Intrusion Countermeasures Electronics
   HOME

TheInfoList



OR:

Intrusion Countermeasures Electronics (ICE) is a term used in
cyberpunk Cyberpunk is a subgenre of science fiction in a dystopian futuristic setting that tends to focus on a "combination of lowlife and high tech", featuring futuristic technological and scientific achievements, such as artificial intelligence and c ...
literature to refer to security programs which protect computerized
data In the pursuit of knowledge, data (; ) is a collection of discrete Value_(semiotics), values that convey information, describing quantity, qualitative property, quality, fact, statistics, other basic units of meaning, or simply sequences of sy ...
from being accessed by
hackers A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
.


Origin of term

The term was popularized by
William Gibson William Ford Gibson (born March 17, 1948) is an American-Canadian speculative fiction writer and essayist widely credited with pioneering the science fiction subgenre known as ''cyberpunk''. Beginning his writing career in the late 1970s, hi ...
in his short story "
Burning Chrome "Burning Chrome" is a science fiction short story by Canadian-American writer William Gibson, first published in '' Omni'' in July 1982. Gibson first read the story at a science fiction convention in Denver, Colorado in the autumn of 1981, to an a ...
", which also introduced the term '' cyberspace'', and in his subsequent novel ''
Neuromancer ''Neuromancer'' is a 1984 science fiction novel by American-Canadian writer William Gibson. Considered one of the earliest and best-known works in the cyberpunk genre, it is the only novel to win the Nebula Award, the Philip K. Dick Award, and ...
''. According to the Jargon File, as well as Gibson's own acknowledgements, the term ICE was originally coined by Tom Maddox.


Description of ICE

When viewed in a cyberspace
virtual reality Virtual reality (VR) is a simulated experience that employs pose tracking and 3D near-eye displays to give the user an immersive feel of a virtual world. Applications of virtual reality include entertainment (particularly video games), e ...
environment, these constructs are often represented by actual walls of ice, stone, or metal. Black ICE refers to ICE that are capable of killing the intruder if deemed necessary or appropriate; some forms of black ICE may be
artificially intelligent Artificial intelligence (AI) is intelligence—perceiving, synthesizing, and inferring information—demonstrated by machines, as opposed to intelligence displayed by animal cognition, animals and human intelligence, humans. Example tasks in ...
.


Real-world usage

Though real-life firewalls,
anti-virus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the name. ...
and similar programs fall under this classification, the term has little real world significance and remains primarily a
science fiction Science fiction (sometimes shortened to Sci-Fi or SF) is a genre of speculative fiction which typically deals with imaginative and futuristic concepts such as advanced science and technology, space exploration, time travel, parallel uni ...
concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a misnomer. On the other hand, there is a strong connection between real-world
cybercrime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing th ...
and cyberpunk literature. "The Gibsonian concept of cyberspace ..fed back into both computer and information systems design and theory," wrote Roger Burrows. The term ICE has occasionally been used for real-world software: * ''BlackICE'', an
intrusion detection system An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
built by a California company named Network ICE in 1999, acquired by
IBM Internet Security Systems IBM Internet Security Systems, formerly Internet Security Systems, and often known simply as ISS or ISSX (after its former NASDAQ ticker symbol) is a security software and managed security services provider founded in 1994. The company was acquire ...
, then discontinued in 2007. * The ICE cipher, an encryption algorithm, may be inspired by Gibson's ICE, but it is explained as meaning "Information Concealment Engine". * The Java bytecode verifier in the Apache ByteCode Engineering Library (BCEL) is called JustIce (see the 'docs' folder for documentation). On April 28, 2009, the Information and Communications Enhancement Act, or ICE Act for short, was introduced to the
United States Senate The United States Senate is the upper chamber of the United States Congress, with the House of Representatives being the lower chamber. Together they compose the national bicameral legislature of the United States. The composition and pow ...
by Senator
Tom Carper Thomas Richard Carper (born January 23, 1947) is an American politician and former military officer serving as the senior United States senator from Delaware, having held the seat since 2001. A member of the Democratic Party, Carper served i ...
to make changes to the handling of
information security Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorize ...
by the federal government, including the establishment of the National Office for Cyberspace.


Usage in fiction

The term ''ICE'' is widely used in
cyberpunk Cyberpunk is a subgenre of science fiction in a dystopian futuristic setting that tends to focus on a "combination of lowlife and high tech", featuring futuristic technological and scientific achievements, such as artificial intelligence and c ...
fiction.


Anime

* '' Cyberpunk: Edgerunners'' * ''
Cyber City Oedo 808 is a 1990–1991 cyberpunk original video animation. It was directed by Yoshiaki Kawajiri. Set in the year 2808 in the city of Oedo (Tokyo), it tells the story of three criminals who are enlisted into fighting crime in exchange for reduced sent ...
'' * ''
Ghost in the Shell ''Ghost in the Shell'' is a Japanese cyberpunk media franchise based on the seinen manga series of the same name written and illustrated by Masamune Shirow. The manga, first serialized in 1989 under the subtitle of ''The Ghost in the Shell'' ...
'', where ICE is referred to directly by name or else as an 'Attack Barrier'.


Cartoons

* ''
Phantom 2040 ''Phantom 2040'' is an animated series that is loosely based on the comic strip superhero ''The Phantom'', created by Lee Falk. The central character of the series is said to be the 24th Phantom. It was aired from September 18, 1994 to March 3, ...
'', though in it "ICE" stands for "Integrated Cyber Environment", referring to cyberspace, rather than Intrusion Countermeasures Electronics


Card games

* ''
Netrunner ''Netrunner'' is an out-of-print collectible card game (CCG) designed by Richard Garfield, the creator of '' Magic: The Gathering''. It was published by Wizards of the Coast and introduced in April 1996. The game took place in the setting for t ...
'', where the corporate player uses ICE and the runner player uses icebreakers; while corps in ''Netrunner'' understand ICE to be an acronym for "Intrusion Countermeasures Electronics", the runner viewpoint is that the acronym should be for "Insidious Cortical Electrocution" * '' Android: Netrunner'', an adaptation of the original Netrunner, formerly a
Living Card Game Fantasy Flight Games (FFG) is a game company based in Roseville, Minnesota, United States, that creates and publishes role-playing, board, card, and dice games. As of 2014, it is a subsidiary of Asmodée Éditions. History Fantasy Flight Publ ...
. * ''Hacker'' and ''Hacker II - The Dark Side'', where the players attempt to gain illicit access systems represented by playing cards arranged in a network while avoiding getting zapped by ICE and Black ICE.


Literature

* ''
Neuromancer ''Neuromancer'' is a 1984 science fiction novel by American-Canadian writer William Gibson. Considered one of the earliest and best-known works in the cyberpunk genre, it is the only novel to win the Nebula Award, the Philip K. Dick Award, and ...
'', original popularizer of the term * ''
Count Zero ''Count Zero'' is a science fiction novel by American-Canadian writer William Gibson, originally published in 1986. It is the second volume of the Sprawl trilogy, which begins with ''Neuromancer'' and concludes with ''Mona Lisa Overdrive'', and i ...
'' the second novel of William Gibson's "Sprawl trilogy" * '' Hyperion'', wherein black ICE is used to defend the TechnoCore * '' Trouble and Her Friends'' by Melissa Scott, wherein IC(E) refers to Intrusion Countermeasures (Electronic), solving the problem of implying that the measures are hardware-based


Roleplaying games

* ''
Cyberpunk 2020 ''Cyberpunk'' is a tabletop role-playing game in the dystopian science fiction genre, written by Mike Pondsmith and first published by R. Talsorian Games in 1988. It is typically referred to by its second or fourth edition names, ''Cyberpunk 2 ...
'', upon which the ''Netrunner'' card game is based * ''
GURPS Cyberpunk ''GURPS Cyberpunk'' is a genre toolkit for cyberpunk-themed role-playing games set in a near-future dystopia, such as that envisioned by William Gibson in his influential novel ''Neuromancer''. It was published in 1990 after a significant delay c ...
'' * ''
Shadowrun ''Shadowrun'' is a science fantasy tabletop role-playing game set in an alternate future in which cybernetics, magic in fiction, magic and fantasy creatures co-exist. It combines genres of cyberpunk, urban fantasy and crime fiction, crime, with ...
'', called IC (The setting drops the "electronics" misnomer) but is colloquially named "Ice" by hackers in the setting.


Movies

* ''
Johnny Mnemonic "Johnny Mnemonic" is a science fiction short story by American-Canadian writer William Gibson. It first appeared in '' Omni'' magazine in May 1981, and was subsequently included in ''Burning Chrome'', a 1986 collection of Gibson's short fiction. ...
'', mentioned in the opening crawl. * ''
Track Down ''Track Down'' (also known as ''Takedown'' outside the United States) is a 2000 American crime thriller film based on the non-fiction book ''Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw—By the Man ...
'', wherein a friend of
Kevin Mitnick Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crim ...
says in a club that he is the hacker known as "IceBreaker"


Television

* ''
Babylon 5 ''Babylon 5'' is an American space opera television series created by writer and producer J. Michael Straczynski, under the Babylonian Productions label, in association with Straczynski's Synthetic Worlds Ltd. and Warner Bros. Domestic Tele ...
'', in the episode "
Born to the Purple "Born to the Purple" is the third episode of the first season of the science fiction television series, ''Babylon 5''. Plot Commander Jeffrey Sinclair is trying to negotiate a treaty between the Narn and Centauri governments over a disputed sector ...
" * ''
Max Headroom Max Headroom is a fictional artificial intelligence (AI) character portrayed by actor Matt Frewer. Advertised as "the first computer-generated TV presenter", Max was known for his biting commentary on a variety of topical issues, arrogant wit, ...
'', in the episode "Security Systems", April 21, 1987


