How Blockchain Technology Can Improve US Infrastructure

America’s infrastructure is often described as crumbling, broken-down, and out-of-date by politicians from both sides. While the reality isn’t so dire, there are obvious infrastructure issues throughout the country, such as New York’s subway, DC’s metro, and almost any road in Michigan.

So even though the country’s infrastructure is not as bad as some suggest, we should still be on the lookout for better ways to provide it. 

Help may come from an unlikely place: the blockchain technology underlying cryptocurrencies. The advent of the internet and broadband technology did the same thing for information and ideas. Continued economic growth means routinely reallocating resources to their highest-valued use as new opportunities arise, and this process is hindered when roads, bridges, airports, subways, and broadband are in poor shape.

While many complain that US infrastructure funding is inadequate, when adjusted for inflation, spending on transportation and water infrastructure has actually been fairly constant since 2000 after rising in the 1980s and 90s. Additionally, infrastructure spending by the federal government as a percentage of all federal spending was 2.5% in 2017, which is about what it was in the mid-1980s. 

It’s true that over the last 15 years a larger portion of spending has gone to operation and maintenance rather than capital outlays, but that’s not surprising in a mature economy like the United States. In general, there hasn’t been a big drop in inflation-adjusted infrastructure spending by government.

Another potential funding source is crowdfunding facilitated by blockchain technology.  Blockchain is essentially a publicly distributed ledger that keeps track of transactions and ownership of assets, which could be digital currencies, patents, or physical objects like rare art or buildings. 

Blockchain technology also allows ownership of physical assets to be broken up into small parts and makes it easy to keep track of all the owners. Blockchain technology has the potential to open up all sorts of investments to the average person.

For example, a new toll bridge could be funded completely or in part by individuals who then get a portion of the tolls commensurate with their investment. 

Today, these types of public-private partnerships, or PPPs, are not available to the average person. Highways, convention centers, stadiums, parking garages, rail projects, and other infrastructure with a potential revenue stream could be funded similarly.

Importantly, more local funders mean more people with a stake in the progress of the project, and this means more accountability for those in charge. Additionally, local governments and construction companies could use blockchain technology to keep track of materials, permits, and contracts. 

Andrew Lindsey, a market strategist for the Alpha Corporation, says that today it’s hard to know exactly who holds what and when on large infrastructure projects. He believes blockchain technology can fix this:

One of the easiest ways for a claim to come up is over who held what when and who handed what over when. When you have a very clear snapshot of all of that information, you can see what would happen to claims… Right now, it’s done off a spreadsheet that says "X is going to arrive here within this timeframe with this level of error." 

But if you have an immediate, encrypted, and immutable ledger of the flow of items, you can identify exactly what is going to be where, when and you can reflect that in schedules, cost estimates, and, more broadly, phase engineering."

Since the ledger would be available for all to see, the companies and officials responsible for the project wouldn’t be able to kick the blame for delays and cost-overruns back and forth while the public struggles to sort fact from fiction. Instead, those responsible for problems could be identified and held accountable.

Infrastructure is important for economic growth, but America’s process for funding and building it is subpar. Blockchain won’t solve all the problems, but it has the potential to make a big difference.

Forbes

You Might Also Read: 

The Fourth Industrial Revolution Built On Blockchain And AI:

« Europe’s Most Hackable Election
Financial Executives Are Out Of Touch With Cyber Threats »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.

Redcoat AI

Redcoat AI

Redcoat AI provide a comprehensive security platform that continuously evolves with the threats and opportunities presented by AI.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.

Keystrike

Keystrike

Keystrike secures remote connections. Our technology ensures that commands made by an employee were physically made on their computer, rather than by a remote attacker.