Feeds

Police fence stolen goods online

And the BSA acts as if it is the police

  • alert
  • submit to reddit

SANS - Survey on application security programs

Ever wonder why the police have the best drugs and hi-fi systems? Sorry, that is a completely false and libellous allegation and completely without foundation. However, there is the question of what happens to all the kit that the police inevitably end up with - the lost, found and stolen goods that no one ever claims.

Well, they are sold at police auctions. But then few people know where and when these take place and many more balk at the idea. Well, no more! Two e-commerce companies - eBay.co.uk, you know, and iForce - have persuaded 15 police forces throughout the UK to sign up to a new online auctioning system.

The system combines iForce's software and eBay's trading site. As they tell it, the new setup will benefit government, businesses, charities as well as average Joe. It will save the authorities the cost of collection, storage and delivery, increase the goods' sale price and benefit all those that buy em cheap. They've got a point too.

"The potential of the web to revolutionise traditional approaches has been somewhat forgotten in recent months as the dotcom gloom has been peddled. This announcement shows that there are still many new areas where e-commerce solutions have huge potential to re-engineer inefficient business and organisational processes," said Matthew Peacock, group chief executive of iForce. Now that's what we like to hear - optimism.

It works like this: iForce does the collection and delivery, cataloguing, stock management and warehousing. The goods are then sold on eBay.co.uk. Stuff catalogued so far includes sports clothes, CDs, computers, DVD players and jewellery. The service will be up and running the first of December (just over a week's time).

On the other side of the coin: while the police enter the commercial IT world, the crazed bunch at BSA (Business Software Alliance) seem to think they can become the police. They can't of course but that hasn't stop them sending out official looking audit forms to hundreds of companies.

In them you are asked to go round the office and justify possession of your software. And god help you if you haven't got the certificates. Note that the BSA doesn't actually say you have to fill it in - because you don't - but it goes as far as it can. And if you don't? Well don't come running to us when you find a toothless watchdog sucking on your leg.

Oh, and the deadline was yesterday. ®

Related Stories

BSA deploys imaginary pirate software detector vans

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.