Crime IV
When Everyone Becomes Blackmailable
On a recent driving trip, my wife and I became immersed in the audio version of one of Tom Clancy’s last novels titled, “Threat Vector.” Without giving away too much of the plot, a Chinese super-geek villain has hatched a plan to hack into our most secure networks and blackmail people with their darkest secrets to subversively cause chaos and disruption for the American government.
While most good authors have devious ways of thinking like a criminal, Clancy does an exceptional job of crafting this storyline as a plausible threat.
For many of us, our reputation is one of the most important aspects of our lives. It’s central to everything we do.
Every time a TV courtroom drama plays out, whether it’s a trial featuring Eliot Spitzer, Martha Stewart, Clarence Thomas, or Monica Lewinsky, we instantly identify with the most embarrassing pieces of the testimony because it could easily be us. We are all terminally human, with enough of our own character flaws to make us the center character of a juicy reality show.
Recent revelations about the NSA PRISM program make this kind of paranoia even more justifiable. Virtually any person, put under a microscope, can be threatened with his or her own character flaws.
But an even greater danger comes from knowing personal weaknesses, and in most cases, it’s the person or thing we care about most. People seeking leverage always want to know the one button they can push, and whether it’s a child, parent, valuable possession, or their reputation, one well-crafted threat can be instant blackmail.
In much the same way Google’s personalized marketing system delivers targeted ads, an intimidation engine will be capable of delivering highly targeted threats.
As cyber crime escalates, we run the risk of having our social structures deteriorate into invisible mafia-style communities with the blackmailers ruling the blackmailees, and few, if any, capable of understanding the behind-the-scenes turf wars?
Basic Human Right – The Right to be Forgotten
Ever since the European Union’s top court ruled in May that individuals have a “right to be forgotten,” tech companies have been scrambling to comply with the new rules.
Google, as example, has received over 70,000 takedown requests from individuals who want 250,000 webpages removed from Google’s search results. This is requiring tons of human effort and manpower. Each request gets individually reviewed, and Google now plans to hire more staff to handle the extra workload.
But Google is not alone. Virtually every tech company is being forced to rethink their strategy. Not only do people have the “right to be forgotten,” they also have the perceived right to be positively remembered. As a result, we are seeing a massive surge in reputation management and consulting businesses to do just that, clean up our reputation.
Reputation Management – The Hot New Industry
Ever since word got out that prospective employers were scanning Facebook and Twitter before hiring someone, people started paying more attention to their online image. But the EU ruling added something akin to turbo boosters to the already fast moving reputation industry.
Reputation experts extend the work of yesterday’s publicists and image consultants deep into the highly nuanced digital world. Firms are now dedicating full-time resources to not only manage things that reflect negatively on a person’s character, but also work overtime to bolster the upside of their virtual rep.
For a fee that can amount to thousands of dollars a month, reputation professionals take on clients and scrub clean their search results with a wide range of techniques, that often include creating search engine-optimized content that dominates the first few pages of specific search results on Google, Bing, and Yahoo.
Clients ranging from CEOs of major corporations, to celebrities, lawyers, doctors, chiropractors, and restaurant owners all use these services to whitewash the negative and amplify the positive. According to media consultant BIA/Kelsey, small and medium-size businesses will spend $3.5 billion managing their online reputations in 2014.
The Need for Blackmail Insurance
Kidnap and ransom insurance, K&R, was first introduced by Lloyd’s of London in 1932 after the kidnapping and murder of Charles Lindbergh’s son. But, the policies didn’t get much attention until the mid-1970s when the famous newspaper heiress Patty Hearst was kidnapped.
Nowadays most large companies include K&R coverage as part of their insurance portfolio, and it’s especially popular among those who plan to expand internationally.
Blackmail is similar to kidnap and ransom because it involves holding someone’s reputation, identity, or family hostage digitally, with threats of harm if the victims fail to comply.
With cyber crime reaching epidemic levels in many parts of the world, most offenders have managed to stay one step ahead of the law. At the same time, cyber crime itself is evolving.
