Cybercrime: Difference between revisions
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref> | financial gain or harm.<ref>[https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf Comprehensive Study on Cybercrime, UNODC, 2013]</ref> | ||
==Organizations== | ==Organizations== | ||
The following IGOs, NGOs, and U.S. government agencies are key opponents of global Cybercrime | The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.<ref>[https://guides.ll.georgetown.edu/c.php?g=363530&p=4821480 International and Foreign Cyberspace Law Research Guide]</ref><ref>[https://www.fbi.gov/scams-and-safety/common-scams-and-crimes Common Online Scams, FBI]</ref> | ||
{| class="wikitable" | |||
! Organization !! Focus Areas | |||
|- | |||
| [[EC]] Action Against Cybercrime || capacity buidling for compliance with [[Budapest Convention]] | |||
|- | |||
| [[INTERPOL]] || transnational information sharing | |||
|- | |||
| [[ITU]] || harmonization of technical standards | |||
|- | |||
| [[UNODC]] || thematic reports on transnational crimea; database of trans/national legislation and case law on cybercrime | |||
|- | |||
| [[APWG]] || industry association combats phishing and email spoofing; data standards and model response systems and protocols | |||
|- | |||
| [[Spamhaus]] || provides real time, actionable threat intelligence to network operators, corporations, and security vendors | |||
|- | |||
| [[eNASCO]] || child safety online | |||
|- | |||
| [[INHOPE]] || combating child pornography | |||
|- | |||
| [[IWF]] || combating child sexual abuse | |||
|- | |||
| [[The Rand Corporation]] || credible research | |||
|- | |||
| [[CCIPS]] || proseuting computer and IP crimes | |||
|- | |||
| [[ECTF]] || investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware | |||
|- | |||
| [[C3]] || technical support for cross-border crime | |||
|- | |||
| [[IC3]] || cybercrime complaints | |||
|- | |||
| || | |||
|- | |||
| [[FBI]] || Advance Fee Schemes | |||
|- | |||
| || Business Email Compromise | |||
|- | |||
| || Business Fraud | |||
|- | |||
| || Charity and Disaster Fraud | |||
|- | |||
| || Counterfeit Prescription Drugs | |||
|- | |||
| || Credit Card Fraud | |||
|- | |||
| || Elder Fraud | |||
|- | |||
| || Election Crimes and Security | |||
|- | |||
| || Fraudulent Cosmetics and “Anti-Aging” Products | |||
|- | |||
| || Funeral and Cemetery Fraud | |||
|- | |||
| || Health Care Fraud | |||
|- | |||
| || Identity Theft | |||
|- | |||
| || Illegal Sports Betting | |||
|- | |||
| || Internet Auction Fraud | |||
|- | |||
| || Internet Fraud | |||
|- | |||
| || Investment Fraud | |||
|- | |||
| || Letter of Credit Fraud | |||
|- | |||
| || Market Manipulation (“Pump and Dump”) Fraud | |||
|- | |||
| || Money Mules | |||
|- | |||
| || Nigerian Letter or “419” Fraud | |||
|- | |||
| || Online Vehicle Sale Fraud | |||
|- | |||
| || Ponzi Schemes | |||
|- | |||
| || Prime Bank Note Fraud | |||
|- | |||
| || Pyramid Schemes | |||
|- | |||
| || Ransomware | |||
|- | |||
| || Redemption / Strawman / Bond Fraud | |||
|- | |||
| || Reverse Mortgage Scams | |||
|- | |||
| || Romance Scams | |||
|- | |||
| || Sextortion | |||
|} | |||
[[Category:Concepts]] | [[Category:Concepts]] |