Having spent the majority of my professional life working with people who are, for lack of a better term, idiots when it comes to computer stuff, I’ve picked up on a few tell-tale traits that, while a person may know how to check their email and shop on Amazon, indicate the person really doesn’t ‘get’ computers. Here are a few examples:
1. They insist on putting the word ‘the’ in front of internet related nouns. The most prevalent are, ‘The Google,’ ‘The Powerpoint,’ and ‘The photoshop.’
2. They use internet related nouns as verbs, but without a sense of irony. “It’s been photoshopped” being a good example.
3. They double click on hyperlinks.
4. They misuse software applications. A personal favorite is building a powerpoint slide and embedding an excel sheet inside it, rather than simply using excel, like the good lord intended. Another good one is wanting to buy photoshop so you can remove red-eye and crop pictures. If you don’t understand why this is stupid, then you are not a computer person.
All of these are good tell-tale signs, but they are largely small things and the people that do them have very little negative impact on their workforce as a result. Of much greater concern are people who do have a great deal of influence in the development of the cyber world and who also exhibit tell-tale signs of not really ‘getting it.’ For these people, the biggest give away can be found in the articles they write for defense oriented publications. Here are three good examples from the latest issue of Strategic Studies Quarterly, the premier Air Force published journal on all things air, space, and cyber technology related.
From the introduction:
“I have compared our entry into cyberspace to mankind’s last great era of discovery European colonization of the Western Hemisphere. During that period, large private corporations like the Hudson Bay Company and the East India Tea Company acted with many of the attributes of sovereignty. What of that experience is instructive today for contemplating the appropriate roles of giants like Google and Facebook? We probably do not want to outfit twenty-first-century cyber privateers with letters of marque and reprisal, but what should be the relationship between large corporations and the government when private networks on which the government depends are under sustained attack?”
“Tough questions all-tougher (perhaps) but not unlike those our air¬power ancestors faced nearly a century ago. As pioneer air warriors grappled with the unfamiliar, so must we.”
From the lead article:
“The topology of the Internet, like the prairie of the 1800s’ Ameri¬can Midwest is about to be changed forever-rationally, conflictually, or collaterally-by the decisions of states.”
See the tell? It’s the painful attempt at putting the issues associated with cyber into a context that, apparently, Roy Rogers can understand. The cyber world cannot be viewed as if it behaves in the same way as the real world, for the simple reason that the cyber world does not have any stable boundaries. This mistaken belief that you can somehow control or partition the internet is fueled by imagery that compares cyberspace to vast tracts of land. The problem is that, unlike cyber space, land is finite, it has clearly defined boundaries, and it does not change. Mexico and the U.S. can argue about the border because THEY KNOW WHERE IT IS! You can’t say the same about cyber related issues where there are no stable boundaries, no clear lines of jurisdiction, and no way of telling where a problem originated.
I’d be less worried about all this, except the people who wrote those above lines are really big players in the cyber/defense world, and to see them using these sorts of folksy literary devices that mask the true nature of the cyber world does not give me the warm and fuzzy that our government is equipped to handle this new world. If we are retain control of the cyber world, we must first recognize that the cyber world is unlike anything in our history and its associated issues cannot be viewed through the same lens as more traditional areas of conflict. Otherwise, we risk repeating the mistakes of the 1920’s naval treaties where governments limited the gross tonnage and size of each others navies in an attempt to avoid a naval arms race, when in reality, unbeknownst to all but a few keen observers, the carrier based aircraft (which was not restricted by any treaty because no one thought it was a viable weapon) was about to become the deciding factor in naval warfare.see how easy it is to create misleading historical/cyber related metaphors?