Close Menu
geekfence.comgeekfence.com
    What's Hot

    Rethinking the cloud: Engineering the edge-to-cloud continuum for the age of intelligence

    February 25, 2026

    GSMA launches global fund to power green mobile solutions

    February 25, 2026

    Group-equivariant neural networks with escnn

    February 25, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Technology»Now is a good time for doing crime
    Technology

    Now is a good time for doing crime

    AdminBy AdminFebruary 25, 2026No Comments3 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Now is a good time for doing crime
    Share
    Facebook Twitter LinkedIn Pinterest Email


    You have to remember, this was before all of us lived with a constant rain of text messages and emails designed to elicit the information necessary to pull something like this off. These crooks hadn’t brute-forced their way in, or used any sort of sophisticated techniques to gain access to my accounts. Instead, they had relied on publicly available information, and a fake credit card number, to socially engineer their way into my Amazon account, where they looked up the last four digits of my real credit card number. Then they used that information to get into Apple. And because that account was linked to my Gmail, and that to my Twitter, it gave them the keys to everything.

    But what really troubled me was what I learned as I followed up on my hack over the ensuing weeks and months: This kind of thing was, while still novel, becoming more common. Some version of what happened to me had happened to lots of other people. The kids who were responsible—it was a couple of kids—weren’t criminal masterminds. They had just found a gap, a place where a technology was now commonplace but its risks and exploitable surface areas weren’t yet fully understood. I just happened to have all my stuff in the gap. Today that gap might feature a crypto wallet or a deepfake of a loved one’s voice. (Or both.)

    Crime changes.

    The goals stay the same—pursuit of value, pursuit of power—but new technologies create new vulnerabilities, new tactics, and new ways for perpetrators to evade discovery or capture. And the law necessarily lags behind. Relying not on innovation but on precedent, it is intentionally backward-looking and slow. That plodding consideration used to be how we protected our shared democratic society, how we protected each other from each other.

    But those same new technologies that have allowed crime to outpace law have also reenergized law enforcement and government—offering new ways to root out crime, to gather evidence, to surveil people. Think, for example, of how cold-case investigators tracked down the Golden State Killer years after his murders, using DNA samples and genealogy databases—launching a new era of DNA-powered investigations. 

    Technology has long made crime and its prosecution a game of cat and mouse. It sometimes calls into question the nature of crime itself. Unregulated behaviors, facilitated by technology, can exist in murky zones of dubious legality. (Until TikTok announced its new ownership structure, Apple and Google were both technically breaking the law by allowing the app to stay on their platforms, under the provisions of the Protecting Americans from Foreign Adversary Controlled Applications Act. Ah! Well. Nevertheless.)



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Canva acquires startups working on animation and marketing

    February 24, 2026

    How Buddy Rizer, an official in Virginia’s Loudoun County, helped build the world’s largest data center market, with ~200 buildings spanning ~49M square feet (David Uberti/Wall Street Journal)

    February 23, 2026

    10 Clever Home Appliance Innovations You’ll See in 2026

    February 22, 2026

    Inside the Birthplace of Your Favorite Technology

    February 21, 2026

    How to Write a Good Spec for AI Agents – O’Reilly

    February 20, 2026

    IEEE Course Improves Technical Writing Skills

    February 19, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202618 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202516 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    Rethinking the cloud: Engineering the edge-to-cloud continuum for the age of intelligence

    February 25, 2026

    The limits of centralized compute in an autonomous AI world Agentic AI is moving fast…

    GSMA launches global fund to power green mobile solutions

    February 25, 2026

    Group-equivariant neural networks with escnn

    February 25, 2026

    Adaptive Data Governance for EU Regulatory Change

    February 25, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Rethinking the cloud: Engineering the edge-to-cloud continuum for the age of intelligence

    February 25, 2026

    GSMA launches global fund to power green mobile solutions

    February 25, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.