Cyber Motivations

From Encyclopedia Superheroica -the Encyclopedia of Superheroes

(Difference between revisions)
Jump to: navigation, search
(Cyberfoes)
 
(One intermediate revision not shown)
Line 4: Line 4:
=Cyberfoes=
=Cyberfoes=
-
Most real-world criminals have virtual-world counterparts. While many of the terms might overlap, here are just a few of the many challenges faced by law enforcement today.
+
Most real-world criminals have virtual-world counterparts and must be combatted just as vigorously.
-
*<u>Hackers</u> - jaywalkers, trespassers, burglars, vandals, arsonists.
+
*<u>Hackers</u> - trespassers, burglars, vandals, and arsonists.
-
*<u>Phishers</u> - con artists, embezzlers, robber.
+
*<u>Phishers</u> - con artists, counterfeiters, embezzlers, robbers.
*<u>Spammers</u> - litterers and polluters on a massive scale.
*<u>Spammers</u> - litterers and polluters on a massive scale.
=Technological Allies=
=Technological Allies=
-
 
+
A recent National Institute of Justice survey found a number of glaring law enforcement inadequacies including...
-
A recent National Institute of Justice survey found a number of glaring inadequacies including...
+
#Insufficient resources to establish computer crime units, pursue investigations and prosecutions, and develop tools.
#Insufficient resources to establish computer crime units, pursue investigations and prosecutions, and develop tools.
#Lack of knowledge on how to structure a computer crime unit.
#Lack of knowledge on how to structure a computer crime unit.
Line 42: Line 41:
:::The Official [http://www.interpol.int/public/TechnologyCrime/Default.asp Interpol Site]
:::The Official [http://www.interpol.int/public/TechnologyCrime/Default.asp Interpol Site]
 +
 +
==See also==
 +
[http://www.cyberspacers.com/home.html Cyberspacers] (for kids)
==Back to==
==Back to==

Current revision as of 20:59, 4 August 2009

We face millions of cyberattacks every day from stalkers, hackers, phishers, viruses, and spam.

File:V3cyber.jpg
There really should be a picture here.

Contents

Cyberfoes

Most real-world criminals have virtual-world counterparts and must be combatted just as vigorously.

  • Hackers - trespassers, burglars, vandals, and arsonists.
  • Phishers - con artists, counterfeiters, embezzlers, robbers.
  • Spammers - litterers and polluters on a massive scale.

Technological Allies

A recent National Institute of Justice survey found a number of glaring law enforcement inadequacies including...

  1. Insufficient resources to establish computer crime units, pursue investigations and prosecutions, and develop tools.
  2. Lack of knowledge on how to structure a computer crime unit.
  3. Lack of uniform training for personnel.
  4. Inability to retain trained personnel.
  5. Lack of knowledge of existing technical tools or other resources.
  6. Insufficient technical tools.
  7. Lack of standards and certification for technical tools.
  8. Lack of standards and certification for training.
  9. Need for updated laws and regulations.
  10. Insufficient cooperation with the private sector and academia.

Obviously the various government and business entities fighting cybercrime are going to need help.

The U.S. Dept. of Justice Computer Crime & Intellectual Property Section

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.
The Official DOJ Site

AVG Software

Computer and internet use is an integral part of our everyday lives. Every aspect of our lives is accessible electronically, which brings considerable benefit and, unfortunately, considerable risk. Our role is to shield you from that risk by providing powerful, easy-to-use protection that works efficiently and invisibly in the background so you can focus on using your computer, not worrying about security.
The Official AVG Site

Interpol

Interpol (the world’s largest international police organization) has actively been involved for a number of years in combating Information Technology Crime. Rather than ‘re-inventing the wheel’, the Interpol General Secretariat has harnessed the expertise of its members in the field of Information Technology Crime (ITC) through the vehicle of a ‘working party’ or a group of experts. In this instance, the working party consists of the heads or experienced members of national computer crime units. These working parties have been designed to reflect regional expertise and exist in Europe, Asia, America and in Africa. All working parties are in different stages of development. It should be noted that the work done by the working parties is not Interpol’s only contribution to combating ITC, but it certainly represents the most noteworthy contribution to date.
The Official Interpol Site

See also

Cyberspacers (for kids)

Back to

References

More about cybercrime at Wikipedia

Personal tools