Crime has gone High-Tech and the Law Hasn’t

LandingPageBook.jpg
 

When most people hear the word “criminal,” they probably picture some dim-witted thug. But a security expert, Marc Goodman, has been fighting crime for more than 20 years and he’s learned the hard way that crime is increasingly going high-tech, leaving law enforcement struggling to keep up. He outlines the challenges in his new book Future Crimes: Everything is Connected, Everyone is Vulnerable, and What We Can Do About It
“The fact that narcos in Mexico are going to colleges of aeronautical engineering to hire drone engineers would be a surprise to people,” Goodman says in Episode 142 of the Geek’s Guide to the Galaxy podcast. “Everything from AI to synthetic biology to robotics to big data to the Internet of Things, crooks and terrorists, rogue governments and corporations are all over it.”         
But perhaps the most striking fact about crime today is who, or rather what, is committing it. “It’s not people that are committing the crime anymore,” says Goodman. “Crime has become software. It’s Crimeware.”
Examples include ransomware (viruses that encrypt your data and make you pay to get it back) and botnets (zombie networks of thousands of infected machines that can be turned against banks, tech companies, and governments). The days when only master hackers were committing computer crimes are long gone. These days every creepy stalker, disgruntled employee, or aspiring terrorist can purchase pre-programmed Crimeware to help them hack your phone, your bank account, or even your car.
The exponentially expanding threat means locking up individual criminals is no longer a realistic solution. Another approach is to crowd source law enforcement. Organized crime is already adept at crowdsourcing, using criminal networks to rob thousands of ATMs at once. 
All physical objects in our space are de-materializing and are being transformed into information technology. If you look at a 1965 Chevy, or a Mustang, those were mechanical cars, but the cars today, any car that’s rolled off the assembly line in the past few years, has well over 200 microchips in it. They control the radio, the GPS, the airbags, the cruise control, the speedometer, it’s all controlled by computer. A modern car is a computer that we ride in, an elevator is a computer that we ride in, an airplane is a Solaris box that we fly in. All of these devices are hackable.
Wired http://wrd.cm/1FPUhSG

 

« China Reveals Its Cyberwar Secrets
Bitcoin 'exit scam': Deep-Webbers disappear with $12m »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Webroot

Webroot

Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe.

TraceSecurity

TraceSecurity

TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT governance, risk and compliance (GRC) management solutions.

HackCon Norway

HackCon Norway

HackCon is for the people who are interested in technology, psychology, IT and security, and who wants to improve their knowledge within these areas.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Kasm Technologies

Kasm Technologies

Kasm Browser Isolation - Protect your organization from malware, ransomware and phishing by using zero-trust containerized browsers.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.