"crime" entries

Four short links: 25 September 2015

Four short links: 25 September 2015

Predicting Policing, Assaulting Advertising, Compliance Ratings, and $9 Computer

  1. Police Program Aims to Pinpoint Those Most Likely to Commit Crimes (NYT) — John S. Hollywood, a senior operations researcher at the RAND Corporation, said that in the limited number of studies undertaken to measure the efficacy of predictive policing, the improvement in forecasting crimes had been only 5% or 10% better than regular policing methods.
  2. Apple’s Assault on Advertising and Google (Calacanis) — Google wants to be proud of their legacy, and tricking people into clicking ads and selling our profiles to advertisers is an awesome business – but a horrible legacy for Larry and Sergey. Read beside the Bloomberg piece on click fraud and the future isn’t too rosy for advertising. If the ad bubble bursts, how much of the Web will it take with it?
  3. China Is Building The Mother Of All Reputation Systems To Monitor Citizen BehaviorThe document talks about the “construction of credibility” — the ability to give and take away credits — across more than 30 areas of life, from energy saving to advertising.
  4. $9 Computer Hardware (Makezine) — open hardware project, with open source software. The board’s spec is a 1GHz R8 ARM processor with 512MB of RAM, 4GB of NAND storage, and Wi-Fi and Bluetooth built in.
Four short links: 29 March 2012

Four short links: 29 March 2012

Tricorder, Microsoft and Open Source, Crime is Freedom's Contra, and Government Cybercrime

  1. Tricorder Project — open sourced designs for a tricorder, released as part of the Qualcomm Tricorder X Prize. (via Slashdot)
  2. Microsoft’s New Open Sourced Stacks (Miguel de Icaza) — not just open sourced (some of the code had been under MS Permissive License before, now it’s Apache) but developed in public with git: ASP.NET MVC, ASP.NET Web API, ASP.NET Web Pages v2. The Azure SDK is also on github.
  3. In An Internet Age, Crime is Essential to Freedom (Donald Clark) — when a criminal asks: “How do I secure payment and store my ill-gotten gains”, somewhere else, a refugee asks: “How can I send funds back to a relative such that they can’t be traced to me”.
  4. NSA: China Behind RSA Attacks (Information Week) — I can argue both sides about whether government cloud services are a boon or a curse for remote information thieves. Looking forward to seeing how it plays out.

From crowdsourcing to crime-sourcing: The rise of distributed criminality

How criminals are applying crowdsourcing techniques.

Crowdsourcing began as a way to tap the wisdom of crowds for the betterment of business and science. Crime groups have now repurposed the same tools and techniques for their own variation: "crime-sourcing."