TITLE

Florida Phone Crooks Smash And Grab

AUTHOR(S)
Marek, Sue
PUB. DATE
March 2002
SOURCE
Wireless Week;3/4/2002, Vol. 8 Issue 9, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports that investigators in Broward County, Florida are trying to track down a group of thieves called Hole-in-the-Wall Gang they believe are responsible for stealing wireless devices. Information on the incidents that have been associated with the gang; Problem noted by investigators in tracking global system for mobile communication telephones; Preventive measure that has been proposed by Nextel to retailers.
ACCESSION #
6316280

 

Related Articles

  • SMPD blue. Radcliff, Deborah // Network World;10/27/2003, Vol. 20 Issue 43, p54 

    Focuses on San Mateo Police District's wireless Web access to caught criminals. Wireless virtual private network access to California Department of Motor Vehicle databases; Distinction between a hot zone and a hot spot; Security measures; Benefits of the technology. INSET: Zoning out.

  • Cellular truth stranger than fiction. Ford, Tracy // RCR Wireless News;9/13/2004, Vol. 23 Issue 37, p10 

    Comments on issues related to wireless communication technology. Impact of technological advances on criminal investigations; Analysis of the reliability of cell tower information.

  • Armed robbery by phone. Schuster, Eli // Report / Newsmagazine (BC Edition);01/01/2001, Vol. 28 Issue 1, p26 

    Reports on two robberies that occurred in Guelph, Ontario in September and December, 2000. How the robberies were conducted by telephone; Difficulties faced by police who are investigating the crimes; Advice for dealing with threatening telephone calls.

  • CONSTABULARY NOTES FROM ALL OVER.  // New Yorker;1/25/88, Vol. 63 Issue 49, p87 

    Reports on a burglary news in Cambridge, Massachusetts.

  • SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES. Luke, Divya Ann; Jayasudha, J. S. // International Journal of Network Security & Its Applications;May2014, Vol. 6 Issue 3, p99 

    The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That...

  • Mobile fingerprint checks.  // Computer Weekly;11/4/2008, p7 

    The article presents information on a new mobile devices that will allow police officers to take fingerprints and carry out identity checks on people in the street. The fingerprint taken using the device will be sent to a database, and a message will be sent back to the officer within a few...

  • Design of the Software for Wirelessly Intercepting Voices. Xiuchun He; Jun Liu; Jiahua Xie; Renqiu Chen // Advanced Materials Research;2014, Issue 926-930, p2470 

    Voice intercepting is an important method of the national security sectors to obtain criminal intelligence. This approach is secret, mandatory, statutory, and technical and commits a violation of privacy. The recent years of technical advancement enable criminals to adopt more sophisticated...

  • Armed robbery by phone. Schuster, Eli // Report / Newsmagazine (National Edition);01/01/2001, Vol. 28 Issue 1, p26 

    Reports on two robberies that occurred in Guelph, Ontario in September and December, 2000. How the robberies were conducted by telephone; Difficulties faced by police who are investigating the crimes; Advice for dealing with threatening telephone calls.

  • Armed robbery by phone. Schuster, Eli // Report / Newsmagazine (Alberta Edition);01/01/2001, Vol. 26 Issue 1, p26 

    Reports on two robberies that occurred in Guelph, Ontario in September and December, 2000. How the robberies were conducted by telephone; Difficulties faced by police who are investigating the crimes; Advice for dealing with threatening telephone calls.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics