{"id":57740,"date":"2015-11-27T00:00:00","date_gmt":"2015-11-26T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/how-cybercrime-is-overtaking-physical-crime\/"},"modified":"2021-03-24T15:01:14","modified_gmt":"2021-03-24T13:01:14","slug":"how-cybercrime-is-overtaking-physical-crime","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/","title":{"rendered":"How cybercrime is overtaking physical crime"},"content":{"rendered":"<p>Forget everything you thought you knew about crime. In the next 10-20 years, crime as we know it today will have been largely replaced by cyber crime. According to recent statistics provided by Intel, we\u2019re moving from 15 billion connected devices today to a whopping 200 billion by the year 2020. That&#8217;s an insane number of devices that can be hacked, making us increasingly vulnerable. In fact, our modern world is like a digital house of cards that could come crashing down if we don\u2019t take precautions. We\u2019re facing security threats that were completely unimaginable 10 years ago, posing an existential threat to society.<\/p>\n<h2>The Internet of Things is already under attack<\/h2>\n<p>You\u2019d be surprised at how few people are aware of the fact that each and every connected device we use is hackable. Your kids\u2019 gaming console may seem like a harmless device, but consoles have already been hacked for spying purposes. DVRs and fridges have been sabotaged to enable Bitcoin mining, relaying spam and even participating in DDoS attacks \u2013 all via malware. Cyber criminals are increasingly targeting specific devices and they use the power of the Internet of Things to facilitate these criminal acts<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-31463 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/cybercrime-iot-1.jpg\" alt=\"Digital globe floating above hand\" width=\"801\" height=\"400\"><\/p>\n<h2>Cyber extortion with ransomware<\/h2>\n<p>Ransom is a very effective extortion tool that\u2019s as old as time. With all aspects of our lives connected to online platforms and accounts at home as well as at work, whether social or financial, we are more vulnerable to extortion now than we\u2019ve ever been before. Extortion is no longer only about creepy phone calls with demands for ransom payments. Anybody who has the ability to gain access to your accounts has the opportunity to extort us and demand ransom payments. These attacks are also called \u2018ransomware\u2019 and are already taking place in the US and Europe. The virus used for these attacks is called the \u2018cryptolocker\u2019 virus. While these may not be very common yet, within the next 10-15 years they will be as widespread as the spam you find in your email box. Because prevention isn\u2019t always 100% effective, organisations need to understand the importance of implementing a powerful response capability in order to detect and respond to incidents of cyber extortion.<\/p>\n<h2>Brick attacks can erase your existence<\/h2>\n<p>We\u2019ve all heard about stolen credit card details, account takeovers and bank fraud. But those aren\u2019t the only things you have to be concerned about. Imagine what would happen if your bank accounts were completely erased? This is what happens with the so-called \u2018brick attacks\u2019. Instead of \u2018just\u2019 trying to steal money, hackers simply destroy all the information by using malware to infect the computers that store your information, rendering them completely useless. They can disable your firewall and block your antivirus programs by altering settings. In 2012, the world\u2019s largest oil company Saudi Aramco, was hit by a brick attack, destroying no less than 3,000 computers. A few similar incidents have already taken place. Now picture hackers targeting major banks and client account details&#8230;<\/p>\n<h2>The human body as target for cyber attacks<\/h2>\n<p>Not only are all things hackable \u2013 humans are becoming easy targets for cyber attacks as well. If you imagine hundreds of thousands of medical devices hooked up to the IoT, such as diabetic insulin pumps, cochlear implants, cardioverter-defibrillators and pacemakers, it\u2019s not hard to understand that if your doctor can access your heart online, your next-door neighbour can do it as well. Hackers could take control of these devices and compromise the patient\u2019s medical privacy, their bodily integrity, and indeed, their safety. In the future, chronic disease will mainly be controlled by implanted devices measuring vital statistics which are reported back to the doctors. As the use of wireless technology for medical devices is becoming more widespread, any medical system or implant could easily be hijacked. Research by the University of Liverpool has indicated that it\u2019s possible to spread computer viruses via Wi-Fi routers. This poses a serious risk, particularly for patients with medical implants. A compromised Wi-Fi network could therefore also be used to spread medical viruses to patients. While the potential risk of human cyber attacks might not be very high at this point, we need to implement robust security systems into the IoT in order to protect our safety.<\/p>\n<p><iframe title=\"The Business of Cybercrime\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/Pm1Wgd9bbOk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><br \/>\nVideo credits:&nbsp;<a href=\"https:\/\/www.youtube.com\/channel\/UCHo2wMIMNM46OFPjU0oO8CA\">XPRIZE<\/a><\/p>\n<h2>Cyber-jacking can make an aeroplane disappear off the radar<\/h2>\n<p>Criminals or terrorists planning to hijack an aeroplane can do this remotely; they can simply cyber-jack the plane which means they no longer have to bother with physicalities such as forcing the pilot to change course (of flying the plane themselves) and taking hostages. There have even been speculations about Malaysian Air flight 370\u2019s mysterious disappearance being the result of cyber-jacking. Cyber-jacking could range from attacking ground-based systems that the plane needs to rely on, to infiltrating the aeroplane\u2019s flight management system. Other hijacking methods could include the interference with air traffic control transmissions or even infecting the system with so-called ghost planes to replace the actual aeroplanes so they can literally disappear off the radar. When cyber-jackers enter an aircraft\u2019s computer, they can manipulate the steering of the plane and change the course or cause the plane to crash by setting a collision course with another aircraft.