亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? dept of treasury letter.txt

?? 黑客培訓(xùn)教程
?? TXT
字號(hào):
Here is a letter from the Director of the Secret Service to US Rep. Don Edwards, D-California, in response to questions raised by Edwards' Subcommittee. This copy comes from Computer Professionalsfor Social Responsibility in Washington, DC.                                                                    DEPARTMENT OF TREASURY                                         UNITED STATES SECRET SERVICE                                          WASHINGTON, DC 20223                                         APR 30 1990   The Honorable Don Edwards Chairman Subcommittee on Civil and Constitutional Rights Committee on the Judiciary House of Representatives Washington,  D.C.  20515  Dear Mr. Chairman:  Thank you for your letter of April 3, 1990, concerning your  committee's interest in computer fraud.  We welcome the  opportunity to discuss this issue with your committee and I  hope the following responses adequately answer your  questions.  Question 1:  Please describe the  Secret Service's process for investigating  computer related crimes under Title 18, United States Code,  Section 1030 and any other related statutes.  Response:  The process by which the  Secret Service investigates  computer related crimes is similar to the methods we use to  investigate other types of criminal investigations.  Most of the  investigative techniques are the  same; surveillances, record  checks, witness and suspect interviews, etc.  the primary  difference is we had to develop resources to assist in the  collection and review of computer evidence.  To provide  our agents with this expertise, the secret service  developed a computer fraud investigation course which, as of  this date, has trained approximately 150 agents in the proper   methods for conducting a computer fraud investigation.   Additionally, we established a computer  Diagnostics center,  staffed  with computer professional, to review evidence on  computer  systems.  Referrals of computer related criminal investigations occur in  much the same manner as any other case.  A victim sustains a  loss and reports the crime, or, a computer related crime is  discovered during the course of another investigation.  In the investigations  we do select, it is not our intention to  attempt to supplant local or state law enforcement.  We  provide enforcement in those cases that are interstate or  international in nature and for one reason or another are  beyond the capability of state and local law enforcement  agencies.  When computer related crimes are referred by the various  affected industries to the local field offices, the Special  Agent in  Charge (SAIC) determines which cases will be  investigated based on a variety of criteria.  Each SAIC must  consider the economic impact of each case, the prosecutive  guidelines of the United States Attorney, and the investigative  resources available in the office to investigate the case .  In response to the other portion of your question, the other  primary statute we use to investigate computer related crimes  is Title 18, United States  Code,  Section 1029 ( Access Device  Fraud).  This service  has primary jurisdiction in those cases  which are initiated outside a bank and do not involve   organized crime, terrorism, or foreign counterintelligence  (traditional responsibilities of the FBI).  The term "access device" encompasses credit cards, debit  cards, automatic teller machines (ATM) cards, personal  identification numbers (PIN's) used to activate ATM machines,  credit or debit card account numbers, long distance telephone  access codes, computer passwords and logon sequences, and  among other things the computer chips in cellular car phones  which assign billing.  Additionally, this Service has primary jurisdiction in cases  involving electronic fund transfers by consumer (individuals)  under Title 15, U. S. code, section 169n (Electronic Fund  Transfer Act).  This could involve any scheme designed to  defraud EFT systems used by the public, such as pay by phone  systems, home banking, direct deposit, automatic payments,  and violations concerning automatic teller machines.  If the  violations can be construed to be a violation of the  banking  laws by bank employee, the FBI would have primary  jurisdiction.    There are many other statutes which have been used to  prosecute computer criminals but it is within the purview of  the U.S. Attorney to determine which statute will be used to  prosecute an individual.  Question 2:  Has the Secret  Service ever monitored any computer bulletin  boards or networks?  Please describe  the procedures for  initiating such monitoring, and list those computer bulletin  boards or networks monitored by the Secret  Service since  January 1988.  Response:  Yes, we have occasionally monitored computer bulletin boards.   The monitoring occurred after we received complaints  concerning criminal activity on a particular computer bulletin  board.  The computer bulletin boards were monitored as part of  an official investigation and in accordance with the directives  of the Electronic Communications  Privacy  Act of 1986 (Title  18 USC 2510)  The procedures used to monitor computer bulletin boards  during an official investigation have involved either the use of  an informant (under the direct supervision of the investigating  agent)  or an agent operating in an undercover capacity.  In  either case, the informant or agent had received authorization  from the computer bulletin board's owner/operator to access  the system.  We do not keep records of the bulletin boards which we have  monitored but can provide information concerning a particular  board if we are given the name of the board.  Question 3:  Has the Secret Service or someone acting its direction ever  opened an account on a computer bulletin board or network?   Please describe the procedures for opening such an account and  list those bulletin boards or networks on which such accounts  have been opened since January 1988.  Response:  Yes, the U.S.  Secret Service has on many occasions, during the  course of a criminal investigation, opened accounts on  computer bulletin boards or networks.  The procedure for opening an account involves asking the  system administrator/operator for permission to access to the  system.  Generally, the system administrator/operator will  grant everyone immediate access to the computer bulletin  board but only for lower level of the system.  The common  "pirate" computer bulletin boards associated with most of  computer crimes have many different level in their systems.   The first level is generally available to the public and does not  contain any information relation to criminal activity.  