Cybercrime: Difference between revisions
Appearance
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
| [[UNODC]] || thematic reports on transnational crimes; database of trans/national legislation and case law on cybercrime | | [[UNODC]] || thematic reports on transnational crimes; database of trans/national legislation and case law on cybercrime | ||
|- | |- | ||
| [[APWG]] || industry association combats phishing and | | [[APWG]] || industry association combats [[phishing]] and [[Email Spoofing]]; data standards and model response systems and protocols | ||
|- | |- | ||
| [[Spamhaus]] || provides real time, actionable threat intelligence to network operators, corporations, and | | [[Spamhaus]] || provides real time, actionable threat intelligence to network operators, corporations, and [[Cybersecurity]] vendors | ||
|- | |- | ||
| [[eNASCO]] || child safety online | | [[eNASCO]] || child safety online | ||
Line 28: | Line 28: | ||
| [[The Rand Corporation]] || credible research | | [[The Rand Corporation]] || credible research | ||
|- | |- | ||
| [[CCIPS]] || proseuting computer and IP crimes | | [[CCIPS]] || proseuting computer and [[IP]] crimes | ||
|- | |- | ||
| [[ECTF]] || investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware | | [[ECTF]] || investigating identify theft, network intrusions, [[Business Email Compromise]] (BEC), and [[ransomware]] | ||
|- | |- | ||
| [[C3]] || technical support for cross-border crime | | [[C3]] || technical support for cross-border crime | ||
Line 90: | Line 90: | ||
| || Ransomware | | || Ransomware | ||
|- | |- | ||
| || Redemption / Strawman / Bond Fraud | | || Redemption/Strawman/Bond Fraud | ||
|- | |- | ||
| || Reverse Mortgage Scams | | || Reverse Mortgage Scams |
Revision as of 15:45, 21 July 2021
Cybercrime is the use of electronic communication for criminal activities.[1] The concept of cybercrime depends upon the purpose of the term. Cybercrime almost always encompasses acts against the confidentiality, integrity, and availability of computer data or systems. More broadly, the term refers to computer/content-related acts for personal or financial gain or harm.[2]
Organizations
The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.[3][4]
Organization | Focus Areas |
---|---|
EC Action Against Cybercrime | capacity buidling for compliance with Budapest Convention |
INTERPOL | transnational information sharing |
ITU | harmonization of technical standards |
UNODC | thematic reports on transnational crimes; database of trans/national legislation and case law on cybercrime |
APWG | industry association combats phishing and Email Spoofing; data standards and model response systems and protocols |
Spamhaus | provides real time, actionable threat intelligence to network operators, corporations, and Cybersecurity vendors |
eNASCO | child safety online |
INHOPE | combating child pornography |
IWF | combating child sexual abuse |
The Rand Corporation | credible research |
CCIPS | proseuting computer and IP crimes |
ECTF | investigating identify theft, network intrusions, Business Email Compromise (BEC), and ransomware |
C3 | technical support for cross-border crime |
IC3 | cybercrime complaints |
FBI | Focus Areas |
---|---|
Advance Fee Schemes | |
Business Email Compromise | |
Business Fraud | |
Charity and Disaster Fraud | |
Counterfeit Prescription Drugs | |
Credit Card Fraud | |
Elder Fraud | |
Election Crimes and Security | |
Fraudulent Cosmetics and “Anti-Aging” Products | |
Funeral and Cemetery Fraud | |
Health Care Fraud | |
Identity Theft | |
Illegal Sports Betting | |
Internet Auction Fraud | |
Internet Fraud | |
Investment Fraud | |
Letter of Credit Fraud | |
Market Manipulation (“Pump and Dump”) Fraud | |
Money Mules | |
Nigerian Letter or “419” Fraud | |
Online Vehicle Sale Fraud | |
Ponzi Schemes | |
Prime Bank Note Fraud | |
Pyramid Schemes | |
Ransomware | |
Redemption/Strawman/Bond Fraud | |
Reverse Mortgage Scams | |
Romance Scams | |
Sextortion |
References
- ↑ Loader, Brian D., and Douglas Thomas, eds. Cybercrime: Security and surveillance in the information age. Routledge, 2013.
- ↑ Comprehensive Study on Cybercrime, UNODC, 2013
- ↑ International and Foreign Cyberspace Law Research Guide
- ↑ Common Online Scams, FBI