Web Counters

Lars G. A. Hilse

Specialist for Cyber Crisis Response // Global Thought Leader in #CyberSecurity, #CyberTerrorism, #CyberDefence, #CyberCrime, #DigitalStrategy

Cyber Crisis Response

For immediate assistance in case of a cyber crisis, leave a voicemail on +49 (0)4835 9513027.You will be contacted with further instructions.

Publications 

Books

Threat Assessment: Bitcoin: Danger to the United States' National Security and her Economic and Commercial Interests
ISBN 978-1-489-52959-6

SHUT UP! And get a profitable Social Media Policy 4.3 million with a Document every Company should have
ISBN 978-1-492-20926-3

Adding the E to your Business Strategy
ISBN 978-0-557-08080-9

Papers

Bitcoin and Dark Web as Game- Changers in Kidnapping + Ransom, Extortion, Product Extortion, and Corporate Risk Management

Risks of ISIS Cyber Terrorism

Why there will be a Cyber-9/11. Soon

Dark Web and Bitcoin: Global Terrorism Threat Assessment 

Threats to Network Connected Infrastructure and Drug Trafficking through Autonomously flying Drones

Above Books and Papers cited / referenced in

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications 
ISBN 978-1-522-55634-3 // DOI 10.4018/978-1-5225-5634-3 by Information Resources Management Association (USA) 

新经济形态中刑法评价的再考量 // Reconsideration of the Evaluation of Criminal Law in New Economic Forms
by 张建 Zhang Jian in the "Journal of the University of Suzhou: Philosophy and Social Sciences" No. 5, 2015 | Zhang Jian Shanghai Municipal People's Procuratorate, Hongkou District, Shanghai 200082 

中国(上海)自贸区刑法个罪的修正适用 // The Application of the Amendment of Criminal Offence in China (Shanghai) Free Trade Area
by 蔡博豪 // Cai Bohao in the Journal of Beijing Institute of Political Science and Law; 2016, 01(2016/04/21), P45 - 50 

“去中心化”数字支付时代经济刑法的选择——基于比特币的法律与经济分析 // "Decentralization" Choice of Economic Criminal Law in the Digital Payment Era: A Legal and Economic Analysis Based on Bitcoin 
[CLC] No.: D924.3; D922.28 by 谢杰 // Xie Jie for the Guizhou University of Finance and Economics School of Law, Shanghai, China

In an Era of FinTech : Strategies of Government to Deal With Virtual Currencies
by Kamolnich Swasdiphanich for the University of Chicago Law School

去中心化” 互联网金融对经济刑法规范的影响及其应对——比特币关联犯罪的刑法解释 // The Influence of Internet Finance on the Standardization of Economic Criminal Law and Its Countermeasures 
ISSN 1671-1130.2015.02.007 by 谢杰 // Xie Jie for The East China University of Political Science and Law Institute of Science and Technology

Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution: Industry 4.0 
ISBN 978-3-319-52904-2 by Maurizio Martellini, Stanislav Abaimov, Sandro Gaycken, Clay Wilson

Information Security of Highly Critical Wireless Networks
ISBN 978-3-319-52904-2 by Maurizio Martellini, Stanislav Abaimov, Sandro Gaycken, Clay Wilson

New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Advances in Digital Crime, Forensics, and Cyber Terrorism) 
ISBN 978-1-466-68345-7 by Maurice Dawson, Assistant Professor of Information Systems (Cyber Security) at the College of Business Administration at University of Missouri- St. Louis and Marwan Omar, Assistant Professor for the department of computer science and IT at Nawroz University

Use of Technology by the Islamic State (IS) 
by Lt Col Ajaya Kumar K B Kurup (Rtd), Associate Professor at the National Defence University of Malaysia

Countering the Stereotype of A Tropical Paradise 
ISBN 978-9-769-55992-9 by Serena Joseph Harris ATA

Public Appearances

European Parliament > Special Commitee on Terrorism | Brussels, Belgium (2018) 
Expert at the Hearing: The Security of Critical Infrastructures and Public Spaces
The prospective incidence of Terrorism on Cyber Security 

DSS ITSEC 2017: Cybercrime and the EU GDPR Labyrinth | Riga, Latvia (2017)
Keynote: A look at the GDPR and the Past, Present, and Future of Cybercrime, -Terrorism, and -Warfare   

Crypto Wars 2.0 at the University of Oxford | Oxford, UK (2017) 

Keynote: The Global Internet Magna Carta 

DSS ITSEC 2016: CYBER, CONNECTED THINGS AND INSECURITY | Riga, Latvia (2016)

Keynote: Future of the Digital Market and Internet

Radio Sputnik International | Moscow, Russian Federation (2016) 

Interview: Kali Linux aims at cyberterrorism rather than going after individual

Cyber Security Summit Europe | Prague, Czech Republic (2016)

Opening Keynote: Natanz, TV5MONDE, and the Future of Global Cyber Terrorism

EUROCACS | Copenhagen, Denmark (2015) 

Keynote: Cyber Extortion: New Challenges of Anonymised Communication and Asset Transfer?

