{"id":844,"date":"2015-04-26T18:35:00","date_gmt":"2015-04-26T23:35:00","guid":{"rendered":"http:\/\/huewhite.com\/umb\/?p=844"},"modified":"2015-04-26T18:35:00","modified_gmt":"2015-04-26T23:35:00","slug":"tomorrows-cybercrime","status":"publish","type":"post","link":"https:\/\/huewhite.com\/umb\/2015\/04\/26\/tomorrows-cybercrime\/","title":{"rendered":"Tomorrow&#8217;s Cybercrime"},"content":{"rendered":"<p>In an interview with Ex-Interpol agent <b>Marc Goodman<\/b>, <em><strong>NewScientist<\/strong><\/em>&#8216;s Douglas Heaven discovers that the upcoming &#8216;Internet of Everything&#8217; means <a href=\"http:\/\/www.newscientist.com\/article\/mg22630160.400-a-cybercrime-wave-is-coming--brace-yourself.html?full=true#\" target=\"_blank\">everything can be hacked<\/a> (paywall):<\/p>\n<blockquote>\n<p class=\"infuse\"><b>You&#8217;re implying that every connected device is a target. Why do you think that?<\/b><br \/>\nNo one has ever built a computer system that could not be hacked. We are rushing full speed ahead to put every possible device online and they&#8217;re all insecure. We should pause for a moment. If somebody hacks my television, do I care? But all of the world&#8217;s critical services are run by computers and we&#8217;re seeing these computers increasingly come under attack. People have always struggled for power. Now, if you control the code, you control the world.<\/p>\n<p class=\"infuse\"><b>Does that include connected technology like CCTV security cameras?<\/b><br \/>\nThe tools we have to protect us can be subverted and that security used against us. It&#8217;s what I call the judo model of cyber security \u2013 using your opponent&#8217;s weight against them. You really can&#8217;t have any faith that when you set up 300 cameras on a street in London, or wherever, that the government is the only one watching.<\/p>\n<p class=\"infuse\">Nor can anyone trust what they see on screens. We&#8217;ve all received phishing emails that appear to be from our bank. That was taken to the next level with the <a href=\"http:\/\/www.newscientist.com\/article\/mg20827803.200-why-the-stuxnet-worm-is-like-nothing-seen-before.html\">Stuxnet malware<\/a> attack in Iran in 2010. Nuclear engineers in a control room were staring at screens that showed the status of uranium-enrichment centrifuges. The screens said everything was fine but the centrifuges were <a href=\"http:\/\/www.langner.com\/en\/wp-content\/uploads\/2013\/11\/To-kill-a-centrifuge.pdf\">actually spinning out of control<\/a>. Somebody had inserted a hack in between what was really going on and what was being presented on the screens. We are becoming increasingly disconnected from physical reality in this way.<\/p>\n<\/blockquote>\n<p class=\"infuse\">I&#8217;ve often felt that computers are best considered to be multipliers.\u00a0 Someone who holds up a bank only gets what is &#8211; at best &#8211; in the bank&#8217;s branch at that time.\u00a0 If they&#8217;re real thrill seekers, they take hostages and make a bit more &#8211; or get shot in the process.<\/p>\n<p class=\"infuse\">Computer hackers can do much, much better, and generally from the safety of their office.<\/p>\n<p class=\"infuse\">For the professional software engineer, the future may hold some interesting questions:<\/p>\n<ul>\n<li class=\"infuse\">Does your favorite programming language make it easy or hard to write code vulnerable to hacking?\u00a0 (Hint: If it&#8217;s C, it&#8217;s probably really, really easy.)<\/li>\n<li class=\"infuse\">Does your favorite language easy to evaluate for correctness?\u00a0 Most are not; the languages in the functional paradigm are reputedly a little more easily evaluated, but I haven&#8217;t seen it done on &#8211; yet &#8211; on production level code.\u00a0 If you know of examples, let me know.<\/li>\n<li class=\"infuse\">Does\u00a0 your language let you program computers &#8211; or express solutions?<\/li>\n<li class=\"infuse\">Have you ever taken a class specifically oriented towards writing secure code?<\/li>\n<\/ul>\n<p>This is not to imply that all &#8211; or even most &#8211; vulnerabilities are the fault of programmers; some are hardware, some are social.\u00a0 But a significant fraction of them are a result of using insecure programming languages, and future languages should be designed with that in mind.\u00a0 I am not an expert in security (I&#8217;m more a jack of a few trades &#8211; don&#8217;t ask me about numerical analysis, either), but I used to read comp.risks, and I hear things.<\/p>\n<p class=\"infuse\">FOR EVERYONE &#8211; I can&#8217;t help but pose the obvious question: if the Internet went away, how would it affect YOU?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an interview with Ex-Interpol agent Marc Goodman, NewScientist&#8216;s Douglas Heaven discovers that the upcoming &#8216;Internet of Everything&#8217; means everything can be hacked (paywall): You&#8217;re implying that every connected device is a target. Why do you think that? No one has ever built a computer system that could not be \u2026 <a class=\"continue-reading-link\" href=\"https:\/\/huewhite.com\/umb\/2015\/04\/26\/tomorrows-cybercrime\/\"> Continue reading <span class=\"meta-nav\">&rarr; <\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-844","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/comments?post=844"}],"version-history":[{"count":1,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/844\/revisions"}],"predecessor-version":[{"id":845,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/posts\/844\/revisions\/845"}],"wp:attachment":[{"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/media?parent=844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/categories?post=844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/huewhite.com\/umb\/wp-json\/wp\/v2\/tags?post=844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}