{"id":4659,"date":"2016-04-28T15:38:18","date_gmt":"2016-04-28T15:38:18","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=4659"},"modified":"2016-04-29T15:47:43","modified_gmt":"2016-04-29T15:47:43","slug":"its-the-year-2020-hows-your-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/its-the-year-2020-hows-your-cybersecurity\/","title":{"rendered":"It&#8217;s the year 2020&#8230;how&#8217;s your cybersecurity?"},"content":{"rendered":"<p><span><a href=\"http:\/\/theconversation.com\/profiles\/steven-weber-256972\">Steven Weber<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-california-berkeley\">University of California, Berkeley<\/a><\/em> and <a href=\"http:\/\/theconversation.com\/profiles\/betsy-cooper-253968\">Betsy Cooper<\/a>, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-california-berkeley\">University of California, Berkeley<\/a><\/em><\/span><\/p>\n<p>What if, in 2020, wearable devices did not care about how many steps you took, and instead were concerned with your real-time emotional state? With networked devices tracking hormone levels, heart rates, facial expressions, voice tone and more, the Internet could become a vast system of \u201cemotion readers,\u201d touching the most intimate aspects of human psychology. What if these technologies allowed people\u2019s underlying mental, emotional and physical states to be tracked \u2013 and manipulated?<\/p>\n<p>Whether for blackmail, \u201c<a href=\"http:\/\/www.cybercivilrights.org\/\">revenge porn<\/a>\u201d or other motives, cybercriminals and hostile governments in this world would find new ways to exploit data about emotion. The terms of cybersecurity would be redefined, as it became more important for people to manage and protect how their emotions and mindsets appeared to the monitors.<\/p>\n<p>This is just one of several potential future cybersecurity scenarios dreamed up by a group of multidisciplinary experts recently. Here at the <a href=\"http:\/\/cltc.berkeley.edu\">Center for Long-Term Cybersecurity<\/a>, we asked them to think about what we could see happening in the near future of 2020. These are not predictions \u2013 it\u2019s impossible to make precise forecasts about such a complex set of issues. Rather, the scenarios paint a landscape of future possibilities, exploring how emerging and unknown forces could intersect to reshape the relationship between humans and technology \u2013 and what it means to be \u201csecure.\u201d<\/p>\n<p>And they raise pressing questions we should consider today as we lay the groundwork for a secure information technology environment in the future: how might individuals function in a world when they are no longer able to ignore the fact that literally everything they do online will likely be hacked or stolen? How could the proliferation of networked appliances, vehicles and devices transform what it means to have a \u201csecure\u201d society? What would be the consequences of almost unimaginably powerful algorithms predicting individual human behavior at the most granular scale?<\/p>\n<h2>Imagining scenarios<\/h2>\n<p>At the heart of our approach is scenario thinking, a <a href=\"https:\/\/hbr.org\/2013\/05\/living-in-the-futures\">proven methodology<\/a> for identifying important driving forces and unexpected consequences that could shape the future. This approach often leads to more questions than answers, but what we identify can help guide us toward solutions as society and technology evolve.<\/p>\n<figure class=\"align-right zoomable\">\n            <a href=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/119715\/area14mp\/image-20160421-26983-1572bbu.jpg\"><img alt=\"\" src=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/119715\/width237\/image-20160421-26983-1572bbu.jpg\"><\/a><figcaption>\n              <span class=\"caption\">In 2020, will we all be wearing this many biosensors? What might they measure?<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.flickr.com\/photos\/doctorow\/15659135172\/\">doctorow\/flickr<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>In our scenario about emotion-sensing, for example, many questions arise:<\/p>\n<ul>\n<li>How might biosensing technologies evolve, and what would be the effect of having sensors tracking massive numbers of individuals&#8217; emotions and mental states?<\/li>\n<li>How will people respond when their most private and intimate experiences are understood by the Internet better than they themselves understand them?<\/li>\n<li>How might virtual reality, sentiment analysis, wearable devices and other \u201csensory\u201d technologies intersect with domains such as marketing, politics and the workforce?<\/li>\n<li>What are the potential cybersecurity risks and benefits that could come with the proliferation of sensors capable of capturing and interpreting emotions?