Standing On The Cryptocurrency Frontier

In a 1980 presidential debate, Candidate Ronald Reagan eviscerated a hapless incumbent Jimmy Carter by responding to several of Carter’s declarations in a pitying, sarcastic voice saying “there you go again.”  As I listen to the current discussions about the “wild frontier” of cryptocurrency, all I can think of is here we go again.

The Internet, Cyber Space, and the consequent Fourth Industrial Revolution they caused, have not been kind to 20th century powers and ideas.  Revolutions rarely are.  And we’ve just been through a decade of debate on how to deal with the consequences of a new cyber domain and its use and the “rules” that govern it. Cyber space - while hardly settled - is no longer the wild frontier it was.  

Cryptocurrencies – digital money created from computer code by individuals - have been on the edge of that debate. “Crypto-land” was a small, unruly part of the territory with little impact on the real-world economy.  An interesting use of blockchain by college kids with servers.  Slowly, but surely, it got bigger. A lot bigger.  Trillions of dollars bigger.  And it has become a speculative, gold mining camp with massive fortunes won and lost filled with perceived anarchy by the law enforcement authorities.  And increasing concerns by nation states that maybe, just maybe, their 20th century-based currency systems could be blown apart by this advance.  They are confused.  They are not happy.  They cannot stop it.  But, they will try to control it.

It Is What It Is

Money is one of the great human conceptions - some would say accepted delusions.  Anything could be money - from stones to gold to paper.  Money is a medium of exchange.  Money is a measure of value.  Money is a store of value.  In other words, if you are willing to trade with it, view it as a “price,” and believe it’s going to keep some worth - congratulations, it's money.

The concept of precious metals and paper money have been around for millennium. The type of centralized regulation of money we currently have is relatively new – really since the mid-19th century.  In fact, in the United States - today’s international currency standard - in the U.S. we accepted Spanish doubloons up until the Civil War.  The Federal Reserve notes you carry in your pocket are a function of a long overdue 1914 formation of an American central bank.  And the U.S. Dollar as the standard of world currency; only since 1946.

The rise of cryptocurrency is even more recent with earliest creations coming from forms of computer based “e-cash” going back to the early 1980’s. It was not created by a central bank, but by individuals who could “mine” on their computer servers securely encrypted string of data - a “hash”. People were willing to accept these unique “packets” as a currency – a medium of exchange, a measure of value, and a store of value.  A money.

It wasn’t until the Internet took off in the mid-1990’s and the power of individual computers increased that the concept of cryptocurrency came into more common use and that the currency began to expand.  With the creation of easy to create, easy to purchase, and easy to obtain Bitcoin in 2009, that’s when cryptocurrencies exploded.  

Transparency and Control and Beijing

Central banks have been uneasy about cryptocurrency since the early 10’s. Admittedly, while it is an easy, secure currency for international trade, it has been notorious in its use on the Dark Net for any number of nefarious purposes from illicit activities, to the drug trade, to terrorism.  However, for those of us who remember the late cocaine wars in the late 70’s, most of the paper dollars in Miami had residue of cocaine on them. And were sometimes found floating in bales off the coast. Some things do not change.

The question of value is also a sticky one and rightfully concerning.  Right now, the fluctuation of value is rather high - to put it politely - with speculation pushing value all over the place.  Still, once you step beyond the well-controlled Yuan, Euro, and Dollar, you will note that many less developed country currencies values are all over the place.  See what a Venezuelan Bolivar will get you some time. 

Even with these challenges, the large central banks are not rejecting the possibilities of cryptocurrency.  Many are, like the U.S. Federal Reserve, studying what it would take to set up a Crypto-Dollar.  And, as you might guess, China is moving very quickly to position an easy to use and easy to obtain “crypto-Yuan.” Beijing has made no bones about wanting to the Number One power by mid-century. It is using Economic Power to do just that.  And finding a way to take over as the reserve currency from the U.S. Dollar with a well-received crypto currency is one of many ways to do that.

The Wild Frontier Is Closing

So, here we go again.  Like the Internet today, the Cryptocurrency Wild Frontier is going to close likely in this decade; or at least be better and more heavily patrolled. Individual miners are not going away yet.  But, the world’s governments and central banks, concerned about transparency and control, are going to build their own “coin and wallets” and will surely regulate miner behavior. And there are enough new users - two trillion dollars and growing by some estimates - that the “settlers” will want and will get peace and stability in Cryptocurrency-land. 

Governments will give it to them.  In the 21st century, the concept of the state as protector of the people and national interest is not going away any time soon.

Ronald Marks is Term Visiting Professor, George Mason University, Schar School of Policy and Government. He is President of ZPN Cyber & National Security Strategies     

Image: Unsplash

You Might Also Read: 

Smart Artificial Intelligence:

 

« CYRIN - Where Education Comes to You
Western Nations Face A ‘moment of reckoning’ Over Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

TryHackMe

TryHackMe

TryHackMe is an online platform that teaches cyber security through short, gamified real-world labs. We have content for both complete beginners and seasoned hackers.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.