lunes, 23 de noviembre de 2009

How to stop dial-a-crime prisoners



Many prisoners are using smuggled cell phones to organize crimes from the prison. Some of them have been convicted to life sentences because of this. What can we possibly do to stop the smuggling of cell phones in jails?
A man was recently murdered in London by an organized crime form a murderer who organized the crime from jail. The cell phone and the charger were found as evidence on his place. Many of these cases have been going on since many cell phones have been smuggled since 2005. All of this murders are been convicted “behind bars”. The Ministry of Justice says 3,473 mobile phones or sim cards were discovered in prisons in England and Wales between October 2006 and September 2007. They not only organize murders but drug deals as well.
One of the options of preventing this problem is jamming the signal of the cell phone around the prison. What about now? What ethical issues could arise from blocking the signals of cell phones under prison grounds? What about the prison workers who need to use their cell phones, or if there is any emergency? What other solutions can we give to prevent this from happening?
What use to be the most useful tool of technology for us has become a weapon to attempt to people’s life.

jueves, 19 de noviembre de 2009

Computer pair held in global banking web scam

Source: http://www.manchestereveningnews.co.uk/news/s/1183147_computer_pair_held_in_global_banking_web_scam

Two computer experts, whom decided to be hackers, were arrested in Greater Manchester by e-crime detectives who were investigating an internet banking scam. The two arrested of some of the ones involved on the scam a man and a woman of 20 years old, and their scam consisted in using a malicious software called ‘ZeuS’ in order to manage to get and storage banking information such as credit cards and passwords in order to steel from a huge amount of people, without investigators being aware of it. The police department of Manchester said that the arrestment was a huge step for the e-crime unit as they located two of the main brains of the scam.



This issue even though in the article is addressed only to computers; it can also be address to cell phones and electronic devices with connection to internet. So this is a serious problem to society as everyone is being affected because this gang of hackers that already have their banking information can steal from them and make it look legal. So people’s money is being retired from their account but also these hackers make it look like citizen are retiring their own money, so there is no way that citizens can recover their money.

The ‘ZeuS’ program also finds its way to get social networking information, sites where many people held a lot of personal and private information. So even though this gang steals people’s money, they also get people’s information for their own purposes, which affects privacy into a great extent, as there could be kidnaps or robberies to people who could be a financial aid target.

T-Mobile staff sold personal data

Article: http://news.bbc.co.uk/2/hi/uk_news/8364421.stm

Watch the video of the article on this link: http://news.bbc.co.uk/2/hi/uk_news/8364421.stm

T-Mobile staff sold millions of records of users to third parties. This was confirmed after the personal data was sold to other phone companies which had called those costumers whose contract was expired with T-Mobile. This was done without the knowledge of the phone company. The boards of directors from T-Mobile are really concerned and are demanding a prison sentence for those who sold the personal data. This is considering a trade of illegal personal data.
The responsible companies for investigation such as, Orange, Vodafone, and Virgin said that they were not responsible for the data, but T-Mobile confirmed they were. A search has begun to find the possible suspects of the act, including interviews to employees and warrants to enter premises.
The Ministry of Justice is consulting the possible penalties that the responsible of trading personal data will have. The T-Mobile speaker demands that: “This is not just about mobile phone companies. It's about private investigators, it's about blagging information from databases for use to put the frighteners on witnesses, attempt to knobble juries, pursue 'nasty neighbor' disputes, interfere in the family courts, difficult divorce settlements. Personal data has value and there are people out there exploiting it."
The speaker also added that the sale of data should be kept as a secret because they don’t want any criminal persecutions involved.

martes, 17 de noviembre de 2009

Harmless Hacking

Source: "The Gift of Fire" by Sara Baase

young people believes that hacking is an exciting adventure or activity, and considered at the same time harmless. but how do we really know if it is harmless or not?

whenever any business or other type of organizations that are on the world wide web, detect hackers on their system they don't really know if it is a real hackers that wants to harm the company, or just a teenager having fun. Even though they're entering the system as a prank, it could cause damage to sensitive data on the company's data base. imagine if they entered to an important government's data base, the risk of loosing data is big, but also, affects the rest of society as governments contain personal information about every single citizen of the nation. There are other problems involving hackers with no bad intentions, such as they can make some mistakes rthat could make a create risk to the company.now that we have some basic knowledge about harmless hacking lets relate this topic to personal electronic devices. Many of this harmless hackers invent viruses and hacking tools to break into people's personal life, which basically consists on breaking into their personal electronic devices as cellphones, that have much of their day to day information. Sometimes this pranks can cause people's life, since important and crucial information to people may be lost on this silly games.

So the question is, until what extent is this silly joke of harmless hacking going to affect society?


many of this hackers are underage, so it is impossible for law to take them under arrest, but some actions should be taken into account. we believe that we should teach young hackers the possible damages that their jokes cause to companies and people's personal life. since most of them are aware that a single mistake can be a life threatening risk. so our goal is to create appropriate penalties, educate and teach their parents the responsibilities because many parents aren't aware that the children are hacking and harming others.

lunes, 9 de noviembre de 2009

Worm attack bites at Apple iPhone

http://news.bbc.co.uk/2/hi/technology/8349905.stm

this article basically talks about a worm that has been discovered in Australia that affects the apple i phone. the worm affects i phones that has been jail-broken, which means that the users removed apple's protection software. the virus is not harmful but it can evolve into a massive privacy problem. when the worm enter the phone it disables the SSH services. se the articles warns people to change their passwords to prevent the virus from entering, and also recomends people to not disable the apple's protection sofware.



Paola and Machado.



Personal electronic devices like cell phones contain personal information like mailing addresses, account loggins, and financial information. So this problem could negatively impact society as a thread to personal privacy. It is very important to protect the data from unauthorized access. A number of methods can be used in this quest. One way is to encrypt sensitive data, which involves converting the data into a form that cannot be easily understood by an unauthorized user.The measure to take to have the highest level of security for a PED is securing its network. If the device has Wi-Fi or Bluetooth, it should be disabled when not in use. This helps minimize the chance of unauthorized users accessing the device. There are monitoring and notification programs, such as System Security Monitor for Pocket PC.