HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Alexander Wolfe
User Rank
Blogger
More About Catching Crime
Alexander Wolfe   7/11/2011 8:39:33 AM
NO RATINGS
A provocative thesis, but I'd flip it around and say what you've written about says more about engineers' (and law enforcements') increasing awareness of the collateral vulnerabilities of networks, etc.,  Importantly, organizations like the FBI are doing something to address cybercrime. So I'd say ultimately we have an optimisitic outlook here, tempered only by the sad fact that it's really, really hard to keep up with (catch, stay ahead of) these organized cybercriminal gangs.

Dave Palmer
User Rank
Platinum
What do the numbers say?
Dave Palmer   7/11/2011 8:50:53 AM
NO RATINGS
In order to show that technological progress causes crime, you would need to show an increase in the overall crime rate that can't be attributed to any other factoe. Is that what the data show? Obviously, as technologies are more widely used in society as a whole, they will be more widely used in crime as well. But this is different from saying that technology actually causes crime. Without seeing the data, I am very skeptical of this claim.

Douglas Smock
User Rank
Platinum
Expect the Unexpected
Douglas Smock   7/11/2011 10:18:41 AM
NO RATINGS
Geoffrey, this is an excellent post, and I think the first two commenters may be a little too defensive about the tech industry. The point is simply that criminals can work in much more sophisticated ways today than they could during the salad days of Whitey Bulger and Jesse James.  I think a key takeaway from your post is the observation that tech innovation may be stymied by the inability of law enforcement officials (and internal Web security personnel) to outthink how a global band of interconnected hackers may be able to exploit new developments.

As an individual who benefits from, and makes, extensive use of new technology--but is not “part of” the tech industry--let me make an observation about one aspect of this issue. I think commercial enterprises need to be much less sanguine when they make comments that data such as credit card numbers are “completely safe” when posted on a Web site. An infamous incident comes to mind with the Boston Globe, which actually printed thousands of customers’ credit card numbers on paper that was used to wrap and distributed bundles of Globes. Here was an act of total incompetence that probably didn’t even involve computer hackers! Other, more sophisticated examples are rife. Even data internally protected with RSA security devices proved to be vulnerable to external digital attack.

I think Geoffrey’s message needs to be taken seriously. Expect the unexpected.

Rob Spiegel
User Rank
Blogger
A new criminal
Rob Spiegel   7/11/2011 12:20:25 PM
NO RATINGS
<!--/*fontdefinitions*/@font-face{font-family:"cambriamath";panose-1:2453546324;mso-font-charset:0;mso-generic-font-family:roman;mso-font-pitch:variable;mso-font-signature:-16106119851107304683001590;}@font-face{font-family:calibri;panose-1:21552224324;mso-font-charset:0;mso-generic-font-family:swiss;mso-font-pitch:variable;mso-font-signature:-16106119851073750139001590;}/*styledefinitions*/p.msonormal,li.msonormal,div.msonormal{mso-style-unhide:no;mso-style-qformat:yes;mso-style-parent:"";margin:0in;margin-bottom:.0001pt;line-height:115%;mso-pagination:widow-orphan;font-size:12.0pt;mso-bidi-font-size:11.0pt;font-family:"timesnewroman","serif";mso-fareast-font-family:calibri;mso-fareast-theme-font:minor-latin;mso-bidi-font-family:"timesnewroman";mso-bidi-theme-font:minor-bidi;}.msochpdefault{mso-style-type:export-only;mso-default-props:yes;font-size:12.0pt;mso-ansi-font-size:12.0pt;mso-fareast-font-family:calibri;mso-fareast-theme-font:minor-latin;mso-bidi-font-family:"timesnewroman";mso-bidi-theme-font:minor-bidi;}.msopapdefault{mso-style-type:export-only;line-height:115%;}@pagewordsection1{size:8.5in11.0in;margin:1.0in1.0in1.0in1.0in;mso-header-margin:.5in;mso-footer-margin:.5in;mso-paper-source:0;}div.wordsection1{page:wordsection1;}--> technologyenablesadifferentkindofcriminal.therearehackerwhowouldnevertakeagunintoabankorconveniencestore.likewise,theguntottingcriminalsarenotlikelytoknowhowtochangetheprogrammingofbanksoftware.anotherexampleisthetechnologyittakestoproducehigh-techcounterfeitgoods.therearenoguns,nomob,nodrugrunning.yetthecounterfeitgoodsareproducedbyteams,sometimesincludinghundreds,thatareworkingthiscrimeinconsort.inoneinstanceinchina,aplantproducingcounterfeitelectronicsgoodsemploys2,000,thelargestemployerinthetown.




Partner Zone
Latest Analysis
On Memorial Day, Americans remember the sacrifices the US armed forces have made, and continue to make, in service to the country. All of us should also consider the developments in technological capabilities and equipment over the years that contribute to the success of our military operations.
Imagine if you could train it from San Francisco to New York faster than flying?
In order to keep in line with safety protocols, industrial networks need to be filtered in a semantic way so that only information related to diagnostics is flowing back to the vendor and that any communications that could be used for remote machine operations are suppressed.
Siemens PLM has launched an online store to help customers search for, compare, and purchase partner-developed apps for its Solid Edge software.
Advanced visualization can depict an entire plant in motion, while also detailing an individual workstation. Individual products can be rendered different for each discipline involved — marketing, engineering, or suppliers.
More:Blogs|News
Design News Webinar Series
5/21/2015 11:00 a.m. California / 2:00 p.m. New York
5/7/2015 11:00 a.m. California / 2:00 p.m. New York
3/31/2015 11:00 a.m. California / 2:00 p.m. New York
6/11/2015 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Jun 8 - 12, Everything You Ever Wanted to Know about Filters
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6 |  7


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Course June 2nd-4th:
Sponsored by Proto Labs
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service