Saturday, November 3, 2012

Cyberlaw pointed at US conference by Federal enforcement law

The National Security Division restate at Thursday on Seattle that threats posed through cyberspace are expected to become the number one threat to the nation’s security. Lisa Monaco the assistant attorney expressed the keynote address at the 2012 Cyber crime Conference which was hosted by United States Attorney Jenny stated that cyber threats are rapidly evolving. They impact our daily lives, our economy, and our personal and national security.

He told that we will use every means to detect, disrupt, and defend against this growing problem; we are bringing the right people with better tools to the fight. To confront the cyber threats, we need to ensure that cyber law enforcement, private industry, and our international partners are sharing information, working together, and coordinating responses.

Assistant Attorney General Monaco explained how the Internet is being used not only to facilitate bomb plots and other terrorist operations targeting the United States, but it is also being used for espionage and cyber intrusions aimed at obtaining American economic, commercial, or trade secrets. 

Cybire crime


All the members of the panel agreed it is critical to have international relations in place to be able to investigate and prosecute cyber criminals. There is no such thing as a local cyber crime, Assistant Attorney General Monaco said. The hacker has probably touched three continents before he skims your bank account.” United States Attorney Jenny Durkan is chair of a DOJ committee on Cyber crime and Intellectual Property Enforcement. The Cyber crime Conference is an annual event bringing together leaders in technology from the private sector, government, and law enforcement. The conference, attended by more than 200 people, touched on a variety of issues.

The committee also discussed the efficacy and practicality of such rules in the context of computer forensics. Also they discussed about implementing better methods of sharing information between researchers, law enforcement, and industry in an effort to assist in identifying threats, mitigating the harm caused by cyber attacks, and bringing the wrongdoers to justice, with a special focus on several of the practical and legal limitations on such information sharing.

No comments:

Post a Comment