(Go: >> BACK << -|- >> HOME <<)

Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

Senate passes cybercrime bill aimed at victim restitution

Closing some loopholes in current legislation, say lawmakers
 

Sign up to receive Security Resource Alerts

November 16, 2007 (IDG News Service) -- The Senate has passed a bill that would allow victims of online identity theft schemes to seek restitution from criminals and expands the definition of cyberextortion.

The Senate passed the Identity Theft Enforcement and Restitution Act by unanimous consent Thursday. The bill, introduced a month ago by Senator Patrick Leahy, a Vermont Democrat, allows victims of identity theft to seek restitution for the time they spend to fix the problems. The bill would allow prosecutors to go after criminals who threaten to take or release information from computers with cyberextortion, and it would allow prosecutors to charge cybercriminals with conspiracy to commit a cybercrime.

Current law only permits the prosecution of criminals who seek to extort companies or government agencies by explicitly threatening to shut down or damage a computer.

The bill would also make it a felony to use spyware or keystroke loggers to damage 10 or more computers, even if the amount of damage was less than $5,000. In the past, damage of less than $5,000 was a misdemeanor.

The legislation, among other things, would also allow the federal prosecution of those who steal personal information from a computer even when the victim's computer is in the same state as the attacker's computer. Under current law, federal courts only have jurisdiction if the thief attacks from another state, according to Leahy's office.

Leahy, chairman of the Senate Judiciary Committee, applauded the Senate action. The U.S. Department of Justice worked with senators to craft the legislation and fill holes in cybercrime laws, he said on the Senate floor.

The bill "takes several important and long-overdue steps to protect Americans from the growing and evolving threat of identity theft and other cybercrimes," he said. "To better protect American consumers, our bill provides the victims of identity theft with the ability to seek restitution in federal court for the loss of time and money spent restoring their credit and remedying the harms of identity theft, so that identity theft victims can be made whole."

The Business Software Alliance (BSA), a trade group, and the Cyber Security Industry Alliance (CSIA) both praised the Senate for passing the legislation. The BSA urged the House of Representatives to act on a similar bill.

The Senate bill closes "loopholes" in U.S. law, CSIA President Tim Bennett said in a statement.

The Senate bill will "provide law enforcement greater tools to crack down on the increasingly sophisticated network of cybercriminals," Bennett added. "Identity theft and data breaches have become organized crime's number one business."


Reprinted with permission from


Story copyright 2006 International Data Group. All rights reserved.


Print this Story Send Us Feedback E-mail this Story Digg! Digg this Story Slashdot this Story
"Jim blog-rants about how he should not have to dumb-down a presentation for executives. I agree, but I also say..." Read more...
"What was up with the vulnerabilities popping up in Apple OS X and Apple OS X Server last week?..." Read more...
Read more Security posts or See all Blogs
Online holiday shopping kicks in for real on Friday
Hackers poised for Black Friday assault
Are XP, Vista vulnerable to random number generator attack?
More top stories...
Microsoft wading through 3,522 comments on Open XML standards bid
Hackers jack Monster.com, infect job hunters
Kindle to ignite trend for more consumer wireless devices
Consumer devices and services pose threats to security and infrastructure stability. Which are the worst, and what can you do about it?
We asked usability experts to compare the iPhone with two competitors to see if Apple's device matches its hype. They came up with an unequivocal answer.
Can Apple make even a spreadsheet cool? Our reviewer examines the new office productivity suite for the Mac.
With IT's unfettered access to both professional and personal data, should "follow your conscience" be part of the job description?
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
All Zones
Desktop Virtualization Learning Zone
Diversified Performance Zone
IT Simplification Zone
ITIL Best Practices Zone
Performance Management Zone
The SAS Zone
Software Zone
Strategies for Achieving a More Efficient Data Center Zone
The Vulnerability Management & Policy Compliance Zone

Ads by TechWords

See your link here
Strategies for Protecting Against Internet Threats
Download this Technology Briefing, free, compliments of St. Bernard Software, for a limited time.
(Source: Computerworld)

It is through the Web that the most potentially harmful and malicious threats can enter a computer system. Yet, nearly half of all organizations in the U.S. continue to do nothing about Web Filtering or blocking.

Learn about the effective and affordable strategies that your organization can use to protect itself from internet threats in the new report from Computerworld. For a limited time this report is being made available at no cost to our customers, compliments of St. Bernard Software.

Download this executive briefing download
Endpoint Security Deep Dive
Endpoint Security Deep Dive
Get this webcast now!
Go to the webcast 
Symantec Endpoint Protection - A Unified, proactive approach to endpoint security
Get this white paper now!
(Source: Symantec) To combat the sophisticated, stealthy, and targeted attacks of today's threat landscape, organizations can no longer rely on traditional antivirus and antispyware solutions. It is necessary to implement additional layers of security to proactively protect against zero-day threats. Symantec Endpoint Protection combines essential best-in-breed technologies to deliver advanced threat prevention from known and unknown threats. Download this white paper to learn more.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Symantec Network Access Control
Endpoint Security - More secure. Less complex. Less costs...More control.
Priceline.com Customer Case Study
View more whitepapers 
Symantec Endpoint Security

Join Symantec's Kevin Murray for a look at the latest advances in endpoint security from Symantec. IT professionals with an interest in endpoint security and compliance will learn about a new product from Symantec that provides layered security, including: antivirus, firewall, intrusion prevention, device control & behavior blocking.

Learn how this breakthrough product, which combines best of breed technologies from Symantec, Sygate and Whole Security in a single agent, managed by a single management console, will help secure the endpoints on your network and ensure compliance with security policies.

Download this webcast 
Symantec Endpoint Protection - A Unified, proactive approach to endpoint security

To combat the sophisticated, stealthy, and targeted attacks of today's threat landscape, organizations can no longer rely on traditional antivirus and antispyware solutions. It is necessary to implement additional layers of security to proactively protect against zero-day threats. Symantec Endpoint Protection combines essential best-in-breed technologies to deliver advanced threat prevention from known and unknown threats. Download this white paper to learn more.

Download this white paper 
Symantec Network Access Control

The new wave of sophisticated crimeware not only targets specific companies, but it also targets desktops and laptops as backdoor entryways into those business' operations and resources. Network Access Control from Symantec enables proper configuration and security of user endpoints before they are allowed access on the corporate network. To find out more about this level of endpoint compliance, download this white paper.

Download this white paper