INFORMATION

Site Map - Crime

Foundation Project to Advance Victim's Rights

- A wrap-up of industry awards, deals, and contracts. Plus, ASIS anounces the “Power of Certification” winners and the Foundation advances the rights of victims.

Spy Handler: Memoir of a KGB Officer

- Cherkashin served as chief counterintelligence officer at the Soviet embassy in Washington, D.C., where he handled notorious spies Aldrich Ames and Robert Hanssen.

The Grey House Transportation Security Directory & Handbook.

- Transportation companies must weave their way through complex security requirements and a baffling array of resources. This directory does readers a service by pulling together many of these requirements and resources.

Pinning Down Online Money Laundering

- The government report notes with some alarm the rise in popularity of online payment services that can accept funds in different ways, including cash and money orders.

Numbers

- 4 The percent drop that occurred in the level of property crime in the U.S. Northeast from the first six months of 2004 to the first six months of 2005, according to the FBI.

The Detective and the Database

- Combining investigative know-how and computing power can help security professionals find crime clues hidden in databases.

Spotlight on Security for Real Estate Managers, Second Edition.

- Aiming to help real estate managers reduce crime, deal with the consequences of crime, and reduce liability, the book hits its goal spot on. Five distinct sections cover legal issues, assessment tools, crime prevention strategies, security at various types of properties, and the use of security measures. Examples, tables, lists, outlines, sidebars, and other elements add depth to the narrative.

Crime Fighters Collaborate

- A district attorney’s efforts to enlist banks in the fight against white-collar criminals has yielded results and helped to spark similar efforts in jurisdictions nationwide.

Numbers

-

Computer Forensics: Computer Crime Scene Investigation, Second Edition

- For novices or general security practitioners, on the other hand, the information can be bewildering. The information is too detailed and complicated for beginners.

Digital Evidence and Computer Crime, Second Edition

- The bits-and-bytes material is cushioned by rich context, with sections addressing the history of computer crime and the methods and mind-sets of computer criminals.

A Look at Laptop Theft

- Twenty-nine percent of all stolen laptops are taken from offices, with thefts from cars responsible for another 25 percent of laptop losses, according to survey data from CREDANT Technologies, a security software provider. Some of the 283 executives who responded to the survey noted that office laptops had been stolen despite being locked or even glued to desktops. Only 10 percent of the units had a full-disk encryption solution in place, and 82 percent of the stolen laptops were never recovered  @ More details from the survey are available at SM Online.

Knocking Gangs Off the Network

- When it comes to street gangs, “network analysis” has nothing to do with identifying risks in computer systems but rather with analyzing the pattern of social relationships among gangs and individual members. In an innovative program, the North Jersey Gang Task Force has been using network analysis to combat the gang problem in Newark. Partnering with Rutgers University, which has provided free access to graduate students and researchers, the task force has been documenting relationships among gang members, such as which ones hang out together and which have been incarcerated together. Among other things, the analysis has revealed differing levels of “embeddedness” on the part of specific gang members, indicating that different tactics for intervention are necessary for particular gang members. “Cut points”—people who are the only connection among people or groups—have been identified as potentially ideal targets for disrupting gangs.@  Learn more about the program in a report published by the U.S. Department of Justice’s Office of COPS. it is available at SM Online.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.