Crime has gone High-Tech and the Law Hasn’t

LandingPageBook.jpg
 

When most people hear the word “criminal,” they probably picture some dim-witted thug. But a security expert, Marc Goodman, has been fighting crime for more than 20 years and he’s learned the hard way that crime is increasingly going high-tech, leaving law enforcement struggling to keep up. He outlines the challenges in his new book Future Crimes: Everything is Connected, Everyone is Vulnerable, and What We Can Do About It
“The fact that narcos in Mexico are going to colleges of aeronautical engineering to hire drone engineers would be a surprise to people,” Goodman says in Episode 142 of the Geek’s Guide to the Galaxy podcast. “Everything from AI to synthetic biology to robotics to big data to the Internet of Things, crooks and terrorists, rogue governments and corporations are all over it.”         
But perhaps the most striking fact about crime today is who, or rather what, is committing it. “It’s not people that are committing the crime anymore,” says Goodman. “Crime has become software. It’s Crimeware.”
Examples include ransomware (viruses that encrypt your data and make you pay to get it back) and botnets (zombie networks of thousands of infected machines that can be turned against banks, tech companies, and governments). The days when only master hackers were committing computer crimes are long gone. These days every creepy stalker, disgruntled employee, or aspiring terrorist can purchase pre-programmed Crimeware to help them hack your phone, your bank account, or even your car.
The exponentially expanding threat means locking up individual criminals is no longer a realistic solution. Another approach is to crowd source law enforcement. Organized crime is already adept at crowdsourcing, using criminal networks to rob thousands of ATMs at once. 
All physical objects in our space are de-materializing and are being transformed into information technology. If you look at a 1965 Chevy, or a Mustang, those were mechanical cars, but the cars today, any car that’s rolled off the assembly line in the past few years, has well over 200 microchips in it. They control the radio, the GPS, the airbags, the cruise control, the speedometer, it’s all controlled by computer. A modern car is a computer that we ride in, an elevator is a computer that we ride in, an airplane is a Solaris box that we fly in. All of these devices are hackable.
Wired http://wrd.cm/1FPUhSG

 

« China Reveals Its Cyberwar Secrets
Bitcoin 'exit scam': Deep-Webbers disappear with $12m »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

Acunetix

Acunetix

Acunetix is a leading web vulnerability scanner, widely acclaimed to include the most advanced SQL injection and XSS black box scanning technology.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

CyCraft Technology Corp

CyCraft Technology Corp

CyCraft is an AI company that forges the future of cybersecurity resilience through autonomous systems and human-AI collaboration.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.