The set of laws that has allowed federal prosecutors to bring down traditional organized crime gangs should be applied to international cyber crime rings, a top Department of Justice official told a congressional committee on Nov. 15.
The recommendation was one of several DoJ Deputy Section Chief Richard Downing said should be made to the Computer Fraud and Abuse Act (CFAA) during a House Judiciary Subcommittee on Crime, Terrorism and Homeland Security hearing on cyber security’s new frontiers. The committee is considering updating the law.
Downing said the CFAA should be modified to allow offenses to be subject to Racketeering Influenced and Corrupt Organizations Act (RICO) statutes. RICO extends penalties for crimes performed by organizations and allows the leaders of organized crime groups to be tried for the crimes they order subordinates to do.
The move, said Downing, is needed because advancing computer technology has become a substantial tool for organized crime. Downing said “criminal organizations are operating today around the world to: hack into public and private computer systems, including systems key to national security and defense; hijack computers for the purpose of stealing identity and financial information; extort lawful businesses with threats to disrupt computers; and commit a range of other cyber crimes.” The organizations, he added, are closely tied to traditional Asian and Eastern European crime organizations.
Downing said RICO has been used successfully over the years to bring down “mob bosses to Hells Angels to insider traders” and would be effective in the fight against organized cyber criminals.
Downing also recommended the CFAA’s complex sentencing provisions be streamlined and simplified and some maximum sentences be increased to reflect the severity of some cyber crimes.
Prosecutors should also be given more latitude in pursuing the theft of passwords, user names and login credentials. Downing proposed that CFAA not only cover password theft, but other authentication methods, including those that confirm a user’s identity, using biometric data, single-use passcodes or smart cards. It should also cover login credentials used to access to any “protected” computer (defined in the statute quite broadly), not just government systems or computers at financial institutions, he said.
Thanks to Mark Rockwell
Get the latest breaking current news and explore our Historic Archive of articles focusing on The Mafia, Organized Crime, The Mob and Mobsters, Gangs and Gangsters, Political Corruption, True Crime, and the Legal System at TheChicagoSyndicate.com
Subscribe to:
Post Comments (Atom)
Best of the Month!
- Mob Hit on Rudy Giuilani Discussed
- Mafia Wars Move to the iPhone World
- The Chicago Syndicate AKA "The Outfit"
- Aaron Hernandez: American Sports Story - The Truth About Aaron: My Journey to Understand My Brother
- Village of Stone Park Place Convicted Mob Felon on Pension Board, Trustees Hide and Sneak Out Back Door, When Asked About It
- Prison Inmate, Charles Miceli, Says He Has Information on Mob Crimes
- Hank Muntzer Sentenced to Prison on Felony and Misdemeanor Charges for Actions During Insurrection and Attack of the US Capital on January 6, 2021
- Growing Up the Son of Tony Spilotro
- Mafia Princess Challenges Coco Giancana to Take a DNA Test to Prove She's Granddaughter of Sam Giancana
- Son of Mob Hit Man Takes Witness Stand
No comments:
Post a Comment