Archive

Archive for the ‘crime’ Category

Identity Theft Legislation 2014

October 23, 2014 Comments off

Identity Theft Legislation 2014
Source: National Conference of State Legislatures

Identity theft occurs when someone uses another person’s identifying information, like a person’s name, Social Security number, or credit card number or other financial information, without permission, to commit fraud or other crimes. Identity theft continues to generate the most complaints with the Federal Trade Commission.

The chart below lists state legislation introduced or pending during the 2014 legislative session relating to identity theft. Legislation in 30 states and Puerto Rico is pending in the 2014 legislative session and includes legislation regarding criminal penalties, identity theft passports and identity theft prevention. Nineteen bills have been enacted in 2014.

About these ads

Understanding the Organization, Operation, and Victimization Process of Labor Trafficking in the United States

October 23, 2014 Comments off

Understanding the Organization, Operation, and Victimization Process of Labor Trafficking in the United States
Source: Urban Institute

This study chronicles the experiences of labor trafficking victims from the point of recruitment for work, their forced labor victimization, their attempts to escape and get help, and their efforts to seek justice through civil or criminal cases. The report finds that legal loopholes and lax enforcement enable labor traffickers to commit crimes against workers in major US industries: agriculture, domestic work, hotels, restaurants, and construction. Interview and case file data detail the ubiquity of trafficking, which occurs both in plain sight and behind lock and key. Detailed recommendations propose next steps for policy and practice.

See also: Lax Enforcement and Legal Loopholes Enable Labor Trafficking Victimization; Broadest look ever at victim experiences in five major US industries

CBO — How Initiatives to Reduce Fraud in Federal Health Care Programs Affect the Budget

October 22, 2014 Comments off

How Initiatives to Reduce Fraud in Federal Health Care Programs Affect the Budget
Source: Congressional Budget Office

Observers often cite fraud as an important contributor to high health care spending, particularly in federal programs. This report describes how CBO estimates the budgetary effects of legislative proposals to reduce fraud in Medicare, Medicaid, and the Children’s Health Insurance Program (CHIP), and how those estimates are used in the Congressional budget process.

CRS — Cybersecurity: Authoritative Reports and Resources, by Topic (October 14, 2014)

October 20, 2014 Comments off

Cybersecurity: Authoritative Reports and Resources, by Topic (PDF)
Source: Congressional Research Service (via Federation of American Scientists)

This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. The reports and related websites are grouped under the following cybersecurity topics:
• policy overview
• National Strategy for Trusted Identities in Cyberspace (NSTIC)
• cloud computing and FedRAMP
• critical infrastructure
• cybercrime, data breaches, and data security
• national security, cyber espionage, and cyberwar (including Stuxnet)
• international efforts
• education/training/workforce
• research and development (R&D)

In addition, the report lists selected cybersecurity-related websites for congressional and government agencies, news, international organizations, and organizations or institutions.

CRS — Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws (October 15, 2014)

October 20, 2014 Comments off

Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws (PDF)
Source: Congressional Research Service (via Federation of American Scientists)

The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008).

Attributes of Truthful Versus Deceitful Statements in the Evaluation of Accused Child Molesters

October 18, 2014 Comments off

Attributes of Truthful Versus Deceitful Statements in the Evaluation of Accused Child Molesters
Source: Sage Open

The ability to detect deception, in everyday social interactions and psychological evaluations, can literally mean the difference between life and death. Beyond physiological and nonverbal techniques for detecting deception, research has focused on criteria designed to evaluate the content of verbal statements to distinguish between true or actually experienced events versus internally manufactured or fabricated events. Criteria from two techniques that have received empirical support, criteria-based content analysis and reality monitoring, were used to create an 11-item Deception Detection Checklist (DDCL). In this study, 130 college undergraduates used the DDCL to rate the exculpatory statements of two accused child molesters: one truthful, the other untruthful. The 11 items composing the DDCL, as well as a measure of perceived truthfulness, were all scored on 7-point Likert-type scales. Nine of the 11 items on the DDCL significantly differentiated between the true and untrue statements in the predicted direction. Overall scores on the DDCL indicated that the false statement was rated as significantly more deceptive than the true statement. The DDCL possessed good reliability, and a series of factor analyses provided strong support for the construct validity of the measure. The 7 psychometrically strongest items from the DDCL included variables assessing the extent to which statements included clarity of detail, spatial details, temporal details, and contextual details, as well as the relevance, reconstructability, and realism of the statement. These results indicate that subjects were able to use this measure to reliably differentiate between true and false statements made by accused child molesters.

U.S. Department of Education Announces Final Rule to Help Colleges Keep Campuses Safe

October 17, 2014 Comments off

U.S. Department of Education Announces Final Rule to Help Colleges Keep Campuses Safe
Source: U.S. Department of Education

The Obama Administration today announced publication of the final rule implementing changes made to the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (Clery Act) by the Violence Against Women Reauthorization Act of 2013 (VAWA). That law and the new rule strengthen the Clery Act to more effectively address, and ultimately reduce, sexual violence on college campuses, including, domestic violence, dating violence, and stalking.

The Clery Act requires institutions of higher education to comply with certain campus safety- and security-related requirements as a condition of participating in the Federal student financial aid programs authorized by Title IV of the Higher Education Act.

Earlier this year, the Department announced that a negotiating rulemaking committee, representing a broad range of experience, interests, and perspectives including campus law enforcement and security professionals, victim advocates, school attorneys, student affairs professionals, and most importantly, students, reached consensus on the draft of the new campus safety provisions. Those draft provisions were published in the Federal Register on June 20 as a proposed rule (NPRM) and included a 30-day public comment period.

Based on comments received from a variety of individuals and groups after publication of the proposed rule, the final rule includes additional requirements to ensure that institutions provide the most complete information possible to their students, better inform and protect victims, and clarify the process for collecting crime statistics and for disclosing in their annual security report the number of crime incidents that were fully investigated and determined to be unfounded, and thus, not included in their crime statistics during the three most recent calendar years.

Follow

Get every new post delivered to your Inbox.

Join 938 other followers