A Politics of Cybersecurity
Total Page:16
File Type:pdf, Size:1020Kb
Malware Ecologies: A Politics of Cybersecurity Submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy Andrew Carl Dwyer Mansfield College University of Oxford Trinity 2019 Abstract Computation, in popular imaginations, is at perennial risk of infection from the tools of nefarious hackers, commonly referred to as malware. Today, malware pervade and perform a crucial and constitutive role in the insecurities of contemporary life from financial transactions, to ‘critical national infrastructures’ – such as electricity, water, and transportation – to devices in our ‘smart’ homes and cities, and even to potential ‘cyberwar.’ Yet, critical security research has rarely turned its attention to malware. In contrast, I explore malware and their politics, situated and extended beyond, an (auto)ethnographic study of the malware analysis laboratory of the UK endpoint protection business, Sophos. I argue that malware are currently processed through a patho-logic that conflate organic and non-organic materialities, permitting analogies between biology and computation, and are generative of particular forms of security that relegate malware to the intent of their authors. I explore how endpoint protection businesses are imbibed with these logics in order to attend to how malware are analysed, detected, and curated beyond them. By drawing on my method of ‘becoming-analyst,’ I critically reflect on how malware become known, are responded to by ad hoc political groups, and can assist in rethinking the role of computational agency in geography, international relations, security studies, and beyond. I instead conceive of malware as performative political actors making limited choices in broader computational ecologies. I therefore advocate for an eco-logical repositioning of malware, where cyberspace is not simply a neutral domain; but is central to the formation of choice that gives space for malware to be political. With four cases – Conficker, Stuxnet, the Dukes, and WannaCry / (Not)Petya – I write new stories on how malware are encountered and dealt with in the twenty-first century. In doing so, I challenge contemporary discourses of cybersecurity to ask if conventional notions of who and what (per)form security are adequate, and how these are reconfigured through a radical ‘more-than-human’ politics, where malware are not just objects of security, but are active participants in its production and negotiation. i ii Acknowledgements There are innumerable people to thank over the course of (almost!) five years traversing new (inter)disciplinary spaces. I have had the privilege of encountering so many people, things, and spaces I thought I would never do. Inevitably there are omissions, so I start with that recognition. Various awkward moments, materialities, affects, and politics have informed and shaped how I have perceived, felt, and negotiated the world – so if I’ve had a coffee or too many beers with you, met through Twitter interactions, or you just listened to malformed thoughts – you’re all crucial. In the most perverse way, I thank the multiple malware forms that have been such a crucial interlocutor that are so nebulous, performative, and plural. Yet, for an empirical piece of work – thank you Sophos, you were incredibly supportive of a social scientist entering your space and dealing with me as I learnt and often failed to ‘do’ malware analysis and detection. I couldn’t have done this without you. Nor could I have done this without both of my examiners, Prof. Claudia Aradau (King’s College London) and Prof. Tim Schwanen who have given me new directions and thoughts to move beyond this work. At Oxford, it was Andrew Martin and the CDT in Cyber Security (a fantastic place with lots of wonderful people) that gave me the opportunity to do cybersecurity with incredible support from David Hobbs, Maureen York, and Katherine Fletcher. I made wonderful friends here - Jan Silomon, Richard Baker, Kris Wilson, Alastair Janse van Rensburg, and Louise Axon – and critical perspectives from politics and international relations - Lucas Kello, Monika Kaminska, Jamie Collier, Florian Egloff, and James Shires. Yet none are more influential than Beth Greenhough and Derek McCormack, my supervisors on this journey. In particular, Beth agreed to supervise an oddity wanting to return to geography and she was central to me exploring malware at all. Beth’s expert tack to translate my often convoluted thinking into a pithy summary as well as Derek’s incisive comments (particularly around my theoretical wanderings) are ones I shall miss. Others in geography have made the five years worth it – Helge Peters, Ian Klinke, Peter Martin, Liam Saddington, Daniel Bos, Marion Ernwein, Alex Vasudevan, Jamie