LPRC - CrimeScience – The Weekly Review – Episode 107 with Dr. Read Hayes, Tom Meehan & Tony D’Onofrio

Episode Date: June 17, 2022

LPRC & UF Researchers Partner to Develop a Virtual Reality Environment! The Crypto Market Suffers Signifcantly! In this week’s episode, our co-hosts discuss the Newest Patch for a Dangerous Vulnerab...ility, the state of the global economy with the latest declining forecast for USA and Europe, the evolving nature of anti viral medication to combat the Coronavirus strains. and the surprising start and success of Loss Prevention Technologies including CCTV Cameras, EAS, and cash registers. Listen in to stay updated on hot topics in the industry and more! The post CrimeScience – The Weekly Review – Episode 107 with Dr. Read Hayes, Tom Meehan & Tony D’Onofrio appeared first on Loss Prevention Research Council.

Transcript
Discussion (0)
Starting point is 00:00:00 Hi, everyone, and welcome to Crime Science. In this podcast, we explore the science of crime and the practical application of this science for loss prevention and asset protection practitioners, as well as other professionals. We would like to thank Bosch for making this episode possible. Take advantage of the advanced video capabilities offered by Bosch to help reduce your shrink risk. Integrate video recordings with point-of-s sale data for visual verification of transactions and exception reporting. Use video analytics for immediate notification of important AP related events and leverage analytics metadata for fast forensic searches for evidence and to
Starting point is 00:00:35 improve merchandising and operations. Learn more about extending your video system beyond simple surveillance in zones one through four of LPRC's zones of influence by visiting Bosch online at boschsecurity.com. Welcome, everybody, to another episode of Crime Science, the podcast. Today, we're going to be joined for our weekly update by Tony D'Onofrio, Tom Meehan, our producer, Diego Rodriguez, and we're going to take a quick trip around the world, update everybody here from the LPRC on our Crime Science Podcast Network. So first, we'll just touch a bit, less and less, you might notice, on SARS-CoV-2 and the resulting COVID-19 disease. Celebrities, we seem to see a
Starting point is 00:01:22 lot of reporting on when celebrities or politicians or others of significant fame or infamy or contract, uh, COVID-19. We see that, uh, I've seen a lot of play around. You can't get what you want. In other words, that Mick Jagger, um, has COVID-19. They canceled at least two shows so far. Um, We'll stand by and see how everything goes. Hopes and prayers there. Hugh Jackman, another celebrity who's been stricken by this virus. Here we go to looking a little bit about, you know, this chronic COVID or long COVID seems to appear in a very small but significant minority of those of us that become infected and come down with COVID-19 disease. So, what they're trying to do is culture and look at, you know, different breakdowns of the individual, breakdowns of the actual virus that's causing the infection to see if there's something going on here. I know with SARS-CoV-2 recombinant, there's been some looking at this chronic or long COVID. So, I think it's still, believe it or not, early days on that to try and understand that differential breakdown. It's interesting, too,
Starting point is 00:02:36 on surveillance, we know that there's home testing, there's government testing going on. Now, the government also is supplying free home tests, and then the idea is with these tests, how can we get them home tests that will look at whether an illness is in fact a virus, and if it is a particular SARS-CoV, in other words, a coronavirus, or is this some form of influenza, or maybe what they call RSV, another respiratory virus, or something else that people could more rapidly know. But we also know that there's a breakdown, too, though, that the infection, daily infection rate seems to be dramatically up in 2022 at this point. You know, here we are in early June, heading into mid-June 2022, than it was the same time period last year, dramatically up, and that's with
Starting point is 00:03:31 significantly less known positive tests. So, we know that the virus is in heavy circulation amongst us, but what are ways that better surveillance, early warning can be put in place around the world in individual communities and so on? We know that there's been a lot of wastewater surveillance. Now, the CDC reports that over 1,000 or just about 1,000 United States, U.S. communities have signed up for the program, are now regularly surveilling. up for the program are now regularly surveilling. I know, again, from early, early days here at the University of Florida with dorms, they were able to isolate infections very rapidly as the disease was, or the viral spread was ramping up pretty quickly here in this area of the country. So, we'll stay tuned on that. But I think, you know, that, again, plays well into what, again, we're trying to do with the LPRC. We'll talk about it a little bit later.
Starting point is 00:04:26 But surveillance is something that's important. Detection and then surveillance. Are we knowing about and are we paying attention to the right things? And what are ways that we can do that? Looking at, again, going back to the seriousness that people can get from influenza and from coronaviruses. So, obesity particularly heavily related to the severity of COVID-19 disease that seems to just be something that maybe helps to retain, to spread, or suppress immunoresponse. I'll leave that to the biological researchers to find out more about that.
Starting point is 00:05:05 Smoking, heavily related, but much more related, it looks like, relatively speaking, to seriousness of influenza. And there was an interesting study where they compared, let's just call it roughly 150 coronavirus and 150 influenza patients that had to be hospitalized. They saw similar seriousness of the disease. They saw similar fatal outcomes as well. So it looks like if you get really sick, you get really sick, regardless of the virus. And so now they're looking at, you know, what is it about the individual, about us, and maybe the particular strain of influenza or, of course, coronavirus that we've got. And there's always that interaction. It's things about the strain. It's things about the amount of that strain that we onboarded our bodies.
Starting point is 00:05:54 It's things about how our body initially and then successfully worked on as far as detection and response. Did we over-respond? Did we under-respond our bodies in this case? Were we somewhat prepared by natural infection and or vaccines and things like that? So again, as criminologists, as socio-behavioral scientists, we're very interested in differential exposure to a problem or to others that are problematic, differential exposure to the things that we do out there situationally, our crime prevention efforts, things that are different about us as far as how we may or may not notice them, see it, right, how we might recognize, in other words, the get part, and then finally how we are likely maybe differentially to respond that that fear response.
Starting point is 00:06:45 In other words, we don't launch or we retreat. We desist. So a lot of tie ins. That's why we spent a lot of time over the last couple of years. It seems like now going through and trying to understand these disease states. And I thought it was interesting to see a little bit about let's go go back to, let's look at antivirals that they've come out with. There are now two or three available, but they're trying to understand how do those work and work better and how they were developed. And so I guess there are signaling
Starting point is 00:07:16 pathways that the virus needs to move through our bodies. And so a couple of these that, this is not my area of expertise, but IL-6 and IL-1 beta. So, IL-6 and IL-1 beta, those signaling pathways or routes seem to be aiming points for some of these antivirals to shut those down or choke them down or reduce the capacity of them to transmit so that the virus may not be able to replicate and move around and spread and create more and more serious disease and more and more severe immune response by us. They can sometimes also get us in trouble. We hear about these cytokine storms and other things. But just understanding that and then, again, interpreting that back over to what we all do in asset protection or loss prevention, security, crime prevention, and that is trying to understand how are people differentially exposed to threats and then how do these threats maybe communicate if there's more than one online, in person, and so forth.
Starting point is 00:08:26 is another interesting study on the COVID-19 is looking at severe disease markers that they found that TH17 cells, the more those were present in individuals that were infected, the more likely those people were, those of us that were to progress to a much more serious critical disease state, maybe even fatal. So that kind of early warning is something that looks like if now physicians say, okay, I've got a higher than normal or a critical level, whatever that they might use their diagnosis to say, this person is much more likely. I need to get them on this, some sort of antiviral therapy and other supportive care more rapidly than maybe others of us so that they can reduce the likelihood of a critical outcome. So the same thing again with our LPRC research I mentioned to you all, we're talking to at least six, maybe end up being eight major retailers who have active assailant or serious crime threat analysis,
Starting point is 00:09:23 an individual or a team program going on and gather from them systematically. I mentioned this before, four types of active assailant events or very critical crime events that occur in a specific place, maybe in a specific time, but specific place. And so, again, it's because the threat is works there. It's an insider threat. They're energized or radicalized or activated in their minds because of something that workplace, before and after the workplace, and so on that we can leverage to our advantage. So that's a relationship for them, but they're an outsider threat, but they come to that specific place because of a specific individual or something about that's going on there. The third type, again, is they are going there for some other reason. It's an outsider threat. They're coming there because of maybe it's the brand and
Starting point is 00:10:42 experience they had there or their loved one or somebody there or a similar store within that brand, let's say in this case. And then again, the fourth one is sort of this random. They appeared there. Their car broke down. They wandered over. They got off of that mass transit stop. They were they were looking around and for something else, but they stumbled on this opportunity and so on. So what are the signals? What are the signatures, the physical behaviors, the utterances, whether they're posted online somewhere or made in front of others, corrective actions that have been made against them, complaints that they've made, possible employment termination there or elsewhere or similar place and so on through the five zones of influence before they get to that location as they're approaching, as they're entering that location's parking lot, zone four, as they are approaching the entry point, as they
Starting point is 00:11:35 pass through, as they're in the zone three, we call it, the interior space of whatever their target is and so on. That's kind of the systematic way that we want to look at this and you can see some of the similarities there. So stay tuned. We're excited to conduct this research. We're aiming for the 27th of June for our first initial tele survey that we'll be doing with the first group of participants. And these are all experts, mind you, so we're expecting some pretty interesting things. Body-worn cameras and other potential sensor, whether it's recording or live streaming or both. What should it look like? Where do we place it? How do we best attach it? You know, how do we best keep it charged? When do we turn it on and off? How do we store the data?
Starting point is 00:12:21 How do we stream to whom? How do we screen things? How do we protect our data? There are probably 50 to 100 logistical things we want to learn together, as well as better deterrence and disruption and documentation. How do we use the collected video to train individuals to get better at their store upkeep, at serving customers, at interpersonal relations, things like that, de-escalating if there's something, somebody has escalated. So we've got some cool research going on right there. In the virtual reality world, in that virtual environment, Rochelle Ross, a research associate here, working with Dr. Kong at the university of florida's digital worlds dr ryan sharston over the college of architecture grad students and others are working on a way on continually to enhance a virtual environment where we can again adjust lighting and other factors and create very realistic environments to better test and understand what we should be doing out there to comfort the green to deter the red individual. So, stay tuned for that. By the time this podcast is released, this episode, unfortunately, the LPRC's annual Product Protection Working Group Summit will have taken place, but Dr. Corey Lowe, Senior Research Scientist here at LPRC,
Starting point is 00:13:43 is facilitating the event with a series of product protection working group discussions. There was voting by retailers only on different solutions across the five zones affecting different things, but primarily along the track to and from to and while you're on scene to steal. So we're pretty excited about that. That's going to be occurring tomorrow as we speak on the 15th of June. So we'll update on that later. The Supply Chain Protection Summit looks still to be in Philadelphia. I know that working group is trying to find the best location and timing.
Starting point is 00:14:23 They've got the content. They've got the people. They're just working on the location and timing. They've got the content. They've got the people. They're just working on the location and timing specific on that. We'll stay tuned. The Violent Crime Working Group, we move that to deconflict with any other summits that might be out there and to, quite frankly, make sure that our team, our research team, our operations team, that they are able to, with the bandwidth we have, which is pretty slow with eight full-time people, to accommodate all of these events. So we've moved that, it looks like, to November 7th in Philadelphia. And so working with CapIndex,
Starting point is 00:14:56 it looks like five below, to host and to facilitate that event with one of our research team and a whole bunch of retailers that are interested in reducing violent crime. We'll get out more specific information. Again, the agenda is ready for that impact conference. Heavy planning continues. We're earlier than ever. It will be held, it looks like, at the University of Florida's J. Wayne Rights Student Union, which is a brand spanking new remodel, a rehab of this building. It's just absolutely beautiful, spectacular. We've held at least eight impact conferences there. People absolutely love it.
