murchr wrote:hardwood wrote:tycho wrote:accelriskconsult wrote:Google street view may be very appealing but poses serious privacy concerns. In fact I believe that the City of New York at one point went to court and forced changes in order to try protect its citizens.
True. And not just privacy concerns, but also serious security problems. Surveillance and prospecting can now be easily done by the gang/criminal next door.
Kwanza burglaries and forced entries may rise. A rag tag guerilla force can now more easily coordinate attacks. Wow!
Are we ready enough for the ever increasing technological feats?
On the other hand the police force can be reduced and transformed. Each police post needs a cyber division. Ama private contractors waingilie.
Nothing to worry about. All those images are captured on public roads and public places and anyone is free to walk or drive around and visit those same areas and see or take pictures since everyone seems to have a smartphone nowadays. Also a burglar doesn't need google to pay you a visit.

The moment when @tycho realized his house is on google....he now thinks everyone knows

It's just most of us here don't have serious criminal minds, and may not be aware of some basic MO's. Even the boys who dug a tunnel into Equity bank turned out to be opportunistic.
But I suspect it's only a matter of time before we begin to see the emergence of a new breed of criminals.
Imagine the following scenario:
1. I see a random car in city center with it's probable owner
2. I check the owners details via the NTSA portal
3. If I'm lucky to get the tel. no I could track the location
4. Using street view, profile area for targets for surveillance and social engineering based info points
5. Select best cover and use targets on the ground for more info
6. Maximize on info
7. Prepare attack - once again street view helps in simulations and choice of routes of entry and escape...
8. Implement
Mind you, I can plan a series of small attacks that will seem inconsequential but which add up to a serious attack in the end.
One can also add other technologies like network science and reverse engineering to create more sophisticated forms of attack. And the beauty of it is that most operations can be done remotely.