recommended reading

FBI posts Google map of bank heist photos so locals can finger the perps

patrimonio designs ltd/Shutterstock.com

The FBI has begun collecting tips on the names of unidentifiable bank robbery suspects through a new Google map that pictures heists nationwide, bureau officials announced this week.

The new site, bankrobbers.fbi.gov, shows visitors the location of incidents down to the street level, as well as the traditional Wanted poster photos and physical descriptions. Users can search by location, weapon used and the unidentified robber’s nickname, among other clues, to help authorities ascribe names to faces. 

The site is intended to protect citizens from gun violence, not just financial losses, FBI officials said in a statement. “Many bank robberies are committed using verbal demands or notes; however, the use of weapons and threats of violence are also common,” they said.

According to FBI statistics, 49 bank robberies occurred in Washington, D.C., and Northern Virginia during 2012. That marks a new low for the bureau, which tallied 80 raids in 2011. Last year’s count was the lowest in more than a decade.

While the bureau has hard figures on nationwide bank robberies, other crimes are harder for the feds to count. FBI statistics do not measure cybercrimes and other offenses that have arisen since reporting began in 1930. Late last year, Justice Department officials convened the first meeting in more than 80 years to decide on the best crime labels and incident characteristics to track.

Tweets during the meeting indicate cops want crime statistics to better illustrate quality of life at the local level: “Commissioner Ramsey: ‘crime data must tell a story about community safety,’” Deputy Assistant Attorney General James Burch typed, referencing comments by Philadelphia Police Department Commissioner Charles Ramsey.

(Image via patrimonio designs ltd/Shutterstock.com)

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.