Only  after a person has demonstrated unique computer skills, been  referred by a known "hacker," or provided stolen long-distance  telephone access codes or stolen credit card account  information,  will the system administrator/operator permit a  person to access the higher levels of the bulletin board system  which contains the information on the criminal activity.  As previously reported in our answer for Question 2, we do not  keep records of the computer bulletin boards on which we have  established accounts.  Question 4:  Has the Secret Service os0someone acting under its direction  ever created a computer bulletin board or network that was  offered to the public?  Please describe any such bulletin board  or networks.  Response:  No, the U. S. Secret Service has not created a computer bulletin  board nor a network which was offered to members of the  public.   We have created an undercover bulletin board which  was offered to a select number of individuals who had  demonstrated an interest in conducting criminal activities.   This was done with the guidance of the U.S. Attorney's  office  and was consistent with the Electronic Communications  Privacy Act.  Question 5:  Has the Secret Service ever collected, reviewed or  "downloaded" transmissions or information from any computer  network or bulletin board?  What procedures does the Secret  Service have for obtaining information from computer bulletin  boards or networks?  Please list the occasions where  information has been obtained since January 1988, including  the identity of the bulletin boards or networks,  the type of  information obtained,   and how that information was obtained  (was it downloaded, for example).  Response:  Yes, during the course of several investigations, the U. S.   Secret Service has "down loaded" information from computer  bulletin boards.  A review of information gained in this manner  (in an undercover capacity after being granted access to the  system by it's system administrator)  is performed in order to  determine whether or not that bulletin board is being used to  traffic in unauthorized access codes or to gather other  information of a criminal intelligence nature.  At all times,  our methods are in keeping with the procedures as outlined in  the Electronic Communications Privacy Act (ECPA).  If a commercial network was suspected of containing  information concerning a criminal activity, we would obtain  the proper court order to obtain this information in keeping  with the ECPA.  The U. S. Secret Service does not maintain a record  of the  bulletin boards we have accessed.  Question 6:  Does the Secret Service employ, or is it considering employing,  any system or program that could automatically review the  contents of a computer file, scan the file for key items,  phrases or data elements, and flag them or recommend further  investigative action?  If so, what is the status of any such  system.  Please describe this system and research being  conducted to develop it.  Response:  The Secret  Service has pioneered the concept of a Computer   Diagnostic Center (CDC)  to facilitate the review and  evaluation of electronically stored information.  To streamline  the tedious task of reviewing thousands of files per  investigation, we have gathered both hardware and software  tools to assist our search of files for specific information or  characteristics.  Almost all of these products are  commercially  developed products and are available to the  public.  It is conceivable that an artificial intelligence process  may someday be developed and have application to this law  enforcement function but we are unaware if such a system is  being developed.  