HISTORY
Nine additional units will be added to a program called CHIP (Computer
Hacking and Intellectual Property) that has proven successful in Northern
California. That project demonstrated the benefits of a unit of prosecutors
working closely with the FBI and other agencies to...
Enacted in the USA Patriot Act of 2001 - star rule
Section 202 Authority to Intercept Voice Communications in Computer Hacking Investigations
Previous law: Under previous law, investigators could not obtain a wiretap order to intercept wire communications (those involving the human voice) for violations of the...
In our ten years’ experience in detecting, locating, and prosecuting network intruders (hackers) we have seen that, as with many offline crimes, robust law enforcement alone cannot solve the network intruder problem. To be effective, any overall strategy must include the owners and operators of the...
To the Board of Directors Federal Deposit Insurance Corporation:
We reviewed information systems general controls[Footnote 1] in connection with our calendar year 2001 financial statement audits of the Federal Deposit Insurance Corporation’s (FDIC) Bank Insurance Fund, Savings Association Insurance...
In addition, GAO is committed to fulfilling the objectives of the Federal Financial Management Improvement Act of 1996. Although not subject to FFMIA, GAO voluntarily complies with its requirements. We believe that we have implemented and maintained financial systems that comply substantially with federal financial...
Think identity theft is the work of faceless cyber-crooks from foreign countries? Think again. Almost half of all ID theft is committed by relatives or close friends of the victim, new research shows.  The surprising information comes from a recent poll of 4,000 consumers conducted by a group led by the...
Give criminals credit for adapting. It has become clear that stealing personal information is easier, more profitable, and less risky than mugging or burgling them. Unfortunately, the effect of this realization on the criminal community is that phishing and identity theft continue their astonishing...
Since January 1, at least 104 data incidents have been documented in the U.S., potentially affecting more than 56.2 million individuals. And that is probably just the tip of the iceberg.How many breaches don’t make the front page because the victimized company wants to avoid embarrassing publicity? We will...
Most Internet users know spam when they see it, but the vast majority are unfamiliar with terms like “podcasting,†“phishing,†and “RSS,†according to a recent study.The Pew Internet and American Life Project research, based on random telephone interviews with 1,336 Internet users,...
Hackers have changed their tactics and are exploiting flaws in popular software applications – including security programs — to break into the computers of consumers, government agencies, and businesses. What’s new about this, you might ask? The key word is “applications.” ...
Omar A. Herrera Reyna – CISA, CISSP(omar.herrera@oissg.org)November 2005 (If you missed Security solutions for e-banking and e-commerce with credit/debit cards,- Part 1: Analyzing the Security Issues click here)While there are some good solutions available from a security perspective, I believe that we...
To provide a common understanding of what is needed and expected in information technology security programs, NIST developed and published Generally Accepted Principles and Practices for Securing Information Technology Systems (Special Pub 800-14) in September 1996. Its eight principles are listed below.1. Computer...
High-tech criminal gangs with access to sophisticated keylogging viruses pose a growing threat to banks and financial institutions.Recently, England’s High Tech Crime Unit foiled an effort to steal over $100 million from a Japanese bank in London. The gang gained access to Sumitomo Corp.’s computer...
October 27Â - GAO recognizes the importance of strong financial systems and internal controls to ensure our accountability, integrity, and reliability. To achieve a high level of quality, management maintains a quality control program and seeks advice and evaluation from both internal and external sources. GAO is...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.