CINXE.COM
Cybercrime - Wikipedia
<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Cybercrime - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"6ce0c06c-b8c4-4972-bbc9-b1392a301262","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Cybercrime","wgTitle":"Cybercrime","wgCurRevisionId":1259160224,"wgRevisionId":1259160224,"wgArticleId":341598,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1: long volume value","CS1 maint: archived copy as title","Articles with short description","Short description is different from Wikidata","Use dmy dates from April 2019","All articles with unsourced statements","Articles with unsourced statements from November 2023","Articles with limited geographic scope from March 2016","Articles with unsourced statements from January 2024","Commons category link is on Wikidata","Cybercrime","Crime by type","Computer security", "Organized crime activity","Harassment and bullying"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Cybercrime","wgRelevantArticleId":341598,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgRedirectedFrom":"Computer_crime","wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":90000,"wgInternalRedirectTargetUrl":"/wiki/Cybercrime","wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition": "interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q29137","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=[ "mediawiki.action.view.redirect","ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&only=styles&skin=vector-2022"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/e/e4/Social_Network_Diagram_%28segment%29.svg/1200px-Social_Network_Diagram_%28segment%29.svg.png"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="466"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/e/e4/Social_Network_Diagram_%28segment%29.svg/800px-Social_Network_Diagram_%28segment%29.svg.png"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="310"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/e/e4/Social_Network_Diagram_%28segment%29.svg/640px-Social_Network_Diagram_%28segment%29.svg.png"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="248"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Cybercrime - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Cybercrime"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Cybercrime&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Cybercrime"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Cybercrime rootpage-Cybercrime skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page's font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&returnto=Cybercrime" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&returnto=Cybercrime" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&returnto=Cybercrime" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&returnto=Cybercrime" title="You're encouraged to log in; however, it's not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-Classifications" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Classifications"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>Classifications</span> </div> </a> <button aria-controls="toc-Classifications-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Classifications subsection</span> </button> <ul id="toc-Classifications-sublist" class="vector-toc-list"> <li id="toc-Computer_fraud" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Computer_fraud"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1</span> <span>Computer fraud</span> </div> </a> <ul id="toc-Computer_fraud-sublist" class="vector-toc-list"> <li id="toc-Fraud_Factory" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Fraud_Factory"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.1.1</span> <span>Fraud Factory</span> </div> </a> <ul id="toc-Fraud_Factory-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Cyberterrorism" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Cyberterrorism"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.2</span> <span>Cyberterrorism</span> </div> </a> <ul id="toc-Cyberterrorism-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Cyberextortion" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Cyberextortion"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.3</span> <span>Cyberextortion</span> </div> </a> <ul id="toc-Cyberextortion-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Ransomware" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Ransomware"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.4</span> <span>Ransomware</span> </div> </a> <ul id="toc-Ransomware-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Cybersex_trafficking" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Cybersex_trafficking"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.5</span> <span>Cybersex trafficking</span> </div> </a> <ul id="toc-Cybersex_trafficking-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Cyberwarfare" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Cyberwarfare"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.6</span> <span>Cyberwarfare</span> </div> </a> <ul id="toc-Cyberwarfare-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Computers_as_a_tool" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Computers_as_a_tool"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.7</span> <span>Computers as a tool</span> </div> </a> <ul id="toc-Computers_as_a_tool-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Obscene_or_offensive_content" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Obscene_or_offensive_content"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.8</span> <span>Obscene or offensive content</span> </div> </a> <ul id="toc-Obscene_or_offensive_content-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Ad-fraud" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Ad-fraud"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.9</span> <span>Ad-fraud</span> </div> </a> <ul id="toc-Ad-fraud-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Online_harassment" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Online_harassment"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.10</span> <span>Online harassment</span> </div> </a> <ul id="toc-Online_harassment-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Drug_trafficking" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Drug_trafficking"> <div class="vector-toc-text"> <span class="vector-toc-numb">1.11</span> <span>Drug trafficking</span> </div> </a> <ul id="toc-Drug_trafficking-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Notable_incidents" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Notable_incidents"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Notable incidents</span> </div> </a> <ul id="toc-Notable_incidents-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Combating_computer_crime" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Combating_computer_crime"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Combating computer crime</span> </div> </a> <button aria-controls="toc-Combating_computer_crime-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Combating computer crime subsection</span> </button> <ul id="toc-Combating_computer_crime-sublist" class="vector-toc-list"> <li id="toc-Investigation" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Investigation"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Investigation</span> </div> </a> <ul id="toc-Investigation-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Prevention" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Prevention"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Prevention</span> </div> </a> <ul id="toc-Prevention-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Legislation" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Legislation"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.3</span> <span>Legislation</span> </div> </a> <ul id="toc-Legislation-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Penalties" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Penalties"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.4</span> <span>Penalties</span> </div> </a> <ul id="toc-Penalties-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Awareness" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Awareness"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.5</span> <span>Awareness</span> </div> </a> <ul id="toc-Awareness-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Intelligence" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Intelligence"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.6</span> <span>Intelligence</span> </div> </a> <ul id="toc-Intelligence-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Spread_of_cybercrime" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Spread_of_cybercrime"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.7</span> <span>Spread of cybercrime</span> </div> </a> <ul id="toc-Spread_of_cybercrime-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Agencies" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Agencies"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Agencies</span> </div> </a> <ul id="toc-Agencies-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Further_reading" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Further_reading"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Further reading</span> </div> </a> <ul id="toc-Further_reading-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>External links</span> </div> </a> <button aria-controls="toc-External_links-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle External links subsection</span> </button> <ul id="toc-External_links-sublist" class="vector-toc-list"> <li id="toc-Government_resources" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Government_resources"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.1</span> <span>Government resources</span> </div> </a> <ul id="toc-Government_resources-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Cybercrime</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 57 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-57" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">57 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%AC%D8%B1%D9%8A%D9%85%D8%A9_%D8%B3%D9%8A%D8%A8%D8%B1%D8%A7%D9%86%D9%8A%D8%A9" title="جريمة سيبرانية – Arabic" lang="ar" hreflang="ar" data-title="جريمة سيبرانية" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Kibercinay%C9%99t" title="Kibercinayət – Azerbaijani" lang="az" hreflang="az" data-title="Kibercinayət" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%B8%E0%A6%BE%E0%A6%87%E0%A6%AC%E0%A6%BE%E0%A6%B0_%E0%A6%85%E0%A6%AA%E0%A6%B0%E0%A6%BE%E0%A6%A7" title="সাইবার অপরাধ – Bangla" lang="bn" hreflang="bn" data-title="সাইবার অপরাধ" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-bh mw-list-item"><a href="https://bh.wikipedia.org/wiki/%E0%A4%B8%E0%A4%BE%E0%A4%87%E0%A4%AC%E0%A4%B0_%E0%A4%85%E0%A4%AA%E0%A4%B0%E0%A4%BE%E0%A4%A7" title="साइबर अपराध – Bhojpuri" lang="bh" hreflang="bh" data-title="साइबर अपराध" data-language-autonym="भोजपुरी" data-language-local-name="Bhojpuri" class="interlanguage-link-target"><span>भोजपुरी</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%9A%D0%BE%D0%BC%D0%BF%D1%8E%D1%82%D1%8A%D1%80%D0%BD%D0%BE_%D0%BF%D1%80%D0%B5%D1%81%D1%82%D1%8A%D0%BF%D0%BB%D0%B5%D0%BD%D0%B8%D0%B5" title="Компютърно престъпление – Bulgarian" lang="bg" hreflang="bg" data-title="Компютърно престъпление" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Delicte_inform%C3%A0tic" title="Delicte informàtic – Catalan" lang="ca" hreflang="ca" data-title="Delicte informàtic" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Po%C4%8D%C3%ADta%C4%8Dov%C3%A1_kriminalita" title="Počítačová kriminalita – Czech" lang="cs" hreflang="cs" data-title="Počítačová kriminalita" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Computerkriminalit%C3%A4t" title="Computerkriminalität – German" lang="de" hreflang="de" data-title="Computerkriminalität" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/K%C3%BCberkuritegevus" title="Küberkuritegevus – Estonian" lang="et" hreflang="et" data-title="Küberkuritegevus" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%97%CE%BB%CE%B5%CE%BA%CF%84%CF%81%CE%BF%CE%BD%CE%B9%CE%BA%CF%8C_%CE%AD%CE%B3%CE%BA%CE%BB%CE%B7%CE%BC%CE%B1" title="Ηλεκτρονικό έγκλημα – Greek" lang="el" hreflang="el" data-title="Ηλεκτρονικό έγκλημα" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Delito_inform%C3%A1tico" title="Delito informático – Spanish" lang="es" hreflang="es" data-title="Delito informático" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Delitu_informatiko" title="Delitu informatiko – Basque" lang="eu" hreflang="eu" data-title="Delitu informatiko" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%AC%D8%B1%D9%85_%D8%B3%D8%A7%DB%8C%D8%A8%D8%B1%DB%8C" title="جرم سایبری – Persian" lang="fa" hreflang="fa" data-title="جرم سایبری" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Cybercrime" title="Cybercrime – French" lang="fr" hreflang="fr" data-title="Cybercrime" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%82%AC%EC%9D%B4%EB%B2%84_%EB%B2%94%EC%A3%84" title="사이버 범죄 – Korean" lang="ko" hreflang="ko" data-title="사이버 범죄" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-ha mw-list-item"><a href="https://ha.wikipedia.org/wiki/Cybercrime" title="Cybercrime – Hausa" lang="ha" hreflang="ha" data-title="Cybercrime" data-language-autonym="Hausa" data-language-local-name="Hausa" class="interlanguage-link-target"><span>Hausa</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D4%BF%D5%AB%D5%A2%D5%A5%D6%80%D5%B0%D5%A1%D5%B6%D6%81%D5%A1%D5%A3%D5%B8%D6%80%D5%AE%D5%B8%D6%82%D5%A9%D5%B5%D5%B8%D6%82%D5%B6" title="Կիբերհանցագործություն – Armenian" lang="hy" hreflang="hy" data-title="Կիբերհանցագործություն" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%B8%E0%A4%BE%E0%A4%88%E0%A4%AC%E0%A4%B0_%E0%A4%85%E0%A4%AA%E0%A4%B0%E0%A4%BE%E0%A4%A7" title="साईबर अपराध – Hindi" lang="hi" hreflang="hi" data-title="साईबर अपराध" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Kejahatan_siber" title="Kejahatan siber – Indonesian" lang="id" hreflang="id" data-title="Kejahatan siber" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Crimine_informatico" title="Crimine informatico – Italian" lang="it" hreflang="it" data-title="Crimine informatico" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%A4%D7%A9%D7%A2_%D7%9E%D7%A7%D7%95%D7%95%D7%9F" title="פשע מקוון – Hebrew" lang="he" hreflang="he" data-title="פשע מקוון" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-sw mw-list-item"><a href="https://sw.wikipedia.org/wiki/Uhalifu_wa_kimtandao" title="Uhalifu wa kimtandao – Swahili" lang="sw" hreflang="sw" data-title="Uhalifu wa kimtandao" data-language-autonym="Kiswahili" data-language-local-name="Swahili" class="interlanguage-link-target"><span>Kiswahili</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/Kibernoziegums" title="Kibernoziegums – Latvian" lang="lv" hreflang="lv" data-title="Kibernoziegums" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-lmo mw-list-item"><a href="https://lmo.wikipedia.org/wiki/Crimen_informategh" title="Crimen informategh – Lombard" lang="lmo" hreflang="lmo" data-title="Crimen informategh" data-language-autonym="Lombard" data-language-local-name="Lombard" class="interlanguage-link-target"><span>Lombard</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/Kiberb%C5%B1n%C3%B6z%C3%A9s" title="Kiberbűnözés – Hungarian" lang="hu" hreflang="hu" data-title="Kiberbűnözés" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-mk mw-list-item"><a href="https://mk.wikipedia.org/wiki/%D0%A1%D0%BC%D0%B5%D1%82%D0%B0%D1%87%D0%BA%D0%BE_%D0%B7%D0%BB%D0%BE%D1%81%D1%82%D0%BE%D1%80%D1%81%D1%82%D0%B2%D0%BE" title="Сметачко злосторство – Macedonian" lang="mk" hreflang="mk" data-title="Сметачко злосторство" data-language-autonym="Македонски" data-language-local-name="Macedonian" class="interlanguage-link-target"><span>Македонски</span></a></li><li class="interlanguage-link interwiki-ml mw-list-item"><a href="https://ml.wikipedia.org/wiki/%E0%B4%B8%E0%B5%88%E0%B4%AC%E0%B5%BC_%E0%B4%95%E0%B5%81%E0%B4%B1%E0%B5%8D%E0%B4%B1%E0%B4%95%E0%B5%83%E0%B4%A4%E0%B5%8D%E0%B4%AF%E0%B4%82" title="സൈബർ കുറ്റകൃത്യം – Malayalam" lang="ml" hreflang="ml" data-title="സൈബർ കുറ്റകൃത്യം" data-language-autonym="മലയാളം" data-language-local-name="Malayalam" class="interlanguage-link-target"><span>മലയാളം</span></a></li><li class="interlanguage-link interwiki-mr mw-list-item"><a href="https://mr.wikipedia.org/wiki/%E0%A4%B8%E0%A4%BE%E0%A4%AF%E0%A4%AC%E0%A4%B0_%E0%A4%97%E0%A5%81%E0%A4%A8%E0%A5%8D%E0%A4%B9%E0%A4%BE" title="सायबर गुन्हा – Marathi" lang="mr" hreflang="mr" data-title="सायबर गुन्हा" data-language-autonym="मराठी" data-language-local-name="Marathi" class="interlanguage-link-target"><span>मराठी</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Jenayah_komputer" title="Jenayah komputer – Malay" lang="ms" hreflang="ms" data-title="Jenayah komputer" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Computercriminaliteit" title="Computercriminaliteit – Dutch" lang="nl" hreflang="nl" data-title="Computercriminaliteit" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ne mw-list-item"><a href="https://ne.wikipedia.org/wiki/%E0%A4%B5%E0%A4%BF%E0%A4%A6%E0%A5%8D%E0%A4%AF%E0%A5%81%E0%A4%A4%E0%A5%80%E0%A4%AF_%E0%A4%85%E0%A4%AA%E0%A4%B0%E0%A4%BE%E0%A4%A7" title="विद्युतीय अपराध – Nepali" lang="ne" hreflang="ne" data-title="विद्युतीय अपराध" data-language-autonym="नेपाली" data-language-local-name="Nepali" class="interlanguage-link-target"><span>नेपाली</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%82%B5%E3%82%A4%E3%83%90%E3%83%BC%E7%8A%AF%E7%BD%AA" title="サイバー犯罪 – Japanese" lang="ja" hreflang="ja" data-title="サイバー犯罪" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Datakriminalitet" title="Datakriminalitet – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Datakriminalitet" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Kiberjinoyat" title="Kiberjinoyat – Uzbek" lang="uz" hreflang="uz" data-title="Kiberjinoyat" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pa mw-list-item"><a href="https://pa.wikipedia.org/wiki/%E0%A8%B8%E0%A8%BE%E0%A8%88%E0%A8%AC%E0%A8%B0_%E0%A8%85%E0%A8%AA%E0%A8%B0%E0%A8%BE%E0%A8%A7" title="ਸਾਈਬਰ ਅਪਰਾਧ – Punjabi" lang="pa" hreflang="pa" data-title="ਸਾਈਬਰ ਅਪਰਾਧ" data-language-autonym="ਪੰਜਾਬੀ" data-language-local-name="Punjabi" class="interlanguage-link-target"><span>ਪੰਜਾਬੀ</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Przest%C4%99pczo%C5%9B%C4%87_komputerowa" title="Przestępczość komputerowa – Polish" lang="pl" hreflang="pl" data-title="Przestępczość komputerowa" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Crime_inform%C3%A1tico" title="Crime informático – Portuguese" lang="pt" hreflang="pt" data-title="Crime informático" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Criminalitate_informatic%C4%83" title="Criminalitate informatică – Romanian" lang="ro" hreflang="ro" data-title="Criminalitate informatică" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%9F%D1%80%D0%B5%D1%81%D1%82%D1%83%D0%BF%D0%BB%D0%B5%D0%BD%D0%B8%D1%8F_%D0%B2_%D1%81%D1%84%D0%B5%D1%80%D0%B5_%D0%B8%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D0%B8%D0%BE%D0%BD%D0%BD%D1%8B%D1%85_%D1%82%D0%B5%D1%85%D0%BD%D0%BE%D0%BB%D0%BE%D0%B3%D0%B8%D0%B9" title="Преступления в сфере информационных технологий – Russian" lang="ru" hreflang="ru" data-title="Преступления в сфере информационных технологий" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/Krimi_kibernetik" title="Krimi kibernetik – Albanian" lang="sq" hreflang="sq" data-title="Krimi kibernetik" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Cybercrime" title="Cybercrime – Simple English" lang="en-simple" hreflang="en-simple" data-title="Cybercrime" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/Po%C4%8D%C3%ADta%C4%8Dov%C3%A1_kriminalita" title="Počítačová kriminalita – Slovak" lang="sk" hreflang="sk" data-title="Počítačová kriminalita" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Kibernetski_kriminal" title="Kibernetski kriminal – Slovenian" lang="sl" hreflang="sl" data-title="Kibernetski kriminal" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%D8%AA%D8%A7%D9%88%D8%A7%D9%86%DB%8C_%D8%A6%DB%8C%D9%86%D8%AA%DB%95%D8%B1%D9%86%DB%8E%D8%AA" title="تاوانی ئینتەرنێت – Central Kurdish" lang="ckb" hreflang="ckb" data-title="تاوانی ئینتەرنێت" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%A1%D0%B0%D1%98%D0%B1%D0%B5%D1%80_%D0%BA%D1%80%D0%B8%D0%BC%D0%B8%D0%BD%D0%B0%D0%BB" title="Сајбер криминал – Serbian" lang="sr" hreflang="sr" data-title="Сајбер криминал" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-su mw-list-item"><a href="https://su.wikipedia.org/wiki/Kajahatan_dunya_maya" title="Kajahatan dunya maya – Sundanese" lang="su" hreflang="su" data-title="Kajahatan dunya maya" data-language-autonym="Sunda" data-language-local-name="Sundanese" class="interlanguage-link-target"><span>Sunda</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Tietotekniikkarikollisuus" title="Tietotekniikkarikollisuus – Finnish" lang="fi" hreflang="fi" data-title="Tietotekniikkarikollisuus" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/N%C3%A4tbrottslighet" title="Nätbrottslighet – Swedish" lang="sv" hreflang="sv" data-title="Nätbrottslighet" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-ta mw-list-item"><a href="https://ta.wikipedia.org/wiki/%E0%AE%95%E0%AE%A3%E0%AE%BF%E0%AE%A9%E0%AE%BF_%E0%AE%95%E0%AF%81%E0%AE%B1%E0%AF%8D%E0%AE%B1%E0%AE%AE%E0%AF%8D" title="கணினி குற்றம் – Tamil" lang="ta" hreflang="ta" data-title="கணினி குற்றம்" data-language-autonym="தமிழ்" data-language-local-name="Tamil" class="interlanguage-link-target"><span>தமிழ்</span></a></li><li class="interlanguage-link interwiki-te mw-list-item"><a href="https://te.wikipedia.org/wiki/%E0%B0%B8%E0%B1%88%E0%B0%AC%E0%B0%B0%E0%B1%8D_%E0%B0%95%E0%B1%8D%E0%B0%B0%E0%B1%88%E0%B0%82" title="సైబర్ క్రైం – Telugu" lang="te" hreflang="te" data-title="సైబర్ క్రైం" data-language-autonym="తెలుగు" data-language-local-name="Telugu" class="interlanguage-link-target"><span>తెలుగు</span></a></li><li class="interlanguage-link interwiki-th mw-list-item"><a href="https://th.wikipedia.org/wiki/%E0%B8%AD%E0%B8%B2%E0%B8%8A%E0%B8%8D%E0%B8%B2%E0%B8%81%E0%B8%A3%E0%B8%A3%E0%B8%A1%E0%B8%84%E0%B8%AD%E0%B8%A1%E0%B8%9E%E0%B8%B4%E0%B8%A7%E0%B9%80%E0%B8%95%E0%B8%AD%E0%B8%A3%E0%B9%8C" title="อาชญากรรมคอมพิวเตอร์ – Thai" lang="th" hreflang="th" data-title="อาชญากรรมคอมพิวเตอร์" data-language-autonym="ไทย" data-language-local-name="Thai" class="interlanguage-link-target"><span>ไทย</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Bili%C5%9Fim_su%C3%A7lar%C4%B1" title="Bilişim suçları – Turkish" lang="tr" hreflang="tr" data-title="Bilişim suçları" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%86%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0%B0%D1%86%D1%96%D0%B9%D0%BD%D1%96_%D0%B7%D0%BB%D0%BE%D1%87%D0%B8%D0%BD%D0%B8" title="Інформаційні злочини – Ukrainian" lang="uk" hreflang="uk" data-title="Інформаційні злочини" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D8%B3%D8%A7%D8%A6%D8%A8%D8%B1_%DA%A9%D8%B1%D8%A7%D8%A6%D9%85" title="سائبر کرائم – Urdu" lang="ur" hreflang="ur" data-title="سائبر کرائم" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/T%E1%BB%99i_ph%E1%BA%A1m_c%C3%B4ng_ngh%E1%BB%87_cao" title="Tội phạm công nghệ cao – Vietnamese" lang="vi" hreflang="vi" data-title="Tội phạm công nghệ cao" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E9%9B%BB%E8%85%A6%E7%8A%AF%E7%BD%AA" title="電腦犯罪 – Cantonese" lang="yue" hreflang="yue" data-title="電腦犯罪" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E7%94%B5%E8%84%91%E7%8A%AF%E7%BD%AA" title="电脑犯罪 – Chinese" lang="zh" hreflang="zh" data-title="电脑犯罪" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q29137#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Cybercrime" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Cybercrime" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Cybercrime"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Cybercrime&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Cybercrime&action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Cybercrime"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Cybercrime&action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Cybercrime&action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Cybercrime" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Cybercrime" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Cybercrime&oldid=1259160224" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Cybercrime&action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&page=Cybercrime&id=1259160224&wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCybercrime"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FCybercrime"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&page=Cybercrime&action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Cybercrime&printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Cybercrime" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q29137" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"><span class="mw-redirectedfrom">(Redirected from <a href="/w/index.php?title=Computer_crime&redirect=no" class="mw-redirect" title="Computer crime">Computer crime</a>)</span></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Type of crime based in computer networks</div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Not to be confused with <a href="/wiki/Virtual_crime" title="Virtual crime">Virtual crime</a>.</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><table class="sidebar nomobile nowraplinks hlist"><tbody><tr><th class="sidebar-title" style="background:#ccccff;"><a href="/wiki/Criminology" title="Criminology">Criminology</a></th></tr><tr><td class="sidebar-image"><span class="mw-image-border" typeof="mw:File/Frameless"><a href="/wiki/File:Social_Network_Diagram_(segment).svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/e4/Social_Network_Diagram_%28segment%29.svg/250px-Social_Network_Diagram_%28segment%29.svg.png" decoding="async" width="250" height="97" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/e/e4/Social_Network_Diagram_%28segment%29.svg/375px-Social_Network_Diagram_%28segment%29.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/e/e4/Social_Network_Diagram_%28segment%29.svg/500px-Social_Network_Diagram_%28segment%29.svg.png 2x" data-file-width="670" data-file-height="260" /></a></span></td></tr><tr><th class="sidebar-heading" style="background:#ddddff;"> Main Theories</th></tr><tr><td class="sidebar-content" style="padding-top:0.2em;"> <ul><li><a href="/wiki/Conflict_theories" title="Conflict theories">Conflict theory</a></li> <li><a href="/wiki/Criminalization" title="Criminalization">Criminalization</a></li> <li><a href="/wiki/Differential_association" title="Differential association">Differential association</a></li> <li><a href="/wiki/Integrative_criminology" title="Integrative criminology">Integrative criminology</a></li> <li><a href="/wiki/Rational_choice_theory" class="mw-redirect" title="Rational choice theory">Rational choice theory</a></li> <li><a href="/wiki/Structural_functionalism" title="Structural functionalism">Structural functionalism</a></li> <li><a href="/wiki/Subcultural_theory" title="Subcultural theory">Subcultural theory</a></li> <li><a href="/wiki/Symbolic_interactionism" title="Symbolic interactionism">Symbolic interactionism</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#ddddff;"> Methods</th></tr><tr><td class="sidebar-content" style="padding-top:0.2em;"> <ul><li><a href="/wiki/Comparative_historical_research" title="Comparative historical research">Comparative</a></li> <li><a href="/wiki/Crime_statistics" title="Crime statistics">Crime statistics</a></li> <li><a href="/wiki/Offender_profiling" title="Offender profiling">Profiling</a></li> <li><a href="/wiki/Ethnography" title="Ethnography">Ethnography</a></li> <li><a href="/wiki/Uniform_Crime_Reports" title="Uniform Crime Reports">Uniform Crime Reports</a></li> <li><a href="/wiki/Crime_mapping" title="Crime mapping">Crime mapping</a></li> <li><a href="/wiki/Positivist_school" class="mw-redirect" title="Positivist school">Positivist school</a></li> <li><a href="/wiki/Qualitative_research" title="Qualitative research">Qualitative</a></li> <li><a href="/wiki/Quantitative_methods_in_criminology" title="Quantitative methods in criminology">Quantitative</a></li> <li><a href="/wiki/Bureau_of_Justice_Statistics" title="Bureau of Justice Statistics">BJS</a></li> <li><a href="/wiki/National_Incident-Based_Reporting_System" title="National Incident-Based Reporting System">NIBRS</a></li> <li><a href="/wiki/Recidivism" title="Recidivism">Recidivism</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#ddddff;"> Subfields and other major theories</th></tr><tr><td class="sidebar-content" style="padding-top:0.2em;"> <ul><li><a href="/wiki/American_Society_of_Criminology" title="American Society of Criminology">American</a></li> <li><a href="/wiki/Anthropological_criminology" title="Anthropological criminology">Anthropological</a></li> <li><a href="/wiki/Biosocial_criminology" title="Biosocial criminology">Biosocial criminology</a></li> <li><a href="/wiki/Conflict_criminology" title="Conflict criminology">Conflict</a></li> <li><a href="/wiki/Criminology" title="Criminology">Criminology</a></li> <li><a href="/wiki/Critical_criminology" title="Critical criminology">Critical</a></li> <li><a href="/wiki/Cultural_criminology" title="Cultural criminology">Culture</a></li> <li><a class="mw-selflink selflink"> Cyber</a></li> <li><a href="/wiki/Demography" title="Demography">Demography</a></li> <li><a href="/wiki/Development_theory" title="Development theory">Development</a></li> <li><a href="/wiki/Environmental_criminology" title="Environmental criminology">Environmental</a></li> <li><a href="/wiki/Experimental_criminology" title="Experimental criminology">Experimental</a></li> <li><a href="/wiki/Organizational_theory" title="Organizational theory">Organizational</a></li> <li><a href="/wiki/Political_crime" title="Political crime">Political</a></li> <li><a href="/wiki/Public_criminology" title="Public criminology">Public</a></li> <li><a href="/wiki/Radical_criminology" title="Radical criminology">Radical criminology</a></li></ul></td> </tr><tr><th class="sidebar-heading" style="background:#ddddff;"> Browse</th></tr><tr><td class="sidebar-content" style="padding-top:0.2em;"> <ul><li><a href="/wiki/Bibliography_of_sociology" title="Bibliography of sociology">Bibliography</a></li> <li><a href="/wiki/Index_of_criminology_articles" title="Index of criminology articles">Index</a></li> <li><a href="/wiki/Category:Criminology_journals" title="Category:Criminology journals">Journals</a></li> <li><a href="/wiki/Category:Criminology_organizations" title="Category:Criminology organizations">Organizations</a></li> <li><a href="/wiki/List_of_criminologists" title="List of criminologists">People</a></li></ul></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Criminology" title="Template:Criminology"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Criminology" title="Template talk:Criminology"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Criminology" title="Special:EditPage/Template:Criminology"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <p><b>Cybercrime</b> encompasses a wide range of criminal activities that are carried out using <a href="/wiki/Digital_devices" class="mw-redirect" title="Digital devices">digital devices</a> and/or <a href="/wiki/Computer_network" title="Computer network">networks</a>. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.<sup id="cite_ref-Sukhai_128–132_1-0" class="reference"><a href="#cite_note-Sukhai_128–132-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>In 2000, the tenth <a href="/wiki/United_Nations_Congress_on_the_Prevention_of_Crime_and_the_Treatment_of_Offenders" class="mw-redirect" title="United Nations Congress on the Prevention of Crime and the Treatment of Offenders">United Nations Congress on the Prevention of Crime and the Treatment of Offenders</a> placed cyber crimes into five categories: unauthorized access, damage to computer data or programs, sabotage to hinder the functioning of a computer system or network, unauthorized interception of data within a system or network, and computer espionage.<sup id="cite_ref-Sukhai_128–132_1-1" class="reference"><a href="#cite_note-Sukhai_128–132-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> </p><p>Internationally, both state and non-state actors engage in cybercrimes, including <a href="/wiki/Espionage" title="Espionage">espionage</a>, financial <a href="/wiki/Theft" title="Theft">theft</a>, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as <a href="/wiki/Cyberwarfare" title="Cyberwarfare">cyberwarfare</a>. <a href="/wiki/Warren_Buffett" title="Warren Buffett">Warren Buffett</a> has said that cybercrime is the "number one problem with mankind",<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup> and that it "poses real risks to humanity".<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/World_Economic_Forum" title="World Economic Forum">World Economic Forum's</a> (WEF) 2020 <a href="/wiki/Global_Risks_Report" title="Global Risks Report">Global Risks Report</a> confirmed that organized cybercrime groups are joining forces to commit criminal activities online, while estimating the likelihood of their detection and prosecution to be less than 1 percent in the US.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> There are also many <a href="/wiki/Internet_privacy" title="Internet privacy">privacy</a> concerns surrounding cybercrime when confidential information is intercepted or disclosed, legally or otherwise. </p><p>The World Economic Forum’s 2023 Global Risks Report ranks cybercrime as one of the top 10 risks facing the world today and for the next 10 years.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> If viewed as a nation state, cybercrime would count as the third largest economy in the world.<sup id="cite_ref-:4_6-0" class="reference"><a href="#cite_note-:4-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> In numbers, cybercrime is predicted to cause over 9 trillion US dollars in damages worldwide in 2024.<sup id="cite_ref-:4_6-1" class="reference"><a href="#cite_note-:4-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup>   </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="Classifications">Classifications</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=1" title="Edit section: Classifications"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Computer crime encompasses a broad range of activities, including computer fraud, <a href="/wiki/Financial_crime" title="Financial crime">financial crimes</a>, scams, <a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">cybersex trafficking</a>, and <a href="/wiki/Ad_fraud" title="Ad fraud">ad-fraud</a>.<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-auto2_8-0" class="reference"><a href="#cite_note-auto2-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Computer_fraud">Computer fraud</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=2" title="Edit section: Computer fraud"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></div> <p>Computer fraud is the act of using a computer to take or alter electronic data, or to gain unlawful use of a computer or system.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> Computer fraud that involves the use of the internet is also called <a href="/wiki/Internet_fraud" title="Internet fraud">internet fraud</a>. The legal definition of computer fraud varies by jurisdiction, but typically involves accessing a computer without permission or authorization. </p><p>Forms of computer fraud include <a href="/wiki/Hack_(computer_security)" class="mw-redirect" title="Hack (computer security)">hacking</a> into computers to alter information, distributing malicious code such as <a href="/wiki/Computer_worm" title="Computer worm">computer worms</a> or <a href="/wiki/Computer_virus" title="Computer virus">viruses</a>, installing <a href="/wiki/Malware" title="Malware">malware</a> or <a href="/wiki/Spyware" title="Spyware">spyware</a> to steal data, <a href="/wiki/Phishing" title="Phishing">phishing</a>, and <a href="/wiki/Advance-fee_scam" title="Advance-fee scam">advance-fee scams</a>.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> </p><p>Other forms of fraud may be committed using computer systems, including <a href="/wiki/Bank_fraud" title="Bank fraud">bank fraud</a>, <a href="/wiki/Carding_(fraud)" title="Carding (fraud)">carding</a>, <a href="/wiki/Identity_theft" title="Identity theft">identity theft</a>, <a href="/wiki/Extortion" title="Extortion">extortion</a>, and <a href="/wiki/Classified_information" title="Classified information">theft of classified information</a>. These types of crimes often result in the loss of personal or financial information. </p> <div class="mw-heading mw-heading4"><h4 id="Fraud_Factory">Fraud Factory</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=3" title="Edit section: Fraud Factory"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Fraud_Factory" class="mw-redirect" title="Fraud Factory">Fraud Factory</a></div> <p>Fraud factory is a collection of large fraud organizations usually involving cyber fraud and <a href="/wiki/Human_trafficking" title="Human trafficking">human trafficking</a> operations. </p> <div class="mw-heading mw-heading3"><h3 id="Cyberterrorism">Cyberterrorism</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=4" title="Edit section: Cyberterrorism"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></div> <p>The term <i>cyberterrorism</i> refers to acts of <a href="/wiki/Terrorism" title="Terrorism">terrorism</a> committed through the use of cyberspace or computer resources.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> Acts of disruption of <a href="/wiki/Computer_network" title="Computer network">computer networks</a> and personal computers through <a href="/wiki/Computer_viruses" class="mw-redirect" title="Computer viruses">viruses</a>, <a href="/wiki/Computer_worm" title="Computer worm">worms</a>, <a href="/wiki/Phishing" title="Phishing">phishing</a>, <a href="/wiki/Malicious_software" class="mw-redirect" title="Malicious software">malicious software</a>, hardware, or programming scripts can all be forms of cyberterrorism.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> </p><p>Government officials and <a href="/wiki/Information_technology" title="Information technology">information technology</a> (IT) security specialists have documented a significant increase in network problems and server scams since early 2001. In the United States there is an increasing concern from agencies such as the <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> (FBI) and the <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">Central Intelligence Agency</a> (CIA).