<\/li>\n<\/ul>\n<p>Our broad interdisciplinary group of experts on computer science, political science, neuroscience and other areas came from universities, the private sector, nonprofits and governments. They helped us develop that scenario, and four others, for the year 2020.<\/p>\n<h2>Cybersecurity in hard economic times<\/h2>\n<p>For example, imagine that two decades after the first dot-com bust, the advertising-driven business model for major Internet companies has fallen apart. As overvalued web companies large and small collapse, criminals and companies alike race to gain ownership of underpriced but potentially valuable data assets. It\u2019s a \u201cwar for data\u201d under some of the worst possible circumstances: financial stress and sometimes panic, ambiguous property rights, opaque markets and data trolls everywhere.<\/p>\n<p>In this world, cybersecurity and data security become inextricably intertwined. There are two key assets that criminals exploit: the datasets themselves, which become the principal targets of attack; and the humans who work on them, as the collapse of the industry leaves unemployed data scientists seeking new jobs. The questions that arise are difficult:<\/p>\n<ul>\n<li>How might cybercriminals adapt to a more open and raucous data market?<\/li>\n<li>If governments want to prevent certain datasets from having a \u201cfor-sale\u201d sign attached to them, what kinds of options will they have?<\/li>\n<li>What new systems or standards could emerge to verify the legitimacy or provenance of data? What does \u201cbuyer beware\u201d look like in a fast-moving market for data?<\/li>\n<li>What role should government play in making markets for data more efficient and secure?<\/li>\n<\/ul>\n<h2>What comes next?<\/h2>\n<p>This is just the beginning. In one of our other scenarios, we imagine that hackers have become so successful that the public\u2019s default expectation about Internet transactions flips from \u201cwe are basically safe\u201d to \u201cwe are going to have our data stolen.\u201d Another looks at the potential of predictive algorithms: if those improve to be able to predict individual behavior, all sorts of new attacks might occur. Still another looks at the Internet of Things, suggesting that governments may lead the way in IoT adoption \u2013 and could become both more effective and more vulnerable as a result.<\/p>\n<p>The world in 2020 could look very different from today. Our scenarios are designed to serve as a starting point for conversation and debate among academic researchers, industry practitioners, and government policymakers. We invite the public to join us as well; please <a href=\"https:\/\/cltc.berkeley.edu\/scenarios\/\">read the full-text scenarios<\/a> and engage with them on Twitter (<a href=\"http:\/\/twitter.com\/cltcberkeley\">@cltcberkeley<\/a>). We look forward to building a better cybersecurity future with you.<\/p>\n<p><img loading=\"lazy\" alt=\"The Conversation\" height=\"1\" src=\"https:\/\/counter.theconversation.edu.au\/content\/57868\/count.gif\" width=\"1\" \/><\/p>\n<p><span><a href=\"http:\/\/theconversation.com\/profiles\/steven-weber-256972\">Steven Weber<\/a>, Professor of Information, Professor of Political Science, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-california-berkeley\">University of California, Berkeley<\/a><\/em> and <a href=\"http:\/\/theconversation.com\/profiles\/betsy-cooper-253968\">Betsy Cooper<\/a>, Executive Director, Center for Long-Term Cybersecurity, <em><a href=\"http:\/\/theconversation.com\/institutions\/university-of-california-berkeley\">University of California, Berkeley<\/a><\/em><\/span><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>. Read the <a href=\"https:\/\/theconversation.com\/its-the-year-2020-hows-your-cybersecurity-57868\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Steven Weber, University of California, Berkeley and Betsy Cooper, University of California, Berkeley What if, in 2020, wearable devices did not care about how many steps you took, and instead were concerned with your real-time emotional state? With networked devices tracking hormone levels, heart rates, facial expressions, voice tone and more, the Internet could become [&hellip;]<\/p>\n","protected":false},"author":40,"featured_media":4660,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[291,28],"tags":[614,612,613,525,617,616,615],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/4659"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=4659"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/4659\/revisions"}],"predecessor-version":[{"id":4661,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/4659\/revisions\/4661"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/4660"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=4659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=4659"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=4659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}