News in Brief

Learning from larceny, SXSW crowdsourcing and tracking business incentives

Shutterstock image: digital globe with green arrows and data trends.

Sandia applies the lessons of larceny

Researchers charged with helping defend U.S. nuclear assets and other complex federal systems are looking into how data mined from high-profile, big-money jewel and bank heists can inform their work.

"There are many insights to be gained from studying high-value heists and related crimes that could be applied to Sandia's work in physical security," Sandia National Labs systems analyst Jarret Lafleur said in an Aug. 19 statement. "Our work focuses on securing nuclear materials and other assets. Those kinds of attacks and threats are extremely rare, which is good, but give us very little historical information to draw upon."

A team of researchers that includes LaFluer, published research in a report, "The Perfect Heist: Recipes from Around the World," that leverages details from 23 craftily executed crimes, including the 2003 Antwerp diamond heist in Belgium that saw thieves sneak past a ring of police, into a secured building, and past motion sensors to break into a supposedly impregnable vault and make off with hundreds of millions of dollars in diamonds. Data points from other audacious, high-end crimes, like the 1999 Isabella Stewart Gardner Museum art heist in Boston, in which burglars posed as police officers to fool and subdue museum guards, were also used by the researchers to compile the Heist Methods and Characteristics Database.

The Sandia researchers analyzed the results qualitatively and quantitatively to describe the range and diversity of criminal methods and identify characteristics that are common or uncommon in such high-value heists. The analysis, said the lab, focused on seven areas: defeated security measures and devices; deception methods; timing and target selection; weapons employed; resources and risk acceptance; insiders; and failures and mistakes.

"I learned from this study that these thieves have a lot of patience. Most spent months and even years planning. They were very deliberate in how they defeated security measures and those methods were often very low-tech, like using hair spray to disable infrared sensors," said Lafleur. "In most of these heists, multiple security measures were defeated."

ODNI taps SXSW hive mind for advice on future threats

The National Intelligence Council is working on the sixth edition of the Global Trends report, forecasting social, economic and political trends through 2035. Written for the incoming president, and due to be released in 2016, the document stands to influence high-level thinking about global demographics, governance, the impact of technology, the distribution of natural resources and the influence of the United States on the international stage.

Naturally, the intelligence community is seeking input from only the most knowledgeable sources ... like the audience at the annual South by Southwest Interactive conference, to be held in Austin next March.

Suzanne Fry of the National Intelligence Council will be co-hosting a discussion with University of California-Berkeley professor Steve Weber, and they're seeking input now on possible topics, including questions of how robotics and manufacturing automation will affect employment, how technology will alter relationships with between governments and citizens, and steps governments can take to better understand the forces of change in play across different societies.

Click here to upvote the panel at the SXSW site, and to contribute ideas in the comments.

Commerce plans database of state business incentives

SelectUSA, a Commerce Department effort to encourage business investment in the United States, wants to build a database of business incentives offered by states, GCN reports.

A request for information on FedBizOpps describes the State Business Incentives Database as a comprehensive, searchable and regularly updated web-based database of all business incentives offered by states.

Report: Nuclear regulator hacked by foreigners

Computers at the Nuclear Regulatory Commission were hacked twice by foreigners in the last three years, Nextgov reports, citing an IG report from the commission. The IG report did not specifying the nationality or nationalities of the hackers.

The NRC is the country's regulator of commercial nuclear power.

About the Author

Connect with the FCW staff on Twitter @FCWnow.

The Fed 100

Read the profiles of all this year's winners.


  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group