teaching

Prices for zombies in the Underground

From Byron Acohido and Jon Swartz’s “Going price for network of zombie PCs: $2,000-$3,000” (USA TODAY: 8 September 2004):

In the calculus of Internet crime, two of the most sought-after commodities are zombie PCs and valid e-mail addresses.

One indication of the going rate for zombie PCs comes from a June 11 posting on SpecialHam.com, an electronic forum for spammers. The asking price for use of a network of 20,000 zombie PCs: $2,000 to $3,000. …

To put a zombie network to work, an attacker needs a list of targets in the form of e-mail addresses. Lists can be purchased from specialists who “harvest” anything that looks like an e-mail address from Web sites, news groups, chat rooms and subscriber lists. Compiled on CDs, such lists cost as little as $5 per million e-mail addresses. But you get what you pay for: Many CD entries tend to be either obsolete or “spam traps” — addresses seeded across the Internet by spam-filtering companies to identify, and block, spammers.

Valid e-mail addresses command a steep price. In June, authorities arrested a 24-year-old America Online engineer, Jason Smathers, and charged him with stealing 92 million AOL customer screen names and selling them to a spammer for $100,000.

Prices for zombies in the Underground Read More »

Ballmer says Windows is more secure than Linux

From Steven J. Vaughan-Nichols’s “Longhorn ‘Wave’ Rolling In” (eWeek: 20 October 2004):

The questions led into a discussion of Linux, with Bittmann observing that there’s a market perception that Linux is more secure.

“It’s just not true,” Ballmer responded. “We’re more secure than the other guys. There are more vulnerabilities in Linux; it takes longer for Linux developers to fix security problems. It’s a good decision to go with Windows.”

Ballmer says Windows is more secure than Linux Read More »

Vitruvian Triad terminology

From “Good Architecture“:

In ‘building architecture’, for comparison, we have the 3 classic Vitruvian qualities to which ‘GoodArchitecture’ aspires:

‘Firmitas, Utilitas and Venustas’ (Marcus Vitruvius Pollio ‘The Ten Books of Architecture’ 1st C AD).

These qualities may be translated as: ‘Technology, Function and Form’ (C St J Wilson ‘ArchitecturalReflections?; Studies in the Philosophy and Practice of Architecture’ 1992 ISBN 0-7506-1283-5

or, in the slightly more familiar but antique: ‘Firmness, Commodity & Delight’

— MartinNoutch

Vitruvian Triad terminology Read More »

Credit cards sold in the Underground

From David Kirkpatrick’s “The Net’s not-so-secret economy of crime” (Fortune: 15 May 2006):

Raze Software offers a product called CC2Bank 1.3, available in freeware form – if you like it, please pay for it. …

But CC2Bank’s purpose is the management of stolen credit cards. Release 1.3 enables you to type in any credit card number and learn the type of card, name of the issuing bank, the bank’s phone number and the country where the card was issued, among other info. …

Says Marc Gaffan, a marketer at RSA: “There’s an organized industry out there with defined roles and specialties. There are means of communications, rules of engagement, and even ethics. It’s a whole value chain of facilitating fraud, and only the last steps of the chain are actually dedicated to translating activity into money.”

This ecosystem of support for crime includes services and tools to make theft simpler, harder to detect, and more lucrative. …

… a site called TalkCash.net. It’s a members-only forum, for both verified and non-verified members. To verify a new member, the administrators of the site must do due diligence, for example by requiring the applicant to turn over a few credit card numbers to demonstrate that they work.

It’s an honorable exchange for dishonorable information. “I’m proud to be a vendor here,” writes one seller.

“Have a good carding day and good luck,” writes another seller …

These sleazeballs don’t just deal in card numbers, but also in so-called “CVV” numbers. That’s the Creditcard Validation Value – an extra three- or four-digit number on the front or back of a card that’s supposed to prove the user has physical possession of the card.

On TalkCash.net you can buy CVVs for card numbers you already have, or you can buy card numbers with CVVs included. (That costs more, of course.)

“All CVV are guaranteed: fresh and valid,” writes one dealer, who charges $3 per CVV, or $20 for a card number with CVV and the user’s date of birth. “Meet me at ICQ: 264535650,” he writes, referring to the instant message service (owned by AOL) where he conducts business. …

Gaffan says these credit card numbers and data are almost never obtained by criminals as a result of legitimate online card use. More often the fraudsters get them through offline credit card number thefts in places like restaurants, when computer tapes are stolen or lost, or using “pharming” sites, which mimic a genuine bank site and dupe cardholders into entering precious private information. Another source of credit card data are the very common “phishing” scams, in which an e-mail that looks like it’s from a bank prompts someone to hand over personal data.

