by Marc Goodman
Copyright © 2015 Marc Goodman
All rights reserved. Published in the United States by Doubleday, a division of Random House LLC, New York, and in Canada by Random House of Canada Limited, Toronto, Penguin Random House companies.
www.doubleday.com
DOUBLEDAY and the portrayal of an anchor with a dolphin are registered trademarks of Random House, Inc.
Jacket design by Pete Garceau
Jacket art: camera lens © PixelEmbargo/iStock/Thinkstock
phone © yganko/iStock/Thinkstock
Library of Congress Cataloging-in-Publication Data
Goodman, Marc.
Future crimes : everything is connected, everyone is vulnerable and what we can do about it /
Marc Goodman.
pages cm
Includes bibliographical references.
ISBN 978-0-385-53900-5 (hardcover) ISBN 978-0-385-53901-2 (eBook)
1. Computer crimes—Prevention. 2. Computer security. 3. Data protection. 4. Technological innovations—Moral and ethical aspects. I. Title.
HV6773.G66 2015
364.16′8—dc23 2014038053
v3.1
To all my teachers,
who have taught me so much
CONTENTS
Cover
Title Page
Copyright
Dedication
PROLOGUE: THE IRRATIONAL OPTIMIST: HOW I GOT THIS WAY
PART ONE
A GATHERING STORM
CHAPTER 1: CONNECTED, DEPENDENT, AND VULNERABLE
Progress and Peril in a Connected World
The World Is Flat (and Wide Open)
The Good Old Days of Cyber Crime
The Malware Explosion
The Security Illusion
CHAPTER 2: SYSTEM CRASH
A Vulnerable Global Information Grid
WHOIS It?
CHAPTER 3: MOORE’S OUTLAWS
The World of Exponentials
The Crime Singularity
Control the Code, Control the World
CHAPTER 4: YOU’RE NOT THE CUSTOMER, YOU’RE THE PRODUCT
Our Growing Digital World—What They Never Told You
The Social Network and Its Inventory—You
You’re Leaking—How They Do It
The Most Expensive Things in Life Are Free
Terms and Conditions Apply (Against You)
Mobile Me
Pilfering Your Data? There’s an App for That
Location, Location, Location
CHAPTER 5: THE SURVEILLANCE ECONOMY
You Thought Hackers Were Bad? Meet the Data Brokers
Analyzing You
But I’ve Got Nothing to Hide
Privacy Risks and Other Unpleasant Surprises
Opening Pandora’s Virtual Box
Knowledge Is Power, Code Is King, and Orwell Was Right
CHAPTER 6: BIG DATA, BIG RISK
Data Is the New Oil
Bad Stewards, Good Victims, or Both?
Data Brokers Are Poor Stewards of Your Data Too
Social Networking Ills
Illicit Data: The Lifeblood of Identity Theft
Stalkers, Bullies, and Exes—Oh My!
Online Threats to Minors
Haters Gonna Hate
Burglary 2.0
Targeted Scams and Targeted Killings
Counterintelligence Implications of Leaked Government Data
So No Online Profile Is Better, Right?
The Spy Who Liked Me
CHAPTER 7: I.T. PHONES HOME
Mobile Phone Operating System Insecurity
Mind the App
Why Does My Flashlight App Need Access to My Contacts?
Mobile Device and Network Threats
Hacking Mobile Payments
Your Location Becomes the Scene of the Crime
Cloudy Weather Ahead
Big Data, Big Brother
The Darker Side of Big Data
CHAPTER 8: IN SCREEN WE TRUST
Life in a Mediated World
Does Not Compute
I Thought You Were My Friend
Fatal System Error
When Seeing Ain’t Believing
Screen of the Crime
Stock Screeners
CHAPTER 9: MO’ SCREENS, MO’ PROBLEMS
Call Screening
Lost in Space: GPS Hacks
When General Tso Attacks
Screen Play: Hacking Critical Infrastructures for Fun and Mayhem
Smoke Screens and the Fog of War
Control, Alt, Deceit
PART TWO
THE FUTURE OF CRIME
CHAPTER 10: CRIME, INC.
