The hooded guy on the laptop: What are cyber pictures telling us?

The hooded guy on the laptop: What are cyber pictures telling us?

Have you ever learn a piece of writing about cyber this 12 months? In all probability it used to be in regards to the taking down of Ukrainian executive web sites at first of Russia’s invasion or the Conti ransomware assault on Costa Rica that led the federal government to claim a countrywide emergency. Do you take into accout what symbol accompanied the object? And extra importantly, do you suppose the picture successfully communicated what the object used to be about?

Again within the mid-2010s, I labored at a suppose tank that used to be having a look into new techniques of conflict, equivalent to using drones and cyber assaults. When looking for pictures to accompany studies or articles at the matter of cyber, I encountered an issue. On-line symbol searches pulled up symbol upon symbol that every one seemed the similar: rows of one’s and nil’s dropping rain in inexperienced and blue, a padlock, a close-up of a keyboard, or a hooded guy in entrance of a pc. Speedy ahead to 2022, the ELN’s nuclear and new tech undertaking is exploring the affect of recent applied sciences on nuclear decision-making, and the similar downside persists. Whilst the significance of recent applied sciences for warfare and world safety has handiest grown previously decade, the photographs used to constitute them have remained static, and this hampers our talent to grasp those problems and believe the results they’ll have on our long term.


Whilst the significance of recent applied sciences for warfare and safety has handiest grown previously decade, the photographs used to constitute them have remained static.

Esther Kersley

One new generation this is having an important affect on world family members, and has gained rising consideration within the media, is cyber. From the 2007 ‘Nashi’ assault at the Estonian executive, the 2010 ‘Stuxnet’ assault concentrated on Iran’s nuclear program, to Edward Snowdon’s NSA knowledge heist in 2013 and Russia’s assault at the 2016 US presidential election, our on-line world has been described as “a world battlefield of the twenty first century”. For the previous few years, it’s been top up on the United States’s legitimate record of nationwide safety threats, and tops the record of maximum Eu states, together with the United Kingdom.

Regardless of its rising significance, cyber (like different new applied sciences) is advanced and intangible and stays poorly understood by way of decision-makers and most of the people, and by way of extension, photographers and picture editors. Because of this, little consideration has been given to the techniques cyber is visualised, and symbol makers have little analysis to move on when they’re taking into account making pictures on those subjects. In a similar way, newshounds, campaigners, teachers and policymakers have little proof on which to base selections they’re having to make every day when deciding on pictures. In response to interviews I performed with cyber safety professionals from Europe, Russia, and the United States, this piece explores why pictures topic to coverage, what present cyber pictures are conveying and their affect, and the way we may start to keep in touch cyber problems extra successfully.

The ability and politics of pictures

W.J.T. Mitchell coined the “pictorial flip” in his 1994 e-book Image Concept to characterise the character of our international as of late. He argued that the huge intake and greater consideration to pictures in all spheres of lifestyles led to by way of media applied sciences has resulted in the facility of the visible being more than ever prior to as we an increasing number of understand and take into accout key occasions via pictures. Whilst Mitchell used to be regarding tv, this turned into extra pronounced with the upward thrust of the Web, which has reworked now not handiest the velocity at which pictures flow into and their achieve however has additionally democratised pictures, getting rid of the standard gatekeepers of data. Because of this, information pictures have transform central to working out and development the realities by which we are living, made imaginable by way of the realization that images are honest (“the digital camera by no means lies”).

After all, we all know this isn’t the case. Pictures aren’t “visible information”, however relatively they’re reproductions whose which means has been built by way of each the generation that has captured it and the specific viewpoint of the individual in the back of the digital camera. They’re additionally now not impartial: their which means is won relating to the society and tradition they exist in, and on account of this, they’re inherently political. Colonial images from the nineteenth and early 20th centuries, as an example, are understood very in a different way as of late than after they had been made.

Pictures and new techniques of conflict


Within the early 2000s, pictures explicitly entered the protection research time table, a reputation that visible representations are an important to how safety issues transform recognized and debated.

