Who Will Control the Future, Black Hat Hackers or the Hacked?



The modern world continues to change and change rapidly. The number of inventions and patents, the number of people and the number of societal vulnerabilities we face all continue to expand at an accelerating rate. Information now is doubling in less than a year’s time. Societal laws and regulations have an increasingly difficult time keeping up with new technologies that are enabled by our communications and information networks. This chapter explores the new electronic technologies that are creating an increasingly sophisticated yet vulnerable world in which cyber-crime, cyber-terrorism, and disruptive technologies makes life ever more challenging. The world of knobots, the Internet of things, holo-lens, and artificially intelligent servants enmeshed in our lives will provide new opportunities and challenges. This chapter seeks to identify some of these future digital challenges and provide strategies to cope with them.


Smart Grid Smart Phone Cloud Provider Executive Order Virtual Private Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
  2. 2.
    Joseph N. Pelton and Firooz Allahdadi (editors), Introduction, Chapter 1, Handbook of Cosmic Hazards and Planetary Defense (2015). Springer Press, New York.Google Scholar
  3. 3.
    Richard Stiennon, “Should We Abandon Digital Certificates, Or Learn to Use Them Effectively?”, Forbes, May 14, 2013.
  4. 4.
    Max Anderson, “Bank-Hacking Ring Many Have Stolen $1 Billion,” Washington Post, February 16, 2015, P. A3.Google Scholar
  5. 5.
    Cliff Skolnick, Wireless LANS Security Issues and Solutions.
  6. 6.
    “Top five cloud computing security issues,”, April 24, 2009.
  7. 7.
  8. 8.
    Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology, February 12, 2014.
  9. 9.
    Cyber Security: Defending SCADA and Industrial Control Systems, Los Alamos Technical Associates, White Paper No. 2, Global Institute for Security and Training, 2014, p. 12.Google Scholar
  10. 10.
    Reuters, “U.S. To Create New Cybersecurity Agency: Official,” February 10, 2015.
  11. 11.
    Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology, February 12, 2014.
  12. 12.
    Smart Grid Homepage – National Institute of Standards and Technology,
  13. 13.
    Ryan Naraine, “Firefox tops list of 12 most vulnerable apps,” Zero Day, December 15, 2008.!.
  14. 14.
    Apple Invents Facial Recognition Locking & Unlocking System, September 20, 2012.
  15. 15.
    Gary Mazo, “How to set up Face Unlock on your Android phone,” July 14, 2012.
  16. 16.
    Debra Donston-Miller, “The Internet Of Things Poses New Security Challenges,” February 25, 2014.
  17. 17.
    Jessi Hempel, “Microsoft in the Age of Satya Nadella,” Wired, February 2015.

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Executive Board International Association for the Advancement of Space SafetySpace and Advanced Communications Research InstituteArlingtonUSA
  2. 2.LATA’s Global Institute for Security TrainingLos Alamos Technical AssociatesMcLeanUSA

Personalised recommendations