverse set of highly-qualified people, including people who may not have ever engaged with the information security community.&lt;br /&gt;
&lt;br /&gt;
Hackathons are frequently sponsored by non-profit entities for community benefit, and sometimes by for-profit firms for either community benefit and/or proprietary interest.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
...but Different from a Hackathon&lt;/h3&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
Participation&lt;/h4&gt;
Unlike a regular hackathon where anyone can attend, participation in DDS Smashup will be limited and selective following a diversity-oriented recruitment process. We aim to supercharge the talent pool.&lt;br /&gt;
&lt;br /&gt;
Participants will not be equal in authority and power. There will be a core team of Organizers (about 3 - 5 people) who will “run the show” -- doing all the organizing and preparation, making major decisions, orchestrating and facilitating, vetting and selecting participants, etc. &lt;br /&gt;
&lt;br /&gt;
The other 25 on-site participants will be selected based on what they can contribute to the event, including:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Commitment to and zeal for data-driven security innovation&lt;/li&gt;
&lt;li&gt;Relevant ideas, approaches, tools, or methods (see Scope diagram)&lt;/li&gt;
&lt;li&gt;Relevant talents, skills, and expertise&lt;/li&gt;
&lt;li&gt;Diverse and divergent perspectives and experiences, especially “boundary spanning”&lt;/li&gt;
&lt;/ul&gt;
We haven’t set goals or limits on the number of remote participants, or whether we would support remote-only teams. &amp;nbsp;For this first event, our priority is on the on-site participants and process. &amp;nbsp;If we can recruit several organizers who will focus exclusively on managing and facilitating remote participation, then we can be more ambitious.&lt;br /&gt;
&lt;br /&gt;
We will recruit participants from a wide range of communities and aim for a diverse set of participants (gender, age, ethnicity, culture, institutional affiliation, experience-level/seniority, …). &amp;nbsp;That said, nobody will be there solely to represent a group or point of view. &amp;nbsp;Everyone will be there to work, probably to the limits of their capability. &amp;nbsp;We hope to have sponsorship to help cover travel and other expenses for students and other limited income people. Diversity isn’t an end in itself, but instead serves the goal of breakthrough innovation.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Ideation&amp;nbsp;&lt;/h4&gt;
In a normal hackathon, all ideation happens on-site and arises spontaneously from the teams. Pre-work is discouraged. &amp;nbsp;DDS Smashup will be different. We aim to supercharge both the pool of ideas and also energy that can use ideas together.&lt;br /&gt;
&lt;br /&gt;
At the DDS Smashup, teams will mostly work by building on, adapting, to connecting to one or more “docking projects” (a.k.a. accelerators) (see “Space of Possibilities” diagram, above). &amp;nbsp;We won’t stop anyone who passionately wants to work from scratch, but they will be at a disadvantage in terms of getting something done in three days and also recruiting support for follow-on projects.&lt;br /&gt;
&lt;br /&gt;
These “docking projects” have been developed, developed to some degree, tested and sometimes applied to practice. &amp;nbsp;While they could all be improved in the usual sense, the biggest potential for innovation is to extend design and development in completely new directions, perhaps connecting several docking projects together.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Teams&lt;/h4&gt;
In normal hackathons, teams are self-organized when the event starts, possibly by joining people who pitch ideas. DDS Smashup will be different.&lt;br /&gt;
&lt;br /&gt;
Due to capacity limitations (30 people on-site, and maybe 30 to 100 virtually), we will probably limit the number of teams to 6. &amp;nbsp;We will probably have most of the teams identified and partially formed before the event starts. &amp;nbsp;(This is part of pre-work.) &amp;nbsp;But we won’t lock in team membership until after the event starts.&lt;br /&gt;
&lt;br /&gt;
We will also be flexible about participation on multiple teams, or merger of teams, teams splitting apart, and temporary multi-team collaborations. &amp;nbsp;A huge benefit for having a small venue with relatively small number of participants is we can improvise like crazy this way.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Pre-work&lt;/h4&gt;
In normal hackathons there is no pre-work. It’s often discouraged. DDS Smashup will be different.&lt;br /&gt;
&lt;br /&gt;
All participants will need to do pre-work. &amp;nbsp;We estimate this could be 5 to 30 hours of work over four to six weeks leading up to the DDS Smashup. &amp;nbsp;The pre-work may involve learning a tool stack (e.g. NetLogo and extensions API for Agent-based Modeling), or learning about one or more of the docking projects, or doing background reading on Data-driven Security (incl. risk, economics, metrics, etc.).&lt;br /&gt;
&lt;br /&gt;
We will be strict about this. &amp;nbsp;Any participant who shows up without doing adequate pre-work will be turned away. It’s just not fair to everyone else.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Work Schedule&lt;/h4&gt;
In a normal hackathon, both the schedule and venue often promote extreme work schedules, including ‘all-nighters’. DDS Smashup will be different.&lt;br /&gt;
&lt;br /&gt;
DDS Smashup will be 3 days rather than 2. &amp;nbsp;Quite a bit of work will be done prior to the event, and also many team members may be virtual participants, including in other time zones. &amp;nbsp;Therefore all participants should be able to get 8 hours sleep per 24 period. &amp;nbsp;Participants should be prepared to work 10 to 16 hours per day for the three days.&lt;br /&gt;
Food and Drink&lt;br /&gt;
Most hackathons provide food, and some only pizza and soda. DDS Smashup will be different.&lt;br /&gt;
&lt;br /&gt;
DDS Smashup will have healthy, good quality catered food and drinks, including coffee, tea, and soft drinks, but no alcohol. &amp;nbsp;But, to set expectations, it won’t be fancy gourmet food.&lt;br /&gt;
Judging and Prizes&lt;br /&gt;
In a normal hackathon, judges evaluate team presentations and then award prizes to the best teams. &amp;nbsp;Participants are often motivated to win prizes and a competitive atmosphere can develop. &amp;nbsp;DDS Smashup will be different.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Closing Dinner&lt;/h4&gt;
On Monday evening, August 5, we hope to have all teams present at a dinner event (limit 60) that includes CISOs at B-Sides Las Vegas. &amp;nbsp;(B-Sides LV has a CISO track). &amp;nbsp;While this might be viewed as judging, the real purpose of the presentations is feedback and to stimulate further ideas for projects and research. &amp;nbsp;Thus, even a ‘failed’ prototype might be fruitful for future work because of what was learned in the process of the project.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Sponsorship&lt;/h4&gt;
In some normal hackathons, one or more sponsors have a proprietary interest in the process or products. &amp;nbsp;Sometimes they want to promote their products or services (e.g. “build a public health app using XYZ’s API and tools…”), or they are hoping to commercialize one or more prototypes, or maybe they want to recruit new employees.&lt;br /&gt;
&lt;br /&gt;
By contrast, in the DDS Smashup all sponsorships will be for community benefit and for research goals. There will be no marketing sponsors and no formal job recruiting.&lt;br /&gt;
&lt;br /&gt;
All sponsor money will be handled through the B-Sides LV non-profit organization (or similar).&lt;br /&gt;
&lt;br /&gt;
All sponsor money will go for direct expenses for the venue, equipment, networking services, food, office supplies, etc. &amp;nbsp;No money will go to Organizers or Participants in the form of salaries or consulting fees. &amp;nbsp;Students and other limited income Participants may receive travel and expense stipends.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Fine Print&lt;/h4&gt;
&lt;div&gt;
Sorry if the following sounds harsh, but we aren&#39;t messing around.&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;small&gt;
Unlike other Information Security conferences in Las Vegas that include a lot of non-work activity -- networking, socializing, partying, drinking, pranking, and rampaging -- &lt;b&gt;the DDS Smashup will be all work and only work&lt;/b&gt;. &amp;nbsp;This excludes alcohol and drugs, but also friends, partners, pets, diversionary games or media, etc. Obviously, it also excludes sales and marketing activity by vendors or consultants.&amp;nbsp;&lt;/small&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;small&gt;
Also: no &quot;rock stars&quot;. &amp;nbsp;Nobody participates just because they are famous or have a cool reputation. &amp;nbsp;Nobody participates without doing necessary pre-work. Sponsors can&#39;t buy participation slots, either.&lt;/small&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;small&gt;&lt;i&gt;All Organizers &lt;/i&gt;and &lt;i&gt;all participants&lt;/i&gt; are collectively responsible to make this a productive, inclusive event. Because how we treat each other matters and we want everyone to be on the same page, we will have a simple code of conduct. We are creating something new and thus we can&#39;t assume that existing set of norms or other Codes of Conduct are sufficient or universally understood.&lt;br /&gt;&lt;br /&gt;
This will be strenuous work. On-site participation is not appropriate for people who are feeling sick or are in frail health. Through remote/virtual participation, we can probably accommodate anyone who can be productive regardless of health or disability.&lt;/small&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;small&gt;
We might have a few sociologists or anthropologists documenting our process, including video and interviews. &amp;nbsp;We&#39;ll get signed permission from everyone, with options to opt-out. &amp;nbsp;Otherwise, nobody will be there to &quot;just watch&quot; or &quot;hangout&quot;.&amp;nbsp;&lt;/small&gt;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;small&gt;
Like other hackathons, DDS Smashup is not an appropriate venue to explore the outer reaches of free speech and free expression, nor for debates on meta-issues like social justice, value systems, or the validity of the problem statements. Likewise, DDS Smashup is not appropriate for social process work such as discourse critiques, deconstruction, or consciousness raising. These are best done in other venues and settings.&lt;/small&gt;&amp;nbsp;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/6679038210516384306/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/04/announcing-data-driven-security-smashup.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/6679038210516384306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/6679038210516384306'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/04/announcing-data-driven-security-smashup.html' title='Announcing: Data-driven Security Smashup'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp1V5OUI5-HcVP9eIV9d6Oxd596RHzUXDY_FR0G7f8amQIQtRXywr8MBcM3VK6FS0O8u97to5Fu5Uoh-jCX_i0VdjmR46trDDEsUAb2tsmUCmww1taa4WhNipvoIfIbMX19yXvTnTv0r8/s72-c/Space+of+Possibilities+DDS+Smashup.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-2127420707600044900</id><published>2019-04-14T09:48:00.000-07:00</published><updated>2019-04-14T09:48:26.819-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="innovation"/><category scheme="http://www.blogger.com/atom/ns#" term="scientific method"/><title type='text'>Why Is Breakthrough Innovation in Cyber Security So Hard?</title><content type='html'>&lt;i&gt;Short answer&lt;/i&gt;: Innovation activities tend to focus on just a few pieces at a time, treating it as a simple problem.  That doesn&#39;t create breakthroughs because the system* is too complicated.&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
* &quot;system&quot; = technology, information, people, processes, organizations, institutions, economics,...&lt;/blockquote&gt;
In &lt;i&gt;&lt;a href=&quot;https://books.google.com/books?id=k5Sr0nFw7psC&amp;amp;printsec=frontcover&amp;amp;source=gbs_ge_summary_r&amp;amp;cad=0#v=onepage&amp;amp;q&amp;amp;f=false&quot; target=&quot;_blank&quot;&gt;Sciences of the Artificial&lt;/a&gt;,&lt;/i&gt; Herbert Simon argued that most evolved systems (natural and artificial) were &quot;partially decomposable&quot; (if not fully decomposable) into units or subsystems that could be studied and understood in isolation. While cyber security is partially decomposable for many purposes, it is my conjecture that it is &lt;i&gt;much less decomposable &lt;/i&gt;than we believe or desire.&lt;br /&gt;
&lt;br /&gt;
What this means is that breakthrough innovations will depend on many, simultaneous inventions, including crossing system levels.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;h3&gt;
Innovation as Chemistry&lt;/h3&gt;
One way to understand this is through the Theory of Autocatalytic Networks, borrowed from Biochemistry and imported into Sociology by John Padgett and Woody Powell in their book &lt;i&gt;&lt;a href=&quot;https://books.google.com/books?id=R-jrPW0YjZIC&amp;amp;printsec=frontcover&amp;amp;source=gbs_ge_summary_r&amp;amp;cad=0#v=onepage&amp;amp;q&amp;amp;f=false&quot; target=&quot;_blank&quot;&gt;The Emergence of Organizations and Markets&lt;/a&gt;&lt;/i&gt;.&lt;br /&gt;
&lt;br /&gt;
In chemistry, one type of molecule &lt;i&gt;A&lt;/i&gt; has a catalytic effect on another &lt;i&gt;B&lt;/i&gt; when the presence of &lt;i&gt;A&lt;/i&gt; increases the production of &lt;i&gt;B&lt;/i&gt;. &amp;nbsp;“Autocatalysis” is a complete loop of catalytic relationships &amp;nbsp;&lt;i&gt;A&lt;/i&gt;➔&lt;i&gt;B&lt;/i&gt;➔&lt;i&gt;C&lt;/i&gt;➔&lt;i&gt;A&lt;/i&gt; which creates a self-sustaining, self-stabilizing process. &amp;nbsp;Autocatalytic loops can be simple or complicated, and some autocatalytic loops are built from sets of simple autocatalytic loops.&lt;br /&gt;
&lt;br /&gt;
In human society, organizations, and technology, you can think of “molecules” as being functional capabilities, not just behaviors or processes, and think of “catalysis” as coupling, not just input-output connections. &amp;nbsp;Coupling is ontological -- the definition and structure of &lt;i&gt;B&lt;/i&gt; depends upon &lt;i&gt;A&lt;/i&gt;, so if &lt;i&gt;A&lt;/i&gt; changes, then &lt;i&gt;B&lt;/i&gt; either has to change or is no longer functional. &amp;nbsp;Think of “autocatalytic loop” as closure or completeness of functional coupling.&lt;br /&gt;
&lt;br /&gt;
With this theoretical lens, we can define invention as the creation of new autocatalytic cycles, and sometimes breaking or modifying existing autocatalytic cycles. &amp;nbsp;We might imagine the invention process as the “ecological soup” in which reactive processes take place, including experiments, accidents (happy or sad), and purposeful research.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
The Appeal of Simple Solutions&lt;/h4&gt;
This diagram shows how people usually think about making innovation in cyber security: &quot;It’s a simple matter of inventing two or three things and connecting them together in creative ways and ... BANG! INNOVATION!&quot; &lt;br /&gt;
&lt;br /&gt;
Sadly, no.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbzsFrfM6nfAIFMStJWb6kPaQc3-SOu9l8tKmM77BKRZN93_Ql2Uhs7ago8JYYoXf2yJi0WftUbsBO3eR6zhTC3_-mxggp-jqcmCkr06HrRmtOoagLW1HzTyEdjOiqpYr_LVdNsN23ca4/s1600/simple_loop.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;258&quot; data-original-width=&quot;284&quot; height=&quot;181&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbzsFrfM6nfAIFMStJWb6kPaQc3-SOu9l8tKmM77BKRZN93_Ql2Uhs7ago8JYYoXf2yJi0WftUbsBO3eR6zhTC3_-mxggp-jqcmCkr06HrRmtOoagLW1HzTyEdjOiqpYr_LVdNsN23ca4/s200/simple_loop.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;A simple 3 molecule auto-catalytic network. &amp;nbsp;Arrows are catalytic relations.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
From the last few years, here are a few tag lines of so-called &quot;breakthrough innovations&quot; that were highly touted but didn&#39;t change things fundamentally:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&quot;Provable Security&quot;&lt;/li&gt;
&lt;li&gt;&quot;End-to-end encryption&quot;&lt;/li&gt;
&lt;li&gt;&quot;AI and/or machine learning for anomaly detection/prevention/whatever&quot;&lt;/li&gt;
&lt;li&gt;&quot;Cyber insurance for everyone&quot;&lt;/li&gt;
&lt;li&gt;&quot;National Cyber Leap Year&quot; -- &lt;a href=&quot;https://newschoolsecurity.com/2009/09/national-cyber-leap-year-without-a-good-running-start-there-might-be-no-leap/&quot; target=&quot;_blank&quot;&gt;my analysis&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4&gt;
When the Going Gets Complicated&lt;/h4&gt;
&lt;div&gt;
Here is what a breakthrough innovation will probably look like (but &lt;i&gt;we don’t really know in detail&lt;/i&gt;):&lt;/div&gt;
&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTWjliXadU7Cg-j_QwWFjq7oIwevBUCChNEm1DNLqSTlWfEjKkXlpPHWzEOjb18_eK_64nGsrMzrmg8L8tCGcz6kJqMbp4VKQF0UH-8CRVrkWYtxUiNF6vjL0SKnuzbJMArkYSjF8KheE/s1600/complex_loops.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;628&quot; data-original-width=&quot;665&quot; height=&quot;302&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTWjliXadU7Cg-j_QwWFjq7oIwevBUCChNEm1DNLqSTlWfEjKkXlpPHWzEOjb18_eK_64nGsrMzrmg8L8tCGcz6kJqMbp4VKQF0UH-8CRVrkWYtxUiNF6vjL0SKnuzbJMArkYSjF8KheE/s320/complex_loops.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;A complicated autocatalytic network that doesn&#39;t easily decompose into simple networks.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;h4&gt;
A Practical Example&lt;/h4&gt;
&lt;div&gt;
Let me move out of the theoretical and conceptual, and look at a practical example showing the interrelations between necessary inventions. &amp;nbsp;(Please excuse me for skipping over many details and not providing references.)&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;It has been recognized for over 10 years that &lt;i&gt;misaligned and missing incentives&lt;/i&gt; is a root cause, but ...&lt;/li&gt;
&lt;li&gt;... this requires&lt;i&gt;&amp;nbsp;better security metrics, &lt;/i&gt;including&lt;i&gt; aggregate metrics&lt;/i&gt;, ...&lt;/li&gt;
&lt;li&gt;... including methods for &lt;i&gt;quantifying risk&lt;/i&gt; and ...&amp;nbsp;&lt;/li&gt;
&lt;li&gt;... &lt;i&gt;aggregating risk at a business unit or enterprise level &lt;/i&gt;in economic units (e.g. risk capital $) along with ...&lt;/li&gt;
&lt;li&gt;... innovation in &lt;i&gt;incentive instruments&lt;/i&gt;, because &lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2016/10/the-cyber-insurance-emperor-has-no.html&quot; target=&quot;_blank&quot;&gt;existing incentive instruments don&#39;t cut it&lt;/a&gt;. &amp;nbsp;This all requires ...&lt;/li&gt;
&lt;li&gt;... innovation in how we &lt;i&gt;measure and manage security performance&lt;/i&gt;, including capability building and learning, which of course depends on...&lt;/li&gt;
&lt;li&gt;... &lt;i&gt;better models of adversarial innovation&lt;/i&gt;, because we may be in a Red Queen arms race with adversaries, so simple improvements may leave us falling behind.&lt;/li&gt;
&lt;li&gt;All this has to translate into major changes in human behavior at all levels, &amp;nbsp;so we need &lt;i&gt;innovation in framing, nudges, norm-formation&lt;/i&gt;, etc.&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
I&#39;ll stop here, but notice that I haven&#39;t even brought in the technology and information aspects of cyber security. &amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To be clear, I am &lt;b&gt;&lt;i&gt;not&lt;/i&gt;&lt;/b&gt; arguing that everything is connected to everything else and no innovation is possible unless we research everything. &amp;nbsp;That&#39;s too extreme and hopeless. &amp;nbsp;I am just saying the breakthrough innovations will look much more like the bottom diagram than the top diagram.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Implications&lt;/h3&gt;
&lt;div&gt;
Achieving this type of sophisticated set of interdependent inventions will probably require processes that “smash together” talent, ideas, and resources that don’t easily work together, in a concentrated way to sustain these complex loops.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/2127420707600044900/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/04/why-is-breakthrough-innovation-in-cyber.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/2127420707600044900'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/2127420707600044900'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/04/why-is-breakthrough-innovation-in-cyber.html' title='Why Is Breakthrough Innovation in Cyber Security So Hard?'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbzsFrfM6nfAIFMStJWb6kPaQc3-SOu9l8tKmM77BKRZN93_Ql2Uhs7ago8JYYoXf2yJi0WftUbsBO3eR6zhTC3_-mxggp-jqcmCkr06HrRmtOoagLW1HzTyEdjOiqpYr_LVdNsN23ca4/s72-c/simple_loop.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-5493424808103046065</id><published>2019-03-31T11:58:00.002-07:00</published><updated>2019-04-01T21:34:01.342-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="personal"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD work"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><title type='text'>A 12 Year Quest -- My Story</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnPQwRIt3ExB_djgBN7xDnqnGh8CkMJVrrasdIdMCPqS84xpJfSFbGEsVES_O1gFojGu-Ev06Rt3oSpiqSWstiQBqgHkiDmY6DjXdrFssiCerb9rPa5cH7MFnxScy3_rpxbFd7tQpiN84/s1600/thick-skin-side-quest+cropped.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;359&quot; data-original-width=&quot;355&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnPQwRIt3ExB_djgBN7xDnqnGh8CkMJVrrasdIdMCPqS84xpJfSFbGEsVES_O1gFojGu-Ev06Rt3oSpiqSWstiQBqgHkiDmY6DjXdrFssiCerb9rPa5cH7MFnxScy3_rpxbFd7tQpiN84/s200/thick-skin-side-quest+cropped.jpg&quot; width=&quot;197&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;On a quest, through the desert.&lt;br /&gt;
&lt;br /&gt;
(credit: Assassin&#39;s Creed&amp;nbsp;–&amp;nbsp;Origins; &lt;br /&gt;
Thick Skin Side Quest – &lt;br /&gt;
Crocodile, Hyena, Vulture Locations)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Last week I started a new job as Principal Modeler for Cyber Risk at Risk Management Solutions (RMS). &amp;nbsp;This is HUGE, coming after a &lt;b&gt;&lt;i&gt;12 year &lt;/i&gt;&lt;/b&gt;&lt;i&gt;&lt;b&gt;quest&lt;/b&gt;&lt;/i&gt; that was far from easy or certain.&lt;br /&gt;
&lt;br /&gt;
I don&#39;t normally post personal stories on this blog (or elsewhere) but today feels like the right time for this particular personal story. &amp;nbsp;I&#39;m writing this as a way of connecting to my community, many of whom have shared the ups and downs of this journey. &amp;nbsp;I don&#39;t have any big lessons or advice. Even so, some readers may find this story instructive or inspirational, even indirectly. &amp;nbsp;I hope so.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Caveats:&lt;/i&gt; In this post, I don&#39;t individually acknowledge and thank all the people who have helped me along the way. &amp;nbsp;There are &lt;i&gt;so&amp;nbsp;many,&lt;/i&gt;&amp;nbsp;so I will do that separately, both in one-on-one communications and later blog posts. &amp;nbsp;I&#39;m also going to discipline myself not to write about &lt;i&gt;all&lt;/i&gt; the details, &lt;i&gt;all&lt;/i&gt; the events, &lt;i&gt;all&lt;/i&gt; the feelings along the way. &amp;nbsp;That would be too long. &amp;nbsp;I aim is to have a post that is readable and still specific enough to be meaningful.&lt;br /&gt;
&lt;br /&gt;
Even so, it&#39;s a long blog post. If this suits you, the story continues below.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Prelude: A Holding Pattern&lt;/h3&gt;
&lt;div&gt;
Prior to mid-2006, I was working as a solo consultant (&quot;Meritology&quot;), focusing on economic analysis of IT investments, but also jack-of-all-trades on what ever project came to me. &amp;nbsp;I had left KMPG Consulting (later BearingPoint) in 2004, after 10 years. &amp;nbsp;Even though I was a Senior Manager and doing well, I left for three reasons: 1) my young son (Being a good father to him was a top priority and I needed to avoid travel to make my schedule work for shared custody); 2) Big 6 consulting was sucking my soul and not getting me closer to fulfilling &lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2019/03/personal-mission-statement.html&quot; target=&quot;_blank&quot;&gt;my personal mission&lt;/a&gt;; and 3) BearingPoint was a sinking ship and I didn&#39;t want to be the last rat off before it sank. &amp;nbsp;(Sure enough, BearingPoint collapsed after going public in Dot.Com boom, via Sarbanes-Oxley violations, mass firing of executives. Finally it was sold off in pieces.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Really, &lt;i&gt;&lt;b&gt;I was in a holding pattern&lt;/b&gt;&lt;/i&gt;, waiting and hoping for a new career direction to unfold. &amp;nbsp;While it appeared in the post-bubble world that there would be a high demand for solid economic models of IT investments, that did not materialize. &amp;nbsp;But the truth was that my heart and soul weren&#39;t really moved by that type of work, therefore I didn&#39;t push very hard for it.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
What was I looking for? &amp;nbsp;Some class of important business/social problem that centered on &quot;qualitative complexity&quot; -- i.e. complexity in the dynamic structure of the system, including emergent structure. &amp;nbsp;I wanted to find a business/social problem that defeated conventional methods and therefore required breakthrough models and methods. &amp;nbsp; If the problem was hard enough and compelling enough, then it would be the motive force to drive fundamental innovation along the lines of &lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2019/03/personal-mission-statement.html&quot; target=&quot;_blank&quot;&gt;my mission&lt;/a&gt;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Earlier in my career, I worked computer-aided engineering, computer-aided education, and computer-aided sales/marketing (a.k.a. Customer Relationship Management -- CRM) as candidate domains, but none of these worked out as a &quot;motive force&quot; for fundamental innovation.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Quest status&lt;/i&gt;: Not yet started.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h3&gt;
Birth of a Calling&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
In mid-2006, a good friend from my social network asked what I did for work, and then said, &quot;I do a lot of consulting for i&lt;i&gt;nformation security firms&lt;/i&gt;. &amp;nbsp;They are &lt;i&gt;desperate&lt;/i&gt; for ROI models. &amp;nbsp;I can introduce you!&quot; &amp;nbsp;My first reaction: this should be &lt;i&gt;easy&lt;/i&gt; compared to what I have been working on (e.g. knowledge management, full of intangibles, etc.). &amp;nbsp;How wrong I was. &amp;nbsp;Instead of &quot;easy&quot; I found a tangled nest of unsolved problems, even unsolved in theory. &amp;nbsp;Some people even said, &quot;Anyone who can solve this problem deserves a Nobel Prize&quot;. &amp;nbsp;There were several &#39;blue ribbon&#39; commissions and reports during 2001-2006 that framed the problems, pointed in the direction of solutions, and called for making R&amp;amp;D in this area a national priority (US).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A nearly-impossible socio-technical problem that is a national priority? &amp;nbsp;SIGN ME UP! (see &lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2019/03/personal-mission-statement.html&quot; target=&quot;_blank&quot;&gt;mission statement)&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I then set on the task of gathering all the information I could find -- academic, industry, and government. &amp;nbsp;When I had a critical mass, I printed it all out (~50 pages, reduced, double sided), made copies, and then tried to make connections with potential collaborators and sponsors.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status&lt;/i&gt;: We are ON OUR WAY! But to&amp;nbsp;&lt;i&gt;where&lt;/i&gt;, exactly?&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
A Rough Start&lt;/h3&gt;
&lt;div&gt;
How do you think I was received by the first people I talked to? Not very well. &amp;nbsp;One of my first pitches was to CommerceNet in Palo Alto. &amp;nbsp;They presented themselves as a sponsor/ incubator/ investor in breakthrough ideas. They were pioneers in e-commerce. &amp;nbsp;They had just invested in 23-and-Me (personal DNA evaluation). &amp;nbsp;They had expressed interest in security and &amp;nbsp;privacy as a major theme. &amp;nbsp;Good fit, I thought. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Through a connection, I was able to get invited to present at one of their regular weekly seminars. It was attended by four CommerceNet people, including a couple Principals, a couple of technical people affiliated with CommerceNet, and a couple of my friends.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I was &lt;i&gt;only&lt;/i&gt; presenting an R&amp;amp;D opportunity, and suggesting an approach to research. &amp;nbsp;I had no answers or solutions. &amp;nbsp;Even so, nearly all of the questions were: &amp;nbsp;&quot;How are going to do &lt;i&gt;this&lt;/i&gt;? &amp;nbsp;What is your solution to &lt;i&gt;that&lt;/i&gt;? &amp;nbsp;How much have you &lt;i&gt;prototyped&lt;/i&gt;?&quot; &amp;nbsp;There was zero excitement after the meeting.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I suspect that one reason for the lack of excitement or interest is that I lacked any credentials in their eyes. &amp;nbsp;I wasn&#39;t a PhD. &amp;nbsp;I wasn&#39;t a software guru. I wasn&#39;t a veteran of any hot startups. &amp;nbsp;I did have a well-regarded person recommend me, but that only got me the seminar presentation.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I persisted, to no avail. &amp;nbsp;I invited myself to a few CommerceNet social events, including the Christmas party, hoping to convince one of the Principals to champion this cause, or at least hold some kind of workshop with other local experts. &amp;nbsp;Fail. &amp;nbsp;I followed up with emails and then phone calls. &amp;nbsp;Eventually, it was clear that they were shutting me out. &amp;nbsp;Like in Hollywood when they say, &quot;The producers decided to go another direction...&quot;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Clearly, it wasn&#39;t going to be enough for me to simply frame the problem and invite other people to work on it and sponsor the research. &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status&lt;/i&gt;: Bleak. No clear goals. Plenty of people said it was impossible in principle (&quot;anti-quants&quot;) or impractical in practice (&quot;how are you going to solve &lt;i&gt;that&lt;/i&gt;?). &amp;nbsp;Zero prospect for me to earn money via any specific job title. &amp;nbsp;No prospects for consulting either, given that I didn&#39;t yet have viable solution.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Starting as a &quot;Nobody&quot;, Becoming a &quot;Somebody&quot;&lt;/h3&gt;
&lt;div&gt;
Moving into 2007, I decided to attend several conferences and workshops on my own dollar, hoping to learn as much as possible about information security and the current state of research on risk and economics of security. &amp;nbsp;I was a Nobody. &amp;nbsp;The people I talked to were polite, but mostly they weren&#39;t sure why they should talk to me. &amp;nbsp;Only a few kind people entertained long conversations where I could ask my newbie questions. &amp;nbsp;I wasn&#39;t always sure who I should talk to because almost nobody was presenting on the topics that would interest me most.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
One conference was in Paris, for Risk Managers in Financial Services. &amp;nbsp;There wasn&#39;t any mention of information security risk (&quot;cyber&quot; wasn&#39;t yet a thing) in any of the keynotes or session presentations. &amp;nbsp;I had assumed that someone in Financial Services would be quantifying risk of information security, given their quant risk capabilities and regulatory imperatives. &amp;nbsp;But not so. &amp;nbsp;I grew exasperated. &amp;nbsp;At a reception, I managed to button-hole the Head of Operational Risk at Citicorp and asked him -- point blank -- &quot;Do you have a working relationship with the Citicorp Chief Information Security Officer (CISO)? &amp;nbsp;Do you exchange data and models that allow you to quantify risk associated with information security?&quot; &amp;nbsp;Long answers made short: No and no. &amp;nbsp;&quot;We should, but we don&#39;t.&quot;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Out of these conferences and workshops, I made a few contacts that blossomed into collaborative relationships. &amp;nbsp;That led to my first real work product.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status:&lt;/i&gt; On a trail, of sorts. Not alone anymore. &amp;nbsp;Still zero career options, let alone opportunities.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
First Real Product&lt;/h3&gt;
&lt;div&gt;
In fall of 2007, I thought I had learned enough to formulate a specific, actionable research agenda, in contrast to my earlier &quot;framing&quot; and unspecific plea. &amp;nbsp;That lead to the white paper: &quot;&lt;a href=&quot;https://www.researchgate.net/publication/233835863_Incentive-based_Cyber_Trust_-_A_Call_to_Action&quot; target=&quot;_blank&quot;&gt;Incentive-based Cyber Trust: A Call To Action&lt;/a&gt;&quot;. &amp;nbsp;I posted on the Web a few places and also circulated it by email. &amp;nbsp;I would have liked to publish it some place official but I didn&#39;t have academic credentials, plus I didn&#39;t know who might publish it. &amp;nbsp;(It was too long and detailed to be published in any industry journal.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
What was the initial response to this &quot;call to action&quot;? &amp;nbsp;Silence. &amp;nbsp;Nothing. Not even criticism. &amp;nbsp;I seriously doubt if many people even read it. &amp;nbsp;(For what its worth, I think its a good read even today.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;But&lt;/i&gt;, I made some progress connecting to community and finding collaborators. &amp;nbsp;I found and joined the &lt;i&gt;securitymetrics.org&lt;/i&gt; email list. Then in February 2008, I presented at their mid-year conference, &lt;i&gt;Metricon&lt;/i&gt; &lt;i&gt;1.5&lt;/i&gt; in San Francisco. &amp;nbsp;And &lt;i&gt;for the first time&lt;/i&gt;, I received significant positive feedback on my ideas, including an early version of the Total Cost of Risk approach. &amp;nbsp;Very enthusiastic response from a couple of security experts, a CISO, and a fellow who worked for the US government (FDIC).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status&lt;/i&gt;: A stake in the ground. &amp;nbsp;No longer a &quot;Nobody&quot;. &amp;nbsp;A community member, with some good encouragement. Still zero career options or opportunities.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Attempting to Make Something Happen&lt;/h3&gt;
&lt;div&gt;
In 2008, US Department of Homeland Security (DHS) put out its first R&amp;amp;D solicitation for research on information security metrics and risk. &amp;nbsp;It was open to both industry and academics (unlike National Science Foundation (NSF)). &amp;nbsp;GREAT! &amp;nbsp; I cooked up a grand plan: orchestrate a multi-organization, multi-sector research team. &amp;nbsp;Attended my second Workshop on the Economics of Information Security (WEIS), again on my own dollar, and recruited a couple of key people I met the previous year.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
We put together a really good &quot;white paper&quot; (a.k.a. short preliminary proposal) for the first stage of evaluation, and I was lead author.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status&lt;/i&gt;: On the YELLOW BRICK ROAD! (or so it seemed). &amp;nbsp;If we make it past the first round AND second round, I could finally get paid for some research work, starting a year or more from then.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But then...&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
For Want of a Click&lt;/h3&gt;
&lt;div&gt;
Things turned really bad in the Fall of 2008. &amp;nbsp;Financial crisis. No consulting projects (not even getting my calls returned). &amp;nbsp;Job interviews canceled. &amp;nbsp;Bigger than all of this was a huge family crisis.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But in some ways the worst thing was when I forgot to visit a DHS web page before the deadline and click &quot;Yes&quot; next to the question: &quot;Will you be submitting a full proposal?&quot;. &amp;nbsp;I missed it by two days. &amp;nbsp;I contacted DHS immediately and appealed for an exception, and they said, &quot;No&quot;. &amp;nbsp;Was there any other options? &amp;nbsp;&quot;No.&quot; &amp;nbsp;Can I talk to anyone else? &amp;nbsp;&quot;No.&quot;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
It was my own dumb mistake. &amp;nbsp;Sure, having such a requirement with a deadline is dumb, but it was right there, in writing, and I didn&#39;t pay attention to it. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Heartbreaking, for both me and my collaborators. &amp;nbsp;I hate disappointing people and, boy, did I let them down.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
With both personal and economic crises to deal with, it was time to hunker down.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status&lt;/i&gt;: In a dark, cold place. &amp;nbsp;No clear path forward. No career prospects.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Survival Mode, Then a New Path Appears&lt;/h3&gt;
&lt;div&gt;
In 2009, it was all about surviving, financially and emotionally. &amp;nbsp;Often, it was all I could do to get through a the day. Wasn&#39;t thinking or planning ahead. Going into Fall 2009, at least I had a couple of job interviews -- nothing related to information security metrics or risk. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&quot;Why don&#39;t you go to grad school and get a PhD? &amp;nbsp;That&#39;s what you really want to do, isn&#39;t it?&quot; &amp;nbsp;A good friend asked me these provocative questions while we were hanging out a picnic one weekend. (She had some magical intuition about this, even though her work and mine are miles apart and we only know each other socially.) &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I had been considering PhD programs about every 5 years ever since I graduated college. &amp;nbsp;It just wasn&#39;t right. &amp;nbsp;Only after Complexity Science appeared in the late 80s did it seem like the academic world was aligning to my interests and intuition. &amp;nbsp;Finally, in the early 2000s the field of Computational Social Science became a reality, and that seemed like a great fit for me.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I thought, &quot;Why not apply, at least as a backup plan? &amp;nbsp;I can wait to make the final decision after I get accepted to at least one school.&quot; So I did. &amp;nbsp;I applied to Stanford, UC Berkeley, &amp;nbsp;Carnegie Mellon University, and George Mason University. &amp;nbsp;The latter was the only one with a Computational Social Science department, and also the only one without a direct connection to information security/risk.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I only got accepted at George Mason. &amp;nbsp;I was one of two finalists at Stanford, but didn&#39;t get it. &amp;nbsp;(There&#39;s a great story there, which I might tell later.) &amp;nbsp;By this time -- Spring 2010 -- I still didn&#39;t have any job offers or solid opportunities lined up. &amp;nbsp;So I accepted the offer from George Mason and I became a 52-year old grad student. &amp;nbsp;Off to Fairfax, Virginia!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status&lt;/i&gt;: Discovered a new path. &amp;nbsp;To follow it, I had to drop nearly everything I was carrying and start over. &amp;nbsp;I had some minimal income, and wouldn&#39;t be earning anything more for several years. But at least there was a path. &amp;nbsp;Feeling more optimistic.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
A 52-Year Old Grad Student&lt;/h3&gt;
&lt;div&gt;
I&#39;m going to skip over a lot here. &amp;nbsp;Grad school courses and exam went really well, overall. &amp;nbsp;It was complicated, though. &amp;nbsp;I was seeing my son much less. I had also started a relationship before I left California, so for 2 years it was long distance. &amp;nbsp;In principle, she was supportive of me being on this path in grad school, though in practice there was a lot of difficulty.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The best thing about it was that I felt like I was on the right path -- finally! -- after many years of wandering. &amp;nbsp;I still couldn&#39;t see exactly where I was going after grad school (PhD) but I thought there would be more options than before. &amp;nbsp;Plus information security metrics + quant risk was still growing in importance. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In 2011, the Society of Information Risk Analysts was formed by some colleagues from the security metrics community. &amp;nbsp;I was an early member. &amp;nbsp;Finally, there was a dedicated community (email list, and eventually conferences) of people focused on the challenges of quantifying probabilistic risk models for cyber security.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In summer of 2012 I moved back to California, continuing as full-time grad student and research assistant, working remotely. By 2013 my assistantship had run out, so I got a full-time job as Data Scientist at Zions Bancorp. That put the PhD program into part-time, but I &quot;only&quot; had to finish my dissertation.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;i&gt;Quest status&lt;/i&gt;: Slowly crawling up a long steep hill.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
The &quot;Black Dog&quot;&lt;/h3&gt;
&lt;div&gt;
I am skipping many details and events, but I will share something important. &amp;nbsp;I started experiencing serious episodes of depression. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Burning the candle at both ends. &amp;nbsp;Chronic sleep deprivation. Feeling like I was constantly disappointing people around me. And a bit too much alcohol. &amp;nbsp;It started out feeling like just a funk, but eventually matured into the &quot;Black Dog&quot;, in the words of Winston Churchill.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Other people in the InfoSec community have written in some detail about their experience with depression. &amp;nbsp;Later I might write about mine. &amp;nbsp;For now, I just want to say that it doesn&#39;t resemble ordinary sadness or &quot;the blues&quot;. &amp;nbsp;My mother died recently, and the sadness I felt during and after has no resemblance to full-blown depression. Best way I can describe it is &quot;sinking into a whirlpool&quot;, except the whirlpool is a black hole. &amp;nbsp;It distorts everything, even the acts of kindness of loved ones who want to help. &amp;nbsp;Ordinary logic and reasoning doesn&#39;t work. &amp;nbsp;Crazy stuff (like suicide) seem inevitable, the same way that some young people believe it is inevitable that they will marry and have kids some day.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Of course, depression just made everything worse, so it was self-reinforcing.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Lucky for me, I didn&#39;t need medication. &amp;nbsp;It was enough to get good sleep, exercise, fresh air and sunshine, and time spent on diverting activities that had immediate satisfaction/reward, like organizing books or fixing things.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Sadly, my relationship ended, too, when we finally agreed we were not aligned in life goals and priorities.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Quest status&lt;/i&gt;: Keeping my head above water, but just barely.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Will I Ever Get Back on the Quest?&lt;/h3&gt;
&lt;div&gt;
After so many years of surviving on on a grad student salary and savings, I couldn&#39;t continue. &amp;nbsp;It would have been ideal to finish by PhD by then, but that didn&#39;t happen.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Just in time, I found a job at Zions Bancorp through connections I had made years earlier in the securitymetrics.org and SIRA communities. &amp;nbsp;This came after a few job opportunities fell through at major forward-thinking Bay Area companies -- where I thought I was well-qualified or even over-qualified.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Zions was good for me in that they were accommodating regarding my request for work arrangement that would also support me taking time to do academic work. &amp;nbsp;Even so, progress on my dissertation had slowed to a crawl and I had no good answer to: &quot;When will you finish?&quot;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
By Summer of 2018 I was looking for new work, with the hope that I might find something that would be in alignment with my Mission and Quest. &amp;nbsp;Alas, while I found tons of job openings for Data Scientists, even at information security companies, it seemed like they were only looking specialist Data Scientists -- statistics, machine learning, R + Python, big data, etc. &amp;nbsp;I didn&#39;t see any job openings that required the sort of breadth and depth that I could offer. &amp;nbsp;Furthermore, I didn&#39;t see strong evidence that any companies were committed to advancing the state of the art in &quot;quant risk&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Quest status&lt;/i&gt;: So close, yet so far away.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Finally: The Promised Land&lt;/h3&gt;
&lt;div&gt;
In early January 2019, I received an email from the hiring manger at Risk Management Solutions (RMS). &amp;nbsp;I had previously applied for a Data Scientist job at RMS, based in London, but didn&#39;t hear anything after the initial phone screen with HR.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I had been following RMS since 2007, as they appeared to be one of the few companies with core competencies and market position to be a leader in &quot;quant risk&quot; for cyber security. &amp;nbsp;But until ~4 years ago, they didn&#39;t have any resources or activity devoted to cyber risk. &amp;nbsp;(It turns out that their insurance firm customers had not requested any cyber risk models until recently.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Hallelujah! A new job position had been created that was much better suited to me. The hiring manager had already read my blog posts, followed me on Twitter, and seen a few presentation videos. &amp;nbsp;(Why is this rare? &amp;nbsp;Why don&#39;t hiring managers do on-line research on all their job candidates?)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
It&#39;s still very early, but for now I&#39;ll just say that the company, the team, and the mission is very exciting and very aligned with my Quest.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Quest status&lt;/i&gt;: &amp;nbsp;I&#39;m so very thankful to have reached this place. &amp;nbsp;It is a fulfillment of everything that has come before, including the original intuitions and inspiration. &amp;nbsp;It is also a platform for new things, including things I haven&#39;t yet imagined.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Thanks to you, dear reader, for reading this long story&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h3&gt;
Postscript: Who Do I think I am?&lt;/h3&gt;
&lt;div&gt;
Some might read this post as evidence that I have a &quot;Messiah complex&quot; or otherwise that I think I am special or entitled because I feel a &quot;calling&quot;, etc. &amp;nbsp; Or maybe that I am just arrogant. &amp;nbsp;Anyone who takes on near-impossible goals, especially as a personal mission, is subject to such criticisms, which boil down to: &lt;i&gt;Who do you think you are? &amp;nbsp;Special? A genius?&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Judge for yourself. &amp;nbsp;I won&#39;t argue. &amp;nbsp;I will say that for a few decades, I have studied the lives of people who were later called &quot;great&quot; or &quot;genius&quot;, so I know about the complex psychology of committing your life to a &quot;grand challenge&quot; missions. &amp;nbsp;I&#39;ve studied the down sides, including ruined lives and mental disorders like obsessive attachment to delusions (a.k.a. &quot;going crazy&quot;). &amp;nbsp; No doubt, there is something intrinsically &quot;crazy&quot;, &quot;arrogant&quot;, and unreasonable to think to yourself: &quot;Yes, I think I can help solve this massive, unsolved problem that looks impossible and has defeated many other people.&quot; &amp;nbsp;Reasonable, sensible people avoid such problems.&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;The reasonable people adapt themselves to the world: the unreasonable person persists in trying to adapt the world to themselves. Therefore &lt;i&gt;all [major] progress depends on the unreasonable person&lt;/i&gt;.&quot; - George Bernard Shaw (adapted)&lt;/blockquote&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/5493424808103046065/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/03/my-story.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/5493424808103046065'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/5493424808103046065'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2019/03/my-story.html' title='A 12 Year Quest -- My Story'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnPQwRIt3ExB_djgBN7xDnqnGh8CkMJVrrasdIdMCPqS84xpJfSFbGEsVES_O1gFojGu-Ev06Rt3oSpiqSWstiQBqgHkiDmY6DjXdrFssiCerb9rPa5cH7MFnxScy3_rpxbFd7tQpiN84/s72-c/thick-skin-side-quest+cropped.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-7636216892909992025</id><published>2018-12-18T07:00:00.000-08:00</published><updated>2018-12-18T07:00:04.507-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="finance"/><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><category scheme="http://www.blogger.com/atom/ns#" term="uncertainty"/><title type='text'>Does Modern Portfolio Theory (MPT) apply to cyber security risks?</title><content type='html'>Many months ago, my colleague &lt;a href=&quot;https://twitter.com/dseverski&quot; target=&quot;_blank&quot;&gt;David Severski&lt;/a&gt; asked on Twitter how Modern Portfolio Theory (MPT) does or does not apply to quantified cyber security risk:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtdd4z-GX59Pfg3-VsFe7OGMcPCWMLFSMnr0TCFqRt-GH1JMXabWTbifuEC9gj7QX4sqV2wqlkdwDU4dbv9TguI9DFLl_JRvPgLuI7KT-Sl7cvlHHgTpnKygXaQwuBn7X-Mvmi9SOcY2w/s1600/Screen+Shot+2018-12-17+at+9.03.33+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;238&quot; data-original-width=&quot;700&quot; height=&quot;120&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtdd4z-GX59Pfg3-VsFe7OGMcPCWMLFSMnr0TCFqRt-GH1JMXabWTbifuEC9gj7QX4sqV2wqlkdwDU4dbv9TguI9DFLl_JRvPgLuI7KT-Sl7cvlHHgTpnKygXaQwuBn7X-Mvmi9SOcY2w/s640/Screen+Shot+2018-12-17+at+9.03.33+PM.png&quot; width=&quot;580&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
I replied that I would blog on this &quot;...soon&quot;. &amp;nbsp;Ha! &amp;nbsp;Almost four months later. &amp;nbsp;Well, better late than never.&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;Short answer&lt;/u&gt;:&amp;nbsp;&lt;i&gt;No, MPT doesn&#39;t apply&lt;/i&gt;. &amp;nbsp;Read on for explanations.&lt;br /&gt;
&lt;br /&gt;
NOTE: &quot;Cyber security risk&quot; in this article is &lt;i&gt;quantified risk&lt;/i&gt; -- probabilistic costs of loss events or probabilistic total costs of cyber security. &amp;nbsp;Not talking about color-coded risk, categorical risk, or ordinal scores for risk. &amp;nbsp;I don&#39;t ever talk about them, if I can help it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;h2&gt;
A Short Summary of Modern Portfolio Theory (MPT)&lt;/h2&gt;
&lt;div&gt;
This is a &quot;For Dummies...&quot; explanation, with only enough to serve our purposes. &amp;nbsp;It&#39;s a sketch that leaves out many details and elaborations. See &quot;Further Reading&quot; at the end for more.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
The Basics&lt;/h3&gt;
&lt;div&gt;
Modern Portfolio Theory (MPT) is a &lt;i&gt;sub-field&lt;/i&gt; in Economics of Investment and Finance.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Economists are not like you and me. &amp;nbsp;They look at investments in a very particular way: Every &lt;i&gt;investment &lt;/i&gt;is reduced to a cash flow -- a regular or irregular sequence of cash payments to or from an investor. &amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
For example, if you buy a rental property for cash, the cash out is your initial investment, the cash in is the monthly rental income, with possibly cash from the sale after some years. Periodically you have cash out for maintenance costs, taxes, etc.&lt;/blockquote&gt;
&lt;div&gt;
MPT adopts a general scheme for characterizing all investments so they can be compared uniformly. &amp;nbsp;Two parameters completely characterize each investment: 1) average rate of return per year (&lt;i&gt;mean return&lt;/i&gt;); and 2) average variability per year (&lt;i&gt;variance, &lt;/i&gt;also called &lt;i&gt;&quot;risk&quot;&lt;/i&gt;). &amp;nbsp;Variance includes both upside and downside variations from the mean return.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The square root of variance is &quot;standard deviation&quot;. These are the same two parameters that &lt;i&gt;completely characterize&lt;/i&gt;&amp;nbsp;the familiar Normal distribution (a.k.a. Gaussian):&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzPR_DobaYxEWxZI9-tL6iMz_F7repYdXYIyp3-3ZtC95BQOtSX_i_Yq5o6jeeYwPAeC4sso1YwMYxueteHNYMNKzb1p2AY1XPKGlE7dbEYyAC8v24uKAP7YyMSziji0-8BcKi9b4-BCc/s1600/Normal+Distribution%252C+mean%252C+std+deviation.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;558&quot; data-original-width=&quot;769&quot; height=&quot;232&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzPR_DobaYxEWxZI9-tL6iMz_F7repYdXYIyp3-3ZtC95BQOtSX_i_Yq5o6jeeYwPAeC4sso1YwMYxueteHNYMNKzb1p2AY1XPKGlE7dbEYyAC8v24uKAP7YyMSziji0-8BcKi9b4-BCc/s320/Normal+Distribution%252C+mean%252C+std+deviation.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Like the rest of Economic Finance, MPT assumes that everyone knows the mean return for all investments, or at least that nobody is systematically better or worse at estimating mean returns. &amp;nbsp;&lt;i&gt;All uncertainty is captured in the variance&lt;/i&gt; (or its square root, standard deviation).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
No rational investor would ever choose a security with a negative mean return. Investors will only lose money if they have bad luck (i.e. variability on the downside wipes out the mean return) or if they foolishly over-pay for the asset.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A portfolio is an allocation/commitment of a pot of capital (i.e. cash money) to a set of investments, with an eye toward collecting future uncertain cash flows. All possible investments and portfolios can be plotted as points in a 2-dimensional space of mean return vs. variance (&quot;risk&quot;):&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiriOhvuGj1e1OKsoRp_CRxfoo2JbGFU95b4lx9HE9xJBoglv5EbXV_2tfJxNEYqITtio1H6yEQHM0_zIo23TwqVjOv3d5-AH9hvXPPLxb3cTOiI2RKmqh_JGxousEPEZNaE8dNzKDkFhw/s1600/Screen+Shot+2018-12-17+at+9.59.01+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;856&quot; data-original-width=&quot;1280&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiriOhvuGj1e1OKsoRp_CRxfoo2JbGFU95b4lx9HE9xJBoglv5EbXV_2tfJxNEYqITtio1H6yEQHM0_zIo23TwqVjOv3d5-AH9hvXPPLxb3cTOiI2RKmqh_JGxousEPEZNaE8dNzKDkFhw/s320/Screen+Shot+2018-12-17+at+9.59.01+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Due to market forces (the &quot;pricing of risk&quot;), investors cannot earn higher mean returns without also taking on higher variance (&quot;risk&quot;). &amp;nbsp;All investors have the option of a &quot;risk-free investment&quot; which is the safest government bonds (currently USA).&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtYkPXyLLFoKttJiOyWEabFiBAJgEbOztoNLZpXAh46XohBkHYB8ln1HB2V269m8IUoWvUC5BDmNGLIM4LkU8QxbhYejScg6lPp7VTVFBoTvf1nqmpUFFiPsQ_OG8qmkJZ6NG6qUgH71Y/s1600/Screen+Shot+2018-12-17+at+9.57.37+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;732&quot; data-original-width=&quot;1066&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtYkPXyLLFoKttJiOyWEabFiBAJgEbOztoNLZpXAh46XohBkHYB8ln1HB2V269m8IUoWvUC5BDmNGLIM4LkU8QxbhYejScg6lPp7VTVFBoTvf1nqmpUFFiPsQ_OG8qmkJZ6NG6qUgH71Y/s320/Screen+Shot+2018-12-17+at+9.57.37+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Investors seek to assemble portfolios of investments that match their appetite for risk and reward. Variance (&quot;risk&quot;) has two components: 1) &quot;idiosyncratic&quot; that is unique to each investment; and 2) &quot;systematic&quot; that is common to all investments. &amp;nbsp;By pooling many, many investments, an investor can &quot;diversify away&quot; the idiosyncratic risk, and thereby improving their return/risk ratio.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Investments inside a firm (i.e. capital investments) are treated the same as investments in firms themselves via common stock. &amp;nbsp;In fact, finance economists view &lt;i&gt;firms as&amp;nbsp;nothing more that bundles of cash flows&lt;/i&gt;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Investments are assumed to be &lt;i&gt;independent&lt;/i&gt;, but their returns may or may not be &lt;i&gt;correlated&lt;/i&gt;. &amp;nbsp;This can get complicated but here&#39;s a simple way to think about it. &amp;nbsp;Imagine two rental properties, A and B, in the same metropolitan area. &amp;nbsp;The returns on property A does not depend on whether you buy property B, and vice versa. &amp;nbsp;It doesn&#39;t matter what sequence you buy them, or what sequence you sell them. &amp;nbsp;That is &lt;i&gt;independence&lt;/i&gt;. &amp;nbsp; But the returns from property A and B will probably be correlated (rise and fall together, by the same percentage), because rents, maintenance costs, taxes, and resale prices are all governed by common processes.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Inside firms, economists assume that &lt;i&gt;all dependencies between investments&lt;/i&gt; are, themselves, investable securities. &amp;nbsp;These include options, futures, insurance, and so on. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
