skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 203364 Find in a Library
Title: Intercepting the Cybersleuth
Journal: Law Enforcement Technology  Volume:30  Issue:11  Dated:November 2003  Pages:22,24,27
Author(s): Donna Rogers
Date Published: November 2003
Page Count: 5
Publisher: http://www.officer.com 
Type: Report (Study/Research)
Format: Article
Language: English
Country: United States of America
Annotation: This article addresses the problem of cybercrimes and computer terrorism.
Abstract: Computer worms and viruses often command much attention from the media but are far less serious than are targeted attacks on private enterprise computer systems. Cybercrime, a form of organized crime, often results in Fortune 100 companies losing millions of dollars through malicious computer hacking. Funding to fight cybercrime often amounts to less than 1 percent of the Federal law enforcement budget, the article notes that computer experts predict that the law enforcement community is largely unprepared for a wide-scale cyber-attack. Describing an attack on national computer networks or the power grid as a nightmare scenario, the author maintains that most individuals do not realize how dependent they are on computers. Citing the experiences of individuals throughout the Northeast and Midwest who lost power for several days during the summer of 2003, the article contends that a cyber-attack could bring the Nation to a standstill. Although there are no confirmed acts of computer terrorism yet, the FBI and Secret Service are already taking steps to thwart cyber-attacks. State and local police agencies can best combat cyber-terrorism by periodically removing all data from live corporate business system computers and managing it elsewhere. Following a discussion of the weakness of computer crime investigation because of a lack of knowledge of what comprises digital evidence, the author states that training individuals against cyber-attacks is critical and that there is good news in that computer hackers are caught in the United States at much higher rates today, than in the past.
Main Term(s): Computer security training; Cyber Terrorism
Index Term(s): Computer crime prevention measures; Computer hardware systems; Computer related crime; Computer viruses; Computers
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=203364

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.