Starting point is 00:15:36 It's so different than the normal conference center, hotel complex that they're used to. It's a really neat environment. complex that they're used to. It's a really neat environment. We take over most of the third floor and you're right there in the middle of a very beautiful Southeastern Conference campus, 56,000 students. We've got football games before and after the event. So more to come, but that's that October 3rd through 5th. We've got some retailers now bringing anywhere from five to 20 of their people. This conference is pretty special. Those that have ever come to an impact, the way it's put on, the content that's there is all research science based. So we'd love to get you there. We've got
Starting point is 00:16:16 some super cool social events and more to do there than you're going to believe. So that's October 3rd through 5th. Go to the LPRC website or operations at lpresearch.org and check us out, see what's going on. We appreciate all of you, all the retailers participating in this year's version of the National Retail Security Survey that the LPRC is conducting with the National Retail Federation and the University of Florida, the NRSS. Here we are in something like year 34. Dr. Weitz and myself and Dr. Hollinger started the study back then. And really in 89, the planning began. In 90 and 91, we finally ended up launching the project to try and do it right. And here it continues, the largest retail security survey in the world. NRSS, if you're a retailer, you haven't participated, reach out to Corey, C-O-R-Y, at lpresearch.org.
Starting point is 00:17:11 We'll get you an instrument or a questionnaire. And it's not that heavy of a lift, but we really want complete and accurate information. It's best for everybody. Also, the LPRC ARCS program is another way for retailers. And we've now got I'm not sure the number. It's going to be probably a couple dozen now that are contributing very detailed data to allow themselves and others to map and understand and get much better, more relevant information to add to police information, to the valuable cap index and other scores come out. add to police information to the valuable cap index and other scores that come out. So participate in the ARCS program, A-R-C-C-S. Again, cory at lpresearch.org or operations at lpresearch.org. So that's it for me. Let me turn it over to Tony D'Onofrio. Tony, if you could take it away. Thank you, Reid, and good update. Let me start this week with the latest economic forecast
Starting point is 00:18:07 for Q2 2022 from Euromonitor. The global economic outlook has worsened substantially since February 2022, with lower expected growth and higher uncertainty. Global real GDP growth is expected to decline to 1.8 to 3.6% in 2022 and to 1.8 to 4% in 2023 after 6% growth in 2021. Global inflation is expected to increase to 6.8 to 9% globally, and that's a big number in 2022, before declining to 3.8 to 6.3 in 2023. Global supply
Starting point is 00:18:49 chain constraints have tightened substantially since the Russia invasion of Ukraine with big increases in energy and commodity prices worsened by stronger pandemic restriction in China and in the businesses that I'm involved with I am directly feeling a lot of this that I'm talking about. For the US the economic outlook is also worsened significantly since the start of the war in Ukraine. In the baseline scenario US real GDP growth is expected to increase only 1.8% to 3.6% in 2022, and by just 0.5% to 2.8% in 2023. Several positive factors in the U.S. economy continue to support it. Economic activities are still below the pre-pandemic forecast, providing ongoing recovery potential labor market remains strong with low unemployment and employment rate approaching the pre COVID pandemic
Starting point is 00:19:54 level the US large oil and gas production partly offsets a negative economic effects of higher global energy prices. Although, if you look at, we just crossed over $5 a gallon, I'm not sure I believe that anymore. However, negative forecasters have become more dominant. Energy and food prices have increased sharply in the U.S. due to lower supplies from Russia and Ukraine. The rise in uncertainty and the increase in the financial market risk is reducing both
Starting point is 00:20:26 domestic and global demand. Consumer confidence is now lower than the beginning of the COVID-19 pandemic. Tighter monetary supply is expected to cause a larger increase in borrowing costs, further reducing consumer spending and business investment. Spillovers from the war in Ukraine have led to also a sharp deterioration in the eurozone economic outlook. The eurozone economy is extremely vulnerable to the rise in energy and food prices due to the cuts from the supply from Russia and Ukraine. cuts from the supply from Russia and Ukraine. It is also highly sensitive to rising geopolitical risks from the war and to general increase in global uncertainty and worsening global exports demand. After a fast 5.4% recovery in 2021,