Lorimer, Hanno Brankamp, Negar Behzadi, Thomas Jellis, Adam Packer, and Gillian Rose. Beyond Oxford, people have been so influential and beyond helpful and kind – Louise Amoore (who I will always owe an inextricable amount of debt to), N. Katherine Hayles, Sam Kinsley, James Ash, Nat O’Grady, John Morris, Ingrid Medby, iii Peter Forman, Emma Fraser, Georgios Glouftsios, Clancy Wilmott, Esmé Bosma, Phil Garnett, Sam Hind, and Dorothea Kliene (including the rest of the ‘Digital Geographies Working Group’ at the RGS-IBG, as it was then known). The ‘sister’ CDT at Royal Holloway and Mansfield College always provided sanctuary. From Mansfield, Baroness Helena Kennedy and Ros Ballaster for supporting me as MCR President, to the amazing life-long friends at the Cowley Road Breakfast Club, Joe Shaw and Irene Scarpa. At Royal Holloway, Pete Adey, and friends who I cannot imagine life without, who exposed me to so much among the general gallivanting around London - Pip Thornton, Nick Robinson, Adam Badger, Alex Hardy, and Andreas Haggman. Thanks also go to the different institutions that have supported me on the way, including Joyce Tait and Gill Haddow at the Innogen Institute at the University of Edinburgh. Also to the reading groups I attended and in particular ‘Life Itself in Theory and Practice’ at TORCH in Oxford that really helped when I was attempting to ‘contextualise’ my work, thanks to Sam Gormley for putting this together. And happily to my new colleagues Andreas Langenohl, Carola Westermeier, Amina Nolte, and Philipp Lottholz at the SFB/TRR 138 ‘Dynamics of Security’ project in Marburg and Gießen, Germany, which gave me the space, time, and freedom, to finish this thesis. And nearing an end, to thank those closest to me. Friends from home; Jessica Wilson who always reminded me of good drinking spots in Sheffield, and to Kerry-Anne Scothorne Allen, Billy, the boys, Brooklyn and Ronny and the new one, Crimson. Those who I met at Durham, where I developed a love of geography, politics, and technology; Alice Cree, Louise Harper, Emma Holloway, and many more. To those who I lost in this time; my grandparents, Joan Green, Brian Green, and Winifred (Ann) Dwyer. And lastly, to thank those I love the most: Mum, Matthew, and the one who has had to deal with more than enough grievances from me, Oliver. iv This thesis is dedicated to my wonderful Mum, Deborah Jayne Green, who never seeks recognition and to Jessica Wilson, whose panic one day made malware all too real for me. v vi Contents ABSTRACT I ACKNOWLEDGEMENTS III CONTENTS VII FIGURES IX CHAPTER ONE || INTRODUCTION 1 MOTIVATIONS 3 THESIS STRUCTURE 7 CHAPTER TWO || COMPUTATIONAL ECOLOGIES 13 ORGANICISM AND CYBERNETICS 14 ECOLOGISING COMPUTATION 19 MORE-THAN-HUMAN COMPUTATION 27 A MALWARE ECOLOGY 36 CHAPTER THREE || RESEARCHING MALWARE 39 APPROACHING MALICIOUS SOFTWARE 41 ETHNOGRAPHY 50 BECOMING ANALYST 53 RECORDING, REFLECTING, AND ETHICS 67 CHAPTER FOUR || LINEAGES TO UNDERSTANDING MALWARE 73 THE GROWTH OF CYBERSECURITY 75 ARCHITECTURES OF MALICIOUSNESS 82 PATHOLOGICAL IMAGINATIONS 86 ANTI-VIRUS 97 CONTEMPORARY APPROACHES 103 CHAPTER FIVE || THE ANOMALOUS AND THE MALICIOUS 105 THE LAB 106 THE ALLURE OF ENVIRONMENT 108 STATIC STRATEGIES 110 CONTEXTUAL STRATEGIES 117 DATA 131 CRAFTING SIGNALS 136 vii BLENDING LOGICS 137 CHAPTER SIX || CURATING MALICIOUSNESS 141 EMBODYING MALWARE 142 THE FALSE POSITIVE 146 THE POTENTIALLY UNWANTED APPLICATION 151 MAKING SENSE OF MALICIOUSNESS 156 MOVING TO ECOLOGY 163 CHAPTER SEVEN || MALWARE POLITICS 167 ECOLOGICAL CURATIONS 168 THE CASES 171 CASE 1 | STUXNET 172 CASE 2 | THE DUKES 178 CASE 3 | WANNACRY/(NOT)PETYA 183 MALWARE MATERIALITIES 193 CHAPTER EIGHT || ECOLOGICAL CONCLUSIONS 199 THE CONFICKER WORKING GROUP 200 THE CYBER DOMAIN 207 THE OBJECT-IVE CYBERWEAPON? 210 DRAWING A CLOSE 214 FUTURE DIRECTIONS 218 BIBLIOGRAPHY 221 APPENDIX 243 CONSENT FORMS 243 viii Figures Figure 1: A simplified depiction of the 'layers' of computation that form the materialities and spaces of 'cyberspace.' Adapted from a presentation by Hayles (2018). Author’s own image. ________________________________________________________________ 31 Figure 2: A screenshot of the Ingress game, where players work together in teams to capture ‘portals’ from other teams through GPS locations and performing ever-more complicated tasks. Author’s own image. ______________________________________ 50 Figure 3: Research diary with coded strips highlighted. Author’s own image. ___________ 69 Figure 4: New malware forms over the past decade using data from independent anti-virus product testers, AV-Test (2018, p.2). _________________________________________ 101 Figure 5: A screenshot of the Menu Bar on MacOS with 'Sophos Anti-Virus' presented as the small icon shaped like a shield with an