<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Cyberextortion">Cyberextortion</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=5" title="Edit section: Cyberextortion"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened with attacks by malicious hackers, often through <a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">denial-of-service attacks</a>. Cyber extortionists demand money in return for promising to stop the attacks and provide "protection". According to the FBI, cyber extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate, and demanding payments to restore their service. More than 20 cases are reported each month to the FBI, and many go unreported in order to keep the victim's name out of the public domain. Perpetrators often use a <a href="/wiki/Distributed_denial-of-service_attack" class="mw-redirect" title="Distributed denial-of-service attack">distributed denial-of-service attack</a>.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> However, other cyberextortion techniques exist, such as <a href="/wiki/Doxing" title="Doxing">doxing</a> and <a href="/wiki/Bug_poaching" title="Bug poaching">bug poaching</a>. An example of cyberextortion was <a href="/wiki/Sony_Pictures_Entertainment_hack" class="mw-redirect" title="Sony Pictures Entertainment hack">the Sony Hack of 2014</a>.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Ransomware">Ransomware</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=6" title="Edit section: Ransomware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></div> <p>Ransomware is a type of malware used in cyberextortion to restrict access to files, sometimes threatening permanent data erasure unless a ransom is paid. Ransomware is a global issue, with more than 300 million attacks worldwide in 2021. According to the 2022 Unit 42 Ransomware Threat Report, in 2021 the average ransom demand in cases handled by <a href="/wiki/Norton_AntiVirus" title="Norton AntiVirus">Norton</a> climbed 144 percent to $2.2 million, and there was an 85 percent increase in the number of victims who had their personal information shown on dark web information dumps.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> A loss of nearly $400 million in 2021 and 2022 is just one of the statistics showing the impact of ransomware attacks on everyday people.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Cybersex_trafficking">Cybersex trafficking</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=7" title="Edit section: Cybersex trafficking"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></div> <p>Cybersex trafficking is the transportation of victims for such purposes as coerced prostitution or the <a href="/wiki/Live_streaming" title="Live streaming">live streaming</a> of coerced sexual acts or <a href="/wiki/Rape" title="Rape">rape</a> on webcam.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-auto1_20-0" class="reference"><a href="#cite_note-auto1-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> Victims are abducted, threatened, or deceived and transferred to "cybersex dens".<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> The dens can be in any location where the cybersex traffickers have a computer, tablet, or phone with an internet connection.<sup id="cite_ref-auto1_20-1" class="reference"><a href="#cite_note-auto1-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> Perpetrators use <a href="/wiki/Social_media" title="Social media">social media</a> networks, <a href="/wiki/Videotelephony" title="Videotelephony">video conferences</a>, dating pages, online chat rooms, apps, <a href="/wiki/Dark_web" title="Dark web">dark web</a> sites,<sup id="cite_ref-auto_25-0" class="reference"><a href="#cite_note-auto-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> and other platforms.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup> They use <a href="/wiki/Online_payment" class="mw-redirect" title="Online payment">online payment systems</a><sup id="cite_ref-auto_25-1" class="reference"><a href="#cite_note-auto-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/Cryptocurrencies" class="mw-redirect" title="Cryptocurrencies">cryptocurrencies</a> to hide their identities.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> Millions of reports of cybersex incidents are sent to authorities annually.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> New legislation and police procedures are needed to combat this type of cybercrime.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> </p><p>There are an estimated 6.3 million victims of cybersex trafficking, according to a recent report by the International Labour Organization.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> This number includes about 1.7 million <a href="/wiki/Child_sexual_abuse" title="Child sexual abuse">child victims</a>. An example of cybersex trafficking is the 2018–2020 <a href="/wiki/Nth_room_case" class="mw-redirect" title="Nth room case">Nth room case</a> in <a href="/wiki/South_Korea" title="South Korea">South Korea</a>.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Cyberwarfare">Cyberwarfare</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=8" title="Edit section: Cyberwarfare"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></div> <p>According to the U.S. <a href="/wiki/United_States_Department_of_Defense" title="United States Department of Defense">Department of Defense</a>, cyberspace has emerged as an arena for national-security threats through several recent events of geostrategic importance, including the attack on <a href="/wiki/Estonia" title="Estonia">Estonia</a>'s infrastructure in 2007, allegedly by Russian hackers. In August 2008, Russia again allegedly conducted cyberattacks against <a href="/wiki/Georgia_(country)" title="Georgia (country)">Georgia</a>. Fearing that such attacks may become a normal part of future warfare among nation-states, military commanders see a need to develop cyberspace operations.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Computers_as_a_tool">Computers as a tool</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=9" title="Edit section: Computers as a tool"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main articles: <a href="/wiki/Internet_fraud" title="Internet fraud">Internet fraud</a>, <a href="/wiki/Spamming" title="Spamming">Spamming</a>, <a href="/wiki/Phishing" title="Phishing">Phishing</a>, and <a href="/wiki/Carding_(fraud)" title="Carding (fraud)">Carding (fraud)</a></div> <p>When an individual is the target of cybercrime, the computer is often the tool rather than the target. These crimes, which typically exploit human weaknesses, usually do not require much technical expertise. These are the types of crimes which have existed for centuries in the offline world. Criminals have simply been given a tool that increases their pool of potential victims and makes them all the harder to trace and apprehend.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> </p><p>Crimes that use computer networks or devices to advance other ends include: </p> <ul><li>Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of "computer as target" as well as "computer as tool")</li> <li>Information warfare</li> <li>Phishing scams</li> <li><a href="/wiki/E-mail_spam" class="mw-redirect" title="E-mail spam">Spam</a></li> <li>Propagation of illegal, obscene, or <a href="/wiki/Offensive_content" class="mw-redirect" title="Offensive content">offensive content</a>, including harassment and threats</li></ul> <p>The unsolicited sending of bulk <a href="/wiki/Email" title="Email">email</a> for commercial purposes (spam) is unlawful <a href="/wiki/E-mail_spam_legislation_by_country" class="mw-redirect" title="E-mail spam legislation by country">in some jurisdictions</a>. </p><p>Phishing is mostly propagated via email. Phishing emails may contain links to other websites that are affected by malware.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> Or they may contain links to fake online banking or other websites used to steal private account information. </p> <div class="mw-heading mw-heading3"><h3 id="Obscene_or_offensive_content">Obscene or offensive content</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=10" title="Edit section: Obscene or offensive content"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The content of websites and other electronic communications may be distasteful, <a href="/wiki/Obscene" class="mw-redirect" title="Obscene">obscene</a>, or offensive for a variety of reasons. In some instances, it may be illegal. What content is unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. </p><p>One area of <a href="/wiki/Internet_pornography" title="Internet pornography">internet pornography</a> that has been the target of the strongest efforts at curtailment is <a href="/wiki/Child_pornography" title="Child pornography">child pornography</a>, which is illegal in most jurisdictions in the world.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (November 2023)">citation needed</span></a></i>]</sup> </p> <div class="mw-heading mw-heading3"><h3 id="Ad-fraud">Ad-fraud</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=11" title="Edit section: Ad-fraud"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Ad_fraud" title="Ad fraud">Ad fraud</a> and <a href="/wiki/Click_fraud" title="Click fraud">Click fraud</a></div> <p>Ad-frauds are particularly popular among cybercriminals, as such frauds are lucrative and unlikely to be prosecuted.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> Jean-Loup Richet, a professor at the <a href="/wiki/Sorbonne_Business_School" class="mw-redirect" title="Sorbonne Business School">Sorbonne Business School</a>, classified the large variety of ad-frauds committed by cybercriminals into three categories: identity fraud, attribution fraud, and ad-fraud services.<sup id="cite_ref-auto2_8-1" class="reference"><a href="#cite_note-auto2-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> </p><p>Identity fraud aims to impersonate real users and inflate audience numbers. The techniques used for identity fraud include traffic from bots (coming from a hosting company, a data center, or compromised devices); <a href="/wiki/Cookie_stuffing" title="Cookie stuffing">cookie stuffing</a>; falsification of user characteristics, such as location and browser type; fake social traffic (misleading users on social networks into visiting the advertised website); and fake social media accounts that make a bot appear legitimate. </p><p>Attribution fraud impersonates the activities of real users, such as clicks and conversations. Many ad-fraud techniques belong to this category: the use of hijacked and malware-infected devices as part of a <a href="/wiki/Botnet" title="Botnet">botnet</a>; click farms (companies where low-wage employees are paid to click or engage in conversations); incentivized browsing; video placement abuse (delivered in display banner slots); hidden ads (which will never be viewed by real users); domain spoofing (ads served on a fake website); and clickjacking, in which the user is forced to click on an ad. </p><p>Ad-fraud services include all online infrastructure and hosting services that might be needed to undertake identity or attribution fraud. Services can involve the creation of spam websites (fake networks of websites that provide artificial backlinks); link building services; hosting services; or fake and scam pages impersonating a famous brand. </p> <div class="mw-heading mw-heading3"><h3 id="Online_harassment">Online harassment<span class="anchor" id="Harassment"></span></h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=12" title="Edit section: Online harassment"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Cyberbullying" title="Cyberbullying">Cyberbullying</a>, <a href="/wiki/Online_predator" title="Online predator">Online predator</a>, <a href="/wiki/Cyberstalking" title="Cyberstalking">Cyberstalking</a>, <a href="/wiki/Cyber_Racism" class="mw-redirect" title="Cyber Racism">Cyber Racism</a>, and <a href="/wiki/Internet_troll" class="mw-redirect" title="Internet troll">Internet troll</a></div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><table class="box-Globalize plainlinks metadata ambox ambox-content ambox-globalize" role="presentation"><tbody><tr><td class="mbox-image"><div class="mbox-image-div"><span typeof="mw:File"><span><img alt="Globe icon." src="//upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Ambox_globe_content.svg/48px-Ambox_globe_content.svg.png" decoding="async" width="48" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Ambox_globe_content.svg/73px-Ambox_globe_content.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/bd/Ambox_globe_content.svg/97px-Ambox_globe_content.svg.png 2x" data-file-width="350" data-file-height="290" /></span></span></div></td><td class="mbox-text"><div class="mbox-text-span">The examples and perspective in this section <b>may not represent a <a href="/wiki/Wikipedia:WikiProject_Countering_systemic_bias" title="Wikipedia:WikiProject Countering systemic bias">worldwide view</a> of the subject</b>.<span class="hide-when-compact"> You may <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Cybercrime&action=edit">improve this section</a>, discuss the issue on the <a href="/wiki/Talk:Cybercrime" title="Talk:Cybercrime">talk page</a>, or create a new section, as appropriate.</span> <span class="date-container"><i>(<span class="date">March 2016</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <p>Whereas content may be offensive in a non-specific way, <a href="/wiki/Harassment" title="Harassment">harassment</a> directs obscenities and derogatory comments at specific individuals, often focusing on gender, <a href="/wiki/Cyber_racism" class="mw-redirect" title="Cyber racism">race</a>, religion, nationality, or sexual orientation. </p><p>Committing a crime using a computer can lead to an enhanced sentence. For example, in the case of <i><a href="/wiki/United_States_v._Neil_Scott_Kramer" class="mw-redirect" title="United States v. Neil Scott Kramer">United States v. Neil Scott Kramer</a></i>, the defendant was given an enhanced sentence according to the <a href="/wiki/U.S._Sentencing_Guidelines_Manual" class="mw-redirect" title="U.S. Sentencing Guidelines Manual">U.S. Sentencing Guidelines Manual</a> §2G1.3(b)(3) for his use of a <a href="/wiki/Cell_phone" class="mw-redirect" title="Cell phone">cell phone</a> to "persuade, induce, entice, coerce, or facilitate the travel of, the minor to engage in prohibited sexual conduct." Kramer appealed the sentence on the grounds that there was insufficient evidence to convict him under this statute because his charge included persuading through a computer device and his cellular phone technically is not a computer. Although Kramer tried to argue this point, the U.S. Sentencing Guidelines Manual states that the term "computer" means "an electronic, magnetic, optical, <a href="/wiki/Electrochemistry" title="Electrochemistry">electrochemical</a>, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device." </p><p>In the United States, at least 41 states have passed laws and regulations that regard extreme online harassment as a criminal act. These acts can also be prosecuted on the federal level, because of US Code 18 Section 2261A, which states that using computers to threaten or harass can lead to a sentence of up to 20 years.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> </p><p>Several countries besides the US have also created laws to combat online harassment. In China, a country with over 20 percent of the world's internet users, in response to the <a href="/wiki/Human_flesh_search_engine" title="Human flesh search engine">Human Flesh Search Engine</a> bullying incident, the Legislative Affairs Office of the State Council passed a strict law against cyberbullying.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> The United Kingdom passed the <a href="/wiki/Malicious_Communications_Act_1988" title="Malicious Communications Act 1988">Malicious Communications Act</a>, which states that sending messages or letters electronically that the government deems "indecent or grossly offensive" and/or language intended to cause "distress and anxiety" can lead to a prison sentence of six months and a potentially large fine.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup>  Australia, while not directly addressing the issue of harassment, includes most forms of online harassment under the Criminal Code Act of 1995. Using telecommunication to send threats, harass, or cause offense is a direct violation of this act.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup> </p><p>Although <a href="/wiki/Freedom_of_speech" title="Freedom of speech">freedom of speech</a> is protected by law in most democratic societies, it does not include all types of speech. Spoken or written threats can be criminalized because they harm or intimidate. This applies to online or network-related threats. </p><p>Cyberbullying has increased drastically with the growing popularity of online social networking. As of January 2020, 44 percent of adult internet users in the United States had "personally experienced online harassment".<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> Online harassment of children often has negative and even life-threatening effects. According to a 2021 survey, 41 percent of children develop social anxiety, 37 percent develop depression, and 26 percent have suicidal thoughts.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/United_Arab_Emirates" title="United Arab Emirates">United Arab Emirates</a> was found to have purchased the <a href="/wiki/NSO_Group" title="NSO Group">NSO Group</a>'s mobile spyware <a href="/wiki/Pegasus_(spyware)" title="Pegasus (spyware)">Pegasus</a> for mass surveillance and a campaign of harassment of prominent activists and journalists, including <a href="/wiki/Ahmed_Mansoor" title="Ahmed Mansoor">Ahmed Mansoor</a>, <a href="/wiki/Latifa_bint_Mohammed_Al_Maktoum" class="mw-redirect" title="Latifa bint Mohammed Al Maktoum">Princess Latifa</a>, <a href="/wiki/Princess_Haya_bint_Hussein" title="Princess Haya bint Hussein">Princess Haya</a>, and others. <a href="/wiki/Ghada_Owais" title="Ghada Owais">Ghada Owais</a> was one of the many high-profile female journalists and activists who were targeted. She filed a lawsuit against UAE ruler <a href="/wiki/Mohamed_bin_Zayed_Al_Nahyan" title="Mohamed bin Zayed Al Nahyan">Mohamed bin Zayed Al Nahyan</a> along with other defendants, accusing them of sharing her photos online.<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Drug_trafficking">Drug trafficking</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=13" title="Edit section: Drug trafficking"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Darknet_market" title="Darknet market">Darknet markets</a> are used to buy and sell <a href="/wiki/Recreational_drug_use" title="Recreational drug use">recreational drugs</a> online. Some <a href="/wiki/Drug_trafficker" class="mw-redirect" title="Drug trafficker">drug traffickers</a> use <a href="/wiki/End-to-end_encryption" title="End-to-end encryption">encrypted</a> messaging tools to communicate with drug mules or potential customers. The dark web site <a href="/wiki/Silk_Road_(marketplace)" title="Silk Road (marketplace)">Silk Road</a>, which started operations in 2011, was the first major online marketplace for drugs. It was permanently shut down in October 2013 by the FBI and Europol. After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged. However, it was just an older marketplace named <a href="/wiki/Darknet_market" title="Darknet market">Diabolus Market</a> that used the Silk Road name in order to get more exposure from the Silk Road brand's earlier success.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup> </p><p>Darknet markets have had a rise in traffic in recent years for many reasons, such as the anonymous purchases and often a system of reviews by other buyers.