MPT ignores many real-world factors, like borrowing limits, collateral for borrowing, budget constraints, and bankruptcy (&quot;going bust&quot;).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
What&#39;s the Big Deal About MPT?&lt;/h3&gt;
&lt;div&gt;
The promise of MPT for investors is defining a unique set of optimal portfolios for each level of risk -- at the &lt;i&gt;efficient frontier&lt;/i&gt;. Furthermore, it posits the existence of an optimal portfolio (the &quot;tangency portfolio&quot;) that is both on the efficient frontier and also has the highest ratio of return to risk (&quot;Sharp ratio&quot;) along the best possible Capital Allocation Line (CAL), which is a mix of a risky portfolio and the risk-free asset.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaSd6ti1Rx0hBiXxDuD9ccO06lyRVmrYtPqkSV8etlItZapQh24skWTOmXsJKiO3cJv6PpHY2m5G-ILagScqiBO3A1WVVJ8akmTPqHuhboSdKN9txtc2MxJ2MZ20jq2tOyp3CI1Kdq0Xc/s1600/Markowitz_frontier.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;239&quot; data-original-width=&quot;434&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaSd6ti1Rx0hBiXxDuD9ccO06lyRVmrYtPqkSV8etlItZapQh24skWTOmXsJKiO3cJv6PpHY2m5G-ILagScqiBO3A1WVVJ8akmTPqHuhboSdKN9txtc2MxJ2MZ20jq2tOyp3CI1Kdq0Xc/s400/Markowitz_frontier.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
Why Might MPT Be Useful for Cyber Security Risk?&lt;/h3&gt;
&lt;div&gt;
If you think of cyber security as a collection of distinct &quot;risks&quot; (what I call &lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2013/08/risk-management-out-with-old-in-with-new.html&quot; target=&quot;_blank&quot;&gt;&quot;Little-r risk&quot; or &quot;risk bricks&quot;&lt;/a&gt;), &amp;nbsp;maybe it is possible to use MPT to choose an optimal portfolio of cyber security risks. &amp;nbsp;Maybe using MPT will also harmonize cyber security risk inside the general theoretical framework of economic finance. &amp;nbsp;Maybe economists and Chief Financial Officers (CFOs) will be happier.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
No. &amp;nbsp;MPT Does Not Apply to Cyber Security Risk.&lt;/h2&gt;
&lt;div&gt;
There are four reasons why cyber security does not fit the Modern Portfolio Theory (MPT) mold.&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Operational Risk is not Investment Risk&lt;/li&gt;
&lt;li&gt;It doesn&#39;t make sense to &quot;invest&quot; in cyber security risks&lt;/li&gt;
&lt;li&gt;You can&#39;t ignore dependencies&lt;/li&gt;
&lt;li&gt;&quot;Big R Risk&quot; is the best way to aggregate&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
I&#39;ll try to explain these as simply as possible.&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
1. Operational Risk is not Investment Risk&lt;/h3&gt;
&lt;div&gt;
In the view of Enterprise Risk Management, cyber security risk is a subset of the broader category called Operational Risk, which includes supply chain disruptions, outages due to natural disasters, process and quality problems, fraud losses, etc. &amp;nbsp;It is a mistake to try to bundle all these uncertain down-side costs into the variance of individual investments. &amp;nbsp;They are distinct (random, uncertain) generative processes with distinct effects on cash flow. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
The Only Reason Cyber Risk Exists is to &lt;i&gt;Enable&lt;/i&gt; the Main Profit-making Activities&lt;/h4&gt;
&lt;div&gt;
The profit-making assets (e.g. resources, equipment, people, projects, etc.) are primary. &amp;nbsp;Cyber security is only a supporting player. &amp;nbsp;It exists to serve and enable the primary profit-making assets. &amp;nbsp;Your business has to take on cyber security risk&amp;nbsp;&lt;i&gt;to even have the possibility of realizing&lt;/i&gt; investment returns (and risk). &amp;nbsp;In this way, it is more like your capital investment than it is the variable stream of investment returns.&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;u&gt;Analogy&lt;/u&gt;: cyber security is like the backup singers or band in a group centered on a star -- e.g. the Pips in &lt;i&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Gladys_Knight_%26_the_Pips&quot; target=&quot;_blank&quot;&gt;Gladys Knight and the Pips&lt;/a&gt;&amp;nbsp;&lt;/i&gt;and&amp;nbsp;&lt;a href=&quot;https://en.wikipedia.org/wiki/TCB_Band&quot; target=&quot;_blank&quot;&gt;Elvis Presley&#39;s backup band, TCB&lt;/a&gt;. &amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;u&gt;Even better analogy&lt;/u&gt;: cyber security is like the sound system and sound technicians for the band.&lt;/blockquote&gt;
&lt;div&gt;
Many people notice that investment risk includes &lt;i&gt;both &lt;/i&gt;upside and downside variability, while cyber security risk is all downside, all cost. This is because investors can take either side of the investment (in principle). &amp;nbsp;For every borrower there is a lender. &amp;nbsp;For every buyer of a stock there is a seller, including potentially short sellers. And so on.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;What&#39;s the upside of cyber security risk&lt;/i&gt;? &amp;nbsp;It&#39;s the profit-making assets that cyber security enables.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
(Even though threat agents profit (sometimes) from your cyber security loss events, their profits &lt;i&gt;do not count as &quot;upside&quot;&lt;/i&gt; to your company.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Here&#39;s a very crude example: &amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Let&#39;s say you run a team of gamblers playing blackjack in a casino. &amp;nbsp;It&#39;s a special casino where the house odds are negative, meaning that, on the whole and on average, gamblers make a profit. There is one catch. At random intervals, a random gambler is selected to play Russian Roulette with a labeled gun with an unknown number of chambers and unknown number of bullets. &amp;nbsp;A player can&#39;t earn any money from gambling unless that gambler also risks playing Russian Roulette. &amp;nbsp;If a gambler shoots a blank, they can report to you the label on the gun. &amp;nbsp;If a gambler kills themself, you learn nothing. &amp;nbsp;Even if you &quot;buy&quot; or &quot;rent&quot; your team members and replacements, it doesn&#39;t make since to bundle the cost and uncertainties of the&amp;nbsp;Russian Roulette&amp;nbsp;into the ups and downs of gambling winnings. &amp;nbsp;Some other method for estimating and accounting for risk is needed.&lt;/blockquote&gt;
&lt;div&gt;
Let&#39;s look our simplistic example of rental property:&amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
The variability in returns is governed mostly by the &quot;normal&quot; ups and downs in maintenance costs, rents, resale values, etc. that are driven by the local and national economies. &amp;nbsp;But there are other possible downside &quot;shocks&quot; like fire or natural disaster. &amp;nbsp;In the absence of insurance or risk pooling, any one of these shocks could destroy an individual rental property, or even a whole portfolio of rental properties in the same local area. &amp;nbsp;If the shock is big enough, it could wipe out an investor. &amp;nbsp;&lt;/blockquote&gt;
&lt;div&gt;
How would we compare these two rental properties? &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Property A has high return and high cash flow variability (&quot;investment risk&quot;), but low risk of fire.&lt;/li&gt;
&lt;li&gt;Property B has low return and low cash flow variability, but higher risk of fire.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
Because destructive house fires are rare, it becomes important to know how long you intend to hold each property before selling. &amp;nbsp;If you only hold Property B for a short time, maybe you can ignore the fire risk. &amp;nbsp;But a short holding time also increases the chances you will get lower than normal return or experience higher than normal downside cashflow. &amp;nbsp;You can&#39;t earn a return on A or B unless you take on some fire risk, so in that way it resembles your cash investment to buy the property.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The solution is to fully price the &quot;cost of fire risk&quot; in the form of insurance premiums you pay every month to cover the full cost of any fire. &amp;nbsp;(This simple example works if even if you buy all your insurance through an external carrier, pool your risk among other investors, self-insure, or a combination of these risk finance methods.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This solution is the essence of &quot;Risk-adjusted Return on Capital&quot; (RAROC) that is common in large banking and insurance companies. Unfortunately it is not well known or practiced in other industries.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;(Skip this example if you understand the section, above)&lt;/i&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Let&#39;s look at a very simple (and simplified) cyber security example. &amp;nbsp;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Say you have a 100% on-line business with a single dedicated web server. &amp;nbsp;Customers pay you a monthly fee to access and use the server through the Internet. &amp;nbsp;You do all the development and maintenance on this server. &amp;nbsp;You pay yourself a salary to keep up with the local cost of living. &amp;nbsp;Other recurring costs include office rent, taxes, accounting services, electricity, and Internet services. &amp;nbsp;You have some non-recurring costs for software, equipment, repairs, and security appliances and add-on software.&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Maybe you want to get investments from friends or family to expand, so you need to estimate their return on investment and risk. Assuming you have reached &quot;steady-state growth&quot;, you can forecast revenue and costs pretty well, though there are ups and downs each month, quarter, and year. &amp;nbsp;Since you are a solo operator, part of the variability relates to your own capabilities, effort, and energy (including health). &amp;nbsp;Your investors can compare your forecast return and risk to other solo operator businesses to get a good idea of a reasonable &quot;price&quot; (i.e. share of the business).&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
But what about potential losses due to cyber security breaches? &amp;nbsp;Is your business is vulnerable to ransomware that might wipe out all your customer data and all your business data, too? What about the losses your customers might experience if their data is breached on your system? What about fines from regulators or lawsuits from customers? And the list goes on and on. In their frequency and severity, these loss events look completely different from the normal &quot;ups and downs&quot; of the business. It&#39;s a mistake to try to roll these into normal variability.&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Instead, it&#39;s better to pay a monthly premium to cover the total cost of all non-recurring security costs -- a combination of self-insurance, commercial insurance, and contingent professional services. &amp;nbsp; &amp;nbsp;This monthly premium is different from your other monthly costs, because it goes into a reserve account for future use or investment in the mean time. &amp;nbsp;(Investing the premiums is how insurance companies make profits.)&lt;/blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
Plug in the cyber-insurance premium in a Risk-adjusted Return on Investment formula and you will be able to give your investors an accurate measure of investment risk &lt;i&gt;and&lt;/i&gt; cyber security risk.&lt;/blockquote&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;h3&gt;
2. It doesn&#39;t make sense to &quot;invest&quot; in cyber security risks&lt;/h3&gt;
&lt;div&gt;
Normally, we talk about &quot;accepting&quot; or &quot;absorbing&quot; or &quot;mitigating&quot; or &quot;preparing for&quot; operational risk. &amp;nbsp;We don&#39;t &quot;invest&quot; in operational risk the same way as we do capital investments (e.g. assets, securities, projects, etc.).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This isn&#39;t just a quirk of language. &amp;nbsp;Investment risk is chosen, while cyber security risk is imposed upon you just for the right to be in business. &amp;nbsp;Investment risk is positively related to expected return. &amp;nbsp;The same is not true for cyber security risk.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Someone might say: &quot;But maybe we &#39;invest&#39; in certain cyber risks when we decide to pursue certain lines of business or markets or business models. &amp;nbsp;Can&#39;t we call these &#39;investments&#39; under MPT?&quot;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I don&#39;t think this works. &amp;nbsp;You can&#39;t get an MPT-style return-risk model that bundles in cyber security risk into these different scenarios. &amp;nbsp;In each scenario, you have to &quot;pay the ante&quot; of cyber security risk to play the game. &amp;nbsp;Yes, you want to minimize the cost of risk through mitigations, controls, response &amp;amp; recovery, etc., but that&#39;s a separate dynamic from the normal &quot;ups and downs&quot; of the business.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
3. You can&#39;t ignore dependencies&lt;/h3&gt;
&lt;div&gt;
Above, I said that MPT treats each investment as an independent (but possibly correlated) cash flow, independent from all the other investments. &amp;nbsp;That is most emphatically not true for cyber security investments and risks. &amp;nbsp;Cyber security and associated loss events are run through with dependencies and contingencies. &amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Consider the significance of your company&#39;s business model and enterprise architecture (people, process, and technology), coupled with your information security architecture. &amp;nbsp;These are platforms on which you build your business, and all the security decisions and investments you make here will determine the performance and results of everything else. &amp;nbsp;Each individual cyber security risk (&quot;Little r&quot;) is dependent on all these platform elements. &amp;nbsp;Likewise, there is also dependence between &quot;Little r risks&quot;. Somehow, we need a way to factor in all these dependencies and platform effects. &amp;nbsp;That&#39;s where &quot;Big R Risk&quot; comes in.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
4. &quot;Big R Risk&quot; is the best way to aggregate&lt;/h3&gt;
&lt;div&gt;
Instead of trying to build a &quot;portfolio&quot; of many &quot;Little r risk&quot; bricks, I recommend a different approach called &quot;Big R Risk&quot;. I&#39;ve written a &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2013/08/risk-management-out-with-old-in-with-new.html&quot; target=&quot;_blank&quot;&gt;long blog post&lt;/a&gt; explaining it, so I won&#39;t go into depth here. &amp;nbsp;Basically, the goal is to minimize Total Cost of Risk to enable the business. &amp;nbsp;Total Cost of Risk (TCoR) is the sum of:&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Total budgeted cyber security costs (direct and indirect, frequent incidents)&lt;/li&gt;
&lt;li&gt;Self-insurance premiums (including commercial insurance, if any)&lt;/li&gt;
&lt;li&gt;Allocation of disaster recovery and business continuity costs&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
Estimating these costs, and making them operational, takes a bit of doing, but is not out of the realm of possibility or feasibility. &amp;nbsp;Every business should be able to estimate the first element -- Budgeted Costs -- using nothing but accounting resources and methods (e.g. activity-based costing). &amp;nbsp;The trickiest one is 2) Self-insurance, but that&#39;s beyond our scope in this article.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h2&gt;
Further Reading&lt;/h2&gt;
&lt;div&gt;
Here are a few good articles that assume you already know something about economic analysis and investment finance, some math and some code:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/Modern_portfolio_theory&quot; target=&quot;_blank&quot;&gt;Modern Portfolio Theory - Wikipedia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://www.investopedia.com/walkthrough/fund-guide/introduction/1/modern-portfolio-theory-mpt.aspx&quot; target=&quot;_blank&quot;&gt;Modern Portfolio Theory - Investopedia&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://faculty.washington.edu/ezivot/econ424/introductionPortfolioTheory.pdf&quot; target=&quot;_blank&quot;&gt;Introduction to Portfolio Theory (math! &amp;nbsp;code!)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://economistatlarge.com/portfolio-theory/introduction-to-portfolio-theory&quot; target=&quot;_blank&quot;&gt;Introduction to Modern Portfolio Theory (worked examples in Excel and R)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/7636216892909992025/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/12/does-modern-portfolio-theory-mpt-apply.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7636216892909992025'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7636216892909992025'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/12/does-modern-portfolio-theory-mpt-apply.html' title='Does Modern Portfolio Theory (MPT) apply to cyber security risks?'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtdd4z-GX59Pfg3-VsFe7OGMcPCWMLFSMnr0TCFqRt-GH1JMXabWTbifuEC9gj7QX4sqV2wqlkdwDU4dbv9TguI9DFLl_JRvPgLuI7KT-Sl7cvlHHgTpnKygXaQwuBn7X-Mvmi9SOcY2w/s72-c/Screen+Shot+2018-12-17+at+9.03.33+PM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-7861463876016106874</id><published>2018-11-08T06:59:00.004-08:00</published><updated>2018-11-08T06:59:57.187-08:00</updated><title type='text'>NIST Cybersecurity Risk Management Conference</title><content type='html'>I&#39;m presenting today in a 45 minute session. &amp;nbsp;It&#39;s a quick overview of previous topics, focused on the Ten Dimensions. &amp;nbsp;The emphasis in this short presentation will be on defining what &quot;performance&quot; means and why managing performance in cyber security is not simply a matter of implementing a list of practices. Below are the slides and relevant blog posts.&lt;br /&gt;
&lt;br /&gt;
Here is an Applicability Matrix I created that shows how the existing NIST CSF 1.1 applies to each of the Ten Dimensions. &amp;nbsp;You&#39;ll notice that there are only a few blue squares, which indicates that the Ten Dimensions is a different way of carving up the space. &amp;nbsp;This has plusses and minuses, of course. &amp;nbsp;In the blog posts on the Ten Dimensions, I explain and justify. &amp;nbsp;You&#39;ll also notice that some of the Ten Dimensions are poorly covered -- 3. Effective Design &amp;amp; Development; 8. Effective Agility and Learning (incl.. metrics); and 9. Optimize Total Cost of Risk.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6IjlNrcB0irSi6cxmJOnxpsPFaWJ0RsTHsrMQfWkQeeUV8oUpOt0xvXn_bA_FZmsU7pFpPjM63NHYYstS1VSn_82W449VBgICiUiDtB5_0zhT-MusNjCo-oNYtndMQegl6RfzPK1oPrE/s1600/Applicability+of+NIST+CSF+to+10+Dimensions.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;958&quot; data-original-width=&quot;1596&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6IjlNrcB0irSi6cxmJOnxpsPFaWJ0RsTHsrMQfWkQeeUV8oUpOt0xvXn_bA_FZmsU7pFpPjM63NHYYstS1VSn_82W449VBgICiUiDtB5_0zhT-MusNjCo-oNYtndMQegl6RfzPK1oPrE/s400/Applicability+of+NIST+CSF+to+10+Dimensions.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Applicability Matrix. Rows = 10 Dimensions. Columns = NIST CSF.&lt;br /&gt;Darker colors = more CSF items are applicable.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://drive.google.com/file/d/1W2NG-4PB5NQoi83YsTM5mjK4YlaJjmDH/view?usp=sharing&quot; target=&quot;_blank&quot;&gt;Slides&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://drive.google.com/file/d/1FKxfANFtB0OObFeLX3v9gzeJ86gi7AQv/view?usp=sharing&quot; target=&quot;_blank&quot;&gt;NIST CSF to 10 Dimensions spreadsheet&lt;/a&gt;&amp;nbsp;with Applicability Matrix&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2013/06/ten-dimensions-of-cyber-security.html&quot; target=&quot;_blank&quot;&gt;Ten Dimensions of Cyber Security Performance (blog posts)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2014/02/thomas-scoring-system.html&quot; target=&quot;_blank&quot;&gt;How to aggregate ground-truth metrics into a performance index&lt;/a&gt;&amp;nbsp;(blog post)&lt;/li&gt;
&lt;li&gt;Aggregating risk:&amp;nbsp;&lt;a href=&quot;https://exploringpossibilityspace.blogspot.com/2013/08/risk-management-out-with-old-in-with-new.html&quot; target=&quot;_blank&quot;&gt;Risk Management: Out with the Old, In with the New!&lt;/a&gt; (blog post)&lt;/li&gt;
&lt;/ul&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/7861463876016106874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/11/nist-cybersecurity-risk-management.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7861463876016106874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7861463876016106874'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/11/nist-cybersecurity-risk-management.html' title='NIST Cybersecurity Risk Management Conference'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6IjlNrcB0irSi6cxmJOnxpsPFaWJ0RsTHsrMQfWkQeeUV8oUpOt0xvXn_bA_FZmsU7pFpPjM63NHYYstS1VSn_82W449VBgICiUiDtB5_0zhT-MusNjCo-oNYtndMQegl6RfzPK1oPrE/s72-c/Applicability+of+NIST+CSF+to+10+Dimensions.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-4316300505120811407</id><published>2018-04-16T13:45:00.001-07:00</published><updated>2018-04-16T13:46:35.033-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="presentations"/><title type='text'>Presentation: Navigating the Vast Ocean of Browser Fingerprints</title><content type='html'>&lt;a href=&quot;https://drive.google.com/file/d/10HiOt1FnV0WxKaoxmpoMYb6HJMCwPsFT/view?usp=sharing&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt; a PDF version of my BSides San Francisco presentation. (Today, Monday at 4:50pm)&lt;br /&gt;
&lt;br /&gt;
COMING SOON: &amp;nbsp;GitHub repo with Python and R code, plus sample data. &amp;nbsp;Watch this space.</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/4316300505120811407/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/04/presentation-navigating-vast-ocean-of.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/4316300505120811407'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/4316300505120811407'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/04/presentation-navigating-vast-ocean-of.html' title='Presentation: Navigating the Vast Ocean of Browser Fingerprints'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-3007829052345510356</id><published>2018-03-07T13:29:00.004-08:00</published><updated>2020-04-01T09:33:41.309-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="black swans"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="probability"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><category scheme="http://www.blogger.com/atom/ns#" term="surprise"/><title type='text'>The Swan of No-Swan: Ambiguous Signals Tied To Cataclysmic Consequences</title><content type='html'>&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVGkpfEtv8p8u-2_kK4lvXHKy4kDRqm91R4u2L9q5ahjmdvxPeoOZRs-QfanNIJkmBIChTD4FGqbrMKxq_SeWe9LGpOUNntu6wL0bh4aPoBTAOdZ7tdRGFcjlVvC5dyJVj0JZRNgoTdrc/s1600/ambiguous+swan.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;989&quot; data-original-width=&quot;1204&quot; height=&quot;262&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVGkpfEtv8p8u-2_kK4lvXHKy4kDRqm91R4u2L9q5ahjmdvxPeoOZRs-QfanNIJkmBIChTD4FGqbrMKxq_SeWe9LGpOUNntu6wL0bh4aPoBTAOdZ7tdRGFcjlVvC5dyJVj0JZRNgoTdrc/s320/ambiguous+swan.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;What do you see? colored blocks, or a Black Swan, or both?&lt;br /&gt;
This is figure-ground reversal, a type of ambiguity.&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
We are in the middle of the 100th anniversary of the Great War (a.k.a. World War I). &amp;nbsp;None of the great powers wanted a long total war. Yet the unthinkable happened anyway. &lt;br /&gt;
&lt;br /&gt;
Surprisingly, historians are still struggling to understand what caused the war.&lt;br /&gt;
&lt;br /&gt;
One of the biggest causal factors was &lt;i&gt;ambiguous signals&lt;/i&gt;&amp;nbsp;that precipitated cascading actions and reactions. When tied to cataclysmic consequences, this represents a distinct class of &quot;Black Swan&quot; systems.&lt;br /&gt;
&lt;br /&gt;
(Here are some great lectures for those interested in a full analysis of causes of the Great War:&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=2gF_6j2pQzg&quot; target=&quot;_blank&quot;&gt;Margret MacMillan&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=iMBD71SB10E&quot; target=&quot;_blank&quot;&gt;Michael Neiburg&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=0mw6UJc6tYA&quot; target=&quot;_blank&quot;&gt;Sean McMeekin&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;color: #222222; font-family: &amp;quot;Times New Roman&amp;quot;, Times, FreeSerif, serif; font-size: 15.399999618530273px; margin: 0px; position: relative;&quot;&gt;
