{"id":41622,"date":"2021-09-03T16:21:30","date_gmt":"2021-09-03T20:21:30","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=41622"},"modified":"2021-09-17T07:23:51","modified_gmt":"2021-09-17T11:23:51","slug":"dune-information-security","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/dune-information-security\/41622\/","title":{"rendered":"Information security in Dune"},"content":{"rendered":"<p>At first glance, the <em>Dune<\/em> universe seems IT-deficient. Humanity may be building spaceships, but it relies on the human mind to calculate flight paths. Humans send troops to alien planets but exchange messages through couriers. They colonize other worlds yet live in a feudal society.<\/p>\n<p>What information security is there to talk about? Quite a bit, in fact. It plays a vital role in Frank Herbert\u2019s universe.<\/p>\n<h2>Why the state of technology is so poor in the first book<\/h2>\n<p>Almost all of the tech oddities in the Dune universe boil down to its blanket prohibition: At some point in its history, humanity encountered a global cyberthreat and took radical action, abandoning the information technologies so familiar to us and banning artificial intelligence and computers.<\/p>\n<p>The first installment in the <em>Dune<\/em> series briefly touches on the reasons behind the prohibition, and the sequels contain conflicting versions of the story, but the key point is that humans rebelled against and destroyed the machines. With prohibition, possession of a \u201cthinking machine\u201d became a capital offense. The main scripture (the Orange Catholic Bible) states categorically: Thou shalt not make a machine in the likeness of a human mind.<\/p>\n<p>Needing to replace the usual information technologies, humans developed their minds in amazing ways. All sorts of teachings, schools, sects, and orders sprang up, as did humans\u2019 ability to perform complex mental calculations, guide spaceships through folded space, analyze the world, and even influence the minds of others.<\/p>\n<p>What\u2019s more, to manage a civilization scattered throughout different star systems, the leaders of humanity reintroduced monarchical rule, feudalism, and the caste system. Despite the disappearance of computers, however, information \u2014 and information security \u2014 has maintained its central role in people\u2019s lives.<\/p>\n<h2>Mentat as security officer<\/h2>\n<p>A Mentat is a human trained to function as a computer, capable of processing huge amounts of information in the mind. For example, in addition to developing military strategy,<em> Dune<\/em>\u2018s Thufir Hawat of House Atreides is responsible for:<\/p>\n<ul>\n<li>Finding backdoors and vulnerabilities in the castle\u2019s security system;<\/li>\n<li>Employee background checks;<\/li>\n<li>Risk assessment.<\/li>\n<\/ul>\n<p>In other words, he performs the role of chief information security officer (CISO). At the same time, being \u00a0essentially an organic computer, Hawat also functions as a living security engine, analyzing all threat signs and issuing verdicts (being paranoid, he also throws up the occasional <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/false-positive\/\" target=\"_blank\" rel=\"noopener\">false positive<\/a>). Interestingly, judging by the First Law of Mentat, as quoted by Paul Atreides, he works on behavioral analysis algorithms: \u201cA process cannot be understood by stopping it. Understanding must move with the flow of the process, must join it and flow with it.\u201d<\/p>\n<h2>Information exchange tools<\/h2>\n<p>In the absence of computers, radio communication and old-fashioned dispatches have become the primary means of information exchange. Neither method is particularly secure; the book describes several techniques characters use to protect their communication channels. It additionally mentions a number of secure information exchange methods for face-to-face meetings in the presence of potential adversaries.<\/p>\n<h3>Radio communication<\/h3>\n<p>Today, encryption can make radio exchanges relatively secure (if someone eavesdrops, they will not understand a word), but in the world of <em>Dune<\/em>, without \u201cthinking machines,\u201d information has to be encrypted manually. In particular, the Atreides have a \u201cbattle language\u201d \u2014 a system of verbal messages known to the Duke\u2019s soldiers.<\/p>\n<p>It\u2019s not entirely reliable. After all, the more widely a secret language is used, the more likely an enemy is to crack it \u2014 especially given House Harkonnen\u2019s executioners\u2019 widespread use of outmoded cryptanalysis.<\/p>\n<h3>Physical media<\/h3>\n<p>Exchanging dispatches is a method whose weaknesses have been known since ancient times \u2014 a courier can get turned or captured, or simply fail to arrive \u2014 but even its vulnerabilities can become an advantage. The Harkonnens, for example, periodically arrange for their messengers to get caught and supply enemies with misinformation.<\/p>\n<p>The book makes at least one mention of a dispatch self-destruct system that uses a capsule to corrode the material of a message\u2019s carrier. The Bene Gesserit Organization also has a secret language of dots that doesn\u2019t even look like information to the uninitiated.<\/p>\n<h3>Information security for in-person meetings<\/h3>\n<p><em>Dune<\/em> describes two means of securing in-person encounters. First, the Atreides use a system of secret signs for exchanging fairly large amounts of information right under the enemy\u2019s nose. Second, a \u201ccone of silence\u201d is installed in the palace of Baron Harkonnen. It distorts human voices, letting people speak without fear of outside ears. How this technology works, the author does not divulge.<\/p>\n<h2>The human factor<\/h2>\n<p>Because \u201cinformation technologies\u201d in <em>Dune<\/em> have migrated into the heads of the Mentats, the Navigators, the Bene Gesserit sisters, and other strange beings, the human factor is even more critical than it is in the real world, today. After all, <em>Dune <\/em>has abandoned the algorithms that could potentially detect human error or malicious insider intentions. Here, Herbert\u2019s predictions are nothing if not pessimistic: Individuals and entire factions scheme, betray, and sell out; they infiltrate spy groups and extract information by torture. Moreover, the Bene Gesserit sisters possess the power of Voice, a method of verbal manipulation that can force people to act against their will.<\/p>\n<p>Imperial Conditioning, a Hippocratic Oath\u2013type development of the Suk Medical School, offered some hope by preventing, at least in theory, Suk doctors from harming their patients. But the Harkonnens found a way to break this conditioning through psychological pressure caused by having a loved one taken hostage.<\/p>\n<p>We\u2019re eager to see how Denis Villeneuve <a href=\"https:\/\/www.imdb.com\/title\/tt1160419\/\" target=\"_blank\" rel=\"nofollow noopener\">convey<\/a>s all that on screen. It\u2019s quite possible that his version of Frank Herbert\u2019s world won\u2019t be too bad as far as infosec goes. David Lynch\u2019s <a href=\"https:\/\/www.imdb.com\/title\/tt0087182\/\" target=\"_blank\" rel=\"nofollow noopener\">1984 effort<\/a> saw fit to play pretty fast and loose with the original source, and the creators of the new film may have followed suit.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>We take a look at information security practices on planet Arrakis.<\/p>\n","protected":false},"author":700,"featured_media":41642,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[1131,4218,3152],"class_list":{"0":"post-41622","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-books","11":"tag-sci-fi","12":"tag-truth"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/dune-information-security\/41622\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/dune-information-security\/23248\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/dune-information-security\/18735\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/dune-information-security\/25300\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/dune-information-security\/23370\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/dune-information-security\/22755\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/dune-information-security\/25913\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/dune-information-security\/25445\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/dune-information-security\/31418\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/dune-information-security\/9996\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/dune-information-security\/17572\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/dune-information-security\/18069\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/dune-information-security\/15433\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/dune-information-security\/27284\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/dune-information-security\/31549\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/dune-information-security\/27484\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/dune-information-security\/24296\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/dune-information-security\/29634\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/dune-information-security\/29427\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/truth\/","name":"truth"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=41622"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41622\/revisions"}],"predecessor-version":[{"id":41624,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/41622\/revisions\/41624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/41642"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=41622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=41622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=41622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}