Download CYBERCRIME

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Existential risk from artificial general intelligence wikipedia , lookup

History of artificial intelligence wikipedia , lookup

Human-Computer Interaction Institute wikipedia , lookup

Stanford University centers and institutes wikipedia , lookup

AI winter wikipedia , lookup

Ethics of artificial intelligence wikipedia , lookup

Transcript
CYBERCRIME
Next Generation Cyber Threats:
CHALLENGE
A
Glance Into the Future
The Challenge of Investigating and Prosecuting Cybercrime
MSU Forum: April 12-15, 2010
2010
Marc Goodman, Chief Cyber Criminologist
Dr. Marco Gercke
Cybercrime Research Institute
(c) 2010 Cybercrime Research Institute
Page: 1
THE FUTURE IS ALREADY HERE –
IT IS JUST UNEVENLY DISTRIBUTED.
William Gibson, Neuromancer
(c) 2010 Cybercrime Research Institute
Seite: 2
LIFE MOVES ONLINE
•
Increasingly all aspects of human
existence are moving into cyberspace,
including
• Work
• Play
• Education
• Politics
• Crime
• Conflict
(c) 2010 Cybercrime Research Institute
Seite: 3
Technological Trends
•
•
•
•
•
•
•
•
•
•
•
•
Social Networking
Virtual Worlds
Cloud Computing
Artificial Intelligence
Biology/Genomics
GPS/Location Awareness
Mobile Computing
Nanotechnology
RFID
Robotics
Space/Satellite
Web 3.0/Semantic Web
(c) 2010 Cybercrime Research Institute
Picture removed in print version
Bild zur Speicheroptimierung entfernt
Seite: 4
Social Networking
•
•
•
•
•
Increasingly “life” is taking place
online.
If it happens there, it is real.
If it doesn’t happy there, it never
happened.
400 Million Facebook members…
and counting
Numerous crime possibilities,
privacy concerns, pictures, network
connections, etc
(c) 2010 Cybercrime Research Institute
Seite: 5
Virtual Worlds
•
•
•
They are real for those who use them
20% of MMORPG gamers say that
the virtual world is their primary place
of residence.
The real world, a.k.a. meatspace, is
just a place to get food and sleep.
(c) 2010 Cybercrime Research Institute
Seite: 6
Life in a Virtual WorldThe Good
CYBERCRIME
THANK YOU
CHALLENGE
The Challenge of Investigating and Prosecuting Cybercrime
Buy a Coke
Attend a U2 Concert
Dr. Marco Gercke
Cybercrime Research Institute
Test Drive a Toyota
(c) 2010 Cybercrime Research Institute
Visit Swedish Embassy
Page: 7
Life in a Virtual WorldThe Bad
CYBERCRIME
CHALLENGE
The Challenge of Investigating and Prosecuting Cybercrime
Political Terrorist Attacks
Dr. Marco Gercke
Cybercrime Research Institute
(c) 2010 Cybercrime Research Institute
Page: 8
More People “Live” in WoW than…







