Line 2: |
Line 2: |
| financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref> | | financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref> |
| ==Organizations== | | ==Organizations== |
− | The following IGOs, NGOs, and U.S. government agencies are key opponents of global Cybercrime. | + | The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.<ref>[https://guides.ll.georgetown.edu/c.php?g=363530&p=4821480 International and Foreign Cyberspace Law Research Guide]</ref><ref>[https://www.fbi.gov/scams-and-safety/common-scams-and-crimes Common Online Scams, FBI]</ref> |
− | | + | {| class="wikitable" |
| + | ! Organization !! Focus Areas |
| + | |- |
| + | | [[EC]] Action Against Cybercrime || capacity buidling for compliance with [[Budapest Convention]] |
| + | |- |
| + | | [[INTERPOL]] || transnational information sharing |
| + | |- |
| + | | [[ITU]] || harmonization of technical standards |
| + | |- |
| + | | [[UNODC]] || thematic reports on transnational crimea; database of trans/national legislation and case law on cybercrime |
| + | |- |
| + | | [[APWG]] || industry association combats phishing and email spoofing; data standards and model response systems and protocols |
| + | |- |
| + | | [[Spamhaus]] || provides real time, actionable threat intelligence to network operators, corporations, and security vendors |
| + | |- |
| + | | [[eNASCO]] || child safety online |
| + | |- |
| + | | [[INHOPE]] || combating child pornography |
| + | |- |
| + | | [[IWF]] || combating child sexual abuse |
| + | |- |
| + | | [[The Rand Corporation]] || credible research |
| + | |- |
| + | | [[CCIPS]] || proseuting computer and IP crimes |
| + | |- |
| + | | [[ECTF]] || investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware |
| + | |- |
| + | | [[C3]] || technical support for cross-border crime |
| + | |- |
| + | | [[IC3]] || cybercrime complaints |
| + | |- |
| + | | || |
| + | |- |
| + | | [[FBI]] || Advance Fee Schemes |
| + | |- |
| + | | || Business Email Compromise |
| + | |- |
| + | | || Business Fraud |
| + | |- |
| + | | || Charity and Disaster Fraud |
| + | |- |
| + | | || Counterfeit Prescription Drugs |
| + | |- |
| + | | || Credit Card Fraud |
| + | |- |
| + | | || Elder Fraud |
| + | |- |
| + | | || Election Crimes and Security |
| + | |- |
| + | | || Fraudulent Cosmetics and “Anti-Aging” Products |
| + | |- |
| + | | || Funeral and Cemetery Fraud |
| + | |- |
| + | | || Health Care Fraud |
| + | |- |
| + | | || Identity Theft |
| + | |- |
| + | | || Illegal Sports Betting |
| + | |- |
| + | | || Internet Auction Fraud |
| + | |- |
| + | | || Internet Fraud |
| + | |- |
| + | | || Investment Fraud |
| + | |- |
| + | | || Letter of Credit Fraud |
| + | |- |
| + | | || Market Manipulation (“Pump and Dump”) Fraud |
| + | |- |
| + | | || Money Mules |
| + | |- |
| + | | || Nigerian Letter or “419” Fraud |
| + | |- |
| + | | || Online Vehicle Sale Fraud |
| + | |- |
| + | | || Ponzi Schemes |
| + | |- |
| + | | || Prime Bank Note Fraud |
| + | |- |
| + | | || Pyramid Schemes |
| + | |- |
| + | | || Ransomware |
| + | |- |
| + | | || Redemption / Strawman / Bond Fraud |
| + | |- |
| + | | || Reverse Mortgage Scams |
| + | |- |
| + | | || Romance Scams |
| + | |- |
| + | | || Sextortion |
| + | |} |
| | | |
| [[Category:Concepts]] | | [[Category:Concepts]] |