WIPO administers some 21 treaties in the field of intellectual property. .
Last year the Computer Security Institute (CSI) announced, with the participation of the San Francisco office of the Federal Bureau of Investigation's (FBI) Computer Intrusion Squad, that ninety percent of respondents (primarily large corporations and government agencies) detected computer security breaches within the last twelve months. Among this survey, seventy percent reported a variety of serious computer security breaches other than the most common ones of computer viruses, laptop theft or with employees. Seventy-four percent acknowledged financial losses due to computer breaches. .
The FBI, in response to an expanding number of instances in which criminals have targeted major components of information and economic infrastructure systems, has established the National Infrastructure Protection Center (NIPC). The NIPC, a joint partnership among federal agencies and private industry, is designed to serve as the government's lead mechanism for preventing and responding to cyber attacks on the nation's infrastructures. The NIPC investigates intrusions to public switching networks, major computer networks, privacy violations, industrial espionage, pirated computer software and other crimes outlined by the Computer Abuse and Fraud Act.
Online criminal activity has been an increasing problem, allowing thieves to remain virtually anonymous while they try to steal secured, and sometimes not secured, secrets. Companies such as Online Security have made it big business to protect clients against any computer crime that exists . Online Security has successfully investigated Internet crimes involving: blackmail and extortion; counterfeiting; international fraud; product hijacking; e-mail tracing; website tracking and ownership analysis; stolen domain names; online stalking; malicious slander; the identity of short sellers posting false and defamatory information on bulletin boards; sexual harassment; physical threats; trademark violations; password trafficking; copyright piracy; tracing the origin of spam as well as developing a characteristics and profile database of intruders, hackers and criminals.
Continue reading this essay Continue reading
Page 2 of 4