Starting point is 00:21:21 the Eurozone real GDP growth is expected to decline by 1.7 to 3.5 percent in 2022 uh and to 0.8 to 3.2 percent in 2023 that's a rough rough uh start to the first half of the year and there's a lot of uncertainty in the bank and the back end of the year it's really exemplified to what's happening in the stock market let me switch now to one of my favorite topics which is innovation and technology a multiple platforms I've been running a series of articles looking at how technology started and where it is today for today's podcast let me summarize the surprising start and current state of three major loss prevention technology let's start with the cash register
Starting point is 00:22:19 it might be surprising to you but the original purpose of the cash register was to stop theft. The inventor was James Riddick, a saloon keeper in Dayton, Ohio. Watching his employees in 1879 taking cash from patrons really began to wonder how they separated what belonged to the business versus what they potentially were stealing for their own profits. to the business versus what they potentially were stealing from their own profits. Having observed counters on a steamship that kept track on the number of Propeller Revolution, with the help of his brother, he patented the first cash register in 1883. John H. Patterson, a storekeeper, bought the rights to Riddie's patent for $6,500 in 1884 and created what became the National Cash Register Company, or NCR. His interest in the technology was sparked by losses from one of his oldest retail clerks that was favoring friends by selling goods below regular prices. Patterson was also a master
Starting point is 00:23:22 salesman, and I actually went to that school school and it was really, really great training. And to NCRE brought highly professional sales training, which was later adopted by IBM that included the loss prevention concepts that are still in use today. Foremost in the selling process of the cash register was the TEF triangle which focused on the balance of risk opportunity and need rationalization the cash register decreased the opportunity to steal by accurately counting transaction and the loud noise which was by design and later the head of the bell that it made during a transaction increased the risk of getting caught. In 1973, IBM developed the first computer-powered cash register. It was also the first network point of sale allowing for the cancellation of data from 128 cash registers. A later decades introduced touchscreens, customized variation industries such as the food sector, and by early 2000, cloud POS made an appearance.
Starting point is 00:24:30 Today, you can check out on your smartphone in multiple retailers, but the ultimate evolution of the cash register was delivered by Amazon, which opened their first fully automated checkout store to the public in 2018. As of this year, as of right now, there's over 40 Amazon Go stores now open in the United States and the United Kingdom. Let's switch to cameras. The first recorded use of CCTV technology was in Germany in 1942. The system was designed by an engineer, Walter Brook, and was set for the monitoring of rockets. And these were the rockets that were being shot, especially the London, which were the first long-range ballistic missile that were launched from mobile platforms during World War II. The German military used the cameras to absorb rocket launches from inside a bunker at a safe distance. Commercial use of CCTV for basic live public and home
Starting point is 00:25:38 security monitoring emerged in 1949. In 1953, CCTV systems were used during the crowning of Queen Elizabeth in the United Kingdom. Cameras also started appearing on the streets of London and New York during this time. London is now the number two most CCTV surveilled city in the world, with just over 1,100 cameras installed per square mile. Fast forward to 72 years ago to today, and in 2021, the world crossed over one billion CCTV cameras installed worldwide. Through computer vision, the CCTV cameras become one of the most powerful data collection and solution execution solutions. And finally, let me summarize EAS
Starting point is 00:26:29 and its innovation journey. EAS has its origin in 1964, when Ron Ace, a store employee for Kroger, working in Ohio became frustrated with the ongoing problem of shoplifting. The idea of a technology to address it was sparked by the unsuccessful, I might say, cautious chase of a shoplifter of spirits. With the aid of his cousin, weeks later, the first cardboard mock-up of a tag that alarm was brought to the store. Fast forward to two years and the official library inventing ESSecurity ethical to Arthur Manassi.
