essays
Reflections on Money
by Kianga Daverington
September 1, 2020
This essay, written by Kianga Daverington of Daverington PLLC , was originally published in January 2020. The piece as been condensed for clarity.
Money is not a physical object like a coin, a bar of gold or a dollar bill. Money is at its core, a technology. It is a human invention designed to solve a specific set of human problems. Consider money, perhaps, in a new way. Think of money as a system for capturing time.
Time is the one thing we each have that is absolutely finite. We are born, we die, and the dash in between is all the time we have.
Think of production. We can usually produce more of some good by adding people to a task (also known as “WORK”). But we are still constrained by time. Whatever we produce is still limited by the amount of humans that can be organized to go into that production. Each of us possesses a limited amount of time available to us individually, so we need to convince or coerce others to add their time to ours if we want to achieve more than we can alone.
Out of this imperative, nations are born.
The most important quality of any particular form of money is how well it preserves the value of time over time. Can you buy the same amount of stuff or more in the future than you can buy today? If yes, congratulations - your money is accumulating time for you and future generations while you relax on the beach. If it takes more and more of a unit of money to buy the same amount of time in the future, well then I’m sorry, but that unit of money is getting weaker and weaker. It’s losing value or said another way – it’s losing purchasing power. The longer you hold it, the less it buys.
In a way, by purchasing goods and services, you are purchasing time. Every product and every service requires time to make and time to deliver - your time and/or someone else’s. The price therefore reflects the collective value of all the time put in. Money is a way we exchange time and move it around from where it is valued less to where it is valued more.
This is where prosperity comes from. It comes out of how well a society, collectively and each person, spends its time. How much time is spent creating and making? How much time is spent consuming? If we make more than we consume, we have something left over called wealth. If we consume more than we make, we are left with debt. You can’t consume what you don’t have, unless someone extends credit. Where does this “credit” come from? Basically –it’s made up.
Too much credit or debt eventually collapses and everyone is mixed up in the collapse.
If we understand that a unit of money represents a unit of time, and we understand time is limited, then a unit in a system of money with unlimited supply cannot have any value. This is the problem we are facing today with the world’s money supply. The supply of money in the world is increasing exponentially as central banks create money by giving loans to national governments, which is where our money comes from.
Our entire world financial system is a powder keg of debt.
National currencies today are known as fiat money, a currency without intrinsic value that has been given its power to be used as money by a government that says it is money by regulation. Wikipedia says, “Fiat money does not have use value, and has value only because a government maintains its value, or because parties engaging in exchange agree on its value.” Well said, Wiki.
A government’s job of maintaining the value of its national money boils down to a confidence game. On what basis do the people who use that government’s money believe it has value?
What happens to the money and those who hold it when the foundation of that belief begins to crumble?
essays
The Next Battleground: Cyber Security in the Private Sector
by Robert Stasio
April 11, 2018
Imagine this scenario: an expansive tactical operation center with large screen displays about enemy position and disposition. Young men and women buzz about making decisions and using analytical techniques to discover threats. Suddenly, an analyst discovers critical intelligence about the adversary, this causes the center’s director to make a decision and move a reconnaissance asset. The enemy’s attack is blocked and the offensive capability is neutered. Could this be a description of a well-coordinated intelligence-led military operation? Perhaps, but this is actually a description of a modern cyber security center, something becoming more and more common in the private sector.
In the past several years cyber threats have become so dangerous that private sector companies have actually taken a “war-fighting” approach to combating the threat. There has been a realization that the best way to manage threat is to maintain a constant operational environment, much like the military fights and wins conflicts.
In order to understand why companies are making a shift from static security to more dynamic and military-like operations, we must first examine the changing cyber threat. Typically when experts discuss the breakdown of cyber threats, the 80/20 principle is brought up – meaning 80% of cyber actors are generally less sophisticated and the top 20% are so advanced that given enough time and resources they will break onto any network. Most companies have previously placed a vast amount of effort and resources on static security or “building a bigger firewall” - expanding the virtual moats and perimeter defenses that surround networks. Hackers in the top 20% will always follow the path of least resistance. A company can spend millions of dollars on perimeter security and be penetrated by a $300 laptop and one socially engineered phone call. Also, the vast amount of security architecture does little to detect an insider threat. In no other field is the asymmetric threat so profound.
Historically, the top 20% of actors were mainly the concern of the defense and intelligence community. Now, the emergence of commoditized malware kits has spread advanced techniques to a larger audience. For example, in 2006 the emergence of the “Web Attacker” exploit kit brought a packaged suite of tools that any user could operate.
In this new paradigm we understand three truths: you can’t prevent all attacks, your network will be compromised, and 100% security doesn’t exit. Most security practitioners understand that good hygiene and perimeter security will mitigate the bottom 80% of attackers.
What about the top 20% of attackers? How can we hope to mitigate their impact? This is the domain of the modern military-like approach. Most military environments focus on two functional pillars: operations and intelligence. Over the past decade or so there has been a surge in the creation of the Security Operation Center (SOC), a place where companies can have a real-time view of their cyber posture. This concept is very similar to the military’s Tactical Operation Center (TOC), where adversary and friendly movement are tracked in great detail. In a similar manner, cyber threats are tracked on dashboards, managed through sophisticated alerts, and precise actions can be taken to stop a threat as soon as it is noticed. Not surprisingly, many companies tend to recruit former military personnel to lead and operate an SOC due to their unique experience in such an environment.
The intelligence function of cyber operations has become one of the hottest trends in the industry today. In the military, intelligence functions are inherently predictive and seek to understand what the adversary will do before they do it. Some organizations materialize intelligence concepts by building threat intelligence programs, or perhaps threat hunting programs. A common thread across these practices is the concept of data analysis to make decisions; hence the field is sometimes known as Cyber Threat Analysis. The cyber threat analysis discipline blends aspects of intelligence analysis, information security and forensic science. Cyber analysts rely heavily on network traffic and system logs, but they must also consider external and human-generated sources of information. By using cyber threat analysis, one can detect infiltrations faster, regardless of their source. Pairing advanced platforms with a human is the most effective way to detect an infiltration.
Cyber analysts excel in finding unique patterns among massive datasets. Consider the four phases of a hacker’s attack: reconnaissance, scanning, exploitation and persistence. If an organization consolidates systems logs and network traffic, analysts can sift through the data at each phase. Analysts can link associated events among multiple sources and replay how an attack occurred. Tracing patterns over time, analysts can determine the signature of a scan and assign it to specific actors. This will help them predict when an attack will occur. Traffic from backdoor beaconing can be found quickly and blocked at the gateway. The source of data will be irrelevant; analysts can just as easily identify traffic from an insider threat as they can from Internet-based attacks.
Consider the operation center scenario described above, perhaps with a holistic intelligence analysis and information sharing approach an analyst would have been able to identify the initial pattern and prevent a second similar attack. One can see how intelligence must be tightly linked with operations to be effective. Overall security operations are divided temporally into tactical, operational, and strategic phases. In each phase of operation, analysts may produce data and intelligence, which inform decisions. There are a wide variety of use cases in cyber threat analysis enhances SOC operations.
Like many industries, cyber security moves in waves. There will be a surge of hype in a new technique and technology that organizations will implement over some years. Markets where first-adopters emerge are often the same, for example the financial sector tends to be a leader in implementing new technology. In the case of cyber security, the military and intelligence community has emerged as a leader. The main reason for this is that these secret communities have needed to protect their most sensitive information from advanced hackers for many years. This has forged a critical training pipeline of personnel to operate cyber centers against the onslaught of advanced malware.
The human analyst is the crucial component to the cyber analysis process, but they also require some tooling. Just as there has been a movement of people from government to private sector in the cyber profession, there has also been an influx of the same intelligence platforms. In order to maximize an analyst’s capability and multiply their work capacity, a mature security organization must use a data analysis tool to enrich, produce, visualize, and analyze information. Private companies have started to incorporate link analysis and data analytics tools once only seen in intelligence agencies. It turns out that when the people started transitioning roles they needed the same tooling to do their work.
In order to attack the full cyber threat spectrum an organization must embrace both information security and the natural evolution of cyber analysis. Information security creates a foundation of security with a framework and builds upon that with some specialization and technology. Eventually, the security process evolves into cyber analysis with long-term research and ecosystem visibility concerning malicious actors. Many private organizations are creating this approach by studying the techniques of military and intelligence organizations.