Computer Crime


Combatting Cyber crime

Criminals are learning quickly that cyber crime can be inexpensive, low risk and profitable. In one well known incident uncovered in 2007, over 45 million customer records were stolen from a well known North American retailer. The breach occurred over a three year period, during which criminals monitored wireless signals from point of sale credit card terminals. These attacks cost the retailer over $130 million and inflicted unknown financial harm on individual victims.

Also in 2008, 11 people operating in five different countries were charged with breaking into the databases of nine major North American retailers, stealing some 40 million credit and debit card numbers from their databases, and selling the numbers (via the Internet) to other criminals.

Canada’s law enforcement agencies cannot combat trans-national cyber crimes with outdated investigative powers and tools. Equipping our police to protect us in cyberspace requires that we provide them with new legislative authorities and supporting financial resources.

Accordingly, the Royal Canadian Mounted Police will be given the resources required to establish a centralized Integrated Cyber Crime Fusion Center  This team will increase the ability of the Royal Canadian Mounted Police to respond, using a risk-based analysis approach, to requests from the Canadian Cyber Incident Response Center regarding cyber attacks against Government or Canada’s critical infrastructure.

The Government has already passed legislation to combat identity theft. Other legislative reforms will be re-introduced by the Government to enhance the capacity of law enforcement to investigate and prosecute cyber crime by:

  • Making it a crime to use a computer system to sexually exploit a child;
  • Requiring Internet service providers to maintain intercept capable systems, so that law enforcement agencies can execute judicially authorized interceptions;
  • Requiring Internet service providers to provide police with basic customer identification data, as this information is essential to combating online crimes that occur in real time, such as child sexual abuse; and
  • Increasing the assistance that Canada provides to its treaty partners in fighting serious crimes.



SC Magazine, “FTC Settles with TJX Over Breach,” March 2008

Wired Magazine, “Feds Charge 11 in Breaches at TJ Maxx, OfficeMax, DSW, Others,” August 2008




Canada’s Cyber Security Strategy

1. Securing Government systems – Canadians trust Government with their personal and corporate information, and also trust Government to deliver services to them. They also trust that the Government will act to defend Canada’s cyber sovereignty and protect and advance our national security and economic interests. The Government will put in place the necessary structures, tools and personnel to meet its obligations for cyber security.

2. Partnering to secure vital cyber systems outside the federal Government – Canada’s economic prosperity and Canadians’ security depend on the smooth functioning of systems outside the Government. In cooperation with provincial and territorial governments and the private sector, the Government will support initiatives and take steps to strengthen Canada’s cyber resiliency, including that of its critical infrastructure sectors.

3. Helping Canadians to be secure online – The Government will assist Canadians in getting the information they need to protect themselves and their families online, and strengthen the ability of law enforcement agencies to combat cyber crime.


The Strategies Steps to slow down crime set out by the Canadian Government.

  • Reflects Canadian values such as the rule of law, accountability and privacy
  • Allows continual improvements to be made to meet emerging threats
  • Integrates activity across the Government of Canada
  • Emphasizes partnerships with Canadians, provinces, territories, business and academe
  • Builds our close working relationships with our allies.
  • Educate the public of the dangers of cyber crime and what to look out for.


Information Privacy

Privacy 2

Canadians are moving quickly to adopt some of the more modern technologies and applications and are currently using the computer and smartphones for more personal tasks. In 2009, 74% of Canadian’s has a paid internet service and 59% of Canadian’s used electronic tax filings. Also 67% of Canadian’s banked online and spent $62.7 billion on online sales.

Each year more attackers are found and caught. Cyber security is a huge part of the government’s roll to keep people safe from Cyber attacks and fraud. Canada has what they call “Canada’s Cyber Security Strategy.” This is Canada’s plan for keeping it internet users safe from being attacked. It is a plan the government has set fourth as their responsibility to catch criminals before they can steal information that may harm an individual of company.

Canada has a very comprehensive privacy legislation and policies set up in the world. The Canadian Charter of Rights and Freedoms is the protection that is set forth to help individuals and businesses secure their information. This entitles everyone the right to be secured against unreasonable search and seizure.” This will point back to the criminal code that will involve invasion of privacy.

The privacy of Canadians is also protected by various provincial laws of general application that govern the collection, use, disclosure and retention of personal information by public bodies and in some cases by the private sector, as well as by other privacy provisions in other provincial statutes.



The Government is continuing its efforts to help secure Canada’s cyber systems and protect Canadians online. This Strategy is but one element in a series of initiatives designed to protect Canadians. The Government has established the Canadian Cyber Incident Response Center to monitor and provide mitigation advice on cyber threats, and coordinate the national response to any cyber security incident. The Government will soon introduce legislation to modernize law enforcement’s investigative powers, and ensure that technological innovations are not used to evade lawful interceptions of communications supporting criminal activity.