If there is one issue in which it is essential that business security and public law enforcement work closely together, it is what's now called cybercrime.

"Already every crime imaginable is being perpetrated on a computer or some other high- tech media, or the evidence of those crimes is being stored on a computer or computer media," Milton Nix, Jr., tells the Zalud Report. Nix, the director, Georgia Bureau of Investigations, Association of State Investigating Agencies, adds that investigators in the public sector and corporate security managers need "a tool to gain focus on the cybercrime problem and make decisions about an issue that affects us all."

Recently, the National Cybercrime Training Partnership or NCTP conducted focus group meetings that, among other outcomes, raised 10 key issues as a needs list for combating cybercrime.

Issue 1: Public Awareness. To educate the general public, elected officials and the businesses about the impact of electronic crime.

Issue 2: Data and Reporting. To understand the extent and impact of electronic crime.

Issue 3: Uniform Training and Certification Courses. To provide specific levels of training and certification.

Issue 4: On-site Management Assistance for Electronic Crime Units and Task Forces. To give help in developing properly equipped computer investigation units.

Issue 5: Updated Laws. Applied to the Federal and state levels.

Issue 6: Cooperation with the High-tech Industry. To control electronic crime and to protect the nation's critical infrastructure.

Issue 7: Special Research and Publications. To give investigators a comprehensive directory of training and expert resources to help them combat electronic crime.

Issue 8: Management Awareness and Support. To help senior managers understand the impact of electronic crime and to support the expertise and tools needed to investigate and prosecute electronic crime cases.

Issue 9: Investigative and Forensic Tools. To provide police with up-to-date technology and the tools necessary to conduct electronic crime investigations.

Issue 10: Structuring a Computer Crime Unit. To establish best practices on how to create a police unit that can investigate and analyze electronic evidence. Check out more details on the Web at www.nw3c.org.

Identity Theft and Technology Solutions

For businesses, law enforcement, legislators and the public, identity theft is emerging as an extraordinary concern.

At the same time, numerous companies are addressing the problem with procedures, policies and technologies.

Just days ago, for example, Bank of America announced it is helping its customers avoid fraudulent use of their accounts by providing free photo security check cards and free upgrades to photo security credit cards. (See an example of the card elsewhere on this page.) The cards operate in the same way as a typical check card in that purchase amounts are automatically deducted from the customer's Bank of America account, and it doubles as a customer's ATM card. The difference - and the impact - is in the photo.

"Cards with the customer's photo and signature on the front greatly lessen the chances that the card can be misused by anyone else," John Rindlaub, president, Bank of America Northwest Region, tells the Zalud Report. The photo cards will first roll out in Washington and Idaho.

Bank of America is one of only two banks in the U.S. to offer a photo security check card. Citibank, a number of years ago, first rolled out a photo ID credit card aimed at increased security but it met with less than enthusiastic reception.