2 minute read

Louis J. Freeh

Consider The Following . . .

  • Historically law enforcement agencies stayed within their jurisdictions for investigative work and arrests. For example, state police did not move across state boundaries. Why does Freeh say crime can no longer be solved "unilaterally" by a single agency? Why are traditional jurisdiction boundaries, in some cases, obsolete?
  • Why was Freeh so determined to involve private industry in combating cyber crime? Think in terms of an industry as the victim and their computer specialists having expert knowledge of their computer systems.
  • What single event in U.S. history put national security and cyber terrorist crime on the "front burner?"
  • Research and list at least five types of cyber crime.

Mideast: Region between Europe and Asia including northeastern Africa.

Arafat, Hussein, Mubarak: Arafat, leader of Palestinian Authority; Hussein, king of Jordan; Mubarak, president of Egypt.

Counterparts: Government law enforcement directors of other countries.

Technology crimes: Disabling computer systems or using computers and the Internet for criminal activity.

Information age: Communications with high speed computers.

Infrastructure: Basic framework for systems, such as communications, bridges, railroads, roadways, airports.

Transparency of borders: Lack of geographical lines in cyberspace.

Intrusions: Terrorist threats or acts.

Encryption: Coded message systems that allow secret information to be sent.

Proliferation: Rapid increase.

Robust encryption proliferates without any recovery systems: Vigorous encryption continues without a way to retrieve the coded data.

Apalachin meeting: A historic gathering of numerous organized crime leaders.

La Cosa Nostra: The Mafia, an Italian and Sicilian crime organization.

Imperative: Essential.

Initiatives: Actions.

Unilaterally: Alone.

Private sector: Privately owned businesses and industry.

Exploited: Used by criminals for criminal activities.

Phone phreaker: A person who disrupts and causes confusion in a telephone system.

Extrapolate: Project to a larger situation.

Pornography: Videos, books, and photographs focusing on nudity and sexual activities.

Deciphered: Figured out.

Grave implications: Capable of doing great harm.

Catastrophic: Disastrous.

Sobering: Makes one think more serious consequences would be likely.

Prospective issues: Potential criminal activity.

Vulnerabilities: Weaknesses.

Protocols of plans and systems: Defense strategies.

Pursuant to: In direct response to.

Threat assessments:

Determine weak areas that could be hit.

Programmatic squads:

Groups of agents that deal with certain types of criminal activity.

SACs: Security assessment centers.

Authorities: Legal responsibility.

Academics: Scholars, such as university professors, who were experts in trademark, copyright, and patent issues.

Trade secrets: Business secrets.

Intellectual property: A creation of someone's mind, such as a poem, song, story, or play.

Impetus: Incentive.

Exempted or court-authorized recovery mechanism: Legal authority to retrieve information stored in computers like legal authority to wiretap telephone lines.

Stringent requirements:

Strict guidelines for information gathering to avoid invasion of privacy of individuals or groups.

Liaison functions: Cooperating and coordinating.

Host: The country where Legat is located.

Behind the eight ball: Needing to act and react defensively.

Anomaly: Unusual.

Intervened: Took action on.

Additional topics

Law Library - American Law and Legal InformationCrime and Criminal LawLouis J. Freeh - Things To Remember While Reading Excerpts From "speech By Louis J. Freeh, Director Of The Fbi":