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup> There are many ways in which darknet markets can financially drain individuals. Vendors and customers alike go to great lengths to keep their identities a secret while online. Commonly used tools for hiding their online presence include <a href="/wiki/Virtual_private_networks" class="mw-redirect" title="Virtual private networks">virtual private networks (VPNs)</a>, <a href="/wiki/Tails_(operating_system)" title="Tails (operating system)">Tails</a>, and the <a href="/wiki/Tor_Browser" class="mw-redirect" title="Tor Browser">Tor Browser</a>. Darknet markets entice customers by making them feel comfortable. Although people can easily gain access to a Tor browser, actually gaining access to an illicit market is not as simple as typing it in on a search engine, as one would with Google. Darknet markets have special links that change frequently, ending in <a href="/wiki/.onion" title=".onion">.onion</a> as opposed to the typical <a href="/wiki/.com" title=".com">.com</a>, .net, and <a href="/wiki/.org" title=".org">.org</a> domain extensions. To add to privacy, the most prevalent currency on these markets is Bitcoin, which allows transactions to be anonymous.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup> </p><p>A problem that marketplace users sometimes face is exit scamming.<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> That is, a vendor with a high rating acts as if they are selling on the market and have users pay for products they never receive.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> The vendor then closes their account after receiving money from multiple buyers and never sending what was paid for. The vendors, all of whom are involved in illegal activities, have no reason not to engage in exit scamming when they no longer want to be a vendor. In 2019, an entire market known as Wall Street Market allegedly exit scammed, stealing $30 million dollars in bitcoin.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> </p><p>The FBI has cracked down on these markets. In July 2017, the FBI seized one of the biggest markets, commonly called <a href="/wiki/AlphaBay" title="AlphaBay">Alphabay</a>, which re-opened in August 2021 under the control of DeSnake, one of the original administrators.<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-WIRED_54-0" class="reference"><a href="#cite_note-WIRED-54"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> Investigators pose as buyers and order products from darknet vendors in the hope that the vendors leave a trail the investigators can follow. In one case an investigator posed as a firearms seller, and for six months people purchased from them and provided home addresses.<sup id="cite_ref-:12_55-0" class="reference"><a href="#cite_note-:12-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> The FBI was able to make over a dozen arrests during this six-month investigation.<sup id="cite_ref-:12_55-1" class="reference"><a href="#cite_note-:12-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> Another crackdown targeted vendors selling <a href="/wiki/Fentanyl" title="Fentanyl">fentanyl</a> and <a href="/wiki/Opiates" class="mw-redirect" title="Opiates">opiates</a>. With thousands of people dying each year due to drug overdose, investigators have made internet drug sales a priority.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> Many vendors do not realize the extra criminal charges that go along with selling drugs online, such as money laundering and illegal use of the mail.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup> In 2019, a vendor was sentenced to 10 years in prison after selling cocaine and methamphetamine under the name JetSetLife.<sup id="cite_ref-58" class="reference"><a href="#cite_note-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup> But despite the large amount of time investigators spend tracking down people, in 2018 only 65 suspects who bought and sold illegal goods on some of the biggest markets were identified.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> Meanwhile, thousands of transactions take place daily on these markets. </p> <div class="mw-heading mw-heading2"><h2 id="Notable_incidents">Notable incidents</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=14" title="Edit section: Notable incidents"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>One of the highest-profile banking computer crimes occurred over a course of three years beginning in 1970. The chief teller at the Park Avenue branch of New York's <a href="/wiki/Union_Dime_Savings_Bank" title="Union Dime Savings Bank">Union Dime Savings Bank</a> embezzled over $1.5 million from hundreds of accounts.<sup id="cite_ref-Weitzer_60-0" class="reference"><a href="#cite_note-Weitzer-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup></li> <li>In 2014, the <a href="/wiki/Sony_Pictures_Entertainment_hack" class="mw-redirect" title="Sony Pictures Entertainment hack">Sony Pictures Entertainment hack</a> not only exposed sensitive company data but also led to extortion demands, marking one of the most publicized corporate cyberattacks to date. For more detailed insights on cyber blackmail and notable incidents, visit [C9 Journal](<a rel="nofollow" class="external free" href="https://c9journal.com/cyber-blackmail-definition-prevention-and-response/">https://c9journal.com/cyber-blackmail-definition-prevention-and-response/</a>).</li> <li>A hacking group called MOD (Masters of Deception) allegedly stole passwords and technical data from <a href="/wiki/Pacific_Bell" title="Pacific Bell">Pacific Bell</a>, <a href="/wiki/Nynex" class="mw-redirect" title="Nynex">Nynex</a>, and other telephone companies as well as several big credit agencies and two major universities. The damage caused was extensive; one company, <a href="/wiki/Southwestern_Bell" title="Southwestern Bell">Southwestern Bell</a>, suffered losses of $370,000.<sup id="cite_ref-Weitzer_60-1" class="reference"><a href="#cite_note-Weitzer-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup></li> <li>In 1983, a 19-year-old UCLA student used his PC to break into a Defense Department International Communications system.<sup id="cite_ref-Weitzer_60-2" class="reference"><a href="#cite_note-Weitzer-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup></li> <li>Between 1995 and 1998 the <a href="/wiki/News_Corporation_(1980%E2%80%932013)" class="mw-redirect" title="News Corporation (1980–2013)">Newscorp</a> satellite pay-to-view encrypted <a href="/wiki/Sky_Digital_(UK_%26_Ireland)" class="mw-redirect" title="Sky Digital (UK & Ireland)">SKY-TV</a> service was hacked several times during an ongoing technological <a href="/wiki/Arms_race" title="Arms race">arms race</a> between a pan-European hacking group and Newscorp. The original motivation of the hackers was to watch <i>Star Trek</i> reruns in Germany, which was something which Newscorp did not have the copyright permission to allow.<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup></li> <li>On 26 March 1999, the <a href="/wiki/Melissa_(computer_virus)" title="Melissa (computer virus)">Melissa worm</a> infected a document on a victim's computer, then automatically emailed that document and a copy of the virus to other people.</li> <li>In February 2000, an individual going by the alias of <a href="/wiki/MafiaBoy" class="mw-redirect" title="MafiaBoy">MafiaBoy</a> began a series of <a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">denial-of-service attacks</a> against high-profile websites, including <a href="/wiki/Yahoo!" class="mw-redirect" title="Yahoo!">Yahoo!</a>, <a href="/wiki/Dell,_Inc." class="mw-redirect" title="Dell, Inc.">Dell, Inc.</a>, <a href="/wiki/E*TRADE" class="mw-redirect" title="E*TRADE">E*TRADE</a>, <a href="/wiki/EBay" title="EBay">eBay</a>, and <a href="/wiki/CNN" title="CNN">CNN</a>. About 50 computers at <a href="/wiki/Stanford_University" title="Stanford University">Stanford University</a>, along with computers at the University of California at Santa Barbara, were among the <a href="/wiki/Zombie_computer" class="mw-redirect" title="Zombie computer">zombie computers</a> sending pings in the <a href="/wiki/DDoS" class="mw-redirect" title="DDoS">distributed denial-of-service</a> attacks. On 3 August 2000, Canadian federal prosecutors charged MafiaBoy with 54 counts of illegal access to computers.</li> <li>The <a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a> worm corrupted SCADA microprocessors, particularly the types used in <a href="/wiki/Siemens" title="Siemens">Siemens</a> centrifuge controllers.</li> <li>The <a href="/wiki/Russian_Business_Network" title="Russian Business Network">Russian Business Network</a> (RBN) was registered as an internet site in 2006. Initially, much of its activity was legitimate. But apparently the founders soon discovered that it was more profitable to host illegitimate activities and to offer its services to criminals. The RBN has been described by <a href="/wiki/VeriSign" class="mw-redirect" title="VeriSign">VeriSign</a> as "the baddest of the bad".<sup id="cite_ref-econ20070930_62-0" class="reference"><a href="#cite_note-econ20070930-62"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> It provides web hosting services and internet access to all kinds of criminal and objectionable activities that earn up to $150 million in one year. It specializes in <a href="/wiki/Personally_identifiable_information" class="mw-redirect" title="Personally identifiable information">personal identity theft</a> for resale. It is the originator of <a href="/wiki/MPack_(software)" title="MPack (software)">MPack</a> and an alleged operator of the now defunct <a href="/wiki/Storm_botnet" title="Storm botnet">Storm botnet</a>.</li> <li>On 2 March 2010, Spanish investigators arrested three men suspected of infecting over 13 million computers around the world. The botnet of infected computers included PCs inside more than half of the <a href="/wiki/Fortune_1000" title="Fortune 1000">Fortune 1000</a> companies and more than 40 major banks, according to investigators.<sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup></li> <li>In August 2010, the US Department of Homeland Security shut down the international <a href="/wiki/Pedophile_ring" class="mw-redirect" title="Pedophile ring">pedophile ring</a> Dreamboard. The website had approximately 600 members and may have distributed up to 123 <a href="/wiki/Terabyte" class="mw-redirect" title="Terabyte">terabytes</a> of child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest US prosecution of an international child pornography ring; 52 arrests were made worldwide.<sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup></li> <li>In January 2012, <a href="/wiki/Zappos.com" class="mw-redirect" title="Zappos.com">Zappos.com</a> experienced a security breach compromising the credit card numbers, personal information, and billing and shipping addresses of as many as 24 million customers.<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup></li> <li>In June 2012, <a href="/wiki/LinkedIn" title="LinkedIn">LinkedIn</a> and <a href="/wiki/EHarmony" title="EHarmony">eHarmony</a> were attacked, and 65 million <a href="/wiki/Password_hash" class="mw-redirect" title="Password hash">password hashes</a> were compromised. Thirty thousand passwords were cracked, and 1.5 million eHarmony passwords were posted online.<sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup></li> <li>In December 2012, the <a href="/wiki/Wells_Fargo" title="Wells Fargo">Wells Fargo</a> website experienced a denial-of-service attack that potentially compromised 70 million customers and 8.5 million active viewers. Other banks thought to be compromised included <a href="/wiki/Bank_of_America" title="Bank of America">Bank of America</a>, <a href="/wiki/J._P._Morgan" title="J. P. Morgan">J. P. Morgan</a>, <a href="/wiki/U.S._Bancorp" title="U.S. Bancorp">U.S. Bank</a>, and <a href="/wiki/PNC_Bank" class="mw-redirect" title="PNC Bank">PNC Financial Services</a>.<sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup></li> <li>On 23 April 2013, the Twitter account of the Associated Press was hacked. The hacker posted a hoax tweet about fictitious attacks on the White House that they claimed left then-<a href="/wiki/Barack_Obama" title="Barack Obama">President Obama</a> injured.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup> The hoax tweet resulted in a brief plunge of 130 points in the <a href="/wiki/Dow_Jones_Industrial_Average" title="Dow Jones Industrial Average">Dow Jones Industrial Average</a>, the removal of $136 billion from the <a href="/wiki/S%26P_500" title="S&P 500">S&P 500</a> index,<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> and the temporary suspension of AP's Twitter account. The Dow Jones later restored its session gains.</li> <li>In May 2017, 74 countries logged a <a href="/wiki/Ransomware" title="Ransomware">ransomware</a> cybercrime called "<a href="/wiki/WannaCry" class="mw-redirect" title="WannaCry">WannaCry</a>".<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup></li> <li>Illicit access to camera sensors, microphone sensors, phonebook contacts, all internet-enabled apps, and metadata of mobile telephones running Android and iOS was reportedly provided by Israeli spyware that was found to be in operation in at least 46 nation-states around the world. Journalists, royalty, and government officials were among the targets.<sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup> Earlier accusations that Israeli weapons companies were meddling in international telephony<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup> and smartphones<sup id="cite_ref-75" class="reference"><a href="#cite_note-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> have been eclipsed by the <a href="/wiki/Pegasus_(spyware)" title="Pegasus (spyware)">2018 Pegasus spyware revelations</a>.</li> <li>In December 2019, <a href="/wiki/United_States_Intelligence_Community" title="United States Intelligence Community">US intelligence officials</a> and <i><a href="/wiki/The_New_York_Times" title="The New York Times">The New York Times</a></i> revealed that <a href="/wiki/ToTok_(app)" class="mw-redirect" title="ToTok (app)">ToTok</a>, a messaging application widely used in the <a href="/wiki/United_Arab_Emirates" title="United Arab Emirates">United Arab Emirates</a>, is a <a href="/wiki/Espionage" title="Espionage">spying</a> tool for the UAE. An investigation revealed that the Emirati government was attempting to track every conversation, movement, relationship, appointment, sound, and image of those who installed the app on their phones.<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Combating_computer_crime">Combating computer crime</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=15" title="Edit section: Combating computer crime"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Due to cybercriminals using the internet for cross-border attacks and crimes, the process of prosecuting cybercriminals has been difficult. The number of vulnerabilities that a cybercriminal could use as points of opportunity to exploit has also increased over the years. From 2008 to 2014 alone, there has been a 17.75% increase in vulnerabilities across all online devices.<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> The internet's expansive reach causes the damage inflicted to people to be magnified since many methods of cybercrime have the opportunity to reach many people. The availability of virtual spaces<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup> has allowed cybercrime to become an everyday occurrence.<sup id="cite_ref-:0_79-0" class="reference"><a href="#cite_note-:0-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> In 2018, the <a href="/wiki/Internet_Crime_Complaint_Center" title="Internet Crime Complaint Center">Internet Crime Complaint Center</a> received 351,937 complaints of cybercrime, which led to $2.7 billion lost.<sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Investigation">Investigation</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=16" title="Edit section: Investigation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In a criminal investigation, a computer can be a source of evidence (see <a href="/wiki/Digital_forensics" title="Digital forensics">digital forensics</a>). Even when a computer is not directly used for criminal purposes, it may contain records of value to criminal investigators in the form of a <a href="/wiki/Logfile" class="mw-redirect" title="Logfile">logfile</a>. In many countries,<sup id="cite_ref-Zehra_Ali_81-0" class="reference"><a href="#cite_note-Zehra_Ali-81"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Internet_Service_Providers" class="mw-redirect" title="Internet Service Providers">Internet Service Providers</a> are required by law to keep their logfiles for a predetermined amount of time. </p><p>There are many ways for cybercrime to take place, and investigations tend to start with an <a href="/wiki/IP_Address" class="mw-redirect" title="IP Address">IP Address</a> trace; however, that does not necessarily enable detectives to solve a case. Different types of high-tech crime may also include elements of low-tech crime, and vice versa, making cybercrime investigators an indispensable part of modern law enforcement. Methods of cybercrime detective work are dynamic and constantly improving, whether in closed police units or in the framework of international cooperation.<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup> </p> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Tommy_Tuberville_touring_the_National_Computer_Forensic_Institute_in_2021.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/1/11/Tommy_Tuberville_touring_the_National_Computer_Forensic_Institute_in_2021.jpg/220px-Tommy_Tuberville_touring_the_National_Computer_Forensic_Institute_in_2021.jpg" decoding="async" width="220" height="165" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/11/Tommy_Tuberville_touring_the_National_Computer_Forensic_Institute_in_2021.jpg/330px-Tommy_Tuberville_touring_the_National_Computer_Forensic_Institute_in_2021.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/11/Tommy_Tuberville_touring_the_National_Computer_Forensic_Institute_in_2021.jpg/440px-Tommy_Tuberville_touring_the_National_Computer_Forensic_Institute_in_2021.jpg 2x" data-file-width="1024" data-file-height="768" /></a><figcaption>Senator <a href="/wiki/Tommy_Tuberville" title="Tommy Tuberville">Tommy Tuberville</a> touring the National Computer Forensic Institute in <a href="/wiki/Hoover,_Alabama" title="Hoover, Alabama">Hoover, Alabama</a>, in 2021</figcaption></figure> <p>In the United States, the FBI<sup id="cite_ref-:1_83-0" class="reference"><a href="#cite_note-:1-83"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> and the <a href="/wiki/United_States_Department_of_Homeland_Security" title="United States Department of Homeland Security">Department of Homeland Security</a> (DHS)<sup id="cite_ref-:2_84-0" class="reference"><a href="#cite_note-:2-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup> are government agencies that combat cybercrime. The FBI has trained agents and analysts in cybercrime placed in their field offices and headquarters.<sup id="cite_ref-:1_83-1" class="reference"><a href="#cite_note-:1-83"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> In the DHS, the <a href="/wiki/United_States_Secret_Service" title="United States Secret Service">Secret Service</a> has a Cyber Intelligence Section that works to target financial cybercrimes. They combat international cybercrime and work to protect institutions such as banks from intrusions and information breaches. Based in Alabama, the Secret Service and the Alabama Office of Prosecution Services work together to train professionals in law enforcement at the National Computer Forensic Institute.