MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
CIO
June 1, 2001
Tracy Mayor
Break Glass, Pull Handle, Call FBI If you're the victim of a security breach or a virus attack, get the feds on your side... mark for My Articles similar articles
BusinessWeek
May 30, 2005
Meet Cyberspace's Head Fed Nailing the Internet's most wanted takes a combination of tech wizardry and good, old-fashioned police work. mark for My Articles similar articles
InternetNews
March 18, 2010
Larry Barrett
FBI Says Cybercrime Skyrocketing A new report from the FBI says the rate of cybercrime incidents is growing rapidly at a cost of hundreds of millions of dollars a year. mark for My Articles similar articles
PC World
March 2002
Kim Zetter
Snoopware: New Technologies, Laws Threaten Privacy The FBI's 'Magic Lantern' keystroke logger could help catch terrorists, but at what cost to your fundamental rights? mark for My Articles similar articles
InternetNews
July 7, 2009
Alex Goldman
FBI, DOJ Agents: We're Gaining on Cyber Crime While the Internet helps criminals organize and to reach across borders, it can also help law enforcement catch them. mark for My Articles similar articles
InternetNews
April 10, 2009
Alex Goldman
FBI Throws Data-Sharing Tech at Serial Killings The Internet allows law enforcement agencies to collaborate in tracking highly mobile criminals who have escaped detection for years - sometimes for decades. mark for My Articles similar articles
CIO
May 15, 2003
Todd Datz
State to Share Data with FBI Information sharing is key to beefing up homeland security. As part of that initiative, the State Department will soon share its database of 50 million visa applications with the FBI. mark for My Articles similar articles
InternetNews
August 26, 2005
Tim Gray
Authorities Nab Zotob Writers Joint cooperation nails virus writers overseas. mark for My Articles similar articles
Salon.com
June 18, 2002
Jeffrey Benner
Every dial you take The FBI is asking for more information about what you do on the phone, and no one is saying no. mark for My Articles similar articles
RootPrompt.org
July 17, 2000
Calling the Cops I have had a lot of questions concerning the police and the cracker that I have written about in the Cracked! articles. With these questions in mind I have written this article that explains several incidents involving the police and system administrators and attempts to answer some of these questions.... mark for My Articles similar articles
InternetNews
March 23, 2010
FBI Underboss Outlines Anatomy of a Cyber Gang As cyber criminals grow ever more sophisticated and organized, law enforcement agencies have had to step up their game to keep pace. One of the top men at the FBI shares what the bureau is doing to combat cyber crime. mark for My Articles similar articles
Salon.com
May 12, 2001
Alicia Montgomery & Fiona Morgan
Botched! "If the government can't get it right in this case, how can we rely on it to get it right in any case?" Experts react to the FBI blunder... mark for My Articles similar articles
Salon.com
September 25, 2000
Sean Dugan
Defanging Carnivore A security specialist explains why his open-source version of the FBI's snooping technology is a victory for privacy fans. mark for My Articles similar articles
CIO
October 1, 2001
Susannah Patton
Les Seagraves - Interview Earthlink's chief privacy officer had to deal with the FBI and its infamous Carnivore surveillance tool. See how he balances customer privacy concerns and governmental compliance... mark for My Articles similar articles
InternetNews
August 2, 2006
Sean Michael Kerner
The FBI Fight Against Organized Cyber Crime The bureau is making it's fight against organized cyber crime personal. mark for My Articles similar articles
InternetNews
November 11, 2005
Roy Mark
FBI Hunkered in The Bunker Cyber G-men are responsible for investigating cyber attacks by foreign adversaries and terrorists, and for preventing online criminals from using the Internet to steal, defraud and otherwise victimize U.S. citizens, businesses and communities. mark for My Articles similar articles
Popular Mechanics
June 30, 2008
Erik Sofge
FBI's Next-Gen ID Databank to Store Face Scans--A Good Idea? Lockheed Martin is building a massive digital warehouse of criminal information, set to bring facial recognition and eye scans to local law enforcement. Privacy advocates say there's reason for law-abiding citizens to worry. mark for My Articles similar articles
IEEE Spectrum
April 2006
Prachi Patel-Predd
Cybercrime At A Glance But just how much damage can cybercrime cause? About $67 billion to U.S. companies last year, according to an estimate based on the Federal Bureau of Investigation's 2005 Computer Crime Survey. Here's more statistics. mark for My Articles similar articles
Fast Company
March 15, 2007
J.J. Brazil
Mission: Impossible? The FBI is battling to transform itself in an age of technology and terrorism. It may be the toughest, most important change effort of our time. mark for My Articles similar articles
PC World
September 12, 2001
Tom Spring & Frank Thorsberg
Will Attack Hurt Net Privacy? Privacy advocates urge government to balance security needs and civil liberties... mark for My Articles similar articles
Salon.com
August 23, 2000
Wendy M. Grossman
Are British bobbies reading your e-mail? While Americans gnash their teeth about the FBI's Carnivore spying technology, U.K. legislators pass a law that could let cops read your messages. mark for My Articles similar articles
Bank Technology News
September 2010
Tom Leuchtner
Patrolling the Neighborhood Cyber criminals are employing increasingly sophisticated methods to perpetrate financial crimes. mark for My Articles similar articles
PC World
June 11, 2002
Anne Ju
Consumers Face Wiretapping Fees FBI demand for new surveillance functions forces telecos to upgrade equipment, forego new customer services. mark for My Articles similar articles
InternetNews
January 21, 2005
Roy Mark
