Personal Tech Pipeline | Cybercrime

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

June 28, 2005

Professor Sees iPod As A Potential Tool For Cybercrime



Courtesy of InformationWeek

Managers who believe worker productivity could fall as employees listen to iPods and other miniature digital music players face a greater threat from these devices: pilfered data.

"It's a potential criminal tool," says Purdue University associate professor Marcus Rogers, a researcher at the Indiana school's Center for Education and Research in Information and Security.

Rogers cautions that digital players can swiftly and effortlessly download immense amounts of information. Cyberthieves merely need a small cable to connect the devices to a PC tied to a corporate system. He characterizes iPods and similar gadgets as the 21st-century equivalent of a lock pick and getaway vehicle.

The IT security researcher points out that some palm-sized players can store up to 60 Gbytes of information, which rivals the storage capabilities of laptop computers. Already, he says, digital music players have been used by child-pornography rings because they can store thousands of images, hidden from authorities who might search their PCs. Even a car-theft ring in Britain used iPods: Street operatives maintained data on inventory and orders on their digital music players, hiding the illicit information from police when they stopped suspects.

What should companies do? The first step, he says, is for corporate IT staffs to be aware of the threat. He also suggests companies change policies that control the use of small-form-factor storage devices, including digital music players, and ensure that investigators don't overlook the devices when seeking evidence of cybermischief.

A former Canadian police officer, Rogers says law enforcement has yet to catch up with how criminals use advanced technology. A typical investigator, Rogers suggests, wouldn't think of checking a suspect's pocket if no evidence is found at a workstation. In other words, don't forget to frisk the suspected wrongdoers.

E-mail This Story
Print This Story
Reprint This Story




More Information


Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Trend Micro Enterprise Anti-Spyware Solutions
"Trend Micro is delivering what enterprise customers want." -The Forrester WAVE/Enterprise Anti-Spyware, Q1 2006/Forrester 2006. Download a FREE 30-day trial of Trend Micro Anti-Spyware Solutions for Enterprise Today.

Prevent Information Leaks from your Network
With GTB Inspector Appliance. Free Trial (March 2006 only). GTB Inspector is a hardware appliance. It is installed easily and transparently on the network edge and prevents leaks of confidential information to the Internet.

Cost-Effectively Secure Sensitive Data
Encrypting data in servers and databases can address security gaps and privacy legislation. Ingrian DataSecure Platforms offer granular encryption, seamless integration, and centralized security management. Combat data theft--with unprecedented ease and cost effectiveness. Download a white paper that outlines best practices for securing data.

Symantec Backup Solutions
Desktop to Data Center Protection. Explore the Official Symantec Site.

AntiSpy Enterprise Eliminate And Block Spyware
AntiSpy Enterprise Edition - is a security software system designed to locate, filter, and/or destroy vulnerabilities on any Windows´┐Ż-based network. End Spyware, Pop-ups, Home page Hijack and Active X threats across your network. Free trial.


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia