Obama takes on the mob

The White House's strategy to combat international organized crime counts cyber crime as a major aspect of the threat.

In particular, the plan lists cyber crime and intellectual property theft among several major areas of crime to be dealt with. Intellectual property theft, the plan reads, can come "through intrusions into corporate and proprietary computer networks" and can include theft of "movies, music and video games [and] ... proprietary designs of high-tech devices and manufacturing processes."

"As we have learned in the most difficult of ways, the threats that we face are real – and they are constantly evolving," Attorney General Eric Holder wrote in announcing the plan. "But today, with the release of this Transnational Organized Crime Strategy, we usher in a new era of national vigilance, global engagement, and close collaboration among – and beyond – our respective agencies and departments."

The plan also addressed other cyber threats. Online frauds run by Central European cyber crime networks have defrauded U.S. citizens or entities of $1 billion in a year, according to the plan. It also cites the Secret Service as saying that "financial crimes facilitated by anonymous online criminal for a result in billions of dollars in losses to the nation’s financial infrastructure."

The plan also calls for increased intelligence sharing across borders.

Aliya Sternstein reports in NextGov that despite the prominence of cyber crime in the strategy, it was mentioned very little in the White House event to announce the plan. "During a 40-minute White House event to announce the strategy, officials did not mention the words 'Internet,' 'computer' or 'cyber,' " Sternstein writes.

About the Author

Technology journalist Michael Hardy is a former FCW editor.

Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.