Cyber Attacks: Removing Roadblocks to Investigation and Information Sharing : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session, on Examining the Incidence of Cyber Attacks on the Nation's Information Systems, Focusing on Removing the Roadblocks to Investigation and Information Sharing, March 28, 2000

Front Cover
 

Other editions - View all

Common terms and phrases

Popular passages

Page 1 - 28, 2000 US Senate, Subcommittee on Technology, Terrorism, and Government Information, Committee on the Judiciary, Washington, DC. The subcommittee met, pursuant to notice, at 10:03 am, in room SD-226, Dirksen Senate Office Building, Hon. Jon Kyi (chairman of the subcommittee) presiding. Also present:
Page 79 - electronic communication, where such person is a party to the communication or one of the parties to the communication has given prior consent to such interception.
Page 79 - a person acting under color of law to intercept a wire, oral, or electronic communication, where such person is a party to the communication or one of the parties to the communication has given prior consent to such interception.
Page 25 - and Members of the Subcommittee. I am privileged to have this opportunity to discuss cybercrime—one of the fastest evolving areas of criminal behavior and a significant threat to our national and economic security. I would like to acknowledge the strong support this Subcommittee has provided to the FBI over the past several years for fighting cybercrime.
Page 27 - devices (18 USC § 1029) and unauthorized access to a federal interest computer (18 USC § 1030). The "Phonemasters" were an international group of criminals who penetrated the computer systems of MCI, Sprint, AT&T, Equifax, and even the National Crime Information Center. Under
Page 43 - are responsible for the day-to-day operations of FedCIRC, the Federal Computer Incident Response Capability, an organization that provides incident response and other security-related services to Federal civilian agencies. FedCIRC is managed by the General Services Administration (GSA). More information about FedCIRC is available from http:
Page 38 - worm" stopped 10 percent of the computers connected to the Internet. This program—the first Internet security incident to make headline news—was the wake-up call for network security. In response, the CERT/CC was established at the SEI. The center was
Page 33 - our case load reflects this growth. In fiscal year 1998, we opened 547 computer intrusion cases; in fiscal year 1999, that number jumped to 1154. Similarly, the number of pending cases increased from 206 at the end of fiscal year 1997, to 601 at the end of fiscal year 1998, to 834 at the end of fiscal year
Page 33 - In order to maximize investigative resources the FBI has taken the approach of creating regional squads in 16 field offices that have sufficient size to work complex intrusion cases and to assist those field offices without a NIPCI squad. In those field offices without squads, the FBI is building a baseline capability by having one or two agents to work NIPC matters.