III Kazan International Tourism Forum - Benchmarks of the Future | Kazan, Russian Federation (2015) 

Panel: Communications and New Technologies in Modern Tourism

Communication on Top Kyiv | Kiev, Ukraine (2014) 

Panel: From Communications Efficiency to Business Efficiency. New Opportunities

WCF Davos | Davos, Switzerland (2014) 

Panel: New business in new media environment or New media for new technologies/startups?

Cloudconf | Berlin, Germany (2013)

Opening Keynote: Dark Clouds – Risk Management in the Cloud

Socialconf | Munich, Germany (2010) 

Opening Keynote: Customer Centric Web Strategy in Times of Social Media, CRM and co.

ECMOD360 London | London, United Kingdom (2010) 

Keynote: Is Facebook right for you?

iStrategy Berlin | Berlin, Germany (2010) 

Keynote: Applied social media marketing strategies

Meet the Boss TV | London, United Kingdom (2010) 

Interview: Digital Strategy and E-Business Development

Open Software Conference Utrecht | The Netherlands (2008) 

Keynote: Full Structured Search Engine Optimization

Mentions

The Digital Hotel: Reducing the Tour-Operator-Stranglehold on eHotelier - the global portal for hospitality professionals

RECAP: CYBER SECURITY SUMMIT 2016 on CyberCentral

26 Cloud Experts Reveal the Biggest Cloud Migration Mistakes Companies Make When Moving to the Cloud on ProfitBricks - the IaaS Companyl

Islamists Target Kali Linux: An Operating System Designed to Thwart Attacks on Sputnik International

Industry 4.0 and the Impact on Cybersecurity on United Security Providers

Are ISIS hackers trying to to destroy the internet? on The International Business Times

Panel Discussion ‘From Digital Efficiency to Business Efficiency. New Money’ to Take Place During World Communication Forum Davos Kyiv on Atlantic Group

Speaker Interview with Independent Digital Strategy Consultant Lars Hilse on The ECBG Website

New Threats and Countermeasures in Digital Crime and Cyber Terrorism (Advances in Digital Crime, Forensics, and Cyber Terrorism) on Amazon.com

ISIS Hackers Sharpen Skills Used For Cyber Terror In Secret Forum on Vocativ

Thảm kịch nếu IS đánh sập Internet toàn cầu on Tin247.com

ISIS黑客在秘密论坛中强化用于对网络进行恐怖攻击的技术 on bobao.360.cn

Ohnmaechtig in Facebook-Falle on Suedwest Presse

Опубликована полная программа и список спикеров WCFDavos on Pleon Talan

Ларс Хилз, Lars Hilse, об ошибках Facebook и финансовой веб-эффективности on mmr.ua

iStrategy - Some Feedback on my ifridge

Work in Digital Strategy

Lars Hilse started consulting in business strategy in 2007. 

He now offers C-/Director-Level Interim Management Services, Strategic Advisory, Trainings and Workshops with a focus on profitable digital strategy both in commercial and government sectors.

In 2009 he finalised the E-Business Sales Funnel Theory, which acts as the foundation for his successful consulting assignments in over 25 countries across 20 business verticals.

His clients range from startups to global fortune 500 brands like AXA, BNP Paribas, DHL, Ferrari, Singapore Airlines, et al.

Through the help of the E-Business Sales Funnel they have capitalized well over USD $ 1 billion of increased revenue from the Internet.

His keynotes - among others at the WCF Davos - have been applauded on four continents and his publications have inspired academics in over two-dozen universities around the globe.

His groundbreaking visions about UX published in 2009 are today utilized by Facebook and other major social networks, influencing far over one billion Internet users.

Research Interests and Experience in Online Marketing

International Online Marketing Strategy Planning and Execution in B2B, B2C and B2B2C Environments // SEO and SEM campaign creation and monitoring // Social Media Marketing and Sales Channel Integration // Website Analytics // Content Marketing // Corporate Online Reputation Management // Online Lead Generation Programs //

Research Interests and Experience in E-Commerce and Digital Sales

Creation and Planning of Global Digital Sales and E-Commerce Strategies and Solutions // Engineering of Online Sales Processes // Diversification of Operational Risks // Proactive Website Visitor Engagement // Targeted Content Delivery (geo-, demographical, gender, financial background, etc.) // Video Assisted Sales // Online Product Placement // Internationalization // UX enhancement // Planning of Mobile POS // Online and Offline Sales Unification // NFC and RFID // Website Visitor Behavioural Analysis // Proprietary Distribution Channels (International) //

Research Interests and Experience in Customer Relationship Management and Customer Retention

Contact Center Integration // CRM planning // Email Marketing Campaigns // Customer Self-Help Solutions // Customer Intelligence Gathering Procedures and Instruments // Customer Loyalty Programs //

Work in Cyber Security

Shortly after his first exposure to the internet, Lars started penetration (testing) of remote systems.

