California Forms Cyber Crime Unit - InformationWeek
IoT
IoT
Government // Open Government
News
12/14/2011
12:34 PM
50%
50%
RELATED EVENTS
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

California Forms Cyber Crime Unit

California's eCrime Unit's priorities include identity theft, email scams, and computer equipment theft.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
California has become the latest state to create a law-enforcement unit entirely aimed at catching cyber criminals.

The state's Attorney General Kamala Harris unveiled California's eCrime Unit, which will focus on tracking down and prosecuting identity-theft crimes and other cyber and technology-related incidents.

"Today's criminals increasingly use the Internet, smartphones, and other digital devices to victimize people online and offline," she said in a statement. "I am creating the eCrime Unit so that California can be a leader in using innovative law enforcement techniques to target these criminals."

The formation also is likely because of the prevalence of technology-related crimes in California. The state ranked No. 1 in identity theft by state, according to the Federal Trade Commission, and 10 of the top 25 metropolitan areas for online identity theft complaints in 2010 are in California.

Moreover, last year, the state lost $46 million to identity theft cases and more than 1 million of its residents were victims of the crime.

[ Technology can help to identify the people who commit non-cyber crimes. Read Biometric Standard Expanded To Include DNA, Footprints. ]

California joins Texas, Florida, and Louisiana, which also have cybercrime units.

Identity theft is just one of several crimes the new unit focuses on. Others include fraud committed using the Internet, including email scams and the like; the theft of computer components or services; intellectual property crimes, such as software piracy; and child exploitation, such as online child pornography networks and those who commit sex crimes against children using the Internet and social media.

In addition to its law-enforcement activities, the eCrime Unit also provides support to five regional high-tech task forces California has deployed through its High Technology Theft Apprehension and Prosecution Trust Fund Program, as well as coordination to aid in technology-related investigations out of the state. Additionally, it trains law enforcement officers, prosecutors, the judiciary, and the public on cyber safety.

While Harris introduced the unit this week, it has been operational since August. Department of Justice attorneys and investigators staff the unit, which already has participated in notable investigations, according to Harris.

One helped expand the investigation of an identity-theft scam at ATM machines across seven California counties. The scam used a card reader to capture victims' card numbers and a hidden camera to capture the PIN numbers. The case, California v. Aroutiounyan, involved the loss of $2 million.

California has had some high-profile challenges with its overall technology mission, but the state has been in the process of broad reform of its IT practices and aims to maintain a progressive stance on the adoption of new technology.

Database access controls keep information out of the wrong hands. Limit who sees what to stop leaks--accidental and otherwise. Also in the new, all-digital Dark Reading supplement: Why user provisioning isn't as simple as it sounds. Download the supplement now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll