Alexander Wolfe
User Rank
More About Catching Crime
Alexander Wolfe   7/11/2011 8:39:33 AM
A provocative thesis, but I'd flip it around and say what you've written about says more about engineers' (and law enforcements') increasing awareness of the collateral vulnerabilities of networks, etc.,  Importantly, organizations like the FBI are doing something to address cybercrime. So I'd say ultimately we have an optimisitic outlook here, tempered only by the sad fact that it's really, really hard to keep up with (catch, stay ahead of) these organized cybercriminal gangs.

Dave Palmer
User Rank
What do the numbers say?
Dave Palmer   7/11/2011 8:50:53 AM
In order to show that technological progress causes crime, you would need to show an increase in the overall crime rate that can't be attributed to any other factoe. Is that what the data show? Obviously, as technologies are more widely used in society as a whole, they will be more widely used in crime as well. But this is different from saying that technology actually causes crime. Without seeing the data, I am very skeptical of this claim.

Douglas Smock
User Rank
Expect the Unexpected
Douglas Smock   7/11/2011 10:18:41 AM
Geoffrey, this is an excellent post, and I think the first two commenters may be a little too defensive about the tech industry. The point is simply that criminals can work in much more sophisticated ways today than they could during the salad days of Whitey Bulger and Jesse James.  I think a key takeaway from your post is the observation that tech innovation may be stymied by the inability of law enforcement officials (and internal Web security personnel) to outthink how a global band of interconnected hackers may be able to exploit new developments.

As an individual who benefits from, and makes, extensive use of new technology--but is not “part of” the tech industry--let me make an observation about one aspect of this issue. I think commercial enterprises need to be much less sanguine when they make comments that data such as credit card numbers are “completely safe” when posted on a Web site. An infamous incident comes to mind with the Boston Globe, which actually printed thousands of customers’ credit card numbers on paper that was used to wrap and distributed bundles of Globes. Here was an act of total incompetence that probably didn’t even involve computer hackers! Other, more sophisticated examples are rife. Even data internally protected with RSA security devices proved to be vulnerable to external digital attack.

I think Geoffrey’s message needs to be taken seriously. Expect the unexpected.

Rob Spiegel
User Rank
A new criminal
Rob Spiegel   7/11/2011 12:20:25 PM
<!--/*fontdefinitions*/@font-face{font-family:"cambriamath";panose-1:2453546324;mso-font-charset:0;mso-generic-font-family:roman;mso-font-pitch:variable;mso-font-signature:-16106119851107304683001590;}@font-face{font-family:calibri;panose-1:21552224324;mso-font-charset:0;mso-generic-font-family:swiss;mso-font-pitch:variable;mso-font-signature:-16106119851073750139001590;}/*styledefinitions*/p.msonormal,li.msonormal,div.msonormal{mso-style-unhide:no;mso-style-qformat:yes;mso-style-parent:"";margin:0in;margin-bottom:.0001pt;line-height:115%;mso-pagination:widow-orphan;font-size:12.0pt;mso-bidi-font-size:11.0pt;font-family:"timesnewroman","serif";mso-fareast-font-family:calibri;mso-fareast-theme-font:minor-latin;mso-bidi-font-family:"timesnewroman";mso-bidi-theme-font:minor-bidi;}.msochpdefault{mso-style-type:export-only;mso-default-props:yes;font-size:12.0pt;mso-ansi-font-size:12.0pt;mso-fareast-font-family:calibri;mso-fareast-theme-font:minor-latin;mso-bidi-font-family:"timesnewroman";mso-bidi-theme-font:minor-bidi;}.msopapdefault{mso-style-type:export-only;line-height:115%;}@pagewordsection1{size:8.5in11.0in;margin:1.0in1.0in1.0in1.0in;mso-header-margin:.5in;mso-footer-margin:.5in;mso-paper-source:0;}div.wordsection1{page:wordsection1;}--> technologyenablesadifferentkindofcriminal.therearehackerwhowouldnevertakeagunintoabankorconveniencestore.likewise,theguntottingcriminalsarenotlikelytoknowhowtochangetheprogrammingofbanksoftware.anotherexampleisthetechnologyittakestoproducehigh-techcounterfeitgoods.therearenoguns,nomob,nodrugrunning.yetthecounterfeitgoodsareproducedbyteams,sometimesincludinghundreds,thatareworkingthiscrimeinconsort.inoneinstanceinchina,aplantproducingcounterfeitelectronicsgoodsemploys2,000,thelargestemployerinthetown.

Partner Zone
Latest Analysis
A panel on cybersecurity at ARM TechCon called for regulations to protect the security of connected devices.
Do you wear your ugly Christmas sweater while fighting zombies, or simply chill in front of your homemade entertainment center while your automated cat feeder keeps your feline friend at bay? Whatever you prefer, one of the following gadgets is sure to get your DIY motor running.
The design of products has been altered altogether through 3D printing. Parts that couldn’t be produced at all before 3D printing came along are often superior to conventionally produced parts.
Marine mussels and their interaction with the ocean environment has inspired a breakthrough in developing a nontoxic coating for organic electronic components that also could speed up the manufacturing process.
The Innovation Challenge Awards had one run-away winner at ARM TechCon 2016. Of the six awards presented, one company walked away with four.
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 10 - 14, Embedded System Design Techniques™: Getting Started Developing Professional Embedded Software
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7 | 8 | 9 | 10

Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Course November 8 - 10:
Sponsored by 3M
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Technology Marketplace

Copyright © 2016 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service