Jump to content

Cybercrime: Difference between revisions

From ICANNWiki
Jessica (talk | contribs)
No edit summary
Jessica (talk | contribs)
No edit summary
Line 2: Line 2:
financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref>
financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref>
==Organizations==
==Organizations==
The following IGOs, NGOs, and U.S. government agencies are key opponents of global Cybercrime.
The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.<ref>[https://guides.ll.georgetown.edu/c.php?g=363530&p=4821480 International and Foreign Cyberspace Law Research Guide]</ref><ref>[https://www.fbi.gov/scams-and-safety/common-scams-and-crimes Common Online Scams, FBI]</ref>
 
{| class="wikitable"
! Organization !! Focus Areas
|-
| [[EC]] Action Against Cybercrime || capacity buidling for compliance with [[Budapest Convention]]
|-
| [[INTERPOL]] || transnational information sharing
|-
| [[ITU]] || harmonization of technical standards
|-
| [[UNODC]] || thematic reports on transnational crimea; database of trans/national legislation and case law on cybercrime
|-
| [[APWG]] || industry association combats phishing and email spoofing; data standards and model response systems and protocols
|-
| [[Spamhaus]] || provides real time, actionable threat intelligence to network operators, corporations, and security vendors
|-
| [[eNASCO]] || child safety online
|-
| [[INHOPE]] || combating child pornography
|-
| [[IWF]] || combating child sexual abuse
|-
| [[The Rand Corporation]] || credible research
|-
| [[CCIPS]] || proseuting computer and IP crimes
|-
| [[ECTF]] || investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware
|-
| [[C3]] || technical support for cross-border crime
|-
| [[IC3]] || cybercrime complaints
|-
|  ||
|-
| [[FBI]] || Advance Fee Schemes
|-
|  || Business Email Compromise
|-
|  || Business Fraud
|-
|  || Charity and Disaster Fraud
|-
|  || Counterfeit Prescription Drugs
|-
|  || Credit Card Fraud
|-
|  || Elder Fraud
|-
|  || Election Crimes and Security
|-
|  || Fraudulent Cosmetics and “Anti-Aging” Products
|-
|  || Funeral and Cemetery Fraud
|-
|  || Health Care Fraud
|-
|  || Identity Theft
|-
|  || Illegal Sports Betting
|-
|  || Internet Auction Fraud
|-
|  || Internet Fraud
|-
|  || Investment Fraud
|-
|  || Letter of Credit Fraud
|-
|  || Market Manipulation (“Pump and Dump”) Fraud
|-
|  || Money Mules
|-
|  || Nigerian Letter or “419” Fraud
|-
|  || Online Vehicle Sale Fraud
|-
|  || Ponzi Schemes
|-
|  || Prime Bank Note Fraud
|-
|  || Pyramid Schemes
|-
|  || Ransomware
|-
|  || Redemption / Strawman / Bond Fraud
|-
|  || Reverse Mortgage Scams
|-
|  || Romance Scams
|-
|  || Sextortion
|}


[[Category:Concepts]]
[[Category:Concepts]]

Revision as of 15:08, 21 July 2021

Cybercrime is the use of electronic communication for criminal activities.[1] The concept of cybercrime depends upon the purpose of the term. Cybercrime almost always encompasses acts against the confidentiality, integrity, and availability of computer data or systems. More broadly, the term refers to computer/content-related acts for personal or financial gain or harm.[2]

Organizations

The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.[3][4]

Organization Focus Areas
EC Action Against Cybercrime capacity buidling for compliance with Budapest Convention
INTERPOL transnational information sharing
ITU harmonization of technical standards
UNODC thematic reports on transnational crimea; database of trans/national legislation and case law on cybercrime
APWG industry association combats phishing and email spoofing; data standards and model response systems and protocols
Spamhaus provides real time, actionable threat intelligence to network operators, corporations, and security vendors
eNASCO child safety online
INHOPE combating child pornography
IWF combating child sexual abuse
The Rand Corporation credible research
CCIPS proseuting computer and IP crimes
ECTF investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware
C3 technical support for cross-border crime
IC3 cybercrime complaints
FBI Advance Fee Schemes
Business Email Compromise
Business Fraud
Charity and Disaster Fraud
Counterfeit Prescription Drugs
Credit Card Fraud
Elder Fraud
Election Crimes and Security
Fraudulent Cosmetics and “Anti-Aging” Products
Funeral and Cemetery Fraud
Health Care Fraud
Identity Theft
Illegal Sports Betting
Internet Auction Fraud
Internet Fraud
Investment Fraud
Letter of Credit Fraud
Market Manipulation (“Pump and Dump”) Fraud
Money Mules
Nigerian Letter or “419” Fraud
Online Vehicle Sale Fraud
Ponzi Schemes
Prime Bank Note Fraud
Pyramid Schemes
Ransomware
Redemption / Strawman / Bond Fraud
Reverse Mortgage Scams
Romance Scams
Sextortion
  1. Loader, Brian D., and Douglas Thomas, eds. Cybercrime: Security and surveillance in the information age. Routledge, 2013.
  2. Comprehensive Study on Cybercrime, UNODC, 2013
  3. International and Foreign Cyberspace Law Research Guide
  4. Common Online Scams, FBI