We Can Reduce Cybercrime, But Why Are We Failing?

We always ignore the long-written terms and conditions and  check the sign on “I agree to…..:” Sadly our attitude towards cybersecurity is somehow the same.  
 
Maybe it’s our overconfidence that we aren’t beneficial to cyber criminals or lack of understanding, or capabilities to deal with rising cybercrime; whatever it is, the fact is - we are still failing in protecting our cyber world.
 
So, how about looking at what we now call cybercrime with a magnifying glass intending to combat or at least limit the malicious practices of those mal-practitioners.  Let’s begin how cybercrime evolved! 
 
The beginning of Cybercrime
 
Back in 1970-1995 Kevin Mitnick - the most notorious and groundbreaking hacker in the history of the internet, long before all the other script kiddies showed up on the scene.
 
Mitnick penetrated some of the high-profile networks of the world using social engineering schemes, tricked insiders into access codes and passwords; that was something we now call malware and it’s highly automated.
 
Walking in 1988, the Morris Worm showed up; what started as a small playful exercise launched from MIT, the worm spread faster than anticipated. It went so bad that Robert Morris became the first violator of the Computer Fraud & Abuse Act.
 
It was 2011, when things were shifted into high gear. The most-hyped - Stuxnet Worm, become the world’s first weaponized attack, targeted Iran’s nuclear program, and physically damage their enrichment centrifuges. This was not an act by a prankster, a lone hacker, or script kiddie, but was the work of a Nation State.
 
Another significant change we witnessed in 2011 was the emergence of social media in full swing; another platform for hackers to publicize their work. The LulzSec group hacked and tweeted about their victim’s, then hacked Sony’s PlayStation network in the event that compromised over 77 million users’ information. At that time, most operating systems and even the internet was not aware of strong security.
 
If you ask me the timeline of the internet in a few words, then I would suggest you listen to what Leonard Kleinrock - a professor of computer science at UCLA - said in an interview:
 
“There's a very dark side to the Internet, which we're all familiar with. It started with a worm in 1988, and it became spam in 1994, and now we have pornography, we have denial of service [attacks], we have identity theft, we have fraud, we have things like botnets pieces of software that cyber thieves use to remotely and secretly control your computer, which really worry me.”
 
Aren’t his words true? We all agree with what he said but still not acting accordingly. 
 
The current state of Cybercrime - The Internet become limitless, so does our control
 
So, we have this global network that was never intended to be secure, then suddenly back in 2000 the ‘dot com’ boom appeared on the screen, letting everyone reaching the surface of the internet. 
 
It was the same time when E-commerce comes into existence; we’ve started our medical records, educational records, military secrets, and banking credentials online.
 
Everything is now online: Did I mention that all of this was on a network that was never designed to be secure?
 
What if I ask:  Has our greed played any role in cybercrime problem? Does security exist in a quest to make as much money as possible? Is security too inconvenient for users?
 
Think in this manner: For the first time in history anyone can rob a bank in the US from Russia or anywhere in the world without leaving their cozy home or office; thanks to the Internet for connecting any computer with any other computer in the world.
 
Think about targets…
 
Cyber criminals can not only snoop on our baby monitors and home security systems but also compromise our bank accounts and much more. The most phenomenal data breaches include Target, the US Government’s OPM, Adobe, Sony, Home Depot, Yahoo, Equifax, eBay, Anthem, Marriott, and CapitalOne,  to name some more notable and newsworthy. Did I mention hospitals, where ransomware can shut down access to critical life-saving machines and systems? 
 
Interestingly, there are 4,383,810,342 users using the Internet of Things (IoT)  across 7 billion internet-connected devices and the total number of records breached since 2005 is 11,578,188,519.
 
Let me present you a quick overview of the increasing numbers of the current state of cyber warfare; thanks to Verizon:
 
When you hear about data breaches, you’ll lose count. It’s become so commoditized that when someone announce another data breach, it feels like saying there’s another accident of Interstate I-4 in Florida. 
 