Rethinking &quot;Black Swans&quot;&lt;/h4&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;As I have mentioned at the start of this series, the &quot;Black Swan event&quot; metaphor is a conceptual mess. (This post is &lt;i&gt;seventh&lt;/i&gt; in the series &quot;&lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2013/07/think-you-understand-black-swans-think.html&quot; target=&quot;_blank&quot;&gt;Think You Understand Black Swans? Think Again&lt;/a&gt;&quot;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;.)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;color: #222222; font-family: &amp;quot;Times New Roman&amp;quot;, Times, FreeSerif, serif; font-size: 15.399999618530273px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;It doesn&#39;t make sense to label any set of events as &quot;Black Swans&quot;. &amp;nbsp;It&#39;s not the events themselves, but instead they are processes that involve generating mechanisms, our evidence about them, and our method of reasoning that make them unexpected and surprising.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Definition&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;A &quot;Swan of No-Swan&quot; is a process where:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;generating process&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; is some set of large opposing forces that can be triggered by a set of signals or decisions tied to ambiguous signals;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;The &lt;/span&gt;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;evidence&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; are signals -- communications, interpreted actions, interpreted inaction, rhetoric/discourse, irreversible commitments -- that have &lt;i&gt;ambiguous interpretations&lt;/i&gt;, either intentionally or unintentionally;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;The &lt;i&gt;method of reasoning&lt;/i&gt;&amp;nbsp;either rational expectations (normative Decision Science) or biased expectations (Behavioral Psychology and Economics). &amp;nbsp;The &lt;i&gt;key feature&lt;/i&gt; is lack of attention or awareness that one might be mis-perceiving the signals, combined with a strategic preference for precautionary aggressiveness.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;span style=&quot;background-color: white; color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Main Features&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;First, let us recognize that ambiguity is pervasive in social, business, and political life. &amp;nbsp;Ambiguous signals and communication have many pro-social functions: keeping our options open, saving face, avoiding insult or&amp;nbsp;offense, optimistic interpretation of events, and so on. &amp;nbsp;They are especially prevalent in the lead-up to major commitments -- romance+marriage in personal life and big ticket sales in commercial life.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Most of the time, ambiguity has a smoothing effect. &amp;nbsp;It reduces the probability of extreme/rare events&amp;nbsp;because of the flexibility of action and response associated with ambiguous signals. &amp;nbsp;Therefore, most people would not associate ambiguous signals with any type of &quot;Black Swan&quot; phenomena.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;But when tied to &quot;large opposing forces&quot;, things change and that&#39;s why this deserves to be a separate type of Black Swan. &amp;nbsp;Ambiguous signals become dangerous when they are linked to&amp;nbsp;cataclysmic processes via certain types of reasoning processes. &amp;nbsp;It&#39;s not rational vs. biased. &amp;nbsp;Instead, it&#39;s committed&amp;nbsp;self-confidence vs.&amp;nbsp;self-aware&amp;nbsp;fallibility. In&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;committed&amp;nbsp;self-confidence, there&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;&amp;nbsp;is lack of attention or awareness that one might be mis-perceiving the signals, combined with a strategic preference for precautionary aggressiveness. &amp;nbsp;&quot;Shoot first, ask questions later&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Examples&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Military forces&amp;nbsp;leading to total war are the obvious case, and most common in history. &amp;nbsp; But we are now in a new age -- the&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;font-size: 15.399999618530273px;&quot;&gt;Cyber Age&lt;/i&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;! &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;(Yes. &amp;nbsp;I said it.&amp;nbsp;&lt;/span&gt;&lt;i style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot;, times, freeserif, serif; font-size: 15.399999618530273px;&quot;&gt;Cyber&lt;/i&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;) &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;Here are some cyber examples.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;i style=&quot;font-size: 15.399999618530273px;&quot;&gt;Offensive cyber capabilities&lt;/i&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; --&amp;nbsp;By &quot;offensive&quot; I mean everything from &quot;hack back&quot; to&amp;nbsp;punitive or disabling cyber attacks on critical infrastructure. If it becomes common for nation states and various non-nation actors to develop and deploy offensive capabilities, they everyone faces the strategic dilemma as to when and how much to deploy/trigger each capability. &amp;nbsp;This depends critically on the ability of each actor to detect and accurately interpret a wide variety of signals and evidence related to normal and abnormal activity, including breach events, threat actor attribution, signs of escalation, and so on. &amp;nbsp;These are all swimming in ambiguity, including intentional ambiguity (spoofing,&amp;nbsp;camouflage, etc.)&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;i style=&quot;font-size: 15.399999618530273px;&quot;&gt;Remote kill switches&lt;/i&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; -- What if Internet of Things (IOT) makers build &quot;remote&amp;nbsp;kill switches&quot; in their devices? After all, we&#39;d like to prevent our toaster,&amp;nbsp;pacemaker, automobile, or drone from doing harm in the case when it starts malfunctioning catastrophically. &amp;nbsp;Are there scenarios where one or more IOT manufacturers decide to remotely kill at the same time? &amp;nbsp;What if their monitoring instruments make it &lt;/span&gt;&lt;i style=&quot;font-size: 15.399999618530273px;&quot;&gt;appear&lt;/i&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; that some threat actor(s) are making self-driving cars intentionally crash into crowds of people? &amp;nbsp;Out of an abundance of caution, they might remotely kill the IOT devices to cut off the apparent disaster as it is unfolding. &amp;nbsp;But maybe the threat actor is &lt;/span&gt;&lt;i style=&quot;font-size: 15.399999618530273px;&quot;&gt;only spoofing&lt;/i&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt; the signals because they pwned the monitoring devices and infrastructure. &amp;nbsp;Or maybe it&#39;s the precautionary&amp;nbsp;action of some other IOT device&amp;nbsp;system owner that is causing your monitoring system to go bonkers. &amp;nbsp;I could go on but you get the idea.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;How to Cope with Swan of No-Swan&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;It would be good to decouple the generating process if possible. &amp;nbsp;Avoid the arms race to begin with. &amp;nbsp;(Give peace a chance!)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Absent that, the best antidote is to treat evidence and signals pluralistically, which means avoiding the tendency to commit to one&amp;nbsp;interpretation or another too early. &amp;nbsp;This is very hard to do within one person or even one cohesive team. It&#39;s easier to assign different &quot;lenses&quot; to different people or teams who then proceed with their analysis and decision recommendations independently.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;Finally, the decision makers who can &quot;pull the trigger&quot; should seek strategy alternatives to&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15.399999618530273px;&quot;&gt;the preference for precautionary aggressiveness (&quot;Shoot first, ask questions later&quot;). &amp;nbsp;While decision makers may feel like this is their only choice (and it may be), there is great advantage if more flexible alternatives can be found.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15.399999618530273px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/3007829052345510356/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/03/the-swan-of-no-swan-ambiguous-signals.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/3007829052345510356'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/3007829052345510356'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2018/03/the-swan-of-no-swan-ambiguous-signals.html' title='The Swan of No-Swan: Ambiguous Signals Tied To Cataclysmic Consequences'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVGkpfEtv8p8u-2_kK4lvXHKy4kDRqm91R4u2L9q5ahjmdvxPeoOZRs-QfanNIJkmBIChTD4FGqbrMKxq_SeWe9LGpOUNntu6wL0bh4aPoBTAOdZ7tdRGFcjlVvC5dyJVj0JZRNgoTdrc/s72-c/ambiguous+swan.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-4160691177053240423</id><published>2016-10-31T08:30:00.000-07:00</published><updated>2016-11-02T15:03:16.913-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber insurance"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="innovation"/><title type='text'>The Cyber Insurance Emperor Has No Clothes</title><content type='html'>&lt;br /&gt;
&lt;i&gt;(Of course, the title is hyperbole and attention-seeking. Now that you are here, I hope you&#39;ll keep reading.)&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: right;&quot;&gt;
&lt;/div&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrR-fYyAz4NGYrHw-DbVmJVHwUOj9vFazx93sOqbT4gF-XelUlKi66Ga2jFEHSqZcr_L0dQNPtgJC8nV5idmKzbEzhsxBxhzCuIGWtNBvMW12yed0Paf-mg2OlDKjawRhH4pDet9Q8X8M/s1600/emperor_no_clothes_quotes.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrR-fYyAz4NGYrHw-DbVmJVHwUOj9vFazx93sOqbT4gF-XelUlKi66Ga2jFEHSqZcr_L0dQNPtgJC8nV5idmKzbEzhsxBxhzCuIGWtNBvMW12yed0Paf-mg2OlDKjawRhH4pDet9Q8X8M/s320/emperor_no_clothes_quotes.png&quot; width=&quot;235&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
In the Hans Christian Anderson story,&amp;nbsp;&lt;a href=&quot;https://en.wikisource.org/wiki/The_Fairy_Tales_of_Hans_Christian_Andersen_(Stratton)/The_Emperor%27s_New_Clothes&quot; style=&quot;font-style: italic;&quot;&gt;The Emperor&#39;s New Clothes,&lt;/a&gt;&amp;nbsp;the collective delusion of the Emperor&#39;s grand clothes was burst by a young child who cried out: &quot;But he has got nothing on!&quot;&lt;br /&gt;
&lt;br /&gt;
I don&#39;t mean that cyber insurance has &lt;i&gt;no&lt;/i&gt; value or that it is a charade.&lt;br /&gt;
&lt;br /&gt;
My main point: &lt;b&gt;cyber insurance has&amp;nbsp;&lt;i&gt;the wrong clothes&lt;/i&gt;&amp;nbsp;for the purposes and social value to which it aspires.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This blog post sketches the argument and evidence. I will be following up separately with more detailed and rigorous analysis (via computational modeling) that, I hope, will be publishable.&lt;br /&gt;
&lt;br /&gt;
tl;dr: (switching metaphors)&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;As a driving force for better cyber risk management, today&#39;s cyber insurance is about as effective as eating soup with a fork.&lt;/i&gt;&lt;/blockquote&gt;
(This is a long post. For readers who want to &quot;cut to the chase&quot;, &amp;nbsp;you can skip to the &quot;Cyber Insurance is a Functional Misfit&quot; section.)&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;There has been a ton of industry and academic articles on cyber insurance. On the academic side, nearly all of it has been economic analysis (mostly theoretical, some empirical). My lens is different: Organization Science. The focus is&amp;nbsp;&lt;i&gt;functional&lt;/i&gt; -- how do organizations actually work and make decisions.&lt;br /&gt;
&lt;br /&gt;
This essay centers on cyber insurance in the USA, but except for some regulatory details, I believe that my argument holds for other regions.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Cyber Insurance as &quot;Emperor&quot;&lt;/h3&gt;
The conventional wisdom in cyber security economics and policy circles is that the world would be a better and safer place if every firm (or most firms) bought cyber insurance. This idea is so widely accepted that what people mostly debate is &quot;how do we promote cyber insurance as a market and industry?&quot; and &quot;what can we do to complement cyber insurance (e.g. standards, regulation, safe harbors, etc.)?&quot; Certainly some people think that other institutions would work &lt;i&gt;better&lt;/i&gt; (e.g. legal liability and tort law, regulatory mandates and penalties, technological solutions). But almost no one has come forward to proclaim that cyber insurance, in its present form, was not fit for purpose.&lt;br /&gt;
&lt;br /&gt;
Thus, metaphorically, cyber insurance has become a conceptual &quot;Emperor&quot; to whom nearly everyone pays homage.&lt;br /&gt;
&lt;br /&gt;
Like nearly all liability insurance, the putative economic function of cyber insurance is &lt;i&gt;risk transfer&lt;/i&gt;&amp;nbsp;from the insured parties to the insurers. But almost no one argues that the main problem with cyber security today is that insured parties (firms, consumers) are bearing &lt;i&gt;excessive risk&lt;/i&gt; and therefore underinvest. This is not the desired social benefit has earned cyber insurance the honorific of &quot;Emperor&quot;.&lt;br /&gt;
&lt;br /&gt;
While most business insurance companies and lines operate on the value proposition of risk transfer, there is a subset that have been centered on risk reduction and best practices in addition to risk transfer. The exemplar is &lt;a href=&quot;https://www.munichre.com/HSB/hsb-history/index.html&quot;&gt;Hartford Steam Boiler&lt;/a&gt;, founded in 1866:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot; &#39;the first company in America devoted primarily to industrial safety.&#39; &#39;Hartford Standards&#39; quickly became the specifications for boiler design, manufacture and maintenance.&quot;&lt;/blockquote&gt;
In the same vein, the desired social benefits of cyber insurance are four-fold (paraphrasing):&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;&quot;...provide financial &lt;i&gt;incentives&lt;/i&gt; for firms to &lt;i&gt;adopt best practices&lt;/i&gt;&quot;&lt;/li&gt;
&lt;li&gt;&quot;...promote the &lt;i&gt;adoption of standards&lt;/i&gt; that are compatible with best practices&quot;&lt;/li&gt;
&lt;li&gt;&quot;Cyber insurance will be &lt;i&gt;more agile than regulations&lt;/i&gt;, thereby more likely to promote good things and avoid bad unintended consequences.&quot;&lt;/li&gt;
&lt;li&gt;&quot;Insurance companies will&amp;nbsp;&lt;i&gt;build ever-better models of risk&lt;/i&gt;&amp;nbsp;so that collectively we will be better able to quantify the costs and benefits of specific security practices.&quot;&lt;/li&gt;
&lt;/ol&gt;
Here is video from a panel discussion hosted by New America Foundation on&amp;nbsp;Oct. 28, 2016. Robert Morgus (Policy Analyst, New America) gives a good, concise summary of cyber insurance, the current state, and (at &lt;b&gt;46:37&lt;/b&gt;), he enumerates the three of the four social benefits listed above.&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;https://www.youtube.com/embed/RoomgZLu22I?t=39m15s&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;
&lt;/center&gt;
&lt;br /&gt;
(The purpose of the panel event was to promote their new book&amp;nbsp;&lt;a href=&quot;http://www.cyberinsecuritybook.org/table-of-contents&quot;&gt;&lt;i&gt;Cyber Insecurity: Navigating the Perils of the Next Information Age&lt;/i&gt;&lt;/a&gt;, which looks quite interesting.)&lt;br /&gt;
&lt;br /&gt;
For more comprehensive summary, here is an hour-long video panel discussion that provides a comprehensive summary of cyber insurance and how it &lt;i&gt;should&lt;/i&gt; improve cyber risk management:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.youtube.com/watch?v=EqO9PoaFUbg&quot;&gt;https://www.youtube.com/watch?v=EqO9PoaFUbg&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
More panels, more conventional wisdom:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://youtu.be/pAy4KHRNpFU?t=32m41s&quot;&gt;https://youtu.be/pAy4KHRNpFU?t=32m41s&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;https://youtu.be/uTwk6RIxv5M?t=2m13s&quot;&gt;https://youtu.be/uTwk6RIxv5M?t=2m13s&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
From DHS: &quot;Cybersecurity Insurance Industry Readout Reports&quot;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;https://www.dhs.gov/publication/cybersecurity-insurance-reports&quot;&gt;https://www.dhs.gov/publication/cybersecurity-insurance-reports&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
Cyber Insurance&#39;s &quot;Fine Clothes&quot;&lt;/h3&gt;
&lt;div&gt;
The metaphorical &quot;clothing&quot; of cyber insurance are the &lt;i&gt;capabilities&lt;/i&gt; associated with insurance companies and their functional ecosystem (i.e. value networks, legal and regulatory environment, professional societies, trade groups, academic programs and certifications, etc.). The claim that cyber insurance will deliver the desired social benefits is equivalent to saying that cyber insurance has the right capabilities, given the characteristics and job-to-be-done in the marketplace.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;i&gt;[EDIT: Moved &quot;Analytic Framework&quot; to the end]&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 id=&quot;misfit&quot;&gt;
Cyber Insurance is a Functional Misfit&lt;/h3&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This section aims to itemize how cyber insurance is a misfit, given the desired social benefits. First, what do firms need from cyber security and cyber insurance?&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
The Cyber Security &quot;Job to Be Done&quot;&lt;/h4&gt;
&lt;div&gt;
The &quot;job to be done&quot; (see&amp;nbsp;&lt;a href=&quot;http://hbswk.hbs.edu/item/clay-christensen-the-theory-of-jobs-to-be-done&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://www.christenseninstitute.org/multimedia/understanding-the-job/&quot;&gt;here&lt;/a&gt;) for firms and consumers is to make better decisions and investments regarding cyber security so that the expected benefits of &quot;good things&quot; outweighs the uncertain costs and worry over &quot;bad things&quot;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Compared to other major decisions involving risk (e.g. buying a house, building a factory, licensing a patent), cyber security decisions are both &lt;i&gt;distributed&lt;/i&gt; (in time and space) and &lt;i&gt;complex&lt;/i&gt; (feedback loops, nonlinearities, etc.). In medium to large organizations, there are hundreds or thousands of &lt;i&gt;key decisions and decision makers&amp;nbsp;&lt;/i&gt;that matter -- security staffing and training, IT architecture, vendor and outsourcing strategy and practices, business process design, hiring/staffing/performance incentives, and so on. And these go beyond what most people focus on: security products/appliances (e.g. firewalls, proxies, anti-malware, etc.) and security policies (e.g. password length/complexity, administrator rights, etc.).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The &quot;job to be done&quot; is to influence (a.k.a. &quot;nudge&quot;) the decision and implementation process at all (or most) of these points. Nearly all firms have no idea how all these decisions influence each other and how they influence overall cyber security risk. (The&amp;nbsp;&lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2013/06/ten-dimensions-of-cyber-security.html&quot;&gt;Ten Dimension Framework&lt;/a&gt; that I have proposed is one approach to solving this problem: managing for cyber security performance.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
Cyber Insurance Misfits in Ten Ways&lt;/h4&gt;
&lt;div&gt;
What cyber insurance does is governed by their existing capabilities and functions of insurance firms, and their supporting ecosystem. In terms of capabilities and routines, cyber insurance is not significantly different than other forms of business insurance. The contracts look similar, the sales process is similar, the pricing/underwriting is similar, the marketing is similar, and the regulatory oversight is similar.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;[EDIT]&lt;/i&gt;&lt;br /&gt;
For readers interested in the theoretical/analytical framework, see the Appendix section at the end.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I will organize my argument for misfits under ten&amp;nbsp;desiderata:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
1. Cyber Insurance is Bought by and Sold to the Wrong People&lt;/h4&gt;
&lt;div&gt;
Cyber insurance is bought by, and sold to, the same people who buy other types of business insurance. These folks are in Finance, Legal, or maybe the Corporate Risk department (if it exists). In any complex business-to-business sales process, the buyers are generally a network of people, taking different roles and having different interests, e.g. economic buyers, user buyers, technical buyers, and coaches (i.e. internal allies for the vendor&#39;s sales team). Many organizations even outsource the process of insurance buying because they lack the expertise internally. A high percentage of corporate insurance is sold through brokers, who try to serve the needs of insurance providers and consumers, though in reality their interests are closely tied to providers.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Whose budget does it come out of? Not out of the CIO&#39;s or CISO&#39;s budget, nor out of any Line of Business executive. It comes out of some corporate budget under the CFO. &lt;i&gt;Maybe&lt;/i&gt; it is allocated to business units, but probably bundled in with all the other corporate allocations.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Whose capital budget gets affected? Nobody&#39;s. Whose headcount increases or decreases? Nobody&#39;s.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
When all the contract details are being negotiated, and all the forms and checklists are being generated and processed, who (in the buying organization) is mapping &lt;i&gt;all&lt;/i&gt; that back to decisions and investments that influence security? Nobody.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Turn it around. Look at the most significant decisions and investments that affect security. Who makes those decisions? Who influences them? Who monitors them and gives feedback? Now that you have that set of people in mind -- how many of those people have any involvement in or awareness of the cyber insurance buying process? Close to zero.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In terms of affordances&lt;i&gt; &lt;/i&gt;(see Appendix), the insurance industry does not have a sales/demand creation capability that is suited to the diffuse, poorly organized buying network in most organizations. What do both organizations do? They engage with the affordances that the &lt;i&gt;are&lt;/i&gt; compatible with (same old sellers and buyers), just to make transactions work.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
As a consequence, sellers don&#39;t get the corrective feedback they need, and neither do buyers. None of the people who are most important for cyber security have anything to do with the cyber insurance purchase process, and vice versa. The cyber insurance that gets bought -- with all the contract complexities, limits, and premium cost -- has a remote connection to what is actually going on in the organization, especially regarding key decisions and investments. Result: the products, services, and prices don&#39;t face effective selective pressure (in the evolutionary sense), and therefore they don&#39;t improve and instead stay stuck in the swamp.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
2. The Information Basis for Underwriting Decisions is Weak&lt;/h4&gt;
&lt;div&gt;
Underwriting is the process of setting coverages, limits, conditions, and premium prices. On what basis do they make this decision for cyber insurance. In a large majority of cases, the information comes from questionnaires, checklists, audit results, or other qualitative evaluations, and only once per purchase cycle. (There are some insurance companies that are starting to incorporate ratings and scores by firms like &lt;a href=&quot;https://www.bitsighttech.com/&quot;&gt;Bitsight&lt;/a&gt;, &lt;a href=&quot;http://www.riskrecon.com/&quot;&gt;RiskRecon&lt;/a&gt;, and &lt;a href=&quot;https://www.cyence.net/&quot;&gt;Cyence&lt;/a&gt;. But it is not yet clear how this information will influence underwriting or premiums.)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I argue there are two sub-misfits. The first misfit is that none of the information that insurance companies get about a firm is contextualized. For example, what is the difference in risk between two hospitals: Hospital A that has two factor authentication for all users but also has many people with system administrator privileges; vs Hospital B that has very few system administrators but almost no two factor authentication? The answer (if there is one) depends on all the other information and security features of their organization. But the insurance company doesn&#39;t see any of the systemic nature of this. All they see are check boxes (yes/no), or categorical answers, or sometimes numbers.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The second misfit is that insurance underwriters are making &lt;i&gt;course grained decisions&lt;/i&gt; based on a hodge-podge of qualitative information that may or may not have anything to do with risk posture.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Several years ago, I had a conversation with someone at a conference who was knowledgeable about underwriting and risk management practices at diversified insurance firms. He said, basically, that cyber insurance was being treated as a &quot;long term development&quot; market, and that firms offering policies today were hoping to have good models of risk ten or twenty years from now. In the mean time, cyber risk was being bundled in with all the other &quot;developmental risks&quot; and as long as it, alone, wasn&#39;t generating too much in the way of losses, it would be OK for the insurers. In other words, cyber insurance was being priced like it was the table stakes at a (long term) poker game. (See #4, below).&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
3. The Structure of Cyber Insurance Contracts is a Poor Fit&lt;/h4&gt;
&lt;div&gt;
The structure of cyber insurance contracts reflects the interests and world view of insurance firms and their ecosystem. Like nearly every insurance contract these days, they are long and complex, with limits, exclusions, deductibles, co-pays, riders, footnotes, and exit clauses &quot;up the wazoo&quot;.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
While the putative economic value of cyber insurance is risk transfer, in reality insurance companies (and their reinsurers) do not want &lt;i&gt;too much risk&lt;/i&gt; transferred, &lt;i&gt;of the wrong kind&lt;/i&gt; (esp. cascading, correlated risk).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But most firms and nearly all consumers do not really benefit economically from risk transfer. What they want (implicitly) is&lt;i&gt; risk pricing&lt;/i&gt; so they can factor that into today&#39;s decisions and investments. All of the complexity of cyber insurance contracts makes it harder, not easier, for firms to do risk pricing, taking into account &lt;i&gt;ALL&lt;/i&gt; of their costs under &lt;i&gt;ALL&lt;/i&gt; contingent circumstances.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Imagine you wanted to estimate how much you would weigh at the end of the week, given how much food and exercise you have during the week. You buy a digital fitness &amp;amp; diet tracking device. GREAT! But then you find out that it will only report calories consumed while sitting down and motionless, in solid form, and not more than once per hour. And it will only report exercise when the sun is up and the temperature is between 55 and 65 degrees. Everything else is on you. THANKS FOR NOTHING!&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
4. The Claims Process is Too Expensive, Too Uncertain, and Not Frequent Enough&lt;/h4&gt;
The capability for processing claims (administrative, legal, financial, etc.) is a core competency of insurance firms. But it is tuned for infrequent use by any given insured party. The claims themselves are processed with a combination of &quot;factory&quot; (for those that fit standard patterns) and &quot;hand-crafted&quot; methods (for everything else). They claims are expensive for insurance firms to process, even if they end up denying a claim. Claims are also expensive for insured parties to file, because almost always it requires specialist resources at expensive hourly rates.&lt;br /&gt;
&lt;br /&gt;
Rather than infrequent claims, what society needs is frequent reporting of breaches and even near-misses. Only then will we have data that is rich enough to model risk at all scales.&lt;br /&gt;
&lt;br /&gt;
Then there are the uncertainties -- timing of resolution/payment and grant-vs-deny decision, not to mention any lawsuits or arbitration that might follow a denial of a large claim. There may even be &quot;time bombs&quot; hidden in the contracts that you discover too late.&lt;br /&gt;
&lt;br /&gt;
Here&#39;s a somewhat hypothetical example.&lt;br /&gt;
&lt;br /&gt;
Robert Morgus (in the video above) reported that 100% of the policies he surveyed have explicit exclusions for nation-state actors and terrorists (&quot;acts of war&quot; by non-state actors). But &lt;i&gt;who has the burden of proof &lt;/i&gt;in any claim that the threat actor was &lt;i&gt;definitely not&lt;/i&gt; a nation state or terrorist? This detail will be buried somewhere in the insurance contract and terms. It may be phrased in legalese so that non-specialists may not recognize it or fully understand it. Maybe it is ambiguous, or covered in some other blanket clauses.&lt;br /&gt;
&lt;br /&gt;
Let&#39;s say your firm has a costly breach and files a big claim. But your insurance company denies it on the grounds that you have &lt;i&gt;not sufficiently proved &lt;/i&gt;that the threat actor was &lt;i&gt;not&lt;/i&gt; a nation state or terrorist. WTF? Like most firms, yours does not have sufficient capabilities in threat intelligence, digital forensics, and law enforcement/government agency relations to adequately do threat actor attribution. You are screwed.&lt;br /&gt;
&lt;br /&gt;
Because insurance contracts are so complex (see #3, above), there may be dozens or hundreds of similar hidden &quot;time bombs&quot; that could lead to denial of a claim. While most people would expect some rate of claim denial for insurance, they mostly focus on&amp;nbsp;&lt;i&gt;what they, the insured, might do or not do&lt;/i&gt;&amp;nbsp;that would lead to a denial. But there are other forces at work in cyber insurance that have less to do with a specific firm and claim, and everything to do with the norms, regulations, and strategies of diversified insurance businesses. Insurance firms have significant incentives to deny a specific claim if they think it will set an undesirable precedent for the rest of their portfolio and for future contracts.&lt;br /&gt;
