TITLE

US urges China to probe, halt cyber spying

PUB. DATE
April 2013
SOURCE
Flare (Pakistan);4/15/2013, p76
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports on the call of U.S. National Security Advisor Tom Donilon on China to investigate and stop cybercrime from the latter country.
ACCESSION #
87760619

 

Related Articles

  • CASES WITHOUT BORDERS. GONZALEZ, JASON P.; ESWORTHY, MATTHEW A. S.; GAUGER, NEAL J. // Criminal Justice;Winter2016, Vol. 30 Issue 4, p15 

    The article discusses the challenges faced by international community during investigation of international cybercrime and efforts made for developing effective methods of pursuing online crime. Topics include criminality providing direct roadblock to prosecution of international cybercrime,...

  • Crime prevention and the electronic frontier. Parsons, Matt // FBI Law Enforcement Bulletin;Oct98, Vol. 67 Issue 10, p7 

    Reports on the Computer Investigations and Operations Department (CIOD) established by the Naval Criminal Investigative Service (NCIS), an agency for the United States Navy. Information on how CIOD aids in crime prevention; Training of members of the CIOD; Brochures published by CIOD.

  • Computer Crimes Investigative Unit. Dean, Joshua // Government Executive;Dec2000, Vol. 32 Issue 14, p66 

    Focuses on Computer Crimes Investigative Unit (CCIU) of the United States Army's Criminal Investigation Command. Ability of CCIU to find computer hackers; Number of hackers that attempted to penetrate the Army's networks; Factors that make the tracking of hackers tedious.

  • Computer fraud--what can be done about it? Romney, Marshall // CPA Journal;May95, Vol. 65 Issue 5, p30 

    Addresses the problem of computer-based fraud. Dependence on computerized systems to meet increasing need for information; Ways to perpetrate computer fraud; Computer fraud techniques; Reduction of computer crimes by increasing the integrity of employee; Design of internal control systems. ...

  • `Innocent' hackers want their computers back. Charles, D. // New Scientist;5/9/92, Vol. 134 Issue 1820, p9 

    Reports that United States officials refuse to return computers to owners which were seized during Operation Sun Devil raids on computer hackers. Description of the operation; The meager results of the operation; Computer Professionals for Social Responsibility have gone to court over this.

  • `An Embezzler's Guide to Your Computer' available.  // Westchester County Business Journal;10/28/96, Vol. 35 Issue 44, p19 

    Presents excerpts from `An Embezzler's Guide to Your Computer,' a report available from Assets Protection Publishing. Embezzlement as the second most common crime against business; Two common embezzlement methods.

  • Trouble for employers.  // Nation's Business;Feb85, Vol. 73 Issue 2, p57 

    Whether computer criminals are corporate managers transferring assets, or hackers stealing hundreds of thousands of dollars of computer time, computer crime can present a company with a problem of devastating proportions. A variety of insurance security plans are being launched to reduce the...

  • On site: The tamperproof office. LaPlante, A. // PC World;Jul91, Vol. 9 Issue 7, p240 

    Describes the steps Sun Life Assurance Company of Canada has taken to protect itself from computer security threats. Protecting information on PCs; Identifying PC security risks; Security classifications for PCs; Preventive measures; Education in security threats.

  • Antivirus and security products. Heim, J. // PC World;Jul91, Vol. 9 Issue 7, p247 

    Lists 26 antivirus products. Types of virus fighters; Integrity checkers; Memory-resident monitors; Security products; Choosing an anti-virus or security product.

  • Fending off the hackers. Elliott, Robert // Inside Tucson Business;07/15/96, Vol. 6 Issue 16, p3 

    Recommends basic strategies for preventing computer crime. Includes minimizing Internet connectivity; Building a computer arbiter; Constant data reduction.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics