Cyber Motivations
From Encyclopedia Superheroica -the Encyclopedia of Superheroes
(Difference between revisions)
Line 1: | Line 1: | ||
- | We face millions of | + | We face millions of cyberattacks every day from stalkers, hackers, phishers, viruses, and spam. |
- | [[Image:v3cyber.jpg|frame| | + | [[Image:v3cyber.jpg|frame|There really should be a picture here.]] |
+ | =Cyberfoes= | ||
+ | Most real-world crimes have virtual-world counterparts. While many of the terms might overlap, here are just a few of the many challenges faced by law enforcement today. | ||
+ | *<u>Hackers</u> - jaywalkers, trespassers, burglars, vandals, arsonists. | ||
+ | *<u>Phishers</u> - con artists, embezzlers, robber. | ||
+ | *<u>Spammers</u> - litterers and polluters on a massive scale. | ||
+ | |||
+ | =Technological Allies= | ||
A recent National Institute of Justice survey found a number of glaring inadequacies including... | A recent National Institute of Justice survey found a number of glaring inadequacies including... | ||
Line 16: | Line 23: | ||
#Insufficient cooperation with the private sector and academia. | #Insufficient cooperation with the private sector and academia. | ||
- | + | Obviously the various government and business entities fighting cybercrime are going to need help. | |
- | + | ||
- | + | ||
==The U.S. Dept. of Justice Computer Crime & Intellectual Property Section== | ==The U.S. Dept. of Justice Computer Crime & Intellectual Property Section== | ||
Line 26: | Line 31: | ||
:::The Official [http://www.cybercrime.gov DOJ Site] | :::The Official [http://www.cybercrime.gov DOJ Site] | ||
- | == | + | ==AVG Software== |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | <blockquote> Computer and internet use is an integral part of our everyday lives. Every aspect of our lives is accessible electronically, which brings considerable benefit and, unfortunately, considerable risk. Our role is to shield you from that risk by providing powerful, easy-to-use protection that works efficiently and invisibly in the background so you can focus on using your computer, not worrying about security. </blockquote> | |
- | + | :::The Official [http://free.avg.com AVG Site] | |
- | + | ==Interpol== | |
- | + | <blockquote> <i> Interpol (the world’s largest international police organization) has actively been involved for a number of years in combating Information Technology Crime. Rather than ‘re-inventing the wheel’, the Interpol General Secretariat has harnessed the expertise of its members in the field of Information Technology Crime (ITC) through the vehicle of a ‘working party’ or a group of experts. In this instance, the working party consists of the heads or experienced members of national computer crime units. These working parties have been designed to reflect regional expertise and exist in Europe, Asia, America and in Africa. All working parties are in different stages of development. It should be noted that the work done by the working parties is not Interpol’s only contribution to combating ITC, but it certainly represents the most noteworthy contribution to date. </i> </blockquote> | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | :::The Official [http://www.interpol.int/public/TechnologyCrime/Default.asp Interpol Site] | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
==Back to== | ==Back to== | ||
Line 65: | Line 47: | ||
==References== | ==References== | ||
- | More about | + | More about cybercrime at [http://en.wikipedia.org/wiki/Cybercrime Wikipedia] |
[[Category:educational]] | [[Category:educational]] | ||
[[Category:section 3]] | [[Category:section 3]] |
Revision as of 19:52, 29 July 2009
We face millions of cyberattacks every day from stalkers, hackers, phishers, viruses, and spam.
Contents |
Cyberfoes
Most real-world crimes have virtual-world counterparts. While many of the terms might overlap, here are just a few of the many challenges faced by law enforcement today.
- Hackers - jaywalkers, trespassers, burglars, vandals, arsonists.
- Phishers - con artists, embezzlers, robber.
- Spammers - litterers and polluters on a massive scale.
Technological Allies
A recent National Institute of Justice survey found a number of glaring inadequacies including...
- Insufficient resources to establish computer crime units, pursue investigations and prosecutions, and develop tools.
- Lack of knowledge on how to structure a computer crime unit.
- Lack of uniform training for personnel.
- Inability to retain trained personnel.
- Lack of knowledge of existing technical tools or other resources.
- Insufficient technical tools.
- Lack of standards and certification for technical tools.
- Lack of standards and certification for training.
- Need for updated laws and regulations.
- Insufficient cooperation with the private sector and academia.
Obviously the various government and business entities fighting cybercrime are going to need help.
The U.S. Dept. of Justice Computer Crime & Intellectual Property Section
The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.
- The Official DOJ Site
AVG Software
Computer and internet use is an integral part of our everyday lives. Every aspect of our lives is accessible electronically, which brings considerable benefit and, unfortunately, considerable risk. Our role is to shield you from that risk by providing powerful, easy-to-use protection that works efficiently and invisibly in the background so you can focus on using your computer, not worrying about security.
- The Official AVG Site
Interpol
Interpol (the world’s largest international police organization) has actively been involved for a number of years in combating Information Technology Crime. Rather than ‘re-inventing the wheel’, the Interpol General Secretariat has harnessed the expertise of its members in the field of Information Technology Crime (ITC) through the vehicle of a ‘working party’ or a group of experts. In this instance, the working party consists of the heads or experienced members of national computer crime units. These working parties have been designed to reflect regional expertise and exist in Europe, Asia, America and in Africa. All working parties are in different stages of development. It should be noted that the work done by the working parties is not Interpol’s only contribution to combating ITC, but it certainly represents the most noteworthy contribution to date.
- The Official Interpol Site
Back to
- OTHER MOTIVATIONS subsection
References
More about cybercrime at Wikipedia