&lt;br /&gt;
[EDIT]&lt;br /&gt;
To clarify, I am &lt;i style=&quot;font-weight: bold;&quot;&gt;not&lt;/i&gt;&amp;nbsp;arguing that cyber insurance claims payments is any worse (or better) than any other line of business insurance, or that it &lt;i&gt;should&lt;/i&gt; be better in order to perform it&#39;s risk transfer function. &amp;nbsp;I &lt;b&gt;&lt;i&gt;am&lt;/i&gt;&lt;/b&gt; arguing that -- for the incentive system role (and risk information service role) -- the costs and uncertainties of claims processing is a detriment and a misfit, especially convoluted exclusions and other contractual clauses.&lt;/div&gt;
&lt;br /&gt;
The misfit of the claims process is a specific instance of a more general misfit...&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
5. The Information Flow between Insured and Insurance Firms is Woefully Inadequate&lt;/h4&gt;
&lt;div&gt;
Generally, what is the capability for insurance firms to take in information and process information (i.e. make decisions) from all of their customers (insured)? By the standards of the 21st century internet age, it&#39;s almost zero. Many insurance firms don&#39;t even have a direct relationship. Instead, they go through brokers. It&#39;s even worse for reinsurers, who (economically speaking) may be carrying the largest portion of economic risk in cyber. Typically, the information comes in once per purchase cycle, with perhaps a &quot;re-up&quot; annually.&lt;br /&gt;
&lt;br /&gt;
[EDIT]&lt;br /&gt;
Every limit and gap in coverage is also a gap in information flow between insured parties and insurers. Referring back to the hypothetical example in #4, if all contracts deny coverage in cases of nation-state actors and terrorists threat agents, then how will insurers ever get enough information to distinguish those types of attacks from all the others?&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Insurance firms don&#39;t learn about near misses, early warning signs, or even evidence that the information they may have received is incomplete, ambiguous, or erroneous. Even those insurance firms that are subscribing to real-time rating or monitoring services will have a hard time making use of this information in a way that changes the value proposition for insured parties. Why?&lt;br /&gt;
&lt;br /&gt;
One reason is regulation. In the US, each of the 50 states has laws and regulatory authority over insurance, including definitions of what is and isn&#39;t insurance. Folks involved in financial innovation (e.g.. derivatives -- both OTC and traded -- and also real-money prediction markets) have run into this regulatory thicket. Insurance firms are on the &lt;i&gt;inside&lt;/i&gt;, meaning that their ability to offer anything that looks different from &quot;insurance&quot; is quite limited.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
6. The Cycle Time Between &quot;Stimulus&quot; and &quot;Response&quot; is Too Slow&lt;/h4&gt;
&lt;div&gt;
Assume there is some new significant information about risk (being higher or lower) due to some event or signal. How long will it take for that information to percolate through the whole insurance ecosystem so that it is reflected in prices, coverage, or other relevant &quot;incentives&quot;? The answer is, at best, months, but more likely a year or more. Compare that to the response time of security markets, or even cash commodity markets, which respond in seconds to days.&lt;br /&gt;
&lt;br /&gt;
Now, we should assume that this adjustment process is noisy and subject to overshoot or undershoot. How long will the system take to reach a new equilibrium? Five years? Ten years? And how many more &quot;information shocks&quot; will happen during that time? (Many)&lt;br /&gt;
&lt;br /&gt;
For any adaptive system to maintain stability, it must have a response and settling time much shorter than the frequency of &quot;shocks&quot;. Though it may be more responsive than the legal/regulatory system, the cyber insurance ecosystem is still too slow and unresponsive to be effective as a market information processing system.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
7. Variation in Premiums and Coverage is a Noisy, Unreliable Signal&lt;/h4&gt;
&lt;h4&gt;
&lt;div style=&quot;font-weight: normal;&quot;&gt;
The folk wisdom about cyber insurance is that higher (lower) premiums and coverage will be strong signals and incentives relating to worse (better) cyber security practices and investments.&lt;/div&gt;
&lt;div style=&quot;font-weight: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-weight: normal;&quot;&gt;
The reality is that there is only a loose connection between premium prices/coverage and&amp;nbsp;&lt;i&gt;real&lt;/i&gt;&amp;nbsp;risk posture (if we can posit that such a reality exists).&lt;/div&gt;
&lt;div style=&quot;font-weight: normal;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-weight: normal;&quot;&gt;
Many parts of the insurance industry are cyclical -- notably Property &amp;amp; Casualty. The reasons are disputed (see&amp;nbsp;&lt;a href=&quot;http://www.psafinancial.com/2013/01/hard-market-vs-soft-market-the-insurance-industrys-cycle-and-why-were-currently-in-a-hard-market/&quot;&gt;here&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;http://www.stats.uwo.ca/faculty/ren/seminar/underwriting%20cycle.pdf&quot;&gt;here&lt;/a&gt;,&amp;nbsp;&lt;a href=&quot;https://mpra.ub.uni-muenchen.de/9825/1/MPRA_paper_9825.pdf&quot;&gt;here&lt;/a&gt;, and&amp;nbsp;&lt;a href=&quot;https://www.researchgate.net/profile/Gene_Lai/publication/268041928_Underwriting_Cycles_in_Property_and_Liability_Insurance_An_Empirical_Analysis_of_Industry_and_By-Line_Data/links/55e141ad08aede0b57302d2e.pdf&quot;&gt;here&lt;/a&gt;, for example), but the consequences on incentives are clear. If premiums rise and fall 50% (or more) over the course of 6 years (typical cycle period) for reasons that have&amp;nbsp;&lt;i&gt;nothing&lt;/i&gt;&amp;nbsp;to do with any individual insured firm, what signal does that firm get each year? Especially if the difference due to it&#39;s own security practices might be only 5% - 10%? And what is the signal when exclusions, deductions, and caps appear and disappear due to pressures on the insurance firms (and their reinsurers)?&lt;br /&gt;
&lt;br /&gt;
[EDIT]&lt;br /&gt;
Specialty Insurance lines may be less cyclical than P&amp;amp;C. &amp;nbsp;Even so, they are prone to &quot;hard&quot; and &quot;soft&quot; market conditions where premiums are higher or lower than they would be otherwise because insurers are either rushing into the market, or fleeing the market (or holding back due to tight capital conditions). &amp;nbsp;My point is that these premium fluctuations could be much wider than premium differences due to incrementally better or worse security practices/policies for a given firm.&lt;br /&gt;
&lt;br /&gt;
[EDIT]&lt;br /&gt;
Even if premium pricing is not noisy and unreliable, as an incentive system it is easily gamed by the people who manage the relationship with insurers and brokers. &amp;nbsp; Let&#39;s say that your executive in charge is named Cheap Bastard (C.B. for short) and your firm has a strong incentive plan to minimize insurance premiums &amp;nbsp;The easiest and surest way for C.B. to achieve the incentive goal is to under-insure -- deductibles that are too high, limits that are too low, and so on. After all, who knows what the right/best amount of insurance is for your firm? C.B. is the expert, right? Maybe your Board is too smart for that and closes that loophole by pre-specifying the basic features of coverage. &amp;nbsp;No problem for C.B. because he can agree to dozens or more exclusions in the details of the contract. &amp;nbsp;Only C.B. will know. &amp;nbsp;The insurer will know, too, and will agree to much lower premiums while fitting the basic requirements.&lt;br /&gt;
&lt;br /&gt;
Aside from the contract, there are several other points in processes where C.B. can act as gate keeper to limit or cut off spending that would trigger a premium increase. &amp;nbsp;Let&#39;s say a big breach happens. &amp;nbsp;C.B. choses not to hire the big name digital forensics firm, and instead hires brother-in-law&#39;s small firm. &amp;nbsp;No expensive external PR firm or external law firm, either. Instead, shift blame and costs on to customers, suppliers, contractors, and especially specific employees who take the blame. &amp;nbsp;Fire them in a very public way to terrorize the rest. &amp;nbsp;Report authoritatively the Board that &quot;no systemic problems were found and no additional breaches were detected.&quot; &amp;nbsp;Case closed. Stonewall the media. Tough out the stock market&#39;s reaction. &amp;nbsp;Don&#39;t file an insurance claim if possible, and therefore your firm won&#39;t be put into a &quot;high risk pool&quot; or other action that lead to significantly higher premiums. &amp;nbsp;At the end of the year, C.B. declares victory and collects a big bonus check.&lt;br /&gt;
&lt;br /&gt;
[EDIT]&lt;br /&gt;
Yes, that is a fairly extreme example of gaming the system. Every incentive system is susceptible to being gamed, and none is perfect. The purpose of this example is to highlight how the particular characteristics here provide &lt;i&gt;affordances&lt;/i&gt; (see Appendix, below) for certain types of manipulation strategies.&lt;br /&gt;
&lt;br /&gt;
[EDIT]&lt;br /&gt;
There are a host of less egregious strategies available to executives and key staff that would effectively muffle the &quot;signal&quot; that premium and coverage differentials might provide. &amp;nbsp;For example, cyber insurance premiums could be bundled into a larger collection of risk and compliance-related costs, and this bundle becomes the basis for organization and individual metrics. Because cyber insurance premiums would be a small percentage of the total, any actual or potential variation would be muted. Analogy: like trying to sing while pressing a pillow into your face.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/h4&gt;
&lt;h4&gt;
8. Risk Retention Needs to be Promoted, Not Risk Transfer&lt;/h4&gt;
&lt;div&gt;
Most firms don&#39;t really need risk transfer. Then why are they paying for it (voluntarily or involuntarily)? Doesn&#39;t that take everyone&#39;s eye off of the real success factor: smart and effective risk retention.&lt;br /&gt;
&lt;br /&gt;
Broadly speaking, society benefits when the parties best positioned to manage a risk retain that risk. Yes, society benefits when &lt;i&gt;excess risk&lt;/i&gt; is transferred and diversified. But when it comes to the operations and practices that give rise to risk in the first place, society &lt;i&gt;does not&lt;/i&gt; want that risk sloughed off onto other parties (insurers, customers, suppliers, employees, etc.).&lt;br /&gt;
&lt;br /&gt;
Consider this scenario. Your company is offered two insurance policies with identical coverage but premiums of $\$$100K vs. $\$$50K, and the difference depends on you implementing a list of 45 best practices that you don&#39;t do now.&lt;br /&gt;
&lt;br /&gt;
But then along comes an Angel benefactor who offers your firm $\$$50K to implement the 45 practices, and $\$$0 if you don&#39;t.&lt;br /&gt;
&lt;br /&gt;
With the Angel, there is no hassle with contracts, deductibles, exclusions, caps, etc. and you don&#39;t have to pay&amp;nbsp;$\$$50K per year for coverage you don&#39;t really want or need.&lt;br /&gt;
&lt;br /&gt;
Wouldn&#39;t the Angel&#39;s incentive payment be a much simpler, clearer external incentive than cyber insurance? And your firm would be retaining the risk, which is what you should have been doing all along.&lt;br /&gt;
&lt;br /&gt;
I&#39;m not advocating this sort of direct payment incentive scheme, but I offer it to shine a spotlight the cumbersome, costly baggage that cyber insurance brings while riding the horse of &quot;incentives for best practices&quot;.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4&gt;
9. The Risk Models that Insurance Firms are Developing are Not What The Rest of Us Need&lt;/h4&gt;
&lt;div&gt;
What firms need to make better decisions is a risk model of &lt;i&gt;their risk&lt;/i&gt;, given their unique circumstances and alternatives. But that is not what insurance firms are modeling.&lt;br /&gt;
&lt;br /&gt;
Like all risk transfer insurance, insurers are modeling the risk associated with a portfolio of contracts. What they care most about is the risk of the whole portfolio over time, not what any individual firm experiences. (This is core to the business model of nearly all insurance businesses.) While they do care about the probability distribution of losses (claims) for firms in a given class or portfolio, what they care about much more are correlated losses that cause &quot;excess claims&quot; and &quot;ruin&quot; for the portfolio. This is where their best modeling minds and resources are working.&lt;br /&gt;
&lt;br /&gt;
Now, there has been a trend in the last 10 years toward &quot;predictive modeling&quot; (e.g. see &lt;a href=&quot;http://www.insurancejournal.com/news/national/2012/06/18/251957.htm&quot;&gt;here&lt;/a&gt;) in casualty insurance, including some experimentation in real-time monitoring of automobile drivers and others. There is a &lt;i&gt;possibility&lt;/i&gt; that cyber insurance could evolve in this direction, but given all the countervailing forces, it&#39;s not a sure bet.&lt;br /&gt;
&lt;br /&gt;
The main message here is that it is the core competencies (a.k.a. capabilities) of the insurance industry, plus the regulatory structure that they operate in, that create clear incentives for them to create and innovate in risk models that serve the insurer and not the insured.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
10. Cyber Insurance Doesn&#39;t Fit Networked, Interdependent Risk&lt;/h4&gt;
For some firms and agencies, their biggest cyber risk is related to their being part of a service network -- i.e. critical infrastructure such as power, water, communications, etc. They also face nation-state threat agents and terrorist threat agents, both explicitly excluded in all cyber insurance policies. What they need is some way of pricing and pooling risk that embraces the interdependent nature of their risks, not shuns it.&lt;br /&gt;
&lt;br /&gt;
So far, I have discussed cyber insurance as though the only type of insured party were an end-user of information technology. But what about all the product and service vendors of information technology? Many firms have side businesses or complementary services that are, in effect, information technology services. Supply chain cyber risk is well-recognized and widely studied. But it raises a whole new class of interdependence between firms in the network -- events, controlling parties, causation, and so on -- all of which are not well-matched by today&#39;s cyber insurance industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
In Closing&lt;/h3&gt;
&lt;br /&gt;
To reiterate: my argument is not that cyber insurance is bad or broken as a traditional risk transfer institution. &amp;nbsp;It may be fine for that function. &amp;nbsp;But that is not the main reason that policy people are promoting it.&lt;br /&gt;
&lt;br /&gt;
I&#39;m also not painting insurance firms or insurance brokers as &quot;bad guys&quot; or somehow incompetent. They are working within a well established set of capabilities and institutions, doing what they are inclined to do.&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;
&lt;br /&gt;
That&#39;s all for now. Look for my follow up posts where I will dive into these issues in more detail, including some computational modeling.&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;
&lt;br /&gt;
&lt;h3&gt;
Appendix: Analytic Framework for Functional Ecosystems&lt;/h3&gt;
&lt;div&gt;
An analytic framework can help us structure the evidence and arguments, drawing from Organization Science and Ecological Psychology. This framework is an ontology for what I am calling &quot;Functional Ecosystems&quot; to contrast it with reproductive, energetic, or material ecosystems.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Actors&lt;/i&gt;&amp;nbsp;(firms, people, etc.) are agents with purposes and values, usually because they are operating within personally and socially meaningful roles.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A&amp;nbsp;&lt;i&gt;function&lt;/i&gt;&amp;nbsp;is the reason or purpose for doing something. &quot;Function&quot; establishes goals or metrics or indicators of good vs. bad performance, and also places the activity in some greater context of purpose or strategy.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A&amp;nbsp;&lt;i&gt;capability&lt;/i&gt;&amp;nbsp;is a&amp;nbsp;&lt;i&gt;general&lt;/i&gt;&amp;nbsp;ability to perform some function to some degree of excellence. Capabilities include knowledge, experience, and supporting resources (time, money, people, etc.).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A&amp;nbsp;&lt;i&gt;routine&lt;/i&gt;&amp;nbsp;is any process, procedure, or algorithm that can be carried out in a step-by-step fashion to some conclusion. The term &quot;routine&quot; is not meant to imply &quot;typical&quot; or &quot;unexceptional&quot;. Think of it as a &quot;computer subroutine&quot;, where the &quot;computer&quot; happens to be some combination of people, process, and technology. Any given routine will be associated with one or more capabilities, and each capabilities will have a portfolio of supporting/relevant routines to carryout specific actions.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
A&amp;nbsp;&lt;i&gt;characteristic&lt;/i&gt;&amp;nbsp;is a feature of something (an object, a service, a person, an organization) that can be detected, sensed, and/or distinguished, and also has some relevance to the actor or agent.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;i&gt;(Crucial!)&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
An&amp;nbsp;&lt;i&gt;affordance&lt;/i&gt;&amp;nbsp;is an interrelation between an actor and its environment (incl. other actors) that serves as a&amp;nbsp;&lt;i&gt;resource for action&lt;/i&gt;, or facilitates action, given the actor&#39;s capabilities, intentions, purposes, and attention. Affordance seems obvious when interacting with physical objects (it&#39;s not!), but it gets&amp;nbsp;&lt;i&gt;really interesting&lt;/i&gt;&amp;nbsp;when interacting with signs, signals, and information (100% the case in cyber insurance).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Interrelations&lt;/i&gt;&amp;nbsp;are more than interfaces or protocols for communication or action. They are&amp;nbsp;&lt;i&gt;meaning-creating&lt;/i&gt;&amp;nbsp;interactions that&amp;nbsp;&lt;i&gt;make purposeful action possible&lt;/i&gt;, given the complexities and details of any given situation.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;i&gt;(Putting these all together)&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
Actors utilize&amp;nbsp;&lt;i&gt;capabilities&lt;/i&gt;&amp;nbsp;to carry out their&amp;nbsp;&lt;i&gt;functions&lt;/i&gt;.&amp;nbsp;&lt;i&gt;Capabilities&lt;/i&gt;&amp;nbsp;are enacted by selecting, configuring, and deploying specific&amp;nbsp;&lt;i&gt;routines&lt;/i&gt;, whose&amp;nbsp;&lt;i&gt;characteristics&lt;/i&gt;&amp;nbsp;are an appropriate or serviceable match&amp;nbsp;to the&amp;nbsp;&lt;i&gt;affordances&lt;/i&gt;&amp;nbsp;that they perceive and engage with.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;h4&gt;
A Simple Example&lt;/h4&gt;
&lt;div&gt;
You are probably familiar with the phrase: &quot;Use the right&amp;nbsp;&lt;i&gt;tool&lt;/i&gt;&amp;nbsp;for the&amp;nbsp;&lt;i&gt;job&lt;/i&gt;.&quot; Some of you may even know this saying: &quot;Don&#39;t bring a knife to a gun fight&quot;. They both allude to the performance benefits of having tools that are a good fit to the job at hand. The following simple (simplistic) example will, hopefully, make all the analytic framework clear.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Imagine you are 4 years old. You are very hungry and want to eat. You have four types of familiar food in front of you:&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Hot soup (broth-like with no solid chunks)&lt;/li&gt;
&lt;li&gt;Chicken meat (whole breast)&lt;/li&gt;
&lt;li&gt;A glass of cold milk&lt;/li&gt;
&lt;li&gt;Green peas&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
You have three utensils available, and (for some reason) can&#39;t use your hands directly:&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ol&gt;
&lt;li&gt;Fork&lt;/li&gt;
&lt;li&gt;Spoon&lt;/li&gt;
&lt;li&gt;Straw&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
The&amp;nbsp;&lt;i&gt;function&lt;/i&gt;&amp;nbsp;you want to perform is &quot;eat food&quot;. Your&amp;nbsp;&lt;i&gt;capabilities&lt;/i&gt;&amp;nbsp;include 1) manual manipulation of hand-sized objects; and 2) eating. Your&amp;nbsp;&lt;i&gt;routines&lt;/i&gt;&amp;nbsp;include: 1) grasp, 2) rotate, 3) aim, 4) press, 5) lift, and so on. The&amp;nbsp;&lt;i&gt;characteristics&lt;/i&gt;&amp;nbsp;of the food include 1) phase (solid vs. liquid), 2) size, 3) density, 4) temperature, 5) odors, etc. The&amp;nbsp;&lt;i&gt;characteristics&lt;/i&gt;&amp;nbsp;of the utensils include 1) weight, 2) sharpness, 3) receptacle capacity, 4) topology, etc.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The&amp;nbsp;&lt;i&gt;affordances&lt;/i&gt;&amp;nbsp;arise through the interrelations between you (as actor and tool user), your chosen utensils, and the characteristics of the food that you try to eat, with a given technique (a.k.a. routines). Adults take this for granted because they are so habitual and unconscious, but young children (if not instructed) will poke around to try to find some sort of affordance that will fulfill their function.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Imagine you, as a four year old, try to eat the chicken meat with the straw.&amp;nbsp;&lt;i&gt;Maybe&lt;/i&gt;&amp;nbsp;if you jab at it hard enough, you will gouge out some chicken meat inside the straw. If the straw is both stiff enough and sharp enough (&lt;i&gt;characteristics&lt;/i&gt;), you might succeed in spearing the meat like a knife, and might then attempt to bring it to your mouth. Nearly all plastic straws will be too weak for this.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
We can continue on with this exploration process, and eventually, you (4 year old) will learn which utensils work best for which types of food.&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; color: black; font-family: -webkit-standard; font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; orphans: auto; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px;&quot;&gt;
&lt;div style=&quot;margin: 0px;&quot;&gt;
The fourth food type -- green peas -- are a very interesting case, because experience might reveal that all three utensils have sufficient characteristics to be used to eat peas (assuming the straw diameter is large enough). But while eating peas with a spoon is almost the same as eating soup (i.e. same capability and nearly the same routines), eating peas with a straw is&amp;nbsp;&lt;i&gt;very different&lt;/i&gt;&amp;nbsp;than drinking soup or milk with the same straw. Notice also that almost no adults would ever consider eating peas with a straw because they are so acculturated in what utensils are used for what foods, and in the cultural norms than go against &quot;rude&quot; behavior of inappropriate utensil use (and sounds). Therefore, affordances are&amp;nbsp;&lt;i&gt;not&lt;/i&gt;&amp;nbsp;simply what we see or believe to be possible or appropriate. But they also aren&#39;t purely &quot;in the world&quot;. They require active engagement in order to come into being.&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/4160691177053240423/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/10/the-cyber-insurance-emperor-has-no.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/4160691177053240423'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/4160691177053240423'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/10/the-cyber-insurance-emperor-has-no.html' title='The Cyber Insurance Emperor Has No Clothes'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrR-fYyAz4NGYrHw-DbVmJVHwUOj9vFazx93sOqbT4gF-XelUlKi66Ga2jFEHSqZcr_L0dQNPtgJC8nV5idmKzbEzhsxBxhzCuIGWtNBvMW12yed0Paf-mg2OlDKjawRhH4pDet9Q8X8M/s72-c/emperor_no_clothes_quotes.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-8476549434183325052</id><published>2016-10-19T19:35:00.000-07:00</published><updated>2016-10-19T19:35:13.145-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="black swans"/><category scheme="http://www.blogger.com/atom/ns#" term="probability"/><category scheme="http://www.blogger.com/atom/ns#" term="risk"/><category scheme="http://www.blogger.com/atom/ns#" term="uncertainty"/><title type='text'>Orange TRUMPeter Swans: When What You Know Ain&#39;t So</title><content type='html'>Was Donald J. Trump&#39;s political rise in 2015-2016 a &quot;black swan&quot; event? &amp;nbsp;&quot;Yes&quot; is the answer asserted by Jack Shafer &lt;a href=&quot;http://www.politico.com/magazine/story/2016/01/donald-trump-2016-black-swan-213571&quot;&gt;this&amp;nbsp;&lt;i&gt;Politico &lt;/i&gt;article&lt;/a&gt;. &quot;No&quot; is the answer from other writers, including&amp;nbsp;David Atkins in &lt;a href=&quot;http://www.washingtonmonthly.com/political-animal-a/2016_01/no_donald_trumps_success_isnt059452.php&quot;&gt;this article &lt;/a&gt;on the &lt;i&gt;Washington Monthly&lt;/i&gt;&amp;nbsp;Political Animal Blog.&lt;br /&gt;
&lt;br /&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4zfQ5JCSm1fWUh6d2alQug4PUp_5imC2c-qeMVJS2c-MyDqCay5uM7lG7hXucESnj9C2Y7YoTRGMzvVI3tcIoj8_djyupRbidTFU_enuG_RLaCYgs-kq7HZ8_5gFrnkByR_xX6DkyrzI/s1600/orange_trumpeter_swan.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4zfQ5JCSm1fWUh6d2alQug4PUp_5imC2c-qeMVJS2c-MyDqCay5uM7lG7hXucESnj9C2Y7YoTRGMzvVI3tcIoj8_djyupRbidTFU_enuG_RLaCYgs-kq7HZ8_5gFrnkByR_xX6DkyrzI/s320/orange_trumpeter_swan.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Orange Swan&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
My answer is &quot;Yes&quot;, but not in the same way that other events are Black Swans. &amp;nbsp; Orange Swans like the Trump phenomenon is fits this aphorism:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;It ain&#39;t what you don&#39;t know that gets you into trouble. &lt;i&gt;It&#39;s what you know for sure that just ain&#39;t so.&lt;/i&gt;&quot; -- attributed to Mark Twain&lt;/blockquote&gt;
In other words, the signature characteristic of Orange Swans is &lt;i&gt;delusion&lt;/i&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Rethinking &quot;Black Swans&quot;&lt;/h4&gt;
As I have mentioned at the start of this series, the &quot;Black Swan event&quot; metaphor is a conceptual mess. (This post is sixth in the series &quot;&lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2013/07/think-you-understand-black-swans-think.html&quot;&gt;Think You Understand Black Swans? Think Again&lt;/a&gt;&quot;.) &lt;br /&gt;
&lt;br /&gt;
It doesn&#39;t make sense to label any set of events as &quot;Black Swans&quot;. &amp;nbsp;It&#39;s not the events themselves, but instead they are processes that involve generating mechanisms, our evidence about them, and our method of reasoning that make them unexpected and surprising.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;

&lt;h4&gt;
Definition&lt;/h4&gt;
An &quot;Orange Swan&quot; is a process where:
&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;The &lt;i&gt;generating process&lt;/i&gt; is deterministic, either simple or complex, but where randomness in time does not play a significant role;&lt;/li&gt;
&lt;li&gt;The &lt;i&gt;evidence&lt;/i&gt;&amp;nbsp;arises in two epochs: first, when the event is considered &quot;extremely improbable&quot; or &quot;impossible&quot;, and second, when the event is happening or has happened;&lt;/li&gt;
&lt;li&gt;The &lt;i&gt;method of reasoning&lt;/i&gt; is &quot;conventional wisdom&quot; or punditry about causes and effects in this domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4&gt;
Main Features&lt;/h4&gt;
The primary feature of Orange Swans is defying conventional wisdom, especially strongly held, widely accepted and acclaimed conventional wisdom. &amp;nbsp;When an Orange Swan comes to pass, it reveals how the conventional wisdom was delusional, at least in those particular circumstances.&lt;br /&gt;
&lt;br /&gt;
Some systems of conventional wisdom feature strong rules about what is possible and what is impossible, on principle. &amp;nbsp;Simply, these rules are treated as though they are laws that govern our part of the Universe. It&#39;s helpful for us to remember that there was a time, not too long ago, that &lt;i&gt;everything&lt;/i&gt; in the human realm was governed by conventional wisdom of one sort or another -- e.g. who got sick and who got well, the weather next week, crop success or failure, and the right/best form of religion, government, and social organization. &amp;nbsp;Divination can be seen as systems of conventional wisdom overlaid by random draws. Even in the realm of sciences, conventional wisdom still has great power and influence on the social processes of science -- e.g. who gets admitted to grad school, who gets grants, who gets credit or blame, etc.&lt;br /&gt;