Also available on TalkCash is access to hijacked home broadband computers – many of them in the United States – which can be used to host various kinds of criminal exploits, including phishing e-mails and pharming sites.

Credit cards sold in the Underground Read More »

The origins of 2600

From Nicholas Thompson’s “Who Needs Keys?” (Legal Affairs: November/December 2004):

The event was organized by 2600, a quarterly magazine whose name refers to one of the great discoveries in hacker history: that the plastic whistles given away free in boxes of Cap’n Crunch cereal in the early 1970s could be slightly modified to create sound waves of 2600 MHz, a frequency that allowed you to make free calls on the old AT&T phone system.

The origins of 2600 Read More »

It’s easy to track someone using a MetroCard

From Brendan I. Koerner’s “Your Cellphone is a Homing Device” (Legal Affairs: July/August 2003):

Law enforcement likewise views privacy laws as an impediment, especially now that it has grown accustomed to accessing location data virtually at will. Take the MetroCard, the only way for New York City commuters to pay their transit fares since the elimination of tokens. Unbeknownst to the vast majority of straphangers, the humble MetroCard is essentially a floppy disk, uniquely identified by a serial number on the flip side. Each time a subway rider swipes the card, the turnstile reads the bevy of information stored on the card’s magnetic stripe, such as serial number, value, and expiration date. That data is then relayed back to the Metropolitan Transportation Authority’s central computers, which also record the passenger’s station and entry time; the stated reason is that this allows for free transfers between buses and subways. (Bus fare machines communicate with MTA computers wirelessly.) Police have been taking full advantage of this location info to confirm or destroy alibis; in 2000, The Daily News estimated that detectives were requesting that roughly 1,000 MetroCard records be checked each year.

A mere request seems sufficient for the MTA to fork over the data. The authority learned its lesson back in 1997, when it initially balked at a New York Police Department request to view the E-ZPass toll records of a murder suspect; the cops wanted to see whether or not he’d crossed the Verrazano Narrows Bridge around the time of the crime. The MTA demanded that the NYPD obtain a subpoena, but then-Justice Colleen McMahon of the State Supreme Court disagreed. She ruled that “a reasonable person holds no expectation of confidentiality” when using E-ZPass on a public highway, and an administrative subpoena – a simple OK from a police higher-up – was enough to compel the MTA to hand over the goods.

It’s easy to track someone using a MetroCard Read More »

Tracking via cell phone is easy

From Brendan I. Koerner’s “Your Cellphone is a Homing Device” (Legal Affairs: July/August 2003):

What your salesman probably failed to tell you – and may not even realize – is that an E911-capable phone can give your wireless carrier continual updates on your location. The phone is embedded with a Global Positioning System chip, which can calculate your coordinates to within a few yards by receiving signals from satellites. GPS technology gave U.S. military commanders a vital edge during Gulf War II, and sailors and pilots depend on it as well. In the E911-capable phone, the GPS chip does not wait until it senses danger, springing to life when catastrophe strikes; it’s switched on whenever your handset is powered up and is always ready to transmit your location data back to a wireless carrier’s computers. Verizon or T-Mobile can figure out which manicurist you visit just as easily as they can pinpoint a stranded motorist on Highway 59.

So what’s preventing them from doing so, at the behest of either direct marketers or, perhaps more chillingly, the police? Not the law, which is essentially mum on the subject of location-data privacy. As often happens with emergent technology, the law has struggled to keep pace with the gizmo. No federal statute is keeping your wireless provider from informing Dunkin’ Donuts that your visits to Starbucks have been dropping off and you may be ripe for a special coupon offer. Nor are cops explicitly required to obtain a judicial warrant before compiling a record of where you sneaked off to last Thursday night. Despite such obvious potential for abuse, the Federal Communications Commission and the Federal Trade Commission, the American consumer’s ostensible protectors, show little enthusiasm for stepping into the breach. As things stand now, the only real barrier to the dissemination of your daily movements is the benevolence of the telecommunications industry. A show of hands from those who find this a comforting thought? Anyone? …

THE WIRELESS INDUSTRY HAS A NAME FOR SUCH CUSTOM-TAILORED HAWKING: “location-based services,” or LBS. The idea is that GPS chips can be used to locate friends, find the nearest pizzeria, or ensure that Junior is really at the library rather than a keg party. One estimate expects LBS to be a $15 billion market by 2007, a much-needed boost for the flagging telecom sector.

That may be fine for some consumers, but what about those who’d rather opt out of the tracking? The industry’s promise is that LBS customers will have to give explicit permission for their data to be shared with third parties. This is certainly in the spirit of the Wireless Communications and Public Safety Act of 1999, which anticipated that all cellphone carriers will feature E911 technology by 2006. The law stipulated that E911 data – that is, an individual’s second-by-second GPS coordinates – could only be used for nonemergency purposes if “express prior authorization” was provided by the consumer. …

Tracking via cell phone is easy Read More »

Social network analysis by the NSA

From John Diamond and Leslie Cauley’s “Pre-9/11 records help flag suspicious calling” (USA TODAY: 22 May 2006):

Armed with details of billions of telephone calls, the National Security Agency used phone records linked to the Sept. 11, 2001 attacks to create a template of how phone activity among terrorists looks, say current and former intelligence officials who were briefed about the program. …

The “call detail records” are the electronic information that is logged automatically each time a call is initiated. For more than 20 years, local and long-distance companies have used call detail records to figure out how much to charge each other for handling calls and to determine problems with equipment.

In addition to the number from which a call is made, the detail records are packed with information. Also included: the number called; the route a call took to reach its final destination; the time, date and place where a call started and ended; and the duration of the call. The records also note whether the call was placed from a cellphone or from a traditional “land line.” …

Calls coming into the country from Pakistan, Afghanistan or the Middle East, for example, are flagged by NSA computers if they are followed by a flood of calls from the number that received the call to other U.S. numbers.

The spy agency then checks the numbers against databases of phone numbers linked to terrorism, the officials say. Those include numbers found during searches of computers or cellphones that belonged to terrorists.

It is not clear how much terrorist activity, if any, the data collection has helped to find.

Social network analysis by the NSA Read More »

Google’s data trove tempts the bad guys

From “Fuzzy maths” (The Economist: 11 May 2006):

Slowly, the company is realising that it is so important that it may not be able to control the ramifications of its own actions. “As more and more data builds up in the company’s disk farms,” says Edward Felten, an expert on computer privacy at Princeton University, “the temptation to be evil only increases. Even if the company itself stays non-evil, its data trove will be a massive temptation for others to do evil.”

Google’s data trove tempts the bad guys Read More »

iSee: online map of CCTVs in Manhattan

From Patrick Keefe’s “Camera Shy” (Legal Affairs: July/August 2003):

One extralegal solution is a project called iSee. Launched several years ago, iSee is an online interactive map of the locations of surveillance cameras in Manhattan. To use iSee, you simply open the map of Manhattan and double-click on your point of departure and your destination. After a few moments of computation, iSee generates the “path of least surveillance.”

iSee can be accessed through the website of the organization which created it, the so-called Institute of Applied Autonomy. IAA is a collective of artists, engineers, and scientists who design technologies for the “burgeoning market” of “cultural insurrection.” The organization presents itself as a tech-savvy civil libertarian answer to the Defense Advanced Research Projects Agency, a shadowy R&D wing of the Pentagon. DARPA has recently been in the news for developing the Terrorist Information Awareness project, headed by John Poindexter, which would monitor the everyday transactions of American citizens. Whereas DARPA uses what IAA calls “tools of repression” to take your autonomy away, IAA answers with another set of tools that are intended to give you your autonomy back. …

iSee: online map of CCTVs in Manhattan Read More »

In Britain, you can see footage of you captured by CCTV

From Patrick Keefe’s “Camera Shy” (Legal Affairs: July/August 2003):

In London, a city even more intensively scrutinized by closed-circuit television cameras than New York, citizens can at least retrieve copies of footage taken of them through a provision in Britain’s Data Protection Act. Americans have no such legal recourse. …

In Britain, you can see footage of you captured by CCTV Read More »

Notes on The Strength of Weak Ties revisited

From Mark Granovetter’s “The Strength Of Weak Ties: A Network Theory Revisited” [Sociological Theory, Volume 1 (1983), 201-233.]:

The argument asserts that our acquaintances (weak ties) are less likely to be socially involved with one another than are our close friends (strong ties).Thus the set of people made up of any individual and his or her acquaintances comprises a low-density network (one in which many of the possible relational lines are absent) whereas the set consisting of the same individual and his or her close friends will be densely knit (many of the possible lines are present). …

The weak tie between Ego and his acquaintance, therefore, becomes not merely a trivial acquaintance tie but rather a crucial bridge between the two densely knit clumps of close friends. To the extent that the assertion of the previous paragraph is correct, these clumps would not, in fact, be connected to one another at all were it not for the existence of weak ties (SWT, p. 1363).

