Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
'Predictive policing' takes byte out of crime
by Staff Writers
Washington (AFP) July 29, 2012


Microsoft pays big to strengthen software defense
Las Vegas (AFP) July 28, 2012 - As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

The winners of Microsoft's first Blue Hat prize were unveiled at a hip club at a mobbed party complete with dancers, high-energy DJ, and explosions of shimmering confetti.

A top prize of $200,000 went to doctoral student Vasilis Pappas for an advance in countering "the most popular attack techniques we're seeing today," said Microsoft security response center senior director Mike Reavey.

"We posed a challenge to the researcher community and asked them to shift their focus from solely identifying and reporting individual vulnerabilities to investing in new lines of defensive research that could mitigate entire classes of attacks," Reavey said of the prize.

Microsoft awarded $50,000 to the second-place finisher, and a fortune in software to the researcher who placed third out of the 20 submissions entered in the Blue Hat competition.

Technology from the finalists has been integrated into a software toolkit for protecting against threats, according to Microsoft trustworthy computer grout general manager Matt Thomlinson.

"The Blue Hat prize is more than a competition; it's the future of security defense, where the community comes together to collectively take on some of the toughest problems we face and make the computing ecosystem safer," Thomlinson said.

Each of the top three entries dealt with a way cyber attackers twist snippets of benign software already in a computer system to malicious ends, according to Microsoft.

The Blue Hat winners were announced as a Black Hat conference of computer security professionals gave way to the largest known gathering of hackers, Def Con, which ends Sunday.

Crime fighters have long used brains and brawn, but now a new kind of technology known as "predictive policing" promises to make them more efficient.

A growing number of law enforcement agencies, in the US and elsewhere, have been adopting software tools with predictive analytics, based on algorithms that aim to predict crimes before they happen.

The concept sounds like something out of science fiction and the thriller "Minority Report" based on a Philip K. Dick story.

Without some of the sci-fi gimmickry, police departments from Santa Cruz, California, to Memphis, Tennessee, and law enforcement agencies from Poland to Britain have adopted these new techniques.

The premise is simple: criminals follow patterns, and with software -- the same kind that retailers like Wal-Mart and Amazon use to determine consumer purchasing trends -- police can determine where the next crime will occur and sometimes prevent it.

Colleen McCue, a behavioral scientist at GeoEye, a firm that works with US Homeland Security and local law enforcement on predictive analytics, said studying criminal behavior was not that different from examining other types of behavior like shopping.

"People are creatures of habit," she said.

"When you go shopping you go to a place where they have the things you're looking for... the criminal wants to go where he will be successful also."

She said the technology could help in cities where tight budgets were forcing patrol reductions.

"When police departments are laying more sworn personnel, they can do more with less," she said.

The key to success in predictive policing is getting as much data as possible to determine patterns. This can be especially useful in property crimes like auto theft and burglary, where patterns can be detected.

"You can build a model that factors in attributes like the time of year, whether it is hot and humid or cold and snowy, if it is a payday when people are carrying a lot of cash," says Mark Cleverly, who heads the IBM unit for predictive crime analytics.

"It's not saying a crime will occur at a particular time and place, no one can do that. But it can say you can expect a wave of vehicle thefts based one everything we know."

IBM has worked with dozens of agencies such as London's Metropolitan Police, the Polish National Police and a number of US and Canadian cities.

In Memphis, officials said serious crimes fell 30 percent and violent crimes declined 15 percent since implementing predictive analytics in a program with IBM and the University of Memphis in 2006.

The program known as CRUSH -- Criminal Reduction Utilizing Statistical History -- targeted certain "hot spots" to allow police to deploy more efficiently.

John Williams, crime analysis manager for the city's police, said the system has had a dramatic impact, allowing Memphis to get off the list of worst US cities for crime.

-- 'Quality arrests' --

"If the data is indicating a hot spot, we are able to immediately deploy resources there. And in a lot of instances we are able to make quality arrests because we're in the right area at the right time," he told AFP.

Although beat officers can use their instincts for similar results, Williams said the software could be far more precise, such as predicting burglaries in a small geographic area between 10 pm and 2 am.

In one case, the software was able to help police break up a group that was committing armed robberies on the city's Hispanic population.

"There were 84 robberies, but we had no idea it was so organized," Williams said.

