The Bonus Book of the Week is “Kingdom of Lies, Unnerving Adventures in the World of Cybercrime” by Kate Fazzini, published in 2019. This slim volume contained a few anecdotes of people who recently participated in schemes to defraud others or manipulate data on the World Wide Web.
The computer hackers who keep a low profile are better coders and have better technological knowledge than the ones who are attention whores. The latter who are employed in cybersecurity attend conferences and are more talk than action. Some of them think they’re the hero of a movie– do-gooders who are trying to save the world, in a power struggle with evil, arrogant rebels.
Over the decades, individuals and governments from lots of different countries have continually attempted to gain access to certain data through the Internet, usually for intelligence or money. For instance, “Chinese nationals have been stealing proprietary data on [mergers and acquisitions] deals [in America] for years in order to inside trade… The Department of Justice is investigating. The SEC is investigating. But the law firms are clueless. Then the SEC was hacked too, by the same people. The cycle continues.”
A trend that started in the 2000’s that has largely run its course is ransomware. That is, software that steals valuable data that forces the victim to pay a ransom– hundreds of dollars or more to the cybercriminal– to get that data back. In the last seven years or so, information-technology departments of businesses, especially in the financial sector, have thrown a vast quantity of money at specialists in cybersecurity to prevent further attacks in that area.
Probably the country that can crank out the best cybersecurity experts is Israel. Middle schoolers begin learning technology there. That nation’s population is small, enterprising, flexible, militarily trained, and is always thinking defensively.
Voting in United States elections is becoming more and more computerized, and so elections have become vulnerable to interference by hackers. It is not necessary to tamper with the presidential election results of all fifty states in order to significantly affect the outcome. A hacker need only change the data of battleground states (five to ten states) for a specific candidate.
Read the book to learn additional details about the world of cybercrime.