Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
'Predictive policing' takes byte out of crime
by Staff Writers
Washington (AFP) July 29, 2012


Microsoft pays big to strengthen software defense
Las Vegas (AFP) July 28, 2012 - As hackers from around the world converged on Las Vegas, Microsoft doled out a quarter million dollars in prize money to researchers who found ways to thwart attacks on its software.

The winners of Microsoft's first Blue Hat prize were unveiled at a hip club at a mobbed party complete with dancers, high-energy DJ, and explosions of shimmering confetti.

A top prize of $200,000 went to doctoral student Vasilis Pappas for an advance in countering "the most popular attack techniques we're seeing today," said Microsoft security response center senior director Mike Reavey.

"We posed a challenge to the researcher community and asked them to shift their focus from solely identifying and reporting individual vulnerabilities to investing in new lines of defensive research that could mitigate entire classes of attacks," Reavey said of the prize.

Microsoft awarded $50,000 to the second-place finisher, and a fortune in software to the researcher who placed third out of the 20 submissions entered in the Blue Hat competition.

Technology from the finalists has been integrated into a software toolkit for protecting against threats, according to Microsoft trustworthy computer grout general manager Matt Thomlinson.

"The Blue Hat prize is more than a competition; it's the future of security defense, where the community comes together to collectively take on some of the toughest problems we face and make the computing ecosystem safer," Thomlinson said.

Each of the top three entries dealt with a way cyber attackers twist snippets of benign software already in a computer system to malicious ends, according to Microsoft.

The Blue Hat winners were announced as a Black Hat conference of computer security professionals gave way to the largest known gathering of hackers, Def Con, which ends Sunday.

Crime fighters have long used brains and brawn, but now a new kind of technology known as "predictive policing" promises to make them more efficient.

A growing number of law enforcement agencies, in the US and elsewhere, have been adopting software tools with predictive analytics, based on algorithms that aim to predict crimes before they happen.

The concept sounds like something out of science fiction and the thriller "Minority Report" based on a Philip K. Dick story.

Without some of the sci-fi gimmickry, police departments from Santa Cruz, California, to Memphis, Tennessee, and law enforcement agencies from Poland to Britain have adopted these new techniques.

The premise is simple: criminals follow patterns, and with software -- the same kind that retailers like Wal-Mart and Amazon use to determine consumer purchasing trends -- police can determine where the next crime will occur and sometimes prevent it.

Colleen McCue, a behavioral scientist at GeoEye, a firm that works with US Homeland Security and local law enforcement on predictive analytics, said studying criminal behavior was not that different from examining other types of behavior like shopping.

"People are creatures of habit," she said.

"When you go shopping you go to a place where they have the things you're looking for... the criminal wants to go where he will be successful also."

She said the technology could help in cities where tight budgets were forcing patrol reductions.

"When police departments are laying more sworn personnel, they can do more with less," she said.

The key to success in predictive policing is getting as much data as possible to determine patterns. This can be especially useful in property crimes like auto theft and burglary, where patterns can be detected.

"You can build a model that factors in attributes like the time of year, whether it is hot and humid or cold and snowy, if it is a payday when people are carrying a lot of cash," says Mark Cleverly, who heads the IBM unit for predictive crime analytics.

"It's not saying a crime will occur at a particular time and place, no one can do that. But it can say you can expect a wave of vehicle thefts based one everything we know."

IBM has worked with dozens of agencies such as London's Metropolitan Police, the Polish National Police and a number of US and Canadian cities.

In Memphis, officials said serious crimes fell 30 percent and violent crimes declined 15 percent since implementing predictive analytics in a program with IBM and the University of Memphis in 2006.

The program known as CRUSH -- Criminal Reduction Utilizing Statistical History -- targeted certain "hot spots" to allow police to deploy more efficiently.

John Williams, crime analysis manager for the city's police, said the system has had a dramatic impact, allowing Memphis to get off the list of worst US cities for crime.

-- 'Quality arrests' --

"If the data is indicating a hot spot, we are able to immediately deploy resources there. And in a lot of instances we are able to make quality arrests because we're in the right area at the right time," he told AFP.

Although beat officers can use their instincts for similar results, Williams said the software could be far more precise, such as predicting burglaries in a small geographic area between 10 pm and 2 am.

In one case, the software was able to help police break up a group that was committing armed robberies on the city's Hispanic population.

"There were 84 robberies, but we had no idea it was so organized," Williams said.

By crunching the numbers, police were able to pinpoint the zone and time of likely holdups: "We caught a group of robbers in progress, we had leads on additional robberies," he said.

Williams said police officials from as far away as Hong Kong, Rio de Janeiro and Estonia have come to review the experience in Memphis.

In Los Angeles, another program developed by scientists at the University of California-Los Angeles and Santa Clara University was tested in a single precinct, and resulted in a 12 percent drop in crime while the rest of the city saw a 0.2 percent increase.

That test and others led to the creation of a company called PredPol.

And Los Angeles will expand its use of the program under contract with PredPol, said CEO Caleb Baskin.

Baskin said the system is based on a model from mathematician George Mohler which "is very effective in predicting the time and location for crimes that have not yet taken place."

PredPol had begun working with other cities in California and "we've had inquiries from a lot of places in the US and international locations," Baskin said.

"The science that underlies the tool will work anywhere. The question is does the agency maintain a database that we can plug into."

While use of such analytics generally wins plaudits for helping "smarter" policing, it does raise concerns about Big Brother-like snooping.

Andrew Guthrie Ferguson, a law professor at the University of the District of Columbia, said the use of technology could be positive but that it could lower the threshold for constitutional protections on "unreasonable" searches.

"To stop you and frisk you and search you, a police officer needs reasonable suspicion, so my question is how will this affect reasonable suspicion?" he said.

If the search is based on a computer algorithm, Ferguson said, and the case comes to court, "How do you cross-examine a computer?"

IBM's Cleverly said the technology can in many cases improve privacy.

"You can pinpoint the record of who has access to information, you have a solid history of what's going on, so if someone is using the system for ill you have an audit trail," he said.

As for "The Minority Report" and its predictive software, Cleverly said, "It was a great film and great short story, but it's science fiction and will remain science fiction. That's not what this is about."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Hackers build mobile phone network for Def Con
Las Vegas (AFP) July 28, 2012
A custom mobile phone network came to life in the middle of Def Con as hackers showed off their technology skills in tribute to the infamous gathering's elite "ninjas." A Def Con team bought a telecom company van and configured a "Ninja Tel" cellular phone network to pay homage to longtime hackers who have kept the spirit of the event alive and, admittedly, just to do something "over the top ... read more


CYBER WARS
Another Small Step for Mankind

Russia starts building Moon spaceship, eyes Lunar base

Plans to revisit Moon impeded by financial difficulties

Russia says no manned moon shots till 2018

CYBER WARS
Mars Orbiter Repositioned to Phone Home Mars Landing

Opportunity Picks up the Pace With Several Drives This Week

Taking the Heat Lockheed Martin Aeroshell Will Protect Mars Science Lab Descent

Mystery of missing Mars signals solved

CYBER WARS
XCOR Releases Payload Users Guide for Lynx Suborbital Vehicle

NASA Offers Condolences on the Passing of Pioneering Astronaut Sally Ride

Sally Ride, first US woman in space dead at 61

America Invents Act is a game changer

CYBER WARS
Looking Forward to Shenzhou 10

Argentina, China ink space cooperation deal

Looking Forward to Shenzhou 10

Astronauts in good shape after return

CYBER WARS
Another Progress Freighter Re-Docking Attempt Set for July 29

Japanese cargo craft docks with ISS

White Stork Delivers New Research and Technology Investigations to ISS

Russian cargo ship fails to dock at ISS: NASA

CYBER WARS
The Intelsat 20 integrated on to Ariane 5 for upcoming flight

Arianespace's Ariane 5 receives its HYLAS 2 payload

Initial build-up is underway for Arianespace's fifth Ariane 5 launch in 2012

U.S. Bank Helps Fuel Future Space Flight as Bank behind SpaceX

CYBER WARS
RIT Leads Development of Next-generation Infrared Detectors

UCF Discovers Exoplanet Neighbor

Can Astronomers Detect Exoplanet Oceans

The Mysterious Case of the Disappearing Dust

CYBER WARS
Apple pitches gadget security to hacker crowd

Bolivian satellite operators to be trained in China

Scientists create artificial mother of pearl

Google seeks to close book in author copyright case




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement