国产视频

In Short

True (Cyber) Detectives

Why people are the essential tool to fight cyber crime.

True Cyber Detectives

In early 2014, while manually digging through data logs, one of the cyber analysts at my company noticed some suspicious activity on one of our client鈥檚 laptop. This particular device was active at a time of day when we knew it should have been idle鈥娾斺奱t this point, the customer support team had a baseline of the client鈥檚 device and network traffic and knew what was 鈥渘ormal鈥 or abnormal. The volume of traffic looked innocuous, but the frequency was suspicious: The same event log had occurred at the exact same time each day for the past two weeks, suggesting that this was being caused by an automated script making regular connections to its command and control server. We ultimately determined this was, in fact, a malicious program hiding on the client鈥檚 device attempting to exfiltrate data. But the corporate cyber intrusion detection system we had in place at the client鈥檚 home never picked this up. It was our analyst who pieced this together.

This was hardly the first time that a human found something a system overlooked. That鈥檚 in part because at that time, as we were discovering the importance of humans to the work of cybersecurity, we were also learning that the cyber solutions that worked for big corporations just didn鈥檛 work for our client base of high-net worth individuals and families. Changes that could indicate a security threat for an individual are usually disregarded as mere noise by corporate systems that are built to monitor thousands of people.

But as individuals increasingly become targeted, it鈥檚 become critical to think differently about how we design cybersecurity systems. For us, that鈥檚 meant putting people at the center of everything we do, because humans are at the center of cyber crimes. Cyber criminals have figured out that hacking a human is easier than hacking the tech鈥娾斺奱nd the end payouts are just as lucrative. We鈥檝e seen, for instance, an explosive rise in wire transfer fraud and financial theft enabled through manipulating and deceiving people via email.

But as individuals increasingly become targeted, it鈥檚 become critical to think differently about how we design cybersecurity systems.

Here鈥檚 a true story of how it happened, from one of my clients (before he became a client). He was a retired executive living in the Midwest whose email account was hacked. The hackers sifted through his inbox and sent folder to learn about past communications and transactions with his banker, discovering his usual protocol for initiating wire transfers, what language he used, how he signed messages, etc.. Using that information, the cyber criminals crafted a convincing email to the banker from the executive鈥檚 account, asking for $700,000 to be transferred. The criminals also knew that, upon receiving the email, the banker would call the client to get verbal authorization for the wire. So, before hitting send on the email, they called the client鈥檚 phone provider, which they also found from old emails. Pretending to be the client, they asked to forward all calls to their number and provided all the necessary personal info to make changes on the account. Then when the banker did the call-back (which he did) the cybercriminal answered and pretended to be the client, authorizing the wire. A day or so later the client realized he hadn鈥檛 been receiving any calls or texts, and started to unravel what had happened.

Cybercriminals are always looking for new ways to get to our data, our money, our devices. Every time we come up with a technical fix, they will find a new vulnerability, a new way in鈥娾斺奺ven advanced tools like A.I. and machine-learning systems are no silver bullet. There are human criminals behind every cyber breach increasingly targeting people on the other side. And so there must be humans on defense鈥娾斺奵omplementing the technological solutions. At Rubica, our edge鈥娾斺妎ur ability to adapt, think outside the box, and stay ahead of the bad guys鈥娾斺奿s our people. A key factor in this is the diversity of our team. Diversity of perspective breeds innovation, creative problem-solving and better outcomes. By purposefully designing a work environment that鈥檚 inclusive, fosters creativity, and rewards proactiveness, we can see new dimensions of possibility (for both problems and solutions) and avoid blind-spots bred by homogeneous group-think.

Naturally, we鈥檒l continue to deploy the most advanced tech and tools available. But our main cyber security investment will be in people.

More 国产视频 the Authors

Frances LeSourd Dewing
True (Cyber) Detectives