In simple words, it’s become a routine, making us numb to it as violence on the evening news.
 
If we keep ignoring, we might be the next target, then we will be left with nothing but regrets; cure is desirable but prevention is better than cure. 
 
It’s the right time to face those unknown cheapsters and take control of our very-own cyber world in our hands; if we want our kids to be safe from future cyberwarfare.
 
The only solution: Let’s work together… like the cybercriminals do.
 
I can’t and won’t address to all nations, but for our home country - the USA. 
 
Though it sounds siloed, but steps had to be taken, because it’s not hurting the victims alone, but the entire economy. In Europe, privacy is a human right and sadly, it’s not even mentioned in our Constitution (you will only find in the 4th Amendment under illegal search and seizure).
 
Another issue to be addressed at our earliest regarding the secure of our data are is the unknown data brokers. 
 
We all know that data brokers have free reign in the US - as profits are more important to Congress than privacy. Our lobbyists often from the government and work for corporations, including data brokers who in return fund congressional elections. This gives them some power to manipulate our government and laws.
 
Recently I heard that the US Congress conducting a hearing on data brokers and its impact on credit insurance, financial data privacy, employment and housing; forget what Snowden or Assange say our government has on us. 
 
It’s time our government should move toward uniformity of laws; California and Massachusetts have their data privacy laws, while others have little to none, and the feds go another direction. This siloed approach guarantees that we will shortly come up.
 
We are glad that government pushed electronic medical records, but don’t you think it was another example of too much too fast; they themselves became victims - OPM data breach, in which everyone including the FBI director’s identity was compromised. 
 
Do you know, according to HIPAA Journal, there were 2,546 healthcare data breaches occurred between 2009-2018, resulting in the theft or exposure of 189,945,874 records.
 
In short, the same government that cannot secure its own security clearances was and is simultaneously pushing us to be online to get ready for the taking.
 
Let’s face it!
 
Microsoft keeps adding patches on their OS, too many people are spending too much time defending it and looking for ways to exploit it, but we are losing this battle.  We know where we’ve been, and where we are: sadly still in reactive mode with no comprehensive laws to address cyber security and privacy across our nation. 
 
Are we kicking the cybersecurity can appropriately?
 
Yes, we are, but with so little progress and pace; as our US Congress is too busy fighting itself, I wish this partisan politics vanish forever, otherwise cyber criminals who don’t work in silos will still continue to exploit our medical records, banks, military secrets and intellectual property/ies.
 
So, what exactly we should do?
 
● We need real world solutions to manage the growing risk, combining industry executives and experts.
● We need uniform laws and security frameworks for everyone to adopt.
● We need to bring all the states (those investing in cybersecurity and those who are not) to deal with the issue collectively.
● We have come up with regulations, that all the industries supposed to oblige to. 
● We need consistent and comprehensive mandatory security and privacy laws and respective compliance frameworks to meet them. 
● We should also need to work with the European Union and adopt GDPR
 
If constitution is unwilling to address data privacy, it should at least be a human right – especially in this digital age.
 
In the end, we must decide: are we serious about cybersecurity and privacy, or will we continue moving down the path of ignorance and survival in a global game of cybercrime that is active 24 x 7 to take everything from us?
 
We can do the right thing. Can’t we? 
 
Devin Smith writes on  cyber security and technology-related crime at ReviewsDR.         
 
You Might Also Read:
 
One Costly Minute Of Cybercrime:
 
 
« Do Criminals Dream Of Electric Sheep?
The Cyber Effect On Modern Warfare »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Salt Security

Salt Security

Salt Security protects the APIs that are the core of every SaaS, web, mobile, microservices and IoT application.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

Strata Identity

Strata Identity

Strata is pioneering identity orchestration to unify on-premises and cloud-based authentication and access systems for consistent identity management in multi-cloud environments.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.