Computer Security: Cyber Attacks--war Without Borders : Hearing Before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, Second Session, July 26, 2000
United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management, Information, and Technology
U.S. Government Printing Office, 2001 - Computer crimes - 197 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
activities agencies appropriate assistance Assurance attacks authorities aware Bureau Center Central Chairman challenge close Committee communications companies component computer security concerning conduct continue controls cooperation coordination countries court criminal critical infrastructure currently cyber crime deal Defense Department detection develop direct Director discuss effective efforts electronic ensure established example experts Federal foreign global going Horn identify implementation important incident increase industry information sharing Infrastructure Protection initiatives Institute intelligence interception interests Internet INTERPOL investigation involved issues July Latvia law enforcement law enforcement agencies legislation Management National NIPC Office operational organizations persons planning police possible prepared present private sector problem reporting representatives requests require response risk sharing specific standards statement Subcommittee technical Thank threats United vulnerabilities warning
Page 184 - Every order and extension thereof shall contain a provision that the authorization to intercept shall be executed as soon as practicable, shall be conducted in such a way as to minimize the interception of communications not otherwise subject to interception under this chapter, and must terminate upon attainment of the authorized objective, or in any event in thirty days.
Page 23 - Curador" compromised several e-commerce websites in the US., Canada, Thailand, Japan and the United Kingdom, and stole as many as 28,000 credit card numbers with losses estimated to be at least $3.5 million Thousands of credit card numbers and expiration dates were posted to various Internet websites.. After an extensive investigation, on March 23, 2000, the FBI assisted the Dyfed Powys (Wales, UK) Police Service in a search at the residence of "Curador,
Page 131 - Agency (NSA), foreign governments already have or are developing computer attack capabilities, and potential adversaries are developing a body of knowledge about US systems and methods to attack these systems.
Page 18 - Indications and Warning System for physical and cyber attacks. Under the program, electric utility companies and other power entities transmit incident reports to the NIPC. These reports are analyzed and assessed to determine whether an NIPC alert, advisory, or assessment is warranted to the electric utility community. Electric power participants in the pilot program have stated that the information and analysis provided by the NIPC back to the power companies make this program especially worthwhile....
Page 119 - Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
Page 16 - PDD, the NIPC is organized into three sections: • The Computer Investigations and Operations Section (CIOS) is the operational and response arm of the Center. It program manages computer intrusion investigations conducted by FBI Field Offices throughout the country; provides subject matter experts, equipment, and technical support to cyber investigators in Federal, state, and local government agencies involved in critical infrastructure protection; and provides a cyber emergency response capability...
Page 17 - NIPC with a means of securely sharing information with individual companies, has expanded substantially. By early January 2001, 518 entities were InfraGard members — up from 277 members in October 2000.