Cyber Motivations

From Encyclopedia Superheroica -the Encyclopedia of Superheroes

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
-
We face millions of cyber attacks every day from stalkers, hackers, phishers, viruses, and spam.
+
We face millions of cyberattacks every day from stalkers, hackers, phishers, viruses, and spam.
-
[[Image:v3cyber.jpg|frame|The Federation of American Scientists.]]
+
[[Image:v3cyber.jpg|frame|There really should be a picture here.]]
 +
=Cyberfoes=
 +
Most real-world crimes have virtual-world counterparts. While many of the terms might overlap, here are just a few of the many challenges faced by law enforcement today.
 +
*<u>Hackers</u> - jaywalkers, trespassers, burglars, vandals, arsonists.
 +
*<u>Phishers</u> - con artists, embezzlers, robber.
 +
*<u>Spammers</u> - litterers and polluters on a massive scale.
 +
 +
=Technological Allies=
A recent National Institute of Justice survey found a number of glaring inadequacies including...
A recent National Institute of Justice survey found a number of glaring inadequacies including...
Line 16: Line 23:
#Insufficient cooperation with the private sector and academia.
#Insufficient cooperation with the private sector and academia.
-
=Laboratory Allies=
+
Obviously the various government and business entities fighting cybercrime are going to need help.
-
 
+
-
No superhero can do it all on their own. These organizations too are on the front lines of the war against biological opponents. It is likely that one of them will be responsible for identifying any outbreak and coordinating a response to the attack or accident.
+
==The U.S. Dept. of Justice Computer Crime & Intellectual Property Section==
==The U.S. Dept. of Justice Computer Crime & Intellectual Property Section==
Line 26: Line 31:
:::The Official [http://www.cybercrime.gov DOJ Site]
:::The Official [http://www.cybercrime.gov DOJ Site]
-
==The Federation of American Scientists==
+
==AVG Software==
-
 
+
-
<blockquote> The FAS has created an internet resource for biosecurity policy, bioterrorism information, and biodefense research. The organizations listed there represent various perspectives on what actions individual scientists, research institutions, science journals, the public, and government can do to minimize the threat of bioterrorism while maximizing the benefits of life science research. </blockquote>
+
-
 
+
-
:::The Official [http://www.fas.org/programs/ssp/bio/resource/index.html FAS Site]
+
-
 
+
-
===Resources===
+
-
*Biosecurity Education Portal
+
-
*Biological Threat Agents Information
+
-
*International Organizations
+
-
*Introduction to Biological Weapons
+
-
*Legislation, Executive Orders, and Treaties
+
-
*Non-Governmental Organizations
+
-
*Reports
+
-
*U.S. Government Agencies
+
-
*University Policy Centers
+
-
==The Environmental Protection Agency==
+
<blockquote> Computer and internet use is an integral part of our everyday lives. Every aspect of our lives is accessible electronically, which brings considerable benefit and, unfortunately, considerable risk. Our role is to shield you from that risk by providing powerful, easy-to-use protection that works efficiently and invisibly in the background so you can focus on using your computer, not worrying about security. </blockquote>
-
<blockquote> <i> EPA leads the nation's environmental science, research, education and assessment efforts. The mission of the Environmental Protection Agency is to protect human health and the environment. Since 1970, EPA has been working for a cleaner, healthier environment for the American people. </i> </blockquote>
+
:::The Official [http://free.avg.com AVG Site]
-
:::The Official [http://www.epa.gov EPA Site]
+
==Interpol==
-
===Employees===
+
<blockquote> <i> Interpol (the world’s largest international police organization) has actively been involved for a number of years in combating Information Technology Crime. Rather than ‘re-inventing the wheel’, the Interpol General Secretariat has harnessed the expertise of its members in the field of Information Technology Crime (ITC) through the vehicle of a ‘working party’ or a group of experts. In this instance, the working party consists of the heads or experienced members of national computer crime units. These working parties have been designed to reflect regional expertise and exist in Europe, Asia, America and in Africa. All working parties are in different stages of development. It should be noted that the work done by the working parties is not Interpol’s only contribution to combating ITC, but it certainly represents the most noteworthy contribution to date. </i> </blockquote>
-
*17,000 people across the country.
+
-
*A headquarters, ten regional offices, and more than a dozen labs.
+
-
*Primarily engineers, scientists, and policy analysts.  
+
-
*Also comprised of legal, public affairs, financial, information management, and computer specialists.
+
-
===Challenges===
+
:::The Official [http://www.interpol.int/public/TechnologyCrime/Default.asp Interpol Site]
-
*Toxic waste
+
-
*Water pollution
+
-
*Air pollution
+
-
*Climate change
+
==Back to==
==Back to==
Line 65: Line 47:
==References==
==References==
-
More about biological agents at [http://en.wikipedia.org/wiki/Biological_agents Wikipedia]
+
More about cybercrime at [http://en.wikipedia.org/wiki/Cybercrime Wikipedia]
[[Category:educational]]
[[Category:educational]]
[[Category:section 3]]
[[Category:section 3]]

Revision as of 19:52, 29 July 2009

We face millions of cyberattacks every day from stalkers, hackers, phishers, viruses, and spam.

File:V3cyber.jpg
There really should be a picture here.

Contents

Cyberfoes

Most real-world crimes have virtual-world counterparts. While many of the terms might overlap, here are just a few of the many challenges faced by law enforcement today.

  • Hackers - jaywalkers, trespassers, burglars, vandals, arsonists.
  • Phishers - con artists, embezzlers, robber.
  • Spammers - litterers and polluters on a massive scale.

Technological Allies

A recent National Institute of Justice survey found a number of glaring inadequacies including...

  1. Insufficient resources to establish computer crime units, pursue investigations and prosecutions, and develop tools.
  2. Lack of knowledge on how to structure a computer crime unit.
  3. Lack of uniform training for personnel.
  4. Inability to retain trained personnel.
  5. Lack of knowledge of existing technical tools or other resources.
  6. Insufficient technical tools.
  7. Lack of standards and certification for technical tools.
  8. Lack of standards and certification for training.
  9. Need for updated laws and regulations.
  10. Insufficient cooperation with the private sector and academia.

Obviously the various government and business entities fighting cybercrime are going to need help.

The U.S. Dept. of Justice Computer Crime & Intellectual Property Section

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.
The Official DOJ Site

AVG Software

Computer and internet use is an integral part of our everyday lives. Every aspect of our lives is accessible electronically, which brings considerable benefit and, unfortunately, considerable risk. Our role is to shield you from that risk by providing powerful, easy-to-use protection that works efficiently and invisibly in the background so you can focus on using your computer, not worrying about security.
The Official AVG Site

Interpol

Interpol (the world’s largest international police organization) has actively been involved for a number of years in combating Information Technology Crime. Rather than ‘re-inventing the wheel’, the Interpol General Secretariat has harnessed the expertise of its members in the field of Information Technology Crime (ITC) through the vehicle of a ‘working party’ or a group of experts. In this instance, the working party consists of the heads or experienced members of national computer crime units. These working parties have been designed to reflect regional expertise and exist in Europe, Asia, America and in Africa. All working parties are in different stages of development. It should be noted that the work done by the working parties is not Interpol’s only contribution to combating ITC, but it certainly represents the most noteworthy contribution to date.
The Official Interpol Site

Back to

References

More about cybercrime at Wikipedia

Personal tools