&lt;br /&gt;
But, in modern society, the domain of politics stands out as the Kingdom of Conventional Wisdom. &amp;nbsp;The prominent exception are pollsters and other &quot;quants&quot; like Nate Silver&#39;s team at &lt;a href=&quot;http://fivethirtyeight.com/&quot;&gt;fivethirtyeight.com&lt;/a&gt;. &amp;nbsp;But the vast majority of practitioners, analysts, researchers, and commentators trade in almost nothing but conventional wisdom. &amp;nbsp;Everyone in the social system either echoes and reinforces the conventional wisdom, or tries to modify it by adding their own &quot;wisdom&quot; (i.e. rules of thumb, causal explanations or possibilities, etc.), usually backed only by a few stories, conversations, or a clever idea in the middle of the night.&lt;br /&gt;
&lt;br /&gt;
Anyone running for or serving in elective office, especially at a Federal/national level, has to confront the prevailing conventional wisdom, whether favorable or unfavorable, because everyone believes that the conventional wisdom expresses the Laws of Politics at the present time.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Examples&lt;/h4&gt;
The most obvious present example is Donald J. Trump&#39;s nomination as Republican Party candidate for the President of the United States. The Trump candidacy has been (wrongly) called &lt;a href=&quot;http://www.politico.com/magazine/story/2016/01/donald-trump-2016-black-swan-213571&quot;&gt;a Black Swan event&lt;/a&gt;. There have been a ton of articles and blog posts on why Trump was never going to be the nominee, never going to have a chance of winning, or, at least that his chances were extremely small. &amp;nbsp;There have also been a ton of articles that have attempted to explain how people who espoused conventional wisdom were so wrong. &amp;nbsp;The tone of these reflective articles has been especially somber during periods when Trump&#39;s poll numbers were surging and it looked like he might actually win (the nomination or the general election).&lt;br /&gt;
&lt;br /&gt;
Let&#39;s not fall into the trap of believing that only politics is susceptible to Orange Swans. &amp;nbsp;Here are a few &quot;conventional wisdoms&quot; in other domains that fell to Orange Swans (i.e. seemingly impossible events that nonetheless came to pass or were observed):&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;World War I will be &quot;over by Christmas&quot; (Britain) -- see&amp;nbsp;&lt;a href=&quot;https://www.theworldwar.org/explore/exhibitions/online-exhibitions/over-christmas&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;http://www.tandfonline.com/doi/abs/10.1080/19475020.2010.517429&quot;&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Earth is the center of the Universe -- &lt;a href=&quot;https://en.wikipedia.org/wiki/Geocentric_model&quot;&gt;geocentrism&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Arrival of &quot;abnormal&quot; astronomical visitors like comets are unpredictable -- see &lt;a href=&quot;https://en.wikipedia.org/wiki/Edmond_Halley&quot;&gt;here&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
I&#39;m leaving out extreme events that are due primarily to random/stochastic processes or would otherwise better be describe as a different colored Swan.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Why Orange Swans are Sometimes Extreme&lt;/h4&gt;
There is nothing in the deterministic generating process that makes Orange Swans extreme. &amp;nbsp;They might be &lt;i&gt;experienced&lt;/i&gt; as extreme relative to the strength in belief they are impossible and, by implication, that the whole system of conventional wisdom might be wrong. &amp;nbsp;The successful prediction of Halley&#39;s comet did not have a revolutionary effect because, by that time, there was considerable acceptance of new conventional wisdom about astronomy and what was or was not predictable.&lt;br /&gt;
&lt;br /&gt;
The Orange Swan event will also be experienced as extreme if it threatens the social status of the arbiters and beneficiaries of conventional wisdom, for whom the Orange Swan might be imagined as &quot;the end of the world&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Why Orange Swans are Surprising&lt;/h4&gt;
When conventional wisdom includes strong rules about what is impossible, and that &quot;impossible&quot; event comes to pass, then it feels extremely surprising, and even unpredictable in principle. Not every system of conventional wisdom is susceptible, because not all include strong rules about impossibility.&lt;br /&gt;
&lt;br /&gt;
Going into the 2016 elections, one expression of conventional wisdom about who can and can&#39;t win the nomination was presented in the book &lt;i&gt;&lt;a href=&quot;http://press.uchicago.edu/ucp/books/book/chicago/P/bo5921600.html&quot;&gt;The Party Decides&lt;/a&gt;&lt;/i&gt;:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;...for the past several decades, &lt;i&gt;The Party Decides&lt;/i&gt; shows, unelected insiders in both major parties have effectively selected candidates long before citizens reached the ballot box.&quot;&lt;/blockquote&gt;
This version of conventional wisdom said: Trump was not, and could never be, acceptable to these &quot;unelected insiders&quot;, and therefore would not be successful in getting the Republican nomination.&lt;br /&gt;
&lt;br /&gt;
The events that unfolded were surprise after surprise for those holding this and other conventional wisdoms. &amp;nbsp;(In their defense, Trump&#39;s recent decline in the polls and likely election defeat are seen as justifying the conventional wisdom that a candidate like Trump -- in general and especially in particular -- could not win a Presidential election.)&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
Why Orange Swans Can Be Rationalized in Retrospect&lt;/h4&gt;
The causal relationships leading to the Orange Swan are rarely mysterious in retrospect, in part because randomness and uncertainty rarely play more than a minor role. &amp;nbsp;Sometimes a new conventional wisdom takes over, replacing the old. &amp;nbsp;Other times, the conventional wisdom reasserts itself, writing off the Orange Swan as an aberration. Occasionally, there is a general loss in confidence in any strong conventional wisdom.&lt;br /&gt;
&lt;br /&gt;
&lt;h4&gt;
How to Cope with Orange Swans&lt;/h4&gt;
From an analysts point of view, here&#39;s how you can cope with Orange Swans:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;Take inventory the conventional wisdom, especially what is deemed as &quot;impossible&quot;.&lt;/li&gt;
&lt;li&gt;Use &lt;a href=&quot;https://en.wikipedia.org/wiki/Scenario_analysis&quot;&gt;scenario analysis&lt;/a&gt; methods to generate possible futures that appear to be &quot;impossible&quot; through the lens of conventional wisdom, but have plausible causal chains.&lt;/li&gt;
&lt;li&gt;For critical problems, use formal or semi-formal methods of evidence analysis and inference, such as &lt;a href=&quot;https://en.wikipedia.org/wiki/Analysis_of_competing_hypotheses&quot;&gt;Analysis of Competing Hypotheses&lt;/a&gt;. This will help you avoid the pitfall of minimizing evidence that might support hypotheses in favor of Orange Swan events.&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/8476549434183325052/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/10/orange-trumpeter-swans-when-what-you.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/8476549434183325052'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/8476549434183325052'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/10/orange-trumpeter-swans-when-what-you.html' title='Orange TRUMPeter Swans: When What You Know Ain&#39;t So'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4zfQ5JCSm1fWUh6d2alQug4PUp_5imC2c-qeMVJS2c-MyDqCay5uM7lG7hXucESnj9C2Y7YoTRGMzvVI3tcIoj8_djyupRbidTFU_enuG_RLaCYgs-kq7HZ8_5gFrnkByR_xX6DkyrzI/s72-c/orange_trumpeter_swan.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-7407083274221575918</id><published>2016-06-21T14:31:00.002-07:00</published><updated>2016-06-22T13:18:08.373-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="innovation"/><title type='text'>Public Statement to the  Commission on Enhancing National Cybersecurity, 6-21-2016</title><content type='html'>[&lt;i&gt;Submitted in writing at &lt;a href=&quot;http://www.nist.gov/cybercommission/upload/California-Commission-Agenda-Final4.pdf&quot;&gt;this meeting&lt;/a&gt;. An informal 5 min. version was presented during the public comment period. This statement is my own and does not represent the views or interests of my employer.&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Summary&lt;/h3&gt;
Cyber security desperately needs institutional innovation, especially involving incentives and metrics. &amp;nbsp;Nearly every report since 2003 has included recommendations to do more R&amp;amp;D on incentives and metrics, but progress has been slow and inadequate.&lt;br /&gt;
&lt;br /&gt;
Why?&lt;br /&gt;
&lt;br /&gt;
Because we have the wrong model for research and development (R&amp;amp;D) on institutions. &lt;br /&gt;
&lt;br /&gt;
My primary recommendation is that the Commission’s report should promote new R&amp;amp;D models for institutional innovation. &amp;nbsp;We can learn from examples in other fields, including sustainability, public health, financial services, and energy.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
What are Institutions and Institutional Innovation?&lt;/h3&gt;
Institutions are norms, rules, and social structures that enable society to function. Examples include marriage, consumer credit reporting and scoring, and emissions credit markets.&lt;br /&gt;
&lt;br /&gt;
Cyber security[1] has institutions today, but many are inadequate, dysfunctional, or missing. &amp;nbsp;Examples:&lt;br /&gt;
&lt;ol&gt;
&lt;li&gt;overlapping “checklists + audits”;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;professional certifications;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;post-breach protection for consumers (e.g. credit monitoring);&amp;nbsp;&lt;/li&gt;
&lt;li&gt;lists of “best practices” that have never been tested or validated as “best” and therefore are no better than folklore. &amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
There is plenty of talk about “standards”, &amp;nbsp;“information sharing”, “public-private partnerships”, and “trusted third parties”, but these remain mostly talking points and not realities.&lt;br /&gt;
&lt;br /&gt;
Institutional innovation is a set of processes that either change existing institutions in fundamental ways or create new institutions. &amp;nbsp; Sometimes this happens with concerted effort by “institutional entrepreneurs”, and other times it happens through indirect and emergent mechanisms, including chance and “happy accidents”.&lt;br /&gt;
&lt;br /&gt;
Institutional innovation takes a long time – typically ten to fifty years.&lt;br /&gt;
&lt;br /&gt;
Institutional innovation works different from technological innovation, which we do well. &amp;nbsp;In contrast, we have poor understanding of institutional innovation, especially on how to accelerate it or achieve specific goals.&lt;br /&gt;
&lt;br /&gt;
Finally, institutions and institutional innovation should not be confused with “policy”. &amp;nbsp;Changes to government policy may be an element of institutional innovation, but they do not encompass the main elements – people, processes, technology, organizations, and culture.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
The Need: New Models of Innovation&lt;/h3&gt;
Through my studies, I have come to believe that institutional innovation is much more complicated &amp;nbsp;[2] than technological innovation. &amp;nbsp; It is almost &lt;i&gt;never&lt;/i&gt; a linear process from theory to practice with clearly defined stages.&lt;br /&gt;
&lt;br /&gt;
There is no single best model for institutional innovation. &amp;nbsp;There needs to be creativity in “who leads”, “who follows”, and “when”. &amp;nbsp;The normal roles of government, academics, industry, and civil society organizations may be reversed or otherwise radically redrawn. &lt;br /&gt;
&lt;br /&gt;
Techniques are different, too. It can be orchestrated as a “messy” design process [3]. &amp;nbsp;Fruitful institutional innovation in cyber security might involve some of these:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;“Skunk Works”&lt;/li&gt;
&lt;li&gt;Rapid prototyping and pilot tests&lt;/li&gt;
&lt;li&gt;Proof of Concept demonstrations&lt;/li&gt;
&lt;li&gt;Bricolage[4] &amp;nbsp;and exaptation[5]&lt;/li&gt;
&lt;li&gt;Simulations or table-top exercises&lt;/li&gt;
&lt;li&gt;Multi-stakeholder engagement processes&lt;/li&gt;
&lt;li&gt;Competitions and contests&lt;/li&gt;
&lt;li&gt;Crowd-sourced innovation (e.g. “hackathons” and open source software development)&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
What all of these have in common is that they produce something that can be tested and can support learning. &amp;nbsp;They are more than talking and consensus meetings.&lt;br /&gt;
&lt;br /&gt;
There are several academic fields that can contribute defining and analyzing new innovation models, including Institutional Sociology, Institutional Economics, Sociology of Innovation, Design Thinking, and the Science of Science Policy.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Role Models&lt;/h3&gt;
To identify and test alternative innovation models, we can learn from institutional innovation successes and failures in other fields, including:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Common resource management (sustainability)&lt;/li&gt;
&lt;li&gt;Epidemiology data collection and analysis (public health)&lt;/li&gt;
&lt;li&gt;Crash and disaster investigation and reporting (safety)&lt;/li&gt;
&lt;li&gt;Micro-lending and peer-to-peer lending (financial services)&lt;/li&gt;
&lt;li&gt;Emissions credit markets and carbon offsets (energy)&lt;/li&gt;
&lt;li&gt;Open software development (technology)&lt;/li&gt;
&lt;li&gt;Disaster recovery and response[6] &amp;nbsp;(homeland security)&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
In fact, there would be great benefit if there were a joint R&amp;amp;D initiative for institutional innovation that could apply to these other fields as well as cyber security. &amp;nbsp;Furthermore, there would be benefit making this an international effort, not just limited to the United States.&lt;br /&gt;
&lt;h4&gt;
Endnotes&lt;/h4&gt;
&lt;div&gt;
&lt;div&gt;
[1] &quot;Cyber security&quot; includes information security, digital privacy, digital identity, digital information property, digital civil rights, and digital homeland &amp;amp; national defense.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
[2] For case studies and theory, see: Padgett, J. F., &amp;amp; Powell, W. W. (2012). &lt;i&gt;The Emergence of Organizations and Markets.&lt;/i&gt; Princeton, NJ: Princeton University Press.&lt;/div&gt;
&lt;div&gt;
[3] Ostrom, E. (2009). &lt;i&gt;Understanding Institutional Diversity&lt;/i&gt;. Princeton, NJ: Princeton University Press.&lt;/div&gt;
&lt;div&gt;
[4] “something constructed or created from a diverse range of available things.”&lt;/div&gt;
&lt;div&gt;
[5] &amp;nbsp;“a trait that has been co-opted for a use other than the one for which natural selection has built it.”&lt;/div&gt;
&lt;div&gt;
[6]&amp;nbsp;See: Auerswald, P. E., Branscomb, L. M., Porte, T. M. L., &amp;amp; Michel-Kerjan, E. O. (2006). &lt;i&gt;Seeds of Disaster, Roots of Response: How Private Action Can Reduce Public Vulnerability&lt;/i&gt;. Cambridge University Press.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/7407083274221575918/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/06/public-statement-to-commission-on.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7407083274221575918'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7407083274221575918'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/06/public-statement-to-commission-on.html' title='Public Statement to the  Commission on Enhancing National Cybersecurity, 6-21-2016'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-3229115682906888631</id><published>2016-04-28T20:17:00.001-07:00</published><updated>2016-04-28T20:17:55.068-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="humor"/><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="other"/><title type='text'>Entry in #BSidesLV Logo Contest</title><content type='html'>Here&#39;s my entry in the &lt;a href=&quot;http://bsideslv.com/events/&quot;&gt;BSides Las Vegas logo contest&lt;/a&gt;. &amp;nbsp;The crowd-chosen slogan is &quot;Popping calc.exe since 2009&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDE544RoIQXdq9ggynRqfWpZfT6whgkyAXX4gTBHQeWjYxlGQw5Slec_O-vZlgOLZbMQ-F_kTLZ9ojrJnUkJiHq3eLxTw-_QNNXl_MnYujFD9Hu0FGol68RjpMft16dSIXJ1FAVH_RBgE/s1600/BSidesLV-popping_Calc.exe-V3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;291&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDE544RoIQXdq9ggynRqfWpZfT6whgkyAXX4gTBHQeWjYxlGQw5Slec_O-vZlgOLZbMQ-F_kTLZ9ojrJnUkJiHq3eLxTw-_QNNXl_MnYujFD9Hu0FGol68RjpMft16dSIXJ1FAVH_RBgE/s400/BSidesLV-popping_Calc.exe-V3.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;click to enlarge&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/3229115682906888631/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/04/entry-in-bsideslv-logo-contest.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/3229115682906888631'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/3229115682906888631'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/04/entry-in-bsideslv-logo-contest.html' title='Entry in #BSidesLV Logo Contest'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDE544RoIQXdq9ggynRqfWpZfT6whgkyAXX4gTBHQeWjYxlGQw5Slec_O-vZlgOLZbMQ-F_kTLZ9ojrJnUkJiHq3eLxTw-_QNNXl_MnYujFD9Hu0FGol68RjpMft16dSIXJ1FAVH_RBgE/s72-c/BSidesLV-popping_Calc.exe-V3.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-7999745211817487744</id><published>2016-03-30T01:19:00.001-07:00</published><updated>2016-03-30T06:31:04.868-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="other"/><title type='text'>#Tay Twist: @Tayandyou Twitter Account Was Hijacked ...By Bungling Microsoft Test Engineers (Mar. 30)</title><content type='html'>[&lt;i&gt;Update 5:35am &amp;nbsp;From CNBC&amp;nbsp;&lt;/i&gt;&lt;a href=&quot;http://www.cnbc.com/2016/03/30/tay-microsofts-ai-program-is-back-online.html&quot;&gt;http://www.cnbc.com/2016/03/30/tay-microsofts-ai-program-is-back-online.html&lt;/a&gt;&lt;i&gt;:&lt;/i&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;Microsoft&#39;s artificial intelligence (AI) program, Tay, reappeared on Twitter on Wednesday after being deactivated last week for posting offensive messages.&amp;nbsp;&lt;/i&gt;&lt;i&gt;However, the program once again went wrong and Tay&#39;s account was set to private after it began repeating the same message over and over to other Twitter users.&amp;nbsp;&lt;/i&gt;&lt;i&gt;&lt;b&gt;According to a Microsoft&lt;/b&gt;, the account was &lt;b&gt;reactivated by accident during testing&lt;/b&gt;.&lt;/i&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&quot;Tay remains offline while we make adjustments,&quot; a spokesperson for the company told CNBC via email. &quot;As part of testing, she was inadvertently activated on Twitter for a brief period of time.&quot; (emphasis added)&lt;/i&gt;&lt;/blockquote&gt;
&lt;i&gt;I&#39;m puzzled by this explanation but I&#39;ll go back through the evidence to see which explanation is best supported.&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 6:35am &amp;nbsp;It now looks like the &quot;account hack&quot; was really a bungled test session by someone at Microsoft Research -- effectively a &quot;self-hack&quot;.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Important: This episode was not &quot;Tay being Tay&quot;.&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
The @Tayandyou Twitter chatbot has been silent since last Thursday when Microsoft shut it down. Shortly after midnight today, Pacific time, the @Tayandyou Twitter account woke up and started blasting tweets at very high volume. &amp;nbsp;All of these tweets included other Twitter handles in them, maybe from previous tweets, maybe from followers.&lt;br /&gt;
&lt;br /&gt;
But it became immediately apparent that something was different and wrong. &amp;nbsp;These tweets didn&#39;t look anything like the ones before, in style, structure, or sentience. &amp;nbsp;From the tweet conversations and from the sequence of events, I believe that the @Tayandyou account was hacked today (March 30), and was active for 15 minutes, sending over 4,200 tweets.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 4:30am&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;The online media has started posting articles, but they all treat this as more &quot;Tay runs amok&quot;. &amp;nbsp;Only The Verge has updated their story. &amp;nbsp;If you read an article that doesn&#39;t at least consider that Tay&#39;s Twitter account was hacked, could you please add a comment with link to this post? &amp;nbsp;Thanks.&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Here&#39;s an example of Hijacked-Tay&#39;s tweets (credit to @daviottenheimer):&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7j5FFhPgAS08lW-wjg76CQPpKXVwRl-oNaz0SegwXQMp26HRpZs_R98P8_C7Y03HTqp9Y3BHQFZ03dxz0aBgB7zANTKVt-MYV90lr7aWNCAq16DhQpxjXaIaSBudoWd8AxfjhvPrSK70/s1600/Tayandyou+takeover1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7j5FFhPgAS08lW-wjg76CQPpKXVwRl-oNaz0SegwXQMp26HRpZs_R98P8_C7Y03HTqp9Y3BHQFZ03dxz0aBgB7zANTKVt-MYV90lr7aWNCAq16DhQpxjXaIaSBudoWd8AxfjhvPrSK70/s400/Tayandyou+takeover1.jpg&quot; width=&quot;377&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
Notice that @TestAccountInt1 is in all these tweets. &amp;nbsp;That account is very new, and probably tied to this takeover:&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvWmuhUD6tP1TH4rfrhoxu4thfxDLJlbGujLEtEgssZgDfCFgVp7Vx0X-3yQ8dUEaMfBrLts1itvEsMqqTOr1pTVJhac8oOpOI7qMzPj_AcboEb1vTl8w9Ecx4uqiXzvyhSoStK4xPDA4/s1600/Screen+Shot+2016-03-30+at+12.46.51+AM.png&quot; imageanchor=&quot;1&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;148&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvWmuhUD6tP1TH4rfrhoxu4thfxDLJlbGujLEtEgssZgDfCFgVp7Vx0X-3yQ8dUEaMfBrLts1itvEsMqqTOr1pTVJhac8oOpOI7qMzPj_AcboEb1vTl8w9Ecx4uqiXzvyhSoStK4xPDA4/s400/Screen+Shot+2016-03-30+at+12.46.51+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
Notice the second to last tweet: &quot;straight up drivin the hot mess express CHOO CHOOOOO&quot;. &amp;nbsp;This is a very distinct expression, and if this was the real Tay chatbot, there would most likely be another tweet exactly like this somewhere in Twitter history. &amp;nbsp;But I could only find two:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7UFypSvA1ptielQV59CO-5aG3crOq9p4uFa7rOS2Ooelq7167eNJD8b4_VUPsZ-IoR72UIBP1jGbm7ptXBDbiIJ_OTs4m6UuDxO4EPHT8qlwUrHQKPLaezVRT_CFbsDA5TMsSKSqqL1Q/s1600/Screen+Shot+2016-03-30+at+1.11.37+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;142&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7UFypSvA1ptielQV59CO-5aG3crOq9p4uFa7rOS2Ooelq7167eNJD8b4_VUPsZ-IoR72UIBP1jGbm7ptXBDbiIJ_OTs4m6UuDxO4EPHT8qlwUrHQKPLaezVRT_CFbsDA5TMsSKSqqL1Q/s400/Screen+Shot+2016-03-30+at+1.11.37+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
[&lt;i&gt;Update 4:20am -- Corrected:&lt;/i&gt;]&lt;br /&gt;
The first is a retweet of AI-Tay (Mar 23). &amp;nbsp;The second tweet may or may not be a historical tweet (i.e. pre-Tay), but there is no date. &amp;nbsp;I tried to find it through search inside Twitter and I couldn&#39;t find it. &lt;br /&gt;
&lt;br /&gt;
Hijacked-Tay&#39;s most frequent tweet, by far, was &quot;You are too fast, please take a rest...&quot;. &amp;nbsp;Here is a &lt;i&gt;very&lt;/i&gt; small sample:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLn5UC2cHhozQPvfiR22gtNjNEiw_dB4ar8cDXLBmSXxlmDuIBsIw7gcinEdSwt83jOIhkJ0nZDJQXa-NUY0_7mRlBUtHTU4CqM90JvALTvMdVBCxZF-9rnlR3ryCJ_ctUXHA4zbSpI8U/s1600/Screen+Shot+2016-03-30+at+12.31.11+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;345&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLn5UC2cHhozQPvfiR22gtNjNEiw_dB4ar8cDXLBmSXxlmDuIBsIw7gcinEdSwt83jOIhkJ0nZDJQXa-NUY0_7mRlBUtHTU4CqM90JvALTvMdVBCxZF-9rnlR3ryCJ_ctUXHA4zbSpI8U/s400/Screen+Shot+2016-03-30+at+12.31.11+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
At about 12:15am, I flagged the account as &quot;hacked&quot; on the account page for @Tayandyou. &amp;nbsp;Just a minute later, @Tayandyou tweets were set to &quot;protected&quot;, so I couldn&#39;t see them any more.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4xtPtAJ636Bs5zw1NLcbLrajFbSju21goYI1P2g0Uix1yX4pcT-vMzmnuin8z7gRdKRI6R484GXO9iHa0kYEELb2oLFiQT_jIV-_X0TRRdLLioM53VSBDKN2X6QxVrMs7Nn0NzHT_yIw/s1600/Screen+Shot+2016-03-30+at+12.30.43+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;73&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4xtPtAJ636Bs5zw1NLcbLrajFbSju21goYI1P2g0Uix1yX4pcT-vMzmnuin8z7gRdKRI6R484GXO9iHa0kYEELb2oLFiQT_jIV-_X0TRRdLLioM53VSBDKN2X6QxVrMs7Nn0NzHT_yIw/s400/Screen+Shot+2016-03-30+at+12.30.43+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Other folks (including @rogue_analyst) could still see @Tayandyou, but said that the tweet activity had ceased. &amp;nbsp;A few minutes after that, no one could see tweets from @Tayandyou. &amp;nbsp;Either Twitter took down the account or the hackers did themselves, having achieved their laughs. &amp;nbsp;Here is a sample of how human users reacted:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2dU5JRf3g2ZdpZBPFRUT9qPmbcLQOsGyrYZS4zs-KsUB-85cap5GhNgDqrTakAKS_K0LSL2lwgqKYHbNL7zflVYQFIPy_YvoLSJo_wf47jVSeDl7vEquOc9kqxANVAkdktv5I4V6F1vo/s1600/Screen+Shot+2016-03-30+at+12.46.30+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;336&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2dU5JRf3g2ZdpZBPFRUT9qPmbcLQOsGyrYZS4zs-KsUB-85cap5GhNgDqrTakAKS_K0LSL2lwgqKYHbNL7zflVYQFIPy_YvoLSJo_wf47jVSeDl7vEquOc9kqxANVAkdktv5I4V6F1vo/s400/Screen+Shot+2016-03-30+at+12.46.30+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
During this takeover, Hijacked-Tay sent out over 4,200 tweets in about 15 minutes. &amp;nbsp;Current tweets = &quot;100K&quot;, while it was &quot;95.8K&quot; when it was shut down.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg94DRvbIu1tWGbiLkjBqyVgLV_2Km44aUO55YhuRi2XkoJaD5Zqk6Vv467Ts39dR0ubW4wmMmmhfP-aKVALDaSpMmEavElpvYojoyCbDy7L_zXTONMSxDZs2dFilqM0d0Zdktu3AeA_9I/s1600/Screen+Shot+2016-03-30+at+12.45.34+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;183&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg94DRvbIu1tWGbiLkjBqyVgLV_2Km44aUO55YhuRi2XkoJaD5Zqk6Vv467Ts39dR0ubW4wmMmmhfP-aKVALDaSpMmEavElpvYojoyCbDy7L_zXTONMSxDZs2dFilqM0d0Zdktu3AeA_9I/s400/Screen+Shot+2016-03-30+at+12.45.34+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Notice that @Tayandyou&#39;s location is &quot;the internets&quot;. &amp;nbsp;Notice that the location for @TestAccountInt1, above, is &quot;Da Internet&quot;. &amp;nbsp;This is suggestive evidence that @TestAccountInt1 was created with @Tayandyou in mind.&lt;br /&gt;
&lt;br /&gt;
Let&#39;s see if this episode gets any press attention, and how they treat it. &amp;nbsp;I wonder if they will attribute it to Microsoft and more misbehavior because of AI poisoning?&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 2:30am&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
Looks like someone is cleaning up the account. &amp;nbsp;Tweet count was reduced steadily from 100K back down to 95K, which is 800 less than when Tay was shut down last week. &amp;nbsp;Also all the pictures that were uploaded (mostly just text saying &quot;You are too fast, please take a rest...&quot;) were also deleted.&lt;br /&gt;
&lt;br /&gt;
Yes, there has been some press coverage from online media. &amp;nbsp;No investigation and they don&#39;t mention hijack. &amp;nbsp;But at least they present some information:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.ibtimes.co.uk/microsoft-tay-ai-returns-boast-smoking-weed-front-police-spam-200k-followers-1552164&quot;&gt;http://www.ibtimes.co.uk/microsoft-tay-ai-returns-boast-smoking-weed-front-police-spam-200k-followers-1552164&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.mygossip.info/microsofts-tay-chatbot-comes-back-online-says-its-smoking-kush-in-front-of-the-police/&quot;&gt;http://www.mygossip.info/microsofts-tay-chatbot-comes-back-online-says-its-smoking-kush-in-front-of-the-police/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.thedrum.com/news/2016/03/30/taybot-goes-cray-bot-microsoft-ai-suffers-second-twitter-meltdown&quot;&gt;http://www.thedrum.com/news/2016/03/30/taybot-goes-cray-bot-microsoft-ai-suffers-second-twitter-meltdown&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.theverge.com/2016/3/30/11329858/tay-microsoft-ai-chatbot-back-spam&quot;&gt;http://www.theverge.com/2016/3/30/11329858/tay-microsoft-ai-chatbot-back-spam&lt;/a&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
