Cyber Security and the Wild West

Cyber Security and the Wild West

It is often said that the Internet is a new frontier ready to be discovered and explored. Parallels are often drawn between Cyber Space and the Wild West. In some ways this is true. The Wild West and Cyber Space are both lawless domains where criminals can and do act with impunity. Many marginalised groups sought the freedom of the Wild West and emigrated to the USA where they could act and practice what they wished. Those same groups today can use the Internet a platform for their views which may not be welcome anywhere else.

Both the Internet and the Wild West are arenas that lack or lacked censorship. For some this pioneering spirit is what is attractive for others a cause for concern. One fundamental difference is that the Wild West was at a physical location. You travelled to it or avoided it as you may wish. The Internet has no physical location and although we may try and avoid it in developed economies it is ubiquitous. It touches every part of our lives, even if we don’t “use it” everyone around us does and there is no escaping it.

This difference cannot be overstated. In the past we could sit in our civilised homes and talk about the dangers and depravities of the Wild West knowing full well that unless we visited we were safe. This cannot be said of the Internet. The dangers of the Internet are all around us, our children and our businesses. We like to think the Internet is “safe”. It can be very safe and completely lawless at the same time. We need to understand this dichotomy, something governments struggle to grasp.   

If we are a victim of cybercrime the chances of the criminals being caught is very small. They are probably located in another country and our legal systems have yet to address the issues raised by International boundaries and cybercrime. The Internet does not respect nation states, for example an email you send could easily travel the world to reach its destination which could be a very close to you. The Internet protocols we use are designed to do this.

In the Wild West we ultimately solved the problem by binding physical location and security. We brought in policing and had clear understanding of what was being secured or protected. We cannot apply this solution to the Internet as it does not have a location. We can do some things for example we can keep our own house in order but this is very limited. We have created a world where everything is connected to everything else, the Internet of Things and Smart Cities are new buzz words which are becoming realities. One weak interconnected link is everyone’s weak link. Many of us simply do not have the mind set to grasp that cyber security reaches beyond international boundaries, or laws. It is natural that we react according to our location. Sadly, this is of little help in the cyber realm.

Authors

Dr John McCarthy

Dr John McCarthy

Dr John McCarthy is a world renowned authority on CyberSecurity strategy, development and implementation. He holds a PhD in CyberSecurity and eBusiness Development and is an internationally recognized author of a number of works discussing all aspects of CyberSecurity in the modern world


You don`t have permission to comment here!