It follows, then, that individuals with few weak ties will be deprived of information from distant parts of the social system and will be confined to the provincial news and views of their close friends. This deprivation will not only insulate them from the latest ideas and fashions but may put them in a disadvantaged position in the labor market, where advancement can depend, as I have documented elsewhere (1974), on knowing about appropriate job openings at just the right time. …

The macroscopic side of this communications argument is that social systems lacking in weak ties will be fragmented and incoherent. New ideas will spread slowly, scientific endeavors will be handicapped, and subgroups separated by race, ethnicity, geography, or other characteristics will have difficulty reaching a modus vivendi. …

In the evolution of social systems, perhaps the most important source of weak ties is the division of labor, since increasing specialization and interdependence result in a wide variety of specialized role relationships in which one knows only a small segment of the other’s personality. … the exposure to a wide variety of different viewpoints and activities is the essential prerequisite for the social construction of individualism. …

She relates this difference to Basil Bernstein’s dis- tinction between restricted and elaborated codes of communication. Restricted codes are simpler-more meanings are implicit and taken for granted as the speakers are so familiar with one another. Elaborated codes are complex and universal – more reflection is needed in organizing one’s communication “when there is more difference between those to whom the speech is addressed” (p. 256). …

At a more mundane level, I argued (SWT, pp. 1369-1373; 1974, pp. 51-62) that weak ties have a special role in a person’s opportunity for mobility-that there is a “structural tendency for those to whom one is only weakly tied to have better access to job information one does not already have. Acquaintances, as compared to close friends, are more prone to move in different circles than oneself. Those to whom one is closest are likely to have the greatest overlap in contact with those one already knows, so that the information to which they are privy is likely to be much the same as that which one already has” (1974, pp. 52-53). …

Administrative or managerial employees had a pattern very much like the one I reported: 35.5 percent using weak ties, 15.8 percent strong ones, and 48.7 percent intermediate. Professionals and office workers also were heavy users of weak ties (30.8 percent and 25.8 percent but, unlike managers, used strong ties even more frequently (51.0 and 44.4 percent). Semiprofessionals found only 13.1 percent of jobs through weak ties and blue-collar workers 19.1 percent; the former found 44.9 percent of jobs through strong ties, the latter only 19.1 percent. …

One set of results is of special interest, however. Ericksen and Yancey found that less-well-educated respondents were those most likely to use strong ties for jobs …

The argument of SWT implies that only bridging weak ties are of special value to individuals; the significance of weak ties is that they are far more likely to be bridges than are strong ties. It should follow, then, that the occupational groups making the greatest use of weak ties are those whose weak ties do connect to social circles different from one’s own. …

Consistent with this interpretation is the finding of Lin and col- leagues (1981) that weak ties have positive effects on occupational status only when they connect one to high-status individuals. For those of lower status, weak ties to those of similar low status were not especially useful, whereas those to high-status contacts were. In the latter case the status difference alone strongly suggests that the ties bridged substan- tial social distance. …

Weak ties provide people with access to information and resources beyond those available in their own social circle; but strong ties have greater motivation to be of assistance and are typically more easily available. …

Pool argues, for example, that the number of weak ties is increased by the development of the communications system, by bureaucratization, population density, and the spread of market mechanisms. Further, he suggests that average family size affects the number of weak ties, since where “primary families are large, more of the total contacts of an individual are likely to be absorbed in them” (p. 5). …

In my study of job finding, for example, I found that those whose job was found through strong ties were far more likely to have had a period of unemployment between jobs than those using weak ties (1974, p. 54). …

A number of studies indicate that poor people rely more on strong ties than do others. Ericksen and Yancey, in a study of Philadel- phia, conclude that the “structure of modern society is such that some people typically find it advantageous to maintain strong networks and we have shown that these people are more likely to be young, less well educated, and black” (1977, p. 23). …

Stack (1974) studied a black, urban American, midwestern ghetto … Stack: “Black families living in the Flats need a steady source of cooperative support to survive. They share with one another because of the urgency of their needs. . . . They trade food stamps, rent money, a TV, hats, dice, a car, a nickel here, a cigarette there, food, milk, grits, and children. . . . Kin and close friends who fall into similar economic crises know that they may share the food, dwelling, and even the few scarce luxuries of those individuals in their kin network. . . . Non-kin who live up to one another’s expectations express elaborate vows of friendship and conduct their social relations within the idiom of kinship” (1974, pp. 32-33, 40). …

At the same time, I would suggest that the heavy concentration of social energy in strong ties has the impact of fragmenting communities of the poor into encapsulated networks with poor connections between these units; individuals so encapsulated may then lose some of the advantages associated with the outreach of weak ties. This may be one more reason why poverty is self-perpetuating. Certainly programs meant to provide social services to the poor have frequently had trouble in their outreach efforts. From the network arguments advanced here, one can see that the trouble is to be expected. …

Furthermore, many cultural items never transmitted by the media are known throughout an extensive network: “Youth cultures offer excellent examples of subcultures which provide a set of communication channels external to the media. Much material which is common knowledge among young people – dirty jokes, sexual lore, aggressive humor . . . is not communicated by the adult-controlled media” (p. 9). …

What makes cultural diffusion possible, then, is the fact that small cohesive groups who are liable to share a culture are not so cohesive that they are entirely closed; rather, ideas may penetrate from other such groups via the connecting medium of weak ties. It is a seeming paradox that the effect of weak ties, in this case, is homogenization, since my emphasis has been the ability of weak ties to reach out to groups with ideas and information different from one’s own. The paradox dissolves, however, when the process is understood to occur over a period of time. The ideas that initially flow from another setting are, given regional and other variations, probably new. Homogeneous subcultures do not happen instantly but are the endpoint of diffusion processes. … Fine and Kleinman note that “culture usage consists of chosen behaviors. . . . Culture can be employed strategically and should not be conceptualized as a conditioned response. Usage of culture requires motivation and, in particular, identification with those who use the cultural items. Thus, values, norms, behaviors, and artifacts constitute a subculture only insofar as individuals see themselves as part of a collectivity whose members attribute particular meanings to these ‘objects'” (1979, pp. 12-13). …

The importance of this notion is clear. If “the innovativeness of central units is shackled by vested intellectual interests (or perspectives) then new ideas must emanate from the margins of the network” (p. 460). Furthermore, as I suggested in SWT for the case of high-risk innovations (p. 1367), Chubin points out that marginals, in science, can better afford to innovate; the innovations, if useful, are seized on by the center. …

Weimann finds also, however, that strong ties are not irrelevant in information flow-the speed of flow, credibility, and especially influence are all greater through strong ties and, in fact, “most of the influence is carried through strong ties” (1980, p. 12). He suggests a division of labor between weak and strong ties: Weak ties provide the bridges over which innovations cross the boundaries of social groups; the decision making, however, is influenced mainly by the strong-ties network in each group (p. 21). …

In the bureaucratic solution, the ties are hierarchical; in the democratic clinics, many of which have reacted against the formal model, “tena- cious ties provide a matrix of close primary group relations unifying the entire structure. These strong ties strikingly resemble patterns observed in small communities, summer camps, and Jesuit monastic orders” (p. 20). …

In their analysis Breiger and Pattison studied three types of ties in the two communities-social, community affairs, and business- professional-and found that social ties function as strong ties, that business-professional ties are weak, and that community-affairs ties are strong in relation to business ties but weak in relation to social ones (1978, pp. 222-224). …

I have not argued that all weak ties serve the functions described in SWT-only those acting as bridges between network segments. Weak ties are asserted to be important because their likelihood of being bridges is greater than (and that of strong ties less than) would be expected from their numbers alone. This does not preclude the possibility that most weak ties have no such function.

Notes on The Strength of Weak Ties revisited Read More »

A short explanation of moral rights in IP

From Betsy Rosenblatt’s “Moral Rights Basics“:

The term “moral rights” is a translation of the French term “droit moral,” and refers … to the ability of authors to control the eventual fate of their works. An author is said to have the “moral right” to control her work. … Moral rights protect the personal and reputational, rather than purely monetary, value of a work to its creator.

