We Can Reduce Cybercrime, But Why Are We Failing?

We always ignore the long-written terms and conditions and  check the sign on “I agree to…..:” Sadly our attitude towards cybersecurity is somehow the same.  
 
Maybe it’s our overconfidence that we aren’t beneficial to cyber criminals or lack of understanding, or capabilities to deal with rising cybercrime; whatever it is, the fact is - we are still failing in protecting our cyber world.
 
So, how about looking at what we now call cybercrime with a magnifying glass intending to combat or at least limit the malicious practices of those mal-practitioners.  Let’s begin how cybercrime evolved! 
 
The beginning of Cybercrime
 
Back in 1970-1995 Kevin Mitnick - the most notorious and groundbreaking hacker in the history of the internet, long before all the other script kiddies showed up on the scene.
 
Mitnick penetrated some of the high-profile networks of the world using social engineering schemes, tricked insiders into access codes and passwords; that was something we now call malware and it’s highly automated.
 
Walking in 1988, the Morris Worm showed up; what started as a small playful exercise launched from MIT, the worm spread faster than anticipated. It went so bad that Robert Morris became the first violator of the Computer Fraud & Abuse Act.
 
It was 2011, when things were shifted into high gear. The most-hyped - Stuxnet Worm, become the world’s first weaponized attack, targeted Iran’s nuclear program, and physically damage their enrichment centrifuges. This was not an act by a prankster, a lone hacker, or script kiddie, but was the work of a Nation State.
 
Another significant change we witnessed in 2011 was the emergence of social media in full swing; another platform for hackers to publicize their work. The LulzSec group hacked and tweeted about their victim’s, then hacked Sony’s PlayStation network in the event that compromised over 77 million users’ information. At that time, most operating systems and even the internet was not aware of strong security.
 
If you ask me the timeline of the internet in a few words, then I would suggest you listen to what Leonard Kleinrock - a professor of computer science at UCLA - said in an interview:
 
“There's a very dark side to the Internet, which we're all familiar with. It started with a worm in 1988, and it became spam in 1994, and now we have pornography, we have denial of service [attacks], we have identity theft, we have fraud, we have things like botnets pieces of software that cyber thieves use to remotely and secretly control your computer, which really worry me.”
 
Aren’t his words true? We all agree with what he said but still not acting accordingly. 
 
The current state of Cybercrime - The Internet become limitless, so does our control
 
So, we have this global network that was never intended to be secure, then suddenly back in 2000 the ‘dot com’ boom appeared on the screen, letting everyone reaching the surface of the internet. 
 
It was the same time when E-commerce comes into existence; we’ve started our medical records, educational records, military secrets, and banking credentials online.
 
Everything is now online: Did I mention that all of this was on a network that was never designed to be secure?
 
What if I ask:  Has our greed played any role in cybercrime problem? Does security exist in a quest to make as much money as possible? Is security too inconvenient for users?
 
Think in this manner: For the first time in history anyone can rob a bank in the US from Russia or anywhere in the world without leaving their cozy home or office; thanks to the Internet for connecting any computer with any other computer in the world.
 
Think about targets…
 
Cyber criminals can not only snoop on our baby monitors and home security systems but also compromise our bank accounts and much more. The most phenomenal data breaches include Target, the US Government’s OPM, Adobe, Sony, Home Depot, Yahoo, Equifax, eBay, Anthem, Marriott, and CapitalOne,  to name some more notable and newsworthy. Did I mention hospitals, where ransomware can shut down access to critical life-saving machines and systems? 
 
Interestingly, there are 4,383,810,342 users using the Internet of Things (IoT)  across 7 billion internet-connected devices and the total number of records breached since 2005 is 11,578,188,519.
 
Let me present you a quick overview of the increasing numbers of the current state of cyber warfare; thanks to Verizon:
 
When you hear about data breaches, you’ll lose count. It’s become so commoditized that when someone announce another data breach, it feels like saying there’s another accident of Interstate I-4 in Florida. 
 
