* [Blog](https://origin-researchcenter.paloaltonetworks.com/blog) * [Palo Alto Networks](https://origin-researchcenter.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://origin-researchcenter.paloaltonetworks.com/blog/category/cybersecurity-2/) * The Cybersecurity Canon: ... # The Cybersecurity Canon: Rise of the Machines: A Cybernetics History [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F08%2Fthe-cybersecurity-canon-rise-of-the-machines-a-cybernetics-history%2F) [](https://twitter.com/share?text=The+Cybersecurity+Canon%3A+Rise+of+the+Machines%3A+A+Cybernetics+History&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F08%2Fthe-cybersecurity-canon-rise-of-the-machines-a-cybernetics-history%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Forigin-researchcenter.paloaltonetworks.com%2Fblog%2F2016%2F08%2Fthe-cybersecurity-canon-rise-of-the-machines-a-cybernetics-history%2F&title=The+Cybersecurity+Canon%3A+Rise+of+the+Machines%3A+A+Cybernetics+History&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://origin-researchcenter.paloaltonetworks.com/blog/2016/08/the-cybersecurity-canon-rise-of-the-machines-a-cybernetics-history/&ts=markdown) \[\](mailto:?subject=The Cybersecurity Canon: Rise of the Machines: A Cybernetics History) Link copied By [Robert Clark](https://www.paloaltonetworks.com/blog/author/robert-clark/?ts=markdown "Posts by Robert Clark") Aug 05, 2016 7 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [cybersecurity canon](https://www.paloaltonetworks.com/blog/tag/cybersecurity-canon/?ts=markdown) [Rise of the Machines](https://www.paloaltonetworks.com/blog/tag/rise-of-the-machines/?ts=markdown) [Thomas Rid](https://www.paloaltonetworks.com/blog/tag/thomas-rid/?ts=markdown) [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/08/CyberCanon2016_500x85.jpg) [![CyberCanon2016\_500x85](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/08/CyberCanon2016_500x85-500x85.jpg)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2016/08/CyberCanon2016_500x85.jpg) *We modeled the Cybersecurity Canon after the Baseball or Rock \& Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. Please write a review and nominate your favorite.* *The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!* **Book Review by** [**Canon Committee Member, Bob Clark**](https://www.paloaltonetworks.com/threat-research/cybercanon/cyber-security-canon-bios.html)**:** *Rise of the Machines: A Cybernetics History* (2016)by Thomas Rid ### Executive Summary As cybersecurity practitioners we have a lot to read simply to stay current in our industry. However, after reading the latest threat reports, flash releases, CERT notifications, CVEs and products on emerging technology, we should seek to develop ourselves as complete practitioners. This is one of those books. Understanding our history, and how we got here, makes you a better practitioner with a broad base of knowledge. And hell, who doesn't love a book that talks about the HAL9000, Arthur C. Clarke, *Playboy* articles, *Omni* magazine, AT-ATs, Terminator, Karel Čapek's *R.U.R.* (the 1920 Czech play that gave us the word "robot"), Blade Runner, Whole Earth Catalog, Mary Pranksters and acid trips, the counterculture of San Francisco, and finally, *finally* , lets us all quote the real origins of that much-maligned term "cyber." *Rise of the Machines: A Cybernetics History* covers it all, including the arts, literature, and trends in pop culture. The author, Thomas Rid, is a professor in the Department of War Studies at King's College London and the author of Cyber War Will Not Take Place and War and Media Operations. Professor Rid's research is extensive as he takes us through the history of cybernetics, the merging of man and machine starting with cybernetics foundations in Norbert Weiner's writings in the 1940s and moving through each subsequent decade, including the West Coast techno-libertarians' addition to the theory, ending with an extensive look at what Rid calls the first cyberwar. As [Matthew Kirschenbaum states in his review](http://warontherocks.com/2016/07/digging-into-the-archeology-of-the-future/): [Rise of the Machines](https://www.amazon.com/gp/product/0393286002/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&tag=httpwaronthec-20&camp=1789&creative=9325&linkCode=as2&creativeASIN=0393286002&linkId=e9799e55ce69fe511aee4ce81f4db2a6) is a sweeping intellectual history, engagingly written and brought to life by numerous details and anecdotes. Cybernetics and its progression of offshoots --- cybernation, cyberculture, cyborgs, cyberspace, cyberpunk, cypherpunk, and finally cyberwar --- are all disentangled and demystified in its pages. Cybersecurity Canon candidate books are supposed to be essential to the cybersecurity practitioner, and it's great to be steeped in your specific knowledge that makes you an expert. However, it is well-rounded practitioners who will distinguish themselves among their peers; reading this book will definitely accomplish that goal. ### Review I confess, any book that can properly define the word "cyber" -- I'm all for it, especially with so many practitioners and policy wonks misusing the term. Rid recognizes this and, therefore, uses this historical look to help us all understand where, when and how to use the prefix "cyber." Rid immediately helps the industry, correctly stating that "cyber" is a prefix being slapped onto anything to make it more techie or interesting. He goes on to answer the oft-asked question, "where did cyber come from?" He slams the door shut on that perpetuated myth we've all heard and repeated that cyber is the child of William Gibson's *Neuromancer*. "Cyber" was first used as in "cybernetics" a general theory of machines from the early 1940s; it was about computers, control, security, and the ever-evolving