Digging Deeper into Numbers Behind NUMB3RS

Well, I’m a little past halfway through the book. I was hoping to be finished with the book before I received the DVD series in the mail.. . . . I failed. I now have the DVDs. They came in the mail today. So, I need to finish quickly.

Now, first, I have to say that a lot of good information in the book, but if you don’t have a math mind, you have put the book down by now. I’ve gotten to a lull in the book myself. I’m hoping that after watching a few episodes that I will have a new way to look at the book as I finish reading.

In chapter 8, there is a paragraph that really grabbed my attention that I feel I need to share.

These days, you don’t need a gun or a knife to steal money. A cheap personal computer and in Internet connection will do. It’s called cybercrime; it’s a new form of crime; it is substantial; and it is growing. It includes a broad range of illegal activities, such as software piracy, music piracy, credit card fraud (of many kinds), identity theft, manipulation of stocks, corporate espionage, child pornography, and “phishing” (sending a computer user an e-mail that purports to be from a financial institution that seeks to trick the receiver into revealing their bank details and other personal data).

Now, I don’t want to scare you with these facts, but you can’t go on and ignore it thinking it could never happen to you. So I wanted to share some other information with you to help in case you feel you have been compromised.

http://screamable.com/5-tips-to-protect-yourself-from-phishing.html says:
1) Use your phone
2) Type your web domain and spot the difference
3) Set your browsers firewall on
4) Report phishing emails
5) Be Precarious

Here is an Identity Theft Prevention Guide from WebsterOnline and online bank.

There are several other resources out there to help you as well. Another reminder is to always change your passwords. I try to do so every two months. Honestly, it should be more often. Also, remember with your passwords to use letters (capital and lowercase), numbers, punctuation (if possible).

If you would like more information about criminal activity online you can go to the U.S. Department of Justice at www.cybercrime.gov as well as the FBI at www.fbi.gov/cyberinvest/cyberhome.htm.

The book goes into how websites help stop the possibilities of people getting ahold of your information. I’m not going to try and explain it, but I will say that it involves prime numbers that are over 150 digits long. Yes, there are prime numbers that large. In case you’re lost on what a prime number is, you can find out here.

Chapter nine goes on to talk about fingerprints and if everyone’s fingerprints really are different from everyone else in the world. Right now they have not found two people that have the exact same fingerprints, but they also don’t have a copy of every single person in the world.

I’m going to start watching the DVDs today. Tomorrow’s post will have a little more information from the book as well as from the show.

Previous posts.
The Beginning of Summer
Dat A Mine Statistic Not Yours
Mathematics Changes in the Courtroom
Advertisements

About Anthony Purcell

I am Anthony Purcell and I am currently teaching math in Oklahoma.
This entry was posted in Data Gathering, Math, NUMB3RS, Statistics. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s