SlideShare a Scribd company logo
Be Prepared: Get the Real Facts on Crime 
Have you heard the theory “Most crime doesn’t make the news”? According to national statistics, 
every 22 seconds a violent crime occurs, varying from assault, to rape, to murder. Property 
crimes such as burglary, larceny, auto theft, and more occur every 3 seconds. That's over a 
million violent crimes and over 9 million property crimes per year. 
Clearly, the media covers just a fraction of these events. Given today’s competitive market and 
the public’s need for instantaneous information, news outlets simply don't have the time to cover 
even a third of criminal events. Generally they focus on what sells; events like celebrity crimes, 
crimes of passion and high profile violent crimes. 
As a former police officer, I have worked in some well respected neighborhoods that people 
consider “safe”. However, during my tenure, my eyes were routinely opened to what really 
happens in “safe” neighborhoods. While the vast majority of these events never made the news, 
they were nevertheless tragic and life changing for the victims. 
My experience as a police officer and seeing firsthand what crimes are not reported on the news 
has changed my personal security posture from being nearly worry-free to being prepared. I know 
what streets to avoid, what hot-ticket items crooks are looking for, the methods that crooks are 
using, and the most likely timing for given crimes. 
Today, serving in the security industry it's still my business to know current crime trends in order 
to counter them through technology. I'd like to share with you where I find this data in the hope 
that you too will be well informed and will take relevant precautions to secure your home.
US Department of Justice: Federal Bureau of 
Investigations 
Every year the FBI compiles an extensive database of 
criminal activity through yearly, consistent surveys of law 
enforcement agencies nationwide. 
The database is known as UCR, Uniform Crime 
Reporting Statistics. Beyond the dynamic reports, you 
can also find a library of summaries and guides to help you accurately interpret the data found in 
the UCR. Agencies nation wide rely on this report to gauge and prepare for crime in their regions. 
Here are a few links to help you navigate quickly through their site: 
 UCR homepage 
 Dynamic report nationally and/or state by state 
 Dynamic report by large local agencies (LA, NYC, Dayton, etc) 
Inter-University Consortium for Political and Social Research 
The ICPSR is part of the University of Michigan. They archive contributing factors of criminal 
activity including crime and social trends. Additionally, you will find a large index of completed 
analysis from universities and news organizations nation wide. 
 Find and analyze data 
National Insurance Crime Bureau 
Serving the mutual interest of customers and the 
insurance industry, the NICB provides a wealth of topical 
information about crime. 
I have included the NICB because they also provide 
information about the forms of fraud such as vehicle 
cloning, disaster fraud and staged automobile accident 
fraud.
Whether the fraud is common or unique, affects us directly or indirectly; we all end up paying the 
tab for these crimes. Of course, seeking to minimize claims, you'll find great tips on how to avoid 
being a victim of crime and fraud. 
View the theft and fraud awareness page. 
Real-Time, Local Information 
For my personal information, I like reviewing my local police department websites. These sites are 
becoming more webcentric by having great tools online for their communities such as crime 
maps, offender lists, wanted lists, related agencies websites. And, of course, they provide real-time 
information about recent criminal activity. 
Progressive police departments understand that the more information they can get to you, the 
more empowered you'll be to protect yourself and potentially aid in crime prevention. As an 
example of what's available today, here is the Dallas PD's crime information site which includes a 
crime map. 
I encourage you to be an investigator through these sources and the host of others available 
online. In doing so, you can not only inform yourself, but you can inform your friends, neighbors, 
and coworkers to increase crime awareness and undertake simple measures to keep yourself 
and others secure. 
http://www.supercircuits.com/resources/blog/learn-the-facts-about-crime

More Related Content

What's hot

Public safety - Canada
Public safety - Canada Public safety - Canada
Public safety - Canada
paul young cpa, cga
 
Empowermenr technology q1 module 1(page 38&41)
Empowermenr technology q1  module 1(page 38&41)Empowermenr technology q1  module 1(page 38&41)
Empowermenr technology q1 module 1(page 38&41)
reyVanjed
 
Use a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal goveUse a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal gove
ojas18
 
00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization
Duke Network Analysis Center
 
Secondary evidence
Secondary evidenceSecondary evidence
Secondary evidence
karrass1
 
Secondary evidence task 4
Secondary evidence task 4Secondary evidence task 4
Secondary evidence task 4
nikonmedia
 
Crime In The USA
Crime In The USACrime In The USA
Crime In The USA
AlarmSystemReviews.com
 
Marijuana Legalization Helps Solve Violent Crimes Says New Study
Marijuana Legalization Helps Solve Violent Crimes Says New StudyMarijuana Legalization Helps Solve Violent Crimes Says New Study
Marijuana Legalization Helps Solve Violent Crimes Says New Study
Evergreen Buzz
 
Lack of Communication, Resources, Trust As Well As Political Interference And...
Lack of Communication, Resources, Trust As Well As Political Interference And...Lack of Communication, Resources, Trust As Well As Political Interference And...
Lack of Communication, Resources, Trust As Well As Political Interference And...
AJHSSR Journal
 
6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIME6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIMEmattyp99
 
Crime and terrorism of indian model
Crime and terrorism of indian modelCrime and terrorism of indian model
Crime and terrorism of indian model
M S Siddiqui
 
The Factors which Influence National Crime_5A
The Factors which Influence National Crime_5AThe Factors which Influence National Crime_5A
The Factors which Influence National Crime_5ATal Fisher
 
Crime in Arizona
Crime in ArizonaCrime in Arizona
Crime in ArizonaDocJess
 
The Cost of Inequality
The Cost of InequalityThe Cost of Inequality
The Cost of InequalityJaira Burke
 
Units 4, 5, 24, 31 task 4 secondary evidence (3)
Units 4, 5, 24, 31   task 4 secondary evidence (3)Units 4, 5, 24, 31   task 4 secondary evidence (3)
Units 4, 5, 24, 31 task 4 secondary evidence (3)
bentheman21
 
5 keys to improved officer safety and performance(1)
5 keys to improved officer safety and performance(1)5 keys to improved officer safety and performance(1)
5 keys to improved officer safety and performance(1)
Juancarrillo943029
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
Chip Thornsburg
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law AbmpegasusDawnStarling
 
Background Investigations: A Primer for Nonprofits
Background Investigations: A Primer for NonprofitsBackground Investigations: A Primer for Nonprofits
Background Investigations: A Primer for Nonprofits
Commercial Investigations LLC
 

What's hot (20)

Public safety - Canada
Public safety - Canada Public safety - Canada
Public safety - Canada
 
Empowermenr technology q1 module 1(page 38&41)
Empowermenr technology q1  module 1(page 38&41)Empowermenr technology q1  module 1(page 38&41)
Empowermenr technology q1 module 1(page 38&41)
 
Use a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal goveUse a web search engine to search for local, state, and federal gove
Use a web search engine to search for local, state, and federal gove
 
00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization00 Arrest Networks and the Spread of Violent Victimization
00 Arrest Networks and the Spread of Violent Victimization
 
Secondary evidence
Secondary evidenceSecondary evidence
Secondary evidence
 
Secondary evidence task 4
Secondary evidence task 4Secondary evidence task 4
Secondary evidence task 4
 
Crime In The USA
Crime In The USACrime In The USA
Crime In The USA
 
Marijuana Legalization Helps Solve Violent Crimes Says New Study
Marijuana Legalization Helps Solve Violent Crimes Says New StudyMarijuana Legalization Helps Solve Violent Crimes Says New Study
Marijuana Legalization Helps Solve Violent Crimes Says New Study
 
Lack of Communication, Resources, Trust As Well As Political Interference And...
Lack of Communication, Resources, Trust As Well As Political Interference And...Lack of Communication, Resources, Trust As Well As Political Interference And...
Lack of Communication, Resources, Trust As Well As Political Interference And...
 
6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIME6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIME
 
Crime and terrorism of indian model
Crime and terrorism of indian modelCrime and terrorism of indian model
Crime and terrorism of indian model
 
The Factors which Influence National Crime_5A
The Factors which Influence National Crime_5AThe Factors which Influence National Crime_5A
The Factors which Influence National Crime_5A
 
Crime in Arizona
Crime in ArizonaCrime in Arizona
Crime in Arizona
 
The Cost of Inequality
The Cost of InequalityThe Cost of Inequality
The Cost of Inequality
 
About Me
About MeAbout Me
About Me
 
Units 4, 5, 24, 31 task 4 secondary evidence (3)
Units 4, 5, 24, 31   task 4 secondary evidence (3)Units 4, 5, 24, 31   task 4 secondary evidence (3)
Units 4, 5, 24, 31 task 4 secondary evidence (3)
 
5 keys to improved officer safety and performance(1)
5 keys to improved officer safety and performance(1)5 keys to improved officer safety and performance(1)
5 keys to improved officer safety and performance(1)
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
 
Rachels Law Abmpegasus
Rachels Law AbmpegasusRachels Law Abmpegasus
Rachels Law Abmpegasus
 
Background Investigations: A Primer for Nonprofits
Background Investigations: A Primer for NonprofitsBackground Investigations: A Primer for Nonprofits
Background Investigations: A Primer for Nonprofits
 

Viewers also liked

Forbes, octubre 2015
Forbes, octubre 2015Forbes, octubre 2015
Forbes, octubre 2015
Interbrand Madrid
 
5 種內容行銷的錯誤觀念
5 種內容行銷的錯誤觀念 5 種內容行銷的錯誤觀念
5 種內容行銷的錯誤觀念
iProspect
 
Survey
SurveySurvey
Survey
Dana Popescu
 
Nextwavevending-naturals2go school-version
Nextwavevending-naturals2go school-versionNextwavevending-naturals2go school-version
Nextwavevending-naturals2go school-version
Viroo Mirji
 
Diabolic Str8ts #2
Diabolic Str8ts #2Diabolic Str8ts #2
Diabolic Str8ts #2
SlowThinker
 
Insights Ecuador año 4- 2016
Insights  Ecuador  año 4- 2016Insights  Ecuador  año 4- 2016
Insights Ecuador año 4- 2016
Interbrand Madrid
 
Diabolic Str8ts #5
Diabolic Str8ts #5Diabolic Str8ts #5
Diabolic Str8ts #5
SlowThinker
 
Lido floorplans
Lido floorplansLido floorplans
Lido floorplans
Matt Collinge
 
Institutional regulations
Institutional regulationsInstitutional regulations
Institutional regulationsAharkness2512
 
Construction of print products
Construction of print productsConstruction of print products
Construction of print productsOli Whitchurch
 
Bencao irlandesa0
Bencao irlandesa0Bencao irlandesa0
Bencao irlandesa0Lucy Queen
 
2 May 2012 1HBCT Weekly News Update
2 May 2012 1HBCT Weekly News Update2 May 2012 1HBCT Weekly News Update
2 May 2012 1HBCT Weekly News UpdateNoel Waterman
 
June 2012 1HBCT" Devils Corner" Brigade Newsletter
June 2012 1HBCT" Devils Corner"  Brigade NewsletterJune 2012 1HBCT" Devils Corner"  Brigade Newsletter
June 2012 1HBCT" Devils Corner" Brigade Newsletter
Noel Waterman
 
48 Joelson Court Brochure
48 Joelson Court Brochure48 Joelson Court Brochure
48 Joelson Court Brochure
cfcefalu
 
Question 1 - Conventions
Question 1 - ConventionsQuestion 1 - Conventions
Question 1 - ConventionsPBirkettchs
 
My smart goal presentation
My smart goal presentationMy smart goal presentation
My smart goal presentationBrandon Kingsley
 
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Colorado State Library
 
Installing fonts in gimp
Installing fonts in gimpInstalling fonts in gimp
Installing fonts in gimpPBirkettchs
 

Viewers also liked (20)

Forbes, octubre 2015
Forbes, octubre 2015Forbes, octubre 2015
Forbes, octubre 2015
 
5 種內容行銷的錯誤觀念
5 種內容行銷的錯誤觀念 5 種內容行銷的錯誤觀念
5 種內容行銷的錯誤觀念
 
Survey
SurveySurvey
Survey
 
Nextwavevending-naturals2go school-version
Nextwavevending-naturals2go school-versionNextwavevending-naturals2go school-version
Nextwavevending-naturals2go school-version
 
Diabolic Str8ts #2
Diabolic Str8ts #2Diabolic Str8ts #2
Diabolic Str8ts #2
 
Insights Ecuador año 4- 2016
Insights  Ecuador  año 4- 2016Insights  Ecuador  año 4- 2016
Insights Ecuador año 4- 2016
 
Diabolic Str8ts #5
Diabolic Str8ts #5Diabolic Str8ts #5
Diabolic Str8ts #5
 
Lido floorplans
Lido floorplansLido floorplans
Lido floorplans
 
Institutional regulations
Institutional regulationsInstitutional regulations
Institutional regulations
 
Construction of print products
Construction of print productsConstruction of print products
Construction of print products
 
Bencao irlandesa0
Bencao irlandesa0Bencao irlandesa0
Bencao irlandesa0
 
probability
probabilityprobability
probability
 
2 May 2012 1HBCT Weekly News Update
2 May 2012 1HBCT Weekly News Update2 May 2012 1HBCT Weekly News Update
2 May 2012 1HBCT Weekly News Update
 
June 2012 1HBCT" Devils Corner" Brigade Newsletter
June 2012 1HBCT" Devils Corner"  Brigade NewsletterJune 2012 1HBCT" Devils Corner"  Brigade Newsletter
June 2012 1HBCT" Devils Corner" Brigade Newsletter
 
48 Joelson Court Brochure
48 Joelson Court Brochure48 Joelson Court Brochure
48 Joelson Court Brochure
 
Displify show
Displify showDisplify show
Displify show
 
Question 1 - Conventions
Question 1 - ConventionsQuestion 1 - Conventions
Question 1 - Conventions
 
My smart goal presentation
My smart goal presentationMy smart goal presentation
My smart goal presentation
 
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
Sweaty palms, quivering voice and brain cramps delivering a painless presenta...
 
Installing fonts in gimp
Installing fonts in gimpInstalling fonts in gimp
Installing fonts in gimp
 

Similar to Be Prepared: Get the Real Facts on Crime

Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
Tracy Clark
 
Police Department Roles And Functions
Police Department Roles And FunctionsPolice Department Roles And Functions
Police Department Roles And Functions
Lissette Hartman
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
National Crime Prevention Council
 
Essay About Crimes
Essay About CrimesEssay About Crimes
Essay About Crimes
CustomWrittenCollege
 
Student #1 I have chosen to write about the history of data anal.docx
Student #1 I have chosen to write about the history of data anal.docxStudent #1 I have chosen to write about the history of data anal.docx
Student #1 I have chosen to write about the history of data anal.docx
johniemcm5zt
 
3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx
tamicawaysmith
 
Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)
Melissa Moore
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docx
gertrudebellgrove
 

Similar to Be Prepared: Get the Real Facts on Crime (8)

Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
Police Department Roles And Functions
Police Department Roles And FunctionsPolice Department Roles And Functions
Police Department Roles And Functions
 
Crime And Prevention Trends 2006
Crime And Prevention Trends 2006Crime And Prevention Trends 2006
Crime And Prevention Trends 2006
 
Essay About Crimes
Essay About CrimesEssay About Crimes
Essay About Crimes
 
Student #1 I have chosen to write about the history of data anal.docx
Student #1 I have chosen to write about the history of data anal.docxStudent #1 I have chosen to write about the history of data anal.docx
Student #1 I have chosen to write about the history of data anal.docx
 
3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx3Victimization inthe United StatesAn OverviewCHAPTE.docx
3Victimization inthe United StatesAn OverviewCHAPTE.docx
 
Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)Law Enforcement Intelligence Unit (LEIU)
Law Enforcement Intelligence Unit (LEIU)
 
Mapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docxMapping Business Challenges to Types of Control © 201.docx
Mapping Business Challenges to Types of Control © 201.docx
 

More from Christian Watson

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro
Christian Watson
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LAN
Christian Watson
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Christian Watson
 
Covert Audio and the Law
Covert Audio and the LawCovert Audio and the Law
Covert Audio and the Law
Christian Watson
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
Christian Watson
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Christian Watson
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitor
Christian Watson
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Christian Watson
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS
Christian Watson
 
White Paper: Border Security: The Other Story
White Paper: Border Security: The Other StoryWhite Paper: Border Security: The Other Story
White Paper: Border Security: The Other Story
Christian Watson
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr Ranch
Christian Watson
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesChristian Watson
 

More from Christian Watson (13)

6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro6 Steps to Install Analog Security Cameras Like a Pro
6 Steps to Install Analog Security Cameras Like a Pro
 
DVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LANDVR Networking: How to Connect Your DVR to the LAN
DVR Networking: How to Connect Your DVR to the LAN
 
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring ProgramDallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
Dallas PD Nabs Car Thieves with Covert Vehicle Monitoring Program
 
Covert Audio and the Law
Covert Audio and the LawCovert Audio and the Law
Covert Audio and the Law
 
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
7-Eleven Catches Thieves and Reduces Merchandise Shrink in Stores
 
Sanluisobispo casestudy
Sanluisobispo casestudySanluisobispo casestudy
Sanluisobispo casestudy
 
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary ConservationAudubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
Audubon Starr Ranch NestCam Video Aids Bird Sanctuary Conservation
 
Top 7 benefits of an led monitor
Top 7 benefits of an led monitorTop 7 benefits of an led monitor
Top 7 benefits of an led monitor
 
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 SchoolsAlvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
Alvin ISD Employs IP Cameras to Monitor Activities at 13 Schools
 
6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS6 Steps To protect your baby’s IP camera from HACKERS
6 Steps To protect your baby’s IP camera from HACKERS
 
White Paper: Border Security: The Other Story
White Paper: Border Security: The Other StoryWhite Paper: Border Security: The Other Story
White Paper: Border Security: The Other Story
 
Birds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr RanchBirds are Video Stars at Audubon’s Starr Ranch
Birds are Video Stars at Audubon’s Starr Ranch
 
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car ThievesFor Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
For Dallas Police, Video Evidence Was The Key to Convicting Car Thieves
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Be Prepared: Get the Real Facts on Crime

  • 1. Be Prepared: Get the Real Facts on Crime Have you heard the theory “Most crime doesn’t make the news”? According to national statistics, every 22 seconds a violent crime occurs, varying from assault, to rape, to murder. Property crimes such as burglary, larceny, auto theft, and more occur every 3 seconds. That's over a million violent crimes and over 9 million property crimes per year. Clearly, the media covers just a fraction of these events. Given today’s competitive market and the public’s need for instantaneous information, news outlets simply don't have the time to cover even a third of criminal events. Generally they focus on what sells; events like celebrity crimes, crimes of passion and high profile violent crimes. As a former police officer, I have worked in some well respected neighborhoods that people consider “safe”. However, during my tenure, my eyes were routinely opened to what really happens in “safe” neighborhoods. While the vast majority of these events never made the news, they were nevertheless tragic and life changing for the victims. My experience as a police officer and seeing firsthand what crimes are not reported on the news has changed my personal security posture from being nearly worry-free to being prepared. I know what streets to avoid, what hot-ticket items crooks are looking for, the methods that crooks are using, and the most likely timing for given crimes. Today, serving in the security industry it's still my business to know current crime trends in order to counter them through technology. I'd like to share with you where I find this data in the hope that you too will be well informed and will take relevant precautions to secure your home.
  • 2. US Department of Justice: Federal Bureau of Investigations Every year the FBI compiles an extensive database of criminal activity through yearly, consistent surveys of law enforcement agencies nationwide. The database is known as UCR, Uniform Crime Reporting Statistics. Beyond the dynamic reports, you can also find a library of summaries and guides to help you accurately interpret the data found in the UCR. Agencies nation wide rely on this report to gauge and prepare for crime in their regions. Here are a few links to help you navigate quickly through their site:  UCR homepage  Dynamic report nationally and/or state by state  Dynamic report by large local agencies (LA, NYC, Dayton, etc) Inter-University Consortium for Political and Social Research The ICPSR is part of the University of Michigan. They archive contributing factors of criminal activity including crime and social trends. Additionally, you will find a large index of completed analysis from universities and news organizations nation wide.  Find and analyze data National Insurance Crime Bureau Serving the mutual interest of customers and the insurance industry, the NICB provides a wealth of topical information about crime. I have included the NICB because they also provide information about the forms of fraud such as vehicle cloning, disaster fraud and staged automobile accident fraud.
  • 3. Whether the fraud is common or unique, affects us directly or indirectly; we all end up paying the tab for these crimes. Of course, seeking to minimize claims, you'll find great tips on how to avoid being a victim of crime and fraud. View the theft and fraud awareness page. Real-Time, Local Information For my personal information, I like reviewing my local police department websites. These sites are becoming more webcentric by having great tools online for their communities such as crime maps, offender lists, wanted lists, related agencies websites. And, of course, they provide real-time information about recent criminal activity. Progressive police departments understand that the more information they can get to you, the more empowered you'll be to protect yourself and potentially aid in crime prevention. As an example of what's available today, here is the Dallas PD's crime information site which includes a crime map. I encourage you to be an investigator through these sources and the host of others available online. In doing so, you can not only inform yourself, but you can inform your friends, neighbors, and coworkers to increase crime awareness and undertake simple measures to keep yourself and others secure. http://www.supercircuits.com/resources/blog/learn-the-facts-about-crime