In a state of escalating panic, the author systematically shut down all their devices and severed all internet connections within their home, including their router. Seeking refuge and a lifeline, they hurried to their neighbor’s house to utilize their computer and ascertain the extent of the breach. Their dread intensified as they discovered that their Google account had also been compromised and wiped. The situation worsened immeasurably when they realized their Twitter account was under the hackers’ control, being used to disseminate a torrent of hateful and offensive content. The experience was not merely inconvenient; it was deeply distressing and malicious.

It is crucial to recall that this occurred in an era preceding the constant barrage of phishing texts and emails designed to extract sensitive information, the very tactics now commonplace. The perpetrators of this intrusion had not employed brute-force methods or exploited complex technical vulnerabilities. Instead, they had masterfully leveraged publicly available information and a fraudulent credit card number to socially engineer their way into the author’s Amazon account. Within this account, they discovered the last four digits of the author’s legitimate credit card. Armed with this crucial piece of data, they gained access to the author’s Apple account. Since this Apple account was inextricably linked to their Gmail, which in turn was connected to their Twitter, the hackers effectively possessed the master keys to their entire digital life.

What profoundly disturbed the author, however, was the realization that emerged during the subsequent weeks and months of investigating the hack. While still a novel phenomenon, this type of attack was rapidly becoming more prevalent. A version of their own ordeal had befallen numerous other individuals. The perpetrators, a pair of young individuals, were not hardened criminals or masterminds. They had simply identified a nascent vulnerability, a technological chasm where a technology had become ubiquitous, but its inherent risks and exploitable attack surfaces remained poorly understood. The author’s digital assets, unfortunately, happened to reside precisely within this nascent vulnerability. Today, such gaps might manifest in the form of compromised cryptocurrency wallets or convincingly fabricated deepfakes of loved ones’ voices, or even a combination of both.

The nature of crime is in constant flux. The underlying motivations – the pursuit of wealth and power – remain immutable. However, emerging technologies invariably introduce new vulnerabilities, facilitate novel tactics, and provide perpetrators with innovative methods to evade detection and apprehension. The legal framework, by its very design, struggles to keep pace. Eschewing innovation in favor of established precedent, the law is inherently retrospective and operates at a deliberate, measured pace. This cautious deliberation was once the bedrock of protecting our collective democratic society and safeguarding individuals from one another.

Conversely, the very same technological advancements that have allowed criminal activity to outstrip legal countermeasures have also empowered law enforcement and government agencies. These technologies offer unprecedented tools for uncovering criminal enterprises, gathering irrefutable evidence, and conducting surveillance. Consider, for instance, the remarkable case of the Golden State Killer, whose apprehension years after his heinous crimes was facilitated by DNA samples and genealogy databases, heralding a new era of DNA-driven investigations.

The dynamic interplay between crime and its prosecution has long been characterized as a high-stakes game of cat and mouse, driven by technological evolution. This ongoing technological arms race sometimes compels us to question the very definition of crime. Unregulated behaviors, enabled by technology, can exist in a nebulous legal gray area. For example, prior to TikTok’s announcement of its new ownership structure, both Apple and Google were technically in violation of the law by allowing the app to remain on their platforms, according to the provisions of the Protecting Americans from Foreign Adversary Controlled Applications Act. This highlights the fluid and often contradictory nature of digital legality.

This inherent tension between technological enablement of crime and the evolving capacity to combat it forms the central theme of our March/April issue. Thanks to the proliferation of technologies such as cryptocurrency and readily available autonomous autopilot systems, the current landscape presents an unprecedented window of opportunity for criminal endeavors. Simultaneously, the pervasive reach of surveillance technologies and sophisticated digital infrastructure provides law enforcement with equally potent tools to combat these very crimes, sometimes at the significant cost of what were once considered fundamental civil liberties.

The author chose not to pursue legal action against the young individuals who hacked them. The most significant tangible outcome of the incident was Apple’s subsequent implementation of two-factor authentication, which felt like a considerable victory. Today, the author harbors doubts about whether anyone can realistically expect their personal data to remain secure in any meaningful sense. However, they remain certain that, somewhere in the vast expanse of the internet, a new generation of individuals is actively devising novel criminal strategies. The landscape of crime is continuously reshaped by technological innovation, demanding a perpetual adaptation from both its perpetrators and those tasked with its prevention and prosecution. The digital realm, a tapestry of interconnected devices and data, has become the new frontier, where the lines between legitimate activity and illicit exploitation are increasingly blurred, and the stakes for individuals and society alike are ever-higher. The constant evolution of technology necessitates a corresponding evolution in our understanding of security, privacy, and the ever-changing definition of what it means to be a victim or a perpetrator in the 21st century. As the author’s experience illustrates, even seemingly minor vulnerabilities can be exploited with devastating consequences, underscoring the need for constant vigilance and a proactive approach to digital security in an increasingly interconnected world where the next sophisticated cyberattack is always just around the corner, waiting for its opportune moment. The relentless pace of technological advancement ensures that the game of cat and mouse will continue, with each side striving to gain the upper hand, shaping the future of both crime and its deterrence in ways we are only beginning to comprehend. The digital age, while offering immense benefits, also presents a complex and evolving set of challenges that demand our continuous attention and adaptation.