{"id":5577,"date":"2025-10-02T14:04:11","date_gmt":"2025-10-02T12:04:11","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/"},"modified":"2025-10-02T14:04:45","modified_gmt":"2025-10-02T12:04:45","slug":"blick-in-die-cyberkriminalitaet-von-uebermorgen","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/","title":{"rendered":"A look into the cybercrime of the day after tomorrow"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>IZT launches research on the future of cybercrime on behalf of the Cyberagentur<\/strong><\/h2>\n  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn-1024x683.png\" class=\"attachment-large size-large\" alt=\"Unterzeichnung der Zusammenarbeit zwischen der Cyberagentur und dem IZT im Forschungsprogramm zCK zur Zukunft der Cyberkriminalit\u00e4t.\" srcset=\"\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn-1024x683.png 1024w, \/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn-330x220.png 330w, \/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn-768x512.png 768w, \/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn-512x341.png 512w, \/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn.png 1500w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>Unterzeichnung der Zusammenarbeit zwischen der Cyberagentur und dem IZT im Forschungsprogramm zCK zur Zukunft der Cyberkriminalit\u00e4t.<\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>The signing of a contract between the Cyberagentur and the Institute for Futures Studies and Technology Assessment (IZT) marks the beginning of a new chapter in the Future Cybercrime (zCK) research program. The aim of the &#8220;Future Analysis&#8221; sub-program is to develop cybercrime scenarios from 2030 to 2040 and to identify options for action for society and security authorities. <\/strong><\/p>\n\n<p>The digital world is changing rapidly &#8211; and with it the methods and strategies of cyber criminals. Technologies such as artificial intelligence, quantum computing, nanotechnology and brain-computer interfaces offer opportunities, but also open up new areas of attack. This development presents law enforcement agencies, security actors and society as a whole with the challenge of recognizing future risks in good time and countering them effectively.  <\/p>\n\n<p>The Cyberagentur&#8217;s &#8220;Future Cybercrime&#8221; (zCK) research program focuses on precisely these issues. With the agreement that has now been signed, the Institute for Futures Studies and Technology Assessment (IZT) is taking over the implementation of the &#8220;Future Analysis&#8221; sub-program. The aim is to develop plausible scenarios for the years 2030 and 2040 that take technological, cultural and structural conditions into account and derive concrete options for action for politicians, authorities and society.  <\/p>\n\n<p>Dr. Nicole Hartlapp, Head of the zCK programme, emphasizes on the conclusion of the contract: &#8220;Future research in the field of cybercrime is essential in order to develop proactive security strategies, identify technological disruptions at an early stage and systematically identify potential social and infrastructural vulnerabilities.&#8221;<\/p>\n\n<p>The IZT is contributing its many years of expertise in foresight methods, technology assessment and participatory dialog formats. Project manager Ingo Kollosche emphasizes: &#8220;We also want to break new ground here by further developing current foresight methods in a targeted manner and trying out new approaches.&#8221; The researchers are linking technological analyses with social factors such as changing values, acceptance of technology, skills, legal frameworks and subjective perceptions of security in the digital space. Results are not only made available in traditional publications, but also in innovative transfer formats, in particular to the security authorities.   <\/p>\n\n<p>In terms of internal security, this means that law enforcement authorities receive well-founded insights into potential crime patterns at an early stage and can develop preventative and reactive strategies. At the same time, the program strengthens the vigilance and resilience of the digitally networked society against threats from the cyber and information space. <\/p>\n\n<p>On behalf of the Cyberagentur, the Research Director, Prof. Dr. Hummert, and the Commercial Director, Bettina Bubnys, signed the symbolic document together with the Managing Directors of the IZT, Sabine Flores Tran and Dr. Roland Nolte. They thus sealed a cooperation as a central building block for the development of a cybervigilant society: &#8220;In this project, we want to explore possible futures of our society, technological development paths and new forms of cybercrime and generate orientation knowledge for all relevant actors.&#8221; The research program will therefore also be implemented in a forward-looking, evidence-based manner and in close cooperation with the relevant stakeholders.  <\/p>\n\n<p><strong>Further information:<\/strong> <a href=\"https:\/\/www.cyberagentur.de\/en\/programs\/zck\/zck-2\/\">https:\/\/www.cyberagentur.de\/programme\/zck<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IZT launches research on the future of cybercrime on behalf of the Cyberagentur The signing of a contract between the Cyberagentur and the Institute for Futures Studies and Technology Assessment (IZT) marks the beginning of a new chapter in the Future Cybercrime (zCK) research program. The aim of the &#8220;Future Analysis&#8221; sub-program is to develop [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":5575,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[55],"tags":[],"class_list":["post-5577","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-society"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A look into the cybercrime of the day after tomorrow - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A look into the cybercrime of the day after tomorrow - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"IZT launches research on the future of cybercrime on behalf of the Cyberagentur The signing of a contract between the Cyberagentur and the Institute for Futures Studies and Technology Assessment (IZT) marks the beginning of a new chapter in the Future Cybercrime (zCK) research program. The aim of the &#8220;Future Analysis&#8221; sub-program is to develop [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-02T12:04:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-02T12:04:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"A look into the cybercrime of the day after tomorrow\",\"datePublished\":\"2025-10-02T12:04:11+00:00\",\"dateModified\":\"2025-10-02T12:04:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/\"},\"wordCount\":520,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20251002-SM-Post-zCK-LinkedIn.png\",\"articleSection\":[\"Secure society\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/\",\"name\":\"A look into the cybercrime of the day after tomorrow - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20251002-SM-Post-zCK-LinkedIn.png\",\"datePublished\":\"2025-10-02T12:04:11+00:00\",\"dateModified\":\"2025-10-02T12:04:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20251002-SM-Post-zCK-LinkedIn.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/20251002-SM-Post-zCK-LinkedIn.png\",\"width\":1500,\"height\":1000,\"caption\":\"Unterzeichnung der Zusammenarbeit zwischen der Cyberagentur und dem IZT im Forschungsprogramm zCK zur Zukunft der Cyberkriminalit\u00e4t.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/blick-in-die-cyberkriminalitaet-von-uebermorgen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A look into the cybercrime of the day after tomorrow\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A look into the cybercrime of the day after tomorrow - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/","og_locale":"en_GB","og_type":"article","og_title":"A look into the cybercrime of the day after tomorrow - Cyberagentur","og_description":"IZT launches research on the future of cybercrime on behalf of the Cyberagentur The signing of a contract between the Cyberagentur and the Institute for Futures Studies and Technology Assessment (IZT) marks the beginning of a new chapter in the Future Cybercrime (zCK) research program. The aim of the &#8220;Future Analysis&#8221; sub-program is to develop [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/","og_site_name":"Cyberagentur","article_published_time":"2025-10-02T12:04:11+00:00","article_modified_time":"2025-10-02T12:04:45+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn.png","type":"image\/png"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"A look into the cybercrime of the day after tomorrow","datePublished":"2025-10-02T12:04:11+00:00","dateModified":"2025-10-02T12:04:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/"},"wordCount":520,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn.png","articleSection":["Secure society"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/","name":"A look into the cybercrime of the day after tomorrow - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn.png","datePublished":"2025-10-02T12:04:11+00:00","dateModified":"2025-10-02T12:04:45+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/#primaryimage","url":"\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn.png","contentUrl":"\/wp-content\/uploads\/2025\/10\/20251002-SM-Post-zCK-LinkedIn.png","width":1500,"height":1000,"caption":"Unterzeichnung der Zusammenarbeit zwischen der Cyberagentur und dem IZT im Forschungsprogramm zCK zur Zukunft der Cyberkriminalit\u00e4t."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/blick-in-die-cyberkriminalitaet-von-uebermorgen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"A look into the cybercrime of the day after tomorrow"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/5577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=5577"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/5577\/revisions"}],"predecessor-version":[{"id":5578,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/5577\/revisions\/5578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/5575"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=5577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=5577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=5577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}