Starting point is 00:27:12 He is inventor credited in creating and patenting a security device that could be attached to items for sale. Manassi system was based on RF radio frequency and became on the company called NOGO. By the end of that year, security tags were widely marketed to retail. On multiple levels, if you think about it, EAS was the first item level technology applied
Starting point is 00:27:36 to consumer products. As we see the video, it was a foundation of technology whose evolution of greater intelligence still continues today. Billions of EAS tags continue to be applied worldwide in many, many stores. So we have come full circle in this loss prevention edition. Our loss prevention technology is at the core of the success of EAS is again the test triangle. First introduced with the cash register. People will steal consumer
Starting point is 00:28:06 items if the opportunity is available and if they're rationalized they need it. The EAS alarm at the exit through multiple variations of EAS technologies increases the risk that you will get caught. So that's this week. With that let me turn turn it over to Tom. Thank you, Tony. Thank you, Reid. Today, we're taping on Tuesday, and it is Patch Tuesday. So Microsoft has released its June patches, and it does address the zero-day vulnerability for O'Neill that we spoke about in the past couple weeks. It's a really nasty zero-day vulnerability that allows an Afores actor to access your remote capabilities by simply just having an attached document to a file. So this is an interesting patch because it does disable some of the remote diagnostics capabilities,
Starting point is 00:29:03 but I think it's a, it's a really important, important patch. And then up until recently, there wasn't a lot of conversation about when the patch was coming. So serves as a reminder. And I say it often because I think education is an awareness is about often and repetitiveness. Please patch your computers,
Starting point is 00:29:22 do your updates. It will save you in the long run. I think it's ultra important that you're doing that. So if you're listening to this podcast, by the time you're listening to it, the patch will have been out for at least two days. Go ahead and update your Microsoft Windows machines to make sure that you're safe from this zero-day vulnerability. And just as a brief reminder, what it allowed is if there was an attached And just as a brief reminder, what it allowed is if there was an attached document or Excel document, it allowed remote code to be executed. And it was kind of a really interesting one, but basically on its own, open up the ability to remote into a computer. And unlike other or past vulnerabilities, this one, you didn't actually have to click and open the file.
Starting point is 00:30:05 You could just the way your previous use your preview settings were there could actually really helped. So really helped them get into your computer. So this one's a bad one. Go ahead and patch. That's the easy one. There are a couple of interesting kind of ransomware, uh, things out there. You may have heard of, there are a couple of sites, uh, for you to search whether you are part of a ransomware attack or a breach. So there is a ransomware group, um,
Starting point is 00:30:41 AKA black cat is what they're called that actually um created a method that you could search to see if you were your encrypted data or your data was uh your corporate data was stolen so there's this element of ransomware where someone encrypts your file and then additionally as i always say don't call a cyber incident one specific thing because it generally molds into other things. So a breach isn't a breach. Ransomware isn't a ransomware. There's usually a crossover. So a lot of the more prolific ransomware attacks involve data theft.
Starting point is 00:31:16 So this is a really interesting kind of spin on the blackmail side of it. So, yeah, you might get an email. blackmail side of it. So yeah, you might get an email. Actually, I've seen a couple of real emails where the headline is, your personal data has been stolen and you will be published. And then it goes, the body of the email, I'm actually reading a real email is, good day. If you receive this letter, you are a customer, buyer, partner, or employee of blank company, which is at this web address. blank company, which is at this web address. Perhaps you bought something there and left your personal data, such as phone email address and credentials, and the email goes on. And basically what the ransomware folks are doing is they're taking this to the next level and attacking individuals that are a part of this to say, if you don't make a payment, we'll go ahead and release your
Starting point is 00:32:05 specific information. So as we talk about the dangers of ransomware, it is evolving. It's no longer about just encrypting the file and stopping people to get it. It's now getting into a blackmail level. And there are groups like Black Cat that have actually created a database so that you can go after they send that email and validate that they actually have your information. We talk all the time about the evolution of kind of crime and cyber incidents and what we're seeing today in the cyber space, which isn't much different than the physical space, is that you have a nexus occurring where criminals are combining different types of nefarious acts to monetize them. So a traditional ransomware attack, which was to lock your files and get you to pay a ransom to unlock them, has now morphed into a continuous of stealing data and then going to the end user level.
