Seamless Technology Is a Gift for Cybercriminals

303f9ce5-d4bf-4b62-bd74-191ee983b24a-2060x1236.jpeg?w=620&q=85&auto=format&sharp=10&s=f435f273ebadc2b8d3f4fa2bbb64b8bc

Have we  subjugated our brains through apps, notifications and seamless services?.

At the recent World Future Society annual conference in San Francisco, friction-free was a phrase that cropped up in nearly every speech. Gina Bianchini, one of the founders of Mightybell, spoke of how “the removal of friction will have major impact on how we interact and engage with others”. Alex Wright, director of research at Etsy, talked of their ambition to “reduce the friction between the product and the people”. But it was Marc Goodman’s talk that really got me thinking about whether friction is getting a bad rap. Perhaps friction is our friend.

Goodman was futurist to the FBI. His New York Times bestseller Future Crimes is a no holds barred attempt to address some of the negatives around everyday technology. Namely the amount of cybercrime that is already being committed, and of which we seem totally unaware, despite the recent Juniper estimation that it will cost businesses more than $2tn by 2019.
His presentation consisting of a tour into the dark web was, well, illuminating. Google only gives us access to about 16% of the web and he opened up the audience’s eyes to what else is actually going on. There are at least 100 assassination companies, there are illicit drug companies, and a search engine called Grams. One might even suggest that there is some pretty decent marketing going on, with one assassination company’s well-crafted strapline: “Permanent solutions to life’s temporary problems.”
The automation of crime
It used to be the case that humans were the limiting factor in crime but now that crime comes in the form of software, it can go out and commit offences on its own. The more automated and connected our world gets, the more automated and connected crime gets. Goodman suggests we start to think of the car not as a vehicle but as “a computer that we ride in”. He also suggests that what is connectable is also hackable: that means your boardroom, your car, your TV, even your dishwasher. He explains how a computer expert on a flight hacked into the flight management system, took over the controls and flew the plane sideways. He poses questions like: should we give guns to robots, and what happens when someone straps a MI6 rifle to a drone?
I interviewed Goodman after his presentation and asked him: if brands are about trust, which are proving themselves trustworthy enough to protect their consumers from cybercrime? “There hasn’t been that differentiation in the market, yet,” he said. “But there is a major opportunity for a brand to own this space.”
The truth is wherever you have agreed to terms of service you’ve given away rights to your data. And as consumers we seem OK with that. He uses Target, whose database was hacked in 2013, affecting up to 70 million of their customers, as a case in point, saying: “Look what happened to Target. Their sales went down, their competitors’ sales went up, they fired the CEO and the CIO, but a year later, Target’s back.”
I asked Goodman whether he thought this was a generational challenge: “What I find is that for younger people, they tend to be expert users of technology but they have no curiosity as to how it works. The first generation on the internet who had to use Gopher and Telnet and all these protocols had some understanding of how it works. Now everything is a lovely user interface and you think: ‘Cool, Snapchat deletes my naked photo after a minute, I guess I can take naked selfies’. Now that’s not quite how the technology works and that’s not exactly what the company guarantees in their terms of service. So younger generations are expert users but they are really easy to manipulate. They have a belief in screens that earlier generations don’t have.”
And who can blame them? It’s a generation that doesn’t want to think. In thrall to tech entrepreneurship, it’s a generation that’s been told time and again that it isn’t about thinking, it’s all about doing: it’s the cult of done. Thinking is a waste of time, when you can be doing, and doing more, more often.
Goodman told me the story of his visit to McDonald’s: “I was at McDonald’s a few years ago and I bought a burger, some French fries and a Coke and the girl behind the counter said to me that will be $842. I said I’m sorry and she said that will be $842. So she literally had subjugated her own brain to a cash register.”
But haven’t we all subjugated our brains through apps, notifications, and seamless services? Without friction there is no delay, there is no pause, no moment to question what we are doing or why we are doing it.
The answer lies in design
The question becomes: at what point in the future does frictionless render us thoughtless? If we are now content to act on instinct, to be led down any kind of rabbit hole by the seamless technology we use and don’t seem to have the appetite to understand what we can’t see, have we become more trusting of the invisible than is good for us?
Goodman thinks the answer lies in design. He tells me: “I think there is a tremendous opportunity for designers in this space to bring good design, good user interface, good user experience to these tools, and I predict that the next billion-dollar cyber security company is going to be built on design. Someone puts a gun in your face and takes your purse you know you’ve been robbed. There’s no warning systems with cyber so you can be infected and you can be a victim of identity theft and you don’t know until it’s way too late. And I think design can help solve that problem and make some of these risks more obvious so that people can deal with them.”

So let’s start by redesigning our language. I’m not happy being described as a “user”, because in that sense I become totally passive to the technology, to the invisibility of it and to the level of friction it decides to serve me. 

One conclusion is that we should all start to think of ourselves as ‘choosers’ not ‘users’ so that when we interact with a connected product or service, we are actively thinking about choosing to value security of our data over the convenience of the app – or not. In that way, perhaps we will bring a little friction back to our everyday thinking processes and therefore our actions.

Guardian:  http://bit.ly/1JeClmY

MarcGoodman is author of Future Crimes: http://www.marcgoodman.net
 

 

« Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle
Darkhotel Deploys Zero-Day From Hacking Team »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

Appsec Phoenix

Appsec Phoenix

Appsec Phoenix is an end to end vulnerability management platform that focuses on workflows, threat feed, and real time data.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

Effectiv

Effectiv

Effectiv is a real-time fraud & risk management platform for Financial Institutions and Fintechs.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.