In simple words, it’s become a routine, making us numb to it as violence on the evening news.
 
If we keep ignoring, we might be the next target, then we will be left with nothing but regrets; cure is desirable but prevention is better than cure. 
 
It’s the right time to face those unknown cheapsters and take control of our very-own cyber world in our hands; if we want our kids to be safe from future cyberwarfare.
 
The only solution: Let’s work together… like the cybercriminals do.
 
I can’t and won’t address to all nations, but for our home country - the USA. 
 
Though it sounds siloed, but steps had to be taken, because it’s not hurting the victims alone, but the entire economy. In Europe, privacy is a human right and sadly, it’s not even mentioned in our Constitution (you will only find in the 4th Amendment under illegal search and seizure).
 
Another issue to be addressed at our earliest regarding the secure of our data are is the unknown data brokers. 
 
We all know that data brokers have free reign in the US - as profits are more important to Congress than privacy. Our lobbyists often from the government and work for corporations, including data brokers who in return fund congressional elections. This gives them some power to manipulate our government and laws.
 
Recently I heard that the US Congress conducting a hearing on data brokers and its impact on credit insurance, financial data privacy, employment and housing; forget what Snowden or Assange say our government has on us. 
 
It’s time our government should move toward uniformity of laws; California and Massachusetts have their data privacy laws, while others have little to none, and the feds go another direction. This siloed approach guarantees that we will shortly come up.
 
We are glad that government pushed electronic medical records, but don’t you think it was another example of too much too fast; they themselves became victims - OPM data breach, in which everyone including the FBI director’s identity was compromised. 
 
Do you know, according to HIPAA Journal, there were 2,546 healthcare data breaches occurred between 2009-2018, resulting in the theft or exposure of 189,945,874 records.
 
In short, the same government that cannot secure its own security clearances was and is simultaneously pushing us to be online to get ready for the taking.
 
Let’s face it!
 
Microsoft keeps adding patches on their OS, too many people are spending too much time defending it and looking for ways to exploit it, but we are losing this battle.  We know where we’ve been, and where we are: sadly still in reactive mode with no comprehensive laws to address cyber security and privacy across our nation. 
 
Are we kicking the cybersecurity can appropriately?
 
Yes, we are, but with so little progress and pace; as our US Congress is too busy fighting itself, I wish this partisan politics vanish forever, otherwise cyber criminals who don’t work in silos will still continue to exploit our medical records, banks, military secrets and intellectual property/ies.
 
So, what exactly we should do?
 
● We need real world solutions to manage the growing risk, combining industry executives and experts.
● We need uniform laws and security frameworks for everyone to adopt.
● We need to bring all the states (those investing in cybersecurity and those who are not) to deal with the issue collectively.
● We have come up with regulations, that all the industries supposed to oblige to. 
● We need consistent and comprehensive mandatory security and privacy laws and respective compliance frameworks to meet them. 
● We should also need to work with the European Union and adopt GDPR
 
If constitution is unwilling to address data privacy, it should at least be a human right – especially in this digital age.
 
In the end, we must decide: are we serious about cybersecurity and privacy, or will we continue moving down the path of ignorance and survival in a global game of cybercrime that is active 24 x 7 to take everything from us?
 
We can do the right thing. Can’t we? 
 
Devin Smith writes on  cyber security and technology-related crime at ReviewsDR.         
 
You Might Also Read:
 
One Costly Minute Of Cybercrime:
 
 
« Do Criminals Dream Of Electric Sheep?
The Cyber Effect On Modern Warfare »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Original Software

Original Software

Original Software offers a test automation solution focused completely on the goal of effective software quality management.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Samurai Digital Consulting

Samurai Digital Consulting

Samurai Digital Security are a cyber and Information security services provider, specialising in penetration testing, incident response, user awareness and information governance solutions.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Anura

Anura

The world’s most accurate ad fraud solution protects your web assets by eliminating bots, malware and human fraud, ensuring your content is seen by real people.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.