The FBI's Computer Crime Initiatives
Jim Casey - FBI
Oct 23, 1998
AbstractSSA Casey's presentation will provide an overview of the FBI's computer crime initiatives. These initiatives cover a wide variety of investigative matters, including child pornography, industrial espionage, and terrorism, to name a few. One such initiative, known as InfraGard, approaches computer crime as an infrastructure threat. SSA Casey will discuss the development of InfraGard as a national program and its implementation in Indiana. SSA Casey will also discuss the FBI's computer forensics program, known as the Computer Analysis Response Team (CART). SSA Casey will devote a majority of his presentation to answering questions on InfraGard, CART, and other topics related to computer crime and the FBI.
About the SpeakerSupervisory Special Agent James Casey has been with the Federal Bureau of Investigation for twelve years. He is currently the supervisor of the Indianapolis Division squad that handles all matters relating to foreign counterintelligence, economic espionage, and domestic and international terrorism. He was previously assigned to the Detroit Division and to FBI Headquarters where he was a program manager for International Terrorism. SSA Casey has previous experience as a diplomatic security official with the U.S. State Department and as a police officer in Arlington, Virginia. SSA Casey has a bachelor of science degree in political science from James Madison University in Virginia.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.