Do Criminals Dream Of Electric Sheep?

A whole range of electronic cyber technologies are predicted to assist criminals and make them extremely dangerous to the public and now law enforcement must act says a new Report.

Published by Europol, the Do criminals dream of electric sheep: how technology shapes the future of crime and law enforcement Report, reviews the new techno problems that could increase cyber-crime. The title of the Report refers to sci-fi writer Philip K Dick. 

‘The profound impact of technological change on law enforcement has been highlighted repeatedly over the last decades. However, the pace and scale of technological innovation confronting law enforcement authorities in the EU and beyond is now becoming increasingly apparent. 

‘The opportunities for law enforcement in harnessing these technologies are as great as the challenges and their potential utility to criminal actors. Law enforcement authorities must employ foresight and embrace organisational change challenging established business models in order to access the potential held by these technologies’. 

The Report goes on to say that these technologies will provide hackers with new attack vectors for conducting malicious activity, such as high speed phishing attacks by using AI to tailor malicious emails and responses, as well as deploying AI to determine the best targets.

It's also suggested that law enforcement itself could take advantage of some of the emerging technologies to help in the fight against cybercrime. For example, AI is detailed as a technology that could benefit law enforcement by helping to improve the security of systems and devices.

Quantum computing is also identified as a potential risk to the cybersecurity of European citizens. While experts say that quantum computing can help boost the security of systems, Europol warns that there's the potential that the technology could fall into the wrong hands, and these individuals could exploit the power to crack the encryption of machines using the current standard.

"Malicious actors in possession of a quantum computer would have the opportunity to break traditional security standards, orchestrate far more sophisticated cyberattacks, or decrypt information and communications," the Report warns.

There are also concerns around 5G mobiles, due to the challenges it could provide for law enforcement. The report argues that 5G technology will "complicate the use of the unique mobile phone card identifiers that allow law enforcement to identify and locate devices", making it more difficult to carry out legally permissible technical investigation and surveillance measures of suspected criminals. 

This would mean "one of the most important tactical operational and investigation tools would therefore become obsolete", providing a potential boon for criminals who want to hide.

"The potential challenges for law enforcement as a result of developments within the area of 5G do not appear to be a priority for developers," the paper adds.
The rise of the Internet of Things has already caused security issues, but there's a fear that as more and more IoT devices enter homes and workplaces, the insecurity in them could prove extremely lucrative for them.

"The vulnerability of IoT devices may be exploited by criminals seeking to collect personal data, compromise user credentials or even spy on people or organisations," warns the Report.

Europol has already made efforts to boost security in the Internet of Things, but does understand more work needs to be done. ‘Law enforcement authorities need to invest in understanding AI technology and its implications to properly detect and contain these emerging threats. Law enforcement should equally explore the opportunities that AI presents for actively countering these threats.

This is particularly relevant in the area of cybersecurity where AI can help make defences more effective and scalable,’ says the Report. 

The report isn't all doom and gloom, as it points out how ever-advancing technology can also help benefit law enforcement, with AI and machine learning able to play a prominent role in the fight against crime and terrorism.

ZDNet

You Might Also Read: 

Five Hi -Tech Ways To Fight Off Cyber Attackers:

Cyber Criminals Have Created An Invisible Internet:

 

 

 

 

« Four Questions To Ask After An Attack
We Can Reduce Cybercrime, But Why Are We Failing? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ISACA

ISACA

ISACA is a global professional association and learning organization for members who work in information security, governance, assurance, rissk and privacy.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

securitycurrent

securitycurrent

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

National Cybersecurity Competence Centre (NC3)

National Cybersecurity Competence Centre (NC3)

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

Integris

Integris

Integris offers best-in-class services like dedicated vCIOs, specialized security and compliance advisory services, a 24/7 help desk, and more.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.