Crime has gone High-Tech and the Law Hasn’t

LandingPageBook.jpg
 

When most people hear the word “criminal,” they probably picture some dim-witted thug. But a security expert, Marc Goodman, has been fighting crime for more than 20 years and he’s learned the hard way that crime is increasingly going high-tech, leaving law enforcement struggling to keep up. He outlines the challenges in his new book Future Crimes: Everything is Connected, Everyone is Vulnerable, and What We Can Do About It
“The fact that narcos in Mexico are going to colleges of aeronautical engineering to hire drone engineers would be a surprise to people,” Goodman says in Episode 142 of the Geek’s Guide to the Galaxy podcast. “Everything from AI to synthetic biology to robotics to big data to the Internet of Things, crooks and terrorists, rogue governments and corporations are all over it.”         
But perhaps the most striking fact about crime today is who, or rather what, is committing it. “It’s not people that are committing the crime anymore,” says Goodman. “Crime has become software. It’s Crimeware.”
Examples include ransomware (viruses that encrypt your data and make you pay to get it back) and botnets (zombie networks of thousands of infected machines that can be turned against banks, tech companies, and governments). The days when only master hackers were committing computer crimes are long gone. These days every creepy stalker, disgruntled employee, or aspiring terrorist can purchase pre-programmed Crimeware to help them hack your phone, your bank account, or even your car.
The exponentially expanding threat means locking up individual criminals is no longer a realistic solution. Another approach is to crowd source law enforcement. Organized crime is already adept at crowdsourcing, using criminal networks to rob thousands of ATMs at once. 
All physical objects in our space are de-materializing and are being transformed into information technology. If you look at a 1965 Chevy, or a Mustang, those were mechanical cars, but the cars today, any car that’s rolled off the assembly line in the past few years, has well over 200 microchips in it. They control the radio, the GPS, the airbags, the cruise control, the speedometer, it’s all controlled by computer. A modern car is a computer that we ride in, an elevator is a computer that we ride in, an airplane is a Solaris box that we fly in. All of these devices are hackable.
Wired http://wrd.cm/1FPUhSG

 

« China Reveals Its Cyberwar Secrets
Bitcoin 'exit scam': Deep-Webbers disappear with $12m »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

Truepic

Truepic

Truepic provides technologies that prevent fraud, identity theft, misinformation, and disinformation caused by generative, manipulated, or deepfake digital content.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Cipher

Cipher

Founded in 2000, Cipher is a global cybersecurity company that delivers a wide range of Managed Security Services.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.

Rakuten Maritime

Rakuten Maritime

Rakuten Maritime is your trusted partner in maritime cybersecurity, offering comprehensive and proactive solutions tailored to every stage of a ship’s life cycle.