I
am reposting and publishing excerpts of the recent blog of Peter Diamandis. He
is the author of Bold:
How to Go Big, Create Wealth and Impact the World ... – the book that discussed
exponential technologies.
Here he writes about the downside of exponential technology: digital crime. More specifically, he
quotes from Marc Goodman’s book Future Crimes. Goodman is a Futurist for
the FBI, a 10-year veteran with Interpol and a faculty member of Singularity
University.
His goal is to educate, and help protect us against the growing risk of
cyber crime in this digital age.
**********************************************************
Criminals
are exponential entrepreneurs too…
Exponential
technologies allow for exponential crimes.
Historically,
one person could only rob one person at any given time. Today one person can
rob millions in an instant.
Just this
week a joint taskforce from INTERPOL, Europol and Kaspersky Lab reported that a
group of cybercriminals dubbed "Carbanak" has stolen upwards of $1
billion from banks all over the world.
A joint
study between the University of Tel Aviv and National University of Singapore
estimates that businesses around the world have spent $500 billion recovering
from data breaches and malware-related problems.
As more of
our devices become connected to the Internet, we are more vulnerable than ever.
Samsung, for
example, recently came under public scrutiny when it was disclosed that their
new TV's voice command system is recording every conversation and
sending the data to a third party to parse and analyze. Headlines announced,
"your TV is spying on you in the privacy of your living room."
6D's
Applied to Crime
We don't
often think about crime advancing exponentially, but the Future Crimes also
benefit from the 6D's framework: Digitization, Deceptive to Disruptive,
Dematerialization, Demonetization, and Democratization.
Here are
some examples.
Digitization: Between 2011 and 2013, Silk Road
digitized the black market and did $1.2 billion of business as a platform for
illegal substances and services, among other things. Most impressive, they were
transacting in the anonymous, decentralized, untraceable cryptocurrency Bitcoin.
Deceptive
to Disruptive: A
decade ago, stories of cyber-attacks and cyber-theft was a rare occurrence.
Today it's in the news every day. The US Navy sees 11,000 cyber-attacks every
hour, or more than 30 every single second. More than 600,000 Facebook accounts
are compromised every day.
Dematerialization: It used to take guns, get-away cars
and large-scale operations to successfully pull off crimes. Last month, a drone
crashed into a Mexican supermarket just next to the California border. It was
carrying over 6 pounds of methamphetamine. For every unsuccessful drone, there
are likely hundreds that succeed.
Demonetization: 3D Printing is demonetizing firearms.
The first 3D printed gun was designed by a student at the University of Texas
and printed in 2013. Called "the Liberator", the gun can be printed
overnight for pennies. Rather than purchasing guns or the licenses needed to
operate them, anybody with access to a 3D printer and the Internet can
"print" them for free.
Democratization: Vulnerable democratizing communication
platforms like Twitter, where millions voice their opinions and share news, can
give enormous influence to cyber criminals and terrorists. In 2013, the
Associated Press' Twitter was hacked by a Syrian terrorist organization. They
posted a fake tweet about an attack at the White House that had injured the
president. In 3 minutes, the trading algorithms that monitor news agencies had
cut the market cap by $360 billion. Other terrorist organizations often use
social media to recruit new members and execute sophisticated attacks at scale.
Protecting
Yourself: The "UPDATE" Protocol
Marc's book
is filled with super-high quality advice to help you protect yourselves from
attack.
Here are the
top items for you to remember, using the acronym UPDATE.
Update: Update your software automatically so
that you are protected. If the developer is offering an update, it is because
your version has bugs, which means you are vulnerable. Updating automatically
makes sure you are taken care of without having to think about it.
Password: Make sure your password is uppercase
and lowercase and includes numbers and symbols. Most importantly, don't repeat
passwords across multiple accounts. Be careful with downloading a password
manager, as some are fraudulent. Marc suggests not using a single sign-on like
Facebook, because if it is cracked, you are wide open.
Download: With downloading, free is the most
expensive. Be very cautious of programs offered for free and only download from
official sites.
Administrative
Privilege: Don't log
on to your computer as the administrator. Logging on as a user means that if a
big change is being made, it will prompt you with your login. This is a good
preventative measure to protect against malware.
Turn Off: Shut down your computer while you're
asleep and you cut the time that you can be attacked in by one-third. Also turn
off Wi-Fi and Bluetooth when you can: the more ports that are open, the more
vulnerable you are.
Encryption: Use programs like Filevault to
completely encrypt your computer. Also use a VPN (virtual private network) if
you can. Have a password on your phone to encrypt data behind the security
wall.
Marc also
offered 2 additional warnings:
Be
careful using the cloud.
Always note which country the servers are located in and schedule regular
backups.
Finally, cover
the camera on your computer. When you aren't using it, hackers can log it
and gain access to your camera. Scariest of all – the green indicator light
won't light up. Marc recommends covering the camera with tape when you're not
using it.
No comments:
Post a Comment