Thursday, November 27, 2008

Digital film: Ask the industry

This article talks about how the movie industry is being changed rapidly, it is transforming the entertainment industry, movies and DVD's in the past did not have the "piracy its a crime" advertisement at the beginning of the movie which you can not skip, because piracy was not being committed, the BBC has assembled a group of film executives to answer questions that readers might have and are answering it. The questions are related to how the movie and entertainment industry is handling the new movement of technology. Like are 'film companies making movies available in the right ways? How well are they dealing with piracy? Is the box office destined to be eclipsed by download stores? '



http://news.bbc.co.uk/2/hi/entertainment/4653534.stm

Sunday, November 2, 2008

Portfolio

Criteria A
This article talks about identity theft, money theft and fraud on a huge scale. An international group of highly technical thieves hacked into networks of several high volume stores and stole vital credit card and debit card numbers along with their pin numbers that were stored there in the system. With this information, they were able to imprint the stolen numbers on the magnetic stripes of other stolen card blanks and were able to withdraw money from ATMs. Once taken, the information was moved to high-powered computers in the United States, Latvia and the Ukraine. In addition, they were sealing the card and pin number information over the Internet to make the identity theft even more widespread.
The identity theft ring was composed of members from several different countries including the United States, Estonia, Ukraine, China, and Belarus. IT was widespread and of such an international scope that it makes finding, identifying, and capturing the criminals much more difficult. One of the men who where responsible for selling card numbers on the black market had already been arrested in Turkey in 2007 and has been awaiting trial there. The US has asked to have him moved to the US so he can be charged with the other members of the ring.
Criteria B
Wireless networks move through the air and therefore it is difficult to secure them since there are no wires to secure them together. The thieves were driving around these stores testing their wireless networks to find security ‘holes’ that they could hack into. This is called ‘war driving’ where someone drives the neighborhood surrounding high volume retail outlets looking for weaknesses in the network security. Once the holes are discovered programs called sniffers are uploaded into the retailers system. Once installed, the sniffer program locate information that has been stored within the retailer system such as credit cards and debit card numbers and their associated pins. On the outside, the criminals who have installed the sniffer programs collect the information as the program sends it. This information is then moved to highly sophisticated computers and held there until they are either sold over the Internet or used to create false accounts/cards.
The I.T issue is how do you keep wireless networks secure? How do you better trace hackers or people that abuse the weakness of the network? With credit card and debit card use so widespread in our economies we are forced to depend on wireless networking. The idea of cabling for all of this activity is overwhelming and impossible. The only answer seems to be developing stronger security within wireless networking.
Criteria C
There are millions of dollars of trade that is done over the Internet. Consumers trust that whenever they do transactions or do business within a retail outlet, they are using secure information that only they have access to. The entire global retail market is built on this trust between the consumers and the retailers. If customers become afraid to use their credit cards or stop trusting certain retailers with their private information and money, the damage that could be created in our economy would be devastating. Trust between consumers and retailers has to be maintained and assured.
Consumers are innocent victims of these identity thefts criminals. Most consumers probably do not understand the idea of wireless networking; yet they rely on it and trust it. They certainly do not think that their personal information is at risk every time they use their credit card. Unless the technical world is able to fix this problem then retail stores remain at risk. In a global economy, that is based on credit and debit card use this can be catastrophic if this is not controlled. If this cannot be controlled then the whole process of business has to be changed.
Criteria D
There is no easy solution to this problem. It has many levels therefore it needs to be attacked on many levels. Obviously, wireless technology needs to be improved and include greater security. If criminal can find the holes and take advantage of them, then wireless security need to find this problem and fix it first. Wireless networks need to develop sniffer programs of their own that cans immediately detect not only whenever their networks have been breached but also when criminal sniffer programs have been installed.
When criminals are caught like the ones mentioned in this article, the penalties should be harsh and difficult to get out of. One of the ironies of the article was that the primary person involved had already been caught several years earlier for the same kind of activities. However, instead of being in prison where he belonged, he was let go and became an informant to the government. Unfortunately the same time he was working for the government he was continuing his criminal activities on the side. The seriousness of this type of crime needs to be elevated and controlled with strong punishments and dedicated personnel tracking and fighting it. These eleven men need to become examples of the severity of the punishment surrounding financial and business crimes against the entire global economy.

Saturday, November 1, 2008

Monday, October 20, 2008