All InfoSec challenges today may be traced back to the design mindset of the Internet Protocol Suite in the late 60’s & early 70’s: non-repudiation, confidentiality, spoofing etc’ were Not in the design goals of TCP/IP. Decades after, we’re creatively & immensely manipulating time & space over the internet. Malware uses deception to evade defenses, defenders use deception to deter adversaries. Attribution of actions to entities becomes challenging than ever. So WhoAreWe, anyway?