Video games

* ''
Anarchy Online ''Anarchy Online'' is a massively multiplayer online role-playing game (MMORPG) published and developed by Norwegian video game development company Funcom. Released in June 2001, the game was the first in the genre to include a science-fiction ...
'' features an item called "Hacker ICE-Breaker Source", which can be further upgraded to "Intrusion Countermeasure Electronics Upgrade". *'' AI: The Somnium Files'' *
Baldr Sky is a duology of Japanese adult visual novels with 2D action elements developed by Giga. The series characterizes itself as a cyberpunk action adventure game. The first game, named ''Baldr Sky Dive1 "Lost Memory”'' was released in Japan on Mar ...
uses the term to describe the technology protecting the characters' "brain chips" and virtual structures. * ''
BloodNet ''BloodNet'' is a cyberpunk-themed role-playing video game video game developed and published by MicroProse for MS-DOS in 1993. An Amiga port was released in 1994 by Catfish and Teeny Weeny Games. An emulated version for Microsoft Windows, ...
'' uses the term to describe the technology the player must overcome when hacking a computer system. * ''
Cyberpunk 2077 ''Cyberpunk 2077'' is a 2020 action role-playing video game developed by CD Projekt Red and published by CD Projekt. Set in Night City, an open world set in the ''Cyberpunk'' universe, players assume the role of a customisable mercenary kn ...
'' uses the term to refer to defensive countermeasures that prevent netrunners and cyberware from hacking a target, * ''
Deus Ex ''Deus Ex'' is a series of role-playing video games, set during the mid 21st century. Focusing on the conflict between secretive factions who wish to control the world by proxy, and the effects of transhumanistic attitudes and technologies in a ...
'', where the player's hacking program is referred to as an "ICE Breaker" * '' Dystopia'', wherein there are security programs called "ICE walls" * ''
Mr. Robot ''Mr. Robot'' is an American drama thriller television series created by Sam Esmail for USA Network. It stars Rami Malek as Elliot Alderson, a cybersecurity engineer and hacker with social anxiety disorder, clinical depression and dissociati ...
'', where "ICE" in its RPG part refers to shields or armor that can be attacked by various "ICE breaker"s * '' Midnight Protocol'', where "ICE" is an umbrella term for security measures that shield nodes from being accessed * ''
Neuromancer ''Neuromancer'' is a 1984 science fiction novel by American-Canadian writer William Gibson. Considered one of the earliest and best-known works in the cyberpunk genre, it is the only novel to win the Nebula Award, the Philip K. Dick Award, and ...
,'' where ICE, BlackICE, and ICE Breaking are highly featured. * ''
Perfect Dark Zero ''Perfect Dark Zero'' is a first-person shooter developed by Rare and published by Microsoft Game Studios. It was released as a launch title for the Xbox 360 video game console in 2005. The game is part of the ''Perfect Dark'' series and a pr ...
'', where players use ICE technology to bypass security. * '' Project Snowblind'', features an ICE pick, to hack enemy cameras, turrets, and robots and use them against enemy forces. * ''
Ripper Ripper or The Ripper may refer to: People * Ripper (surname) * Paul Burchill, ring name "The Ripper", a professional wrestler based on Jack the Ripper * Kirk Hammett, nicknamed "The Ripper", the lead guitarist in the heavy metal band Metallica ...
'' has the player break into various cyberspace systems, which involves fighting the "ICE" security programs in the form of a
rail shooter Shoot 'em ups (also known as shmups or STGs ) are a Video game genre, sub-genre of action games. There is no consensus as to which design elements compose a shoot 'em up; some restrict the definition to games featuring spacecraft and certai ...
. * '' Star Wars: Knights of the Old Republic'', an item called "ICE Breaker" can be obtained and used as a hacking tool during a sequence on the Leviathan, in which the player chooses one character to remain behind and attempt to rescue the other captured party members. * '' StarCrawlers'' features an ability called Black Ice, which the Hacker character may use. * '' System Shock'', where ICE is represented in cyberspace as both autonomous security programs and ICE protection attached to data or software objects appearing as blue crystal formations. * '' System Shock 2'', where an item that auto-hacks electronics is known as an "ICE-Pick" * '' The Ascent'', where items are protected by various levels of ICE that the player must overcome to access.


Web Comics

* ''
Schlock Mercenary ''Schlock Mercenary'' is a comedic webcomic written and drawn by Howard Tayler. It follows the tribulations of a star-travelling mercenary company in a satiric, mildly dystopian 31st-century space opera setting. After its debut on June 12, 2000 ...
'', icewalls are a standard security measure.


References

{{William Gibson Cyberpunk themes William Gibson Malware in fiction