Futurist Keynote Speaker: Posts, Slides, Videos -
AI Artificial Intelligence Robotics Cybersecurity
What happens when you combine Robotics, Artificial Intelligence /AI, the Internet of Things, Big
Data and Cloud Computing, to the world of banking, telcos, mobile devices and personal
computers?
The answer is the you get the biggest target for criminals that the world has ever seen - all waiting online to be attached and exploited in a billion different ways using little more than a couple of computers, owned by very smart geeks.
Never in human history has it been possible
for one person, sitting in a bedroom at home in a distant land, to create such
havoc and chaos, to seize such power.
Cyber-crime will therefore be one of the greatest threats to our world
over the next 50 years, and far beyond, into centuries to come.
There is no way back from such a future,
except by dismantling all the global e-systems that link us increasingly
together.
As I predicted many years ago, and have spoken about since in many keynotes on cybersecurity and related issues, every large company in
the world is now experiencing frequent cyber-attacks, on their own systems or
in the cloud, whether they realize or not.
(This article is an extract from Patrick Dixon's Futurist book "The Future of Almost Everything"
Cyberattacks already cost business over $300 billion a year
The Centre for Strategic and
International Studies has estimated total cost to business to be around $300bn
a year.
Losses are likely to be more than $1
trillion a year by 2025, especially if we see wide-scale attacks, sponsored by
hostile governments.
We are not just
talking about attacks on traditional targets like bank websites, but also
commercial aggression like the blackmail of Sony, after the company released a
controversial film about North Korea.
There is nothing new about web abuse. At
least 80% of the 247 billion emails sent every day are spam, many of them
so-called phishing attacks, pretending to be from a bank, encouraging people to
enter passwords.
Expect 10 billion separate attacks a
year
Macafee is already detecting over 600
million new and different computer viruses, malware or Trojan horses every year
– several a second.
Pharma, chemicals, mining, electronics and agricultural
companies are seeing increases of 600% a year in malware attacks.
Energy, oil
and gas attacks are growing by 400%.
Attempts to steal data from retailers are doubling every 12 months.
In many cases, tens of millions of
credit card details have been stolen.
Target lost data on 70 million people in a single attack.
A single contractor in South Korea managed to
steal personal information on 20 million credit card users, more than half the
country’s working population.
Two years previously, personal data on 35 million
South Koreans was stolen from Cyworld, a popular social network.
3 billion people’s personal details have been stolen
Similar attacks have happened across the
world. Hackers recently stole personal
details of 213 million eBay users. Sony
lost 100 million client’s details to a hacker.
The Heartbleed bug caused huge damage in 2014 as it swept globally,
invading websites of many multinationals, retailers, banks and email companies.
Another example was a major attack on JP
Morgan Chase – following a sustained assault with tens of thousands of separate
attacks each day over many months, mostly traced to Russia. 76 million names, addresses, telephone
numbers and email addresses were stolen – affecting two thirds of all
households in America.
Most attacks are reported very late, some not at all, and many are never noticed of course.
Yahoo admitted in 2017 that 3 billion accounts were hacked back in 2013, triple the previous estimate they had given.
Why hackers will often escape
prosecution if caught
I have met bankers who don’t prosecute
or even sack staff who hack into their own bank systems.
“Just thought you
should know…. Of course I should probably leak the news or publish the account
names.”
Terrified of bad publicity, they
pay them off, give them a wonderful reference, and let them go and work for a
competitor – where exactly the same thing is likely to happen again.
There is no legal requirement in most
countries for any bank to report when they have been hacked and data lost,
which means that most attacks will never be known, and the true scale is far
larger than most people think.
Even the most basic bank security can be
pitifully weak.
I remember shortly
before spending a day advising the board of a Swiss bank, I decided to carry
out a test of my own. Without being challenged, I managed to walk right into a
high-security area using the oldest tricks in the book: distracting reception
staff, and gently pulling apart sliding security doors with my fingers.
Large corporations will be forced to
encrypt stored data
All IT and smartphone companies will
step up personal security with end to end encryption during data transmission,
and encryption of all data “at rest” stored on servers.
It is really shocking that most banks in some nations still
do not encrypt data on their servers, so once a hacker gains entry, which they
do in every large bank several times a year, they usually have no trouble at
all reading files.
It was very careless of Sony to allow hackers to so easily
read all their archived emails, contracts and other documents. Best practice will mean universal encryption.
Customers will be urged to set up two
step authentication, with confirmation of passwords using codes sent to mobile
devices. As a result, expect dramatic
growth in attacks on telco companies and all mobile devices, to try to hack
into SMS and intercept these codes. In
2014, such attacks grew more than a hundred times over the previous year.
