Tyler Cowen passes along one:
A new technique of cybercrime is the taking hostage of data. “I think it’s going to become a more common tactic for attackers,” says Karen Schuler, Senior Managing Director of Kroll.
If the hostage taker has any credible threat then it remains credible whether or not I pay him because there is no way to prevent him from making arbitrary copies of the data. I can’t “buy them back” in any verifiable way.
The brochure (note that Kroll is a cybersecurity firm) talks about the threat of intellectual property data being stolen and the hostage taker threatening to sell it to my competitors. If you receive a call with such a threat the first thing you should do is sell your intellectual property to your competitors. There’s no way you are going to stop the thief from doing the same and you might as well get in on the profits.
On a similar note, these chartered jet passengers didn’t seem to understand the same point. (Ayam ack: Josh Gans)
5 comments
Comments feed for this article
November 18, 2011 at 12:16 am
phonebanshee (@phonebanshee)
I thought the normal scheme was more like a) deleting the data from your local storage, and then b) offering to sell you back a copy of what you no longer have.
November 18, 2011 at 9:52 am
k
I don’t get it, what would the passengers sell?
November 18, 2011 at 10:13 am
jeff
Sorry, bad order. The passengers should have assumed that if they are held up once they will be held up again.
November 18, 2011 at 11:23 am
alex
But if you go to your competitor, he will assume that someone has stolen the data, and will come to him very soon.
Then he just needs to wait for Bertrand competition to operate.
November 18, 2011 at 11:31 am
alex
Actually, when I think about it, it seems that the only credible mechanism is for the hostage taker to ask for the ransom to be paid gradually. At any point, the remaining stream of utility if he does not sell the data should be higher than what he can get by selling it to the competitor. Are there models that formalize this idea?