ad info

 
CNN.com  technology > computing
    Editions | myCNN | Video | Audio | Headline News Brief | Feedback  

 

  Search
 
 

 
TECHNOLOGY
TOP STORIES

Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

(MORE)

TOP STORIES

More than 11,000 killed in India quake

Mideast negotiators want to continue talks after Israeli elections

(MORE)

MARKETS
4:30pm ET, 4/16
144.70
8257.60
3.71
1394.72
10.90
879.91
 


WORLD

U.S.

POLITICS

LAW

ENTERTAINMENT

HEALTH

TRAVEL

FOOD

ARTS & STYLE



(MORE HEADLINES)
*
 
CNN Websites
Networks image


Net crime does pay for cops

Industry Standard

February 24, 2000
Web posted at: 8:31 a.m. EST (1331 GMT)

(IDG) -- The attacks that crippled Yahoo and at least seven other top sites this month could prove a boon to law enforcement officials seeking more funding from Congress.

"Our current resources are stretched paper-thin," testified FBI Director Louis Freeh at a Senate committee hearing last week. "We only have 193 agents assigned to NIPC [National Infrastructure Protection Center] squads nationwide." Freeh's comments came only one day after the White House convened a summit on Internet security.

The Justice Department will need an additional $37 million next year, according to U.S. Attorney General Janet Reno. Cybercrime, Reno warns, "is one of the most critical issues law enforcement has ever faced."

Many Internet analysts, however, are skeptical. "There's an enormous amount of money sloshing around the DoJ today," says Marc Rotenberg, director of the Electronic Privacy Information Center. "They've received incredible increases in the last few years to address computer crime, and it's not clear to me the current funding is being well spent."

San Francisco attorney Jennifer Granick scoffs: "This is a great opportunity [for law enforcement] to get more cash." Granick, who has represented accused hackers in the past, adds, "They have been extremely successful in getting more funding from legislators around the country by using the threat of computer crime."

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  The Standard.com
  Do you know how to secure your DSL against hackers?
  What makes a cracker tick?
  Who do you call to report a computer break-in?
  Reviews & in-depth info at IDG.net
  E-BusinessWorld
  Industry Standard email newsletters
  Questions about computers? Let IDG.net's editors help you
  Industry Standard daily Media Grok
  Search IDG.net in 12 languages
  News Radio
  * Fusion audio primers
  * Computerworld Minute

Reno wants more than millions. She wants to amend the Computer Fraud and Abuse Act to cover computer attacks even if no single computer sustains damage above the current $5,000 limit. The amendment would also allow judges to issue court orders enabling authorities to monitor phone calls and computer messages that travel across jurisdictions.

Such demands alarm civil-rights advocates, who fear further erosion of online privacy.

"Law enforcement has had very little trouble tracking down the perpetrators in these cases," says Ari Schwartz, an analyst with the Center for Democracy and Technology. "So we should focus on making sure law enforcement stays up to date with the technologies and uses techniques that do not invade civil liberties."

Indeed, within days of the recent denial-of-service hacks, authorities quickly focused their search on an Internet Relay Chat braggart with the moniker "mafia-boy" and on "Coolio," the alias of the person who allegedly hijacked the domain of RSA Security and redirected it to a defaced site. "I would not characterize [the investigation] as difficult," says George Grotz, special agent in the FBI's computer crime squad in San Francisco. "[But] I think we need the help of the community to solve this."

Meanwhile, several lawmakers are preparing bills to increase penalties and broaden hacking prohibitions.

"My nightmare fear is some congressman is going to seize on this and they're going to pass some laws," says Paul Saffo, director of the Institute of the Future in Menlo Park, Calif. "I can just see people overreacting and doing things that would invade people's privacy or tie up the Internet with so much security nonsense that innovation slows down."

In Washington, tech-industry officials caution against new regulations to prevent future attacks, asking the government to lead by example. "We recommend that the government use secure Web servers and do the hygiene," says Roberto Medrano, general manager of Hewlett-Packard (HWP) 's Internet security division.

"The government should be getting its own house in order first," agrees Frank Cilluffo, deputy director of the Global Organized Crime Project at the Center for Strategic and International Studies. "Only then can they expect the private sector to pony up the resources" to fight cybercrime.

Keith Perine contributed to this report.



RELATED STORIES:
Avoiding future denial-of-service attacks
February 23, 2000
Hacker hunters follow lead to Germany
February 13, 2000
US - FBI agents focus on university, business computers as cyber-attack launch pads
February 10, 2000
Technology - Cyber-attacks batter Web heavyweights
February 9, 2000
US - FBI agents focus on university, business computers as cyber-attack launch pads
February 9, 2000

RELATED IDG.net STORIES:
Do you know how to secure your DSL against hackers?
(NetworkWorld Fusion)
What makes a cracker tick?
(The Industry Standard)
A primer: Denial-of-service attacks
(PC World Online)
Hackers express disdain for Web vandals
(PC World Online)
HP offers safety net in wake of DoS attacks
(InfoWorld)
Users traumatized by Web attacks
(PC World Online)
Who do you call to report a computer break-in?
(InfoWorld)
E-BusinessWorld
(IDG.net)

RELATED SITES:
National Infrastructure Protection Center

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 Search   

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.