Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Helping Law Enforcement Fight Cyber-Crime

    Written by

    eWEEK EDITORS
    Published May 13, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      BOSTON—His title may be the first assistant United States Attorney for the Northern District of Ohio, but Craig Morfords work fighting cyber-crime touches nearly every corner of the globe.

      Morfords responsibilities include the prosecution of federal terrorism, organized crime, public corruption and corporate fraud, and one of the issues he spends much of his effort on today is battling the growing use of computing networks to help carry out those felonies.

      At a security conference organized by imaging giants Xerox here on May 12, Morford blew away attendees with some of the anecdotes and examples of the types of struggles the government and private industry have encountered in trying to stop the flow of proprietary information into the hands of criminals.

      eWEEK Senior Writer Matt Hines sat down with Morford at the event held in the vault of the Boston Stock Exchange to see what sort of progress is being made to that end.

      One of the big questions we hear from business leaders is who they should to turn to first when trying to report and investigate IT-related crimes. Who should these people call for help?

      From what were seeing, the FBI and Secret Service are actually the best places to start, as both have major growing cyber-crime sections tailored to specifically addressing these types of offenses. In some cases were seeing one or the other, and sometimes were seeing both organizations working together. Companies shouldnt be afraid to call these guys up if they have a serious problem to report, its something that the Department of Justice is attuned to, and committed to in terms of addressing a growing need.

      Youve obviously got experience in fighting organized crime in the offline world, but as we know theres a huge element of criminal networks backing a lot of the IT-oriented attacks were seeing today. How are organized crime groups adapting to utilize IT systems to carry out their schemes?

      Well, you have to understand that this is an almost entirely new type of organized criminal, and that you can define organized crime in a lot of different ways.

      It used to be that when people used the term, they were referring to what we typically thought of as organized crime, a family network with some sort of ethnic ties that has bosses, caporegimes and soldiers that work primarily within some specific community.

      But what were dealing with in cyber-crime is something different, a community of criminals that is changing and adapting over time. Its a guy in his twenties in a rundown apartment in Ukraine or somewhere else in Eastern Europe who has a network of computers on which theyre communicating with thousands of other people who he has never met in person, and who could be in any country around the globe. And these people are involved in a web of criminal activity. This is something we havent had to deal with before.

      One of the critical issues in fighting any sort of crime is what sort of budget you have to support those efforts. Should private businesses and government law enforcement officials be pooling their resources to have a broader impact?

      Theres absolutely an opportunity for that type of collaboration, and its one of the many things that were trying to do to help solve this problem. The Secret Service and FBI are both actively reaching out to business, and to law enforcement worldwide for support, education and to help more people understand the threats that are out there.

      /zimages/2/28571.gifExperts: Cyber-criminals are still running amok. Click here to read more.

      People need to invest with each other and learn to trust each other, and because of the international nature of the crimes being committed, everyone needs to reach out to foreign governments. If people can establish evidence-sharing treaties and form cooperative arrangements with law enforcement, along with forming partner relationships between corporations and federal investigators, a lot can be achieved.

      Next Page: What the government can do to help.

      What the Government Can


      Do to Help”>

      Ultimately, what is law enforcements role in facilitating all of this?

      The best the government and law enforcement can do for private companies is to serve as a backstop. We can prosecute a certain amount of cases and that will help as a deterrent and to prove the punishments for committing cyber-crimes, but ultimately a lot of the burden falls on corporate America to use civil laws and remedies to go after perpetrators and recover some of their assets through restitution.

      We hear a lot these days about the internal threat, and how frequently people are exposing their employer to cyber-crime without even knowing it. How do businesses decide who is trying to hurt them intentionally, and who is just making a bad decision that leads to a problem?

      In the case of cyber-crime, the technology is new but weve been fighting the same types of activity for over 200 years. The truth is that when youre prosecuting something like this there are a lot of similarities to ordinary mail fraud cases.

      As always, the challenge is in proving intent and the answer is looking at it in the same way we always have, by looking at the evidence and the persons behavior to try to prove their intent. In that sense, theres no difference from traditional fraud.

      So in that sense, technology may actually make it easier to establish some of these patterns.

      Technology can help in this process, its absolutely amazing what you see some people writing in e-mails they dont think will be read by anyone other than their anticipated recipients. Technology is both a blessing and curse; it helps leave a trail of evidence that we can follow, but it also opens up a lot of opportunity to commit crimes.

      Over the years weve heard a lot about cyber-terrorism, and even the ties that terrorists may have to common forms of computer-related crimes. What do businesses need to know about the place of terrorism in dealing with IT-based attacks?

      Theres a multifaceted threat with terrorism, and its not just the type of foreign terrorism that everyone thinks of first. You have the external threat of groups that want to steal, sell or use the data, and you have this threat of internal terrorism where employees want to steal something and sell it for a profit, or just to hurt the company for some reason.

      There are also domestic terrorists such as local rights groups who may launch computer-related attacks just to support some belief they support, and your Ted Kaczynski types who may have a beef with corporate America and carry out their own terrorist acts alone.

      /zimages/2/28571.gifClick here to read about the dark side of the search engine business.

      Really there are a host of things that can be done to inflict damage on computing networks that can be defined as terrorism. Corporations need to be aware of that and to watch out not just for the theft of data but also the potential destruction of data, and the timing that some of this sort of activity that goes along with considerations of all that.

      Some people feel that the outsourcing of jobs overseas could aid terrorists in harming U.S. companies. Do you think theres any truth to that idea?

      The best comparison that I can make is to a movie like “Bubble Boy.” When you leave your bubble, all kinds of bad things could happen to you, you could get in your car and have an accident or catch a virus, but that doesnt mean we should stay locked up in the house as a result.

      You really have to put your seatbelt on, drive the speed limit and try to behave carefully when operating overseas. But, its not realistic to tell companies that they shouldnt go overseas to do business.

      They just need to realize the security risks and take reasonable steps to both prevent crime and take action when they are victimized, no matter where in the world it is that they might be doing business.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×