<\/p>\n<p>See also:&nbsp;<a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/in-this-digital-age-your-privacy-is-continuously-invaded\/\">In this Digital age, your privacy is continuously invaded<\/a><\/p>\n<h2>Identity theft and genetic data hacking<\/h2>\n<p>If you think the identity theft situation is a problem now, you should think again. Biometric security, such as iris and fingerprint scans and voice recognition, is not very widespread yet. As soon as it gets implemented on a wider scale, however, such as to authenticate your online profiles like bank accounts, biometric data will become a valuable commodity for cyber criminals. Then there\u2019s genetic data. Genetic testing is done for various reasons \u2013 to rule out or confirm genetic disease, to screen newborn babies or to determine whether you would make a good sperm donor. This data and any other medical information is vulnerable to hacking by organised cybercriminals or for marketing purposes. Imagine being approached and asked whether you would like to become a sperm donor because you have very favourable genetic traits or whether you would consider donating blood because you have a rare blood type. Companies can actually buy DNA databases which contain tens of thousands of genomes.<\/p>\n<h2>Conclusion<\/h2>\n<p>With our increased dependency on technology we are also becoming more and more vulnerable to cyber crime. There are all kinds of ways in which cyber criminals can gain access to and use our sensitive information, some of which are hard to imagine. <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/keynote\/the-future-of-cybercrime-and-terrorism\/\">The criminals of the future<\/a> are not restricted by factors such as physical proximity and the availability of weapons. We\u2019ll have to be more and more vigilant in the future and think twice before sharing any type of personal information.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forget everything you thought you knew about crime. In the next 10-20 years, crime as we know it today will have been largely replaced by cyber crime. According to recent statistics provided by Intel, we\u2019re moving from 15 billion connected devices today to a whopping 200 billion by the year 2020. That&#8217;s an insane number [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":44618,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4230,4237],"article-type":[],"trends":[],"class_list":["post-57740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-government","tag-terrorism"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How cybercrime is overtaking physical crime - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"Forget Everything You Thought You Knew About Crime. In 10-20 Years, Crime As We Know It Today Will Be Largely Replaced By Cybercrime. &amp;#x2705 Get Prepared.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How cybercrime is overtaking physical crime - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"Forget Everything You Thought You Knew About Crime. In 10-20 Years, Crime As We Know It Today Will Be Largely Replaced By Cybercrime. &amp;#x2705 Get Prepared.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-26T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-24T13:01:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-51831821.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"How cybercrime is overtaking physical crime\",\"datePublished\":\"2015-11-26T22:00:00+00:00\",\"dateModified\":\"2021-03-24T13:01:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/\"},\"wordCount\":1157,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-51831821.jpg\",\"keywords\":[\"Government\",\"Terrorism\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/\",\"name\":\"How cybercrime is overtaking physical crime - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-51831821.jpg\",\"datePublished\":\"2015-11-26T22:00:00+00:00\",\"dateModified\":\"2021-03-24T13:01:14+00:00\",\"description\":\"Forget Everything You Thought You Knew About Crime. In 10-20 Years, Crime As We Know It Today Will Be Largely Replaced By Cybercrime. &#x2705 Get Prepared.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-51831821.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/shutterstock-51831821.jpg\",\"width\":800,\"height\":526,\"caption\":\"Hand typing on laptop keyboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/how-cybercrime-is-overtaking-physical-crime\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How cybercrime is overtaking physical crime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How cybercrime is overtaking physical crime - Richard van Hooijdonk Blog","description":"Forget Everything You Thought You Knew About Crime. In 10-20 Years, Crime As We Know It Today Will Be Largely Replaced By Cybercrime. &#x2705 Get Prepared.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/","og_locale":"en_US","og_type":"article","og_title":"How cybercrime is overtaking physical crime - Richard van Hooijdonk Blog","og_description":"Forget Everything You Thought You Knew About Crime. In 10-20 Years, Crime As We Know It Today Will Be Largely Replaced By Cybercrime. &#x2705 Get Prepared.","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2015-11-26T22:00:00+00:00","article_modified_time":"2021-03-24T13:01:14+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-51831821.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"How cybercrime is overtaking physical crime","datePublished":"2015-11-26T22:00:00+00:00","dateModified":"2021-03-24T13:01:14+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/"},"wordCount":1157,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-51831821.jpg","keywords":["Government","Terrorism"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/","name":"How cybercrime is overtaking physical crime - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-51831821.jpg","datePublished":"2015-11-26T22:00:00+00:00","dateModified":"2021-03-24T13:01:14+00:00","description":"Forget Everything You Thought You Knew About Crime. In 10-20 Years, Crime As We Know It Today Will Be Largely Replaced By Cybercrime. &#x2705 Get Prepared.","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-51831821.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/shutterstock-51831821.jpg","width":800,"height":526,"caption":"Hand typing on laptop keyboard"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/how-cybercrime-is-overtaking-physical-crime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"How cybercrime is overtaking physical crime"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=57740"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57740\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/44618"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=57740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=57740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=57740"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=57740"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=57740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}