Esther Kersley

Within the early 2000s, pictures explicitly entered the protection research time table, a reputation that visible representations are an important to how safety issues transform recognized and debated. In step with Lene Hansen, this “visible flip” used to be, partly, a results of interior dynamics of educational debates (the broader “visible flip” that happened within the humanities) and traits in generation (the smartphone, cameraphone and social media that influenced the velocity, achieve, and manufacturing of pictures). It used to be additionally a results of essential international occasions that concerned or had been formed by way of pictures: In 2001, the overwhelmingly visible protection on the planet’s media of 9/11 supposed pictures performed an essential component in offering the assaults with a selected form and standing; in 2004, vast collection of footage launched of torture and abuse by way of American army staff from Abu Ghraib jail in Iraq had an unbiased affect at the scandal receiving international consideration (textual accounts of what took place on the jail that seemed prior to the footage had generated little dialogue); and within the 2015 Charlie Hebdo assaults, it used to be pictures (the Danish Muhammed Cartoons that the attackers sought to ruin and punish) that led to the development. With out the photographs – their manufacturing, flow, and what they “say” – there would had been no tournament.

However one thing else used to be additionally taking place in safety research at the moment. One thing that didn’t contain pictures and wasn’t visual, however used to be in large part invisible. In 2013, Professor Paul Rogers wrote a paper for RUSI mentioning that “The dominant development in world safety during the last decade has been a transfer against ‘far off regulate”. This describes the shift from attractive vast army forces to accomplishing conflict not directly or at a distance. It comprises new applied sciences – equivalent to armed drones and cyber actions, in addition to new strategies of conflict, as an example, the greater use of particular forces and personal army corporations. Nearly a decade on from when Rogers wrote this, different rising and disruptive applied sciences (EDTs), equivalent to AI, mechanical device studying, deep fakes and quantum generation, are taking part in an expanding position in warfare. Those are each much less visual and no more tangible than, as an example, squaddies and standard guns.


What occurs to political phenomena which are arduous to visualize? It is a problem for as of late’s symbol makers when making an attempt to keep in touch fresh threats, such because the local weather disaster and new applied sciences.

Esther Kersley

If politics and society are formed each by way of what’s made visual and what’s left invisible, what occurs to other people, problems, and phenomena that we don’t see or that there’s a lack of pictures of? And what occurs to political phenomena which are arduous to visualize? It is a problem for as of late’s symbol makers when making an attempt to keep in touch fresh threats, such because the local weather disaster and new applied sciences. In relation to documenting new sorts of conflict, there were makes an attempt by way of some photographers to handle this (as an example, Simon Norfolk, Lisa Barnard, and Trevor Paglan), however those examples stay sparse and are positioned within the “artwork” realm of images, relatively than mainstream photojournalism and information pictures.

Analysing cyber pictures

In 2021, in a bid to grasp higher the photographs used to keep in touch tales about cyber, I started gathering pictures that accompany information articles and studies, the usage of Google information and symbol searches of “cyber threats”, “cyber safety”, and “cyber conflict” from publications in the United Kingdom and US. I then interviewed 15 cyber safety professionals from Europe, Russia, and the United States, inviting them to analyse those pictures.


In a bid to grasp higher the photographs used to keep in touch tales about cyber, I interviewed 15 cyber safety professionals from Europe, Russia, and the United States, inviting them to analyse cyber pictures.

Esther Kersley

In all of the interviews, members stated there used to be a loss of “excellent” pictures to constitute cyber. This used to be a subject they’d encountered of their paintings when desiring a picture for a convention brochure, a presentation, a e-book quilt, or a piece of writing. They had been additionally all in settlement that it is a advanced downside to unravel as cyber is “intangible”, “diffuse” and “invisible” and recognised that this can be a extensive matter that refers to many alternative actions and threats.

Even if there used to be settlement over the problem, there used to be no consensus on what a “excellent” or “dangerous” symbol used to be, other professionals had radically other views at the pictures introduced to them, and a few pictures precipitated sturdy reactions, each sure and unfavourable. From the research and conversations that got here from those workouts, I recognized 3 sorts of pictures, or 3 other approaches to representing this matter: “cliched”, “life like”, and “metaphorical”.

