The blue light of the screen is a cold, clinical kind of torture at 3:17 AM. It cuts through the dark of the bedroom, reflecting off the glass of water I haven’t touched and the corner of the mahogany dresser I just slammed my left foot into. My toe is currently throbbing with a rhythmic, vengeful heat that makes it impossible to ignore the physical world, which is ironic, because I’m currently staring at a digital representation of a physical failure. The security feed is grainy, a low-resolution nightmare where shadows look like intruders and the wind-blown plastic wrap on a pallet of copper tubing looks like a ghost. I’m refreshing the app every 47 seconds, waiting for the frame to clear, waiting to see if that smudge near the equipment pile is a person or just a trick of the $47 camera I insisted was ‘good enough’ for the back lot.
We live in a strange era where we have successfully convinced ourselves that the most dangerous thieves wear hoodies and sit in darkened rooms in Eastern Europe, typing code to bypass our 17-layer encryption protocols. We spend $777,000 on cybersecurity audits and firewall upgrades, worrying about the integrity of our databases while the actual, tangible assets-the generators, the heavy machinery, the raw materials-sit behind a chain-link fence that a determined teenager could defeat with a
