INFORMATION

Site Map - Crime

A Site to See

- Unlike the bricks-and-mortar world, where you can lower your risk of becoming a victim of crime by staying out of dangerous neighborhoods, digital threats are fairly equally dispersed. Crimeware can—and probably does—arrive several times a day into your e-mail’s inbox, and an unpatched computer can pick up a “drive-by” infection simply by visiting an infected site. If you want to learn more about online fraud and crimeware, visit a new Web site from Symantec that offers detailed explanations of well-known as well as nascent threats. It also includes prevention tips and advice about what to do if you are victimized. There are even some demonstrations of phishing, pharming, and Trojan horses, as well as some quizzes that will let you test your knowledge of the online threatscape. The rich resources and explanations make it A Site to See.

Putting a Premium on Risk Reduction

- Insurers will give better rates to hospitality industry properties that incorporate safety and security policies.

Firearms

- A new bill (H.B. 146) introduced in the Virginia House of Delegates would prohibit anyone who is carrying a concealed weapon into a restaurant or club from consuming alcohol on the premises. Certain people would be exempt under the bill including the owner of the premises in question and law enforcement officers. Members of target-shooting organizations and gun-collecting clubs would be exempt only if their weapons are unloaded and securely wrapped.

Norwegian Wood:Good for Thieves

- A new report by the Swedish National Heritage Board and the Swedish National Council for Crime Prevention chronicles the problem of Nordic cultural heritage crime.

Retail Workers Don't Plan Thefts

- A study of U.K. retail theft incidents found that most were unplanned crimes of opportunity at the cash register.

When Cybercriminals Turn Pro

- Cole and his team wanted to examine the changing nature of hackers and malicious-code writers, and the communities in which they work. As a basis for their research, the Symantec team looked specifically at an increasingly widespread Trojan horse program called Bancos that targets customers of some Latin American banks and tries to steal their account passwords.

Global Anticounterfeiting Plan

- Some crimes, like the counterfeiting of pharmaceuticals, are difficult for a country to fight alone. The World Health Organization (WHO) is urging countries to unite against this growing problem, which not only hurts corporations and raises drug prices but also injures or kills the victimized patients. In a new concept paper, WHO "seeks to launch discussions on a mechanism of effective international collaboration for combating counterfeit drugs," to include the adoption of guidelines and standards. The group would be known as the International Medical Products Anti-Counterfeiting Taskforce (IMPACT). The paper lays out proposed objectives and principles for IMPACT, covering topics ranging from amendment of national laws to the use of tracking technology. @ SM online takes you to the paper.

Money Laundering

- A government report on money laundering notes the rise in popularity of online currency services as a conduit for illicit funds.

Security Officers

- The FBI has issued an interim final rule setting out how employers can request criminal background checks on private security officers.

Community Policing

- Find out how the Long Beach, California, COPS program has successfully addressed drugs, graffiti, gangs, shootings, and prostitution.

Foundation Project to Advance Victim's Rights

- A wrap-up of industry awards, deals, and contracts. Plus, ASIS anounces the “Power of Certification” winners and the Foundation advances the rights of victims.

Spy Handler: Memoir of a KGB Officer

- Cherkashin served as chief counterintelligence officer at the Soviet embassy in Washington, D.C., where he handled notorious spies Aldrich Ames and Robert Hanssen.

The Grey House Transportation Security Directory & Handbook.

- Transportation companies must weave their way through complex security requirements and a baffling array of resources. This directory does readers a service by pulling together many of these requirements and resources.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.