Digital Pedestrian Piracy

Electronic Pick Pocketing is Dangerously Easy

Payment cards with radio frequency identification technology (or RFID) have been all the rage in the past few years, but they are becoming increasingly vulnerable to electronic pick pocketing. They are also putting the financial security of millions of people at risk whenever they leave their homes.

As demonstrated in this video, all an aspiring thief needs to start their career in electronic pick pocketing is a laptop, some kind of receiver device (like an iPhone), and some basic software. Then, within a few minutes spent in a crowded area like an airport, literally dozens of credit card numbers and other ‘secure’ financial data can be stolen without raising an eyebrow.

The resulting revelation at how easy this form of electronic pick pocketing can be will definitely result in a forthcoming surge of ‘secure’ countermeasures, but until then, RFID technology’s security has been drawn into serious doubt.
Trend Themes
1. RFID Vulnerability - The increasing vulnerability of RFID technology has opened up opportunities for the development of more secure RFID systems and countermeasures.
2. Electronic Pick Pocketing - The threat of electronic pick pocketing has created a need for secure payment methods that protect users from data theft.
3. Contactless Payment Security - The need for more secure contactless payment methods has created opportunities for innovative and disruptive technologies in the payment industry.
Industry Implications
1. Payment Industry - The payment industry can capitalize on the need for more secure payment methods in the wake of RFID vulnerabilities and electronic pick pocketing threats.
2. Technology Industry - The technology industry can develop innovations and solutions to address the growing concern of RFID vulnerability and electronic pick pocketing.
3. Security Industry - The security industry can provide countermeasures and protective measures for individuals, businesses, and institutions against electronic pick pocketing and other forms of data theft.

Related Ideas

Similar Ideas
VIEW FULL ARTICLE & IMAGES