The Cyber Sopranos
Crime, Inc.—the Org Chart
The Lean (Criminal) Start-Up
A Sophisticated Matrix of Crime
Honor Among Thieves: The Criminal Code of Ethics
Crime U
Innovation from the Underworld
From Crowdsourcing to Crime Sourcing
CHAPTER 11: INSIDE THE DIGITAL UNDERGROUND
Passport to the Dark Web
A Journey into the Abyss
Dark Coins
Crime as a Service
Crimeazon.com
The Malware-Industrial Complex
Net of the Living Dead: When Botnet Zombies Attack
Committing Crime Automagically
CHAPTER 12: WHEN ALL THINGS ARE HACKABLE
Where the Wireless Things Are
Imagining the Internet of Things
Connecting Everything—Insecurely
Obliterating Privacy
Hacking Hardware
More Connections, More Vulnerabilities
CHAPTER 13: HOME HACKED HOME
Candid Camera
From Carjacking to Car Hacking
Home Hacked Home
What the Outlet Knows
Business Attacks and Building Hacks
The Smart City Operating System
CHAPTER 14: HACKING YOU
“We Are All Cyborgs Now”
More Than Meets the Eye: The World of Wearable Computing
You’re Breaking My Heart: The Dangers of Implantable Computers
When Steve Austin and Jaime Sommers Get a Virus
Identity Crisis: Hacking Biometrics
Fingers Crossed (and Hacked)
Your Password? It’s Written All Over Your Face
On Your Best Behavior
Augmenting Reality
The Rise of Homo virtualis
CHAPTER 15: RISE OF THE MACHINES: WHEN CYBER CRIME GOES 3-D
We, Robot
The Military-Industrial (Robotic) Complex
A Robot in Every Home and Office
Humans Need Not Apply
Robot Rights, Law, Ethics, and Privacy
Danger, Will Robinson
Hacking Robots
Game of Drones
Robots Behaving Badly
Attack of the Drones
The Future of Robotics and Autonomous Machines
Printing Crime: When Gutenberg Meets Gotti
CHAPTER 16: NEXT-GENERATION SECURITY THREATS: WHY CYBER WAS ONLY THE BEGINNING
Nearly Intelligent
Talk to My Agent
Black-Box Algorithms and the Fallacy of Math Neutrality
Al-gorithm Capone and His AI Crime Bots
When Watson Turns to a Life of Crime
Man’s Last Invention: Artificial General Intelligence
The AI-pocalypse
How to Build a Brain
Tapping Into Genius: Brain-Computer Interface
Mind Reading, Brain Warrants, and Neuro-hackers
Biology Is Information Technology
Bio-computers and DNA Hard Drives
Jurassic Pa
rk for Reals
Invasion of the Bio-snatchers: Genetic Privacy, Bioethics, and DNA Stalkers
Bio-cartels and New Opiates for the Masses
Hacking the Software of Life: Bio-crime and Bioterrorism
The Final Frontier: Space, Nano, and Quantum
PART THREE
SURVIVING PROGRESS
CHAPTER 17: SURVIVING PROGRESS
Killer Apps: Bad Software and Its Consequences
Software Damages
Reducing Data Pollution and Reclaiming Privacy
Kill the Password
Encryption by Default
Taking a Byte out of Cyber Crime: Education Is Essential
The Human Factor: The Forgotten Weak Link
Bringing Human-Centered Design to Security
Mother (Nature) Knows Best: Building an Immune System for the Internet
Policing the Twenty-First Century
Practicing Safe Techs: The Need for Good Cyber Hygiene
The Cyber CDC: The World Health Organization for a Connected Planet
CHAPTER 18: THE WAY FORWARD
Ghosts in the Machine
Building Resilience: Automating Defenses and Scaling for Good
Reinventing Government: Jump-Starting Innovation
Meaningful Public-Private Partnership
We the People
Gaming the System
Eye on the Prize: Incentive Competitions for Global Security
Getting Serious: A Manhattan Project for Cyber
Final Thoughts
Appendix: Everything’s Connected, Everyone’s Vulnerable:
Here’s What You Can Do About It
Acknowledgments
Notes
PROLOGUE
The Irrational Optimist:
How I Got This Way
My entrée into the world of high-tech crime began innocuously in 1995 while working as a twenty-eight-year-old investigator and sergeant at the LAPD’s famed Parker Center police headquarters. One day, my lieutenant bellowed my name across the crowded and bustling detective squad room: “Gooooooodmaaaan, get your ass over here!” I presumed that I was in trouble, but instead the lieutenant asked me the question that would change my life: “Do you know how to spell-check in WordPerfect?”
“Sure, boss, just hit Ctrl+F2,” I replied.
He grinned and said, “I knew you were the right guy for this case.”
Thus began my career in high-tech policing with my very first computer crime case. Knowing how to spell-check in WordPerfect made me among the techno-elite of cops in the early 1990s. Since that case, I have been a keen observer and student not just of technology but of its illicit use. Though I recognize the harm and destruction wrought by the misapplication of technology, I continue to be fascinated by the clever and innovative methods criminals use to achieve their objectives.
Criminals perpetually update their techniques to incorporate the very latest emerging technologies into their modi operandi. They have evolved well beyond the days when they were the first on the street carrying pagers and using five-pound cell phones to send coded messages to one another. Today, they are building their own nationwide encrypted cellular radio telecommunications systems, like those employed by the narco-cartels of Mexico. Consider for a moment the sophistication required to establish such a fully functioning encrypted nationwide communications network—an amazing feat, especially because many Americans still can’t get a decent mobile phone signal most of the time.
Organized crime groups have established themselves as early adopters of technology. Criminals embraced the online world long before the police ever contemplated it, and they have outpaced authorities ever since. News headlines are replete with stories of 100 million accounts hacked here and $50 million stolen online there. The progression of these crimes is striking, and they are accelerating in very much the wrong direction.
The subject of this book isn’t just what was going on yesterday or even what is happening today. Nor is its focus how long your password should be. It is about where we’re going tomorrow. In my own research and investigations, first with the LAPD and later working with federal and international law enforcement organizations, I have uncovered criminals who have progressed well beyond today’s cyber crime into new and emerging fields of technology such as robotics, virtual reality, artificial intelligence, 3-D printing, and synthetic biology. In most instances, my law enforcement and government colleagues around the world are unaware of these looming technological developments, let alone their growing exploitation by both organized crime and terrorist organizations. As somebody who has dedicated his life to public safety and public service, I am deeply concerned by the trends I observe all around me.
Though some may accuse me of fearmongering or being a hard-core pessimist, I am neither. Rather, I am optimistic—perhaps “irrationally optimistic”—given what I’ve seen about our future. To be clear, I am no neo-Luddite. Nor am I foolish enough to suggest technology is the source of all the ills in our world. Quite the opposite: I believe in the tremendous power of technology to be a driving force for good. It should also be noted that there are many ways it can and has been used to protect individuals and society. But technology has always been a double-edged sword. My real-world experiences with criminals and terrorists on six continents has made it clear to me that the forces of evil will not hesitate to exploit these emerging technologies and deploy them against the masses. Though the evidence and my gut tell me there are significant bumps in the road ahead—ones that government and industry are not dedicating sufficient resources to address or combat—I want to believe in the techno-utopia promised to us by Silicon Valley.
This book is the story of the society we are building with our technological tools and how these very same implements can be used against us. The more we plug our devices and our lives into the global information grid—whether via mobile phones, social networks, elevators, or self-driving cars—the more vulnerable we become to those who know how the underlying technologies work and how to exploit them to their advantage and to the detriment of the common man. Simply stated, when everything is connected, everyone is vulnerable. The technology we routinely accept into our lives with little or no self-reflection or examination may very well come back to bite us.
By shedding light on the very latest in criminal and terrorist tradecraft, I hope to kick off a vibrant and long-overdue discussion among my friends and colleagues in policing and national security. Though most are already overburdened with enough traditional crime, they must confront, sooner rather than later, the exponentially advancing technologies that will arrive as a tsunami of threats capable of destabilizing our common global security.
More important, as somebody who long ago swore to “protect and serve” others, I want to ensure that members of the general public are armed with the facts needed to protect themselves, their families, their companies, and their communities against the horde of emerging threats that will be here much more quickly than anticipated. Limiting this knowledge to “insiders” working in government, security, and Silicon Valley simply won’t do.
Throughout my tenure in public service working with organizations that include the LAPD, the FBI, the U.S. Secret Service, and Interpol, it became increasingly obvious to me that criminals and terrorists were out-innovating police forces around the world and that the “good guys” were rapidly falling further and further behind. On a quest for deeper impact against the growing legions of criminals abusing cutting-edge technologies, I left government and moved to Silicon Valley to further educate myself on what would come next.
In California, I immersed myself in a community of technological innovators in order to decipher how their latest scientific discoveries would affect the common man. I visited the scions of Silicon Valley and made friends within the highly talented San Francisco Bay Area start-up community. I was invited to join the faculty of Singularity University, an amazing institution housed on the campus of NASA’s Ames Research Center,
where I worked with a brilliant array of astronauts, roboticists, data scientists, computer engineers, and synthetic biologists. These pioneering men and women have the ability to see beyond today’s world, unlocking the tremendous potential of technology to confront the grandest challenges facing humanity.
But many of these Silicon Valley entrepreneurs hard at work creating our technological future pay precious little attention to the public policy, legal, ethical, and security risks that their creations pose to the rest of society. Yet my own experience putting handcuffs on criminals and working with police forces in more than seventy countries has yielded a different outlook on the potential abuses of the emerging technologies that innocent people everywhere welcome into their daily lives—generally without question.
To that end, I founded the Future Crimes Institute. The goal was to use my own experiences as a street cop, investigator, international counterterrorism analyst, and, most recently, Silicon Valley insider to catalyze a community of like-minded experts to address the negative as well as the positive implications of rapidly evolving technology.
As I look toward the future, I am increasingly concerned about the ubiquity of computing in our lives and how our utter dependence on it is leaving us vulnerable in ways that very few of us can even begin to comprehend. The current systemic complexities and interdependencies are great and growing all the time. Yet there are individuals and groups who are rapidly making sense of them and innovating in real time, to the detriment of us all.
This is their story—the story of organized criminals, hackers, rogue governments, substate actors, and terrorists, all competing to control the latest technologies for their own benefit.
The techno-utopia promised by Silicon Valley may be possible, but it will not magically appear on its own. It will take tremendous intention, effort, and struggle on the part of citizens, governments, corporations, and NGOs to ensure that it comes to fruition. A new battle has begun between those who will leverage technology to benefit humanity and those who prefer to subvert these tools, regardless of the harm caused to others. This is the battle for the soul of technology and its future. It rages on in the background, mostly sub rosa, heretofore well hidden from the average citizen.