By crunching the numbers, police were able to pinpoint the zone and time of likely holdups: "We caught a group of robbers in progress, we had leads on additional robberies," he said.

Williams said police officials from as far away as Hong Kong, Rio de Janeiro and Estonia have come to review the experience in Memphis.

In Los Angeles, another program developed by scientists at the University of California-Los Angeles and Santa Clara University was tested in a single precinct, and resulted in a 12 percent drop in crime while the rest of the city saw a 0.2 percent increase.

That test and others led to the creation of a company called PredPol.

And Los Angeles will expand its use of the program under contract with PredPol, said CEO Caleb Baskin.

Baskin said the system is based on a model from mathematician George Mohler which "is very effective in predicting the time and location for crimes that have not yet taken place."

PredPol had begun working with other cities in California and "we've had inquiries from a lot of places in the US and international locations," Baskin said.

"The science that underlies the tool will work anywhere. The question is does the agency maintain a database that we can plug into."

While use of such analytics generally wins plaudits for helping "smarter" policing, it does raise concerns about Big Brother-like snooping.

Andrew Guthrie Ferguson, a law professor at the University of the District of Columbia, said the use of technology could be positive but that it could lower the threshold for constitutional protections on "unreasonable" searches.

"To stop you and frisk you and search you, a police officer needs reasonable suspicion, so my question is how will this affect reasonable suspicion?" he said.

If the search is based on a computer algorithm, Ferguson said, and the case comes to court, "How do you cross-examine a computer?"

IBM's Cleverly said the technology can in many cases improve privacy.

"You can pinpoint the record of who has access to information, you have a solid history of what's going on, so if someone is using the system for ill you have an audit trail," he said.

As for "The Minority Report" and its predictive software, Cleverly said, "It was a great film and great short story, but it's science fiction and will remain science fiction. That's not what this is about."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Hackers build mobile phone network for Def Con
Las Vegas (AFP) July 28, 2012
A custom mobile phone network came to life in the middle of Def Con as hackers showed off their technology skills in tribute to the infamous gathering's elite "ninjas." A Def Con team bought a telecom company van and configured a "Ninja Tel" cellular phone network to pay homage to longtime hackers who have kept the spirit of the event alive and, admittedly, just to do something "over the top ... read more


CYBER WARS
U.S. Patriot deal to boost Kuwait defenses

US plans $4.2 bn Patriot missile sale to Kuwait

Lockheed Martin Receives Contract For PAC-3 MSE Production

US building missile defense station in Qatar: report

CYBER WARS
Lockheed Martin Receives U.S. Army Contract For Guided MLRS Rockets

Boeing Receives US Navy Contracts for SLAM ER and Harpoon Missiles

Lockheed Martin Completes First LRASM Captive Carriage Test

Ukraine jails two N. Koreans for missile spying

CYBER WARS
Britain and France sign two deals on drone cooperation

US drone strike kills 10 militants in Pakistan

Insitu ScanEagle set for Australia's navy

Northrop Grumman, AUVSI Partner to Develop Unmanned Systems Engineers

CYBER WARS
US Army awards Raytheon contract to upgrade Advanced Field Artillery Tactical Data System

Boeing-built Legacy UHF Payload Operating on MUOS-1 Satellite

Lockheed Martin Completes On-Orbit Testing of First US Navy MUOS Satellite

Northrop Grumman's RC-12X Airborne Signals Intelligence System Completes 1,000th Mission

CYBER WARS
Boeing F-15E Radar Modernization Program Begins Second Low Rate Initial Production Phase

Northrop Grumman Awarded contract for Continuing BACN Mission Support

Northrop Grumman Delivers First B-1 Radar Modification Kit

12 die in Brunei helicopter crash

CYBER WARS
Australia defends defence cuts

Opening gun safes is childs's play at DefCon

India set to replace Avro transporters

UN arms treaty talks go down to the wire

CYBER WARS
Olympic pride still strong in Beijing

Trial shows China eager to draw line under scandal: analysts

Russia in talks on 'Cuba, Vietnam' naval bases: admiral

China whitewashing Bo scandal with wife's trial: activists

CYBER WARS
Researchers Create Highly Conductive and Elastic Conductors Using Silver Nanowires

Silver nanoparticle synthesis using strawberry tree leaf

UK nanodevice builds electricity from tiny pieces

Ferroelectricity on the Nanoscale




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement