Click Here: <A
HREF="http://www.fcw.com/fcw/articles/2000/0626/web-secret-06-27-00.asp">Secre
t Service targets e-crime</A>
-----
Secret Service targets e-crime

BY Sharon Gaudin
Network World
RELATED STORIES

"Big bucks for digital wiretapping, DOJ, Treasury" [FCW.com, Feb. 7, 2000]
"New laws for new technology" [FCW.com, March 8, 2000]
"Hill revives FBI project" [Federal Computer Week, June 19, 2000]

06/27/2000  With technology advancing at Internet speed, staying ahead of the
learning curve has become a major focus for the government’s fastest-growing
agency — the U.S. Secret Service.
The Secret Service, which splits its focus between protecting heads of state
and conducting criminal investigations, is one of the government’s biggest
weapons against computer crime.

"This will be the crime of the future," says Leo Jackson, an assistant to the
Special Agent in Charge with the Secret Service. "The reason why we’re
expanding the number of people we have and dedicating more manpower and
training is because we see the future."

The Electronic Crimes Special Agent Program began with a handful of specially
trained agents in 1987. Today, that number has grown to 155, and it’s
expected to exceed 200 by the end of the year.

The agency also is giving agents specific electronic crime training,
recruiting new agents with high-tech skills, working with industry leaders
and analyzing new technology and products before they hit the market.

Agents see technology as the basis for an increasing amount of crime,
including corporate sabotage and credit card fraud. Computers and the
Internet give criminals their chance to be borderless and anonymous.

"It’s low-risk crime," the Secret Service’s Ray Ventura said. "You’re in your
house, in the privacy of your own home.... This is the future. We’re going to
do whatever it takes to keep pace. "

The Secret Service also is focusing on analyzing new products and services,
and it alerts the vendor to any security weaknesses they find.

"Recently, we have made a special effort to contact companies that we have
found have systemic weaknesses in products they’re offering, " Lugo said.

The new technology they’re watching the closest is wireless.

"You have multiapplication devices going wireless, " Lugo said. "All that
information is being transmitted out in the open."
The upshot of these efforts is that the Secret Service is changing the
commonly held view that the average computer criminal can outsmart the
average law enforcement official.

"People think, "I can do this and how can they ever trace it?’ " Ventura
said. "I don’t think they comprehend the experts we’re putting in the field."

For more information about enterprise networking, go to Network World Fusion.
Story copyright 2000 Network World Inc. All rights reserved.




The fcw.com privacy policy, and our link disclaimer.
fcw.com complies with the ASME Guidelines with IDG extensions for new media.
Mail questions to [EMAIL PROTECTED]
Copyright 2000 FCW Government Technology Group
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to