Internet Crimes Affecting Consumers: Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, First Session, on S. 474, a Bill to Amend Sections 1081 and 1084 of Title 18, United States Code, March 19, 1997, Volume 4 |
Other editions - View all
Common terms and phrases
affect consumers agencies ARLEN SPECTER banks bets or wagers Casinos Chairman child pornography CITAC commit committee communication companies Computer Crimes Squad computer security computer systems conducted Congress countries credit card fraud credit card numbers Credit Wizard criminal activity CYBER STRIKE cyberspace Department of Justice DIANNE FEINSTEIN Downloaded credit card electronic commerce encryption FBI's Federal financial crimes financial fraud fraudulent gambling global going Government hearing identify illegal Internet crimes Internet service providers interstate investigations issue JON KYL jurisdiction law enforcement legislation LITT MegaBingo million national security OWENS perpetrated personal information prizes problem prosecute scam Secret Service Section Senator FEINSTEIN Senator KYL Senator Leahy Social Security number statement STENGER subcommittee telecommunications telemarketing telephone thank things tion title 18 tool transactions Treasury United U.S. SENATOR United States Code United States Secret users Wisconsin
Popular passages
Page 11 - We look forward to working with the members of this committee, as well as of the Armed Services Committee, to expand the number of retirees who can receive this special pay.
Page 36 - Personal and sensitive information about on-line subscribers and shoppers are at times innocently stored in unsecured databases which can be accessed through poorly protected web sites. Web site architecture and design often vary allowing differing degrees of vulnerability. Bank customers who find the idea of online banking appealing should be aware that the Internet is a public medium to conduct transactions and that the prospect of unauthorized access to personal information by Internet abusers...
Page 17 - ... First, computers can be targets of an offense, for example if a hacker tries to steal information from, or to damage, a computer or computer network. We're all familiar with examples of this, such as vandalism of Web sites or the introduction of viruses into computers. • Second, computers can be tools in the commission of a traditional offense. They can replace the telephone as a tool in an illegal telemarketing operation; they can be and are used to create and transmit child pornography. Or,...
Page 27 - The Secret Service has found that, in general, the major Internet Service Providers (ISPs) are constantly updating security measures and have been receptive in establishing liaison with law enforcement in its goal to preserve the integrity of the Internet...
Page 1 - Feinstein. OPENING STATEMENT OF HON. JON KYL, A US SENATOR FROM THE STATE OF ARIZONA Senator KYL.
Page 15 - FBI's Uniform Crime Reporting (UCR) Program.8 Further, our inquiries with various national organizations — the National Association of Attorneys General, the National District Attorneys Association, and the...
Page 36 - Web site architecture and design often vary, allowing differing degrees of vulnerability. Bank customers who find the idea of on-line banking appealing should be aware that the Internet is a public medium to conduct transactions and that the prospect of unauthorized access to personal information by Internet abusers is real. Certain controls that exist to address privacy concerns in the context of credit cards, credit agencies, and banks can and should be applied to electronic payments. The...
Page 55 - There is hereby established an Infrastructure Protection Task Force ("IPTF") within the Department of Justice, chaired by the Federal Bureau of Investigation, to undertake this interim coordinating mission.
Page 38 - Varying measures have been adopted by those seeking to conduct business and communicate on the Internet to minimize Internet fraud and protect sensitive information. Many merchants and others who transact business on the Internet have successfully designed and implemented systems which reasonably ensure the integrity of sensitive information and transactions. In addition to providing "firewalls", or protected compartmentalization of data, encryption has also been employed as a useful tool in appropriate...
Page 17 - Finally, computers can be incidental to the offense, but still significant for law enforcement purposes. For example, many drug dealers now store their records on computers, which raises difficult forensic and evidentiary issues that we don't face with old-fashioned paper records. Of course, a single computer could be used in all three ways. For example, a "hacker...