Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Combating Electronic Crime

By Bill Zalud
November 27, 2001
If there is one issue in which it is essential that business security and public law enforcement work closely together, it is what's now called cybercrime.

"Already every crime imaginable is being perpetrated on a computer or some other high- tech media, or the evidence of those crimes is being stored on a computer or computer media," Milton Nix, Jr., tells the Zalud Report. Nix, the director, Georgia Bureau of Investigations, Association of State Investigating Agencies, adds that investigators in the public sector and corporate security managers need "a tool to gain focus on the cybercrime problem and make decisions about an issue that affects us all."

Recently, the National Cybercrime Training Partnership or NCTP conducted focus group meetings that, among other outcomes, raised 10 key issues as a needs list for combating cybercrime.

Issue 1: Public Awareness. To educate the general public, elected officials and the businesses about the impact of electronic crime.

Issue 2: Data and Reporting. To understand the extent and impact of electronic crime.

Issue 3: Uniform Training and Certification Courses. To provide specific levels of training and certification.

Issue 4: On-site Management Assistance for Electronic Crime Units and Task Forces. To give help in developing properly equipped computer investigation units.

Issue 5: Updated Laws. Applied to the Federal and state levels.

Issue 6: Cooperation with the High-tech Industry. To control electronic crime and to protect the nation's critical infrastructure.

Issue 7: Special Research and Publications. To give investigators a comprehensive directory of training and expert resources to help them combat electronic crime.

Issue 8: Management Awareness and Support. To help senior managers understand the impact of electronic crime and to support the expertise and tools needed to investigate and prosecute electronic crime cases.

Issue 9: Investigative and Forensic Tools. To provide police with up-to-date technology and the tools necessary to conduct electronic crime investigations.

Issue 10: Structuring a Computer Crime Unit. To establish best practices on how to create a police unit that can investigate and analyze electronic evidence. Check out more details on the Web at www.nw3c.org.

Identity Theft and Technology Solutions

For businesses, law enforcement, legislators and the public, identity theft is emerging as an extraordinary concern.

At the same time, numerous companies are addressing the problem with procedures, policies and technologies.

Just days ago, for example, Bank of America announced it is helping its customers avoid fraudulent use of their accounts by providing free photo security check cards and free upgrades to photo security credit cards. (See an example of the card elsewhere on this page.) The cards operate in the same way as a typical check card in that purchase amounts are automatically deducted from the customer's Bank of America account, and it doubles as a customer's ATM card. The difference - and the impact - is in the photo.

"Cards with the customer's photo and signature on the front greatly lessen the chances that the card can be misused by anyone else," John Rindlaub, president, Bank of America Northwest Region, tells the Zalud Report. The photo cards will first roll out in Washington and Idaho.

Bank of America is one of only two banks in the U.S. to offer a photo security check card. Citibank, a number of years ago, first rolled out a photo ID credit card aimed at increased security but it met with less than enthusiastic reception.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • What Banks Can Teach Us about Combating Online Fraud

    See More
  • financial-freepik

    Secret Service agents and task force partners awarded for work combating financial crimes

    See More
  • DoJ Releases $500 Million for Hiring Law Enforcement Officers, School Safety and Combating Illicit Drugs

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing