摘要 :
This research investigated the theft of copper, including scope, impacts, and countermeasures. The researchers completed a literature review to demonstrate a global perspective of the problem. They took a survey of other state dep...
展开
This research investigated the theft of copper, including scope, impacts, and countermeasures. The researchers completed a literature review to demonstrate a global perspective of the problem. They took a survey of other state departments of transportation, utility companies, and developers to determine both successful and unsuccessful techniques being used to deter copper theft and the impact copper theft had on other geographical regions and other industries. Additionally, the researchers conducted a site survey to gain knowledge of the specific issues impacting the Arizona Department of Transportation and what mitigation techniques it was implementing. During the time of the research it was found: (1) The Arizona Department of Transportation estimates that costs over the last two years have exceeded $500,000. (2) The Arizona Department of Transportation has been diligent in implementing and adapting various methods and/or techniques to prevent copper theft and apprehend culprits. Suggested mitigation techniques include: (1) Implement a collaborative effort among ADOT, the contracted private investigation firm, and outside consultant(s) to review and amend efforts on a periodic basis to maximize effectiveness through a thinktank type of approach. (2) Implement a program that would monitor ongoing development of methods used by other organizations. (3) Make particular use of the Copper Keeper, a device that makes it difficult to pull wire through conduit by locking the wire in place through the tightening of a compression bolt.
收起
摘要 :
In the wake of rising motor vehicle thefts during the late 1980s and early 1990s, San Diego's Regional Auto Theft Task Force (RATT) was formed in July 1992 as a proactive approach to the investigation, apprehension, and prosecutio...
展开
In the wake of rising motor vehicle thefts during the late 1980s and early 1990s, San Diego's Regional Auto Theft Task Force (RATT) was formed in July 1992 as a proactive approach to the investigation, apprehension, and prosecution of auto thieves, particularly those involved in major countywide vehicle theft operations (i.e., rings). An innovative method for funding the program is administered by the California Department of Motor Vehicles (DMV). A $1 assessment on vehicle registrations provides the necessary monies for the salaries of RATT staff. RATT includes entities other than traditional law enforcement organizations. The task force is comprised of federal, state, and local law enforcement agencies: the Federal Bureau of Investigation (FBI),U.S. Attorney, U.S. Customs, California Highway Patrol (CHP) -Border Division, and allten local police agencies. RATT represents an extension of the traditional task force approach, by not only including the aforementioned government agencies, but also the private sector (i.e., the Nationd Insurance Crime Bureau (NICB)). The local prosecutor (i.e., the San Diego County District Attorney) provides legal guidance in warrant preparation and evidence requirements, as well as vertical prosecution of cases (i.e., the same District Attorney CP,rlandles the case from initial hearing through final disposition). During the fust two years of RATT operation, investigations were limited by the lack of integrated auto theft information available through an automated system. The ability of this multi-jurisdictional task force was hampered because data were fragmented along jurisdictional boundaries. The Criminal Justice Research Division of the San Diego Association of Govern- ments (SANDAG) received funds from the National Institute of Justice (NU)to develop a computer system to enhance the crime analysis and mapping capabilities of RATTand evaluate the effectiveness of task force efforts following the implementation of the new technology.
收起
摘要 :
This report shows how weighted graphs may be used to study the vulnerability of a fixed-site security system to theft. A general way of constructing graph theoretic models is presented together with variations in the types of weig...
展开
This report shows how weighted graphs may be used to study the vulnerability of a fixed-site security system to theft. A general way of constructing graph theoretic models is presented together with variations in the types of weight functions which will produce different specific models designed to accommodate various physical situations. One specific model is studied in detail,the basic theft model,in which the weights are constants independent of the direction of travel. This model admits solution by a Dijkstra-type algorithm,and hence the run time is roughly proportional to the square of the number of nodes in the graph.
收起
摘要 :
The National Highway Traffic Safety Administration (NHTSA) is responsible for establishing and enforcing vehicle antitheft regulations. Motor vehicle theft is a growing problem that results in billions of dollars in losses every y...
展开
The National Highway Traffic Safety Administration (NHTSA) is responsible for establishing and enforcing vehicle antitheft regulations. Motor vehicle theft is a growing problem that results in billions of dollars in losses every year. NHTSA has developed this annual guide to provide the law enforcement community with a concise reference tool to help identify passenger motor vehicles that have been exempted from the parts-marking requirements through model year 2013 and also to assist law enforcement in their prosecution and motor vehicle theft prevention efforts. This new guide provides a quick-reference, comprehensive summary of the vehicles that have been installed with antitheft devices as standard equipment, identifying which vehicles are exempted from the parts-marking requirements, the type of exemption granted (partial or full), and the production year(s) for which the exemption applies.
收起
摘要 :
In response to dramatic increases in vehicle thefts, local, state, and federal agencies formed the San Diego Regional Auto Theft Task Force (RATT). The task force is a proactive approach to the investigation, apprehension, and pro...
展开
In response to dramatic increases in vehicle thefts, local, state, and federal agencies formed the San Diego Regional Auto Theft Task Force (RATT). The task force is a proactive approach to the investigation, apprehension, and prosecution of motor vehicle theft suspects, particularly those involved in major countywide vehicle theft operations. RATT is funded through a $1 assessment on state vehicle registration, authorized by State Senate Bill 2 139. Sixteen federal, state, and local law enforcement agencies participate in RATT. The National Institute of Justice(NIJ) authorized funding to the San Diego Association of Governments to evaluate the effectveness of enhanced crime analysis information about motor vehicle thefts to target enforcement and crime prevention efforts. The evaluation involves collecting motor vehicle theft data to identify information needed by investigators and to analyze crime patterns associated with major vehicle theft rings. A crime analysis and mapping system (CAMS) is being developed and implemented in collaboration with the San Diego Police Department Crime Analysis section. In addition, the assessment entails providing crime analysis information to detectives and identifjhg target and control areas for enforcement and crime prevention. The evaluation includes a descriptive analysis of operations beforeand after the implementation of CAMS, analysis of baseline and post-test data, and interviews with RATT detectives. This paper presents on overview of motor vehicle theft in San Diego County. Also presented is information from interviews conducted with RATT staff, the process of the creation of CAMS, and identification and implementation of strategies in target and control areas chosen throughout the county of San Diego.
收起
摘要 :
It is commonplace to note that in surveys people claim to place a high value on privacy while they paradoxically throw away their privacy in exchange for a free hamburger or a two dollar discount on groceries. The usual conclusion...
展开
It is commonplace to note that in surveys people claim to place a high value on privacy while they paradoxically throw away their privacy in exchange for a free hamburger or a two dollar discount on groceries. The usual conclusion is that people do not really value their privacy as they claim to or that they are irrational about the risks they are taking. Similarly it is generally claimed that people will not pay for privacy; the failure of various ventures focused on selling privacy is offered as evidence of this. In this chapter we will debunk these myths. Another myth we will debunk is that identity theft is a privacy problem. In fact it is an authentication problem and a problem of misplaced liability and cost. When these are allocated to those who create them, the problem does not exist. Finally we consider the oft asked question of how much privacy should be given up for security. We find this to be the wrong question. Security of institutions may decrease and infrastructure costs may be increased by a reduction in privacy.
收起
摘要 :
In fiscal year 2001, the United States Postal Service (the Service) reported that it lost about $6.3 million in remittances (cash and checks) to robberies, internal theft, and mishandling. One particular loss - June 2001 theft of ...
展开
In fiscal year 2001, the United States Postal Service (the Service) reported that it lost about $6.3 million in remittances (cash and checks) to robberies, internal theft, and mishandling. One particular loss - June 2001 theft of over $3.2 million from a Phoenix, AZ, postal facility by a career Service employee received considerable media attention. Pursuant to a Congressional request, GAO agreed to review Service policies and procedures for the security of remittances by addressing the following questions: Does the Service have reasonable physical controls and security to safeguard its remittances. Does the Service have policies for conducting background checks of employees who process remittances. Does the Service provide training to its employees who process remittances.
收起
摘要 :
Motor vehicle theft was a growing problem in the early and mid 1980's. In 1984, Congress enacted the Motor Vehicle Theft Law Enforcement Act in order to reduce the incidence of motor vehicle thefts and facilitate the tracing and r...
展开
Motor vehicle theft was a growing problem in the early and mid 1980's. In 1984, Congress enacted the Motor Vehicle Theft Law Enforcement Act in order to reduce the incidence of motor vehicle thefts and facilitate the tracing and recovery of stolen motor vehicles and parts from stolen vehicles. The Department of Transportation implemented the 1984 Act by issuing the Federal Motor Vehicle Theft Prevention Standard, which requires manufacturers of designated high theft passenger car lines to inscribe or affix the Vehicle Identification Number (YIN) onto the engine, the transmission, and 12 major body parts. As an alternative to parts marking, manufacturers could choose to install antitheft devices as standard equipment on a limited number of those lines. The objective of parts marking is to allow law enforcement agencies to identify stolen vehicles or parts removed from stolen vehicles - and to deter professional thieves since they will have difficulty in marketing stolen marked parts and are more likely to get caught if they steal cars with . marked parts. The high-theft car lines were designated in 1985, and actual parts marking began with model year 1987.
收起
摘要 :
This paper describes an analysis that justifies applying the pattern 'Increased Review for Intellectual Property (IP) Theft by Departing Insiders.' The pattern helps organizations plan, prepare, and implement a strategy to mitigat...
展开
This paper describes an analysis that justifies applying the pattern 'Increased Review for Intellectual Property (IP) Theft by Departing Insiders.' The pattern helps organizations plan, prepare, and implement a strategy to mitigate the risk of insider theft of IP. The analysis shows that organizations can reduce their risk of insider theft of IP through increased review of departing insiders' actions during a relatively small window of time prior to their departure. Preliminary research results show that approximately 70% of insider IP thieves can be caught by following the pattern's recommendation of reviewing insiders' actions for theft events during only the last two months of their employment. These results provide practical guidance for practitioners wishing to fine tune the application of the pattern for their organizations. 'Increased Review for IP Theft by Departing Insiders' is part of the CERT(registered) Insider Threat Center's evolving library of enterprise architectural patterns for mitigating the insider threat, based on the Center's collected data. The Center's larger goal is to foster greater organizational resilience to insider threat, using repeated application of patterns from the library.
收起