IoT
Infrastructure
News
6/28/2005
03:50 PM
50%
50%

Professor Sees iPod As A Potential Tool For Cybercrime

Miniature digital players can swiftly and effortlessly download immense amounts of information.

Managers who believe worker productivity could fall as employees listen to iPods and other miniature digital music players face a greater threat from these devices: pilfered data.

"It's a potential criminal tool," says Purdue University associate professor Marcus Rogers, a researcher at the Indiana school's Center for Education and Research in Information and Security.

Rogers cautions that digital players can swiftly and effortlessly download immense amounts of information. Cyberthieves merely need a small cable to connect the devices to a PC tied to a corporate system. He characterizes iPods and similar gadgets as the 21st-century equivalent of a lock pick and getaway vehicle.

The IT security researcher points out that some palm-sized players can store up to 60 Gbytes of information, which rivals the storage capabilities of laptop computers. Already, he says, digital music players have been used by child-pornography rings because they can store thousands of images, hidden from authorities who might search their PCs. Even a car-theft ring in Britain used iPods: Street operatives maintained data on inventory and orders on their digital music players, hiding the illicit information from police when they stopped suspects.

What should companies do? The first step, he says, is for corporate IT staffs to be aware of the threat. He also suggests companies change policies that control the use of small-form-factor storage devices, including digital music players, and ensure that investigators don't overlook the devices when seeking evidence of cybermischief.

A former Canadian police officer, Rogers says law enforcement has yet to catch up with how criminals use advanced technology. A typical investigator, Rogers suggests, wouldn't think of checking a suspect's pocket if no evidence is found at a workstation. In other words, don't forget to frisk the suspected wrongdoers.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
2014 Next-Gen WAN Survey
2014 Next-Gen WAN Survey
While 68% say demand for WAN bandwidth will increase, just 15% are in the process of bringing new services or more capacity online now. For 26%, cost is the problem. Enter vendors from Aryaka to Cisco to Pertino, all looking to use cloud to transform how IT delivers wide-area connectivity.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of July 17, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.