Date post: | 28-Jan-2016 |
Category: |
Documents |
Upload: | dale-stafford |
View: | 222 times |
Download: | 0 times |
(c) 2010 Cybercrime Research Institute Page: 1
CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime
Dr. Marco Gercke
Cybercrime Research Institute
CYBERCRIME
Next Generation Cyber Threats:A Glance Into the Future
MSU Forum: April 12-15, 2010 2010Marc Goodman, Chief Cyber Criminologist
(c) 2010 Cybercrime Research Institute Seite: 2
THE FUTURE IS ALREADY HERE –
IT IS JUST UNEVENLY DISTRIBUTED.
William Gibson, Neuromancer
(c) 2010 Cybercrime Research Institute Seite: 3
LIFE MOVES ONLINE
• Increasingly all aspects of human existence are moving into cyberspace, including• Work• Play• Education• Politics• Crime• Conflict
(c) 2010 Cybercrime Research Institute Seite: 4
Technological Trends
• Social Networking• Virtual Worlds• Cloud Computing• Artificial Intelligence• Biology/Genomics• GPS/Location Awareness• Mobile Computing• Nanotechnology• RFID• Robotics• Space/Satellite• Web 3.0/Semantic Web
Picture removed in print versionBild zur Speicheroptimierung entfernt
(c) 2010 Cybercrime Research Institute Seite: 5
Social Networking
• Increasingly “life” is taking place online.
• If it happens there, it is real.• If it doesn’t happy there, it
never happened.• 400 Million Facebook
members… and counting
• Numerous crime possibilities, privacy concerns, pictures, network connections, etc
(c) 2010 Cybercrime Research Institute Seite: 6
Virtual Worlds
• They are real for those who use them
• 20% of MMORPG gamers say that the virtual world is their primary place of residence.
• The real world, a.k.a. meatspace, is just a place to get food and sleep.
(c) 2010 Cybercrime Research Institute Page: 7
CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime
Dr. Marco Gercke
Cybercrime Research Institute
CYBERCRIME
THANK YOU
Visit Swedish Embassy
Life in a Virtual World-The Good
Attend a U2 Concert
Test Drive a Toyota
Buy a Coke
(c) 2010 Cybercrime Research Institute Page: 8
CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime
Dr. Marco Gercke
Cybercrime Research Institute
CYBERCRIME
Life in a Virtual World-The Bad
Political Terrorist Attacks
(c) 2010 Cybercrime Research Institute Seite: 9
More People “Live” in WoW than…
Belgium Portugal Israel Hungary Sweden Austria Switzerland
(c) 2010 Cybercrime Research Institute Seite: 10
Virtual World: Game or Terrorist Planning Tool?
(c) 2010 Cybercrime Research Institute Seite: 11
Virtual Worlds Have Virtual Economies
• People trade “real currencies” for virtual ones…some with ATM cards
• Estimated to be 12-15 billion dollar (US) economy per year (8B in China alone).
• Creates significant opportunities for money laundering and terrorist financing.
• Virtual currencies not regulated by international financial reporting standards, such as FATF.
(c) 2010 Cybercrime Research Institute Seite: 12
Biology Meets Information Technology
• Hacking the Human Heart• Smaller technology being installed
in the body—integration of IT and biology
• Cheaper monitoring from a distance, saves money for doctors.
• Pacemakers, diabetic pumps, cochlear ear implants/hearing aids are increasingly connected to the Internet.
• Coming days of Nanomedicine.• University of Massachusetts study,
March 2008-Medtronic pacemaker attack technically possible.
(c) 2010 Cybercrime Research Institute Seite: 13
The Human Genome
• Recently fully decoded for the first time in history.
• Instead of 1’s and 0’s, use base-pairs (A-T) (C-G) to encode information.
• As such, the human genome is just another operating system waiting to be hacked.
• Hackers already working on it—new ways to create “cell death”
• Exploits and university competitions in “synthetic biology”
(c) 2010 Cybercrime Research Institute Seite: 14
Mobile Computing:
• Growing power of mobile phones.• It took approximately 35 years
for to achieve the first one billion internet users.
• The second billion users will be added in the next three years, most of whom will access the Internet on mobile devices.
(c) 2010 Cybercrime Research Institute Seite: 15
The Rise of Robotics:Connecting Robots to the Grid
• Robotics is in its infancy• Will grow very rapidly-the trend
is clear, lower costs speed development
• Already have very basic robots (Roomba Vacuum)
• Home systems (heating, security, fire) connected to Net…why not robot?
• Robots poised to become as commonplace as computers
• They look cute…now.
(c) 2010 Cybercrime Research Institute Seite: 16
Current Uses of Robots
• Factory automation (workers killed)
• Taking Care of the Elderly (Japan)• Street Police Patrol (UK, Japan)• Warfare
(c) 2010 Cybercrime Research Institute Seite: 17
Subverting Robotic Systems
• Terrorists intercept and view predator drone feeds in Iraq (Dec. 2009)
• Armed Robots…Is this a good idea?
• Hackers obtain access to armed police robots, can be used against authorities.
• The case of South Africa(May 2009)
(c) 2010 Cybercrime Research Institute Seite: 18
Passing the Turing Test:Full Automation of Crime and Cyber Attacks
• In 1950, Alan Turing (father of modern AI) asked how we can tell if a machine is “intelligent”
• He concluded that if a neutral observer could not distinguish between a computer and a human being having a conversation, then computers would have achieved intelligence.
• When once cannot determine that he is talking to a machine, the computer is said to have passed the Turing Test.
• Already seeing applications of AI in organized crime botnets; humans not part of the game.
• Could be directed against state authorities.
(c) 2010 Cybercrime Research Institute Page: 19
CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime
Dr. Marco Gercke
Cybercrime Research Institute
CYBERCRIME
Moore’s Law:
In 1965, Gordon E. Moore, co-founder of Intel, accurately predicted that the capacity of computer chips would double every two years.
People do not obey Moore's Law…
(c) 2010 Cybercrime Research Institute Page: 20
CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime
Dr. Marco Gercke
Cybercrime Research Institute
CYBERCRIME
Ray Kurzweil:The Singularity
The technological singularity is a theoretical future point of unprecedented technological progress—typically associated with advancements in computer hardware or the ability of machines to improve themselves using artificial intelligence
What are the security implications of living with computers that are
smarter than human beings?
(c) 2010 Cybercrime Research Institute Seite: 21
So what does this all mean?
• When we are speaking of “Partnership of State Authorities, Civil Society and the Business Community in Ensuring Information Security and Combating Terrorism…
• Technology is here to stay• More and smarter devices
connected than ever before.• Soon desktop computer will
exceed processing power of human brain—what will be security threats then?
(c) 2010 Cybercrime Research Institute Seite: 22
Therefore:
• We must build our frameworks to understand these problems now
• Sense of urgency regarding the threat• Cooperative agreements must be
secured now, before it is too late, or the problem is literally beyond our comprehension.
• Care and consideration must be applied before connecting new devices to the network.
• Security implications must be understood and considered.
• Forums such as these are an important step forward in international cooperation against transnational cyber threats
(c) 2010 Cybercrime Research Institute Page: 23
CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime
Dr. Marco Gercke
Cybercrime Research Institute
CYBERCRIME
THANK YOU
FOR YOUR ATTENTIONMarc Goodman, Chief Cyber Criminologist