INFORMATION

Site Map - Crime

Crime Fighters Collaborate

- A district attorney’s efforts to enlist banks in the fight against white-collar criminals has yielded results and helped to spark similar efforts in jurisdictions nationwide.

Numbers

-

Computer Forensics: Computer Crime Scene Investigation, Second Edition

- For novices or general security practitioners, on the other hand, the information can be bewildering. The information is too detailed and complicated for beginners.

Digital Evidence and Computer Crime, Second Edition

- The bits-and-bytes material is cushioned by rich context, with sections addressing the history of computer crime and the methods and mind-sets of computer criminals.

A Look at Laptop Theft

- Twenty-nine percent of all stolen laptops are taken from offices, with thefts from cars responsible for another 25 percent of laptop losses, according to survey data from CREDANT Technologies, a security software provider. Some of the 283 executives who responded to the survey noted that office laptops had been stolen despite being locked or even glued to desktops. Only 10 percent of the units had a full-disk encryption solution in place, and 82 percent of the stolen laptops were never recovered  @ More details from the survey are available at SM Online.

Knocking Gangs Off the Network

- When it comes to street gangs, “network analysis” has nothing to do with identifying risks in computer systems but rather with analyzing the pattern of social relationships among gangs and individual members. In an innovative program, the North Jersey Gang Task Force has been using network analysis to combat the gang problem in Newark. Partnering with Rutgers University, which has provided free access to graduate students and researchers, the task force has been documenting relationships among gang members, such as which ones hang out together and which have been incarcerated together. Among other things, the analysis has revealed differing levels of “embeddedness” on the part of specific gang members, indicating that different tactics for intervention are necessary for particular gang members. “Cut points”—people who are the only connection among people or groups—have been identified as potentially ideal targets for disrupting gangs.@  Learn more about the program in a report published by the U.S. Department of Justice’s Office of COPS. it is available at SM Online.

Aptitude for Destruction: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism

- Readers come to understand the backgrounds, operations and tactics, training methods, logistics, and intelligence operations of these groups.

Corporate Crooks: How Rogue Executives Ripped Off Americans…and Congress Helped Them Do It!

- The period from the late 1990s into the early years of the 21st century is likely the best-documented era of corporate scandal in history.  In Corporate Crooks, Greg Farrell, an investigative reporter for USA Today, offers a simple primer on the subject.

Laptop Security

- Read about the staggering economic costs downtown Calgary experienced due to laptops stolen from tenant space.

Exploits of the Nigerian Con Man

- Named for the section of the 1958 Nigerian Criminal Code that makes it illegal, the modus operandi should be familiar to all readers: a powerful person’s relative has access to huge money and needs your help laundering it.

Haitian Money Laundering

- The fight against money laundering in Haiti.

Afghanistan's Opium Addiction

- Afghanistan's booming opium trade.

Youth Street Gangs Threaten London

- It's not just the United States and Latin America where youth gang-related violence and drug dealing has become an epidemic, but London as well.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.