Starting point is 00:33:02 So if you think about a ransomware breach, and I'll just use anecdotal information, there's a ransomware that occurs that there is a breach component of it. Maybe you know that, maybe you don't, but it is someone that has millions, 10 million records that allows them, if they have emails, to go ahead and send 10 million opportunities to get information. And the unfortunate part about a lot of these type of attacks is what we've seen in the past is that these are not bluffs. These are attacks where there's full intention to execute what they say. There's also full intention to not execute if you don't, if you do pay them. And so there was some interesting studies about ransomware, specifically
Starting point is 00:33:42 about 60% of the people that pay the ransomware get their files opened up. So that still leaves that 4 to 10 that don't. So there is no easy answer here, but we're going to continue to watch it. I see a lot of blackhead activity in Australia right now. of black activity in Australia right now. But there are basically ransomware attacks happening at about the rate of every six to 11 seconds globally. So we're all susceptible to it. And it reminds me, it starts me to remind you of making sure that you're patching and doing all the things that we talk about on each of the calls. I wanted to talk a little bit about kind of just general technology and what
Starting point is 00:34:26 we're seeing out there. There was some interesting information that was released on Google, released kind of what their viewership was on YouTube. And I just want to throw this out there for context that a 1.5 billion people watch YouTube shorts monthly. So the short videos on YouTube. And if you're wondering kind of what that means to TikTok, because we've heard so much about TikTok in September of last year, there was about a billion monthly active users on TikTok. I think it's important to note that they're talking about active users doesn't really talk to what they're watching, where YouTube is actually saying there's 1.5 billion people watching videos. Meta and Facebook, for both Facebook Reels and Instagram, they're not releasing that data. But when we talk about the magnitude of social media,
Starting point is 00:35:17 I just want everybody to take a step back and think of 1.5 billion people, 1.5 billion people watch YouTube, and there's 330 some odd million people in the United States. So the sheer volume of video. And for all of us here listening, we know that there's a lot of great content to learn on YouTube, but there's also a lot of content of how to defeat and defraud. So YouTube is a great resource to learn what the red shoppers are talking about. And it's also a great research to read as you learn different ways to prevent both cyber and physical pieces of it. I also would say that as someone that's heavily involved in social media, TikTok is also a really great place, although it's not as necessarily easy to search to see what is being said.
Starting point is 00:36:07 So I think it's very interesting stuff. This week, kind of the last two weeks really, have been very volatile in the crypto market. And so Bitcoin and all of the – really all of the cryptocurrencies have suffered some significant losses. One of the things that we're starting to see is that there's a new trend that crypto is starting to follow the normal market conditions. This is somewhat of a logical assumption if you looked at it, but it was not necessarily intended to be the case. There's something called stablecoins. Stablecoins aren't backed by fiat currencies, but they use different algorithms to help keep stability. They also crashed. So it kind of shows the volatility overall. And to kind of further move on, there are a couple networks that are lenders based on cryptocurrency that have actually stopped
Starting point is 00:36:58 funding because of this. So Celsius is one of the larger cryptocurrency banks where to oversimplify this, you put deposit of money and you have a high interest yield based on cryptocurrency exchange. They've actually paused all withdrawals and transfers and swaps because of the extreme market condition. So when we talk about volatility and how these are not traditional banks and this is not FDIC insured. We're starting to see some of that. And this is a very interesting time for crypto because at the same time, we're seeing retailers announcing that on their online channel that they'll accept Bitcoin as a payment.