The clichéd, life like and metaphorical pictures

The “cliched symbol”, as an example, a person in a hoodie sitting in entrance of a pc display screen (symbol 1), a padlock, or a human-like robotic, are maximum prevalent in information tales and professional publications. The important thing downside related to those pictures is they beef up misrepresentations, stereotypes and inaccuracies. At the hacker symbol (symbol 1), one player stated, “It’s like a meme of cyber safety that has little to not anything to do with truth”. They went on, “Other people do perform cyber-attacks as people sitting at their laptops, however numerous cyber safety is surroundings a password, putting in a two-factor identity, the human-machine interface”. It used to be additionally observed to be problematic because it reinforces gender stereotypes that cyber is a male area. This symbol used to be additionally praised for being instantly recognisable: “It does paintings”, stated every other player. “Despite the fact that you aren’t within the cyber safety international, the picture is ubiquitous.”

The hooded guy on the laptop: What are cyber pictures telling us?

The second one form of symbol recognized is the “literal” or “life like” symbol, as an example appearing knowledge centres, army staff in an operation room, or a pc keyboard. Those pictures had been praised as being ‘life like’ and ‘correct’: “It presentations cyberwarfare addresses bodily gadgets, now not simply one thing being executed in some delusion land”, says Dmitry Stefanovich, a analysis fellow with the Centre for World Safety at IMEMO RAS, of the knowledge centre symbol (symbol 2). The picture of army staff (symbol 3) used to be additionally praised for being life like, “It’s now not synthetic, from a film or online game” (Elena Chernenko, particular correspondent at Kommersant that specialize in cybersecurity) and for appearing “the human interplay with generation” (Andrew Futter, Professor of World Politics on the College of Leicester). However others criticised them for focusing too closely at the army when maximum cyber assaults are performed by way of “criminals, younger other people or hackers”, and a variety of interviewees puzzled the place those pictures got here from and what affect the dominance of US army footage is having on our working out of cyber.

The general form of symbol recognized are “metaphorical”. Those are incessantly illustrations or manipulated pictures, equivalent to a picture appearing conventional guns made from binary code, or a picture of a cityscape with a pixelated bomb exploding. Those are maximum frequently present in magazines, equivalent to The Economist or in newspapers, equivalent to The New York Occasions. Those pictures had been probably the most polarising among members. At the one hand, they had been praised for his or her storytelling talent and described as ‘suave’, ‘inventive’ and ‘attention-grabbing’: “Different pictures don’t impact me or inform me the rest. This has a tale, a story”, says Jason Healey, Senior Analysis Student at Columbia College and Senior Fellow at Cyber Statecraft Initiative on the Atlantic Council. Alternatively, there used to be additionally complaint of those pictures for making too simplistic comparisons or metaphors and doubtlessly trivialising the subject material. Any other player described one such symbol as “a mischaracterisation of what cyber assaults are”, and there used to be fear that those pictures may play into one of those mythologisation about generation, “It’s now not useful, it has not anything to do with truth, and you’ll have a an identical angle to what you learn. It contributes to other people now not taking it critically,” stated Dmitry Stefanovich.

Complexity, the human component, and context

There used to be a robust need amongst all members to put across complexity and specificity. Many of the interviewees labored in fairly other spaces of cyber, and consequently, other pictures made kind of sense to them relying at the space in their experience. As Andrew Futter argues in his paper on cyber semantics, previously decade, the time period ‘cyber’ has come to seek advice from all approach of actions, threats, guns or even conflict that the phrase itself has transform meaningless. The similar factor exists with pictures: Most of the pictures try to be extensive and normal, and in doing so, transform so diffuse that they too transform meaningless. Conversely, pictures that depict one component of cyber had been critiqued for skewing our working out of what a cyber risk or cyber safety is.

Any other space of settlement that got here out of those interviews used to be the need to turn the human courting to this generation and, by way of extension, its affect. “In all these pictures, individuals are absent,” stated Elizabeth Minor, Consultant at Article 36. “Those pictures are speaking about applied sciences, however what we wish to be speaking about is the folks relating to them”.


‘In all these pictures, individuals are absent. Those pictures are speaking about applied sciences, however what we wish to be speaking about is the folks relating to them’, stated Elizabeth Minor, Consultant at Article 36.

