CYBER OF THINGS 2.0

If you know the enemy and know yourself, you need not fear the result of a hundred battles

-Sun Tzu

Sharing some pointers wrt some present trends and tactics in the cyber domain and threat intel as law enforcemnt agencies (LEA) perspective. The following information has been taken from some open source reliable vendors and SMEs.

Cybercrime is an evolution, NOT a revolution and also the subject matter of State/Uts in India. Since the past decade, social media networking (SMN) has become an essential part of everyone’s life affecting the cultural, economic and social life of the people. These social networking sites are attracting users from all walks of life and keeping these users’ data in the cloud. Today’s big challenge is related to an increase in volume, velocity, variety and veracity of data in social media networking, and this leads to creating several concerns, including privacy and security; on the other hand, It also proves as a tool to prevent and investigate cybercrime, if intelligently and smartly handled. The law enforcement agencies are putting their utmost efforts to prevent cybercrime by monitoring communications activities over the Internet.

As time passes, the cyber-element of cybercrime infiltrates nearly every area of criminal activity.

Cybercrime does not remain static for long. Opportunities constantly arise from technical and social innovations, with hackers finding new ways to exploit the latest browsers, eCommerce sites or mobile computing devices. It is no different for social media. The power of social media platforms is based upon their capacity to connect users in new ways and create new avenues for interaction. For individuals, enterprises and governments, they facilitate new pathways for reaching an audience, promoting a product and fostering communities. Social media platforms are equally attractive to cybercriminals. Yet the growing range of criminal risks encountered across social media remains significantly under-researched. ‘

Social Media Is the Powerful Weapon in Modern Warfare 
-D3

As we know Social media intelligence (SMI or SOCMINT) refers to the collective tools and solutions that allow organizations to and conversations, respond to social signals and synthesize social data points into meaningful trends and analysis based on the user’s needs. SOCMINT info in nutshell:

When talking about malware perspective and threats, the majority of social engineering and phishing attacks are successful due to inadequate security measures or insufficient awareness of users. Once criminals gain a foothold on victims’ networks, which can be done in various ways, they explore the networks and exfiltrate data, before delivering the ransomware. If the victim fails to pay the ransom demand, attackers will post the victim’s sensitive data online or sell it to the highest bidder.

In addition to mobile intenret messaging app, the use of encrypted chat apps and industry proposals to expand this market poses a substantial risk for abuse and make it more difficult for law enforcement to detect and investigate online activities.

To respond to the cybercrime challenges in a more effective manner, a number of key ingredients are essential. First, information sharing is at the heart of any strategic, tactical and operational response regardless of the specific type of cybercrime. Sharing information, which needs to be purpose-driven and actionable, requires reliable coordination and cooperation from the public and private partners.

To access the complete presentation may find: https://www.slideshare.net/Deepakniit14/cyber-of-things-20

Thanks to CRCIDF team and readers.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.