Computer Crime

Grewoutofcommunicationsmonitoringandcode

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: rtation Dept of Veteran Affr. DHS Dept of Justice Other non-dept agencies Constitution Judicial Executive Dept of Defense Legislative Dept of Treasury NSA, DARPA IRS Agents DISA, DIA, NGIA FinCEN DHS Dept of Justice US Secret Service FBI ICE US Attorney / CCIPS US Postal Service / PIS NASA OIG Agencies Agencies USSS – Now under DHS – was under Treasury Counterfeiting, financial crimes Protection details, Investigates Financial Institution Fraud DOJ / CCIPS – Attorneys that focus on Computer Crime issues Prosecutorial and training function FBI – Investigates criminal acts that involve computers Usually an interstate nexus Also looks after protecting the infrastructure Agencies Agencies NSA – No Such Agency Grew out of communications monitoring and code breaking in WWII. Secretive agency Very active in terrorism investigations – bad sharer of information Rumored to have **significant** computing power FTC – Federal Trade Commission Focuses on protection of consumer markets Attempts to oversee deceptive marketing and business practices Very active in ID Theft awareness Agencies Agencies US Postal Inspection Service – Any crime facilitated by the mail is a felony – investigated by the US PIS Very active in Child Po...
View Full Document

This note was uploaded on 01/22/2014 for the course JUST 405 taught by Professor Staff during the Fall '08 term at New Hampshire.

Ask a homework question - tutors are online