- Home >
- Services >
- Access to Knowledge >
- Trend Monitor >
- Type of Threat or Opportunity >
- Trend snippet: In the biological, physical and digital domain, new technologies are rapidly developing
Trends in Security Information
The HSD Trendmonitor is designed to provide access to relevant content on various subjects in the safety and security domain, to identify relevant developments and to connect knowledge and organisations. The safety and security domain encompasses a vast number of subjects. Four relevant taxonomies (type of threat or opportunity, victim, source of threat and domain of application) have been constructed in order to visualize all of these subjects. The taxonomies and related category descriptions have been carefully composed according to other taxonomies, European and international standards and our own expertise.
In order to identify safety and security related trends, relevant reports and HSD news articles are continuously scanned, analysed and classified by hand according to the four taxonomies. This results in a wide array of observations, which we call ‘Trend Snippets’. Multiple Trend Snippets combined can provide insights into safety and security trends. The size of the circles shows the relative weight of the topic, the filters can be used to further select the most relevant content for you. If you have an addition, question or remark, drop us a line at info@securitydelta.nl.
visible on larger screens only
Please expand your browser window.
Or enjoy this interactive application on your desktop or laptop.
In the biological, physical and digital domain, new technologies are rapidly developing
Technological acceleration.
New technologies are developing rapidly in the biological, physical and digital spheres. Deloitte’s Tech Trends report highlights some of the latest developments, but of particular importance are artificial intelligence and the emergence of cyber-physical systems that link physical and digital worlds. These new technologies not only bring new ways of delivering services but they also can bring new forms of crime as well. To take one example, consider the potential criminal exploitation of Artificial Intelligence for:
- Identity Forgery. AI methods can generate speech in a target’s voice given a sample and couple it with synthesized video of them speaking. Criminals have already used this technology to impersonate a senior executive’s voice, bilking a UK-based energy company of hundreds of thousands of dollars.19
- AI Snooping: Phones, PCs, TVs and Home Hubs provide the sensors for audio snooping inside homes, while drones provide video surveillance opportunities in public spaces. Speech Recognition can sift the resulting data for exploitable fragments (e.g. passwords or bank details, affairs being admitted to).
- Hacked Vehicles: Hacking to crash a driverless truck may not be a likely crime for most cyber criminals since there is no money in it, but even though rare, this type of crime could be attractive to terrorists seeking no other benefit than to kill or maim.
Such crimes can be partially ‘designed out’, building on what we have learned about how to do this effectively over recent history (for example, to reduce car crime). But the accelerating pace of technological and social change places a new emphasis on the speed of reaction. The development of new domains of internet activity (darknets) and crypto currencies also creates new crime challenges. And the break-down of the boundaries between physical and virtual world, and public and private spheres creates greater levels of systemic risk.