Chapter 11

Ace your homework & exams now with Quizwiz!

Criminal Division's Computer Crime and Intellectual Property Section (CCIPS) (DoJ)

-Attorneys in CCIPS specialize in prosecuting crimes related to encryption, e-commerce, electronic privacy crimes, etc. -CCIPS attorneys always conduct hundreds of training seminars every year for other federal attorneys

Cyber Crimes Center (operated by ICE)

-C3 focuses on child exploitation, computer forensics, cyber crimes, and information technology and administration. -ICE operates the Child Exploitation Investigations Unit (CEIU), which coordinates Operation Predator. -ICE operates the Cyber Crimes Unit (CCU), which coordinates Operation Apothecary. -Computer Forensics Unit (CFU) offers digital evidence recovery and analysis for ICE agents and other LE agencies.

FBI's role in fighting computer crime

-Capture criminals behind serious computer intrusions and the spread of malicious code -Stop online sexual predators who produce or share child pornography and meet and exploit children -Stop operations targeting US intellectual property -Dismantle national and transnational organized crime groups engaging in Internet fraud.

The Department of Homeland Security

-Designed by the Bush Administration after 9/11/2001. -The DHS: ▪Improves information sharing among federal law enforcement agencies ▪Consolidates a host of over 100 federal offices ▪Increases interagency coordination in the fight against domestic terror

Financial Crimes Division's 3 responsibilities:

-Identify and investigate financial institution fraud (FIF) -Primary jurisdiction in cases involving access device fraud -Primary jurisdiction in the investigation of general computer fraud relating to computers and computer systems of "federal interest". -Electronic Crimes Branch specialized crime with credit cards and other access device fraud.

Other programs within DHS:

-National Cyber Alert System -Cyber Cop Portal Program -U.S.- Computer Emergency Readiness Team (US-CERT) -National Cyber Response Coordination Group -Cyber Storm training exercises

The National Security Agency (NSA)

-The NSA is primarily responsible for designing and maintaining computerized coding systems designed to protect the integrity of U.S. Information systems. -It is the lead agency responsible for monitoring and protecting all of the federal government's computer networks form acts of cyberterrorism. -The NSA houses the National INFOSEC Education and Training Program.

FBI is also responsible for:

-The Regional Computer Forensics Laboratory that provides computer forensic lab support and training programs. -Internet Crime Complain Center (ICCC or IC3) which provides federal agencies a central repository for complains related to internet fraud. -InfraGard, a program designed to facilitate the exchange of information among several institutions and agencies.

Critical Needs at State & Local Levels of Enforcement:

-Training -Equipment -Updated criminal codes designed to complement current enforcement efforts -Resources for tapping federal expertise and equipment related to computer crime enforcement

FBI's broad mandate

-authorizes it to protect the U.S. from terror and foreign intelligence agencies, as well as investigate any federal crime not specifically designated to another agency. -Plays an important role in the investigation of cybercrime.

Identity Theft Program

-developed by the FTC. -designed to provide assistance to local and federal law enforcement agencies attempting to curb the misuse and theft of personal information through online access. -the FTC operates Consumer Sentinel, a centralized database of identity theft complaints used to compile statics regarding incidence of identity theft.

The Department of Justice

-established in 1870. -headed by the chief law enforcement officer of the federal government - the attorney general. -attorney general oversees the administration of justice on the federal leve -attorney general represents the US in legal matters

FBI

-established in 1908 as the investigative branch of the US DoJ.

U.S. Immigrations and Customs Enforcement (ICE)

-is the largest and primary investigative arm of the U.S. DHS. -ICE is responsible for identifying and investigating weaknesses within the nations borders, developing intelligence concerning threats, removing foreign nationals, and enforcing over 400 federal statutes.

The Federal Trade Commission (FTC)

-the federal government's primary mechanism for protecting consumer markets. -The Bureau of Consumer Protection is the FTC's primary enforcement mechanism and is divided into seven divisions: ▪Enforcement, advertising practices, financial practices, marking practices, planning and information, consumer and business education programs, and privacy and identity protection.

FBI's protection priorities

1) Terror 2) Foreign Intelligence 3) Cyber-based attacks The FBI is leading the charge to investigate and prosecute cybercrimes.

The Department of Energy

The DOE's main responsibilities revolve around domestic energy production, conservation and efficiency. DOE - Cyber Incident Response and Recovery (CIRR)

National Cybersecurity and Communications Integration Center (NCCIC) (DOE)

The NCCIC has a twofold task: ▪Charged with protecting cyber infrastructure. ▪Cyber situational awareness, incident response, and management center.

State and Local Roles

The number of local, state, county, and regional computer crime task forces continue to increase. Citizens are more willing to report computer criminal activities. Local officers may not have the capacity or understanding to investigate such crimes.

The Postal Service

•The U.S. Postal Inspection Service provides businesses with a safe venue for exchange of funds and securities and provides private citizens a safe and secure way to transmit correspondence. -It also frequently conducts joint investigations with other federal agencies. -Mail Theft Reporting System (MTRS) -Child Exploitation cases -Production and distribution of child porn.

U.S. Secret Service

•The U.S. Secret Service safeguards the nation's financial payment system against fraud and counterfeit financial instruments. -The financial Crimes Division is the agency's primary tool in the fight against computer crime. -The Secret Service has primary jurisdiction in cases involving access device fraud, and in the investigation of computer fraud relating to computers and computer systems of "federal interest."


Related study sets

Missed Final Exam Questions - Security+

View Set

Micro economics chapter 6,7,8,11 and 14.

View Set

chapter 14: influencer marketing with social media

View Set

Managerial accounting Chapter 4,5,6

View Set

Christian Worldview (Non-Honors) Final Review

View Set