Transcript
A (0:01)
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at meter.com CST welcome to Cybersecurity Today on the weekend. My guest is Tammy Harper. She's a senior threat intelligence researcher with Flare. You can find them at fl. Now, you might have caught the last show that Tammy did with me, which was an overview of ransomware. It covered how it works, but it especially focused on the players and how they operate. If you haven't seen that, you should. There's a link in the show Notes at Tech Newsday, CA or dot com, take your pick. It's under podcasts and check it out if you can. But today, Tammy has brought us something new. Welcome, Tammy.
B (0:59)
Hello. Thank you for having me again.
A (1:01)
Oh, glad to have you back. So this is a surprise because I haven't seen what you're going to show us. But before we go, because some of the audience may not know you, if they don't, they should tune in because you're a regular guest on our monthly review and we do shows like this. But can you just tell us a little bit about yourself and what a senior threat intelligence researcher does?
B (1:21)
Absolutely. I work for Flare. And what a senior threat intelligence researcher does is we are in the trenches on the dark web, on the deep web, on the clear web. And essentially we are always learning about the latest tactics and techniques and procedures that the threat actors and the bad guys are doing. And we basically curate this intelligence for people to use so they can better defend themselves. It is very much hands on and in the trenches. Absolutely. Great.
A (1:55)
And so what have you got for us today?
B (1:56)
I want to present to you and to your fantastic audience, basically a lecture that I put together for Flare Academy a couple months ago. And so this one talks about its concepts and ideas of what the future of cybercrime is going to look like. So this is going to look at like the next year to five years and we're going to look at different pillars. So we're going to look at basically extortion, ransomware, artificial intelligence, quant. So we're really going to try to look at what each pillar is going to evolve into and what we can potentially see. And so far there's already been some of these predictions have already come true. I'm very excited to present this to you. So a little bit more about myself. So I'm a cat mom, I love photography. I'M a huge astronomy nerd, and I love techno. I also love running and playing badminton and tennis. I'm part of a few clubs here in town, and I just love doing that. So I want to start off by this really good quote that puts it together for the first pillar, which is the underground. And so this is. So this quote says, whenever there is authority, there is a natural inclination for disobedience or to disobedience. And this is by Thomas Chandler Heliburton. He was a Nova Scotian politician and judge and author from 1796 to 1865. And I think that's a really good quote, right, To. To sum up what the underground can be. Because the underground is a. Basically a counteraction to what the mainstream is. And however the mainstream is doing it, the underground is going to do it a different way, for good or for bad. So let's have a look at the first pillar, which is the underground. So I want to take a step back and look at different types of undergrounds. And back during the 1980s, during the Soviet nalevo, which means the left, which is a different type of black market or black economy or underground economy that was thriving during the Soviet era. During the. This time, the main government, the mainstream, essentially establishment, couldn't necessarily supply everything that individuals needed. So what really started off was this second economy that essentially allowed individuals to barter favors to each other. And so if you needed, for example, something that would. You would need, like, parts for your farm equipment or something like that, and you knew a friend that was working in a factory, like, getting. You would get your parts directly from your friend that worked at the parts factory or at the manufacturer. If you needed, like, bread or if you needed, like, meat, or if you needed anything, really, you would just get it from someone that you knew. So this really became a favors market. And it's very much this second economy, right? And it bypassed, like, the government or the actual establishment of things. This is something that we see today with counterfeit goods, and we still see that today with bartering. We see it like, with, like, marketplaces, right? With Craigslist and Facebook and a whole bunch of different places. This is not a new econ, a new concept. It's the secondhand economy. It's the secondhand marketplace, right?