Esther Kersley

In the end, a variety of the interviewees commented at the resources of the photographs I used to be appearing them. Thru enjoy with in search of pictures themselves, they may determine that one of the pictures had been US army footage and commented on how, as those are readily to be had on-line and below an inventive commons license, there’s an incentive to make use of them. Dr Katarzyna Kubiak, former senior coverage fellow on the ELN and Structured Discussion Officer on the OSCE, referred to it as “the American colonisation of images”. Attached to this, there used to be dialogue about how an establishment running on those subjects would possibly make a selection a picture that enhances or legitimises their very own actions. In different phrases, there used to be a need to unpick the connection between the picture, the topic it’s representing, and its broader surroundings.

Feeding again: Discourse and coverage

In 2019, Sean Lawson and Michael Ok Middleton’s paper on framing cyber safety threats explores how language can impact how we see and reply to the arena round us. In it, they read about how, for the final 25 years, US cybersecurity discourse has excited by framing cybersecurity the usage of metaphors and analogies to conflict and the army. That is exemplified by way of the “Cyber Pearl Harbour” metaphor to explain the danger of a cyber assault towards vital infrastructure resulting in mass destruction and disruption.


For the final 25 years, US cybersecurity discourse has excited by framing cybersecurity the usage of metaphors and analogies to conflict and the army.

Esther Kersley

Lawson and Middleton argue this has had a real-world affect: The Cyber Pearl Harbour metaphor is not only utilized by officers in public speeches and collected by way of the media however feeds again into the device of interior cyber safety discourse and strategising, framing legitimate pondering and making plans. America Strategic Command’s (USSTRATCOM) 2009 “Cyber Struggle Lexicon, as an example, now not handiest recognised the vital significance of language and analogy for working out cyber threats but additionally for then growing and wearing out a cyber technique.

In step with Lawson and Middleton, depictions of cyber doom eventualities may result in “a way of fatalism and demotivation to behave”, which might impair efforts to inspire suitable coverage responses to authentic safety threats. Additionally they discovered that it might distract from genuine threats, each cyber and non-cyber. After the 2016 Russian interference in the United States presidential elections, as an example, many observers argued that the point of interest on Cyber Pearl Harbour had impaired policymakers’ talent to believe the whole vary of threats and reply correctly to cyber threats after they occur. The Russian assault used to be a marketing campaign of data conflict performed by way of social media manipulation, relatively than a “Pearl Harbour assault” on vital infrastructure resulting in large-scale destruction or fatality.

Decoding cyber pictures

Like with the cyber lexicon, cyber pictures depend on positive tropes. And, like language, pictures affect how we take into accounts cyber safety threats and the way we reply to them. Making one thing visible – particularly one thing this is characteristically arduous to examine – isn’t impartial, neither is it routinely a favorable factor, it could have far-reaching penalties that wish to be in moderation regarded as.

Early in my interviews, I requested members what symbol popped into their head after they heard the phrase ‘cyber’. Those had been cyber safety professionals, however they all described some model of the ‘cliched’ symbol: rows of one’s and nil’s, a hooded guy in entrance of a pc, a padlock. Briefly, it used to be a mirrored image of the photographs they at all times see. It is a testomony to the facility of pictures and the sophisticated techniques they paintings in our lives. Unsurprisingly, that is reflected by way of AI-generated pictures when given cyber as a recommended (pictures 4-6 beneath, generated by way of activates from the creator in December 2022) – we’re fed again the similar pictures we’re used to seeing. To modify how cyber and different new applied sciences are visualised, analysis into cyber pictures must be scaled up and various to incorporate now not simply coverage professionals, however symbol makers, communications experts, business pros, and the broader public. For this to occur, pictures wish to be recognised as essential as language for shaping our working out of, and reaction to, new applied sciences.

The creator needs to thank Lewis Bush and Dr Katarzyna Kubiak for his or her recommendation and strengthen, and to the interviewees who generously gave their time.

The critiques articulated above constitute the perspectives of the creator and don’t essentially mirror the placement of the Eu Management Community or all of its individuals. The ELN’s goal is to inspire debates that can lend a hand broaden Europe’s capability to handle the urgent overseas, defence, and safety coverage demanding situations of our time.

Duvet symbol: Clockwise from left to proper: Symbol 1, Flickr, Christoph Scholz, Symbol 2, Pixaby, Symbol 3, PICSHADOW8672, Pixahive, Symbol 4, Flickr, Richard Patterson, Symbol 5, Pixaby, Symbol 6, Wikimedia Commons, David Whelan

Leave a Reply