With the change of german and international legislature, he left the scene and only started to regain interest in cyber security from a consulting angle during the infamous 2011 Lolita City hack.

The groundbreaking research results he presented about this case proved that - against popular academic and professional opinion - the deep web and bitcoin can be used to truly anonymise web-usage, digital communication, and telephony, thereby presenting a game changer for law enforcement and intelligence services. The results of further advanced research led to conclude that not only cyber criminals could benefit significantly from the anonymising characteristics, but also that terrorists could harness aforementioned characteristics to cause significant damage through cyber(-physical) attacks, similar to that conducted on TV5MONDE in early 2015.

Based hereon, he repeatedly outlined numerous contributing factors of existing vulnerabilities in the ever increasingly technology-reliant, western infrastructure, and published these findings in numerous papers.

Lars concludes that the increasing mass-deployment of critical network-connected infrastructure needs to be governed through international legislature, and that liability needs to be sought with the software, and operating system vendors alike.

Research Interests and Experience in Cybercrime, Cyber Terrorism, Cyber Defense

Dark Web and Bitcoin analysis // Money Laundering (Conventional and Crypto-Currency) // Counterfeit (Currency and Official Documents) // Weapon Proliferation // Drug Trade // Human Trafficking and Trials // Financial Fraud // Child and other illegal Pornography // Conspiracy to Terrorism //

Work in Cyber Terrorism

His insight into and projections of the future of cyber terrorism have made him an expert-advisor in the cyber aspect of counter-terrorism.

Within the realm of cyber terrorism his main research is dedicated towards the deep web, bitcoin and other anonymising and obscuring web-services.

He very frequently presents individual briefings about the state of cyber terrorism to governments (local, state, federal), intelligence services, military institutions, and law enforcement bodies around the globe.

Work in Cyber Crime

In cyber crime, Lars revealed a variety of techniques used by criminals today, and proven a disturbing increase of conventional crimes, in which the anonymising characteristics of the deep web and bitcoin (kidnapping and ransom, extortion, etc.) are exploited to drastically reduce the risk of perpetrators being apprehended by law enforcement and intelligence services.

And while Lars has planned and very successfully executed dozens of workshops and trainings for law enforcement and counter-terrorism professionals worldwide, thereby leading to a higher understanding of such instruments as deep web and bitcoin, the criminal elements are still outsmarting law enforcement due to their financing and constantly increasing ingenuity towards using technology to reduce their operational risks.

Work in Cyber Defence

The research results about cyber terrorism were partly responsible for the insights produced about cyber defence, among which are the increased deployment of critical, network connected infrastructure, and the decreasing software and operating system standards for security vulnerabilities.

These findings were groundwork for the Continuous Vulnerability Testing (CVT) Lars has developed.

“Through Continuous Vulnerability Testing, every Nation’s changing/shifting Weaknesses in Network-Connected Infrastructure, Industry and Communication are constantly monitored and dynamically prioritized to allow immediate Exploitation of Vulnerabilities in Network-Connected Elements of Infrastructure, Industry, Communication, etc. (SCADA, PLC, SIS, RTU, DCS, PPR, PAC, VFD, BC, IED, Sensors, Position-Instruments, etc.) with the goal to disrupt “normal life” by inflicting (physical) Damage through Cyber-Attacks on the Adversary in Conflict.”

Global Internet Magna Carta (GLINMACA)

After the 2013 Snowden revelations, Tim Berners-Lee called for an internet magna carta, a constitution for the web. 

After two years of research, Lars finished the first document in late 2015. 

Translation of the content into the 10 most spoken languages of the world, and the programming of the website continued into 2016. 

The GLINMACA project is online since early 2016 on http://glinmaca.org

UX Revolution: Sticky Menu

With websites getting more content intensive, Lars utilised HTML and CSS to code a constantly visible navigation bar, to give users constant access to main parts of his website, as well as prominently making contact information available to website visitors. 

In 2010 he published the results. Shortly thereafter, they were implemented by Facebook, LinkedIn, et al, influencing the user experience of pretty much every web-user.

The E-Business Sales Funnel Theory

Other than the current Zeitgeist of ripping consumers and customers out of existing and established shopping habits and patterns by forcing them to use misinterpretations of e-commerce, the E-Business Sales Funnel Theory aims to create digital counterparts of customer behaviour, mimicking conventional sales processes as close as possible to a "real-life experience"; both in user experience aspects and business engineering. 

The E-Business Sales Funnel therefore closely resembles conventional sales process engineering and includes every aspect, only specialised for a digital world. From marketing, over sales, to customer relationship management.

It has produced over USD 1 billion in increased revenue for Lars' clients.