Cybercrime: Difference between revisions
Appearance
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
==Organizations== | ==Organizations== | ||
{| class="wikitable" style="float:right; margin-left:0px;" | |||
{| class="wikitable" style="float:right; margin-left: | |||
! [[FBI]] !! Focus Areas | ! [[FBI]] !! Focus Areas | ||
|- | |- | ||
Line 98: | Line 64: | ||
| || Sextortion | | || Sextortion | ||
|} | |} | ||
The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.<ref>[https://guides.ll.georgetown.edu/c.php?g=363530&p=4821480 International and Foreign Cyberspace Law Research Guide]</ref><ref>[https://www.fbi.gov/scams-and-safety/common-scams-and-crimes Common Online Scams, FBI]</ref> | |||
{| class="wikitable" | |||
! Organization !! Focus Areas | |||
|- | |||
| [[EC]] Action Against Cybercrime || capacity buidling for compliance with [[Budapest Convention]] | |||
|- | |||
| [[INTERPOL]] || transnational information sharing | |||
|- | |||
| [[ITU]] || harmonization of technical standards | |||
|- | |||
| [[UNODC]] || thematic reports on transnational crimes; | |||
|- | |||
| || database of trans/national legislation and case law on cybercrime | |||
|- | |||
| [[APWG]] || industry association combats [[phishing]] and [[Email Spoofing]]; | |||
|- | |||
| || data standards and model response systems and protocols | |||
|- | |||
| [[Spamhaus]] || provides real time, actionable threat intelligence to | |||
|- | |||
| || network operators, corporations, and [[Cybersecurity]] vendors | |||
|- | |||
| [[eNASCO]] || child safety online | |||
|- | |||
| [[INHOPE]] || combating child pornography | |||
|- | |||
| [[IWF]] || combating child sexual abuse | |||
|- | |||
| [[The Rand Corporation]] || credible research | |||
|- | |||
| [[CCIPS]] || prosecuting computer and [[IP]] crimes | |||
|- | |||
| [[ECTF]] || investigating identify theft, network intrusions; | |||
|- | |||
| || [[Business Email Compromise]] (BEC), and [[ransomware]] | |||
|- | |||
| [[C3]] || technical support for cross-border crime | |||
|- | |||
| [[IC3]] || cybercrime complaints | |||
|} | |||
==References== | ==References== |
Revision as of 15:55, 21 July 2021
Cybercrime is the use of electronic communication for criminal activities.[1] The concept of cybercrime depends upon the purpose of the term. Cybercrime almost always encompasses acts against the confidentiality, integrity, and availability of computer data or systems. More broadly, the term refers to computer/content-related acts for personal or financial gain or harm.[2]
Organizations
FBI | Focus Areas |
---|---|
Advance Fee Schemes | |
Business Email Compromise | |
Business Fraud | |
Charity and Disaster Fraud | |
Counterfeit Prescription Drugs | |
Credit Card Fraud | |
Elder Fraud | |
Election Crimes and Security | |
Fraudulent Cosmetics and “Anti-Aging” Products | |
Funeral and Cemetery Fraud | |
Health Care Fraud | |
Identity Theft | |
Illegal Sports Betting | |
Internet Auction Fraud | |
Internet Fraud | |
Investment Fraud | |
Letter of Credit Fraud | |
Market Manipulation (“Pump and Dump”) Fraud | |
Money Mules | |
Nigerian Letter or “419” Fraud | |
Online Vehicle Sale Fraud | |
Ponzi Schemes | |
Prime Bank Note Fraud | |
Pyramid Schemes | |
Ransomware | |
Redemption/Strawman/Bond Fraud | |
Reverse Mortgage Scams | |
Romance Scams | |
Sextortion |
The following IGOs, NGOs, and U.S. government agencies are key opponents of global cybercrime.[3][4]
Organization | Focus Areas |
---|---|
EC Action Against Cybercrime | capacity buidling for compliance with Budapest Convention |
INTERPOL | transnational information sharing |
ITU | harmonization of technical standards |
UNODC | thematic reports on transnational crimes; |
database of trans/national legislation and case law on cybercrime | |
APWG | industry association combats phishing and Email Spoofing; |
data standards and model response systems and protocols | |
Spamhaus | provides real time, actionable threat intelligence to |
network operators, corporations, and Cybersecurity vendors | |
eNASCO | child safety online |
INHOPE | combating child pornography |
IWF | combating child sexual abuse |
The Rand Corporation | credible research |
CCIPS | prosecuting computer and IP crimes |
ECTF | investigating identify theft, network intrusions; |
Business Email Compromise (BEC), and ransomware | |
C3 | technical support for cross-border crime |
IC3 | cybercrime complaints |
References
- ↑ Loader, Brian D., and Douglas Thomas, eds. Cybercrime: Security and surveillance in the information age. Routledge, 2013.
- ↑ Comprehensive Study on Cybercrime, UNODC, 2013
- ↑ International and Foreign Cyberspace Law Research Guide
- ↑ Common Online Scams, FBI