Standing On The Cryptocurrency Frontier

In a 1980 presidential debate, Candidate Ronald Reagan eviscerated a hapless incumbent Jimmy Carter by responding to several of Carter’s declarations in a pitying, sarcastic voice saying “there you go again.”  As I listen to the current discussions about the “wild frontier” of cryptocurrency, all I can think of is here we go again.

The Internet, Cyber Space, and the consequent Fourth Industrial Revolution they caused, have not been kind to 20th century powers and ideas.  Revolutions rarely are.  And we’ve just been through a decade of debate on how to deal with the consequences of a new cyber domain and its use and the “rules” that govern it. Cyber space - while hardly settled - is no longer the wild frontier it was.  

Cryptocurrencies – digital money created from computer code by individuals - have been on the edge of that debate. “Crypto-land” was a small, unruly part of the territory with little impact on the real-world economy.  An interesting use of blockchain by college kids with servers.  Slowly, but surely, it got bigger. A lot bigger.  Trillions of dollars bigger.  And it has become a speculative, gold mining camp with massive fortunes won and lost filled with perceived anarchy by the law enforcement authorities.  And increasing concerns by nation states that maybe, just maybe, their 20th century-based currency systems could be blown apart by this advance.  They are confused.  They are not happy.  They cannot stop it.  But, they will try to control it.

It Is What It Is

Money is one of the great human conceptions - some would say accepted delusions.  Anything could be money - from stones to gold to paper.  Money is a medium of exchange.  Money is a measure of value.  Money is a store of value.  In other words, if you are willing to trade with it, view it as a “price,” and believe it’s going to keep some worth - congratulations, it's money.

The concept of precious metals and paper money have been around for millennium. The type of centralized regulation of money we currently have is relatively new – really since the mid-19th century.  In fact, in the United States - today’s international currency standard - in the U.S. we accepted Spanish doubloons up until the Civil War.  The Federal Reserve notes you carry in your pocket are a function of a long overdue 1914 formation of an American central bank.  And the U.S. Dollar as the standard of world currency; only since 1946.

The rise of cryptocurrency is even more recent with earliest creations coming from forms of computer based “e-cash” going back to the early 1980’s. It was not created by a central bank, but by individuals who could “mine” on their computer servers securely encrypted string of data - a “hash”. People were willing to accept these unique “packets” as a currency – a medium of exchange, a measure of value, and a store of value.  A money.

It wasn’t until the Internet took off in the mid-1990’s and the power of individual computers increased that the concept of cryptocurrency came into more common use and that the currency began to expand.  With the creation of easy to create, easy to purchase, and easy to obtain Bitcoin in 2009, that’s when cryptocurrencies exploded.  

Transparency and Control and Beijing

Central banks have been uneasy about cryptocurrency since the early 10’s. Admittedly, while it is an easy, secure currency for international trade, it has been notorious in its use on the Dark Net for any number of nefarious purposes from illicit activities, to the drug trade, to terrorism.  However, for those of us who remember the late cocaine wars in the late 70’s, most of the paper dollars in Miami had residue of cocaine on them. And were sometimes found floating in bales off the coast. Some things do not change.

The question of value is also a sticky one and rightfully concerning.  Right now, the fluctuation of value is rather high - to put it politely - with speculation pushing value all over the place.  Still, once you step beyond the well-controlled Yuan, Euro, and Dollar, you will note that many less developed country currencies values are all over the place.  See what a Venezuelan Bolivar will get you some time. 

Even with these challenges, the large central banks are not rejecting the possibilities of cryptocurrency.  Many are, like the U.S. Federal Reserve, studying what it would take to set up a Crypto-Dollar.  And, as you might guess, China is moving very quickly to position an easy to use and easy to obtain “crypto-Yuan.” Beijing has made no bones about wanting to the Number One power by mid-century. It is using Economic Power to do just that.  And finding a way to take over as the reserve currency from the U.S. Dollar with a well-received crypto currency is one of many ways to do that.

The Wild Frontier Is Closing

So, here we go again.  Like the Internet today, the Cryptocurrency Wild Frontier is going to close likely in this decade; or at least be better and more heavily patrolled. Individual miners are not going away yet.  But, the world’s governments and central banks, concerned about transparency and control, are going to build their own “coin and wallets” and will surely regulate miner behavior. And there are enough new users - two trillion dollars and growing by some estimates - that the “settlers” will want and will get peace and stability in Cryptocurrency-land. 

Governments will give it to them.  In the 21st century, the concept of the state as protector of the people and national interest is not going away any time soon.

Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies     

Image: Unsplash

You Might Also Read: 

Smart Artificial Intelligence:

 

« CYRIN - Where Education Comes to You
Western Nations Face A ‘moment of reckoning’ Over Cyber Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Beame.io

Beame.io

Beame.io is an information security company that distributes open source authentication infrastructure based on encryption.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Cyberarch Consulting

Cyberarch Consulting

Cyberarch is a security-focused consulting firm. We provide services specializing in information security, digital forensics, penetration testing and cyber security training.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Axiado

Axiado

Axiado Corporation is a security processor company redefining hardware root of trust with hardware-based security technologies, including per-system AI.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Capgemini

Capgemini

Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. Areas of expertise include Cybersecurity.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.