Friday, October 31, 2014

Basic criminology reading list

Check refs...

http://cech.uc.edu/content/dam/cech/programs/criminaljustice/docs/Crime%20Prevention%20Comps%20Reading%20List%2015%20May%202013.docx


From My iPhone

Issues with crime displacement studies

Fudged boundaries.

http://www.jratcliffe.net/wp-content/uploads/Sorg-et-al-2014-Boundary-noncompliance-during-place-based-policing-evaluations.pdf

Campbell Crime and Justice Group Title Registration Form

Multiple types of displacement ...

http://www.campbellcollaboration.org/lib/download/725/Displacement_benefits_policing_initiatives_T.pdf

Health care data breaches have hit 30M patients and counting - The Washington Post

Typical ...

http://www.washingtonpost.com/blogs/wonkblog/wp/2014/08/19/health-care-data-breaches-have-hit-30m-patients-and-counting/


From My iPhone

Crime displacement

PDF of big study;

http://extra.shu.ac.uk/ndc/downloads/general/NDC_Crime_Displacement.pdf

Center for Problem-Oriented Policing | Tool Guides | Analyzing Crime Displacement and Diffusion

Great list of sources on crime displacement, for essay.

http://www.popcenter.org/tools/displacement/references


From My iPhone

“You Should Learn to Code” Is The New “You Should Go To Law School” Talk Dads Love To Have — Matter — Medium

Share...

https://medium.com/matter/you-should-learn-to-code-is-the-new-you-should-go-to-law-school-talk-dads-love-to-have-b03bd22b3c99


From My iPhone

Wednesday, October 29, 2014

‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security

‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security:



“The [Canadian] bank in this case would take any old cryptogram and they weren’t checking that one-time code because they didn’t have it implemented correctly,” Litan said. “If they saw an EMV transaction and didn’t see the code, they would just authorize the transaction.”

Litan said the fraudsters likely knew that the Canadian bank wasn’t checking the cryptogram and that it wasn’t looking for the dynamic counter code.

Big Brother’s Liberal Friends | The National Interest

NSA and liberals...

http://nationalinterest.org/feature/big-brother%E2%80%99s-liberal-friends-11515?page=show


From My iPhone

Monday, October 27, 2014

‘Replay’ Attacks Spoof Chip Card Charges — Krebs on Security

...fraud transactions coming from Brazil and hitting card accounts stolen in recent retail heists, principally cards compromised as part of the breach at Home Depot.


From My iPhone

White Hat Hackers Fight For Legal Reform - Dark Reading

"Legal is always on the table… This stuff happens all the time, more than people realize, behind the scenes," says Rios, who is director of threat intelligence at Qualys. "A lot of times researchers put themselves at risk as an individual" when they disclose their findings, he says.

http://www.darkreading.com/white-hat-hackers-fight-for-legal-reform/d/d-id/1316838?_mc=sm_dr_editor_kellyjacksonhiggins


From My iPhone

Genetic Testing Report-Appendix 6

Good essay...

http://www.genome.gov/10002401

Sunday, October 26, 2014

Inverse Path - USB armory

The USB armory from Inverse Path is an open source hardware design, implementing a flash drive sized computer.

http://inversepath.com/usbarmory


From My iPhone

Synthetic Identity Fraud Risk Skyrockets - Infosecurity Magazine

Look deeper...

http://www.infosecurity-magazine.com/news/synthetic-identity-fraud-risk?utm_source=twitterfeed&utm_medium=twitter


From My iPhone

The Invention Secrecy Act of 1951

The Invention Secrecy Act of 1951: "Whenever the publication or disclosure of an invention by the granting of a patent, in which the Government does not have a property interest, might, in the opinion of the Commissioner, be detrimental to the national security, he shall make the application for patent in which such invention is disclosed available for inspection to the Atomic Energy Commission, the Secretary of Defense, and the chief officer of any other department or agency of the Government designated by the President as a defense agency of the United States. Each individual to whom the application is disclosed shall sign a dated acknowledgment thereof, which acknowledgment shall be entered in the file of the application."



'via Blog this'

Government secrecy orders on patents keep lid on inventions | The Center for Investigative Reporting

Government secrecy orders on patents keep lid on inventions | The Center for Investigative Reporting: "Gold developed a breakthrough in wireless communications that would help people speak to one another with less interference and greater security.

Then it disappeared like a dropped call."



'via Blog this'

Monday, October 20, 2014

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED: "S X Yosemite pushes the limits of data collection tolerance one step further: its desktop search tool Spotlight uploads your search terms in real time to Apple’s remote servers, by default."



'via Blog this'

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED

How to Stop Apple From Snooping on Your OS X Yosemite Searches | WIRED: "S X Yosemite pushes the limits of data collection tolerance one step further: its desktop search tool Spotlight uploads your search terms in real time to Apple’s remote servers, by default."



'via Blog this'

Thursday, October 9, 2014

MTA grappling with massive data breach | New York Post

The information included the names, social security numbers, and the date of birth of workers with different titles throughout the New York City Transit Authority, including those retired and deceased.

http://nypost.com/2014/03/13/mta-grappling-with-massive-data-breach/

Wednesday, October 8, 2014

The Ebola Outbreak: Good Medicine Against Public Panic

we have so much trust in our 21st century health system that we are confident we can combat Ebola.

http://m.huffpost.com/us/entry/5942446


From My iPhone

Wednesday, October 1, 2014

How IoT big data will transform manufacturing automation - TechRepublic

Realizing the potential of a total manufacturing transformation with use of IoT big data, Germany initiated its Industry 4.0 government initiative to spur its industrial sector.

http://www.techrepublic.com/article/how-iot-big-data-will-transform-manufacturing-automation/