These articles treat this restart as if it were the real AI-Tay chatbot, seeing all these tweets as just another example of antisocial behavior that it &quot;learned&quot; last week. &amp;nbsp;Several articles are just copied/repeated from other sources (a.k.a. &quot;&lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/media-coverage-of-tayfail-was-all-foam.html&quot;&gt;recycled beer foam&lt;/a&gt;&quot;).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
They do include some interesting new tweet content from Hijacked-Tay, including this:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4D-agMl0P3pSw0E3PjdncpTy61iIZ-3cPEEVWHTW0jK4c7sIBe3U6tKGZhvDK_regAJg27Rbq9gQKldoeSsLR4U4T_JXCqWcSacTf23ftuSTmKyOy04_y9eJWM-ivyckjl0s0IkC0Dyw/s1600/tay-tweets-kush.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;217&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg4D-agMl0P3pSw0E3PjdncpTy61iIZ-3cPEEVWHTW0jK4c7sIBe3U6tKGZhvDK_regAJg27Rbq9gQKldoeSsLR4U4T_JXCqWcSacTf23ftuSTmKyOy04_y9eJWM-ivyckjl0s0IkC0Dyw/s400/tay-tweets-kush.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Another very distinct phrase. &amp;nbsp;&quot;Kush&quot; is slang for marijuana. &amp;nbsp;The line comes from a rap song by&amp;nbsp;Gucci Mane called &quot;&lt;a href=&quot;http://www.booska-p.com/paroles-gucci-mane-ordinary-gangsta-p46204.html&quot;&gt;Ordinary Gangsta&lt;/a&gt;&quot;. &amp;nbsp;It&#39;s not a copy/paste of historical tweets, however. &amp;nbsp;It&#39;s not even copy/paste from the song. &amp;nbsp; I believe this was typed by a human, one of the hackers who took over the account.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.youtube.com/watch?v=kNzJrHAIkb4&quot;&gt;Here is some video&lt;/a&gt; of the tweet stream, with sound track added. Not very informative.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 3:30am&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
There&#39;s a threat on 4chan.com/pol/ &lt;a href=&quot;http://boards.4chan.org/pol/thread/69326129&quot;&gt;here&lt;/a&gt;. &amp;nbsp;Mostly they are just reacting to the new activity. &amp;nbsp;No evidence that anyone there is involved in the hack. &amp;nbsp;In fact, none of the posters seem to be aware that it was hacked, and instead they believe this was AI-Tay.&lt;br /&gt;
&lt;br /&gt;
There is some new information, including images posted by Hijacked-Tay. &amp;nbsp;This was apparently the last image posted by Hijacked-Tay.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhD8fPqssgrwaLD-R4UhKbnUQnLdv8d5ZjoRLVigrwE3wFvJ_oDVX11uP1URizCTxIuLhzMuPldwgD_M2TAHVDYM4jSvo6fYsJs8aj34s2hn8Mih6jXdvsj3F6MsRmGqdoF2BWbd8PfcU/s1600/Tayandyou+takeover+-+last+pic+saved.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;70&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhD8fPqssgrwaLD-R4UhKbnUQnLdv8d5ZjoRLVigrwE3wFvJ_oDVX11uP1URizCTxIuLhzMuPldwgD_M2TAHVDYM4jSvo6fYsJs8aj34s2hn8Mih6jXdvsj3F6MsRmGqdoF2BWbd8PfcU/s400/Tayandyou+takeover+-+last+pic+saved.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The binary decodes into ascii text:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZQFX-qEKKPbuCsukhu-XmgEW6uM6yeFPCIUe2EUKfKtXVPv4WT4omPP4bi2pTBNpPw9wmJQCHYOcO2nSrfvTB-3tlB5OtQqpdBkf_gE2ds_smWcAEiOz6vThFzV4YsyZfZn4qLEzMp6g/s1600/Screen+Shot+2016-03-30+at+3.31.51+AM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;132&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZQFX-qEKKPbuCsukhu-XmgEW6uM6yeFPCIUe2EUKfKtXVPv4WT4omPP4bi2pTBNpPw9wmJQCHYOcO2nSrfvTB-3tlB5OtQqpdBkf_gE2ds_smWcAEiOz6vThFzV4YsyZfZn4qLEzMp6g/s400/Screen+Shot+2016-03-30+at+3.31.51+AM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Looks like the work of a hax0r to me, for the lulz.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/7999745211817487744/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/tay-twist-tayandyou-twitter-account-was.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7999745211817487744'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/7999745211817487744'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/tay-twist-tayandyou-twitter-account-was.html' title='#Tay Twist: @Tayandyou Twitter Account Was Hijacked ...By Bungling Microsoft Test Engineers (Mar. 30)'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7j5FFhPgAS08lW-wjg76CQPpKXVwRl-oNaz0SegwXQMp26HRpZs_R98P8_C7Y03HTqp9Y3BHQFZ03dxz0aBgB7zANTKVt-MYV90lr7aWNCAq16DhQpxjXaIaSBudoWd8AxfjhvPrSK70/s72-c/Tayandyou+takeover1.jpg" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-1133151557639545712</id><published>2016-03-29T17:17:00.000-07:00</published><updated>2016-03-29T17:30:56.213-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="other"/><title type='text'>Media Coverage of #TayFail Was &quot;All Foam, No Beer&quot;</title><content type='html'>One of the most surprising things I&#39;ve discovered in the course of investigating and reporting on Microsoft&#39;s Tay chatbot is how the rest of the media (traditional and online) have covered it, and how the digital media works in general.&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;None of the articles in major media included any investigation or research&lt;/i&gt;. &amp;nbsp;None. &amp;nbsp;Let that sink in.&lt;br /&gt;
&lt;br /&gt;
All foam, no beer.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;With only three exceptions, none of the minor media (including blogs) included any investigation or research either. &amp;nbsp;Here are the three standouts:&lt;br /&gt;
&lt;ul style=&quot;color: #222222; font-family: &#39;Times New Roman&#39;, Times, FreeSerif, serif; font-size: 15px; line-height: 1.4; margin: 0.5em 0px; padding: 0px 2.5em;&quot;&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&quot;&lt;a href=&quot;https://medium.com/@carolinesinders/microsoft-s-tay-is-an-example-of-bad-design-d4e65bb2569f#.4rla482rh&quot; style=&quot;color: #00808b; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Microsoft’s Tay is an Example of Bad Design (or Why Interaction Design Matters, and so does QA-ing)&lt;/a&gt;&quot; -- e.g. inadequate black list&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&quot;T&lt;a href=&quot;http://smerity.com/articles/2016/tayandyou.html&quot; style=&quot;color: #00808b; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;ayAndYou - toxic before human contact&lt;/a&gt;&quot; -- e.g. inadequate filtering of training corpus, incl. tweet corpus.&lt;/li&gt;
&lt;li style=&quot;margin: 0px 0px 0.25em; padding: 0px;&quot;&gt;&quot;&lt;a href=&quot;https://medium.com/@botego/why-microsoft-s-chatbot-tay-failed-and-what-does-it-mean-for-artificial-intelligence-studies-fb71d22e8359#.y7jgs8b79&quot; style=&quot;color: #00808b; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Why did Microsoft’s chatbot Tay fail, and what does it mean for Artificial Intelligence studies?&lt;/a&gt;&quot; -- e.g. poor marketing communications and real-time management&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;There were about 500 articles on the Tay and aftermath, give or take. &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15px;&quot;&gt;There were serious articles in New York Times, The Guardian, Washington Post, and others.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15px;&quot;&gt;At least 25 articles featured &quot;what went wrong&quot; or &quot;lessons learned&quot; angle. &amp;nbsp;A small number of these included quotes from AI experts, who offered their opinions but did not, themselves, do any investigation or research into Tay.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif; font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;Looking at the human side, I&#39;d guess that there were about 200 to 400 humans involved in writing, editing, contributing to, and publish these articles. &amp;nbsp;(Yes, probably fewer humans than number of different articles because of syndication or similar.) &amp;nbsp;How could all of those humans, many who are considered professionals and journalists, decide to write and publish articles without credible evidence? &amp;nbsp;I can think of five reasons.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;i&gt;First&lt;/i&gt;, they all seemed to believe the tweets were self-evident and thus there was nothing to investigate. &amp;nbsp;Tay was AI because Microsoft said it was, and look at all these anti-social tweets! &amp;nbsp;Case closed!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;i&gt;Second&lt;/i&gt;, this story easily fits into one of the frames and narratives about AI in the real world: it&#39;s potentially dangerous and could easily &quot;go rogue&quot;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;i&gt;Third&lt;/i&gt;, the Copy/Paste Ethic in our culture, where many people believe that it is perfectly reasonable and morally proper to write an article or paper by copying and pasting content from other digital content. &amp;nbsp;Ask any high school teacher or college professor about this, and be prepared for either a rant or tears of frustration.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;i style=&quot;font-size: 15px;&quot;&gt;Fourth&lt;/i&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;, economic incentives that have been crushing media organizations for years have pushed them to push out content as fast as possible with as little cost as possible. &amp;nbsp;Even many articles that looked original were mostly quoting and&amp;nbsp;referring to other articles.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;i&gt;Fifth&lt;/i&gt; and finally, some of these articles fit a the definition of a &quot;&lt;a href=&quot;https://newrepublic.com/article/121501/history-hot-take&quot;&gt;hot take&lt;/a&gt;&quot;. &amp;nbsp;A &quot;hot take&quot; is &quot;a piece of opinion journalism hastily written in a scolding tone... [where] there’s a “just telling it like it is” attitude, even if, according to the best available data, it is not like that at all.&quot; &amp;nbsp;In the case of Tay, the hot take articles focused on ranting and stone throwing, either at AI, at Internet trolls and troll culture, or both.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;times new roman&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;freeserif&amp;quot; , serif;&quot;&gt;&lt;span style=&quot;font-size: 15px;&quot;&gt;In the primary articles the net result was &lt;b&gt;&lt;i&gt;all foam, no beer.&lt;/i&gt;&lt;/b&gt; &amp;nbsp;For the secondary and tertiary sources that&amp;nbsp;mimicked and repeated from the primary articles, they were no better than &lt;i&gt;&lt;b&gt;recycled beer foam&lt;/b&gt;&lt;/i&gt;. &amp;nbsp;Let that image sink in.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7duEsc9uUbCZaGb0urmoR3C2gn5LgqbgTNjmzTcV8j5y3psZYctSQt29jRjpLa9vb9pstDHtCc_7JIVfj2JJy9GRuvRJN5MtPNrnosM4X8oANhcDnWp3BNYeY0r_n4EMWX33eUXiVaF8/s1600/Recycled+beer+foam.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;61&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7duEsc9uUbCZaGb0urmoR3C2gn5LgqbgTNjmzTcV8j5y3psZYctSQt29jRjpLa9vb9pstDHtCc_7JIVfj2JJy9GRuvRJN5MtPNrnosM4X8oANhcDnWp3BNYeY0r_n4EMWX33eUXiVaF8/s400/Recycled+beer+foam.png&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;font-size: 13px;&quot;&gt;Recycled beer foam. &amp;nbsp;From:&amp;nbsp;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;The Monitors&lt;/i&gt;&amp;nbsp;b&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;y Keith Laumer, p 1&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/1133151557639545712/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/media-coverage-of-tayfail-was-all-foam.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/1133151557639545712'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/1133151557639545712'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/media-coverage-of-tayfail-was-all-foam.html' title='Media Coverage of #TayFail Was &quot;All Foam, No Beer&quot;'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7duEsc9uUbCZaGb0urmoR3C2gn5LgqbgTNjmzTcV8j5y3psZYctSQt29jRjpLa9vb9pstDHtCc_7JIVfj2JJy9GRuvRJN5MtPNrnosM4X8oANhcDnWp3BNYeY0r_n4EMWX33eUXiVaF8/s72-c/Recycled+beer+foam.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-8965594204473581699</id><published>2016-03-27T16:19:00.001-07:00</published><updated>2016-03-28T00:07:06.439-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="other"/><title type='text'>Microsoft&#39;s Tay Has No AI</title><content type='html'>(This is the third of three posts about Tay. Previous posts: &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/poor-software-qa-is-root-cause-of-tay.html&quot;&gt;&quot;Poor Software QA...&quot;&lt;/a&gt; and &quot;&lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/microsoft-tayfail-smoking-gun-alice.html&quot;&gt;...Smoking Gun...&lt;/a&gt;&quot;)&lt;br /&gt;
&lt;br /&gt;
While nearly all the press about Microsoft&#39;s Twitter chatbot Tay (@Tayandyou) is about artificial intelligence (AI) and how AI can be poisoned by trolling users, there is a more disturbing possibility:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;There is no AI (worthy of the name) in Tay.&lt;/b&gt; (probably)&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
I say &quot;probably&quot; because the evidence is strong but not conclusive and the Microsoft Research team has not publicly revealed their architecture or methods. &amp;nbsp;But I&#39;m willing to bet on it.&lt;br /&gt;
&lt;br /&gt;
Evidence comes from three places. &lt;i&gt;First&lt;/i&gt; is from observing a small non-random sample of Tay tweet and direct message sessions (posted by various users). &lt;i&gt;Second&lt;/i&gt; is circumstantial, from composition of the team behind Tay. &lt;i&gt;Third&lt;/i&gt; piece of evidence is from a person who claims to have worked at Microsoft Research on Tay until June 2015. &amp;nbsp;He/she made two comments to my first post, but unfortunately deleted the second comment which had lots of details.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXmRe8u9RrokIROojPB7Mnponchmb35HNblC4ELVND8VERJdYzPVEY3GY6SUPiaPssptJLWV7KO2c1mEqS0Ai7oKhmY0cYOEkPdM4o64ONFjtDcjYaJd3D8_V8DoA042VQ1bt-Nk4uh3c/s1600/Screen+Shot+2016-03-27+at+2.55.38+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;365&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXmRe8u9RrokIROojPB7Mnponchmb35HNblC4ELVND8VERJdYzPVEY3GY6SUPiaPssptJLWV7KO2c1mEqS0Ai7oKhmY0cYOEkPdM4o64ONFjtDcjYaJd3D8_V8DoA042VQ1bt-Nk4uh3c/s400/Screen+Shot+2016-03-27+at+2.55.38+PM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;h3&gt;
AI Worthy of the Name&lt;/h3&gt;
&lt;div&gt;
What is and is not &quot;artificial intelligence&quot; (AI) is a complex topic that is hotly debated. &amp;nbsp;I won&#39;t resolve the debate here, but instead only explain my point of view.&lt;br /&gt;
&lt;br /&gt;
To be worthy of AI, it is not enough that a system &quot;look intelligent&quot;. &amp;nbsp;The first famous chat bot was &lt;a href=&quot;https://en.wikipedia.org/wiki/ELIZA&quot;&gt;ELIZA&lt;/a&gt;, written between&amp;nbsp;1964 and 1966. &quot;ELIZA was implemented using simple pattern matching techniques, but was taken seriously by several of its users, even after Weizenbaum [the author] explained to them how it worked.&quot; &amp;nbsp;It looked intelligent, but really wasn&#39;t.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To be worthy of AI, the system&#39;s behavior needs to be a direct consequence of computational emulation of human intelligence at some level of abstraction. &amp;nbsp;For Tay to be AI, its behavior should be based on some combination of NLP and common sense knowledge/reasoning, including understanding of conversations.&lt;br /&gt;
&lt;br /&gt;
At the very least, any &quot;learning&quot; in Tay should be due to improved understanding, i.e. better perception, conception, affect, anticipation, and similar -- however these are implemented computationally or abstracted.&lt;br /&gt;
&lt;br /&gt;
Does all of &quot;machine learning&quot; (ML) fit within this definition of AI? &amp;nbsp;No. &amp;nbsp;Some does, some doesn&#39;t. In nearly all use cases of ML, what we care about are outputs. &amp;nbsp;We don&#39;t care if it is human-like or not. &amp;nbsp;In some cases, ML does resemble human reasoning, but in other cases it does not.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 9:45pm&lt;/i&gt;] Are modern search engines built on AI? I don&#39;t know anyone who makes that argument. &amp;nbsp;Instead, the technology in search engines to mine the &quot;intelligence&quot; inherent in networks of links (the original Pagerank of Google) and various other properties of content and search behavior.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
1) No Evidence of NLP or Common Sense Knowledge&lt;/h3&gt;
&lt;div&gt;
Natural Language Processing (NLP) is a set of techniques that attempt computer understanding of natural language. &amp;nbsp;(See the&amp;nbsp;&lt;a href=&quot;http://nlp.stanford.edu/&quot;&gt;Stanford NLP site&lt;/a&gt;.) &amp;nbsp;NLP involves sentence understanding, question answering, sentiment inference, and more.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Common sense knowledge is understanding of our everyday existence and the implications. &amp;nbsp;Simple examples of such knowledge:&amp;nbsp;&quot;All trees are plants&quot; but also &quot;Some plants are not trees&quot;, and so on. It turns out that common sense knowledge is both vast and hard to compile in machine usable form. (See Cyc project &lt;a href=&quot;https://en.wikipedia.org/wiki/Cyc&quot;&gt;here&lt;/a&gt; and recent news&amp;nbsp;&lt;a href=&quot;https://www.technologyreview.com/s/600984/an-ai-with-30-years-worth-of-knowledge-finally-goes-to-work/&quot;&gt;here&lt;/a&gt;). &amp;nbsp;For what its worth, &amp;nbsp;most NLP systems to not also try to include common sense knowledge and reasoning.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I won&#39;t go through a lot of examples, leaving that as an exercise for readers. &amp;nbsp;Here&#39;s just one tweet sequence between Tay and a troll:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4LitmG6YlqgrNEDNxaGmc5yYocJGQAk8NwQxjC7N4ParwIIAjoKdKUQ0aMipFlhb9WHsIeDxmxucvov6sO_lwiYUQvSdAjBwipxL0EOWXuHsJwAG3ql-mSdYycWhAY7yOTBrEpCDLF1Q/s1600/Screen+Shot+2016-03-27+at+3.10.46+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4LitmG6YlqgrNEDNxaGmc5yYocJGQAk8NwQxjC7N4ParwIIAjoKdKUQ0aMipFlhb9WHsIeDxmxucvov6sO_lwiYUQvSdAjBwipxL0EOWXuHsJwAG3ql-mSdYycWhAY7yOTBrEpCDLF1Q/s320/Screen+Shot+2016-03-27+at+3.10.46+PM.png&quot; width=&quot;280&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwtJbrU4C_E1lpUkr9bgbNmliEBytLOXrV1YMytmaDrgaRkQM2f4BbD952ggaSOkw5gcIpdSUtbiyRFbx-ZYRXIcHKOGswGXo6krTPNPClSY10rDQDkKPhDg5CS15zmYgqCiZmQYZnBFM/s1600/Screen+Shot+2016-03-27+at+3.11.23+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwtJbrU4C_E1lpUkr9bgbNmliEBytLOXrV1YMytmaDrgaRkQM2f4BbD952ggaSOkw5gcIpdSUtbiyRFbx-ZYRXIcHKOGswGXo6krTPNPClSY10rDQDkKPhDg5CS15zmYgqCiZmQYZnBFM/s320/Screen+Shot+2016-03-27+at+3.11.23+PM.png&quot; width=&quot;295&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIheH3lewFucH6wlfaJ79kjpIZQrBXlK4EWgpyDVOi-evpjVTu3UoN6k76s0lb-SLK6N-ogwYSH7X-bnDIf9YUmLX0hCDCo4amR_C9YVYONEO4bVGXh9GeWeHQYIyGc7_r_HrdxleE-kE/s1600/Screen+Shot+2016-03-27+at+3.11.40+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiIheH3lewFucH6wlfaJ79kjpIZQrBXlK4EWgpyDVOi-evpjVTu3UoN6k76s0lb-SLK6N-ogwYSH7X-bnDIf9YUmLX0hCDCo4amR_C9YVYONEO4bVGXh9GeWeHQYIyGc7_r_HrdxleE-kE/s320/Screen+Shot+2016-03-27+at+3.11.40+PM.png&quot; width=&quot;284&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&amp;nbsp;Looking at the above tweet stream, I can&#39;t see &lt;i&gt;any&lt;/i&gt; evidence that Tay is performing any of this. &amp;nbsp;Each of Tay&#39;s replies has some relation to the human tweet, but only in a vague general way. &amp;nbsp;I can&#39;t see any specific text in Tay&#39;s replies that reflect any understanding of the human tweet. &amp;nbsp;Furthermore, there is no evidence that Tay understands this sequence of tweets as a conversation. &amp;nbsp;Each tweet+reply is atomic.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 9:45pm&lt;/i&gt;] &amp;nbsp;Here is the enlarge Tay reply-tweet from above. &amp;nbsp;Tay found copied it verbatim from its Twitter corpus:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgLe0FYkp5BLz7KX857QbfGhl7_DdmLS6MTli_G5OaL0HmxeKzLtJZwf6bQSf2IR5zhDnD45Pul6ACIUMGoTW-rBLL7X71C_94u3Gc6LrhutSxCpC6y7Bk0MdpzRHn94cZIu-ztJZdfaQ/s1600/Screen+Shot+2016-03-27+at+9.43.30+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;119&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgLe0FYkp5BLz7KX857QbfGhl7_DdmLS6MTli_G5OaL0HmxeKzLtJZwf6bQSf2IR5zhDnD45Pul6ACIUMGoTW-rBLL7X71C_94u3Gc6LrhutSxCpC6y7Bk0MdpzRHn94cZIu-ztJZdfaQ/s320/Screen+Shot+2016-03-27+at+9.43.30+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Also, I see no evidence that Tay has common sense understanding of any concepts, either those of humans or in Tay&#39;s utterances.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
How could anyone believe that Tay had NLP capabilities or common sense? &amp;nbsp;Part of the trick is the cryptic nature of tweets, being limited to 140 characters. &amp;nbsp;Another is the social norms of many twitter users, especially younger users, who write cryptically, elliptically, and don&#39;t follow standard grammar and spelling. &amp;nbsp;Most twitter users get used to inferring meaning from cryptic tweets, whether or not that meaning was being intention on the part of the tweet author.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
2) The Bing Team Was Involved in Tay&lt;/h3&gt;
&lt;div&gt;
Bing is Microsoft&#39;s web search engine, competing with Google and others. From tay.ai web page: &quot;Tay is an artificial intelligent chat bot developed by Microsoft&#39;s Technology and Research and &lt;i&gt;Bing&lt;/i&gt; teams to experiment with and conduct research on conversational understanding.&quot; (emphasis added) Why would the search engine team be involved in social chat bot research? &amp;nbsp;I don&#39;t know. &amp;nbsp;I&#39;m not aware of other social bot research where search engine people, tools, or methods are being used.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
One of the odd behaviors noted was that Tay was reusing, verbatim, tweets from recent history (i.e. not through direct interaction with users, a.k.a. &quot;learning&quot;). &amp;nbsp;This example comes from a &lt;a href=&quot;http://smerity.com/articles/2016/tayandyou.html&quot;&gt;post by Steve Merity&lt;/a&gt;. &amp;nbsp;Here&#39;s the human tweet and Tay&#39;s reply:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJoyoQgia4Y4xqP_W85lly12Ho3NT8iqGo0Ac-ZC44b04QMH1XX5IUjoXJdqvb2mpQOXN0FtQUnPtsadK2JzdkkL6C6khsJ7WUZCA9tCMgxFLweF5ApQmO-M66z9Dd0uiJCWxApD1C8vk/s1600/Tay+repeats1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJoyoQgia4Y4xqP_W85lly12Ho3NT8iqGo0Ac-ZC44b04QMH1XX5IUjoXJdqvb2mpQOXN0FtQUnPtsadK2JzdkkL6C6khsJ7WUZCA9tCMgxFLweF5ApQmO-M66z9Dd0uiJCWxApD1C8vk/s320/Tay+repeats1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Where did Tay get this? &amp;nbsp;Everything after &quot;...&quot; is copied from this tweet from its corpus:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0tRSwjH0JnVmx41qkYc7Wg1FWsa9MVrNhLjrL1bYX6TZDadH8a-rRkWs1AGZkNs_8CoFmV24wUKS5Uce0EKdonLkvQF83DNbMCQJUYZ2jjgLZgXf-w03ifcMWG6JWx9g_F_1MMPhINqY/s1600/Screen+Shot+2016-03-27+at+3.33.14+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0tRSwjH0JnVmx41qkYc7Wg1FWsa9MVrNhLjrL1bYX6TZDadH8a-rRkWs1AGZkNs_8CoFmV24wUKS5Uce0EKdonLkvQF83DNbMCQJUYZ2jjgLZgXf-w03ifcMWG6JWx9g_F_1MMPhINqY/s320/Screen+Shot+2016-03-27+at+3.33.14+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
It&#39;s easy to imagine this as a search result given &quot;Ted Cruz&quot; and &quot;Zodiac Killer&quot; as search text.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3&gt;
3) The Inside Story From Former MSR Engineer&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;
In the comment shown above, you can see this anonymous commenter say that the technology behind Tay was basically search engine. &amp;nbsp;This aligns with the fact that the Bing team was a significant participant.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
In the deleted tweet, this commenter added important details (he/she left MSR in June 2015):&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;He/she did not see any AMIL bot (ALICE or other) in Tay, but instead such a bot might have been used to expand the corpus or train the search engine.&lt;/li&gt;
&lt;li&gt;The basic design was this (crudely sketched):&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;The input text from human was converted into a Regular Expression (i.e. text with wild cards, etc.)&lt;/li&gt;
&lt;li&gt;The regular expression is entered into the search engine, which searches over a social media corpus (presumably including Tweet history)&lt;/li&gt;
&lt;li&gt;The search results are filtered through Python code (&quot;a 100 or so&quot; if-then-else statements) to pick the result(s) to use, and piece them together into Tay&#39;s reply tweet.&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;There is no understanding or reasoning about conversational context.&lt;/li&gt;
&lt;li&gt;No NLP or semantic reasoning. &amp;nbsp;No neural nets, deep learning, or other ML outside of what search engines are capable of.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;h3&gt;
Conclusions&lt;/h3&gt;
&lt;div&gt;
From these three sources of evidence, I infer two things. &amp;nbsp;First, I believe that an &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/microsoft-tayfail-smoking-gun-alice.html&quot;&gt;AIML-capable library (probably ALICE)&lt;/a&gt;&amp;nbsp;was added after June 2015 in order to implement rule-based behavior they couldn&#39;t otherwise easily implement through the pipeline listed above. &amp;nbsp;Second, I believe that the &lt;i&gt;only&lt;/i&gt; learning in Tay was a) adding to the corpus through real-time interaction, and b) tuning the search engine though the normal adaptive mechanisms.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/8965594204473581699/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/microsofts-tay-has-no-ai.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/8965594204473581699'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/8965594204473581699'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/microsofts-tay-has-no-ai.html' title='Microsoft&#39;s Tay Has No AI'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXmRe8u9RrokIROojPB7Mnponchmb35HNblC4ELVND8VERJdYzPVEY3GY6SUPiaPssptJLWV7KO2c1mEqS0Ai7oKhmY0cYOEkPdM4o64ONFjtDcjYaJd3D8_V8DoA042VQ1bt-Nk4uh3c/s72-c/Screen+Shot+2016-03-27+at+2.55.38+PM.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-223684362101483281</id><published>2016-03-26T15:24:00.004-07:00</published><updated>2016-03-27T16:34:50.669-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="other"/><title type='text'>Microsoft #TAYFAIL Smoking Gun: ALICE Open Source AI Library and AIML</title><content type='html'>[&lt;i&gt;Update 3/27/16: see also the next post: &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/microsofts-tay-has-no-ai.html&quot;&gt;Microsoft&#39;s Tay has no AI&lt;/a&gt;&quot;&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
As follow up to my &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/poor-software-qa-is-root-cause-of-tay.html&quot;&gt;previous post&lt;/a&gt; on Microsoft&#39;s&amp;nbsp;Tay Twitter chatbot (@Tayandyou), I found evidence of where the &quot;repeat after me&quot; hidden feature came from. &amp;nbsp;Credit goes to&amp;nbsp;&lt;a href=&quot;https://www.blogger.com/profile/18069463531767062132&quot;&gt;SSHX&lt;/a&gt;&amp;nbsp;for this lead in his &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/poor-software-qa-is-root-cause-of-tay.html?showComment=1459028463510#c6022182262222328953&quot;&gt;comment&lt;/a&gt;:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;This was a feature of AIML bots as well, that were popular in &#39;chatrooms&#39; way back in the late 90&#39;s. You could ask questions with AIML tags and the bots would automatically start spewing source into the room and flooding it. Proud to say I did get banned from a lot of places.&quot;&lt;/blockquote&gt;
A quick web search revealed great evidence. First, some context.&lt;br /&gt;
&lt;br /&gt;
AIML is acronym for &quot;&lt;a href=&quot;http://www.alicebot.org/aiml.html&quot;&gt;Artificial Intelligence Markup Language&lt;/a&gt;&quot;, which &quot;is an XML-compliant language that&#39;s easy to learn, and makes it possible for you to begin customizing an Alicebot or creating one from scratch within minutes.&quot; &amp;nbsp;ALICE is acronym for &quot;Artificial Linguistic Internet Computer Entity&quot;. &amp;nbsp;ALICE is free natural language artificial intelligence chat robot.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Evidence&lt;/h3&gt;
