Will You Be To Help the Next Victims?
- A terrorist loads a self-driving car with explosives and programs it to drive to your local high school stadium to detonate during a football game.
- You are using your new smart home controller to make online purchases and conduct banking transactions, but someone else has access to all of the data being transmitted.
- A hacker takes wireless control of the car being driven by your wife and slams on the brakes while she is driving on a high-speed freeway.
- A nurse’s tablet connected to the unsecured Wi-Fi in your doctor’s office is tapped and the medical records for your entire family are stolen.
- Your office computer network has been infected with ransom ware that encrypts all of your data unless you pay a ransom with Bitcoin. There is no way to trace the suspect.
- Your father’s pacemaker is infected with a virus and suddenly stops working. He dies.
- A drone with video cameras, microphones and GPS is stalking your daughter.
- Your home security camera captures video of a robot breaking in to steal your computer and jewelry. Your local police department can do nothing because no law exists to prosecute a machine.
- A group of hackers penetrated your organization’s computer network months ago. In addition to stealing the original data, they are consistently changing it. Could your company ever recover?
- Your DNA has been collected, cloned and left at the scene of a crime. What will you do when the police knock on your door with an arrest warrant?
- A bio-assassin targets a famous CEO’s unique DNA with a genetically-engineered version of the Ebola virus. The bio-assassin’s client shorts the company’s stock just before the CEO’s death and makes millions.
- You enjoy your parallel life in a virtual reality world, but some of your virtual funds have just been stolen. Will real-world laws apply, and who has legal jurisdiction to investigate?
- The most valuable data of your organization is stolen and transferred to be stored on a satellite, a moon or even another planet (we call this “Cosmos Computing,” which is the next step beyond Cloud Computing). Few, if any, law enforcement agencies would even know where to begin.
- Grandmother gave your daughter a new connected doll for her birthday. The doll uses voice recognition and artificial intelligence to allow the doll to “converse” with your daughter. But a predator has intercepted the wireless signal and is now talking to your daughter.
- Drug dealers and weapons merchants now sell their products on Darknets, which are parts of the Internet that you have never seen. It may be impossible for investigators to find them, arrest them, or to trace the funds used for purchases.
- The wireless signal between your smart watch and phone was hacked, and the motion sensor in the watch gave the attacker your ATM PIN.
- Your tablet’s mobile banking app has been infected with malware, giving the criminal your banking login, and changing the tablet screen to show only the legitimate transactions and the expected account balance, while your account is being drained and transferred to another country.
- Your girlfriend is being stalked by multiple drones. One tracks her car via a GPS transmitter attached to the car, another points a camera into her apartment window, while a third drone follows her during her morning jog.
- A terrorist group is using 3D printing technology to print automatic weapons. The plans were published on the Internet for use by anyone in the world.
- The War on Drugs will become impossible when 3D printing evolves to allow manufacturing of any drug or medication.
- Science has determined that brainwaves can be intercepted and hacked. What could possibly go wrong?
Why You Should Be Worried
- Technology makes it easier for the crooks to find and target you.
- Existing law may not cover new types of techno-crimes.
- Law enforcement may not have the resources to help you.
- We don’t have enough techno-crime specialists to satisfy the demand.
- No investigator can keep up with the rapid changes in every area of technology.
- Governments and companies are not prepared for new techno-crime threats.
Want more details? Visit the TCI Blog
Or join our mailing list below!