The scope of a creator’s moral rights is unclear, and differs with cultural conceptions of authorship and ownership, but may include the creator’s right to receive or decline credit for her work, to prevent her work from being altered without her permission, to control who owns the work, to dictate whether and in what way the work is displayed, and/or to receive resale royalties. Under American Law, moral rights receive protection through judicial interpretation of several copyright, trademark, privacy, and defamation statues, and through 17 U.S.C. §106A, known as the Visual Artists Rights Act of 1990 (VARA). VARA applies exclusively to visual art. In Europe and elsewhere, moral rights are more broadly protected by ordinary copyright law.

In the United States, the term “moral rights” typically refers to the right of an author to prevent revision, alteration, or distortion of her work, regardless of who owns the work. Moral rights as outlined in VARA also allow an author of a visual work to avoid being associated with works that are not entirely her own, and to prevent the defacement of her works. …

Under VARA, moral rights automatically vest in the author of a “work of visual art.” For the purposes of VARA, visual art includes paintings, drawings, prints, sculptures, and photographs, existing in a single copy or a limited edition of 200 signed and numbered copies or fewer. In order to be protected, a photograph must have been taken for exhibition purposes only. VARA only protects works of “recognized stature;” posters, maps, globes, motion pictures, electronic publications, and applied art are among the categories of visual works explicitly excluded from VARA protection. …

Moral rights are not transferrable, and end only with the life of the author. Even if the author has conveyed away a work or her copyright in it, she retains the moral rghts to the work under VARA. Authors may, however, waive their moral rights if do so in writing.

What constitutes infringement of moral rights?

VARA grants two rights to authors of visual works: the right of attribution, and the right of integrity. The right of attribution allows an author to prevent misattribution of a work, and to require that the authorship of the work not be disclosed (i.e. remain anonymous). The right of integrity bars intentional distortion, mutilation, or other modification of a work if that distortion is likely to harm the author’s reputation, and prevents the destruction of any work of recognized stature.

A short explanation of moral rights in IP Read More »

Brin’s Transparent Society explained, briefly

From Technology Review‘s “Big Brother Logs On“:

In his 1998 book The Transparent Society, which is well known in the privacy advocacy community, science fiction author and technology watcher David Brin argues that society inevitably will have to choose between two versions of ubiquitous surveillance: in one, only the rich and powerful use and control the system to their own advantage; in the second, more democratic future, the watchers can also be watched. Brin concedes that the latter version would mean everybody’s laundry hung out in public view, but the transparency would at least be mutual. Rent a porn video and your wife knows it; but if she drives to your best buddy’s house four times a week while you’re at the office, you’ll know that also.

Brin’s Transparent Society explained, briefly Read More »

Surveillance tools to detect drowning swimmers

From Technology Review‘s “Big Brother Logs On“:

Consider the benefits of the “computer-aided drowning detection and prevention” system that Boulogne, France-based Poseidon Technologies has installed in nine swimming pools in France, England, the Netherlands and Canada. In these systems, a collection of overhead and in-pool cameras relentlessly monitors pool activity. The video signals feed into a central processor running a machine perception algorithm that can effectively spot when active nonwater objects, such as swimmers, become still for more than a few seconds. When that happens, a red alarm light flashes at a poolside laptop workstation and lifeguards are alerted via waterproof pagers. Last November, a Poseidon system at the Jean Blanchet Aquatic Center in Ancenis, Loire-Atlantique, France, alerted lifeguards in time to rescue a swimmer on the verge of drowning. Pulled from the water unconscious, the swimmer walked away from a hospital the next day.

Surveillance tools to detect drowning swimmers Read More »

CCTV in the UK deters crime

From Technology Review‘s “Big Brother Logs On“:

In many ways, the drama of pervasive surveillance is being played out first in Orwell’s native land, the United Kingdom, which operates more closed-circuit cameras per capita than any other country in the world. This very public surveillance began in 1986 on an industrial estate near the town of King’s Lynn, approximately 100 kilometers north of London. Prior to the installation of three video cameras, a total of 58 crimes had been reported on the estate. None was reported over the next two years. In 1995, buoyed by that success, the government made matching grants available to other cities and towns that wanted to install public surveillance cameras – and things took off from there. …

And not many argue about surveillance’s ability to deter crime. Recent British government reports cite closed-circuit TV as a major reason for declining crime rates. After these systems were put in place, the town of Berwick reported that burglaries fell by 69 percent; in Northampton overall crime decreased by 57 percent; and in Glasgow, Scotland, crime slumped by 68 percent. Public reaction in England has been mixed, but many embrace the technology. …

CCTV in the UK deters crime Read More »