Social science meets computer science

2010-01-01

Paul Baccas

Sophos, UK
Editor: Helen Martin

Abstract

Paul Baccas reviews 'Technological Turf Wars: A Case Study of the Computer Antivirus Industry', by Jessica Johnston.


Title: Technological Turf Wars: A Case Study of the Computer Antivirus Industry

Author: Jessica Johnston

Publisher: Temple University Press

ISBN: 1-59213-882-9

This book is a socio-politico-economic analysis of the anti-virus industry based on interviews with associated parties (researchers, vendors and corporate end-users) through the first six years of the 21st century.

Under the cover

The book is divided into an introduction and six chapters.

Chapter 1: Naming the threat

Despite its title, the first chapter is not about the turgid arguments that rumble on over malware nomenclature, but rather about why and from where the term ‘virus’ came into our lexicon and why the metaphor of virus endures. It then moves on to describe the nature of the threat, how it has changed and how our defences against it have been commodified.

Chapter 2: Security transformations

In this part of the book the standard security triple of confidentiality, integrity and availability is used to underpin the argument that the terms ‘security’ and ‘threat’ form a loop because they are defined, in the minds of the interviewees, with reference to each other.

The author goes on to address the role of governments and how their interests in the field have changed, particularly since 9/11. Finally, there is a case study looking at how spam has changed from a mere annoyance in the early ’90s to a real security threat, and how detection has been added to the standard suite of security products. This transformation is mirrored elsewhere, specifically the move in the mid-90s to add trojan detection to anti-virus products.

Chapter 3: Trust, networks, and the transformation of organizational power

The way in which people and groups communicate and interact is the meat and drink of this book, with chapters 3 and 4 looking at grouping within the industry. The majority of researchers interviewed in the book were CARO members, so it is not surprising that chapter 3 is dominated by an analysis of CARO. Describing what the author calls ‘the mythic past’ through to the present, CARO is used as a standard against which to compare all other AV industry interactions. Detailing the contretemps that arose among vendors over REVS and how, as a result of that, industry interactions changed, this chapter touches upon the exclusions inherited by CARO.

Chapter 4: IT corporate customers as end-users

In this chapter the author discusses how corporate users felt that they needed a more coherent and louder voice in the industry. The corporate end-users’ perception was that they were the ones working in the trenches and that the vendors/researchers could make use of their expertise. This led to the formation of AVIEN (the Anti-Virus Information Exchange Network), exclusively for end-users, and AVIEWS (the Anti-Virus Information Early Warning System), which included vendors and researchers. However, researchers soon realized that the data received via AVIEWS was also being provided via other avenues, and this diluted the usefulness of the resource from their point of view.

Chapter 5: Marketing service

Chapter 1 talks about the commodification of anti-virus. Commodities are purchased through word of mouth, advertisement, or a mixture of the two. In short, commodities are marketed, and the anti-virus industry has had a chequered history with rogue and not so rogue marketeers/press agents. Here the author discusses the dichotomy of the researchers’ desire for truth and accuracy and the marketeers’ desire to cultivate press links and drive sales.

Chapter 6: Situated exclusions and reinforced power

Race and gender studies are the bread and butter of social science research. The AV industry, at least as far as conference attendees go, is a fairly homogeneous group (white, male, middle-aged, degree-educated, North American or Eastern/Northern European) and provides rich picking for an analysis of race and gender.

A good read?

The book is an interesting, if stylistically convoluted read. My main problem with it is that six years is a long period to cover in an industry such as this. I felt that several books covering shorter periods or a longer book split into sections (e.g. 1970–1990, 1990–2000, 2000–2005 etc.) would have presented the subject matter in a more coherent fashion. As it stands, there is certainly scope to add to this work – and it was fun attempting to guess the identities of the anonymous interviewees.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.