Cyber Attacks: Removing Roadblocks to Investigation and Information Sharing : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session, on Examining the Incidence of Cyber Attacks on the Nation's Information Systems, Focusing on Removing the Roadblocks to Investigation and Information Sharing, March 28, 2000 |
Other editions - View all
Common terms and phrases
ability administrative analysis authorities CERT CERT Coordination Center CERT/CC Chairman companies computer crime computer intrusion computer networks computer security computer systems CONG CONGRES CONGRESS THE LIBRARY cooperation Coordination criminal investigation critical infrastructure cyber attacks cyber crime cybercrime damage DDOS DDOS attack Defense denial of service Department of Justice detailees electronic encryption FBI field offices FBI's Federal hacker hacking incident response industry information security information sharing information technology InfoSec Internet fraud issues ITAA law enforcement law enforcement agencies LIBRA LIBRARY OF CONGRESS ment Mewhiney national security NIPC operations organizations pen register Pethia Police private sector problem programs prosecution puter Question response teams RESS Secret Service security incidents Senator Feinstein Senator GRASSLEY Senator KYL Senator Schumer service attacks statute subcommittee systems and networks technical Thank threat tion users USSS victim violations virus vulnerabilities warnings
Popular passages
Page 1 - 28, 2000 US Senate, Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary, Washington, DC. The subcommittee met, pursuant to notice, at 10:03 am, in room SD-226, Dirksen Senate Office Building, Hon. Jon Kyi (chairman of the subcommittee) presiding. Also present:
Page 79 - electronic communication, where such person is a party to the communication or one of the parties to the communication has given prior consent to such interception.
Page 79 - a person acting under color of law to intercept a wire, oral, or electronic communication, where such person is a party to the communication or one of the parties to the communication has given prior consent to such interception.
Page 25 - and Members of the Subcommittee. I am privileged to have this opportunity to discuss cybercrime—one of the fastest evolving areas of criminal behavior and a significant threat to our national and economic security. I would like to acknowledge the strong support this Subcommittee has provided to the FBI over the past several years for fighting cybercrime.
Page 27 - devices (18 USC § 1029) and unauthorized access to a federal interest computer (18 USC § 1030). The "Phonemasters" were an international group of criminals who penetrated the computer systems of MCI, Sprint, AT&T, Equifax, and even the National Crime Information Center. Under
Page 43 - are responsible for the day-to-day operations of FedCIRC, the Federal Computer Incident Response Capability, an organization that provides incident response and other security-related services to Federal civilian agencies. FedCIRC is managed by the General Services Administration (GSA). More information about FedCIRC is available from http:
Page 38 - worm" stopped 10 percent of the computers connected to the Internet. This program—the first Internet security incident to make headline news—was the wake-up call for network security. In response, the CERT/CC was established at the SEI. The center was
Page 33 - our case load reflects this growth. In fiscal year 1998, we opened 547 computer intrusion cases; in fiscal year 1999, that number jumped to 1154. Similarly, the number of pending cases increased from 206 at the end of fiscal year 1997, to 601 at the end of fiscal year 1998, to 834 at the end of fiscal year
Page 33 - In order to maximize investigative resources the FBI has taken the approach of creating regional squads in 16 field offices that have sufficient size to work complex intrusion cases and to assist those field offices without a NIPCI squad. In those field offices without squads, the FBI is building a baseline capability by having one or two agents to work NIPC matters.