Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Latest News
    • Reviews

    Would Rockford Files Be Foiled Today?

    Written by

    Cameron Sturdevant
    Published February 25, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      I’m going to detour from virtualization to circle back to computer security. I’ve been watching a lot of “The Rockford Files” and one 1974 episode, “Profit and Loss,” perfectly illustrated a social hack on a computer data center.

      I don’t know what was more interesting to me, the mainframe computers used in the set, the classic James Garner chumminess by which the social hack was affected, or the fact that the company under investigation was involved in securities fraud. The hack and the fraud both seemed as relevant today as they were then. It was almost quaint to hear how reverently the SEC was referred to, given that agency’s startling missteps in the lead-up to the current economic crisis.

      But it was clear to me that technology advances–and a rather grim dehumanization of our technology processes–have advanced the cause of security in the 35 years since this show first aired.

      Most of Jim Rockford’s social hacking relied on slow or almost nonexistent access to directory information. So, for example, he is able to place a call to the Los Angeles police to falsely report a stolen car by giving a description of the vehicle along with the license plate number and a fake name. Rockford does this to get the cops to stop the tail. I haven’t ever reported a car as stolen, but I’m assuming from talking with friends who have that the process is a little more involved than just calling in to the switchboard, providing some scant information and then having the police go into action within the minute.

      Now aficionados of the “The Rockford Files” will know that Jim uses social hacking in nearly every episode. He’s a private eye. That’s what he does; fake people out so they’ll spill the beans. Unlike today’s procedural police shows, everyone is Mirandized and when a suspect (usually Jim) asks for a lawyer, he gets one instead of being bullied into confessing his crime. And his lawyer, a woman, is able to get him out of every single jam. Jim Rockford uses social hacking, aplomb, a keen sense of self-preservation and his mad driving skilz to get the job done.

      It’s hard to see how “The Rockford Files” could be a successful show today. Aside from how cell phones and the Internet have completely altered the communication and information access landscape, the pervasive use of directory information would foil nearly every one of Jim Rockford’s social hacks. Almost every front desk receptionist has access to more information about employee whereabouts and authority than Rockford would have ever been able to talk his way around. Changes to hotel and motel booking requirements in the wake of 9/11 would make the undercover hopscotching often used in the show completely impossible today. I’m sure it’s possible to stay at a motel under an assumed name, but the ease with which it can be done has certainly disappeared since 1974. And it must be a federal crime to attempt any such fraud.

      It seems to me that all of our built-up security infrastructure, which makes it significantly more difficult to successfully breach today’s data bastions, might also have reduced our ability to respond in a timely manner to breaches. In “The Rockford Files,” any alarm that sounds elicits an immediate response from a henchman or the police. Even in “Profit and Loss,” Jim is quickly discovered to be an imposter. The goon squad is immediately dispatched (and almost as immediately outwitted by Rockford). It’s hard to imagine a coherent response to a daytime break-in at most office buildings in downtown San Francisco. Fast directory access and the massive increase in badge access door locks seem to have taken the place of big muscle and fast talking.

      Cameron Sturdevant
      Cameron Sturdevant
      Cameron Sturdevant is the executive editor of Enterprise Networking Planet. Prior to ENP, Cameron was technical analyst at PCWeek Labs, starting in 1997. Cameron finished up as the eWEEK Labs Technical Director in 2012. Before his extensive labs tenure Cameron paid his IT dues working in technical support and sales engineering at a software publishing firm . Cameron also spent two years with a database development firm, integrating applications with mainframe legacy programs. Cameron's areas of expertise include virtual and physical IT infrastructure, cloud computing, enterprise networking and mobility. In addition to reviews, Cameron has covered monolithic enterprise management systems throughout their lifecycles, providing the eWEEK reader with all-important history and context. Cameron takes special care in cultivating his IT manager contacts, to ensure that his analysis is grounded in real-world concern. Follow Cameron on Twitter at csturdevant, or reach him by email at [email protected].

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×