Example: quiz answers

COMPUTER CRIME - New Jersey

COMPUTER CRIMEA JOINT REPORTS tate of New JerseyCommission of InvestigationAttorney Generalof New JerseyJUNE 2000 COMPUTER CRIMEA JOINT REPORT State of New JerseyAttorney GeneralCommission of Investigation of New JerseyLESLIE Z. CELENTANOJOHN J. FARMER, KAREN THOMPSONW. CARY EDWARDSAUDRIANN KERNANCOMMISSIONERSJUNE 2000 The Report, complete with hypertext links, is available on the Commission s Web site at CRIMETABLE OF CONTENTSINTRODUCTION1 CHILDREN IN JEOPARDY 4 THE PROBLEM 4 THE MAKING OF PREDATORS: CYBERSPACE HELPSPEDOPHILES ACT OUT THEIR PERVERSION 9NO EASY SOLUTIONS 11 PARENTAL SUPERVISION 11 BLOCKING, FILTERING AND MONITORING SOFTWAREAND CHILD-FRIENDLY BROWSERS 14 CHILD-FRIENDLY WEB SITES 16 SCHOOL AND LIBRARY POLICIES 17

COMPUTER CRIME A JOINT REPORT State of New Jersey Attorney General Commission of Investigation of New Jersey LESLIE Z. CELENTANO JOHN J. …

Tags:

  Computer, New jersey, Jersey, Crime, Computer crime

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of COMPUTER CRIME - New Jersey

1 COMPUTER CRIMEA JOINT REPORTS tate of New JerseyCommission of InvestigationAttorney Generalof New JerseyJUNE 2000 COMPUTER CRIMEA JOINT REPORT State of New JerseyAttorney GeneralCommission of Investigation of New JerseyLESLIE Z. CELENTANOJOHN J. FARMER, KAREN THOMPSONW. CARY EDWARDSAUDRIANN KERNANCOMMISSIONERSJUNE 2000 The Report, complete with hypertext links, is available on the Commission s Web site at CRIMETABLE OF CONTENTSINTRODUCTION1 CHILDREN IN JEOPARDY 4 THE PROBLEM 4 THE MAKING OF PREDATORS: CYBERSPACE HELPSPEDOPHILES ACT OUT THEIR PERVERSION 9NO EASY SOLUTIONS 11 PARENTAL SUPERVISION 11 BLOCKING.

2 FILTERING AND MONITORING SOFTWAREAND CHILD-FRIENDLY BROWSERS 14 CHILD-FRIENDLY WEB SITES 16 SCHOOL AND LIBRARY POLICIES 17 CONTROL ORGANIZATIONS AND PROGRAMS 20 UNESCO 20 White House 21 Federal Bureau of Investigation andOffice of the Attorney for theDistrict of New Jersey 22 United States Customs Service 23 Federal Trade Commission 24 National Center for Missing andExploited Children 24 Office of Juvenile Justice andDelinquency Prevention 25 Cyber Angels and Other HelpOrganizations 26 End Child Prostitution and Trafficking(ECPAT) and the World TourismOrganization (WTO)

3 28 Internet Service Providers 28 New Jersey State Police 29 LAWS AND LEGAL ACTIONS 29 BIAS AND HATE32 THE PROBLEM 32 CROSSING THE LINE FROM HATE SPEECHTO HATE CRIME 36 CONTROL ORGANIZATIONS, PROGRAMS AND LAWS 42 OFFICE OF BIAS CRIME AND COMMUNITY RELATIONS 42 DIVISION ON CIVIL RIGHTS 43 ANTI-DEFAMATION LEAGUE 44 CENTER ON HATE AND EXTREMISM 45iiSOUTHERN POVERTY LAW CENTER 45 NEW Jersey COMMISSION ON HOLOCAUST EDUCATION 46 SIMON WIESENTHAL CENTER 46 HATEWATCH 47 OTHER ANTI-EXTREMIST ORGANIZATIONS 47 HACKING48 THE PROBLEM 48 PASSWORD TIPS

4 58 WHEN CREATING A PASSWORD: 58 ONCE YOU HAVE A PASSWORD: 58 ENCRYPTION 59 CONTROL PROGRAMS AND METHODS 61 INTERNET FRAUD69 COMMON SCAMS SPREAD FAR AND FAST ONLINE 69 COMMON FRAUDULENT SCHEMES 72 CONTROL ORGANIZATIONS AND PROGRAMS 76 FEDERAL TRADE COMMISSION (FTC) 77 INTERNET FRAUD COMPLAINT CENTER 78 INTERNET FRAUD COUNCIL 79 INTERNET FRAUD WATCH 80 BBBONLINE 80 SECURITIES AND EXCHANGE COMMISSION (SEC)

5 82 NORTH AMERICAN SECURITIESADMINISTRATORS ASSOCIATION 83 NATIONAL ASSOCIATION OF SECURITIESDEALERS (NASD) 83 FEDERAL DEPOSIT INSURANCECORPORATION (FDIC) 84 MAIL ABUSE PREVENTION SYSTEM 84 NEW Jersey DIVISION OF CONSUMER AFFAIRS 84 IDENTITY THEFT88AN ESPECIALLY EGREGIOUS FRAUD 88 DEMONSTRATION OF ONLINE PITFALLS 94 HOW TO AVOID BECOMING A VICTIM 96 ACTIONS VICTIMS MAY TAKE 98 RECENT LAWS AND CONTROL PROGRAMS 99 NEW Jersey LAW STRENGTHENED 100 FEDERAL LAW STRENGTHENED ENHANCED ROLE FOR FTC 100 OTHER CRIME -FIGHTING FEDERAL AGENCIES 100 KEEPING PERSONAL

6 INFORMATION PRIVATEAND ACCURATE 101 PRIVATE HELP AND PREVENTION RESOURCES 105iiiINTERNET GAMBLING107 OFFSHORE FIRMS SERVE A GROWING DEMAND 107 JUSTIFICATION FOR PROHIBITION 109 EFFECTIVENESS OF PROHIBITION 110 JUSTIFICATION FOR REGULATION 115 EFFECTIVENESS OF REGULATION 118 COMPULSIVE CYBER-GAMBLING 119E-COMMERCE IN ALCOHOLIC BEVERAGES AND TOBACCO121 CHALLENGES FOR LAW ENFORCEMENT 122 SPECIAL PROBLEMS OF COMPUTER -RELATED CRIME 122 JURISDICTION 125 SPECIALIZED COMPUTER CRIME UNITS WORKING TOGETHER 127 COMPUTER ANALYSIS AND TECHNOLOGYUNIT (CATU) 130 HIGH TECHNOLOGY CRIME ANDINVESTIGATIONS SUPPORT UNIT (HTC&ISU)

7 130 TRAINING 132 RETENTION OF KEY PERSONNEL 134 RECOMMENDATIONS 136 STRENGTHEN NEW Jersey S COMPUTER ANDTECHNOLOGY CRIME LAWS 136 INCREASE, TRAIN AND COORDINATE LAWENFORCEMENT RESOURCES 140 INCREASE PREVENTION AND EDUCATION 142 ACCESS TO ELECTRONIC RECORDS OF INTERNET USE 143 ONLINE PRIVACY 144 RESTRAINING ONLINE SALES 145 ESTABLISH AND PUBLICIZE HOTLINES ANDCOMPLAINT PROCESSES 145 MAINTAIN PROHIBITION ON INTERNET GAMBLING 146 COMPUTER CRIMEINTRODUCTIONIn an unprecedented joint project, the State Commission ofInvestigation (hereinafter Commission or SCI ) and then-AttorneyGeneral Peter G.

8 Verniero held three days of public hearings oncomputer CRIME on February 23, 24 and 25, 1999. The hearings, withmore than 30 expert witnesses, capped extensive inquiries by theCommission and the Attorney General s Office, headed since June 1999by Attorney General John J. Farmer, Jr. They underscored the need forlaw enforcement at all levels to coordinate efforts to control the dark side of the COMPUTER revolution. This includes prosecutinghigh-tech conduct offending criminal laws, pursuing civil remedies foronline wrongdoing, and helping adults and children to protectthemselves in technology and communication confer obvious advantageson businesses, governments, schools and individuals.

9 With nominalresources, people and institutions can, via computers, leap state andnational boundaries to explore vast stores of information and benefitfrom innumerable commercial opportunities. However, Commission ChairLeslie Z. Celentano cautioned in her public hearing opening remarksthat [as] on any frontier, .. predatory elements seek to takeadvantage of those reaching for new opportunities. With propersafeguards, adults and children should be able to enjoy and profitfrom cyberspace sometimes called the digital highway or the information superhighway without falling prey to schemers,predators and to the Department of Commerce, 40 percent ofAmerican households owned personal computers at the end of 1998.

10 Aquarter of those had access to the Internet, a global group ofinterconnected COMPUTER networks, communications equipment andsoftware. The Internet furnishes nearly 200 million worldwide usersaccess to measureless riches of information and services. According toForrester Research, Inc., which tracks Internet commerce, total trade on the Internet reached $43 billion in 1998 and isprojected to rise to $ trillion in 2004. Spending on Internetauction sites alone totaled $ billion in 1998 and is predicted togrow to $19 billion by each of the networks that make up the Internet is owned bya public or private organization, no single organization or governmentowns or controls the Internet.


Related search queries