Cyberwar
- a new kind of Cold War
Expect many more significant large-scale
cyber attacks against nations and groups of enterprises over the next two
decades, often directed by criminal gangs rather than government staff, paid
for by secret agents of other countries.
The largest of these attacks are likely to form part of next-generation
conflicts / disputes between nations, paralysing entire government agencies for
days, causing major disruption to banking and telecommunications, damaging
utilities such as power stations or parts of the national grid.
It is already happening: for example, a blast furnace in a steel mill
was hit by hackers in Germany recently, causing parts of the plant to
fail. But for understandable reasons,
most successful attacks on major installations will be kept strictly secret, in
the national interest.
Cyberattacks on international data cables, people, companies and
nations
Cyber-attacks are easy to carry out on
physical web infrastructure too.
For
example, most bandwidth in the world is carried on a few, very vulnerable,
fibre-optic cables. Cutting them is very
easy – all you have to do is drag a ship’s anchor along a sea bed to snag
them. And it is very hard to detect what
ship did it, especially in relatively busy shipping areas.
Recent cable damage reduced web access in
India by 70%, Egypt by 60%, with many other nations affected in the Middle
East. In another episode, divers were
arrested off the coast of Egypt in the act of sabotage.
For all these reasons, Nato includes
cyberattacks as one of the events which could trigger a joint response by the
Alliance.
Nations like the UK are very vulnerable since the exact points are well known on maps, where huge data cables run from shallow sea water into the shoreline.
Using mini-submersibles like those the BBC hired to film Blue Oceans II, it is easy to track all data cables into deep ocean, and a work of minutes to cut such them.
However, it will be almost impossible to prove who is really behind
such attacks, and therefore impossible to retaliate effectively.
The US Navy is
being hit on a routine basis by over 100,000 separate online attacks every
hour, according to Hewlett Packard. But
from where and by whom and for what purpose?
Sometimes digital debris is left by accident
which gives clues about origin – for example naming a piece of code, deeply
encrypted inside a complex virus, after a popular TV comedian in a particular
country. But subtle clue-dropping can
also be a deliberate decoy, used by secret services or gangs to cast blame on
an innocent nation.
Viruses designed to control entire
countries
Energetic Bear is a cyber-espionage
weapon which infected vital parts of Europe’s energy infrastructure during the
Ukraine – Russia – EU crisis.
It
targeted a wide range of industrial control systems, national grids, power
stations, wind turbines, biomass fuel plants.
It was designed to monitor energy use in real time and to disable
systems on command – but on whose command?
Future energy viruses will target smart grids and smart homes – imagine
the impact for example, if a hacker from a hostile state or group could turn on
15 million air conditioners simultaneously, causing instant power cuts.
A few weeks after discover of Energetic
Bear, Russian telecom and health companies, utilities and government agencies
discovered that they too had been hit by one of the most deadly and
sophisticated clusters of viruses ever created, called Regin.
The cluster was designed with multiple Apps, to
steal passwords, extract information on a huge range of systems, and take total
control of many different types of industrial equipment.
“Digital bombs” inside large
organisations
Targets were also hit in Saudi Arabia,
Mexico, Ireland, India, Iran, Belgium, Australia and Pakistan.
In many cases, it turned out that the viruses
had been working away for up to 6 years without detection, despite every check.
The viruses were constantly listening online for a single command to detonate
tens of thousands of digital “bombs” across every part of the nation.
It has been reported that Russia is now so
anxious about American penetration, that security agencies are using printed
paper for ultra-sensitive communications.
The Chinese meanwhile are building a quantum computing link between
Beijing and Shanghai, which they hope will lock out foreign surveillance.
In 2007, Estonia banks, Government
agencies, Parliament, broadcasters and newspapers were also hit by three weeks
of cyber-attacks which completely paralysed their web capabiliites. These followed a disagreement with Russia,
though responsibility was never proven.
So we will see huge investment in
cyber-resilience, by governments, banks, stock exchanges and utility companies
in particular, in the wealthiest nations, but smaller nations will remain very
vulnerable.
At least a quarter of all
attacks will be espionage – directed at stealing state secrets or corporate
research which has yet to be patent protected.
Hackers will be recruited by spies and
gangs
Expect growing numbers of full-time
professional hackers, operating as independent consultants to criminal gangs
and secret services, offering services in combination with others to plan major
attacks.
In many cases, these hacking geniuses will never realize who the end
client really is. They may think they
are working for MI6 in the UK for example, but are actually working for a
Bulgarian gang, which is assisting Russian Federal Security Services, or for
the CIA or Mossad.
Many attacks will be multidimensional in
future. So a large scale identity theft takes place a couple of hours before a
vital payment channel is hacked, to create new PIN numbers. Minutes later, two
hundred people with cloned cash cards start withdrawing cash from ATMs in over
50 cities.
Hackers will be turned against other
hackers
Expect a radical rethink about what on
earth to do with convicted hackers:
people with proven genius in cracking open systems, who may well be the
best people in the world to test your own security, and help improve it.
Do we really want to waste their lives locked
up in prison?
Some hackers will be offered rewards by
governments to attack and destroy the dark web.
The aim will be to identify
many millions of users of Tor web browsers (these are like normal web browsers,
but prevent ANYONE monitoring your web activity), and users of other “secret”
tools: people who want to keep their activities and payments 100% secret.
Over 400 dark websites were closed in
2014 alone, including sites which sell illegal drugs, illegal arms deals,
assassinations of spouses or politicians, and every kind of depravity.
However, many dark web users in future will
simply be trying to evade “oppressive” state snooping – particularly in
countries like Russia or China where web controls have become severe. Use of Tor in Russia leapt from 60,000 to
over 200,000 people in just a couple of months following the seizure of Crimea.
Looking for a cybersecurity keynote speaker? Patrick Dixon has given keynotes for over 400 of the world's largest corporations and to governments on a wide range of digital issues including cybersecurity, how to prevent cyberattacks, how to detect cyberattacks and related matters.
Related news items:
Newer news items:
- Daily Telegraph:"If you need to acquire instant AI mastery in time for your next board meeting, Dixon’s your man. Over two dozen chapters. Business types will enjoy Dixon's meticulous lists and his willingness to argue both sides." BUY AI BOOK NOW
- Interview: How AI Will Change Your Life - book author Patrick Dixon, keynote speaker on AI, in conversation with Alison Jones, Extraordinary Business Book Club. Looking for a keynote speaker on AI? BOOK AI Keynote NOW
- Impact of AI on search engines, what AI means for news sites, AI in social media, AI in publishing and AI art copyright. Extract from Chapter 11 - new book: How AI will Change Your Life - by Patrick Dixon, AI keynote speaker
- Super-Smart AI and a Reality Check. How Super-smart AI will become conscious, posing all kinds of new Super AI / AGI risks to future of humanity. Extract From Chapter 2 - New Book: How AI Will Change Your Life - by Patrick Dixon, AI keynote speaker
- Future of Surveillance using AI - and what 2030 Artificial Intelligence will mean for privacy and freedom. Next generation state surveillance, use and abuse by dictatorships and security services as well as private companies and individuals
- Life in the year 2100 with forecasts to 2120: why radically different to what most people expected back in 2050. Discover for yourself in New edition of The Future of Almost Everything. FEATURE / INTERVIEW
- Future of Artificial Intelligence. How AI will change jobs, manufacturing and health. Impact of AI on marketing, investment, banking, insurance, politics, government, warfare, consumer choices and how people think. Artificial Intelligence FEATURE
Older news items:
- Truth about Blockchain and BitCoins – impact of Blockchain on your industry, business and wider world. BitCoin and other cryptocurrencies - keynote comment
- Truth about Robots - will robots destroy millions of jobs? What future for human beings at work? Artificial Intelligence and Robotics Keynote Speaker
- How to make money from Big Data - and why LITTLE DATA is what really matters. Big Data spots a pattern - Little Data spots a person
- Future Retail, Consumer Tech and Big Data - Futurist Keynote for Samsung VIP clients - Marketing, Mobile customers - VIDEO
- Cloud Software, Big Data, Virtual Teams, Outsourcing, Future of Law Firms Keynote, Futurist Speaker
- Big Data in Health Care - Information Overload, self-service health care, med tech
- BIG Data, Privacy, RFID Tracking, Global Supply Chains
- Future Telcos and Digital, Cloud and Big Data - convergence, innovation, mobile customers and e-payments. Futurist keynote speaker on digital trends
- How Google+ and Google Circles will Change Your Business, Personal Life and Wider World
- Future Technology - videos, keynote lectures, slides, articles
- Future of Technology - imagine 2015 looking to 2020: European Parliament
- Clouds and Crowds: Seize your Digital Future. Future impact of Cloud Computing, innovation convergence, cybersecurity and other important business issues. Futurist Keynote Speaker
- Techno Innovation: IT growth strategies: service, productivity, cost control, security
- Convergence - impact on future world
- Clouds, Crowds, Convergency, Connections and Controls:IT GROWTH STRATEGIES
Thanks for promoting with Facebook LIKE or Tweet. Really interested to read your views. Post below.