As the Third Wave crashes into a sickly and dying Second Wave system, a mythological entity may be worth revisiting. Iktomi was a spider-spirit of Lakota folklore. He was a bringer of technology, and also a trickster. An accomplice of Coyote, he would often give people new technology. Sometimes, the technology itself is a trick, a method of distracting an unwary victim from seeing the true purpose of it. Iktomi was believed to have a hold over European and American settlers, who inadvertently spread Iktomi’s web (telegraph lines and railroads) across the land.
Iktomi is also correlated with communications, like Mercury. Like the Norse Loki or African Anansi, he is a trickster. The trickster archetype was correlated with hackers in recent decades, and some parallels with Iktomi are fairly logical. Both manipulate lines of communication to play tricks. Both bring novelty and new technologies.
Hacking and cyberwar have been on the news recently. However, much about cyberwarfare is fear-mongering. Military and technological secrets tend to remain secrets for a very short time, especially in the present. Cyberwarfare favors the defender, and each cyberattack is often a single use weapon. After a cyberattack, security holes that led to it are typically the first things that get closed. Types of cyberattackers range from cyber-criminals (who merely seize something and run), cyber-spies (looking for intel or doing counterintelligence), cyber-terrorists (seeking a target of opportunity), and cyber-warriors (seeking to actively disable another network/system). Cyberweapons, such as Stuxnet and Flame, can easily be reverse engineered by their former targets. The political chiding to “improve cyber-security” may very well be a mandate to spend more on overpriced, under-efficient “security” software. Once again, the “security theater” replaces the rather boring reality. Many of the folks hawking “cybersecurity” products are the modern analogs of Basil Zaharoff.
But to return to Iktomi, let us examine a cyber-attack as a form of combined arms. Even non-state actors could combine multiple vectors of an attack or plan to accomplish their goals. This process does not necessarily have to involve violence, destruction, or even illegality. An activist group could release leaked documents at the same moment a video goes viral. Iktomi may parallel the cypherpunk culture. As more things become networked, it becomes harder to completely shut down the internet, even if there is a “kill switch” (or more mundane power failures).
The technologies that thrive as Second Wave nation-states and corporations recede are decentralized ones. Permaculture and aquaponics may remove (or at least reduce) the need for food. Makerspaces allow for relocalized manufacturing. Solar panels and DIY renewables (such as homemade biofuels on a number of farms) could replace faulty power grids. Encrypted cybercurrencies like Bitcoin could act as a metric for a number of local currencies. There would be less need to rely on dying, stodgy bureaucracies. Iktomi would have the last laugh.