The set of laws that has allowed federal prosecutors to bring down traditional organized crime gangs should be applied to international cyber crime rings, a top Department of Justice official told a congressional committee on Nov. 15.
The recommendation was one of several DoJ Deputy Section Chief Richard Downing said should be made to the Computer Fraud and Abuse Act (CFAA) during a House Judiciary Subcommittee on Crime, Terrorism and Homeland Security hearing on cyber security’s new frontiers. The committee is considering updating the law.
Downing said the CFAA should be modified to allow offenses to be subject to Racketeering Influenced and Corrupt Organizations Act (RICO) statutes. RICO extends penalties for crimes performed by organizations and allows the leaders of organized crime groups to be tried for the crimes they order subordinates to do.
The move, said Downing, is needed because advancing computer technology has become a substantial tool for organized crime. Downing said “criminal organizations are operating today around the world to: hack into public and private computer systems, including systems key to national security and defense; hijack computers for the purpose of stealing identity and financial information; extort lawful businesses with threats to disrupt computers; and commit a range of other cyber crimes.” The organizations, he added, are closely tied to traditional Asian and Eastern European crime organizations.
Downing said RICO has been used successfully over the years to bring down “mob bosses to Hells Angels to insider traders” and would be effective in the fight against organized cyber criminals.
Downing also recommended the CFAA’s complex sentencing provisions be streamlined and simplified and some maximum sentences be increased to reflect the severity of some cyber crimes.
Prosecutors should also be given more latitude in pursuing the theft of passwords, user names and login credentials. Downing proposed that CFAA not only cover password theft, but other authentication methods, including those that confirm a user’s identity, using biometric data, single-use passcodes or smart cards. It should also cover login credentials used to access to any “protected” computer (defined in the statute quite broadly), not just government systems or computers at financial institutions, he said.
Thanks to Mark Rockwell
Get the latest breaking current news and explore our Historic Archive of articles focusing on The Mafia, Organized Crime, The Mob and Mobsters, Gangs and Gangsters, Political Corruption, True Crime, and the Legal System at TheChicagoSyndicate.com
Subscribe to:
Post Comments (Atom)
Best of the Month!
- Growing Up the Son of Tony Spilotro
- Mob Hit on Rudy Giuilani Discussed
- Chicago Mob Infamous Locations Map
- Tokyo Joe: The Man Who Brought Down the Chicago Mob (Mafia o Utta Otoko)
- The Chicago Syndicate AKA "The Outfit"
- El Jefe: The Stalking of Chapo Guzman #ElChapo
- Mafia Links of Frankie Valli and the Four Seasons
- Founding Member of Latin Kings Sentenced To 27 Years In Prison #NewYork #LatinKings
- Mobsters at the Apalachin Mob Meeting
- James Banks, Attorney & Banker, whose Father Represented Reputed Mobsters & Who's Bank was Affiliated with Operation Family Secrets Mafia Trial, Denied Video Gambling License
No comments:
Post a Comment