Do Criminals Dream Of Electric Sheep?

A whole range of electronic cyber technologies are predicted to assist criminals and make them extremely dangerous to the public and now law enforcement must act says a new Report.

Published by Europol, the Do criminals dream of electric sheep: how technology shapes the future of crime and law enforcement Report, reviews the new techno problems that could increase cyber-crime. The title of the Report refers to sci-fi writer Philip K Dick. 

‘The profound impact of technological change on law enforcement has been highlighted repeatedly over the last decades. However, the pace and scale of technological innovation confronting law enforcement authorities in the EU and beyond is now becoming increasingly apparent. 

‘The opportunities for law enforcement in harnessing these technologies are as great as the challenges and their potential utility to criminal actors. Law enforcement authorities must employ foresight and embrace organisational change challenging established business models in order to access the potential held by these technologies’. 

The Report goes on to say that these technologies will provide hackers with new attack vectors for conducting malicious activity, such as high speed phishing attacks by using AI to tailor malicious emails and responses, as well as deploying AI to determine the best targets.

It's also suggested that law enforcement itself could take advantage of some of the emerging technologies to help in the fight against cybercrime. For example, AI is detailed as a technology that could benefit law enforcement by helping to improve the security of systems and devices.

Quantum computing is also identified as a potential risk to the cybersecurity of European citizens. While experts say that quantum computing can help boost the security of systems, Europol warns that there's the potential that the technology could fall into the wrong hands, and these individuals could exploit the power to crack the encryption of machines using the current standard.

"Malicious actors in possession of a quantum computer would have the opportunity to break traditional security standards, orchestrate far more sophisticated cyberattacks, or decrypt information and communications," the Report warns.

There are also concerns around 5G mobiles, due to the challenges it could provide for law enforcement. The report argues that 5G technology will "complicate the use of the unique mobile phone card identifiers that allow law enforcement to identify and locate devices", making it more difficult to carry out legally permissible technical investigation and surveillance measures of suspected criminals. 

This would mean "one of the most important tactical operational and investigation tools would therefore become obsolete", providing a potential boon for criminals who want to hide.

"The potential challenges for law enforcement as a result of developments within the area of 5G do not appear to be a priority for developers," the paper adds.
The rise of the Internet of Things has already caused security issues, but there's a fear that as more and more IoT devices enter homes and workplaces, the insecurity in them could prove extremely lucrative for them.

"The vulnerability of IoT devices may be exploited by criminals seeking to collect personal data, compromise user credentials or even spy on people or organisations," warns the Report.

Europol has already made efforts to boost security in the Internet of Things, but does understand more work needs to be done. ‘Law enforcement authorities need to invest in understanding AI technology and its implications to properly detect and contain these emerging threats. Law enforcement should equally explore the opportunities that AI presents for actively countering these threats.

This is particularly relevant in the area of cybersecurity where AI can help make defences more effective and scalable,’ says the Report. 

The report isn't all doom and gloom, as it points out how ever-advancing technology can also help benefit law enforcement, with AI and machine learning able to play a prominent role in the fight against crime and terrorism.

ZDNet

You Might Also Read: 

Five Hi -Tech Ways To Fight Off Cyber Attackers:

Cyber Criminals Have Created An Invisible Internet:

 

 

 

 

« Four Questions To Ask After An Attack
We Can Reduce Cybercrime, But Why Are We Failing? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ClearDATA

ClearDATA

The ClearDATA Managed Cloud protects sensitive healthcare data using purpose-built DevOps automation, compliance and security safeguards, and healthcare expertise.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

PizzlySoft

PizzlySoft

PizzlySoft is a global company that is seeking convergence of network and security / software and hardware. We put our value on creating the best security.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.