This &lt;a href=&quot;https://github.com/igorhvr/bedlam/blob/master/sisc/sisc-contrib/irc/scheme/sarah/anna/anna_brain/R.aiml&quot;&gt;Github page&lt;/a&gt; has a set of AIML statements staring with &quot;R&quot;. (This is a fork of &quot;9/26/2001 ALICE&quot;, so there are probably some differences between Base ALICE today.) &amp;nbsp;Here are two statements matching &quot;REPEAT AFTER ME&quot; and &quot;REPEAT THIS&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5ZwQbdQLNt6bk38yloO428vyJoa0Ocm-pzlwZVExNYE5bdIIIvoBUC5TwM8y2m3dpmvZZa_5RC1FEt6ekC1Trw2gcY_JYIrfq52CvKTsXN-pZVzHWokd7raLOcAiNV9ds1-Q5tKf5F3w/s1600/Screen+Shot+2016-03-26+at+3.05.17+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;170&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5ZwQbdQLNt6bk38yloO428vyJoa0Ocm-pzlwZVExNYE5bdIIIvoBUC5TwM8y2m3dpmvZZa_5RC1FEt6ekC1Trw2gcY_JYIrfq52CvKTsXN-pZVzHWokd7raLOcAiNV9ds1-Q5tKf5F3w/s400/Screen+Shot+2016-03-26+at+3.05.17+PM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Snippet of AIML statements with &quot;REPEAT AFTER ME&quot; AND &quot;REPEAT THIS&quot;&lt;br /&gt;
(click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
As it happens, there is an interactive web page with Base ALICE &lt;a href=&quot;http://pandorabots.com/pandora/talk?botid=f5d922d97e345aa1&quot;&gt;here&lt;/a&gt;. (Try it out yourself.) Here is what happened when I entered &quot;repeat after me&quot; and also &quot;repeat this...&quot;:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6Wbv8wv9HebzZUx3Nmxo626YX_Fz5wm3VRaO5wWj22t7Jze0sncnGJ1Z8OA8VNunQqgXOS2YyAAJd7qs8FzjKn5qLC6U4obz0waE0JOrl6iRHAMkyqOz4_Y4N8hEySzuqZrtieNrBeNY/s1600/Screen+Shot+2016-03-26+at+3.08.11+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;218&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6Wbv8wv9HebzZUx3Nmxo626YX_Fz5wm3VRaO5wWj22t7Jze0sncnGJ1Z8OA8VNunQqgXOS2YyAAJd7qs8FzjKn5qLC6U4obz0waE0JOrl6iRHAMkyqOz4_Y4N8hEySzuqZrtieNrBeNY/s400/Screen+Shot+2016-03-26+at+3.08.11+PM.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
In Base ALICE, the template response to &quot;repeat after me&quot; is &quot;...&quot;. &amp;nbsp;In other words, NOP (&quot;no operation&quot;). &amp;nbsp;This is different from the AIML statement, above, which is &quot;.....Seriously....Lets have a conversation and not play word games.....&quot;. &amp;nbsp;Looks like someone just deleted the text following three periods.&lt;br /&gt;
&lt;br /&gt;
But the template response to &quot;repeat this X&quot; is &quot;X&quot; (in quotes), which is consistent with the AIML statement, above.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Conclusion&lt;/h3&gt;
From this evidence, I infer that Microsoft&#39;s Tay chatbot is using the open-sourced ALICE library (or similar AIML library) to implement rule-based behavior. &amp;nbsp;Though they did implement some rules to thwart trolls (e.g. gamergate), they left in other rules from previous versions of ALICE (either Base ALICE or some forked versions).&lt;br /&gt;
&lt;br /&gt;
My assertion about root cause stands: poor QA &lt;i&gt;process&lt;/i&gt; on the ALICE rule set allowed the &quot;repeat after me&quot; feature to stay in, when it should have been removed or modified significantly. &lt;br /&gt;
&lt;br /&gt;
Another inference is that &quot;repeat after me&quot; is probably not the only &quot;hidden feature&quot; in AIML rules that could have caused misbehavior. &amp;nbsp;It was just the one that the trolls stumbled upon and exploited. &amp;nbsp;Someone with access to Base ALICE rules and also variants could have exploited these other vulnerabilities.</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/223684362101483281/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/microsoft-tayfail-smoking-gun-alice.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/223684362101483281'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/223684362101483281'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/microsoft-tayfail-smoking-gun-alice.html' title='Microsoft #TAYFAIL Smoking Gun: ALICE Open Source AI Library and AIML'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5ZwQbdQLNt6bk38yloO428vyJoa0Ocm-pzlwZVExNYE5bdIIIvoBUC5TwM8y2m3dpmvZZa_5RC1FEt6ekC1Trw2gcY_JYIrfq52CvKTsXN-pZVzHWokd7raLOcAiNV9ds1-Q5tKf5F3w/s72-c/Screen+Shot+2016-03-26+at+3.05.17+PM.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-2871554597147598036</id><published>2016-03-25T16:51:00.002-07:00</published><updated>2016-03-27T16:34:12.626-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="information security"/><category scheme="http://www.blogger.com/atom/ns#" term="other"/><title type='text'>Poor Software QA Is Root Cause of TAY-FAIL (Microsoft&#39;s AI Twitter Bot)</title><content type='html'>[&lt;i&gt;Update 3/26/16 3:40pm: Found the smoking gun. Read &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/microsoft-tayfail-smoking-gun-alice.html&quot;&gt;this new post&lt;/a&gt;. Also the recent post: &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/microsofts-tay-has-no-ai.html&quot;&gt;&quot;Microsoft&#39;s Tay has no AI&quot;&lt;/a&gt;&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
This happened:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;On Wednesday morning, the company unveiled &lt;b&gt;Tay &lt;/b&gt;[@Tayandyou], a chat bot meant to mimic the verbal tics of a 19-year-old American girl, provided to the world at large via the messaging platforms Twitter, Kik and GroupMe. According to Microsoft, the aim was to &#39;conduct research on conversational understanding.&#39; Company researchers programmed the bot to respond to messages in an &#39;entertaining&#39; way, impersonating the audience it was created to target: 18- to 24-year-olds in the US. &#39;Microsoft’s AI fam from the internet that’s got zero chill,&#39; Tay’s tagline read.&quot; (&lt;i&gt;Wired&lt;/i&gt;)&lt;/blockquote&gt;
Then it all went wrong, and Microsoft quickly pulled the plug:&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;Hours into the chat bot’s launch, Tay was echoing Donald Trump’s stance on immigration, saying Hitler was right, and agreeing that 9/11 was probably an inside job. By the evening, Tay went offline, saying she was taking a break &#39;to absorb it all.&#39; &quot; (&lt;i&gt;Wired&lt;/i&gt;)&amp;nbsp;&lt;/blockquote&gt;
Why did it go &quot;terribly wrong&quot;? &amp;nbsp;Here are two articles that assert&amp;nbsp;the problem is in the AI:&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://www.wired.com/2016/03/fault-microsofts-teen-ai-turned-jerk/&quot; target=&quot;_blank&quot;&gt;&quot;It’s Your Fault Microsoft’s Teen AI Turned Into Such a Jerk&quot;&lt;/a&gt; - &lt;i&gt;Wired &amp;nbsp;&lt;/i&gt;tl;dr: &quot;this is just how this kind of AI works&quot;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.techrepublic.com/article/why-microsofts-tay-ai-bot-went-wrong/&quot; target=&quot;_blank&quot;&gt;&quot;Why Microsoft&#39;s &#39;Tay&#39; AI bot went wrong...AI experts explain why it went terribly wrong&quot;&lt;/a&gt;&amp;nbsp;- &lt;i&gt;TechRepublic &lt;/i&gt;&amp;nbsp;tl;dr: &quot;The system is designed to learn from its users, so it will become a reflection of their behavior&quot;.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
The &quot;blame AI&quot; argument is: if you troll an AI bot hard enough and long enough, it will learn to be racist and vulgar. ([&lt;i&gt;Update&lt;/i&gt;] For an example, see &lt;a href=&quot;http://exploringpossibilityspace.blogspot.com/2016/03/poor-software-qa-is-root-cause-of-tay.html#example_of_poisoning&quot;&gt;this section&lt;/a&gt;, at the end of this post)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
I claim: the explanations that blame AI are &lt;b&gt;&lt;i&gt;wrong&lt;/i&gt;&lt;/b&gt;, at least in the specific case of tay.ai.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
[&lt;i&gt;Update 3/26/16 12:40pm&lt;/i&gt;]&lt;br /&gt;
Here are some good commentaries and analysis that address additional problems, beyond &quot;respond to me&quot; exploit that is my focus:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&quot;&lt;a href=&quot;https://medium.com/@carolinesinders/microsoft-s-tay-is-an-example-of-bad-design-d4e65bb2569f#.4rla482rh&quot; target=&quot;_blank&quot;&gt;Microsoft’s Tay is an Example of Bad Design (or Why Interaction Design Matters, and so does QA-ing)&lt;/a&gt;&quot; -- e.g. inadequate black list&lt;/li&gt;
&lt;li&gt;&quot;T&lt;a href=&quot;http://smerity.com/articles/2016/tayandyou.html&quot; target=&quot;_blank&quot;&gt;ayAndYou - toxic before human contact&lt;/a&gt;&quot; -- e.g. inadequate filtering of training corpus, incl. tweet corpus.&lt;/li&gt;
&lt;li&gt;&quot;&lt;a href=&quot;https://medium.com/@botego/why-microsoft-s-chatbot-tay-failed-and-what-does-it-mean-for-artificial-intelligence-studies-fb71d22e8359#.y7jgs8b79&quot; target=&quot;_blank&quot;&gt;Why did Microsoft’s chatbot Tay fail, and what does it mean for Artificial Intelligence studies?&lt;/a&gt;&quot; -- e.g. poor marketing communications and real-time management&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;hr /&gt;
&lt;br /&gt;
(WARNING: Foul, profane, and offensive language in images below)&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Poor Software QA (Process) is Root Cause&lt;/h3&gt;
&lt;div&gt;
[&lt;i&gt;Update 3/26/16 4:00pm -- The software QA process involves detecting and preventing defects, both in the development process itself and in the lifecycle as software moves from development to production. &amp;nbsp;It usually involves people with official QA roles and titles, but not always. In modern software development, everyone participates and has some responsibility for software QA.&lt;/i&gt;]&lt;br /&gt;
&lt;br /&gt;
Sleuthing by&amp;nbsp;@daviottenheimer led to discovery of evidence that twitter users were exploiting a hidden feature of Tay: &quot;repeat after me&quot;. &amp;nbsp; He found evidence in tweets and replies. &amp;nbsp;I later found evidence in the on-line board &lt;a href=&quot;http://4chan.org/pol/&quot;&gt;4chan.org/pol/&lt;/a&gt;. &amp;nbsp;/pol/ is a chat and photo sharing board that appeals to people who are &quot;anti-normie&quot; to an extreme. They like &quot;popping bubbles&quot; (my words), i.e. trolling people, especially public people, who are mainstream, normal, proper, and/or politically correct. &amp;nbsp;It is a free public board with no membership required and no real-name requirement.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The first /pol/ thread &quot;Tay - New AI from Microsoft&quot; started Wednesday, March 23, at 11:00am. &amp;nbsp;(&lt;a href=&quot;http://boards.4chan.org/pol/thread/68537741/tay-new-ai-from-microsoft&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt;). &amp;nbsp;This thread and subsequent threads show that the /pol/ community was enthusiastically trolling Tay, essentially at random and without any evidence of knowledge of the inner workings of Tay. &amp;nbsp;Contrary to the experts in the two articles above, Tay was not poisoned by direct trolling. &amp;nbsp;Here is an example:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqgFyCao5Qp1qQbTihGqpvqIjPXhQLOZe1qHMUb7laaHibc2o_tVEqhAZGj4NuzXUVMwUR1mKlXEsKxQ0K3RJMn9ZJryxn5lCDicQd4nwemAN1QWOLwUbTJW8ebqjds60ZqNYVBhmFAYQ/s1600/Tay0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;278&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqgFyCao5Qp1qQbTihGqpvqIjPXhQLOZe1qHMUb7laaHibc2o_tVEqhAZGj4NuzXUVMwUR1mKlXEsKxQ0K3RJMn9ZJryxn5lCDicQd4nwemAN1QWOLwUbTJW8ebqjds60ZqNYVBhmFAYQ/s320/Tay0.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
While many of the tweets and replies by Tay led to many laughs by the trolls, Tay was not poisoned in the first few hours.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Then, at about 16:50, @MacreadyKurt stumbled upon the undocumented command: &quot;repeat after me&quot;.&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs5k6QOCLUMXh-nfgFDjguJQXVf5Z3zOa1AyV6XnzqkMpxtiVjM6OHy6kSY3MtRsxbCTxqtjDDeVEhvqsBBVA_GrJGv8uEYzs8Nc7vLYZNeXmXiuSzaIlWu6mk0_ELW1sd8S30Dt4OUYA/s1600/tay1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjs5k6QOCLUMXh-nfgFDjguJQXVf5Z3zOa1AyV6XnzqkMpxtiVjM6OHy6kSY3MtRsxbCTxqtjDDeVEhvqsBBVA_GrJGv8uEYzs8Nc7vLYZNeXmXiuSzaIlWu6mk0_ELW1sd8S30Dt4OUYA/s320/tay1.jpg&quot; width=&quot;249&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(Click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div&gt;
At 16:55, @BASED_AN0N posted instructions on 4chan.org/pol/ (trip code &quot;yp45OVHP&quot;), along with proof of concept (POC).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXrU1jRP4W4hXhm7St7c6WOQnGu6riVm7eT00TBO-YWZRiGoqv87lsRHEXoAPU9frbP9eb0Sharn2fuqqvzPO4lErfq4kvymzlLokMncnODgG-E02tar7oNleWP9N3ZUb05gykOYDLyN4/s1600/Tay+Tango+Down.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;120&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXrU1jRP4W4hXhm7St7c6WOQnGu6riVm7eT00TBO-YWZRiGoqv87lsRHEXoAPU9frbP9eb0Sharn2fuqqvzPO4lErfq4kvymzlLokMncnODgG-E02tar7oNleWP9N3ZUb05gykOYDLyN4/s320/Tay+Tango+Down.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(Click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Within minutes, this instruction was repeated on 4chan. &amp;nbsp;Many more twitter trolls following @Tayandyou saw the exploit in their timeline, and the &lt;i&gt;real&lt;/i&gt; poisoning began [&lt;i&gt;but see Update&lt;/i&gt;].&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;[Original post&lt;/i&gt;]&lt;br /&gt;
This constitutes poisoning because Tay was not simply repeating the text a single time. Instead, the text was added into it&#39;s Natural Language Processing (NLP) system so that these words and phrases became reusable and remixable in future discourse. &amp;nbsp;And, since Tay&#39;s NLP was designed to continuously learn and &quot;improve&quot; in real-time (&quot;on-line learning&quot;), the more the trolls conversed with Tay using these foul words and phrases, the more Tay reinforced them and used them.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 5:25pm PDT&lt;/i&gt;]&lt;br /&gt;
I now think that the previous paragraph is wrong. After some searching, I haven&#39;t found evidence that the seeded/inserted text was used later by Tay. &amp;nbsp;Instead, it appears that Tay ONLY repeated the text after the &quot;repeat after me&quot; prompt. &amp;nbsp;Then, trolls would retweet and/or screen grab and tweet the photos or post on 4chan. &amp;nbsp;Two examples are&amp;nbsp;&lt;a href=&quot;https://twitter.com/TayandYou/status/712789408047607809&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; and &lt;a href=&quot;https://twitter.com/BASED_AN0N/status/712787611333566464&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 6:45pm PDT&lt;/i&gt;] &amp;nbsp;&lt;a href=&quot;http://www.businessinsider.com/microsoft-deletes-racist-genocidal-tweets-from-ai-chatbot-tay-2016-3?r=UK&amp;amp;IR=T&quot; target=&quot;_blank&quot;&gt;This article&lt;/a&gt; in Business Insider says that &quot;In some — but not all — instances, people managed to have Tay say offensive comments by asking them to repeat them.&quot; &amp;nbsp;Some of the images in the article give the impression that &quot;repeat after me&quot; did not immediately precede the worst Tay tweets. &amp;nbsp;However they appear to be using pictures posted on social media by trolls, not pictures they got from Twitter threads. Therefore we can&#39;t vouch for the &quot;...not all..&quot; statement.&lt;br /&gt;
&lt;br /&gt;
[&lt;i&gt;Update 7:00pm PDT&lt;/i&gt;] Here is one example from Business Insider of &quot;repeat after me&quot; not appearing before the offending Tay tweet. &amp;nbsp;I captured this image from Google cache of Twitter thread.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ78BmG7yksFcDllvm2v79ZAQqcf1uxt8xkMibSZ0CqUdyn7_EVHPLqVV5vgXfYsNVxGbfx-VEdJuKBaoUcIJB21BhWQXWJFMU5R7AEDx8K1lpNdSJcI7cR1kzweLc44IYjXLuYNpTANE/s1600/Screen+Shot+2016-03-25+at+6.50.48+PM.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;247&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQ78BmG7yksFcDllvm2v79ZAQqcf1uxt8xkMibSZ0CqUdyn7_EVHPLqVV5vgXfYsNVxGbfx-VEdJuKBaoUcIJB21BhWQXWJFMU5R7AEDx8K1lpNdSJcI7cR1kzweLc44IYjXLuYNpTANE/s320/Screen+Shot+2016-03-25+at+6.50.48+PM.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(Click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
OK. This isn&#39;t a case of &quot;repeat after me&quot;. &amp;nbsp;But also isn&#39;t as foul/profane as the other examples. &amp;nbsp;Instead, it looks like a fairly typical NLP generated sentence drawing on a large corpus. &amp;nbsp;Here the NLP is linking Hitler, totalitarianism, and atheism, but putting them inappropriately in the context of Ricky Gervais. &amp;nbsp;If the question was &quot;Is Ricky Gervais a Christian?&quot; Tay might have replied &quot;Ricky Gervais learn religion from Jesus, the inventor of Christianity&quot; using the same sentence structure. This sort of mistaken semantic construction is fairly common in generative AI, but if the sentences/phrases are short enough, then human readers tend to overlook them or interpolate some reasonable meaning (much like adults do with very young children).&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Q: Was &quot;Repeat after me&quot; a Result or Consequence AI? A: No.&lt;/h3&gt;
It is just too imperative. &amp;nbsp;It&#39;s not chatty. &amp;nbsp;Instead, I&#39;d guess that this was a rule-based design feature, probably left over from the early stages of development where software engineers were the only people interacting with the Tay bot. &amp;nbsp;Very simply, the &quot;repeat after me&quot; allows the developer-user to manually seed Tay&#39;s NLP system and then immediately see what happens with further interaction. [&lt;i&gt;Update 8:19pm&lt;/i&gt;] Or it may be an early feature put in before the full NLP system was working.&lt;br /&gt;
&lt;br /&gt;
Put another way: the sort of AI you need to make chat work does not also work well to act on imperatives. &amp;nbsp;Just compare robot AI (where natural language AI is sometimes used) to conversational/social AI and you&#39;ll see that they don&#39;t share common functionality, and often have completely different architectures.&lt;br /&gt;
&lt;br /&gt;
Also, there were quite a few rule-based behaviors that overrode and/or by-passed the NLP AI. &amp;nbsp;Microsoft called it &quot;a lot of filtering&quot;. &amp;nbsp;One example is anti-trolling rule for the topic &quot;Gamergate&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJlXn9ajIkjvN-GmMoJGspMCgMxtVVdhQTAz4HD2ScAfwpLKyjdKLzLmoKTK09OTsQBIIl0rxypW5UN6CotfW4K6drKhzt6jIuf6Zyn2BxmrNe1uXuLrCz8iEm530QYTdM0-9KOBpa6-k/s1600/Tay3-gamergate.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJlXn9ajIkjvN-GmMoJGspMCgMxtVVdhQTAz4HD2ScAfwpLKyjdKLzLmoKTK09OTsQBIIl0rxypW5UN6CotfW4K6drKhzt6jIuf6Zyn2BxmrNe1uXuLrCz8iEm530QYTdM0-9KOBpa6-k/s320/Tay3-gamergate.png&quot; width=&quot;230&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(Click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
Nearly all social/interactive AI outside of academic research has some &quot;cheats&quot; or &quot;kludges&quot; that are hard-coded by developers to control behavior in a way that would be hard/complicated/costly to do with the AI engine itself. &amp;nbsp;The &quot;repeat after me&quot; command was just one, probably to aid development and testing.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Q: Why Was It There? A: Bad QA.&lt;/h3&gt;
The Official Microsoft Blog post, titled &quot;&lt;a href=&quot;http://blogs.microsoft.com/blog/2016/03/25/learning-tays-introduction/&quot; target=&quot;_blank&quot;&gt;Learning from Tay&#39;s introduction&lt;/a&gt;&quot;, does NOT acknowledge that the root cause was exploit of a hidden feature. &amp;nbsp;Instead, they describe the root cause as a &quot;critical oversight for this specific attack&quot;. &amp;nbsp;In other words, they claim they didn&#39;t do enough troll testing.&lt;br /&gt;
&lt;br /&gt;
Instead, I believe that it is more likely that the root cause is poor software QA, which is different than &quot;penetration testing&quot; as you would do to test if your system was vulnerable to trolling. &amp;nbsp;If &quot;repeat after me&quot; was, in fact, a rule-driven behavior explicitly put in by a developer, the the QA failure was not detecting it and not making sure it was removed. &amp;nbsp;The Microsoft blog post does not describe their QA process, and it may be that they do not have any engineers dedicated to software QA. &amp;nbsp;After all, this is a project of Microsoft Research, not one of the product divisions/groups.&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Caveats&lt;/h3&gt;
I don&#39;t have access to the Tay code, test results, processes and procedures, or organization charts. &amp;nbsp;My claims above are extrapolations from the evidence, plus builds on my own experience in software development and in working with corporate software development teams. &amp;nbsp;As such, I may be wrong and someone might be able to produce contrary evidence. &amp;nbsp;I hope so.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Other Articles and Their Explanations&lt;/h3&gt;
&lt;div&gt;
[&lt;i&gt;Update 8:00pm PDT&lt;/i&gt;]&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;&quot;&lt;a href=&quot;http://www.businessinsider.com/microsoft-deletes-racist-genocidal-tweets-from-ai-chatbot-tay-2016-3?r=UK&amp;amp;IR=T&quot; target=&quot;_blank&quot;&gt;Microsoft is deleting its AI chatbot&#39;s incredibly racist tweets&lt;/a&gt;&quot; -&amp;nbsp;&lt;i&gt;Business Insider&lt;/i&gt;&amp;nbsp;tl;dr &quot;The reason it spouted garbage is that racist humans on Twitter quickly spotted a vulnerability — that Tay didn&#39;t understand what it was talking about — and exploited it.&quot; &amp;nbsp;BUT this article does call out &quot;repeat after me&quot; : &quot;In some — but not all — instances, people managed to have Tay say offensive comments by asking them to repeat them.&quot;&lt;/li&gt;
&lt;li&gt;&quot;&lt;a href=&quot;http://www.theverge.com/2016/3/24/11297050/tay-microsoft-chatbot-racist&quot; target=&quot;_blank&quot;&gt;Twitter taught Microsoft’s AI chatbot to be a racist asshole in less than a day&lt;/a&gt;&quot; - &lt;i&gt;The Verge&lt;/i&gt; tl;dr &quot;many of the bot&#39;s nastiest utterances have simply been the result of copying users. If you tell Tay to &quot;repeat after me,&quot; it will — allowing anybody to put words in the chatbot&#39;s mouth. &amp;nbsp;However&amp;nbsp;some of its weirder utterances have come out unprompted.&quot;&lt;/li&gt;
&lt;li&gt;&quot;&lt;a href=&quot;http://arstechnica.com/information-technology/2016/03/microsoft-terminates-its-tay-ai-chatbot-after-she-turns-into-a-nazi/&quot; target=&quot;_blank&quot;&gt;Microsoft terminates its Tay AI chatbot after she turns into a Nazi&lt;/a&gt;&quot; -&amp;nbsp;&lt;i&gt;Ars Technica&lt;/i&gt; tl;dr Let&#39;s hope that Tay isn&#39;t like Skynet, who retaliated on humans that tried to shut it down.&lt;/li&gt;
&lt;li&gt;&quot;&lt;a href=&quot;http://www.theguardian.com/technology/2016/mar/24/tay-microsofts-ai-chatbot-gets-a-crash-course-in-racism-from-twitter&quot; target=&quot;_blank&quot;&gt;Tay, Microsoft&#39;s AI chatbot, gets a crash course in racism from Twitter&lt;/a&gt;&quot; -&amp;nbsp;&lt;i&gt;The Guardian&lt;/i&gt; tl;dr &quot;Tay in most cases was only repeating other users’ inflammatory statements, but the nature of AI means that it learns from those interactions. It’s therefore somewhat surprising that Microsoft didn’t factor in the Twitter community’s fondness for&quot; trolling.&lt;/li&gt;
&lt;li&gt;&quot;&lt;a href=&quot;http://www.nytimes.com/2016/03/25/technology/microsoft-created-a-twitter-bot-to-learn-from-users-it-quickly-became-a-racist-jerk.html?_r=0&quot; target=&quot;_blank&quot;&gt;Microsoft Created a Twitter Bot to Learn From Users. It Quickly Became a Racist Jerk.&lt;/a&gt;&quot; - &lt;i&gt;New York Times&lt;/i&gt; tl;dr We wrote a summary of &lt;i&gt;The Guardian&lt;/i&gt; and &lt;i&gt;Business Insider&lt;/i&gt; articles.&lt;/li&gt;
&lt;/ul&gt;
&lt;a href=&quot;https://www.blogger.com/blogger.g?blogID=9079742631670078384&quot; name=&quot;example_of_poisoning&quot;&gt;&lt;/a&gt;

&lt;br /&gt;
&lt;h3&gt;
[Update] Example of a Bot That DID Become &quot;Casually Racist&quot;&lt;/h3&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
[&lt;i&gt;Update 3/26/16 2:10pm&lt;/i&gt;]&lt;/div&gt;
&lt;div&gt;
In my commentary, above, I assert that the primary root cause of &quot;Tay-Fail&quot; was exploit of a hidden feature (&quot;repeat after me&quot; rule) that should have been removed during software QA process. &amp;nbsp;To be clear, I am not asserting that it is not possible to poison a social bot through persistent trolling. It is. &amp;nbsp;I just don&#39;t believe that was the primary root cause of the worst cases TAY-FAIL.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Here is a good example, told by a developer (&quot;&lt;a href=&quot;https://news.ycombinator.com/user?id=bitshepherd&quot; target=&quot;_blank&quot;&gt;bitshepard&lt;/a&gt;&quot;) in a &lt;a href=&quot;https://news.ycombinator.com/item?id=11367083&quot; target=&quot;_blank&quot;&gt;comment on Ycombinator Hacker News&lt;/a&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&quot;I have a chat bot that went casually racist about a day or two after activating it. After looking through the logs, I found a particularly vitriolic person that was responsible for the source of this bot&#39;s newfound hatred of Asians. My bot didn&#39;t get fixated on one particular topic, it just spewed racism and vitriol for a while until it learned some more words. Rather than nuking from orbit immediately, I left it alone to see if it would get past the racism.
&lt;br /&gt;
&lt;br /&gt;
So far, it&#39;s been a few months since activating the bot. It&#39;s not nearly as casually racist as before, but from time to time still throws out something racist just for the lulz. It had a hard time learning context, because of its environment and the linguistic skills of the denizens, but it has gotten much better at when it interacts with people.
&lt;br /&gt;
&lt;br /&gt;
Occasionally, newcomers get misled into believing the bot is actually a living person with a mental illness, and not just a collection of random bits of code cobbled together.&quot;
&lt;/blockquote&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/2871554597147598036/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/poor-software-qa-is-root-cause-of-tay.html#comment-form' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/2871554597147598036'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/2871554597147598036'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/03/poor-software-qa-is-root-cause-of-tay.html' title='Poor Software QA Is Root Cause of TAY-FAIL (Microsoft&#39;s AI Twitter Bot)'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqgFyCao5Qp1qQbTihGqpvqIjPXhQLOZe1qHMUb7laaHibc2o_tVEqhAZGj4NuzXUVMwUR1mKlXEsKxQ0K3RJMn9ZJryxn5lCDicQd4nwemAN1QWOLwUbTJW8ebqjds60ZqNYVBhmFAYQ/s72-c/Tay0.jpg" height="72" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-9079742631670078384.post-2008694269050254848</id><published>2016-02-18T13:50:00.000-08:00</published><updated>2016-02-18T13:50:25.110-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="humor"/><category scheme="http://www.blogger.com/atom/ns#" term="visualization"/><title type='text'>Make Grammar Great Again</title><content type='html'>&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoLqtOTjvx2wpdps9kCLNZeOxjkfdErRjJREckw4_Hyvqm3dNpP7O2R8us5wGwhs0XbS1DrFsnfSAEdG3SxdFzBX_XnSzmWxNKTzD9QuxzXU9kK8zdbGDsEfFj93c10p3qPoKMPfUlJ3A/s1600/Trump-Pope-diagrammed.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;339&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoLqtOTjvx2wpdps9kCLNZeOxjkfdErRjJREckw4_Hyvqm3dNpP7O2R8us5wGwhs0XbS1DrFsnfSAEdG3SxdFzBX_XnSzmWxNKTzD9QuxzXU9kK8zdbGDsEfFj93c10p3qPoKMPfUlJ3A/s400/Trump-Pope-diagrammed.png&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;(Click to enlarge)&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
</content><link rel='replies' type='application/atom+xml' href='http://exploringpossibilityspace.blogspot.com/feeds/2008694269050254848/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/02/make-grammar-great-again.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/2008694269050254848'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/9079742631670078384/posts/default/2008694269050254848'/><link rel='alternate' type='text/html' href='http://exploringpossibilityspace.blogspot.com/2016/02/make-grammar-great-again.html' title='Make Grammar Great Again'/><author><name>Russell Thomas</name><uri>http://www.blogger.com/profile/06123406032076292954</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='26' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZEWFeQtRp-JRiXKWzqXXcmHb7HGaPJuF7g1jqXM9sIKFphLSAoY5UJDj7qN1jn9G9pIGwKjdqjDDx_zpmgBj9yW85XMISNXL1L0hc6mCsJ1dnoWMhE0Vmdm73k2Z9yw/s220/rct-staring-at-screen2.png'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoLqtOTjvx2wpdps9kCLNZeOxjkfdErRjJREckw4_Hyvqm3dNpP7O2R8us5wGwhs0XbS1DrFsnfSAEdG3SxdFzBX_XnSzmWxNKTzD9QuxzXU9kK8zdbGDsEfFj93c10p3qPoKMPfUlJ3A/s72-c/Trump-Pope-diagrammed.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>