Information Technology Reference
In-Depth Information
If you need advice about an Internet or online solicitation, or if you want to report a possible
scam, use the Online Reporting Form or Online Question & Suggestion Form features on
the Web site for the National Fraud Information Center at http://fraud.org , or call the NFIC
hotline at 1-800-876-7060.
International Computer Crime
Computer crime is also an international issue, and it becomes more complex when it crosses
borders. As already mentioned, the software industry loses about $11-12 billion in revenue
to software piracy annually, with about $9 billion of that occurring outside the United States.
With the increase in electronic cash and funds transfer, some are concerned that
terrorists, international drug dealers, and other criminals are using information systems to
launder illegally obtained funds. Computer Associates International developed software
called CleverPath for Global Compliance for customers in the finance, banking, and insur-
ance industries to eliminate money laundering and fraud. Companies that are required to
comply with legislation such as the USA Patriot Act and Sarbanes-Oxley Act might lack the
resources and processes to do so. The software automates manual tracking and auditing
processes that are required by regulatory agencies and helps companies handle frequently
changing reporting regulations. The application can drill into a company's transactions and
detect transaction patterns that suggest fraud or other illegal activities based on built-in busi-
ness rules and predictive analysis. Suspected fraud cases are identified and passed on to the
appropriate personnel for action to thwart criminals and help companies avoid paying fines.
PREVENTING COMPUTER-RELATED CRIME
Because of increased computer use today, greater emphasis is placed on the prevention and
detection of computer crime. Although all states have passed computer crime legislation,
some believe that these laws are not effective because companies do not always actively detect
and pursue computer crime, security is inadequate, and convicted criminals are not severely
punished. However, all over the United States, private users, companies, employees, and
public officials are making individual and group efforts to curb computer crime, and recent
efforts have met with some success.
Crime Prevention by State and Federal Agencies
State and federal agencies have begun aggressive attacks on computer criminals, including
criminal hackers of all ages. In 1986, Congress enacted the Computer Fraud and Abuse Act,
which mandates punishment based on the victim's dollar loss.
For at least five years after the September 11, 2001 terrorist attacks, the U.S. Treasury
Department and CIA executed a program called the Terrorist Finance Tracking Program
that relied on data in international money transfers from the Society for Worldwide Interbank
Financial Telecommunications. The goal of the program was to track and combat terrorist
financing. The program was credited with helping to capture at least two terrorists; however,
revelation of the secret program's existence stirred up controversy and rendered the program
ineffective.
The Department of Defense also supports the Computer Emergency Response Team
(CERT), which responds to network security breaches and monitors systems for emerging
threats. Law enforcement agencies are also increasing their efforts to stop criminal hackers,
and many states are now passing new, comprehensive bills to help eliminate computer crimes.
A complete listing of computer-related legislation by state can be found at
www.onlinesecurity.com/forum/article46.php . Recent court cases and police reports involving
computer crime show that lawmakers are ready to introduce newer and tougher computer
crime legislation.
 
Search WWH ::




Custom Search