Sun, 5 November 2017
Marc Goodman is one of the world’s leading authorities on global security and the New York Times Bestselling author of Future Crimes: Inside the Digital Underground and the Battle for Our Connected World —selected by the Washington Post as one of the 10 Best Books of 2015 and by Amazon.com as the best book of 2015 in Business & Investing. Goodman founded the Future Crimes Institute to inspire and educate others on the security and risk implications of newly emerging technologies. He also serves as the Global Security Advisor and Chair for Policy and Law at Silicon Valley’s Singularity University, a NASA and Google sponsored educational venture dedicated to using advanced science and technology to address humanity’s biggest challenges.
Beginning his career as a police officer, over the past twenty years Marc Goodman has built his expertise in next generation security threats such as cyber crime, cyber terrorism and information warfare through work with INTERPOL, the United Nations, NATO, the Los Angeles Police Department and the U.S. Government. For over a decade, Goodman trained numerous expert working groups on technological security threats while serving as a Senior Advisor to INTERPOL’s Steering Committee on Information Technology Crime. He has worked with various UN entities and was asked by the Secretary General of the United Nations International Telecommunications Union (ITU) to join his High Level Experts Group on Global Cybersecurity.
Crime has changed drastically over the last few decades. One major change is the ‘location’ factor. Previously, crime was local – a bank robber or a car thief who lived locally, committed the crime locally. Now, the internet has changed that and the location of the crime can happen anywhere. For example, someone in Russia can attack someone in San Francisco. This requires law enforcement to work very differently. “You no longer have co-location of victim, criminal and evidence.” This factor has broken the criminal enforcement system.
How does hacking work? Cyber attacks are automated. This is another thing that is different than the past. Previously someone had to do the crime. Now it’s automated. There is ‘crimeware’. It can be programmed to do identify theft, attack data, etc. Only a small percentage is customized. Those are often the state sponsored attacks.
Identity theft is more serious than credit card theft. A person takes over your credit cards but also mortgage, Facebook, medical records and so on. This can take years to clear up.
Additionally, there is the hacking of video cameras – for instance through baby cameras. Perhaps you take your cell phone into the bathroom – you don’t want someone to hack into that while you are there. Every computer is hackable. Your phone, your camera, your car are all ‘computers’ and, therefore, hackable.
Ninety-five percent of all data breaches can be linked back to human error. If employees are not aware of ways this can occur they are putting their company at risk of being hacked. Companies are being proactive training their employees. For instance, they are sending out fake phishing emails to assist with knowing which employees might click on a bad email and then using it as a teachable moment.
A few things people can do to protect themselves:
· Increase laws, public policy and regulation. Regulation could be useful. For example, CA first to have mandatory data breech hack notifications. As the result everyone in CA was notified. People in the other states were not notified. Good data breech notification is important and strong penalties. · Check out to see if your accounts have been hacked @ haveibeenpwned.com · Go to Goodman’s website: futurecrimes.com – tips
· Be careful what you ‘click on’
· Consider changing the account in your computer that you are using in the ‘administrator role’ to a ‘user’ role.
What you will learn in this episode:
· How crime has evolved over the last few decades
· Steps you can take to reduce your risk of being hacked
· Find out how your online dating site might give away more info that you want it to
· How the Equifax hack happened
· The connection between terrorism and technology