Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Combating Electronic Crime

By Bill Zalud
November 27, 2001
If there is one issue in which it is essential that business security and public law enforcement work closely together, it is what's now called cybercrime.

"Already every crime imaginable is being perpetrated on a computer or some other high- tech media, or the evidence of those crimes is being stored on a computer or computer media," Milton Nix, Jr., tells the Zalud Report. Nix, the director, Georgia Bureau of Investigations, Association of State Investigating Agencies, adds that investigators in the public sector and corporate security managers need "a tool to gain focus on the cybercrime problem and make decisions about an issue that affects us all."

Recently, the National Cybercrime Training Partnership or NCTP conducted focus group meetings that, among other outcomes, raised 10 key issues as a needs list for combating cybercrime.

Issue 1: Public Awareness. To educate the general public, elected officials and the businesses about the impact of electronic crime.

Issue 2: Data and Reporting. To understand the extent and impact of electronic crime.

Issue 3: Uniform Training and Certification Courses. To provide specific levels of training and certification.

Issue 4: On-site Management Assistance for Electronic Crime Units and Task Forces. To give help in developing properly equipped computer investigation units.

Issue 5: Updated Laws. Applied to the Federal and state levels.

Issue 6: Cooperation with the High-tech Industry. To control electronic crime and to protect the nation's critical infrastructure.

Issue 7: Special Research and Publications. To give investigators a comprehensive directory of training and expert resources to help them combat electronic crime.

Issue 8: Management Awareness and Support. To help senior managers understand the impact of electronic crime and to support the expertise and tools needed to investigate and prosecute electronic crime cases.

Issue 9: Investigative and Forensic Tools. To provide police with up-to-date technology and the tools necessary to conduct electronic crime investigations.

Issue 10: Structuring a Computer Crime Unit. To establish best practices on how to create a police unit that can investigate and analyze electronic evidence. Check out more details on the Web at www.nw3c.org.

Identity Theft and Technology Solutions

For businesses, law enforcement, legislators and the public, identity theft is emerging as an extraordinary concern.

At the same time, numerous companies are addressing the problem with procedures, policies and technologies.

Just days ago, for example, Bank of America announced it is helping its customers avoid fraudulent use of their accounts by providing free photo security check cards and free upgrades to photo security credit cards. (See an example of the card elsewhere on this page.) The cards operate in the same way as a typical check card in that purchase amounts are automatically deducted from the customer's Bank of America account, and it doubles as a customer's ATM card. The difference - and the impact - is in the photo.

"Cards with the customer's photo and signature on the front greatly lessen the chances that the card can be misused by anyone else," John Rindlaub, president, Bank of America Northwest Region, tells the Zalud Report. The photo cards will first roll out in Washington and Idaho.

Bank of America is one of only two banks in the U.S. to offer a photo security check card. Citibank, a number of years ago, first rolled out a photo ID credit card aimed at increased security but it met with less than enthusiastic reception.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • What Banks Can Teach Us about Combating Online Fraud

    See More
  • financial-freepik

    Secret Service agents and task force partners awarded for work combating financial crimes

    See More
  • DoJ Releases $500 Million for Hiring Law Enforcement Officers, School Safety and Combating Illicit Drugs

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing