The Business of Cybercrime

The Business of Cybercrime


(keys clacking) (dial tone droning) We use technology every day
in our lives for everything. People just expect
the lights to be on, they expect to be able
to turn on the tap and for water
to come out. You’re activating about
250 different microchips in the modern
automobile. Every machine that you get
connected to in the hospital. The banks, your
credit card purchase. We’re also
seeing appliances that have become
Internet-enabled. Technology is just becoming
the fabric of the modern world. We’re becoming
increasingly dependent on it. People don’t realize that
behind all of these systems, there’s computers that were
probably built 20 years ago. (all)
Surfs up, see you on the Net! All of those computers and
software are deeply insecure. (music) The standard view
of a cybercriminal is some 16-year-old pimply
kid in his mom’s basement, hacking away
at a keyboard in between playing
“World of Warcraft” or “Call of Duty.” But it’s changed. Today, it’s
actually a business and it’s run by traditional
organized crime groups and new modern
organizations. They are global,
they’re multinational, they’re multilingual, and
they’re operating 24/7. If you shopped at a Target
store on Black Friday, your credit card may
have been affected by a massive
security breach. If you are a victim
of a car theft, you know that your
car is stolen, you can call the police,
they can look for it, etcetera. What’s different
about cybercrime is it happens in
the background. And by the time you
actually realize it, if you ever do,
it’s way too late. You can see the hacker
is actually working in my computer
right now. 99% of the people
who have been victims of cybercrime don’t
even know about it. Their machines
have been hacked, the bad guys are living
inside your computer, they’re monitoring
what you’re doing. According to the
latest studies in 2014, the average time to detection
is over 200 days. And that doesn’t matter if
you’re a mom, sitting at home, or the major corporation
in Silicon Valley. 200 days,
across the board. By the time you realize
you’ve got a problem, it’s way too late. All of your customers’
credit cards are out on
the Internet, or people are starting
to short your stock in really odd ways. One hacker group may
have stolen up to $1 billion from banks
around the world. Kaspersky says the cyber-attacks
are still happening. They’re going to first
break into a computer in Buenos Aires, and then
they’re going to hop to the computer
in Italy, and from Italy,
they’ll go to London, and then they’ll go to the bank
that they want to take over in New York. And what that means
is that now you have an international
criminal investigation, and the evidence is
incredibly ephemeral. (music) For some parts
of the world, the whole concept of cyber
and Internet and computers is so new, they have absolutely
no laws against cybercrime. If we have
a legal framework that allows the
countries to cooperate, then the victim can’t do
much about the attacker. We don’t have a
set of frameworks that address the full
range of cyber hazards. The technology is
developing way too quickly for us to rely upon legal
instruments to fix this problem. Beyond that, most of
the world’s information is not
encrypted, whether it be your
credit card number or your personal data
or your health records. Anthem Insurance got hit
by a massive electronic attack. The hackers made off with
many of the necessary tools to do a whole lot of damage
to a lot of people. We have the attackers
running very, very quickly, and it’s very difficult
to defend against them. The real challenge for
all of us is, really, “Do I feel safe in this
online environment?” There’s never been a better
time for exponential change in the
cybersecurity world. I think that the
next big technology should be the creation
of a safer Internet. (music)

You May Also Like

About the Author: Oren Garnes

16 Comments

  1. I think someone needs to make a self updating anti virus trojan that goes into every computer via harddrive software and is hidden in base files and destroys any viruses that think they are hidden as well.

  2. Let's say they read a message I am going to the gym they read these things then send there group of people up to harass you while at the gym. Then they are able to do it double time? Let's say there more then one tech that's in on it

  3. Let's say they stalk and harass you on your cellphone and also in real world. Through a clever way by using your YouTube on your own cellphone?

  4. These things have been happening to me for a very long time now all while I've been taking care of a sick women. My grandmother.

  5. The ones responsible have tried to lie about the things that have actually gone on here all in a very, very clever operation or scheme

  6. How about when they have your cellphone tagged or hacked into and a group on stand by to stalk you as well? So in other words they do it on your cell phone and real world. In other words they stalk you from your cellphone and also in real world time. A clever group of robbers. And have mostly told big fat lies in order to have been able to gotten away it? Or while these things were being preformed so no one could catch on exactly just what was happening to the victim's?

    Let's say they had the victims home staked out for year's? And they came up with this scheme and attacked them.

  7. I live in a haven for cybercrime. You can do anything here as long you do not attack anything inside the country.

  8. Seems like a lucrative business. Are there places someone like me can learn how to be an effective cybercriminal?????

Leave a Reply

Your email address will not be published. Required fields are marked *