Browsing Archives of Author »Nick Selby«

The City That Became … [How Much] Safer?

12 November 2012


I just picked up a copy of the most racy book available to crime analysts this month, The Crime Numbers Game: Management by Manipulation (Advances in Police Theory and Practice) by John A. Eterno and Eli B. Silverman. Eterno was a NYPD officer who rose through the ranks and retired a captain; he and Silverman, […]

Guest Post – Dr Jez Phillips: What is Offender profiling?

9 November 2012


Today’s guest post is from the blog of Dr Jez Phillips, a psychologist, Deputy Head of Psychology and senior lecturer at the University of Chester in the UK. Phillips has a particular interest in the field of forensic psychology. This is a broad area in itself, covering the application of psychology to diverse but related […]

Creating A Law Enforcement Farm Team: A Rozzer Back-Bench

5 November 2012


In law enforcement, there are two factions: sworn or non-sworn, and for many things (with the notable exception of crime and intelligence analysis) never the twain shall meet. This is as much about cops as it is about human nature, and I’m not trying to change it. But I’ve noticed that, in things like arrest […]

II: Reports You Need To Read Now

24 October 2012


Three reports you should be aware of – and not just because Dave and I are so busy with warrant work that we’ve had no time to do anything except point to the analysis of others – are covered in this report, and all are worth reading. The first big report, which we were in […]

CBKB Nominated for Innovating Justice Award

24 September 2012


This morning I saw that the folks over at the Cost-Benefit Knowledge Bank for Criminal Justice (CBKB) have been nominated for an Innovating Justice Award. Before I talk about the IJA, let me just mention that the work done by the CBKB is absolutely essential to law enforcement agencies across the United States (they’ve also […]

Federal Court: Location Tracking via Cell-Phone Pinging is Kosher

15 August 2012


The United States Court of Appeals for the Sixth Circuit has ruled that police may track the signals eminating from wireless devices, such as cell phones, owned by a person. In United States v Skinner, the court found that a drug dealer whose position was being tracked by the DEA as he and his son […]

UNODC’s Global Awareness Campaign for Transnational Organized Crime

13 August 2012


We don’t normally print press releases, and it’s not that we’re being, you know, lazy, but we thought this was important: The International Association for the Study of Organized Crime (IASOC) has announced that UNODC has a new global awareness campaign against Transnational Organized Crime. Earlier this month the United Nations Office on Drugs and […]

Hiding Your Dupa; Interview with a Hacker; Math and Policing

10 August 2012


Ahh, summer. As Dave and I set to hauling in data on tens of thousands of license plates for a project we’ll be writing about here and in Law Officer Magazine, and working on some really interesting predictive models we will talk about in a few months, this blog doesn’t write itself. So we’ll cannibalize […]

Cybercrime Statistics: What Are The Chinese Counting?

30 July 2012


Over the weekend I read a piece in the US version of China Daily on some of the cyber crime issues being faced by China. The article reveals some interesting statistics about what China considers to be cyber crime. Apparently, in addition to traditional cyber criminal targets such as account details and personal information, the Chinese […]

A Crime Scene Infographic (Guest Post)

12 July 2012


Crime scene science is a fascinating world full of specialists, intelligent processes and shocking results. And a really execrable television program. Recently we were contacted by eLocal, a site which created an infographic showing a snippet of CSI. The infographic is interesting, and since Dave and I are both on vacation (him in Texas, me in […]

Cyber-Criminal OPSEC – a Three-Part Series. Part III: TTTP

15 June 2012


In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talked about computer environmentals, and how it’s possible to build a device fingerprint based on what the user presents when they show up to a web server and ask for something and how […]

Cyber-Criminal OPSEC – a Three-Part Series. Part II: Environmentals

12 June 2012


In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talk about computer environmentals, and building a device fingerprint. And in Part III, we talk about tools, techniques, tactics and procedures used by cyber criminals. One of the things that mystifies us most […]

Cyber-Criminal OPSEC – a Three-Part Series. Part I: IP Addresses

11 June 2012


This is Part I of a Three-Part Series on Cyber-criminal Operational Security. Part II is here. Part III is here. Recently, when speaking of a cyber case, I said that if your criminals have got an IQ of 101 or greater, and if they’re not pathologically lazy, they’re going to anonymize their traffic to the […]

II: Conceptual Issues for Congress and LE on Cybercrime

5 June 2012


I’m at a conference in Philadelphia today on Organized Retail Crime (an area I’m becoming increasingly passionate about) but I wanted to mention the publication by the Congressional News Service of an important document on cybercrime. And I’m not just saying it’s important because it echoes stuff we’ve said here for the last year! Cybercrime: […]


Get every new post delivered to your Inbox.

Join 850 other followers