Blog

Archive for November, -0001

Some LTL (Less Then Lethal) experience and Perceived vs. Actual risk

As modern wars are becoming less total, because of the greater efficiency of weapons, the reduction in weapon systems price, and the power of media exposure; We see that military and policing tactics are starting to get closer.

While police tactics are mainly concerned with risk minimization, public safety and order control, military tactics were traditionally targeting maximal impact for the enemy while maintaining acceptable risk level for the friendly forces.

Current conflicts are multidimensional and involve media, civil population, cyber control and sometimes a

sci-fi is now.

poor kid with an improvised explosive device (IED), so there are military effort to produce technologies that reduce the impact on the enemy – Namely police technologies.

The problem with driving those technologies through the military development funnel is that the what the armed forces are only now trying to learn, has been the bread and butter of every law enforcement agency for decades.
The system was deployed in Afghanistan only to be rejected because of media exposure of the demonic AmericaA great example for this is the Active Denial Pain Ray System developed for the Pentagon for over 15 years or so and yet has never been accepted into the service. The technology is based on projecting high frequency electromagnetic radiation that converts to heat on the topical layer of the skin and thus produce a burning sensation that can deter a potential hazard.

ns using invisible rays to sterilize the Afghan men.

We were involved once in the development effort of a UWB (Ultra Wide Band) device for a law enforcement agency, and one of the prime effort was to reduce the perceived risk for the public. Perceived risk, unlike real risk is subjective and can and should be controlled by the tactics. For example, providing public medical testing of the non hazardous use of the system especially for eyes and genital areas, using it statically so that only entering a marked zone will trigger it (providing an effect like a virtual cattle fence) etc.
Now it seems that Raytheon, the company behind the technology is trying to downsize it to rifle size. I’m sure the technology will be better, but will they be able to use it?

Posted in: Articles, Case studies

Leave a Comment (0) →

A short one on measuring police activity.

Waze social GPS will be acquired since it has explored some innovation in promoting driver data contribution like accidents reporting, traffic and even getting together to a certain position on the map.

The fact that so much data is gathered outside the usual data stores of the Police department can bring some interesting insights on the law enforcement activities – Researchers at the Ben-Gurion University of the Negev (BGU) published a paper in which they used Waze data to investigate the police activities and effectiveness in enforcing traffic rules.

Using Waze data and Google Earth, the BGU researchers determined that 75% of the locations in Israel with the highest number of accidents were intersections… Interestingly the Israeli Police just finished a national project of putting hundreds of speed cameras at various roads (not junctions).

Another piquant details is that there is some data that points to that fact that speed cameras under certain conditions increase the probability of accident due to the increase variance in speed when drivers reduce speed near the camera and accelerate after moving from its field of view.

Evidence based policing or avoiding based policing?

Posted in: Articles

Leave a Comment (0) →

Disrupting organized crime networks

Governing data

Is it the light of day or a train coming?

ANTHONY BONATO, DIETER MITSCHE, AND PAWE L PRA LAT wrote a nice article on how to disrupt a social directed a-cyclic graph namely an hierarchic one. The concept is not now as it is very similar with finding the minimal cut of a network so that when this “cut” is performed the flow through the network is severed.

The innovation behind their approach is that they are using a dynamic algorithm to stop / block the flow through the net work. This Seepage algorithm as they call it is dynamically blocking node in the network and very similar to the game of Go, the dynamics of the flow is reduced with each chosen blocked node.

The positive thing with their approach is that Law Enforcement and counter terrorism is an ongoing process in which the disruption process in ongoing in time.

However there are some issues with the approach.

Firstly, this is applicable to hierarchic non cyclic networks which really model organized crime and not necessarily terrorist organizations. Terrorist organizations are usually non hierarchic and in many ways get feedback from the grunts and the population that the terrorists assimilate within.

Secondly, the network topology is assumed to be known. In most cases the problem is not the disruption process in itself but the recognition of the topology.

Posted in: Articles

Leave a Comment (0) →

How to use your online banking account and not get cyber ganged.

Just some tips on how to avoid getting your back account hacked. Online banking services are unavoidable, but you don’t need to log-in from your kid’s game computer that was maliciously installed with a key-logger.

It might be smart to allow transactions to third parties accounts, only from a dedicated account which is usually empty. Your bank may be insured and you might get reimbursed when and if somebody find out that once in a while your account gets debited with a small random sum, but frankly, how much time would it take to find out about it?

 

Posted in: Articles

Leave a Comment (0) →