Starting point is 00:37:38 As someone that spends a ton of time in the financial market, I'm not suggesting that you run away from cryptocurrency. I'm not here to give and none of us are here to give advice on it. It's just simply reporting that what is occurring today. In more financial news, by the time this podcast is published, we should see another Fed rate hike. It's interesting. There was a Wall Street Journal article that said that there was a 50% likelihood that it would be a half a percent versus three quarters of a percent. Again, I think we'll see it on the higher side, closer to three quarters of a percent, but that 50-50% is what the Wall Street Journal is protecting. So by the time you're listening to
Starting point is 00:38:21 this, we'll probably already have heard about that. So just something to keep around. Just switching gears a little bit back to YouTube. YouTube has actually announced a new feature called Corrections, which will let a creator add info cards to the top right of a video at a specific time span. So I think this is a great, you know, great addition for folks in our space that are doing videos and need to add things later on. I know that I do a lot of YouTube videos and see a lot. And as you do these videos, you might need to add some context. And this is a good way to add a note later and allow it actually to expand. And then last, but certainly not least,
Starting point is 00:39:05 talking just a lot about automation and things out there, the National Highway Traffic Safety Administration released data on the number of crashes involving autonomous vehicles and level two vehicles with advanced driver assist systems. We don't have time today to talk about level one, two, three, four, and five, but basically the levels associated with how much of the autonomous is happening. Today, most of autonomous vehicles that you're seeing are driver-assisted. Anything that's commercially available is certainly driver-assisted. Fully autonomous is tested in very small fronts, but this is a really interesting, it's the first time this report was out. You may have seen it, it was all over the news, but
Starting point is 00:39:49 it takes data from July of 2021 through May of 2022. And what it shows is there's a total of 392 crashes reported, six that resulted in serious injury, five that resulted in fatalities, and only 25% of the crashes reported included information about the severity. So it's important to note that this data is somewhat flawed because we didn't get all of the information in it. And this is just factual data, right? Tesla accounts for 69% of those reports, followed by Honda with 23 percent followed by super with 2.5 percent it's really important to note that this report lacks a lot of detail on the number of vehicles with these systems manufactured in operation overall uh the use of them so while i think this is interesting data and we're going to continue to watch it because it's about automation and we
Starting point is 00:40:42 are starting to see in the LPRC lab some similar technologies used, obviously not to drive a car, but I think it's indicative to follow kind of the technology stream. This uses LIDAR and radar technology. We know that there are solutions in the LPRC. What will that mean for those solutions? I also think it's important to note that there is no, again, and I'll be a little repetitive here, there is no real supported data to show the number of vehicles in use. So we don't know if the sample size for Tesla was larger, and that's why the percentage is more. We can make anecdotal results. machine learning in the area where really a lot of these imaging autonomous and anti-collision technology started. And primarily their image-based sensors, their time of flight,
Starting point is 00:41:33 whether it be in the form of infrared, LIDAR, other laser-based, they are also a radar-based as well as a computer vision with actual what we would probably consider traditional video-based. But I felt that it was pertinent to our group because we use so much video and so many image sensors. So I'll continue to monitor that because I do actually think this will affect the implementation of some of these technologies as we're starting to get standardizations. My belief is that this data being shared will actually improve some of these technologies as we're starting to get standardizations. My belief is that this data being shared will actually improve some of the other use cases because the algorithms will have to get better. And some of the same people detection algorithms that are used in autonomous
Starting point is 00:42:16 vehicles are used in computer vision today in retail. So there is crossover with a lot of this technology, and that's really why I thought to mention it. Also, it's important to note, specific to LiDAR, that most modern cell phones have LiDAR sensors in them. So these sensors are becoming much more widely available and will continue to play a role in what we do here at the LPRC. And with that, I'm going to turn it over to Reid. All right. Thanks so much to both of you, Tom and Tony, to Diego, our producer. Amazing, amazing information. We want, again, like to ask you all to contribute.
Starting point is 00:42:54 Ask us any questions, make any comments or suggestions at operations at LPResearch.org. Around this, the Crime Science Podcast. Please let others know. Please rate us. You hear that all the time. We're in, I don't even know, a dozen different podcast platforms, but we really appreciate any rating, any comments, things that you all can help us to make bigger and better, more useful podcasts for you all. So everybody stay safe, stay in touch, and have a great one. Stay safe, stay in touch, and have a great one.
Starting point is 00:43:28 Thanks for listening to the Crime Science Podcast, presented by the Loss Prevention Research Council and sponsored by Bosch Security. If you enjoyed today's episode, you can find more crime science episodes and valuable information at lpresearch.org. The content provided in the Crime Science Podcast is for informational purposes only and is not a substitute for legal, financial, or other advice. Views expressed by guests of the Crime Science Podcast are those of the authors and do not reflect the opinions or positions of the Loss Prevention Research Council.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.