11/02/2007 - Going to Chicago and wondering where to park your car while you’re in your meeting? Stick to a parking garage rather than looking for a spot on the street, where your car is much more likely to be stolen. Web developer Adrian Holovaty took data about crime put online by the city of Chicago and married it with maps from Google to pinpoint the precise spots where cars have been stolen in recent months. His crime map is now available online to any interested surfer. Other crime-related data can be found on maps as well, from the precise locations of bomb threats in Chicago to the places that have been held up by robbers without a weapon, or where personal property has been damaged by fire or explosion, along with the date of each crime. The wealth of information combined with Google’s mapping functionality is an example of how online data will likely be mapped in the future, making it A Site to See. Find this month’s A Site to See at SM Online.
10/29/2007 - In an article in the FBI Law Enforcement Bulletin, Special Agent Brian Parsi Boetig explains how, in employing those methods, interrogators can use “criminological theories of deviance” to help gain confessions. For example, the “rational choice” theory posits that people do what’s in their self-interest.
10/29/2007 - Research firm Gartner has estimated that ATM and debit-card fraud resulted in $2.75 billion in losses in the 12 months ending in May 2005. Most, it says, resulted from phishing and keystroke-logging attacks that capture account information and PINs. However, research from TowerGroup, a global financial-services advisor, estimates these losses to be much lower, with less than one percent of fraud losses coming from phishing. Most losses, it says, are from stolen cards and card skimming.@ Criminals Exploit Consumer Bank Account and ATM System Weaknesses is $95 through the Gartner Web site. Turning Phishing into Cash: Criminal Convenience at the ATM? is available from TowerGroup for $1,750; a summary is at SM Online.
10/29/2007 - A bill (S. 1408) that would set national standards requiring businesses to report data security breaches to its customers has been approved by the Senate Commerce, Science, and Transportation Committee. tracking system for all radiation sources in the United States.