Top Navigation

Side Navigation

WIU Logo

Cybercrime

A Guide to Finding Government Information


Web version of this guide includes links to web resources.


Search Tips:

Mix and match these terms in searching the library catalog, WestCat , or use them to search journal articles and law reviews via the library's Databases page. You can also use them to search government information sites listed on our Starting Points page - click the tab and pay particular attention to the Top Six.

  • cybercrime
  • computer crimes
  • computer hacker(s/ing)
  • internet/data security
  • cyberterrorism
  • cyber/computer security
  • cyberstalking
  • cybercriminals
  • internet fraud
  • phishing
  • identity theft
  • data protection
  • electronic commerce

Related Topics:

  • cyberbullying
  • cyberwarfare
  • cyberespionage
  • cryptography
  • privacy

An important source for many research topics is Congress. Congressional committees and subcommittees hold hearings on a wide variety of controversial and timely subjects. Simply add the word "hearing?" to a search string in WestCat .

Search Engines

Google and StartPage
Use these search engines to search for government information by typing "site:gov" in the search box preceding your search terms:

  • site:gov "computer crime"
  • site:mil cybercrime

Agencies/Committees

Federal

Computer Crime & Intellectual Property Section (Department of Justice)
Department of Defense
Department of Homeland Security
FBI Cyber Division
National Security Agency
Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies
Subcommittee on Counterterrorism and Intelligence

State

Illinois Attorney General

Federal Government Information

OnGuardOnline.gov

This page from the FTC offers guides for securing your computer, protecting kids and avoiding online scams.
http://onguardonline.gov/

National Computer Security Survey (NCSS)

This survey of businesses' computer security incidents from 2005 shows the extent to which (using statistics) businesses are targeted for cyber attacks and what types of attacks are most prevalent.
http://bjs.ojp.usdoj.gov/index.cfm?ty=dcdetail&iid=260

Do the Payment Card Industry Data Standards Reduce Cybercrime?

This hearing discusses outdated technologies used in the U.S. payment car system and compares them to new technologies being used around the world to prevent data breaches and stolen credit card numbers getting into the hands of criminals and terrorists. 2010
http://purl.access.gpo.gov/GPO/LPS120908
Y 4.H 75:111-14

Communist Chinese Cyber-Attacks, Cyber-Espionage, and Theft of American Technology

This hearing discusses Chinese cyber-attacks against the U.S. and U.S. companies and the causes of our vulnerability.
http://purl.fdlp.gov/GPO/gpo9687
Y 4.F 76/1:112-14

Cyber Threats Facilitate Ability to Commit Economic Espionage

This report details threats to data breaches at agencies and U.S. companies and what can be done to protect intellectual property and sensitive data.
http://www.gao.gov/assets/600/592008.pdf

"Phishing" Fraud: How to Avoid Getting Fried by Phony Phishermen

This short guide from the SEC shows consumers how to detect fraudulent emails and what they can do to protect themselves.
http://purl.access.gpo.gov/GPO/LPS112479

Internet Crime Complaint Center

A collaborative effort between the Federal Bureau of Investigation and the National White Collar Crime Center, this website offers a convenient mechanism to report internet-related crime and prevention tips. The IC3 Annual report offers valuable internet fraud statistics and an annual report by state is available.

Illinois Government Information

Protecting Consumers

Illinois Attorney General web site offering publications and information on identity theft and internet crime, among others.

Internet Crimes Against Children Task Force

The ICAC Task Force Program was created to help State and local law enforcement agencies enhance their investigative response to offenders who use the Internet, online communication systems, or other computer technology to sexually exploit children. The Illinois Attorney General is a regional Task Force contact

Legal Information

Law of Computer Technology: Rights, Licenses, Liabilities

This 4-volume set is a close examination of computer law, including fraud and computer-related torts; computer crime; and privacy, data protection, and access to information.
LEGL REF KF 390 .5 .C6 N55 2009


http://wiu.edu/libraries/govpubs/guides/cybercrime.php

Subject Guides