Internet Crimes Affecting Consumers: Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, First Session, on S. 474, a Bill to Amend Sections 1081 and 1084 of Title 18, United States Code, March 19, 1997, Volume 4

Front Cover
 

Other editions - View all

Common terms and phrases

Popular passages

Page 11 - We look forward to working with the members of this committee, as well as of the Armed Services Committee, to expand the number of retirees who can receive this special pay.
Page 36 - Personal and sensitive information about on-line subscribers and shoppers are at times innocently stored in unsecured databases which can be accessed through poorly protected web sites. Web site architecture and design often vary allowing differing degrees of vulnerability. Bank customers who find the idea of online banking appealing should be aware that the Internet is a public medium to conduct transactions and that the prospect of unauthorized access to personal information by Internet abusers...
Page 17 - ... First, computers can be targets of an offense, for example if a hacker tries to steal information from, or to damage, a computer or computer network. We're all familiar with examples of this, such as vandalism of Web sites or the introduction of viruses into computers. • Second, computers can be tools in the commission of a traditional offense. They can replace the telephone as a tool in an illegal telemarketing operation; they can be and are used to create and transmit child pornography. Or,...
Page 27 - The Secret Service has found that, in general, the major Internet Service Providers (ISPs) are constantly updating security measures and have been receptive in establishing liaison with law enforcement in its goal to preserve the integrity of the Internet...
Page 1 - Feinstein. OPENING STATEMENT OF HON. JON KYL, A US SENATOR FROM THE STATE OF ARIZONA Senator KYL.
Page 15 - FBI's Uniform Crime Reporting (UCR) Program.8 Further, our inquiries with various national organizations — the National Association of Attorneys General, the National District Attorneys Association, and the...
Page 36 - Web site architecture and design often vary, allowing differing degrees of vulnerability. Bank customers who find the idea of on-line banking appealing should be aware that the Internet is a public medium to conduct transactions and that the prospect of unauthorized access to personal information by Internet abusers is real. Certain controls that exist to address privacy concerns in the context of credit cards, credit agencies, and banks can and should be applied to electronic payments. The...
Page 55 - There is hereby established an Infrastructure Protection Task Force ("IPTF") within the Department of Justice, chaired by the Federal Bureau of Investigation, to undertake this interim coordinating mission.
Page 38 - Varying measures have been adopted by those seeking to conduct business and communicate on the Internet to minimize Internet fraud and protect sensitive information. Many merchants and others who transact business on the Internet have successfully designed and implemented systems which reasonably ensure the integrity of sensitive information and transactions. In addition to providing "firewalls", or protected compartmentalization of data, encryption has also been employed as a useful tool in appropriate...
Page 17 - Finally, computers can be incidental to the offense, but still significant for law enforcement purposes. For example, many drug dealers now store their records on computers, which raises difficult forensic and evidentiary issues that we don't face with old-fashioned paper records. Of course, a single computer could be used in all three ways. For example, a "hacker...