Last week, police in the Philippines arrested 44 Taiwanese who ran an online blackmail syndicate used to defraud victims in China and Taiwan by duping them into thinking their bank accounts had been used by terrorists to launder money.
A recent Ponemon study, that gained attention at the 2014 World Economic Forum, stated the average time to resolve a cyber attack in 2013 was 32 days, with an average cost to participating companies of a little more than $1 million during that timeframe. Compared to 2012, this was a 55% increase over the average cost of $591,780 and 24-days to resolve.
Both the size and scope of these claims represents a huge opportunity for the insurance industry, and blackmail problems will soon be one of the fastest growing of all cyber crimes.
Final Thoughts
If someone threatened your child, either you deliver $2 million in jewelry and a certified hand-written bill of sale or your child will die, what would you do? Yes this may be an easy scenario to circumvent, but from a criminal standpoint, it only needs to work a small percentage of the time.
After spending several years considering the privacy vs. transparency debate, I see two of the most dangerous implications of our dwindling privacy as:
1. Losing our ownership ability
2. Becoming an easy blackmail target
As we move towards a radically transparent world, where everything is knowable about everyone, we lose our ability to even control our credit cards, bank accounts, and everything we own.
The implications of this are that ownership of anything valuable, can easily be stolen electronically. Since some of our most engaging and influential members of society are also held to a high transparency standard, our desire to know more about them and how they live makes them extremely vulnerable.
It’s no longer just Tom Clancy devising evil blackmail schemes. One person’s possessions, credit, influence, or leverage is almost certain to be another person’s blackmail opportunity.
So do we run the risk of having society deteriorate into the invisible mafia-style communities with the blackmailers ruling the blackmailees? The answer is yes, unless we act quickly.
From my vantage point, it’s easy to predict us reaching some crisis point in the very near future. A well-publicized incident will cause global outrage, and countries will band together to form an international task force, similar to a Geneva Convention, focused specifically on privacy. The implications of a global privacy task force like this will be huge, with global policing of violators and a dramatic shift in the rules for online business.
But for most of us, it boils down to timing. Without quick intervention, our risk of personally falling victim to some form of blackmail will soon reach 100%.
If you or someone you know has already been the victim of a digital blackmail scheme, please let me know. We are currently trying to compile more statistics in this area.
By Futurist Thomas Frey
Author of “Epiphany Z – 8 Radical Visions for Transforming Your Future”
Features Archive
- Green Energy
- Climate Change III
- Climate Change II
- Farming II
- Farming
- Banking VI
- Banking V
- Banking IV
- Politics III
- Politics II
- Politics
- AI Ethics IV
- AI Ethics III
- AI Ethics II
- AI Ethics
- Waste III
- Medicine
- Water IV
- Water III
- Creativity
- Solar Energy II
- Solar Energy
- Fashion
- Fashion II
- Humans IV
- Humans III
- Humans II
- Humans
- Money V
- Money IV
- Money III
- Money II
- Money
- Urban Futures II
- Urban Futures
- Ageing II
- Ageing
- Space IV
- Space III
- Space II
- Space
- Governments
- Metaverse IV
- Metaverse III
- Metaverse II
- Metaverse
- Technology III
- Technology IV
- Technology II
- Privacy III
- Privacy II
- Privacy
- Meat IV
- Meat III
- Meat II
- Meat
- Housing III
- Housing II
- Housing
- Retail
- Insurance
- Logistics II
- Logistics
- Mobile II
- Security III
- Security II
- Language II
- Tourism Post-Covid-19
- Entertainment Post-Covid-19 II
- Entertainment Post-Covid-19
- Cities Post-Covid-19
- Work Post-Covid-19 III
- Work Post-Covid-19 II
- Work Post-Covid-19
- Post-Covid-19 Economy II
- Post-Covid-19 Economy
- Education Post-Covid-19 II
- Education Post-Covid-19
- Post-Covid-19 V
- Post-Covid-19 IV
- Post-Covid-19 III
- Post-Covid-19 II
- Post-Covid-19
- Pandemics V
- Pandemics IV
- Pandemics III
- Pandemics II
- Pandemics
- Food II
- Food
- Futures V
- Futures IV
- Cars V
- Cars IV
- Cars III
- Cars II
- Cars
- Futures III
- Futures II
- Futures
- Education XI
- Education X
- Education IX
- Cities VI
- Cities V
- Cities IV
- AfriCities VIII
- AfriCities VII
- AfriCities VI
- AfriCities V
- AfriCities IV
- AfriCities III
- AfriCities II
- Youth II
- Migrants II
- Foresight IV
- Foresight III
- Higher Education VII
- Agriculture VII
- Work III
- Work/Women
- Cities III
- Carbon Tax
- Higher Education VI
- Higher Education V
- Higher Education IV
- Higher Education III
- Higher Education II
- Higher Education
- Banking III
- Banking II
- Banking
- Humanity VII
- Humanity VI
- Humanity V
- Humanity IV
- Humanity III
- Women V
- Digitalisation of Informal sector
- Islamic Economy
- Drones VII
- Drones VI
- Drones V
- Drones IV
- Drones III
- Drones II
- Drones
- Digital Health III
- Digital Health II
- Digital Health
- Transport IV
- Transport III
- Transport II
- Transport
- Infrastructure V
- Infrastructure IV
- Infrastructure III
- Crime V
- Crime IV
- Crime III
- Crime II
- Crime
- Agriculture VI
- Agriculture V
- Agriculture IV
- Agriculture III
- Agriculture II
- Women IV
- Women III
- Women II
- Women
- Humanity II
- Humanity
- Artificial Intelligence V
- Artificial Intelligence IV
- Artificial Intelligence III
- Universal Basic Income
- Alternative Economies V
- Alternative Economies IV
- Foresight II
- Alternative Economies III
- Additive manufacturing
- Artificial Intelligence II
- AI Risk, Ethics & Regulation
- Waste II
- Mining II
- African Futures IV
- Education VIII
- Justice
- Libraries III
- Libraries II
- Libraries
- Education VII
- Education VI
- Education V
- Green Energy II
- Financial Systems III
- Education IV
- Alternative Economies II
- Research
- Education III
- Artificial Intelligence
- Economic Integration II
- Health Inequity
- Invisible Economy
- Future Thinking
- Pan Africanism VII
- Infrastructure
- Financial Systems
- Sustainability III
- Sustainability II
- Alternative Economies
- Water II
- Mega Trends 2015, 2010s, 2100s?
- AfriCities
- Energy
- Sustainability
- Families
- Prisons II
- Prisons
- Work II
- Work
- Health II
- Pan-Africanism VI
- African Futures III
- African Futures II
- African Futures
- Economic Integration
- Climate Action III
- Manufacturing
- Green Economy
- Climate Action II
- Climate Action
- Foresight
- Ethnicity & Tribalism
- Pan-Africanism V
- Youth Policy II
- Gender Equality II
- Gender Equality
- Youth Policy
- Migrants
- Waste
- Pan-Africanism IV
- Pan-Africanism III - East Africa
- Pan-Africanism II
- Pan-Africanism
- Philanthropy
- Renewable Energy III
- Renewable Energy II
- Renewable Energy
- Informal Cities III
- Informal Cities II
- Informal Cities
- Human Development
- Security
- Global Engaged Citizens - Upskilling for Post Growth Futures, Together
- System Thinking - Systems thinking and courage
- Thrivability II - New Movements
- Thrivability - Bottom Line to Full Circle
- Youth Unemployment
- Food Insecurity II
- Food Insecurity
- Language
- Globesity
- Kenya II
- Kenya
- Mining
- Infrastructure II
- Women & Poverty II
- Women & Poverty
- Cities II
- Cities
- Innovation
- Climate Change
- Agriculture
- Books
- Youth
- Mobile
- Regional Integration IV
- Regional Integration III
- Regional Integration II
- Regional Integration
- Fresh Water
- Education II
- Health
- Education
- Leisure
- Urban Poor
- Economy
- Peace
- Women
- Technology
- Environmental
- Democracy
- The brief called for a blog
- Post-oil
- Game Changers