Do Criminals Dream Of Electric Sheep?

A whole range of electronic cyber technologies are predicted to assist criminals and make them extremely dangerous to the public and now law enforcement must act says a new Report.

Published by Europol, the Do criminals dream of electric sheep: how technology shapes the future of crime and law enforcement Report, reviews the new techno problems that could increase cyber-crime. The title of the Report refers to sci-fi writer Philip K Dick. 

‘The profound impact of technological change on law enforcement has been highlighted repeatedly over the last decades. However, the pace and scale of technological innovation confronting law enforcement authorities in the EU and beyond is now becoming increasingly apparent. 

‘The opportunities for law enforcement in harnessing these technologies are as great as the challenges and their potential utility to criminal actors. Law enforcement authorities must employ foresight and embrace organisational change challenging established business models in order to access the potential held by these technologies’. 

The Report goes on to say that these technologies will provide hackers with new attack vectors for conducting malicious activity, such as high speed phishing attacks by using AI to tailor malicious emails and responses, as well as deploying AI to determine the best targets.

It's also suggested that law enforcement itself could take advantage of some of the emerging technologies to help in the fight against cybercrime. For example, AI is detailed as a technology that could benefit law enforcement by helping to improve the security of systems and devices.

Quantum computing is also identified as a potential risk to the cybersecurity of European citizens. While experts say that quantum computing can help boost the security of systems, Europol warns that there's the potential that the technology could fall into the wrong hands, and these individuals could exploit the power to crack the encryption of machines using the current standard.

"Malicious actors in possession of a quantum computer would have the opportunity to break traditional security standards, orchestrate far more sophisticated cyberattacks, or decrypt information and communications," the Report warns.

There are also concerns around 5G mobiles, due to the challenges it could provide for law enforcement. The report argues that 5G technology will "complicate the use of the unique mobile phone card identifiers that allow law enforcement to identify and locate devices", making it more difficult to carry out legally permissible technical investigation and surveillance measures of suspected criminals. 

This would mean "one of the most important tactical operational and investigation tools would therefore become obsolete", providing a potential boon for criminals who want to hide.

"The potential challenges for law enforcement as a result of developments within the area of 5G do not appear to be a priority for developers," the paper adds.
The rise of the Internet of Things has already caused security issues, but there's a fear that as more and more IoT devices enter homes and workplaces, the insecurity in them could prove extremely lucrative for them.

"The vulnerability of IoT devices may be exploited by criminals seeking to collect personal data, compromise user credentials or even spy on people or organisations," warns the Report.

Europol has already made efforts to boost security in the Internet of Things, but does understand more work needs to be done. ‘Law enforcement authorities need to invest in understanding AI technology and its implications to properly detect and contain these emerging threats. Law enforcement should equally explore the opportunities that AI presents for actively countering these threats.

This is particularly relevant in the area of cybersecurity where AI can help make defences more effective and scalable,’ says the Report. 

The report isn't all doom and gloom, as it points out how ever-advancing technology can also help benefit law enforcement, with AI and machine learning able to play a prominent role in the fight against crime and terrorism.

ZDNet

You Might Also Read: 

Five Hi -Tech Ways To Fight Off Cyber Attackers:

Cyber Criminals Have Created An Invisible Internet:

 

 

 

 

« Four Questions To Ask After An Attack
We Can Reduce Cybercrime, But Why Are We Failing? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

Mailinblack

Mailinblack

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

Google Cloud

Google Cloud

Accelerate your digital transformation. Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BTQ Technologies

BTQ Technologies

BTQ is a global quantum technology company focused on securing mission critical networks.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.