<sup id="cite_ref-:2_84-1" class="reference"><a href="#cite_note-:2-84"><span class="cite-bracket">[</span>84<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">[</span>85<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-:3_86-0" class="reference"><a href="#cite_note-:3-86"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> The NCFI provides "state and local members of the law enforcement community with training in cyber incident response, investigation, and forensic examination in cyber incident response, investigation, and forensic examination."<sup id="cite_ref-:3_86-1" class="reference"><a href="#cite_note-:3-86"><span class="cite-bracket">[</span>86<span class="cite-bracket">]</span></a></sup> </p><p>Investigating cyber crime within the United States and globally often requires partnerships. Within the United States, cyber crime may be investigated by law enforcement, the Department of Homeland Security, among other federal agencies. However, as the world becomes more dependent on technology, cyber attacks and cyber crime are going to expand as threat actors will continue to exploit weaknesses in protection and existing vulnerabilities to achieve their end goals, often being data theft or exfiltration. To combat cybercrime, the United States Secret Service maintains an Electronic Crimes Task Force which extends beyond the United States as it helps to locate threat actors that are located globally and performing cyber related crimes within the United States. The Secret Service is also responsible for the National Computer Forensic Institute which allows law enforcement and people of the court to receive cyber training and information on how to combat cyber crime. The United States Immigration and Customs Enforcement is responsible for the Cyber Crimes Center (C3) providing cyber crime related services for federal, state, local and international agencies. Finally, the United States also has resources relating to Law Enforcement Cyber Incident Reporting to allow local and state agencies to understand how, when, and what should be reported as a cyber incident to the federal government.<sup id="cite_ref-87" class="reference"><a href="#cite_note-87"><span class="cite-bracket">[</span>87<span class="cite-bracket">]</span></a></sup> </p><p>Because cybercriminals commonly use encryption and other techniques to hide their identity and location, it can be difficult to trace a perpetrator after a crime is committed, so prevention measures are crucial.<sup id="cite_ref-:0_79-1" class="reference"><a href="#cite_note-:0-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-88" class="reference"><a href="#cite_note-88"><span class="cite-bracket">[</span>88<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Prevention">Prevention</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=17" title="Edit section: Prevention"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Department of Homeland Security also instituted the Continuous Diagnostics and Mitigation (CDM) Program.<sup id="cite_ref-89" class="reference"><a href="#cite_note-89"><span class="cite-bracket">[</span>89<span class="cite-bracket">]</span></a></sup> The CDM Program monitors and secures government networks by tracking network risks and informing system personnel so that they can take action. In an attempt to catch intrusions before the damage is done, the DHS created the Enhanced Cybersecurity Services (ECS).<sup id="cite_ref-ECS_1_90-0" class="reference"><a href="#cite_note-ECS_1-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup> The <a href="/wiki/Cybersecurity_and_Infrastructure_Security_Agency" title="Cybersecurity and Infrastructure Security Agency">Cyber Security and Infrastructure Security Agency</a> approves the private partners that provide intrusion detection and prevention services through the ECS.<sup id="cite_ref-ECS_1_90-1" class="reference"><a href="#cite_note-ECS_1-90"><span class="cite-bracket">[</span>90<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-91" class="reference"><a href="#cite_note-91"><span class="cite-bracket">[</span>91<span class="cite-bracket">]</span></a></sup> </p><p>Cybersecurity professionals have been skeptical of prevention-focused strategies.<sup id="cite_ref-92" class="reference"><a href="#cite_note-92"><span class="cite-bracket">[</span>92<span class="cite-bracket">]</span></a></sup> The mode of use of cybersecurity products has also been called into question. <a href="/wiki/Shuman_Ghosemajumder" title="Shuman Ghosemajumder">Shuman Ghosemajumder</a> has argued that individual companies using a combination of products for security is not a scalable approach and has advocated for the use of cybersecurity technology primarily at the platform level.<sup id="cite_ref-93" class="reference"><a href="#cite_note-93"><span class="cite-bracket">[</span>93<span class="cite-bracket">]</span></a></sup> </p><p>On a personal level, there are some strategies available to defend against cybercrime:<sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">[</span>94<span class="cite-bracket">]</span></a></sup> </p> <ul><li>Keeping your software and operating system update to benefit from security patches</li> <li>Using anti-virus software that can detect and remove malicious threats</li> <li>Use strong passwords with a variety of characters that aren't easy to guess</li> <li>Refrain from opening attachments from spam emails</li> <li>Do not click on links from spam emails</li> <li>Do not give out personal information over the internet unless you can verify that the destination is safe</li> <li>Contact companies about suspicious requests of your information</li></ul> <div class="mw-heading mw-heading3"><h3 id="Legislation">Legislation</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=18" title="Edit section: Legislation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Because of weak laws, cybercriminals operating from developing countries can often evade detection and prosecution. In countries such as the <a href="/wiki/Philippines" title="Philippines">Philippines</a>, laws against cybercrime are weak or sometimes nonexistent. Cybercriminals can then strike from across international borders and remain undetected. Even when identified, these criminals can typically avoid being extradited to a country such as the US that has laws that allow for prosecution. For this reason, agencies such as the <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">FBI</a> have used deception and subterfuge to catch criminals. For example, two Russian hackers had been evading the FBI for some time. The FBI set up a fake computing company based in Seattle, Washington. They proceeded to lure the two Russian men into the United States by offering them work with this company. Upon completion of the interview, the suspects were arrested. Clever tricks like that are sometimes a necessary part of catching cybercriminals when weak laws and limited international cooperation make it impossible otherwise.<sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">[</span>95<span class="cite-bracket">]</span></a></sup> </p><p>The first cyber related law in the United States was the Privacy Act of 1974 which was only required for federal agencies to follow to ensure privacy and protection of personally identifiable information (PII). However, since 1974, in the United States other laws and regulations have been drafted and implemented, but there is still a gap in responding to current cyber related crime. The most recent cyber related law, according to NIST, was the NIST Small Business Cybersecurity Act, which came out in 2018, and provides guidelines to small businesses to ensure that cybersecurity risks are being identified and addressed accurately.<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">[</span>96<span class="cite-bracket">]</span></a></sup> </p><p>During President Barack Obama's presidency three cybersecurity related bills were signed into order in December 2014. The first was the Federal Information Security Modernization Act of 2014, the second was the National Cybersecurity Protection Act of 2014, and the third was the Cybersecurity Enhancement Act of 2014. Although the Federal Information Security Modernization Act of 2014 was just an update of an older version of the act, it focused on the practices federal agencies were to abide by relating to cybersecurity. While the National Cybersecurity Protection Act of 2014 was aimed toward increasing the amount of information sharing that occurs across the federal and private sector to improve cybersecurity amongst the industries. Finally, the Cybersecurity Enhancement Act of 2014 relates to cybersecurity research and education.<sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">[</span>97<span class="cite-bracket">]</span></a></sup> </p><p>In April 2015, then-President Barack Obama released an executive order that allows the US to freeze the assets of convicted cybercriminals and block their economic activity within the United States.<sup id="cite_ref-98" class="reference"><a href="#cite_note-98"><span class="cite-bracket">[</span>98<span class="cite-bracket">]</span></a></sup> </p><p>The European Union adopted cybercrime directive 2013/40/EU, which was elaborated upon in the <a href="/wiki/Council_of_Europe" title="Council of Europe">Council of Europe</a>'s <a href="/wiki/Convention_on_Cybercrime" title="Convention on Cybercrime">Convention on Cybercrime</a>.<sup id="cite_ref-99" class="reference"><a href="#cite_note-99"><span class="cite-bracket">[</span>99<span class="cite-bracket">]</span></a></sup> </p><p>It is not only the US and the European Union that have been introducing measures against cybercrime. On 31 May 2017, China announced that its new cybersecurity law was taking effect.<sup id="cite_ref-100" class="reference"><a href="#cite_note-100"><span class="cite-bracket">[</span>100<span class="cite-bracket">]</span></a></sup> </p><p>In Australia, legislation to combat cybercrime includes the <a href="/wiki/Criminal_Code_Act_1995" class="mw-redirect" title="Criminal Code Act 1995">Criminal Code Act 1995</a>, the <a href="/wiki/Telecommunications_Act_1997" title="Telecommunications Act 1997">Telecommunications Act 1997</a>, and the <a href="/w/index.php?title=Enhancing_Online_Safety_Act_2015&action=edit&redlink=1" class="new" title="Enhancing Online Safety Act 2015 (page does not exist)">Enhancing Online Safety Act 2015</a>. </p> <div class="mw-heading mw-heading3"><h3 id="Penalties">Penalties</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=19" title="Edit section: Penalties"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Penalties for computer-related crimes in <a href="/wiki/New_York_(state)" title="New York (state)">New York State</a> can range from a fine and a short period of jail time for a Class A misdemeanor, such as unauthorized use of a computer, up to 3 to 15 years in prison for a Class C felony, such as computer tampering in the first degree.<sup id="cite_ref-OMH_101-0" class="reference"><a href="#cite_note-OMH-101"><span class="cite-bracket">[</span>101<span class="cite-bracket">]</span></a></sup> </p><p>However, some former cybercriminals have been hired as information security experts by private companies due to their inside knowledge of computer crime, a phenomenon which theoretically could create <a href="/wiki/Moral_hazard" title="Moral hazard">perverse incentives</a>. A possible counter to this is for courts to ban convicted hackers from using the internet or computers, even after they have been released from prison – though as computers and the internet become more and more central to everyday life, this type of punishment becomes more and more draconian. Nuanced approaches have been developed that manage cyber offenders' behavior without resorting to total computer or internet bans.<sup id="cite_ref-102" class="reference"><a href="#cite_note-102"><span class="cite-bracket">[</span>102<span class="cite-bracket">]</span></a></sup> These approaches involve restricting individuals to specific devices which are subject to monitoring or searches by probation or parole officers.<sup id="cite_ref-103" class="reference"><a href="#cite_note-103"><span class="cite-bracket">[</span>103<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Awareness">Awareness</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=20" title="Edit section: Awareness"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Cybercrime is becoming more of a threat in our society. According to Accenture's State of Cybersecurity, security attacks increased 31% from 2020 to 2021. The number of attacks per company increased from 206 to 270. Due to this rising threat, the importance of raising awareness about measures to protect information and the tactics criminals use to steal that information is paramount. However, despite cybercrime becoming a mounting problem, many people are not aware of the severity of this problem. This could be attributed to a lack of experience and knowledge of technological issues. There are 1.5 million cyber-attacks annually, which means that there are over 4,000 attacks a day, 170 attacks every hour, or nearly three attacks every minute, with studies showing that only 16 percent of victims had asked the people who were carrying out the attacks to stop.<sup id="cite_ref-104" class="reference"><a href="#cite_note-104"><span class="cite-bracket">[</span>104<span class="cite-bracket">]</span></a></sup> Comparitech's 2023 study shows that cybercrime victims have peaked to 71 million annually, which means there is a cyberattack every 39 seconds.<sup id="cite_ref-105" class="reference"><a href="#cite_note-105"><span class="cite-bracket">[</span>105<span class="cite-bracket">]</span></a></sup> Anybody who uses the internet for any reason can be a victim, which is why it is important to be aware of how to be protected while online. </p> <div class="mw-heading mw-heading3"><h3 id="Intelligence">Intelligence</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=21" title="Edit section: Intelligence"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As cybercrime proliferated, a professional ecosystem evolved to support individuals and groups seeking to profit from cybercrime activities. The ecosystem has become quite specialized, and includes malware developers, botnet operators, professional cybercrime groups, groups specializing in the sale of stolen content, and so forth. A few of the leading cybersecurity companies have the skills and resources to follow the activities of these individuals and groups.<sup id="cite_ref-DT_1_106-0" class="reference"><a href="#cite_note-DT_1-106"><span class="cite-bracket">[</span>106<span class="cite-bracket">]</span></a></sup> A wide variety of information that can be used for defensive purposes is available from these sources, for example, technical indicators such as hashes of infected files<sup id="cite_ref-fireeye.com_107-0" class="reference"><a href="#cite_note-fireeye.com-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> and malicious IPs/URLs,<sup id="cite_ref-fireeye.com_107-1" class="reference"><a href="#cite_note-fireeye.com-107"><span class="cite-bracket">[</span>107<span class="cite-bracket">]</span></a></sup> as well as strategic information profiling the goals and techniques of the profiled groups. Much of it is freely available, but consistent, ongoing access typically requires a subscription. Some in the corporate sector see a crucial role for <a href="/wiki/Artificial_intelligence" title="Artificial intelligence">artificial intelligence</a> in the future development of cybersecurity.<sup id="cite_ref-108" class="reference"><a href="#cite_note-108"><span class="cite-bracket">[</span>108<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-109" class="reference"><a href="#cite_note-109"><span class="cite-bracket">[</span>109<span class="cite-bracket">]</span></a></sup> </p><p>Interpol's Cyber Fusion Center began a collaboration with key cybersecurity players to distribute information on the latest online scams, cyber threats, and risks to internet users. Since 2017, reports on social engineering frauds, ransomware, phishing, and other attacks have been distributed to security agencies in over 150 countries.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">[</span>110<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Spread_of_cybercrime">Spread of cybercrime</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=22" title="Edit section: Spread of cybercrime"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The increasing prevalence of cybercrime has resulted in more attention to computer crime detection and prosecution. </p><p>Hacking has become less complex as hacking communities disseminate their knowledge through the internet.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (January 2024)">citation needed</span></a></i>]</sup> Blogs and social networks have contributed substantially to information sharing, so that beginners can benefit from older hackers' knowledge and advice. </p><p>Furthermore, hacking is cheaper than ever. Before the <a href="/wiki/Cloud_computing" title="Cloud computing">cloud computing</a> era, in order to spam or scam, one needed a variety of resources, such as a dedicated server; skills in server management, network configuration, and network maintenance; and knowledge of internet service provider standards. By comparison, a <a href="/wiki/Software-as-a-service" class="mw-redirect" title="Software-as-a-service">software-as-a-service</a> for mail is a scalable and inexpensive bulk e-mail-sending service for marketing purposes that could be easily set up for spam.<sup id="cite_ref-111" class="reference"><a href="#cite_note-111"><span class="cite-bracket">[</span>111<span class="cite-bracket">]</span></a></sup> Cloud computing could help cybercriminals leverage their attacks, whether brute-forcing a password, improving the reach of a botnet, or facilitating a spamming campaign.<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">[</span>112<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Agencies">Agencies</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=23" title="Edit section: Agencies"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/ASEAN" title="ASEAN">ASEAN</a><sup id="cite_ref-113" class="reference"><a href="#cite_note-113"><span class="cite-bracket">[</span>113<span class="cite-bracket">]</span></a></sup></li> <li><a href="/wiki/Australian_High_Tech_Crime_Centre" title="Australian High Tech Crime Centre">Australian High Tech Crime Centre</a></li> <li><a href="/wiki/Cyber_Crime_Investigation_Cell" class="mw-redirect" title="Cyber Crime Investigation Cell">Cyber Crime Investigation Cell</a>, a wing of Mumbai Police, India</li> <li><a href="/wiki/Cyber_Crime_Unit_(Hellenic_Police)" title="Cyber Crime Unit (Hellenic Police)">Cyber Crime Unit (Hellenic Police)</a>, established in Greece in 2004</li> <li><a href="/wiki/Europol" title="Europol">EUROPOL</a></li> <li><a href="/wiki/Interpol" title="Interpol">INTERPOL</a></li> <li><a href="/wiki/National_Cyber_Crime_Unit" title="National Cyber Crime Unit">National Cyber Crime Unit</a>, in the United Kingdom</li> <li><a href="/wiki/National_Security_Agency" title="National Security Agency">National Security Agency</a>, in the United States</li> <li><a href="/wiki/National_Special_Crime_Unit_(Denmark)" title="National Special Crime Unit (Denmark)">National Special Crime Unit</a>, in Denmark.