interaction between humans and machines. Rid builds the book's narrative through eight main chapters that are organized chronologically: Automation, Organisms, Culture, Space, Anarchy and War. Cybernetics found its beginnings in Norbert Wiener's foundational *Cybernetics or Control and Communication in the Animal and the Machine* (1949) that became improbable bestsellers. Using this as a launching point, Rid looks at cybernetics through the decades to include not only the technological advances but also the philosophical developments dealing with advances in merging machines with humans. Others mentioned, who come and go along the way, include John von Neumann, Gregory Bateson, Stewart Brand, Timothy Leary and Jaron Lanier. Developed from the mind of MIT mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision looked at the merging of man with the future of machines. This need to combine man and machine to improve our defenses and man's capability to fight looks at the early advances in war-fighting capabilities, not only man becoming engaged with various machines but also computer systems developed, such as our air defense system SAGE -- one would say, the predecessor to NORAD. The 50s and early 60s see the same focus, making technology that can increase man's power and strength to include fighting devices developed for the war in Vietnam and walking machines that never got past prototypes but preceded the AT-ATs of Star Wars. Ultimately cybernetics finds two competing factions: some seeking to make a better world -- Bay Area denizens/libertarians hoping for a new unregulated and uncontrolled digital space -- and some seeking to control it (i.e., Washington, DC). In the 60s and 70s the technology side of the cybernetics movements, changes with the Bay Area's introduction into drugs, rock and computers. Rid details the rise of this movement including the numerous influencers from the West Coast, including the birth of the Electronic Frontier Foundation, a great organization for defending civil liberties in the digital world. As the Bay Area movement subsides, the 80s did bring us Gibson's cyberpunks and "Rid takes us back inside the green machine --- the military, specifically the U.S. Department of Defense, aligning the precepts of the AirLand Battle that was supposed to defeat Warsaw Pact tank armies in the 1980s and the post-Desert Storm revolution of military affairs with cybernetic arts of war." We also see the rise of unfulfilled promises of cool "virtual reality" devices, the prototypes of which were clunky at best and looked like "Dark Helmet" from Mel Brooks' *Spaceballs*. And let us not forget what the 90s brought us, of course: the crypto wars and introduction of cypherpunks. Finally, Rid finishes up with a topic near and dear to his heart and extensively researched: moonlight maze, as many U.S. government folks called the first state-on-state cyberwar. (Cyber-espionage is what it should have been classified.) Ironically Matt Kirschenbaum compares Rid's discussion on this subject with Fred Kaplan's in *Dark* *Territory*, also reviewed by me and on the Canon website. Kirschenbaum believes Rid presents this information much more deeply than Kaplan. And while I know Rid's research is extensive, I thought both covered it equally well with Kaplan painting the Russian's actions much better. Then again, I think it fit better into Kaplan's book and was treated appropriately in Rid's. Of course "the climax of the book is its discussion of the complex of public fears around an Electronic Pearl Harbor (the language is Hamre's), a phrase whose staying power Rid sees as evidence of the machines at their apogee." ### Conclusion *Rise of the Machines: A Cybernetics History* will not make you more proficient in your cybersecurity job, unless you're a policy wonk. What this book will do is make you a better practitioner, well-versed in "the rise of the machine." And if your promotion comes down to advancing an SME who can speak solely to his/her area of expertise or promoting one that, all things being equal, is more well-rounded then this book will definitely accomplish that and give you knowledge to be used as a cyber-professional. (See how I did that? I used "cyber" as a prefix before "professional." Tom Rid would be proud -- I think.) *** ** * ** *** ## Related Blogs ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Cybersecurity Canon Candidate Book Review: "Abundance: The Future Is Better Than You Think](https://origin-researchcenter.paloaltonetworks.com/blog/2018/09/cybersecurity-canon-candidate-book-review-abundance-future-better-think/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### The Cybersecurity Canon - American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road](https://origin-researchcenter.paloaltonetworks.com/blog/2018/01/cybersecurity-canon-american-kingpin-epic-hunt-criminal-mastermind-behind-silk-road/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### We're Down to the Last Two Contestants In the 2018 Cybersecurity Canon People's Choice Awards!](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/last-two-contestants-2018-cybersecurity-canon-peoples-choice-awards/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards: The Final Four](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-final-four/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards: Vote Now for Round 3](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-vote-now-round-3/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards -- Round 2: Did Your Favorites Make the Cut?](https://origin-researchcenter.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-round-2-favorites-make-cut/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://origin-researchcenter.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language