Archive for the ‘crime’ Category

ICBA Data Breach Toolkit

January 5, 2015 Comments off

ICBA Data Breach Toolkit
Source: Independent Community Bankers of America

Who Should Use This Toolkit:
Front-Line Marketing, Communications and Product Contacts at Issuing Financial Institutions

Protect cardholder trust in payments by providing a practical guide to managing communications after a data compromise at a third party.

To more effectively combat a public relations crisis with a breach of card security, ICBA and Visa have teamed up to bring a special communications toolkit to community banks. This comprehensive communications guide gives community banks the means of communicating with card customers and the media within 24 hours of a data compromise. Having this contingency plan in place can make all the difference in a data breach episode.

Toolkit Includes:
A brochure on communications best practices following a data breach, as well as customizable template materials like cardholder letters, statement inserts, FAQs, and media statements. Click on the documents below to download each PDF.

Juvenile Court Statistics 2011

December 30, 2014 Comments off

Juvenile Court Statistics 2011 (PDF)
Source: Office of Juvenile Justice and Delinquency Prevention

Juvenile Court Statistics 2011 describes delinquency cases handled between 1985 and 2011 and petitioned status offense cases handled between 1995 and 2011 by U.S. courts with juvenile jurisdiction. National estimates of juvenile court delinquency caseloads in 2011 were based on analyses of 910,063 automated case records and court-level statistics summarizing an additional 51,569 cases. Estimates of status offense cases formally processed by juvenile courts in 2011 were based on analyses of 80,837 automated case-level records and court-level summary statistics on an additional 6,285 cases. The data used in the analyses were contributed to the National Juvenile Court Data Archive (the Archive) by more than 2,400 courts with jurisdiction over 85% of the juvenile population in 2011.

Violence perpetrated by ex-spouses in Canada

December 30, 2014 Comments off

Violence perpetrated by ex-spouses in Canada
Source: Justice Canada

Intimate partner violence affects the lives of many Canadians. In 2011, there were 97,451 victims of police-reported intimate partner violence1 (Sinha 2013) with women representing 80% of the victims of police-reported intimate partner violence in 2011.

While these numbers provide some insight into the prevalence of spousal violence2 in Canada, it only reflects a small portion of the actual violence that occurs. Data from the 2009 General Social Survey – Victimization (GSS) found that only 22% of victims of self-reported spousal violence reported the incident to the police (Brennan 2011). These numbers also do not provide information on the prevalence of violence perpetrated by ex-spouses, nor the experiences of victims of ex-spousal violence

Parental Rights and Sexual Assault

December 29, 2014 Comments off

Parental Rights and Sexual Assault
Source: National Conference of State Legislatures

Approximately 26 states and the District of Columbia have enacted legislation regarding the parental rights of perpetrators of sexual assault.

Eighteen states allow for termination of parental rights if the parent was convicted of sexual assault which resulted in the birth of the child. The other 8 states and the District of Columbia deny custody or visitation if the child was conceived as a result of a rape or sexual assault. Generally, a conviction is required before parental rights are terminated.

Also, some states (Arkansas, the District of Columbia, Hawaii, Illinois, Kentucky, Rhode Island, Utah and Wyoming) still allow child support to be collected when the custody and visitation rights have been restricted. However, in Oregon, child support is still required even though parental rights are terminated.

FBI Releases 2013 Crime Statistics from the National Incident-Based Reporting System

December 23, 2014 Comments off

FBI Releases 2013 Crime Statistics from the National Incident-Based Reporting System
Source: Federal Bureau of Investigation

Today, the FBI released details on more than 5.6 million criminal offenses reported via the National Incident-Based Reporting System (NIBRS) in 2013. The Uniform Crime Reporting (UCR) Program’s latest report, NIBRS 2013, provides a diverse scope of information about victims, known offenders, and relationships for 23 offense categories (including sex offenses). It also presents arrest data for those offense categories plus 11 more.

Unlike data reported via the Summary Reporting System in Crime in the United States, data in NIBRS 2013 include all offenses within an incident, as well as additional aspects about each event such as location, time of day, and clearances. NIBRS 2013 also provides agency-level offense data by state; however, there are no estimates for agencies that did not submit NIBRS data to the UCR Program.

In 2013, 6,328 law enforcement agencies, representing coverage for more than 92 million U.S. inhabitants, submitted NIBRS data. While not yet nationally representative, this coverage represents 34.4 percent of all law enforcement agencies that participate in the UCR Program.

NIBRS agencies reported 4,927,535 incidents that involved 5,665,902 offenses, 5,980,569 victims, and 4,517,902 known offenders. In addition, these agencies reported 1,533,671 arrestees.

Of the reported offenses, 64.7 percent involved crimes against property (i.e., those crimes in which the object is property), 22.8 percent involved crimes against persons, (i.e., crimes whose victims are always individuals), and 12.6 percent included crimes against society (i.e., typically “victimless crimes” that represent society’s prohibition against engaging in certain types of activity, such as gambling).

IBM Study: Organizations Struggling to Defend Against Sophisticated Cyber Attacks

December 18, 2014 Comments off

IBM Study: Organizations Struggling to Defend Against Sophisticated Cyber Attacks
Source: IBM

More than 80 percent of security leaders believe the challenge posed by external threats is on the rise, while 60 percent also agree their organizations are outgunned in the cyber war, according to findings released today by IBM (NYSE: IBM). The study additionally reveals that technology is seen as a critical component in addressing these security issues and threats, with big data, cloud and mobile named as the most significant areas of prioritization.

IBM’s third annual Chief Information Security Officer (CISO) study was conducted by the IBM Center for Applied Insights and is based on responses from 138 in-depth interviews with the surveyed organizations most senior security leaders. Sophisticated external threats were identified by 40 percent of security leaders as their top challenge with regulations coming in a distant second at just under 15 percent. As enterprise leaders continue to outline business priorities, external threats will require the most organizational effort over the next three to five years – as much as regulations, new technologies, and internal threats combined.

CRS — Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis (December 11, 2014)

December 17, 2014 Comments off

Legislation to Facilitate Cybersecurity Information Sharing: Economic Analysis (PDF)
Source: Congressional Research Service (via Federation of American Scientists)

Data breaches, such as those at Target, Home Depot, Neiman Marcus, and JPMorgan Chase, affecting financial records of tens of millions of households seem to occur regularly. Companies typically respond by trying to increase their cybersecurity by hiring consultants and purchasing new hardware and software. Policy analysts have suggested that sharing information about these breaches could be an effective and inexpensive part of improving cybersecurity. Firms share information directly on an ad hoc basis and through private-sector, nonprofit organizations such as Information Sharing and Analysis Centers (ISACs) that can analyze and disseminate information.

Firms sometimes do not share information because of perceived legal risks, such as violating privacy or antitrust laws, and economic incentives, such as giving useful information to their competitors. A firm that has been attacked might prefer to keep such information private out of a worry that its sales or stock price will fall. Further, there are no existing mechanisms to reward firms for sharing information. Their competitors can take advantage of the information, but not contribute in turn. This lack of reciprocity, called “free riding” by economists, may discourage firms from sharing. In addition, the information shared may not be applicable to those receiving it, or it might be difficult to apply.

Because firms are reluctant to share information, other firms suffer from vulnerabilities that could be corrected. Further, by not sharing information about effective cybersecurity products and techniques, the size and quality of the market for cybersecurity products suffer.


Get every new post delivered to your Inbox.

Join 999 other followers