International Journal on Criminology Volume 7, Number 1, Winter 2019/2020 | Page 48

A (Guided) Tour of the Digital Wild West 2018). Beneath the prudish exterior of Silicon Valley, recent investigations have uncovered the orgy culture that is rife in the boys’ clubs shared by the male CEOs, commercial bankers, and directors of high-tech, real estate, and advertising firms. At the weekend, these titans, with their paleo-hippy mindset, “invite” their female employees—or those from nearby start-ups—to soirées of sex, drugs, and power in secluded villas or hotel suites. But if you work in the Valley, how can you turn down an “invitation” from those who control your future? And who attends these secret orgies? Younger women and older men (always white and heterosexual) in a ratio of two-to-one. “Diversity”? That’s for the press releases only. • Cyber fraud is still fraud. Might we see a high-tech Bernie Madoff? With all the data, the “transparency,” and the monitoring of online activity? Impossible? No. The young self-made woman Elizabeth Holmes had founded and was running the start-up Theranos, working to revolutionize blood testing: a laboratory on the tip of a needle, thanks to her technological solution, “Edison,” which would carry out hundreds of tests in an instant, with just one drop of blood. This would have saved American health insurance programs such as Medicare and Medicaid hundreds of millions of dollars. Theranos promised the moon, and the media fell for it hook, line, and sinker. The story appeared on the front cover of Fortune Magazine, Forbes, and Time. So came the cries: Holmes is one of the richest and most influential women in the world! She’s a media darling! Henry Kissinger’s on the Board! Nine-hundred million dollars of risk-capital poured into the miracle start-up. Such credulity, such gullibility, such blindness, and it all turned out to be a sham. Silicon Valley, the media, the investors, and the customers were all scammed, old-school. Cyberconflict, Present and Future At present, the term “cyberconflict” suggests a digital Cold War: undeclared; surreptitious, indirect disruption; an arms race, just in case. But the cast is now different from what we saw during the two-sided Cold War. Today we have North Korea’s cyberarmy of around six thousand hackers, capable of stealing (or recovering) the NSA’s digital offensive weapons and modifying them in order to loot poorly protected banks (to make ends meet); or sabotaging the computers of anyone who dares to disrespect the “Great Leader.” In a world where everyone is always talking about detection and prevention, it has to be pointed out in passing that not one misdeed on the part of Pyongyang has ever been identified or foreseen by anybody, with the planet’s global gaggle of cyber experts floundering around for months before dimly spotting the problem. These episodes do demonstrate, however, that cyberconflict is an ideal arena for asymmetric strategy: it is cheap, anonymous, even profitable, and poses a 43