Belgium
Portugal
Israel
Hungary
Sweden
Austria
Switzerland
(c) 2010 Cybercrime Research Institute
Seite: 9
Virtual World: Game or Terrorist Planning Tool?
(c) 2010 Cybercrime Research Institute
Seite: 10
Virtual Worlds Have Virtual Economies
•
•
•
•
People trade “real currencies” for
virtual ones…some with ATM cards
Estimated to be 12-15 billion dollar
(US) economy per year (8B in China
alone).
Creates significant opportunities for
money laundering and terrorist
financing.
Virtual currencies not regulated by
international financial reporting
standards, such as FATF.
(c) 2010 Cybercrime Research Institute
Seite: 11
Biology Meets Information Technology
•
•
•
•
•
•
Hacking the Human Heart
Smaller technology being installed in
the body—integration of IT and biology
Cheaper monitoring from a distance,
saves money for doctors.
Pacemakers, diabetic pumps, cochlear
ear implants/hearing aids are
increasingly connected to the Internet.
Coming days of Nanomedicine.
University of Massachusetts study,
March 2008-Medtronic pacemaker
attack technically possible.
(c) 2010 Cybercrime Research Institute
Seite: 12
The Human Genome
•
•
•
•
•
Recently fully decoded for the first
time in history.
Instead of 1’s and 0’s, use base-pairs
(A-T) (C-G) to encode information.
As such, the human genome is just
another operating system waiting to
be hacked.
Hackers already working on it—new
ways to create “cell death”
Exploits and university competitions in
“synthetic biology”
(c) 2010 Cybercrime Research Institute
Seite: 13
Mobile Computing:
•
•
•
Growing power of mobile phones.
It took approximately 35 years for to
achieve the first one billion internet
users.
The second billion users will be added
in the next three years, most of whom
will access the Internet on mobile
devices.
(c) 2010 Cybercrime Research Institute
Seite: 14
The Rise of Robotics:
Connecting Robots to the Grid
•
•
•
•
•
•
Robotics is in its infancy
Will grow very rapidly-the trend is
clear, lower costs speed development
Already have very basic robots
(Roomba Vacuum)
Home systems (heating, security, fire)
connected to Net…why not robot?
Robots poised to become as
commonplace as computers
They look cute…now.
(c) 2010 Cybercrime Research Institute
Seite: 15
Current Uses of Robots
•
•
•
•
Factory automation (workers killed)
Taking Care of the Elderly (Japan)
Street Police Patrol (UK, Japan)
Warfare
(c) 2010 Cybercrime Research Institute
Seite: 16
Subverting Robotic Systems
•
•
•
•
Terrorists intercept and view predator
drone feeds in Iraq (Dec. 2009)
Armed Robots…Is this a good idea?
Hackers obtain access to armed
police robots, can be used against
authorities.
The case of South Africa
(May 2009)
(c) 2010 Cybercrime Research Institute
Seite: 17
Passing the Turing Test:
Full Automation of Crime and Cyber Attacks
•
•
•
•
•
In 1950, Alan Turing (father of modern AI)
asked how we can tell if a machine is
“intelligent”
He concluded that if a neutral observer
could not distinguish between a computer
and a human being having a conversation,
then computers would have achieved
intelligence.
When once cannot determine that he is
talking to a machine, the computer is said
to have passed the Turing Test.
Already seeing applications of AI in
organized crime botnets; humans not part
of the game.
Could be directed against state authorities.
(c) 2010 Cybercrime Research Institute
Seite: 18
Moore’s Law:
In 1965, Gordon E. Moore, co-founder of Intel, accurately
CYBERCRIME
predicted that the capacity of computer chips would double
every
two years.
CHALLENGE
The Challenge of Investigating and Prosecuting Cybercrime
People do not obey Moore's Law…
Dr. Marco Gercke
Cybercrime Research Institute
(c) 2010 Cybercrime Research Institute
Page: 19
Ray Kurzweil:
The Singularity
The
technological singularity is a theoretical future point of
CYBERCRIME
unprecedented technological progress—typically associated
with
advancements in computer hardware or the ability of
CHALLENGE
The Challenge of Investigating and Prosecuting Cybercrime
machines
to improve themselves using artificial intelligence
Dr. Marco Gercke
Cybercrime Research Institute
(c) 2010 Cybercrime Research Institute
What are the security implications of
living with computers that are smarter
than human beings?
Page: 20
So what does this all mean?
•
•
•
•
When we are speaking of “Partnership
of State Authorities, Civil Society and
the Business Community in Ensuring
Information Security and Combating
Terrorism…
Technology is here to stay
More and smarter devices connected
than ever before.
Soon desktop computer will exceed
processing power of human brain—
what will be security threats then?
(c) 2010 Cybercrime Research Institute
Seite: 21
Therefore:
•
•
•
•
•
•
We must build our frameworks to
understand these problems now
Sense of urgency regarding the threat
Cooperative agreements must be secured
now, before it is too late, or the problem is
literally beyond our comprehension.
Care and consideration must be applied
before connecting new devices to the
network.
Security implications must be understood
and considered.
Forums such as these are an important
step forward in international cooperation
against transnational cyber threats
(c) 2010 Cybercrime Research Institute
Seite: 22
CYBERCRIME
THANK YOU
CHALLENGE
FOR
YOUR
The Challenge of Investigating and Prosecuting Cybercrime
ATTENTION
Marc Goodman, Chief Cyber Criminologist
Dr. Marco Gercke
Cybercrime Research Institute
(c) 2010 Cybercrime Research Institute
Page: 23