Centralization of IT infrastructure and the Internet, in a cashless society

First we read in Feb 2021 that C2PA will track all new online content back to its origin, as reported by Snowden and Breitbart.

More centralization is on its way, it seems, if Big Tech and Pentagon follow recommendations in an article published by Foreign Affairs (April 16, 2021):

The SolarWinds Hack Is Just the Beginning

“Broadly speaking, the United States has three major overlapping strategies for securing U.S. computer networks from foreign spying: defense, deterrence, and disruption. The first has always been difficult to achieve. … Defenders of even the most secure networks must therefore assume that intruders will sometimes break in.”

” … the second cybersecurity strategy, deterrence, holds a special allure … But there is little public evidence that these measures deter the ever-increasing and ever-expanding foreign hacking efforts that steal American secrets.”

“Disruption, the third cybersecurity strategy, has been the United States’ answer to increased aggression. … “We learned that we cannot afford to wait for cyberattacks to affect our military networks. We learned that defending our military networks requires executing operations outside our military networks.””

“In other words, the United States has sought to counter cyber-espionage by actively interfering in competitors’ operations, degrading their hacking infrastructure and limiting their ability to execute attacks. … this strategy helped protect the U.S. elections in 2018 and 2020 and has stopped a range of other malicious hacking activities. However, it is too early to say how well the strategy works overall.”

“Notably, all three strategies failed to stop the SolarWinds and Microsoft Exchange breaches. …”

“… the United States should upgrade both public- and private-sector cyberdefenses, in particular by increasing centralization of IT infrastructure, [my emphasis] … United States might also consider interfering in the systems that authoritarian countries use to surveil their own populations …”

” … Even some of the United States’ most powerful and most secret hacking tools have ended up online as a result of a 2016 breach, known as the Shadow Brokers case, that remains shrouded in mystery. Foreign governments and criminals have since repurposed them. …”

” … sooner or later—and probably sooner—the familiar story will play out once again: foreign intruders will compromise important U.S. computer networks, exposing government and corporate secrets and prompting an investigation. Calls for a response will follow, despite the lack of good options, … And so the drumbeat of cyber-espionage will continue, beating ever faster as it does.”

There is in theory an alternative to AI-based military defense systems, as described here, but AI drones have already been deployed in war now, making it very unlikely that the military-industrial complex will ever explore non-AI alternatives, so that’s why a paradigm shift has occurred on drone-surveillance.info. Because it’s no point being opposed to libertine woke Big Tech if only Boston, Silicon Valley and Seattle/Bellevue can build effective AI-based military defense systems that are the only option left when people don’t support non-AI alternatives.

But dangers caused by 4IR (fourth industrial revolution) tech are undeniable. Nothing can stop it however (except a major intercontinental war or hyper-terrorism which is not ethically justified). So the good news is that increased centralization of the Internet will at least make it more difficult for online criminals to operate. I support that 100 %.

Digital currencies in a cashless society will also reduce crime even if the Western online economic system is not as directly centralized as the system in China. It appears like we are really headed toward societies without cash in the West, as seen in this video (08:55):

U.S. Dollar Is Not Collapsing, It’s China That’s Actually Losing: Bloomberg Intelligence

“Liberty” in a cashless society will always be on a leash, but nobody is stopping it, at the moment of writing. So instead of whining about it: I like the idea that relatively few will dare to use money in a way that exploits others when knowing that every transaction can be traced back to them.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s