This chapter combines various recent vigorous discussions around power, IT Security, global security events, and technological evolution in order to shed light on their various interdependencies, and forms of vulnerabilities, thus contributing to contemporary IT security debates. Specifically, this chapter discusses the characteristics and dynamics of “flow security” and examines how information
... [Show full abstract] flows; the importance of which is exponentially increased through the availability of data, offers new possibilities for power projection in the first instance, and creates new sources of vulnerabilities in the second. It is mainly argued that the exponentially accelerating data and information flows offer new ways with which actors can transform social realities, introduce irregularity and disruptions, and increase general entropy and friction in political processes and our everyday lives. It is argued that as our lives are increasingly dependent on technologies conveying information, our lives are increasingly “algorithmic”, i.e., human activity increasingly becomes subject to programmed analytics and visualization techniques. This chapter highlights the role of technological interface as a position of power, with the capability to set the boundaries of the imaginable, possible, and appropriate. Thus, contemporary, algorithmic, life necessitates new skills that enable secure navigation in the whirlpool of meanings, which flow more rapidly as technology advances, and which are increasingly manipulated with malicious intent. This chapter concludes by highlighting that this new condition of human life requires new forms of social agreements, and puts forward categories that should especially be considered.