Cybercrime: Difference between revisions
Appearance
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref> | financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref> | ||
==Organizations== | ==Organizations== | ||
The following IGOs, NGOs, and U.S. government agencies are key opponents of global Cybercrime | The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.<ref>[https://guides.ll.georgetown.edu/c.php?g=363530&p=4821480 International and Foreign Cyberspace Law Research Guide]</ref><ref>[https://www.fbi.gov/scams-and-safety/common-scams-and-crimes Common Online Scams, FBI]</ref> | ||
{| class="wikitable" | |||
! Organization !! Focus Areas | |||
|- | |||
| [[EC]] Action Against Cybercrime || capacity buidling for compliance with [[Budapest Convention]] | |||
|- | |||
| [[INTERPOL]] || transnational information sharing | |||
|- | |||
| [[ITU]] || harmonization of technical standards | |||
|- | |||
| [[UNODC]] || thematic reports on transnational crimea; database of trans/national legislation and case law on cybercrime | |||
|- | |||
| [[APWG]] || industry association combats phishing and email spoofing; data standards and model response systems and protocols | |||
|- | |||
| [[Spamhaus]] || provides real time, actionable threat intelligence to network operators, corporations, and security vendors | |||
|- | |||
| [[eNASCO]] || child safety online | |||
|- | |||
| [[INHOPE]] || combating child pornography | |||
|- | |||
| [[IWF]] || combating child sexual abuse | |||
|- | |||
| [[The Rand Corporation]] || credible research | |||
|- | |||
| [[CCIPS]] || proseuting computer and IP crimes | |||
|- | |||
| [[ECTF]] || investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware | |||
|- | |||
| [[C3]] || technical support for cross-border crime | |||
|- | |||
| [[IC3]] || cybercrime complaints | |||
|- | |||
| || | |||
|- | |||
| [[FBI]] || Advance Fee Schemes | |||
|- | |||
| || Business Email Compromise | |||
|- | |||
| || Business Fraud | |||
|- | |||
| || Charity and Disaster Fraud | |||
|- | |||
| || Counterfeit Prescription Drugs | |||
|- | |||
| || Credit Card Fraud | |||
|- | |||
| || Elder Fraud | |||
|- | |||
| || Election Crimes and Security | |||
|- | |||
| || Fraudulent Cosmetics and “Anti-Aging” Products | |||
|- | |||
| || Funeral and Cemetery Fraud | |||
|- | |||
| || Health Care Fraud | |||
|- | |||
| || Identity Theft | |||
|- | |||
| || Illegal Sports Betting | |||
|- | |||
| || Internet Auction Fraud | |||
|- | |||
| || Internet Fraud | |||
|- | |||
| || Investment Fraud | |||
|- | |||
| || Letter of Credit Fraud | |||
|- | |||
| || Market Manipulation (“Pump and Dump”) Fraud | |||
|- | |||
| || Money Mules | |||
|- | |||
| || Nigerian Letter or “419” Fraud | |||
|- | |||
| || Online Vehicle Sale Fraud | |||
|- | |||
| || Ponzi Schemes | |||
|- | |||
| || Prime Bank Note Fraud | |||
|- | |||
| || Pyramid Schemes | |||
|- | |||
| || Ransomware | |||
|- | |||
| || Redemption / Strawman / Bond Fraud | |||
|- | |||
| || Reverse Mortgage Scams | |||
|- | |||
| || Romance Scams | |||
|- | |||
| || Sextortion | |||
|} | |||
[[Category:Concepts]] | [[Category:Concepts]] |
Revision as of 15:08, 21 July 2021
Cybercrime is the use of electronic communication for criminal activities.[1] The concept of cybercrime depends upon the purpose of the term. Cybercrime almost always encompasses acts against the confidentiality, integrity, and availability of computer data or systems. More broadly, the term refers to computer/content-related acts for personal or financial gain or harm.[2]
Organizations
The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.[3][4]
Organization | Focus Areas |
---|---|
EC Action Against Cybercrime | capacity buidling for compliance with Budapest Convention |
INTERPOL | transnational information sharing |
ITU | harmonization of technical standards |
UNODC | thematic reports on transnational crimea; database of trans/national legislation and case law on cybercrime |
APWG | industry association combats phishing and email spoofing; data standards and model response systems and protocols |
Spamhaus | provides real time, actionable threat intelligence to network operators, corporations, and security vendors |
eNASCO | child safety online |
INHOPE | combating child pornography |
IWF | combating child sexual abuse |
The Rand Corporation | credible research |
CCIPS | proseuting computer and IP crimes |
ECTF | investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware |
C3 | technical support for cross-border crime |
IC3 | cybercrime complaints |
FBI | Advance Fee Schemes |
Business Email Compromise | |
Business Fraud | |
Charity and Disaster Fraud | |
Counterfeit Prescription Drugs | |
Credit Card Fraud | |
Elder Fraud | |
Election Crimes and Security | |
Fraudulent Cosmetics and “Anti-Aging” Products | |
Funeral and Cemetery Fraud | |
Health Care Fraud | |
Identity Theft | |
Illegal Sports Betting | |
Internet Auction Fraud | |
Internet Fraud | |
Investment Fraud | |
Letter of Credit Fraud | |
Market Manipulation (“Pump and Dump”) Fraud | |
Money Mules | |
Nigerian Letter or “419” Fraud | |
Online Vehicle Sale Fraud | |
Ponzi Schemes | |
Prime Bank Note Fraud | |
Pyramid Schemes | |
Ransomware | |
Redemption / Strawman / Bond Fraud | |
Reverse Mortgage Scams | |
Romance Scams | |
Sextortion |
- ↑ Loader, Brian D., and Douglas Thomas, eds. Cybercrime: Security and surveillance in the information age. Routledge, 2013.
- ↑ Comprehensive Study on Cybercrime, UNODC, 2013
- ↑ International and Foreign Cyberspace Law Research Guide
- ↑ Common Online Scams, FBI