Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
High-Tech Crime
High-tech crimes targeting computer networks are becoming an increasing law
enforcement and national security problem because of the growing reliance in the
United States of government entities, public utilities, industries, businesses, and
financial institutions on electronic data and information storage, retrieval, and
transmission. Increasingly, other countries around the world face the same vulnerability.
The creation of complex computer networks on which many government, public, private,
and financial services depend has created opportunities for illicit access, disruption, and
destruction of information by a wide range of hackers. Although most computer attacks
are conducted by disgruntled employees and independent hackers, according to US law
enforcement information, the threat from foreign intelligence services and foreign
corporate competitors is significant for US national security interests. Moreover,
international terrorist and criminal organizations have increasing capability to penetrate
and exploit computer-based information and data systems.
The greater dependence on computer systems for daily business and administrative
functions--and the increasing interconnections between computer networks--has
increased both the vulnerability and potential costs of systems penetration. US
communications and information industries have developed the most technologically
advanced systems and networks in the world. Many critical public infrastructure
industries--including power and energy, telecommunications, and transportation
systems--are operated or managed by computer networks. According to the US
Customs Service, all major international industries, businesses, and financial institutions
rely on interconnected computer systems for commercial and financial transactions to
remain competitive.
Illegal intrusion and exploitation of computer networks in the United States have sizably
increased over the last several years, causing millions of dollars in losses to US
businesses and potentially threatening the reliability of public services.
Criminal groups may also exploit businesses and government agencies using
programmers, many of whom are lesser paid foreigners, to make software fixes
or write new programs to gain access to computer systems and the information
they contain. Press reports indicate that a Russian-speaking crime group in the
United States recruited unemployed programmers in Russia to hack into other
syndicates' computer systems, embezzle funds, and create programs to protect
its funds in US banks.
International criminals are using computers to support a wide range of criminal activity,
including as an innovative alternative means to commit many traditional crimes. The use
of computer networks allows criminals to more securely and efficiently orchestrate and
implement crimes without regard to national borders. Drug traffickers, for example, are
using encrypted e-mail and the Internet to avoid detection and monitoring of their
communications over normal telephone and communications channels.
The Internet has also become the primary means used by international child
pornography rings to disseminate their material worldwide. International child
pornography rings are operating in dozens of countries, peddling their illicit wares
through the Internet and other global distribution networks. Modern technology allows
these child pornographers to store vast quantities of digital images on small portable
computers easily smuggled into the United States and elsewhere.
Moreover, criminal commercial and financial transactions through computers occur
amidst countless legitimate public, business, and personal uses of computer networks,
making them especially difficult to identify. Transactions involving technology or
components for weapons of mass destruction or embargoed items under US or
international sanctions are being done through computers. Virtually any commodity,
including weapons of mass destruction and their component parts and delivery systems,
is being offered for international sale on Internet sites.
In March 1999, hackers pleaded guilty to breaking into US phone companies for
calling card numbers that eventually made their way to organized crime
syndicates in Italy. US law enforcement information indicates that this high-tech
theft cost the US phone companies an estimated $2 million.
Intellectual property rights violations through the penetration of computer networks are
also an increasing threat to US businesses. US businesses responding in the 1998
survey reported losses of $33.5 million in theft of proprietary information from computer
attacks.
International criminals may be using computer hacking and related methods for financial
gain. Industry and law enforcement reporting indicates that high-tech criminals are using
advances in technology to target banks and other financial institutions. The anonymity
and speed of electronic transactions may encourage criminal exploitation of these
technologies. While US and many Western and Asian banks and financial institutions
maintain adequate security safeguards to prevent outside penetration of computerbased data financial transaction systems, some have outdated or lax security practices
that high-tech criminals are able to exploit.
In 1994, individuals in St. Petersburg, Russia-- aided by insider access-attempted to steal more than $10 million from a US bank by making