The Big Picture: The Virtual Via Drum


Reading time ( words)

 “And finally, in the years to come, most human exchange will be virtual rather than physical, consisting not of stuff but the stuff of which dreams are made. Our future business will be conducted in a world made more of verbs than nouns.” —John Perry Barlow, 1994

A key to the success of the Roman empire was its extended roadway system. Designed by planners called mensors, and executed by Roman legions, they were transnational, connecting the then-known world across culture and region. They are seen as an infrastructure of empire, expanding economy by trade, knowledge, and security, bringing prolific wealth and new ideas to every corner of Rome’s vast territory, and creating a superhighway for defense and conquest. As wonderful as they sound and as much good as they did for antiquity, they were not always safe. Knowing the amount of wealth they carried, the roads were frequented by bandits and criminals1. Jesus Christ of Nazareth expanded upon this in the Good Samaritan parable in the gospel of Luke. While a factitious story, the parable is based on a real fear faced by denizens of the ancient world.

Today’s internet is the modern version of the Via Publicae­­2. It’s an apt metaphor. The internet has changed the world for good in many ways, bringing a wealth of knowledge, opportunity, and equality to nearly every corner of the globe. Its value to the global economy, and in effect the end consumer, is priceless. If the internet were to crash, our way of life would be severely affected. However, where we tend to stop short in this metaphor is how our virtual assets are just as exposed and available for the taking as the physical assets were on the roads of the ancient world.

In the early 2000s, a gang of criminals unsuccessfully broke into the Millennium Dome in London’s South end. A division of Scotland Yard foiled their plans, preventing an estimated $700 million (in today’s currency) from being stolen3. Eighteen years later, halfway around the world, another heist took place. This time there were no car chases, men in hoods, or canvassing of the “target.” The thieves, instead, used a keyboard and mouse to walk away quite literally with over $530 million4. No authorities were aware of the impending attack.

As we reflect on the quasi-prophetic postulate by John Perry, a gut check comes to fruition. We realize that, while our natural understanding of the world is being shaped and reshaped by an intangible digital reality, the lens which colors our perspective still holds fast to safe-deposit boxes, dead bolts, and security cameras.

The world is slowly waking up to and realizing that the greatest store of value in the history of mankind is sitting in the open, as if on the road to Rome, with threat actors drooling at the prospect, and no sign of a Roman legion anywhere near to protect it. Every company, organization, and more than half the global population has their virtual worth caravanning across the digital highway, many of whom are oblivious to the criminals who await just around the bend.

As Roderick Jones5, a leading security expert and former detective with the Scotland Yard explains, there is no legal offensive capability for today’s virtual merchants. You can’t hack back, or rather, you shouldn’t. It’s illegal, and most definitely reckless. Practically speaking, the internet is still in the early days of conceptualization. We are in the Wild West, exploring a new frontier, the law and government catching up to innovation. We must rely entirely on our defensive posture, giving criminals second thought before attempting to raid our businesses, and battling off any attacker that comes after us. Just as important as physical security has been, so goes cyber security.

Take a moment to reflect on your digital caravan and who or what someone could do to take that. Would prospective thieves be staring at a helpless, defenseless walking dollar sign, or a robust, armored wagon with defensive weaponry? Have you put as much thought and resources into your cybersecurity as your physical security? If not, reach out to a cybersecurity professional and get some advice in setting up your digital defenses.

References

  1. Fayûm Towns and Their Papyri, B.P. Grenfell, A.S. Hunt and D.G. Hogarth, London, 1900 (Egypt Exploration Society, Graeco-Roman Memoirs 3), pp. 259-60.
  2. Internet: A Modern Roman Road System?” The Motley Fool, Dec. 21, 2016.
  3. “The Millienium Dome Diamond Heist,” The True Crime Edition, July 9, 2021.
  4. “$530 million cryptocurrency heist may be biggest ever,” CNN Business, Jan. 29, 2018.
  5. Rodrerick Jones, CNAS.org.

This column originally appeared in the July 2022 issue of SMT007 Magazine

Share




Suggested Items

Real Time with... IPC APEX EXPO 2022: AI and ML for Electronics Manufacturing

02/11/2022 | Real Time with...IPC APEX EXPO
Zac Elliott from Siemens Digital Industries Software talks about the advancements in AI and ML for electronics manufacturing with guest editor Steve Williams. If you were unable to attend IPC APEX EXPO 2022, don't worry. We're bringing you coverage of the week's events in San Diego, from ribbon cutting to teardown.

Technical Track Opportunities at IPC APEX EXPO 2022

12/14/2021 | I-Connect007 Editorial Team
Matt Kelly, IPC chief technologist, discusses the growth of the technical conference tracks in this year’s IPC APEX EXPO program, as well as market dynamics that are influencing the topics presented at this year’s event. "We are thrilled with the number of abstract submissions we have received. As of today, we have over 150 submissions, which may be the highest number we’ve ever received. It shows the appetite and the interest people have to present and share their knowledge."

Excerpt: The Printed Circuit Assembler’s Guide to… Smart Data, Chapter 2

04/21/2021 | Sagi Reuven and Zac Elliott, Siemens Digital Industries Software
Companies have been collecting data in large volumes. Highly varied data from manufacturing operations comes in quickly that needs to be validated, and its value prioritized so that it can be turned into something useful—transformed from big data to smart data. The amount of data available has grown exponentially into big data. Twenty years ago, a PCB work order resulted in 100 data records, megabytes of data; today, it is 10 billion records, terabytes of data. The investment in collecting this data and storing it is high. However, without a way to analyze the data, without analytics, it will not result in ROI.



Copyright © 2022 I-Connect007 | IPC Publishing Group Inc. All rights reserved.