The process of evaluating the information and making  recommendations for further investigative action is currently  a manual one at our CDC.  We process thousands of computer  disks annually as well as review evidence contained in other  types of storage devices (tapes, hard drives, etc.).   We are  constantly seeking  ways to enhance our investigative mission.   The development of high tech resources like the CDC saved  investigative manhours and assist in the detection  of criminal  activity.  Again, thank you for your interest.  Should you have any further  questions, we will be happy to address them.                                                   Sincerely,                                                  /s/                                                 John R.  Simpson, Director  cc: Honorable Charles E.  Schumer  

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91麻豆精品国产综合久久久久久| 国产成人亚洲综合a∨婷婷| 中文字幕乱码一区二区免费| 欧美群妇大交群的观看方式| 欧美色中文字幕| 欧美视频在线一区| 欧美日韩一级二级三级| 欧美三级电影在线观看| 欧美一区二区人人喊爽| 日韩视频免费直播| 久久久激情视频| 成人欧美一区二区三区1314| ...av二区三区久久精品| 一区二区成人在线视频| 亚洲成av人影院| 久久 天天综合| 国产成人亚洲综合a∨婷婷| 99精品久久只有精品| 日本黄色一区二区| 日韩欧美国产午夜精品| 国产偷国产偷精品高清尤物| 亚洲欧洲国产专区| 日日夜夜精品视频天天综合网| 麻豆国产91在线播放| 国产成人午夜片在线观看高清观看| 国产xxx精品视频大全| 色综合天天狠狠| 日韩西西人体444www| 国产精品你懂的在线欣赏| 亚洲在线观看免费视频| 精品在线视频一区| 91亚洲国产成人精品一区二区三| 欧洲国内综合视频| 久久久久久久一区| 亚洲午夜精品17c| 国产精品一色哟哟哟| 在线观看国产日韩| 国产拍欧美日韩视频二区| 亚洲综合视频网| 国产麻豆精品视频| 欧美久久久影院| 国产精品女人毛片| 国产在线精品一区在线观看麻豆| 色偷偷久久人人79超碰人人澡| 884aa四虎影成人精品一区| 欧美激情自拍偷拍| 蜜臀av一区二区三区| 色婷婷av一区二区三区之一色屋| 精品日韩在线一区| 亚洲va国产va欧美va观看| 成人精品视频一区二区三区| 日韩美女一区二区三区四区| 一区二区三区**美女毛片| 东方aⅴ免费观看久久av| 91精品国产综合久久久久久 | 亚洲成人av在线电影| 国产高清在线精品| 日韩你懂的电影在线观看| 亚洲成年人网站在线观看| 97se亚洲国产综合在线| 久久久久久久电影| 国内精品视频一区二区三区八戒 | 免费高清在线一区| 欧美在线视频你懂得| 国产蜜臀97一区二区三区| 精品一区二区三区免费观看 | 国产精品久久精品日日| 国产一区二区三区四| 欧美一区二区三区电影| 丝袜a∨在线一区二区三区不卡| 欧美在线看片a免费观看| 亚洲另类在线制服丝袜| 97aⅴ精品视频一二三区| 国产精品免费视频观看| 丁香另类激情小说| 国产精品三级av| 99精品久久99久久久久| 综合精品久久久| 99国产精品国产精品久久| 中文字幕中文字幕在线一区| 成人免费视频视频在线观看免费| 国产拍欧美日韩视频二区| 成人久久视频在线观看| 亚洲欧美一区二区三区极速播放| 97久久超碰国产精品电影| 亚洲乱码日产精品bd| 欧美性高清videossexo| 亚州成人在线电影| 26uuu久久天堂性欧美| 国内精品久久久久影院薰衣草| 久久久影视传媒| 91免费版pro下载短视频| 香蕉久久夜色精品国产使用方法 | 激情成人午夜视频| 国产视频一区二区三区在线观看 | 3751色影院一区二区三区| 蜜桃一区二区三区在线观看| 中文字幕中文字幕中文字幕亚洲无线| 97se亚洲国产综合在线| 丝袜a∨在线一区二区三区不卡| av电影在线观看完整版一区二区| 高潮精品一区videoshd| 3751色影院一区二区三区| 狠狠网亚洲精品| 一区二区三区资源| 精品久久久久久无| 色综合天天综合| 蜜桃视频第一区免费观看| 中文字幕亚洲一区二区av在线| 色呦呦国产精品| 国产在线麻豆精品观看| 一区二区三区四区高清精品免费观看 | 99亚偷拍自图区亚洲| 偷偷要91色婷婷| 国产精品美女一区二区三区| 欧美专区日韩专区| 国产在线看一区| 日本中文字幕一区| 亚洲美女视频在线| 国产亚洲一区二区三区在线观看| 欧美图区在线视频| 99久免费精品视频在线观看 | 久久蜜桃av一区二区天堂| 色噜噜狠狠成人中文综合 | 亚洲精品久久7777| 久久免费精品国产久精品久久久久| 一本大道综合伊人精品热热| 国内精品久久久久影院一蜜桃| 亚洲一级不卡视频| 亚洲婷婷综合色高清在线| 久久免费的精品国产v∧| 日韩一区二区三区电影在线观看| 色婷婷综合久久| 不卡一区二区三区四区| 国内精品伊人久久久久av一坑| 亚洲大片一区二区三区| 亚洲小说春色综合另类电影| 国产精品护士白丝一区av| 久久精品视频免费| 欧美精品一区二区在线播放| 91精品婷婷国产综合久久 | 精品一区二区三区在线观看国产 | 国内精品不卡在线| 蜜臀av一区二区在线观看| 午夜久久久久久久久| 樱花草国产18久久久久| 亚洲日本va午夜在线影院| 自拍偷在线精品自拍偷无码专区| 久久久不卡影院| 国产夜色精品一区二区av| 精品国产一二三| 久久久久青草大香线综合精品| 久久综合久久综合久久| 精品国产凹凸成av人导航| 欧美tk丨vk视频| 精品国产乱码久久久久久久久| 精品少妇一区二区三区在线播放 | 欧美一区二区性放荡片| 91精品国模一区二区三区| 91精品国产综合久久久蜜臀粉嫩| 91精品国产综合久久小美女| 日韩欧美国产综合| 亚洲精品一区二区三区福利| 国产欧美日韩中文久久| 国产精品丝袜一区| 亚洲精品免费电影| 午夜伊人狠狠久久| 久久精品国产亚洲5555| 国产乱码精品1区2区3区| 高清视频一区二区| 91福利视频久久久久| 欧美日韩成人在线| 99久久综合精品| 欧美精品丝袜中出| 26uuu色噜噜精品一区| 亚洲天堂2014| 亚洲mv在线观看| 粉嫩高潮美女一区二区三区| 91原创在线视频| 91精品国产综合久久久久久久| 国产网站一区二区三区| 一区二区在线观看视频在线观看| 日日夜夜一区二区| jizz一区二区| 日韩欧美激情在线| 中文字幕在线不卡一区二区三区| 亚洲线精品一区二区三区八戒| 麻豆国产精品777777在线| 91在线视频播放| 91精品国产91久久久久久一区二区 | 欧美日韩一卡二卡| 最新中文字幕一区二区三区| 亚洲电影一区二区三区| 成人av中文字幕| xnxx国产精品| 人人爽香蕉精品| 69久久99精品久久久久婷婷| 久久久久久电影| 天天综合日日夜夜精品| 国产成人免费视频|