Leading into the future.
Strategy International · Think Tank & Consulting ServicesStrategy International · Think Tank & Consulting ServicesStrategy International · Think Tank & Consulting Services
(+357) 96 886 872
CY-2042, Nicosia

Cybernetic Security World Market View


Cybernetic Security World Market View

The world we live at today, is dependent on technological agility. It will get more futuristic. Yet if uncontrolled and without rules or ethics, will get much more unstable and threatening.

Technology in the service of Humans:

Technology is and will always be fascinating for all. Technological developments over the centuries and years allowed humans to progress. Science was allowed to progress. Economies and countries have been established, wars were created and led to win or lose.
In the military world, network centric operations, today take place remotely. With or through un-maned planes with limited casualties as possible.

I, Robot
Homonymous film: “I, Robot 2004 (irobotmovie.com)”

Soon, robots or other forms of weaponized and technologically created elements will continue to operate, continue to minimize casualties, protect or defend; Artificial intelligence and genetics when combined will create the ultimate weapon soldier and at the same time it will create the perfect robot that will take the shape and help of a supporter to our society and family lives.
Mechanisms of technology have encircled us. Today, we distinguish it all over us. It is located in our every-day lives. Through this very same simple process of writing an article on a computer. Data information stations in the meantime have been created. Social media to facilitate our lives and connect people have been created. Security agencies have been created to serve and protect the citizen, the resident, the valued costumer. Where, in the meantime, we all leave one way or another our digital footprint.
In our every-day market business world, strategies and tactics operate; through a feasible plan of automated or modernized operations and management. We use technology: automation and computers; software and hardware. Both last elements have facilitated, our way we design, process, construct, create our future homes, cities, architecture, policies and banking or market systems or national infrastructure.
Technology and algorithms and equations have created finance and business among others, created along with technology our stock markets and facilitated exchanges of information good, logistics and information flow related with the global market worlds. Without it we cannot even travel, compete and even learn what is happening in the other side of the world.
Humans, have now the opportunity to limit themselves from working handcrafted work and work through a computer processor that processes, and creates and now prints our digital or analogic everyday needs. Humans, are limiting their analogic footprints in creation of our chain of food or living yet it now controls through various forms of computerized creation and automation how things run.
In the very end of 2018 and beyond, we see continued extra-ordinary elements being developed, growing without limitation.

Computers and the Internet:

Computers and the Internet are engineered to support our human daily lives. We find today usefulness of both computers and the internet from education to health among others.

we are witnessing the growth of diverge elements of technology that we are yet to now see converging between them

All of the above constitute elements of technology. Technology has always been there. To support Humans to develop, create and even destroy.
anticythere machineAn example. Automation is not a new phenomenon. Especially in factories. Artificial Intelligence is not a new phenomenon either. Maybe, today at the age of smart creativity, smart cities and smart living. But artificial intelligence in its prime element along with automation have been existing for a while. It is the convergence of technological agility tools and mechanisms that boosted, both attention of scientists and new innovators but also created a further wish to create more, to innovate more, to convert more, converge more science and scientific tools.

anticythere machine
(The Antikythera Mechanism -known as the first computer of ancient times)

In the level of technological agility, development and growth, the internet is no less of importance to all other tools of science or in support of science development. The internet, a creation to support mainly the connection, network between military sides, has been an invention, in which in today’s world is far far more complicated. An ‘algorithm of thoughts’, was the creation of the first computer. Seen for the first time in between the Island of Kythera and Rhodes[1]. Then re-appear in the 18th Century AC world history.
Years forward, in 2018, things have become more complicated. Technology, computers and the internet in specific have become much more complex than anticipated. As humans we are depended on technology, computers and the internet.
A philosophical reasoning says, that were there is good, there is also evil. If technology, computers and the internet have been created in the service of humankind, they can as equally be unwilling so, used by people who wish to harm others. As an article at the New York Times states, “It’s no secret that computers are insecure”[2].
When our digital footprint is everywhere, where our newly born children are even more and dependent on technology from school and education to utilization of cell phones and technology, then the more we risk them to be at a higher risk than previous generations that to this day we imagined to be already ‘networked’.
WebCreativity and innovation hold risks. Computers are now embedded with automation. Already physical data is online. Through our social media, through our digital operations (from shopping to banking to self-control of our house from remote areas, through simplified Wi-Fi cameras and automated cars to mention a few.
Soon, we are to see converged technology of cybernetics (computer and internet) with “computing” and already network cloud and more computing, yet along sided with artificial intelligence.

Insecurity and the Internet:

Security is an issue. It is a serious issue. It withholds traps and illegalities that need to be regulated and ethically controlled if not controlled for the sake of our security and identity. In a government related environment, security is a “must”. The more networked our national and personal infrastructure is the more insecure we must feel as agile and easy to lead our lives, pathways and companies or governments.
“There is a need to regulate security of technology, computers and the internet”. There is a need to regulate technology innovation. Private companies and regulatory private authorities do not allow us to regulate the internet, when we know that the internet’s operations can take place from a remote area away from national boundaries where there is a large operation that cannot be controlled is most of the time maybe “mirrored”.
International and National Law is not applicable at any step unless is deemed as a crime that needs to be regulated first by national authorities and authorities that are designated to play the role of cyber-police as Interpol or the United Nations hold, which are yet to define the cybernetic legal and operational environment. Similar attempts are been seen at the CCDCOE center in Tallinn Estonia post the 2007 Cyber-Security attack the literally put a stand-still on every-day life. A country committed to technological agility and excellence was put “on hold” from a sudden attack that show cased the flaws of the world as technology, computers and convergence to technology takes place.
Private companies are spending time and effort and money to create operational protection mechanisms, highly sold to the customer or governments to protect until the day another product is created, service is needed or the current product is “hacked”. Vulnerabilities some IT experts will say, will always and continuously be there. Penetration efforts will always be there and crime-leveled efforts will continued to take place. As where there is good there is bad.
Internet of ThingsWhat creates however such insecurities is clear: 1. Our digital footprint that is already all over. 2 Our private or personal information (from banking, to identities, passports copies, or anything related with photos, videos and so on), 3. Our effort to continue living in a much more “smart” environment, in smart cities, which on the one hand we need and we have to, as it facilitates our lives, while psychologically we feel happy for being part of a future environment. 4 Protection still misses the global regulatory authority the simplicity and the world legalization to state what constitutes, insecurity, threat and elements of threat, what or who is to be accused of and why and what will be the sentencing.
Hacking of systems, personal or private. Government or of private companies. As the article in the New York Times states, the chair reaction of hacking is a simple still assumption in the mind of the one that has never been hacked or traced.

As computers are changing so is the internet and its uses. Security becomes more complex. Risks are higher. Reaction time should also be faster.

A reminding case in the case of Snowden. A government policy tool, a mechanism of creation for the protection of the citizen, which became a tool against the citizen among others and raised long-lasting discussions and authority regulations on 1. What constitutes the internet and its uses 2. Who is morally and ethically hacked and when 3. What constitutes a crime, which is yet to be decided and defined by the United Nations 4. How much damage control can we do? 5. Can we utilize tools and mechanisms from a central government command level to protect and serve the citizen, the resident and if so the rest of the planet from insecurities and moral ethical tracing and hacking among others?
It is already defined by the US government that the next best fight that already takes place is through the internet and through the trace trackers that were found in apple, amazon and other large companies, apparently plotted by Chinese according to international news sources like Bloomberg or Washington post and others.
Many scientists and/or devoted to science or other related elements with technology testify, constantly the security issues, ethical and moral issue, challenges and threats, opportunities among others.
Cyber- DevelopmentIn a recent book that we published “Handbook on Cyber-Development, Cyber-Democracy and Cyber-Defense” Edited by Carayannis, Campbell and Efthymiopoulos, we trace down with 48 world-wide contributions converging market, economics, business, security, strategy, IT and other related elements about Cybernetics, the world of the internet and future opportunities. Through areas and landscapes, through personal and market leveled experience we attempted to seek out to show to the world that convergence is happening from academia to the market and development economy and we need to be ready as we also need to be protected with an apparent “Law of the Internet”.
According to the article from the New York Times, the Internet of Things Security law in the US provides a minimal acceptance policy that already is been seen to all of us in our private phones, where our current updates now requires us to have a minimum of 6 digits password. Accordingly the USA by the year 2020, will not be allowing apparently soft passwords for the simple reason that they can be easily hacked.
But to wonder, how many password codes does solely one person has in the year 2018? How much more will technology develop while we create or enact laws of protection? And when or where are we to discuss about the importance of cyber-security and cyber-defense at an age of globalized economies, market shared democracies and interdependence? These are some key and important issues that I currently explore, examine and discuss in my upcoming research publication on “Falken’s Maze on Cyber-Security” to be published by Springer in the first quarter of 2021.
On a personal note, to that date, I presume that the internet will be a great deal easier, to work our way in and around it, yet more insecure and unsafe. Technology will be even more developed and computers will be far more lighter and more strong through the convergence of artificial intelligence. As this is the future of things.
SurveillanceSimple proposals to keep in our track of our self-security efficiency:

  • We need a global regulatory authority
  • We need a policy that takes security not a current event but as a future event.
  • We need preventive measure of involvement
  • We need fear-factor creators
  • We need cyber-security minority reports to protect and serve.
  • We need well advised creativity lawyers that thing far-fetched and in the future
  • We need “architects” to lead on the way of technology as it develops, as computers become more agile, as technology is converging.
  • We need global commanding of allies centers, connected to regional (national centers of protection.

[1]An ancient mechanical analog computer. It was designed to calculate astronomical positions. It was discovered in the Antikythera wreck off the Greek island of Antikythera, between Kythera and Crete, and has been dated to about 150-100 BC. It is especially notable for being a technological artifact with no known predecessor or successor; other machines using technology of such complexity would not appear until the 18th century.
General Knowledge Information: The mechanism was housed in a wooden box approximately 340 x 180 x 90 mm in size and comprised 30 bronze gears (although more could have been lost). The largest gear, clearly visible in fragment A, was approximately 140 mm in diameter and probably had either 223 or 224 teeth. The mechanism’s remains were found as 82 separate fragments of which only seven contain any gears or significant inscriptions.
[2] “Internet Hacking is About to Get Much Worse”, by Bruce Schneiner, The New York Times [accessed on October 18th 2018].


All written content of this article on this site is the exclusive copyright property Strategy International (SI) Ltd and the author who has written It. No use can be made unless there is a written prior request and consent by the author and company. Requests can be made at [email protected]




All written content of this article on this site is the exclusive copyright and property of Strategy International (SI) Ltd and the author who has written to It.

To note, the opinions stated do not necessarily reflect the official policies of Strategy International.

No prior use in part or in its complete form, written, words, maps, charts or statistical, numerical information can be made, unless there is a written prior request and consent by the author and Strategy International and its legal representative.

All requests should be directed at [email protected]



Office address:

24 Minoos Street, Strovolos,
CY-2042 Nicosia


(+357) 96 886 872

Mail for information:

We look forward to discussing with your organization our joint collaboration.

Contact us via the details below, or enter your request.

    error: Content is protected !