Ramping Up the Cyber Criminal Hunt

March 2014
Signal;Mar2014, Vol. 68 Issue 7, p29
The article focuses on two new cybercrime task forces being developed by the U.S. Secret Service that will enhance the agency's ability to detect and investigate information technology-related crimes. These include the task forces in Cincinnati, Ohio and Denver, Colorado. Electronic crimes refer to any criminal activity that makes substantial use of information technology, such as credit card theft, attacks on the banking and finance infrastructure and identity fraud.


Related Articles

  • TJX Ringleader Was Govt. Informer. Roberts, Ed // Credit Union Journal;8/11/2008, Vol. 12 Issue 32, p29 

    The article reports that the charges against 11 persons in the 2006 hacking of TJX Cos. and several other major retailers may be jeopardized by the fact that the informant of the U.S. Secret Service, Albert Gonzalez, known as "Segvec" or "SoupNazi," was the alleged ringleader. Details related to...

  • Catching Phish. Goldman, Lea // Forbes Global;11/29/2004, Vol. 7 Issue 21, p14 

    Reports on the arrests and indictments made by the U.S. Justice Department and the Secret Service regarding online identity theft and credit card fraud in the U.S. in 2004. Penalties imposed on criminals; Number of stolen credit card numbers trafficked by the operators of Shadowcrew.com...

  • Arrests. Lindenmayer, Isabelle // American Banker;3/31/2006, Vol. 171 Issue 62, p3 

    This article presents information about the recent arrests of 7 people by the Secret Service after an investigation into online forums where credit card data and other consumer information is sold. Those arrested will face charges of online identity theft, credit card fraud, and access device...

  • Nearly 14,000 Cards Skimmed In Alleged Scheme.  // CardLine;10/1/2010, Vol. 10 Issue 41, p51 

    The article reports in the federal charges faced by Zelalem Berhe of Las Vegas in connection of using counterfeit debit and credit cards with information from gas pumps in Nevada in 2010. According to the U.S. Attorney's office of Nevada, Berhe is charged with possession of access device-making...

  • Consumers Fear Identity Theft When Security Breaches Occur.  // ISO & Agent Weekly;10/1/2009, Vol. 5 Issue 35, p3 

    The article offers information on the National Foundation for Credit Counseling survey conducted by Silver Spring, a Maryland-based foundation, which examines consumers' fear for identity theft. According to the survey, sixty-nine percent said that they would feel at high risk if security...

  • HOW TO AVOID ONLINE PHISHING. RAWLINSON, NIK // Techlife Australia (Bauer Media Group);May2014, Issue 24, p60 

    The article offers tips on how computer users can avoid phishing. The article provides an overview threat associated by phishing. The author warns of emails that are too familiar or which ask for too much information. He also raises warning on the emails purporting to come from the bank that...

  • THE POLL.  // SC Magazine: For IT Security Professionals (UK Edition);Oct2007, p11 

    The article presents statistics on the percentage of identity thefts facilitated online in 2006, and the percentage of all card-not-present fraud that was conducted online in 2006.

  • Web Mobs. McCormick, John; Gage, Deborah // Baseline;Mar2005, Issue 41, p28 

    This article deals with the impact of Web mobs on electronic commerce. In the past two years, as of March 2005, the Shadowcrew's 4,000 members, according to the U.S. Secret Service, ran a worldwide marketplace in which 1.5 million credit card numbers, 18 million e-mail accounts, and scores of...

  • Law. Wolfe, Daniel // American Banker;3/14/2007, Vol. 172 Issue 50, p5 

    The article reports on comments about when and why the U.S. Secret Service might request that a merchant delay disclosing to the public that payment card information has been stolen. Such requests are rarities, according to speakers at a security conference hosted by Visa U.S.A. Inc., and might...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics