{"id":556,"date":"2006-08-31T12:49:05","date_gmt":"2006-08-31T20:49:05","guid":{"rendered":"\/?p=556"},"modified":"2006-09-01T08:36:04","modified_gmt":"2006-09-01T16:36:04","slug":"the-virtualization-of-crime","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=556","title":{"rendered":"The virtualization of crime"},"content":{"rendered":"<p>I love this piece&nbsp;by Scott Adams:<\/p>\n<p><img src=\"\/wp-content\/uploads\/2006\/08\/dilbert2003053860830.gif\" \/><\/p>\n<p>Imagine.&nbsp; The Internet has no way of knowing&nbsp;who you are dealing with.&nbsp; What&nbsp;environment could be more convenient for&nbsp;the criminally inclined?<\/p>\n<p>Since starting&nbsp;to work on the Identity Metasystem I&#39;ve learned more and more about the&nbsp;hoists being&nbsp;pulled off&nbsp;in the context of&nbsp;virtual reality.&nbsp; Over time, we&nbsp;have seen&nbsp;the attacks become more professionalized, and ultimately linked to well organized international syndicates.&nbsp; Part of the basic equation is that the international nature of&nbsp;virtual reality&nbsp;makes it especially hard to deal with the type of organization that is emerging at the boundary of its interface with the brick and mortar world.<\/p>\n<p>But recently, we&#39;ve seen more highly focused attacks that are essentially artisinal.&nbsp; It seems to be a case of &#8220;think globally, act locally.&#8221;&nbsp; Some of the schemes put in place depend on intimate knowledge of the workings of specific sites, and even specific communities and indvidiuals.&nbsp; This is no longer generic targeting.&nbsp; It&#39;s highly individualized, the work of community professionals of a special kind, who may draw upon internationally organized resources as necessary.<\/p>\n<p>And of course&nbsp;this all&nbsp;makes sense.&nbsp; Computerization has progressively worked its way through the various professions and industry sectors and nooks and crannies of our society,&nbsp;and we&#39;ve reached the point that&nbsp;a growing number of criminals are no more likely to&nbsp;function without&nbsp;computers&nbsp;than are&nbsp;accountants (not to&nbsp;cast judgement on whether&nbsp;some accountants are or are not ciminals&#8230;)<\/p>\n<p>As the level of familiarity with technology grows and increasingly&nbsp;wider swaths of&nbsp;the population&nbsp;become aware&nbsp;of the opportunities&nbsp;that await us in virtual reality, it is&nbsp;obvious that more&nbsp;and more criminals will find their place there.&nbsp;<\/p>\n<p>I walked into my local Office Depot a few days ago and amazingly, almost all the stationary&nbsp;goods and high class pens&nbsp;and filing contraptions and things that have always made such places interesting, had basically disappeared into a&nbsp;distant corner, while the whole center of the store consisted of computers, printers, electronic cash registers and cameras.&nbsp; A further indication of the growing virtualization of which cyber criminalization is&nbsp;just a natural a part.<\/p>\n<p>But to keep any balance at all, we really do need to fix the fundamental architectural problem of the internet: having a way that we can, when we want to,&nbsp;be sure who we are connecting with.<\/p>\n<p>In other words, we need to put in place an Identity Metasystem.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Criminalization of cyberspace will grow as virtualization does.  And what self-respecting criminal would thumb his nose at the convenience of people not knowing who they are connecting to?<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[16,6,2,8,3],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/556"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=556"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/556\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}