FBI Abandons Carnivore New FOIA documents show that feds haven't used once controversial e-mail snooping system in two years. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
Salon.com
February 4, 2002
Barak Jolish
The encrypted jihad We can't stop terrorists from using uncrackable codes. So we shouldn't even try... mark for My Articles similar articles
IEEE Spectrum
September 2005
Harry Goldstein
Who Killed the Virtual Case File? How the FBI blew more than $100 million on case-management software it will never use. mark for My Articles similar articles
CIO
June 15, 2002
Doom for the NIPC? In late March, rumors surfaced that FBI Director Robert Mueller was on the verge of dismantling the National Infrastructure Protection Center (NIPC), which has been the government's primary critical infrastructure threat assessment and response unit since its founding in 1998. mark for My Articles similar articles
CIO
June 15, 2002
Michael Goldberg
Hero Wanted, Cheap The FBI is seeking a successor for Bob Dies, a career IBM executive who took the bureau's top IT job in July 2000. The description posted on www.fbijobs.com makes it sound like Superman's cape would be a good thing to bring to the interview. mark for My Articles similar articles
Information Today
April 16, 2007
Paula J. Hane
New Database Pools Info to Fight Retail Crime Retailers and U.S. law-enforcement agencies have joined forces in an effort to combat the growing problem of organized retail theft. mark for My Articles similar articles
CIO
April 15, 2003
Ben Worthen
What to Do When Uncle Sam Wants Your Data As the czars of data, CIOs better be prepared when the FBI knocks on their doors. mark for My Articles similar articles
CIO
October 15, 2002
Sarah D. Scalet
Fear Factor A reality check on CIOs' top five concerns about reporting security incidents. mark for My Articles similar articles
Job Journal
November 30, 2003
Julia Hollister
Homeland Security From patrolling our vast shorelines to keeping vigil on high-profile landmarks and facilities, homeland security has become a growth industry offering an array of employment opportunities. mark for My Articles similar articles
Fast Company
Steven Melendez
FBI Renews Warnings on Terror and Encryption, With No Clear Solution in Sight FBI Director James Comey reiterated warnings that popular encrypted communication apps are making it difficult for law enforcement officials to monitor suspected criminals and terrorists. mark for My Articles similar articles
Wired
April 24, 2007
Vince Beiser
One Database Under the Law Within the next few years the Justice Department will build an unprecedented network of databases from the FBI, the DEA, the ATF, the Bureau of Prisons, and the US Marshals Service. mark for My Articles similar articles
Salon.com
September 27, 2000
Jake Tapper
Bush aide: FBI is playing politics with spy probe Karen Hughes accuses the Clinton administration of leaking false information about a Bush staffer. mark for My Articles similar articles
InternetNews
May 10, 2005
Tim Gray
Teen Held For Allegedly Swiping Code Reports say stolen Cisco source code was used to infiltrate military computers. mark for My Articles similar articles
Reason
February 2008
Radley Balko
House of Death Feds shield snitches. mark for My Articles similar articles
InternetNews
October 31, 2005
Jim Wagner
Fraud Meets Its Match on Internet The FBI and online job seeker giant Monster Worldwide lead an anti-Internet fraud initiative. mark for My Articles similar articles
CIO
February 15, 2003
Sarah D. Scalet
The Unlikeliest G-Man Can Darwin John, a mild-mannered, compulsively conceptual CIO, survive in the FBI's macho culture long enough to transform the bureau from a technological Keystone cop shop to an IT-powered collection of supersleuths? Don't bet against him. mark for My Articles similar articles
Bank Technology News
April 2001
Maria Bruno
Hackers Steal 1 Million Card Numbers Teams of Russian and Ukrainian hackers stole more than 1 million credit card numbers from 40 American e-businesses in recent months, according to the Federal Bureau of Investigation... mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
AskMen.com Crime Down In 2008: FBI Violent crime, property crime, murder and manslaughter all dropped in 2008. But there were some increases, too. mark for My Articles similar articles
Chemistry World
December 11, 2014
Freedom Industries' president arrested for fraud Gary Southern's arrest followed a criminal complaint from the FBI, which accuses him of making numerous false statements about his role at Freedom and his knowledge of conditions at the facility where the leak occurred. mark for My Articles similar articles
InternetNews
October 8, 2009
FBI Holds Its Own Phish Phry Fed crackdown nets the largest number of defendants ever charged in a cyber crime scam. mark for My Articles similar articles
InternetNews
November 3, 2006
Ed Sutherland
FBI: Twilight For Bank Phishermen U.S. and Poland hackers had targeted a major financial institution. mark for My Articles similar articles
Reason
April 2008
Brian Doherty
Mint Condition In November the FBI raided the Indiana offices of the company that sells the privately minted metal coins known as Liberty Dollars. mark for My Articles similar articles
InternetNews
January 14, 2005
Susan Kuchinskas
FBI's Virtual Case File Flops The FBI is ready to scrap Virtual Case File (VCF), an automated case management system, to replace an antiquated method of gathering information that relied heavily on paper. mark for My Articles similar articles
Salon.com
June 29, 2000
Jake Tapper
Gore's houseguest from hell Democrats allege that the investigator who interviewed Gore at home is playing partisan. mark for My Articles similar articles
Reason
June 2006
Jeff A. Taylor
How the FBI Let 9/11 Happen The smoldering gun was right there all the time. It was bureaucratic hierarchies and power trips that let the Federal Bureau of Investigation ignore the carefully gathered evidence of an attack. mark for My Articles similar articles