Crime has gone High-Tech and the Law Hasn’t

LandingPageBook.jpg
 

When most people hear the word “criminal,” they probably picture some dim-witted thug. But a security expert, Marc Goodman, has been fighting crime for more than 20 years and he’s learned the hard way that crime is increasingly going high-tech, leaving law enforcement struggling to keep up. He outlines the challenges in his new book Future Crimes: Everything is Connected, Everyone is Vulnerable, and What We Can Do About It
“The fact that narcos in Mexico are going to colleges of aeronautical engineering to hire drone engineers would be a surprise to people,” Goodman says in Episode 142 of the Geek’s Guide to the Galaxy podcast. “Everything from AI to synthetic biology to robotics to big data to the Internet of Things, crooks and terrorists, rogue governments and corporations are all over it.”         
But perhaps the most striking fact about crime today is who, or rather what, is committing it. “It’s not people that are committing the crime anymore,” says Goodman. “Crime has become software. It’s Crimeware.”
Examples include ransomware (viruses that encrypt your data and make you pay to get it back) and botnets (zombie networks of thousands of infected machines that can be turned against banks, tech companies, and governments). The days when only master hackers were committing computer crimes are long gone. These days every creepy stalker, disgruntled employee, or aspiring terrorist can purchase pre-programmed Crimeware to help them hack your phone, your bank account, or even your car.
The exponentially expanding threat means locking up individual criminals is no longer a realistic solution. Another approach is to crowd source law enforcement. Organized crime is already adept at crowdsourcing, using criminal networks to rob thousands of ATMs at once. 
All physical objects in our space are de-materializing and are being transformed into information technology. If you look at a 1965 Chevy, or a Mustang, those were mechanical cars, but the cars today, any car that’s rolled off the assembly line in the past few years, has well over 200 microchips in it. They control the radio, the GPS, the airbags, the cruise control, the speedometer, it’s all controlled by computer. A modern car is a computer that we ride in, an elevator is a computer that we ride in, an airplane is a Solaris box that we fly in. All of these devices are hackable.
Wired http://wrd.cm/1FPUhSG

 

« China Reveals Its Cyberwar Secrets
Bitcoin 'exit scam': Deep-Webbers disappear with $12m »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Seclab

Seclab

Seclab is an innovative player in the protection of industrial systems and critical infrastructure against sophisticated cyber attacks.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

IT Jobs Watch

IT Jobs Watch

IT Jobs Watch provides a concise and accurate map of the prevailing IT job market conditions in the UK.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Real Protect

Real Protect

Real Protect is a Brazilian provider of managed security (MSS) and cyber defense services.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

PROVINTELL Cyber Security

PROVINTELL Cyber Security

PROVINTELL is a Managed Security Service Provider (MSSP) specialising in Next-Gen Cyber Defense and Response to detect and respond to threats.

Roberts & Obradovic Law

Roberts & Obradovic Law

Roberts & Obradovic Law Group is a corporate, privacy, employment and litigation law firm.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.