Site Map - Crime

Terrorism hoaxes

- A bill (H.R. 1678) introduced by Sen. Lamar Smith (R-TX) that would make it a federal crime to fool people into believing that an act of terrorism had taken place has been approved by the House Judiciary Committee's Subcommittee on Crime, Terrorism, and Homeland Security. The bill would also require anyone convicted under the measure to reimburse law enforcement for any costs of investigating the hoax.

Violence: A Contemporary Reader

- Violence exists in myriad forms, from school bullying, to workplace brutality, to large-scale terrorist attacks. In this volume, the editors have compiled articles that address violence from many angles, including its social implications and origins, as well as the patterns and psychology of various types of violent criminals. Detailed accounts of violent crimes are accompanied by statistical charts and graphs.

Many Colleges Not Seeing Clery

- When a LaSalle University female student was allegedly raped by two of the school's basketball players in June, the case grabbed national headlines. But many serious crimes on campus continue to go unnoticed, despite the Clery Act's mandate that colleges and universities that receive federal funds report crime data. That's underscored by data that the nonprofit group Security On Campus (SOC) obtained from the Department of Education (DOE). The data showed that since mid-2002, 123 schools violated the Clery Act.

Computer crime survey.

- Denial-of-service (DOS) attacks have emerged as the type of computer-security incident that costs companies the most money, supplanting the top risk for the previous five years--theft of proprietary data--for the first time. That's one statistic from the ninth annual 2004 CSI/FBI Computer Crime and Security Survey. The survey also found that overall dollar losses have diminished dramatically from a year before, from more than $200 million to less than $150 million. Despite the reduction, the report suggests that DOS attacks have become an increasingly common threat because they are often entwined with viruses

Quick Bytes: PDA forensics guide

- PDAs are more popular than ever, with 2.75 million hand-held devices shipped in the second quarter of 2004 alone. PDAs are more popular than ever, with 2.75 million hand-held devices shipped in the second quarter of 2004 alone. Because criminals are among the loyal users of the devices, those who are tasked with performing forensic examinations of computers must also know how to get data off a PDA in a way that preserves evidence for a court case. A Special Publication of the National Institute of Standards and Technology (NIST) has been developed to help organizations create policies and procedures for dealing with PDA forensics. The document includes information on forensic tools and proper procedures. @ is available through SM Online.

Money laundering

- The Federal Deposit Insurance Corporation (FDIC) has announced its auditing procedures for ensuring that banks and other financial institutions are in compliance with security measures established under the U.S. Patriot Act. The measures, designed to fight money laundering, focus on a customer identification program through which bank officials verify the identity of customers.

Did You Know That?

- After a ten-year plunge, the average national rate of U.S. property crime leveled off in 2003. Property-crime rates nudged higher from 2002 to 2003 in households in the northeast, south, and midwest. The rate declined slightly in the west, but that region maintains by far the highest rate of property crime. @ More data is available from the Bureau of Justice Statistics' Crime Victimization 2003.

Gun control

- Researchers look at the effect of the former ban on assault weapons.

Fraud and Corruption Prevention and Identification

- Authors Nigel Iyer and Martin Samociuk avoid philosophical arguments on business theories regarding corporate fraud and corruption to provide practical and workable solutions for prevention and detection programs.

Shining Light on Nonlethal Weapons

- A new device that uses light to incapacitate suspects is the latest tool in law enforcement's nonlethal arsenal.

Investigating Religious Terrorism and Ritualistic Crimes

- Perlmutter, director of the Institute for the Research of Organized and Ritual Violence, examines in detail groups and religions such as Odinism/Asatru (Germanic "heathenry"), the White Order of Thule (Aryan supremacism), and the Phineas Priesthood (a white-supremacist group, of sorts), depicting the violence their members have wrought.

Software Forensics: Collecting Evidence from the Scene of a Digital Crime.

- Author Robert Slade mines solid detail, including listing specific software tools that can be used to identify and track virus creators, however unlikely corporate America might be to invest resources for such an effort. Slade discusses legal rules of evidence and emphasizes the importance of keeping evidence pristine so that its veracity is unshakable.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.