(c) 2010 cybercrime research institutepage: 1 challenge the challenge of investigating and...

23
(c) 2010 Cybercrime Research Institute Page: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research Institute CYBERCRIME Next Generation Cyber Threats: A Glance Into the Future MSU Forum: April 12-15, 2010 2010 Marc Goodman, Chief Cyber Criminologist

Upload: dale-stafford

Post on 28-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Page: 1

CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime

Dr. Marco Gercke

Cybercrime Research Institute

CYBERCRIME

Next Generation Cyber Threats:A Glance Into the Future

MSU Forum: April 12-15, 2010 2010Marc Goodman, Chief Cyber Criminologist

Page 2: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 2

THE FUTURE IS ALREADY HERE –

IT IS JUST UNEVENLY DISTRIBUTED.

William Gibson, Neuromancer

Page 3: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 3

LIFE MOVES ONLINE

• Increasingly all aspects of human existence are moving into cyberspace, including• Work• Play• Education• Politics• Crime• Conflict

Page 4: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 4

Technological Trends

• Social Networking• Virtual Worlds• Cloud Computing• Artificial Intelligence• Biology/Genomics• GPS/Location Awareness• Mobile Computing• Nanotechnology• RFID• Robotics• Space/Satellite• Web 3.0/Semantic Web

Picture removed in print versionBild zur Speicheroptimierung entfernt

Page 5: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 5

Social Networking

• Increasingly “life” is taking place online.

• If it happens there, it is real.• If it doesn’t happy there, it

never happened.• 400 Million Facebook

members… and counting

• Numerous crime possibilities, privacy concerns, pictures, network connections, etc

Page 6: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 6

Virtual Worlds

• They are real for those who use them

• 20% of MMORPG gamers say that the virtual world is their primary place of residence.

• The real world, a.k.a. meatspace, is just a place to get food and sleep.

Page 7: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Page: 7

CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime

Dr. Marco Gercke

Cybercrime Research Institute

CYBERCRIME

THANK YOU

Visit Swedish Embassy

Life in a Virtual World-The Good

Attend a U2 Concert

Test Drive a Toyota

Buy a Coke

Page 8: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Page: 8

CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime

Dr. Marco Gercke

Cybercrime Research Institute

CYBERCRIME

Life in a Virtual World-The Bad

Political Terrorist Attacks

Page 9: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 9

More People “Live” in WoW than…

Belgium Portugal Israel Hungary Sweden Austria Switzerland

Page 10: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 10

Virtual World: Game or Terrorist Planning Tool?

Page 11: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 11

Virtual Worlds Have Virtual Economies

• People trade “real currencies” for virtual ones…some with ATM cards

• Estimated to be 12-15 billion dollar (US) economy per year (8B in China alone).

• Creates significant opportunities for money laundering and terrorist financing.

• Virtual currencies not regulated by international financial reporting standards, such as FATF.

Page 12: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 12

Biology Meets Information Technology

• Hacking the Human Heart• Smaller technology being installed

in the body—integration of IT and biology

• Cheaper monitoring from a distance, saves money for doctors.

• Pacemakers, diabetic pumps, cochlear ear implants/hearing aids are increasingly connected to the Internet.

• Coming days of Nanomedicine.• University of Massachusetts study,

March 2008-Medtronic pacemaker attack technically possible.

Page 13: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 13

The Human Genome

• Recently fully decoded for the first time in history.

• Instead of 1’s and 0’s, use base-pairs (A-T) (C-G) to encode information.

• As such, the human genome is just another operating system waiting to be hacked.

• Hackers already working on it—new ways to create “cell death”

• Exploits and university competitions in “synthetic biology”

Page 14: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 14

Mobile Computing:

• Growing power of mobile phones.• It took approximately 35 years

for to achieve the first one billion internet users.

• The second billion users will be added in the next three years, most of whom will access the Internet on mobile devices.

Page 15: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 15

The Rise of Robotics:Connecting Robots to the Grid

• Robotics is in its infancy• Will grow very rapidly-the trend

is clear, lower costs speed development

• Already have very basic robots (Roomba Vacuum)

• Home systems (heating, security, fire) connected to Net…why not robot?

• Robots poised to become as commonplace as computers

• They look cute…now.

Page 16: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 16

Current Uses of Robots

• Factory automation (workers killed)

• Taking Care of the Elderly (Japan)• Street Police Patrol (UK, Japan)• Warfare

Page 17: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 17

Subverting Robotic Systems

• Terrorists intercept and view predator drone feeds in Iraq (Dec. 2009)

• Armed Robots…Is this a good idea?

• Hackers obtain access to armed police robots, can be used against authorities.

• The case of South Africa(May 2009)

Page 18: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 18

Passing the Turing Test:Full Automation of Crime and Cyber Attacks

• In 1950, Alan Turing (father of modern AI) asked how we can tell if a machine is “intelligent”

• He concluded that if a neutral observer could not distinguish between a computer and a human being having a conversation, then computers would have achieved intelligence.

• When once cannot determine that he is talking to a machine, the computer is said to have passed the Turing Test.

• Already seeing applications of AI in organized crime botnets; humans not part of the game.

• Could be directed against state authorities.

Page 19: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Page: 19

CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime

Dr. Marco Gercke

Cybercrime Research Institute

CYBERCRIME

Moore’s Law:

In 1965, Gordon E. Moore, co-founder of Intel, accurately predicted that the capacity of computer chips would double every two years.

People do not obey Moore's Law…

Page 20: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Page: 20

CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime

Dr. Marco Gercke

Cybercrime Research Institute

CYBERCRIME

Ray Kurzweil:The Singularity

The technological singularity is a theoretical future point of unprecedented technological progress—typically associated with advancements in computer hardware or the ability of machines to improve themselves using artificial intelligence

What are the security implications of living with computers that are

smarter than human beings?

Page 21: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 21

So what does this all mean?

• When we are speaking of “Partnership of State Authorities, Civil Society and the Business Community in Ensuring Information Security and Combating Terrorism…

• Technology is here to stay• More and smarter devices

connected than ever before.• Soon desktop computer will

exceed processing power of human brain—what will be security threats then?

Page 22: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Seite: 22

Therefore:

• We must build our frameworks to understand these problems now

• Sense of urgency regarding the threat• Cooperative agreements must be

secured now, before it is too late, or the problem is literally beyond our comprehension.

• Care and consideration must be applied before connecting new devices to the network.

• Security implications must be understood and considered.

• Forums such as these are an important step forward in international cooperation against transnational cyber threats

Page 23: (c) 2010 Cybercrime Research InstitutePage: 1 CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime Dr. Marco Gercke Cybercrime Research

(c) 2010 Cybercrime Research Institute Page: 23

CHALLENGE The Challenge of Investigating and Prosecuting Cybercrime

Dr. Marco Gercke

Cybercrime Research Institute

CYBERCRIME

THANK YOU

FOR YOUR ATTENTIONMarc Goodman, Chief Cyber Criminologist