</li> <li><a href="/wiki/National_White_Collar_Crime_Center" title="National White Collar Crime Center">National White Collar Crime Center</a>, in the United States</li> <li><a href="/wiki/Cyber_Terror_Response_Center" title="Cyber Terror Response Center">Cyber Terror Response Center</a> - Korea National Police Agency</li> <li><a href="https://ja.wikipedia.org/wiki/%E3%82%B5%E3%82%A4%E3%83%90%E3%83%BC%E8%AD%A6%E5%AF%9F%E5%B1%80" class="extiw" title="ja:サイバー警察局">Cyber Police Department</a> - Japan National Police Agency</li> <li><a href="/w/index.php?title=Siber_su%C3%A7larla_m%C3%BCcadele&action=edit&redlink=1" class="new" title="Siber suçlarla mücadele (page does not exist)">Siber suçlarla mücadele</a> - Turkish Cyber Agency</li></ul> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=24" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col" style="column-width: 22em;"> <ul><li><a href="/wiki/Computer_Fraud_and_Abuse_Act" title="Computer Fraud and Abuse Act">Computer Fraud and Abuse Act</a></li> <li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Computer_trespass" title="Computer trespass">Computer trespass</a></li> <li><a href="/wiki/Cloud_computing_security" title="Cloud computing security">Cloud computing security</a></li> <li><a href="/wiki/Convention_on_Cybercrime" title="Convention on Cybercrime">Convention on Cybercrime</a></li> <li><a href="/wiki/Cybercrime_countermeasures" class="mw-redirect" title="Cybercrime countermeasures">Cybercrime countermeasures</a></li> <li><a href="/wiki/Cyber_defamation_law" class="mw-redirect" title="Cyber defamation law">Cyber defamation law</a></li> <li><a href="/wiki/Cyber-" class="mw-redirect" title="Cyber-">Cyber-</a></li> <li><a href="/wiki/Cyberheist" class="mw-redirect" title="Cyberheist">Cyberheist</a></li> <li><a href="/wiki/Data_diddling" title="Data diddling">Data diddling</a></li> <li><a href="/wiki/Darknet" title="Darknet">Darknet</a></li> <li><a href="/wiki/Deep_web" title="Deep web">Deep web</a></li> <li><a href="/wiki/Domain_hijacking" title="Domain hijacking">Domain hijacking</a></li> <li><a href="/wiki/Electronic_evidence" title="Electronic evidence">Electronic evidence</a></li> <li><a href="/wiki/Hacking_back" title="Hacking back">Hacking back</a></li> <li>(Illegal) <a href="/wiki/Drop_catching" class="mw-redirect" title="Drop catching">drop catching</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Economic and industrial espionage</a></li> <li><a href="/wiki/Immigration_and_Customs_Enforcement" class="mw-redirect" title="Immigration and Customs Enforcement">Immigration and Customs Enforcement</a> (ICE)</li> <li><a href="/wiki/Initial_access_broker" title="Initial access broker">Initial access broker</a></li> <li><a href="/wiki/Internet_homicide" title="Internet homicide">Internet homicide</a></li> <li><a href="/wiki/Internet_suicide_pact" class="mw-redirect" title="Internet suicide pact">Internet suicide pact</a></li> <li><a href="/wiki/Legal_aspects_of_computing" class="mw-redirect" title="Legal aspects of computing">Legal aspects of computing</a></li> <li><a href="/wiki/List_of_computer_criminals" class="mw-redirect" title="List of computer criminals">List of computer criminals</a></li> <li><a href="/wiki/Metasploit_Project" class="mw-redirect" title="Metasploit Project">Metasploit Project</a></li> <li><a href="/wiki/National_Crime_Agency" title="National Crime Agency">National Crime Agency</a> (NCA)</li> <li><a href="/wiki/Penetration_test" title="Penetration test">Penetration test</a></li> <li><a href="/wiki/Police_National_E-Crime_Unit" class="mw-redirect" title="Police National E-Crime Unit">Police National E-Crime Unit</a></li> <li><a href="/wiki/Protected_computer" title="Protected computer">Protected computer</a></li> <li><a href="/wiki/Techno-thriller" title="Techno-thriller">Techno-thriller</a></li> <li><a href="/wiki/Trespass_to_chattels" title="Trespass to chattels">Trespass to chattels</a></li> <li><a href="/wiki/United_States_Secret_Service" title="United States Secret Service">United States Secret Service</a></li> <li><a href="/wiki/Virtual_crime" title="Virtual crime">Virtual crime</a></li> <li><a href="/wiki/White-collar_crime" title="White-collar crime">White-collar crime</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shell</a></li></ul></div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=25" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-Sukhai_128–132-1"><span class="mw-cite-backlink">^ <a href="#cite_ref-Sukhai_128–132_1-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Sukhai_128–132_1-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFSukhai2004" class="citation book cs1">Sukhai, Nataliya B. (8 October 2004). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1145/1059524.1059553">"Hacking and cybercrime"</a>. <i>Proceedings of the 1st annual conference on Information security curriculum development</i>. New York, NY, USA: ACM. pp. 128–132. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F1059524.1059553">10.1145/1059524.1059553</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/1-59593-048-5" title="Special:BookSources/1-59593-048-5"><bdi>1-59593-048-5</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:46562809">46562809</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718054810/https://dl.acm.org/doi/10.1145/1059524.1059553">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">10 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=Hacking+and+cybercrime&rft.btitle=Proceedings+of+the+1st+annual+conference+on+Information+security+curriculum+development&rft.place=New+York%2C+NY%2C+USA&rft.pages=128-132&rft.pub=ACM&rft.date=2004-10-08&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A46562809%23id-name%3DS2CID&rft_id=info%3Adoi%2F10.1145%2F1059524.1059553&rft.isbn=1-59593-048-5&rft.aulast=Sukhai&rft.aufirst=Nataliya+B.&rft_id=http%3A%2F%2Fdx.doi.org%2F10.1145%2F1059524.1059553&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.businessinsider.in/buffett-this-is-the-number-one-problem-with-mankind/articleshow/58555300.cms">"BUFFETT: This is 'the number one problem with mankind'<span class="cs1-kern-right"></span>"</a>. <i>Business Insider</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230609040043/https://www.businessinsider.in/BUFFETT-This-is-the-number-one-problem-with-mankind/articleshow/58555300.cms">Archived</a> from the original on 9 June 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">17 May</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Business+Insider&rft.atitle=BUFFETT%3A+This+is+%27the+number+one+problem+with+mankind%27&rft_id=https%3A%2F%2Fwww.businessinsider.in%2Fbuffett-this-is-the-number-one-problem-with-mankind%2Farticleshow%2F58555300.cms&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://finance.yahoo.com/news/warren-buffett-cyber-attacks-131445079.html">"Warren Buffett: 'Cyber poses real risks to humanity'<span class="cs1-kern-right"></span>"</a>. <i>finance.yahoo.com</i>. 30 April 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230602052925/https://finance.yahoo.com/news/warren-buffett-cyber-attacks-131445079.html">Archived</a> from the original on 2 June 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">17 May</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=finance.yahoo.com&rft.atitle=Warren+Buffett%3A+%27Cyber+poses+real+risks+to+humanity%27&rft.date=2019-04-30&rft_id=https%3A%2F%2Ffinance.yahoo.com%2Fnews%2Fwarren-buffett-cyber-attacks-131445079.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1 cs1-prop-long-vol"><a rel="nofollow" class="external text" href="http://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf">"The Global Risk Report 2020"</a> <span class="cs1-format">(PDF)</span>. <i>World Economic Forum</i>. 15th Edition: 102. 15 January 2020. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230927171154/https://www3.weforum.org/docs/WEF_Global_Risk_Report_2020.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 27 September 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">17 May</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=World+Economic+Forum&rft.atitle=The+Global+Risk+Report+2020&rft.volume=15th+Edition&rft.pages=102&rft.date=2020-01-15&rft_id=http%3A%2F%2Fwww3.weforum.org%2Fdocs%2FWEF_Global_Risk_Report_2020.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHeadingZahidi2023" class="citation web cs1">Heading, Sophie; Zahidi, Saadia (January 2023). <a rel="nofollow" class="external text" href="https://www3.weforum.org/docs/WEF_Global_Risks_Report_2023.pdf">"The Global Risks Report 2023, 18th Edition"</a> <span class="cs1-format">(PDF)</span>. <i>World Economic Forum</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240205151654/https://www3.weforum.org/docs/WEF_Global_Risks_Report_2023.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 5 February 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">3 February</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=World+Economic+Forum&rft.atitle=The+Global+Risks+Report+2023%2C+18th+Edition&rft.date=2023-01&rft.aulast=Heading&rft.aufirst=Sophie&rft.au=Zahidi%2C+Saadia&rft_id=https%3A%2F%2Fwww3.weforum.org%2Fdocs%2FWEF_Global_Risks_Report_2023.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-:4-6"><span class="mw-cite-backlink">^ <a href="#cite_ref-:4_6-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:4_6-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFreeze2023" class="citation web cs1">Freeze, Di (12 October 2023). <a rel="nofollow" class="external text" href="https://cybersecurityventures.com/cybercrime-to-cost-the-world-9-trillion-annually-in-2024/">"Cybercrime To Cost The World $9.5 trillion USD annually in 2024"</a>. <i>Cybercrime Magazine</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240201193635/https://cybersecurityventures.com/cybercrime-to-cost-the-world-9-trillion-annually-in-2024/">Archived</a> from the original on 1 February 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">3 February</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Cybercrime+Magazine&rft.atitle=Cybercrime+To+Cost+The+World+%249.5+trillion+USD+annually+in+2024&rft.date=2023-10-12&rft.aulast=Freeze&rft.aufirst=Di&rft_id=https%3A%2F%2Fcybersecurityventures.com%2Fcybercrime-to-cost-the-world-9-trillion-annually-in-2024%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGordon2006" class="citation journal cs1">Gordon, Sarah (25 July 2006). "On the definition and classification of cybercrime". <i>Journal in Computer Virology</i>. <b>2</b>: 13–20. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs11416-006-0015-z">10.1007/s11416-006-0015-z</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:3334277">3334277</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+in+Computer+Virology&rft.atitle=On+the+definition+and+classification+of+cybercrime&rft.volume=2&rft.pages=13-20&rft.date=2006-07-25&rft_id=info%3Adoi%2F10.1007%2Fs11416-006-0015-z&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A3334277%23id-name%3DS2CID&rft.aulast=Gordon&rft.aufirst=Sarah&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-auto2-8"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto2_8-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto2_8-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichet2022" class="citation journal cs1">Richet, Jean-Loup (1 January 2022). <a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.techfore.2021.121282">"How cybercriminal communities grow and change: An investigation of ad-fraud communities"</a>. <i>Technological Forecasting and Social Change</i>. <b>174</b> (121282): 121282. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.techfore.2021.121282">10.1016/j.techfore.2021.121282</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0040-1625">0040-1625</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:239962449">239962449</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Technological+Forecasting+and+Social+Change&rft.atitle=How+cybercriminal+communities+grow+and+change%3A+An+investigation+of+ad-fraud+communities&rft.volume=174&rft.issue=121282&rft.pages=121282&rft.date=2022-01-01&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A239962449%23id-name%3DS2CID&rft.issn=0040-1625&rft_id=info%3Adoi%2F10.1016%2Fj.techfore.2021.121282&rft.aulast=Richet&rft.aufirst=Jean-Loup&rft_id=https%3A%2F%2Fdoi.org%2F10.1016%252Fj.techfore.2021.121282&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLehmanPhelps2005" class="citation book cs1">Lehman, Jeffrey; Phelps, Shirelle (2005). <i>West's Encyclopedia of American Law, Vol. 3</i> (2 ed.). Detroit: Thomson/Gale. p. 137. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780787663742" title="Special:BookSources/9780787663742"><bdi>9780787663742</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=West%27s+Encyclopedia+of+American+Law%2C+Vol.+3&rft.place=Detroit&rft.pages=137&rft.edition=2&rft.pub=Thomson%2FGale&rft.date=2005&rft.isbn=9780787663742&rft.aulast=Lehman&rft.aufirst=Jeffrey&rft.au=Phelps%2C+Shirelle&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.law.cornell.edu/wex/computer_and_internet_fraud">"Computer and Internet Fraud"</a>. <i>LII / Legal Information Institute</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220810065203/https://www.law.cornell.edu/wex/computer_and_internet_fraud">Archived</a> from the original on 10 August 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">1 November</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=LII+%2F+Legal+Information+Institute&rft.atitle=Computer+and+Internet+Fraud&rft_id=https%3A%2F%2Fwww.law.cornell.edu%2Fwex%2Fcomputer_and_internet_fraud&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text">Parker D (1983) <i>Fighting Computer Crime,</i> U.S.: <a href="/wiki/Charles_Scribner%27s_Sons" title="Charles Scribner's Sons">Charles Scribner's Sons</a>.</span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.everycrsreport.com/reports/RL32114.html">"Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress"</a>. <i>www.everycrsreport.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220929021137/https://www.everycrsreport.com/reports/RL32114.html">Archived</a> from the original on 29 September 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">5 September</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.everycrsreport.com&rft.atitle=Botnets%2C+Cybercrime%2C+and+Cyberterrorism%3A+Vulnerabilities+and+Policy+Issues+for+Congress&rft_id=https%3A%2F%2Fwww.everycrsreport.com%2Freports%2FRL32114.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMorgan2020" class="citation web cs1">Morgan, Steve (13 November 2020). <a rel="nofollow" class="external text" href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/">"Cybercrime To Cost The World $10.5 Trillion Annually By 2025"</a>. <i>Cybercrime Magazine</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 July</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Cybercrime+Magazine&rft.atitle=Cybercrime+To+Cost+The+World+%2410.5+Trillion+Annually+By+2025&rft.date=2020-11-13&rft.aulast=Morgan&rft.aufirst=Steve&rft_id=https%3A%2F%2Fcybersecurityventures.com%2Fhackerpocalypse-cybercrime-report-2016%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLepofsky" class="citation web cs1">Lepofsky, Ron. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110706175959/http://www.ere-security.ca/PDF/Cyberextortion%20by%20DoS%2C%20Risk%20Magazine%20June%202006.pdf">"Cyberextortion by Denial-of-Service Attack"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 6 July 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Cyberextortion+by+Denial-of-Service+Attack&rft.aulast=Lepofsky&rft.aufirst=Ron&rft_id=http%3A%2F%2Fwww.ere-security.ca%2FPDF%2FCyberextortion%2520by%2520DoS%2C%2520Risk%2520Magazine%2520June%25202006.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMohanta2014" class="citation news cs1">Mohanta, Abhijit (6 December 2014). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150925133121/http://www.cyphort.com/latest-sony-pictures-breach-deadly-cyber-extortion/">"Latest Sony Pictures Breach : A Deadly Cyber Extortion"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.cyphort.com/latest-sony-pictures-breach-deadly-cyber-extortion/">the original</a> on 25 September 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">20 September</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Latest+Sony+Pictures+Breach+%3A+A+Deadly+Cyber+Extortion&rft.date=2014-12-06&rft.aulast=Mohanta&rft.aufirst=Abhijit&rft_id=http%3A%2F%2Fwww.cyphort.com%2Flatest-sony-pictures-breach-deadly-cyber-extortion%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.paloaltonetworks.com/resources/infographics/2022-unit-42-ransomware-threat-report-infographic">"The Growing Ransomware Threat: 4 Trends and Insights"</a>. <i>Palo Alto Networks</i>. 25 March 2022. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718054810/https://www.paloaltonetworks.com/resources/infographics/2022-unit-42-ransomware-threat-report-infographic">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">11 May</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Palo+Alto+Networks&rft.atitle=The+Growing+Ransomware+Threat%3A+4+Trends+and+Insights&rft.date=2022-03-25&rft_id=https%3A%2F%2Fwww.paloaltonetworks.com%2Fresources%2Finfographics%2F2022-unit-42-ransomware-threat-report-infographic&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://us.norton.com/blog/emerging-threats/ransomware-statistics">"100+ ransomware statistics for 2023 and beyond - Norton"</a>. <i>us.norton.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718054811/https://us.norton.com/blog/emerging-threats/ransomware-statistics">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">11 May</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=us.norton.com&rft.atitle=100%2B+ransomware+statistics+for+2023+and+beyond+-+Norton&rft_id=https%3A%2F%2Fus.norton.com%2Fblog%2Femerging-threats%2Fransomware-statistics&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1">Carback, Joshua T. (2018). "Cybersex Trafficking: Toward a More Effective Prosecutorial Response". <i>Criminal Law Bulletin</i>. <b>54</b> (1): 64–183.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Criminal+Law+Bulletin&rft.atitle=Cybersex+Trafficking%3A+Toward+a+More+Effective+Prosecutorial+Response&rft.volume=54&rft.issue=1&rft.pages=64-183&rft.date=2018&rft.aulast=Carback&rft.aufirst=Joshua+T.&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span> p. 64.</span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.prnewswire.com/news-releases/ijm-seeks-to-end-cybersex-trafficking-of-children-and-restartfreedom-this-cyber-monday-and-giving-tuesday-300368744.html">"IJM Seeks to End Cybersex Trafficking of Children and #RestartFreedom this Cyber Monday and Giving Tuesday"</a>. <i>PR Newswire</i>. 28 November 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170417112847/http://www.prnewswire.com/news-releases/ijm-seeks-to-end-cybersex-trafficking-of-children-and-restartfreedom-this-cyber-monday-and-giving-tuesday-300368744.html">Archived</a> from the original on 17 April 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">9 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=PR+Newswire&rft.atitle=IJM+Seeks+to+End+Cybersex+Trafficking+of+Children+and+%23RestartFreedom+this+Cyber+Monday+and+Giving+Tuesday&rft.date=2016-11-28&rft_id=https%3A%2F%2Fwww.prnewswire.com%2Fnews-releases%2Fijm-seeks-to-end-cybersex-trafficking-of-children-and-restartfreedom-this-cyber-monday-and-giving-tuesday-300368744.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-auto1-20"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto1_20-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto1_20-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.ijmuk.org/our-work/cybersex-trafficking">"Cybersex Trafficking"</a>. <i>IJM</i>. 2020. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200521145630/https://www.ijmuk.org/our-work/cybersex-trafficking">Archived</a> from the original on 21 May 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">9 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=IJM&rft.atitle=Cybersex+Trafficking&rft.date=2020&rft_id=https%3A%2F%2Fwww.ijmuk.org%2Four-work%2Fcybersex-trafficking&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cnn.com/2013/07/17/world/asia/philippines-cybersex-trafficking/index.html">"Cyber-sex trafficking: A 21st century scourge"</a>. <i>CNN</i>. 18 July 2013. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130718165038/https://www.cnn.com/2013/07/17/world/asia/philippines-cybersex-trafficking/index.html">Archived</a> from the original on 18 July 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">9 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=CNN&rft.atitle=Cyber-sex+trafficking%3A+A+21st+century+scourge&rft.date=2013-07-18&rft_id=https%3A%2F%2Fwww.cnn.com%2F2013%2F07%2F17%2Fworld%2Fasia%2Fphilippines-cybersex-trafficking%2Findex.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.philstar.com/headlines/2020/04/13/2006955/senator-warns-possible-surge-child-cybersex-traffic">"Senator warns of possible surge in child cybersex traffic"</a>. <i>The Philippine Star</i>. 13 April 2020. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200418114854/https://www.philstar.com/headlines/2020/04/13/2006955/senator-warns-possible-surge-child-cybersex-traffic">Archived</a> from the original on 18 April 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Philippine+Star&rft.atitle=Senator+warns+of+possible+surge+in+child+cybersex+traffic&rft.date=2020-04-13&rft_id=https%3A%2F%2Fwww.philstar.com%2Fheadlines%2F2020%2F04%2F13%2F2006955%2Fsenator-warns-possible-surge-child-cybersex-traffic&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://theaseanpost.com/article/dutertes-drug-war-and-child-cybersex-trafficking">"Duterte's drug war and child cybersex trafficking"</a>. <i>The ASEAN Post</i>. 18 October 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200522000102/https://theaseanpost.com/article/dutertes-drug-war-and-child-cybersex-trafficking">Archived</a> from the original on 22 May 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+ASEAN+Post&rft.atitle=Duterte%27s+drug+war+and+child+cybersex+trafficking&rft.date=2019-10-18&rft_id=https%3A%2F%2Ftheaseanpost.com%2Farticle%2Fdutertes-drug-war-and-child-cybersex-trafficking&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20200729013030/https://news.mb.com.ph/2020/05/01/norwegian-national-partner-nabbed-4-rescued-from-cybersex-den/">"Norwegian national, partner nabbed; 4 rescued from cybersex den"</a>. <i>Manila Bulletin</i>. 1 May 2020. Archived from <a rel="nofollow" class="external text" href="https://news.mb.com.ph/2020/05/01/norwegian-national-partner-nabbed-4-rescued-from-cybersex-den/">the original</a> on 29 July 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Manila+Bulletin&rft.atitle=Norwegian+national%2C+partner+nabbed%3B+4+rescued+from+cybersex+den&rft.date=2020-05-01&rft_id=https%3A%2F%2Fnews.mb.com.ph%2F2020%2F05%2F01%2Fnorwegian-national-partner-nabbed-4-rescued-from-cybersex-den%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-auto-25"><span class="mw-cite-backlink">^ <a href="#cite_ref-auto_25-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-auto_25-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.nbcnews.com/tech/tech-news/cheap-tech-widespread-internet-access-fuel-rise-cybersex-trafficking-n886886">"Cheap tech and widespread internet access fuel rise in cybersex trafficking"</a>. <i>NBC News</i>. 30 June 2018. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201124163943/https://www.nbcnews.com/tech/tech-news/cheap-tech-widespread-internet-access-fuel-rise-cybersex-trafficking-n886886">Archived</a> from the original on 24 November 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=NBC+News&rft.atitle=Cheap+tech+and+widespread+internet+access+fuel+rise+in+cybersex+trafficking&rft.date=2018-06-30&rft_id=https%3A%2F%2Fwww.nbcnews.com%2Ftech%2Ftech-news%2Fcheap-tech-widespread-internet-access-fuel-rise-cybersex-trafficking-n886886&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.philstar.com/headlines/2019/11/11/1967750/senate-probe-rise-child-cybersex-trafficking">"Senate to probe rise in child cybersex trafficking"</a>. <i>The Philippine Star</i>. 11 November 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20191113001822/https://www.philstar.com/headlines/2019/11/11/1967750/senate-probe-rise-child-cybersex-trafficking">Archived</a> from the original on 13 November 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Philippine+Star&rft.atitle=Senate+to+probe+rise+in+child+cybersex+trafficking&rft.date=2019-11-11&rft_id=https%3A%2F%2Fwww.philstar.com%2Fheadlines%2F2019%2F11%2F11%2F1967750%2Fsenate-probe-rise-child-cybersex-trafficking&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/us-philippines-trafficking-children/global-taskforce-tackles-cybersex-child-trafficking-in-the-philippines-idUSKCN1RR1D1">"Global taskforce tackles cybersex child trafficking in the Philippines"</a>. <i>Reuters</i>. 15 April 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190416114212/https://www.reuters.com/article/us-philippines-trafficking-children/global-taskforce-tackles-cybersex-child-trafficking-in-the-philippines-idUSKCN1RR1D1">Archived</a> from the original on 16 April 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Reuters&rft.atitle=Global+taskforce+tackles+cybersex+child+trafficking+in+the+Philippines&rft.date=2019-04-15&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fus-philippines-trafficking-children%2Fglobal-taskforce-tackles-cybersex-child-trafficking-in-the-philippines-idUSKCN1RR1D1&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.reuters.com/article/us-philippines-trafficking-technology/webcam-slavery-tech-turns-filipino-families-into-cybersex-child-traffickers-idUSKBN1JE00X">"Webcam slavery: tech turns Filipino families into cybersex child traffickers"</a>. <i>Reuters</i>. 17 June 2018. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180912045346/https://www.reuters.com/article/us-philippines-trafficking-technology/webcam-slavery-tech-turns-filipino-families-into-cybersex-child-traffickers-idUSKBN1JE00X">Archived</a> from the original on 12 September 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Reuters&rft.atitle=Webcam+slavery%3A+tech+turns+Filipino+families+into+cybersex+child+traffickers&rft.date=2018-06-17&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fus-philippines-trafficking-technology%2Fwebcam-slavery-tech-turns-filipino-families-into-cybersex-child-traffickers-idUSKBN1JE00X&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.scmp.com/comment/insight-opinion/article/3008403/how-internet-fuels-sexual-exploitation-and-forced-labour">"How the internet fuels sexual exploitation and forced labor in Asia"</a>. <i>South China Morning Post</i>. 2 May 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200429221407/https://www.scmp.com/comment/insight-opinion/article/3008403/how-internet-fuels-sexual-exploitation-and-forced-labour">Archived</a> from the original on 29 April 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=South+China+Morning+Post&rft.atitle=How+the+internet+fuels+sexual+exploitation+and+forced+labor+in+Asia&rft.date=2019-05-02&rft_id=https%3A%2F%2Fwww.scmp.com%2Fcomment%2Finsight-opinion%2Farticle%2F3008403%2Fhow-internet-fuels-sexual-exploitation-and-forced-labour&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://sencanada.ca/en/content/sen/chamber/421/debates/194db_2018-04-18-e">"1st Session, 42nd Parliament, Volume 150, Issue 194"</a>. <i>Senate of Canada</i>. 18 April 2018. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210827203845/https://sencanada.ca/en/content/sen/chamber/421/debates/194db_2018-04-18-e">Archived</a> from the original on 27 August 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">29 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Senate+of+Canada&rft.atitle=1st+Session%2C+42nd+Parliament%2C+Volume+150%2C+Issue+194&rft.date=2018-04-18&rft_id=https%3A%2F%2Fsencanada.ca%2Fen%2Fcontent%2Fsen%2Fchamber%2F421%2Fdebates%2F194db_2018-04-18-e&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.scmp.com/news/asia/southeast-asia/article/3026664/how-cambodias-outdated-laws-make-it-harder-tackle-cybersex">"Cybersex trafficking spreads across Southeast Asia, fuelled by internet boom. And the law lags behind"</a>. <i>South China Morning Post</i>. 11 September 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200516104350/https://www.scmp.com/news/asia/southeast-asia/article/3026664/how-cambodias-outdated-laws-make-it-harder-tackle-cybersex">Archived</a> from the original on 16 May 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=South+China+Morning+Post&rft.atitle=Cybersex+trafficking+spreads+across+Southeast+Asia%2C+fuelled+by+internet+boom.+And+the+law+lags+behind&rft.date=2019-09-11&rft_id=https%3A%2F%2Fwww.scmp.com%2Fnews%2Fasia%2Fsoutheast-asia%2Farticle%2F3026664%2Fhow-cambodias-outdated-laws-make-it-harder-tackle-cybersex&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.ilo.org/wcmsp5/groups/public/---ed_norm/---ipec/documents/publication/wcms_854733.pdf">"Global Estimates of Modern Slavery Forced Labour and Forced Marriage"</a> <span class="cs1-format">(PDF)</span>. <i>International Labour Organization</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221222090009/https://www.ilo.org/wcmsp5/groups/public/---ed_norm/---ipec/documents/publication/wcms_854733.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 22 December 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">22 December</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=International+Labour+Organization&rft.atitle=Global+Estimates+of+Modern+Slavery+Forced+Labour+and+Forced+Marriage&rft_id=https%3A%2F%2Fwww.ilo.org%2Fwcmsp5%2Fgroups%2Fpublic%2F---ed_norm%2F---ipec%2Fdocuments%2Fpublication%2Fwcms_854733.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.koreaherald.com/view.php?ud=20200424000512">"What is 'Nth Room' case and why it matters"</a>. <i>Korea Herald</i>. 24 April 2020. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200519160804/http://www.koreaherald.com/view.php?ud=20200424000512">Archived</a> from the original on 19 May 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">9 May</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Korea+Herald&rft.atitle=What+is+%27Nth+Room%27+case+and+why+it+matters&rft.date=2020-04-24&rft_id=http%3A%2F%2Fwww.koreaherald.com%2Fview.php%3Fud%3D20200424000512&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMurphy2010" class="citation web cs1">Murphy, Dennis (February 2010). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120320012856/http://www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf">"War is War? The utility of cyberspace operations in the contemporary operational environment."</a> <span class="cs1-format">(PDF)</span>. Center for Strategic Leadership. Archived from <a rel="nofollow" class="external text" href="http://www.carlisle.army.mil/DIME/documents/War%20is%20War%20Issue%20Paper%20Final2.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 20 March 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=War+is+War%3F+The+utility+of+cyberspace+operations+in+the+contemporary+operational+environment..&rft.pub=Center+for+Strategic+Leadership&rft.date=2010-02&rft.aulast=Murphy&rft.aufirst=Dennis&rft_id=http%3A%2F%2Fwww.carlisle.army.mil%2FDIME%2Fdocuments%2FWar%2520is%2520War%2520Issue%2520Paper%2520Final2.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJoseph2006" class="citation web cs1">Joseph, Aghatise E. (28 June 2006). <a rel="nofollow" class="external text" href="http://www.crime-research.org/articles/joseph06/">"Cybercrime definition"</a>. <i>www.crime-research.org</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718054813/https://www.crime-research.org/articles/joseph06/">Archived</a> from the original on 18 July 2024.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.crime-research.org&rft.atitle=Cybercrime+definition&rft.date=2006-06-28&rft.aulast=Joseph&rft.aufirst=Aghatise+E.&rft_id=http%3A%2F%2Fwww.crime-research.org%2Farticles%2Fjoseph06%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html">"Save browsing"</a>. <i>google</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160305144600/https://googleonlinesecurity.blogspot.jp/2012/06/safe-browsing-protecting-web-users-for.html">Archived</a> from the original on 5 March 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">5 October</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=google&rft.atitle=Save+browsing&rft_id=http%3A%2F%2Fgoogleonlinesecurity.blogspot.jp%2F2012%2F06%2Fsafe-browsing-protecting-web-users-for.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilburZhu2008" class="citation journal cs1">Wilbur, Kenneth C.; Zhu, Yi (24 October 2008). <a rel="nofollow" class="external text" href="https://pubsonline.informs.org/doi/abs/10.1287/mksc.1080.0397">"Click Fraud"</a>. <i>Marketing Science</i>. <b>28</b> (2): 293–308. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1287%2Fmksc.1080.0397">10.1287/mksc.1080.0397</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0732-2399">0732-2399</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221005143633/https://pubsonline.informs.org/doi/abs/10.1287/mksc.1080.0397">Archived</a> from the original on 5 October 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">30 October</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Marketing+Science&rft.atitle=Click+Fraud&rft.volume=28&rft.issue=2&rft.pages=293-308&rft.date=2008-10-24&rft_id=info%3Adoi%2F10.1287%2Fmksc.1080.0397&rft.issn=0732-2399&rft.aulast=Wilbur&rft.aufirst=Kenneth+C.&rft.au=Zhu%2C+Yi&rft_id=https%3A%2F%2Fpubsonline.informs.org%2Fdoi%2Fabs%2F10.1287%2Fmksc.1080.0397&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20200106105338/http://www.haltabuse.org/resources/laws/federal.shtml">"Federal CyberStalking Bill Info"</a>. <i>www.haltabuse.org</i>. Archived from <a rel="nofollow" class="external text" href="http://www.haltabuse.org/resources/laws/federal.shtml">the original</a> on 6 January 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">4 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.haltabuse.org&rft.atitle=Federal+CyberStalking+Bill+Info&rft_id=http%3A%2F%2Fwww.haltabuse.org%2Fresources%2Flaws%2Ffederal.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.weforum.org/agenda/2019/06/most-people-on-the-internet-live-in-this-country/">"China has more internet users than any other country, according to Mary Meeker's Internet Trends Report"</a>. <i>World Economic Forum</i>. 27 June 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">4 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=World+Economic+Forum&rft.atitle=China+has+more+internet+users+than+any+other+country%2C+according+to+Mary+Meeker%27s+Internet+Trends+Report&rft.date=2019-06-27&rft_id=https%3A%2F%2Fwww.weforum.org%2Fagenda%2F2019%2F06%2Fmost-people-on-the-internet-live-in-this-country%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cybersmile.org/news/chinese-authorities-address-online-bullying">"Chinese Authorities Address Online Bullying – Cybersmile"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718054813/https://www.cybersmile.org/news/chinese-authorities-address-online-bullying">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">2 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Chinese+Authorities+Address+Online+Bullying+%E2%80%93+Cybersmile&rft_id=https%3A%2F%2Fwww.cybersmile.org%2Fnews%2Fchinese-authorities-address-online-bullying&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cybersmile.org/advice-help/category/cyberbullying-and-the-law">"Legal Perspective – Cybersmile"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718054816/https://www.cybersmile.org/advice-help/category/cyberbullying-and-the-law">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">2 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Legal+Perspective+%E2%80%93+Cybersmile&rft_id=https%3A%2F%2Fwww.cybersmile.org%2Fadvice-help%2Fcategory%2Fcyberbullying-and-the-law&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.legislation.gov.uk/ukpga/1988/27/section/1/data.htm">"Malicious Communications Act 1988"</a>. <i>www.legislation.gov.uk</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718055342/https://www.legislation.gov.uk/ukpga/1988/27/section/1/data.htm">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">2 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.legislation.gov.uk&rft.atitle=Malicious+Communications+Act+1988&rft_id=http%3A%2F%2Fwww.legislation.gov.uk%2Fukpga%2F1988%2F27%2Fsection%2F1%2Fdata.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.legislation.gov.au/Details/C2019C00043/Html/Volume_1">"Criminal Code Act 1995"</a>. <i>www.legislation.gov.au</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718055324/https://www.legislation.gov.au/Details/C2019C00043/Html/Volume_1">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">2 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.legislation.gov.au&rft.atitle=Criminal+Code+Act+1995&rft_id=http%3A%2F%2Fwww.legislation.gov.au%2FDetails%2FC2019C00043%2FHtml%2FVolume_1&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.statista.com/statistics/333942/us-internet-online-harassment-severity/">"U.S. internet users who have experienced online harassment 2020"</a>. <i>Statista</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718055336/https://www.statista.com/statistics/333942/us-internet-online-harassment-severity/">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Statista&rft.atitle=U.S.+internet+users+who+have+experienced+online+harassment+2020&rft_id=https%3A%2F%2Fwww.statista.com%2Fstatistics%2F333942%2Fus-internet-online-harassment-severity%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.broadbandsearch.net/blog/cyber-bullying-statistics">"All the Latest Cyber Bullying Statistics and What They Mean In 2021"</a>. <i>BroadbandSearch.net</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210423045240/https://www.broadbandsearch.net/blog/cyber-bullying-statistics">Archived</a> from the original on 23 April 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=BroadbandSearch.net&rft.atitle=All+the+Latest+Cyber+Bullying+Statistics+and+What+They+Mean+In+2021&rft_id=https%3A%2F%2Fwww.broadbandsearch.net%2Fblog%2Fcyber-bullying-statistics&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.nbcnews.com/tech/social-media/i-will-not-be-silenced-women-targeted-hack-leak-attacks-n1275540">"<span class="cs1-kern-left"></span>'I will not be silenced': Women targeted in hack-and-leak attacks speak out about spyware"</a>. <i>NBC News</i>. August 2021. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210801101606/https://www.nbcnews.com/tech/social-media/i-will-not-be-silenced-women-targeted-hack-leak-attacks-n1275540">Archived</a> from the original on 1 August 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">1 August</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=NBC+News&rft.atitle=%27I+will+not+be+silenced%27%3A+Women+targeted+in+hack-and-leak+attacks+speak+out+about+spyware&rft.date=2021-08&rft_id=https%3A%2F%2Fwww.nbcnews.com%2Ftech%2Fsocial-media%2Fi-will-not-be-silenced-women-targeted-hack-leak-attacks-n1275540&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.dailydot.com/layer8/silk-road-3-blake-benthall/">"We talked to the opportunist imitator behind Silk Road 3.0"</a>. <i><a href="/wiki/The_Daily_Dot" title="The Daily Dot">The Daily Dot</a></i>. 7 November 2014. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161005205525/http://www.dailydot.com/layer8/silk-road-3-blake-benthall/">Archived</a> from the original on 5 October 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">4 October</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Daily+Dot&rft.atitle=We+talked+to+the+opportunist+imitator+behind+Silk+Road+3.0&rft.date=2014-11-07&rft_id=http%3A%2F%2Fwww.dailydot.com%2Flayer8%2Fsilk-road-3-blake-benthall%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFArora" class="citation web cs1">Arora, Beenu. <a rel="nofollow" class="external text" href="https://www.forbes.com/sites/forbestechcouncil/2020/04/23/five-key-reasons-dark-web-markets-are-booming/">"Council Post: Five Key Reasons Dark Web Markets Are Booming"</a>. <i>Forbes</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200729020116/https://www.forbes.com/sites/forbestechcouncil/2020/04/23/five-key-reasons-dark-web-markets-are-booming/">Archived</a> from the original on 29 July 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">23 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Forbes&rft.atitle=Council+Post%3A+Five+Key+Reasons+Dark+Web+Markets+Are+Booming&rft.aulast=Arora&rft.aufirst=Beenu&rft_id=https%3A%2F%2Fwww.forbes.com%2Fsites%2Fforbestechcouncil%2F2020%2F04%2F23%2Ffive-key-reasons-dark-web-markets-are-booming%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.bbc.co.uk/newsround/25622442">"Guide: What is Bitcoin and how does Bitcoin work? - CBBC Newsround"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230407042830/https://www.bbc.co.uk/newsround/25622442">Archived</a> from the original on 7 April 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">23 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Guide%3A+What+is+Bitcoin+and+how+does+Bitcoin+work%3F+-+CBBC+Newsround&rft_id=https%3A%2F%2Fwww.bbc.co.uk%2Fnewsround%2F25622442&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristian2015" class="citation web cs1">Christian, Jon (4 February 2015). <a rel="nofollow" class="external text" href="https://www.vice.com/en_us/article/xyw7xn/darknet-slang-watch-exit-scam">"The 'Exit Scam' Is the Darknet's Perfect Crime"</a>. <i>Vice</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718055329/https://www.vice.com/en/article/xyw7xn/darknet-slang-watch-exit-scam">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">23 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Vice&rft.atitle=The+%27Exit+Scam%27+Is+the+Darknet%27s+Perfect+Crime&rft.date=2015-02-04&rft.aulast=Christian&rft.aufirst=Jon&rft_id=https%3A%2F%2Fwww.vice.com%2Fen_us%2Farticle%2Fxyw7xn%2Fdarknet-slang-watch-exit-scam&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.vice.com/en_us/article/xyw7xn/darknet-slang-watch-exit-scam">"The 'Exit Scam' Is the Darknet's Perfect Crime"</a>. <i>www.vice.com</i>. 4 February 2015. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200624105505/https://www.vice.com/en_us/article/xyw7xn/darknet-slang-watch-exit-scam">Archived</a> from the original on 24 June 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">14 July</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.vice.com&rft.atitle=The+%27Exit+Scam%27+Is+the+Darknet%27s+Perfect+Crime&rft.date=2015-02-04&rft_id=https%3A%2F%2Fwww.vice.com%2Fen_us%2Farticle%2Fxyw7xn%2Fdarknet-slang-watch-exit-scam&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWinder" class="citation web cs1">Winder, Davey. <a rel="nofollow" class="external text" href="https://www.forbes.com/sites/daveywinder/2019/05/03/did-a-bitcoin-exit-scam-cause-dark-web-wall-street-market-crash/">"Did A Bitcoin Exit Scam Cause Dark Web Wall Street Market Crash?"</a>. <i>Forbes</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Forbes&rft.atitle=Did+A+Bitcoin+Exit+Scam+Cause+Dark+Web+Wall+Street+Market+Crash%3F&rft.aulast=Winder&rft.aufirst=Davey&rft_id=https%3A%2F%2Fwww.forbes.com%2Fsites%2Fdaveywinder%2F2019%2F05%2F03%2Fdid-a-bitcoin-exit-scam-cause-dark-web-wall-street-market-crash%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrandom2019" class="citation web cs1">Brandom, Russell (17 February 2019). <a rel="nofollow" class="external text" href="https://www.theverge.com/2019/2/17/18226718/alphabay-takedown-drug-marketplace-federal-arrest">"The golden age of dark web drug markets is over"</a>. <i>The Verge</i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Verge&rft.atitle=The+golden+age+of+dark+web+drug+markets+is+over&rft.date=2019-02-17&rft.aulast=Brandom&rft.aufirst=Russell&rft_id=https%3A%2F%2Fwww.theverge.com%2F2019%2F2%2F17%2F18226718%2Falphabay-takedown-drug-marketplace-federal-arrest&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-WIRED-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-WIRED_54-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreenberg2021" class="citation magazine cs1">Greenberg, Andy (23 September 2021). <a rel="nofollow" class="external text" href="https://www.wired.com/story/alphabay-desnake-dark-web-interview/">"He Escaped the Dark Web's Biggest Bust. Now He's Back"</a>. <i><a href="/wiki/Wired_(magazine)" title="Wired (magazine)">Wired</a></i>. <a href="/wiki/Cond%C3%A9_Nast_Publications" class="mw-redirect" title="Condé Nast Publications">Condé Nast Publications</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210923132523/https://www.wired.com/story/alphabay-desnake-dark-web-interview/">Archived</a> from the original on 23 September 2021.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Wired&rft.atitle=He+Escaped+the+Dark+Web%27s+Biggest+Bust.+Now+He%27s+Back&rft.date=2021-09-23&rft.aulast=Greenberg&rft.aufirst=Andy&rft_id=https%3A%2F%2Fwww.wired.com%2Fstory%2Falphabay-desnake-dark-web-interview%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-:12-55"><span class="mw-cite-backlink">^ <a href="#cite_ref-:12_55-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:12_55-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.vice.com/en_us/article/vv73pj/7-ways-the-cops-will-bust-you-on-the-dark-web">"7 Ways the Cops Will Bust You on the Dark Web"</a>. <i>www.vice.com</i>. 26 June 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200715015429/https://www.vice.com/en_us/article/vv73pj/7-ways-the-cops-will-bust-you-on-the-dark-web">Archived</a> from the original on 15 July 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">14 July</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.vice.com&rft.atitle=7+Ways+the+Cops+Will+Bust+You+on+the+Dark+Web&rft.date=2016-06-26&rft_id=https%3A%2F%2Fwww.vice.com%2Fen_us%2Farticle%2Fvv73pj%2F7-ways-the-cops-will-bust-you-on-the-dark-web&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cdc.gov/injury/features/prescription-drug-overdose/index.html">"America's Drug Overdose Epidemic: Data to Action"</a>. <i>Centers for Disease Control and Prevention</i>. 24 March 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">14 July</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Centers+for+Disease+Control+and+Prevention&rft.atitle=America%27s+Drug+Overdose+Epidemic%3A+Data+to+Action&rft.date=2020-03-24&rft_id=https%3A%2F%2Fwww.cdc.gov%2Finjury%2Ffeatures%2Fprescription-drug-overdose%2Findex.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cottenfirm.com/blog/2019/september/the-consequences-of-mailing-drugs-and-other-bann/">"The Consequences of Mailing Drugs and Other Banned Substances"</a>. <i>www.cottenfirm.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.cottenfirm.com&rft.atitle=The+Consequences+of+Mailing+Drugs+and+Other+Banned+Substances&rft_id=https%3A%2F%2Fwww.cottenfirm.com%2Fblog%2F2019%2Fseptember%2Fthe-consequences-of-mailing-drugs-and-other-bann%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-58">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dea.gov/press-releases/2019/04/12/darknet-drug-vendor-sentenced-10-years-prison">"Darknet drug vendor sentenced to 10 years prison"</a>. <i>www.dea.gov</i><span class="reference-accessdate">. Retrieved <span class="nowrap">23 June</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.dea.gov&rft.atitle=Darknet+drug+vendor+sentenced+to+10+years+prison&rft_id=https%3A%2F%2Fwww.dea.gov%2Fpress-releases%2F2019%2F04%2F12%2Fdarknet-drug-vendor-sentenced-10-years-prison&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.bankinfosecurity.com/feds-crack-down-on-darknet-vendors-illicit-goods-a-11145">"Feds Crack Down on Darknet Vendors of Illicit Goods"</a>. <i>www.bankinfosecurity.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200714200159/https://www.bankinfosecurity.com/feds-crack-down-on-darknet-vendors-illicit-goods-a-11145">Archived</a> from the original on 14 July 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">14 July</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.bankinfosecurity.com&rft.atitle=Feds+Crack+Down+on+Darknet+Vendors+of+Illicit+Goods&rft_id=https%3A%2F%2Fwww.bankinfosecurity.com%2Ffeds-crack-down-on-darknet-vendors-illicit-goods-a-11145&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-Weitzer-60"><span class="mw-cite-backlink">^ <a href="#cite_ref-Weitzer_60-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Weitzer_60-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-Weitzer_60-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWeitzer2003" class="citation book cs1">Weitzer, Ronald (2003). <i>Current Controversies in Criminology</i>. Upper Saddle River, New Jersey: Pearson Education Press. p. 150.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Current+Controversies+in+Criminology&rft.place=Upper+Saddle+River%2C+New+Jersey&rft.pages=150&rft.pub=Pearson+Education+Press&rft.date=2003&rft.aulast=Weitzer&rft.aufirst=Ronald&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMannSutton2011" class="citation journal cs1">Mann, David; Sutton, Mike (6 November 2011). ">>Netcrime". <i>British Journal of Criminology</i>. <b>38</b> (2): 201–229. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.3861">10.1.1.133.3861</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1093%2Foxfordjournals.bjc.a014232">10.1093/oxfordjournals.bjc.a014232</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=British+Journal+of+Criminology&rft.atitle=%3E%3ENetcrime&rft.volume=38&rft.issue=2&rft.pages=201-229&rft.date=2011-11-06&rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.133.3861%23id-name%3DCiteSeerX&rft_id=info%3Adoi%2F10.1093%2Foxfordjournals.bjc.a014232&rft.aulast=Mann&rft.aufirst=David&rft.au=Sutton%2C+Mike&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-econ20070930-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-econ20070930_62-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20071110134626/http://economist.com/displaystory.cfm?story_id=9723768">"A walk on the dark side"</a>. <i>The Economist</i>. 30 September 2007. Archived from <a rel="nofollow" class="external text" href="http://economist.com/displaystory.cfm?story_id=9723768">the original</a> on 10 November 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">11 May</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Economist&rft.atitle=A+walk+on+the+dark+side&rft.date=2007-09-30&rft_id=http%3A%2F%2Feconomist.com%2Fdisplaystory.cfm%3Fstory_id%3D9723768&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.france24.com/en/20100303-spanish-police-crack-massive-zombie-computer-network">"Spanish police crack massive 'zombie computer' network"</a>. <i>France 24</i>. 3 March 2010.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=France+24&rft.atitle=Spanish+police+crack+massive+%27zombie+computer%27+network&rft.date=2010-03-03&rft_id=https%3A%2F%2Fwww.france24.com%2Fen%2F20100303-spanish-police-crack-massive-zombie-computer-network&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dhs.gov/ynews/releases/20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm">"DHS: Secretary Napolitano and Attorney General Holder Announce Largest U.S. Prosecution of International Criminal Network Organized to Sexually Exploit Children"</a>. Dhs.gov. 3 August 2011. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230617182832/https://www.dhs.gov/news/2011/08/03/secretary-napolitano-and-attorney-general-holder-announce-largest-us-prosecution">Archived</a> from the original on 17 June 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">10 November</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=DHS%3A+Secretary+Napolitano+and+Attorney+General+Holder+Announce+Largest+U.S.+Prosecution+of+International+Criminal+Network+Organized+to+Sexually+Exploit+Children&rft.pub=Dhs.gov&rft.date=2011-08-03&rft_id=https%3A%2F%2Fwww.dhs.gov%2Fynews%2Freleases%2F20110803-napolitano-holder-announce-largest-prosecution-criminal-network.shtm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLi2012" class="citation news cs1">Li, David K. (17 January 2012). <a rel="nofollow" class="external text" href="http://www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K">"Zappos cyber attack"</a>. <i>New York Post</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120418113048/http://www.nypost.com/p/news/national/zappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K">Archived</a> from the original on 18 April 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">14 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=New+York+Post&rft.atitle=Zappos+cyber+attack&rft.date=2012-01-17&rft.aulast=Li&rft.aufirst=David+K.&rft_id=http%3A%2F%2Fwww.nypost.com%2Fp%2Fnews%2Fnational%2Fzappos_cyber_attack_pWsrU60crm8SGHJWYGuP7K&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRodriguez2012" class="citation news cs1">Rodriguez, Salvador (6 June 2012). <a rel="nofollow" class="external text" href="https://www.latimes.com/business/la-xpm-2012-jun-06-la-fi-tn-eharmony-hacked-linkedin-20120606-story.html">"Like LinkedIn, eHarmony is hacked; 1.5 million passwords stolen"</a>. <i>Los Angeles Times</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20181028034448/http://articles.latimes.com/2012/jun/06/business/la-fi-tn-eharmony-hacked-linkedin-20120606">Archived</a> from the original on 28 October 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">20 February</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Los+Angeles+Times&rft.atitle=Like+LinkedIn%2C+eHarmony+is+hacked%3B+1.5+million+passwords+stolen&rft.date=2012-06-06&rft.aulast=Rodriguez&rft.aufirst=Salvador&rft_id=https%3A%2F%2Fwww.latimes.com%2Fbusiness%2Fla-xpm-2012-jun-06-la-fi-tn-eharmony-hacked-linkedin-20120606-story.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRothacker2012" class="citation news cs1">Rothacker, Rick (12 October 2012). <a rel="nofollow" class="external text" href="https://www.reuters.com/article/net-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012">"Cyber attacks against Wells Fargo "significant," handled well: CFO"</a>. <i>Reuters</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Reuters&rft.atitle=Cyber+attacks+against+Wells+Fargo+%22significant%2C%22+handled+well%3A+CFO&rft.date=2012-10-12&rft.aulast=Rothacker&rft.aufirst=Rick&rft_id=https%3A%2F%2Fwww.reuters.com%2Farticle%2Fnet-us-wellsfargo-cyberattacks-idUSBRE89B1C620121012&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://mashable.com/2013/04/23/ap-hacked-white-house/">"AP Twitter Hack Falsely Claims Explosions at White House"</a>. Samantha Murphy. 23 April 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">23 April</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=AP+Twitter+Hack+Falsely+Claims+Explosions+at+White+House&rft.date=2013-04-23&rft_id=http%3A%2F%2Fmashable.com%2F2013%2F04%2F23%2Fap-hacked-white-house%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html">"Fake Tweet Erasing $136 Billion Shows Markets Need Humans"</a>. <i>Bloomberg</i>. 23 April 2013. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130423204458/http://www.bloomberg.com/news/2013-04-23/fake-report-erasing-136-billion-shows-market-s-fragility.html">Archived</a> from the original on 23 April 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">23 April</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Bloomberg&rft.atitle=Fake+Tweet+Erasing+%24136+Billion+Shows+Markets+Need+Humans&rft.date=2013-04-23&rft_id=https%3A%2F%2Fwww.bloomberg.com%2Fnews%2F2013-04-23%2Ffake-report-erasing-136-billion-shows-market-s-fragility.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.straitstimes.com/world/europe/unprecedented-cyberattacks-wreak-global-havoc">"Unprecedented cyber attacks wreak global havoc"</a>. <i>Straits Times</i>. 13 May 2017. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718055914/https://www.straitstimes.com/world/europe/unprecedented-cyberattacks-wreak-global-havoc">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">13 May</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Straits+Times&rft.atitle=Unprecedented+cyber+attacks+wreak+global+havoc&rft.date=2017-05-13&rft_id=http%3A%2F%2Fwww.straitstimes.com%2Fworld%2Feurope%2Funprecedented-cyberattacks-wreak-global-havoc&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.washingtontimes.com/news/2018/sep/18/israeli-spyware-found-phones-45-countries-us-inclu/">"Israeli spyware found on phones in 45 countries, U.S. included"</a>. <i><a href="/wiki/The_Washington_Times" title="The Washington Times">The Washington Times</a></i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=The+Washington+Times&rft.atitle=Israeli+spyware+found+on+phones+in+45+countries%2C+U.S.+included&rft_id=https%3A%2F%2Fwww.washingtontimes.com%2Fnews%2F2018%2Fsep%2F18%2Fisraeli-spyware-found-phones-45-countries-us-inclu%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20180924105848/https://www.sfgate.com/business/technology/article/Researchers-find-hints-of-Israeli-spyware-around-13237819.php">"Researchers find hints of Israeli spyware around globe - SFGate"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.sfgate.com/business/technology/article/Researchers-find-hints-of-Israeli-spyware-around-13237819.php">the original</a> on 24 September 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Researchers+find+hints+of+Israeli+spyware+around+globe+-+SFGate&rft_id=https%3A%2F%2Fwww.sfgate.com%2Fbusiness%2Ftechnology%2Farticle%2FResearchers-find-hints-of-Israeli-spyware-around-13237819.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.siasat.com/news/smartphone-or-israeli-spywarehow-safe-your-smartphone-1400791/">"Your Smartphone could be running Israeli Spyware!"</a>. September 2018. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180924110052/https://www.siasat.com/news/smartphone-or-israeli-spywarehow-safe-your-smartphone-1400791/">Archived</a> from the original on 24 September 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Your+Smartphone+could+be+running+Israeli+Spyware%21&rft.date=2018-09&rft_id=https%3A%2F%2Fwww.siasat.com%2Fnews%2Fsmartphone-or-israeli-spywarehow-safe-your-smartphone-1400791%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.pcworld.com/article/3062396/security/phone-hackers-for-hire-a-peek-into-the-discreet-lucrative-business-tapped-by-the-fbi.html">"Phone hackers for hire: A peek into the discreet, lucrative business tapped by the FBI"</a>. 29 April 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170516013335/http://www.pcworld.com/article/3062396/security/phone-hackers-for-hire-a-peek-into-the-discreet-lucrative-business-tapped-by-the-fbi.html">Archived</a> from the original on 16 May 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Phone+hackers+for+hire%3A+A+peek+into+the+discreet%2C+lucrative+business+tapped+by+the+FBI&rft.date=2016-04-29&rft_id=https%3A%2F%2Fwww.pcworld.com%2Farticle%2F3062396%2Fsecurity%2Fphone-hackers-for-hire-a-peek-into-the-discreet-lucrative-business-tapped-by-the-fbi.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-75">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBeaumont2016" class="citation news cs1">Beaumont, Peter (26 August 2016). <a rel="nofollow" class="external text" href="https://www.theguardian.com/world/2016/aug/26/israeli-firm-accused-of-creating-iphone-spyware">"Israeli firm accused of creating iPhone spyware"</a>. <i>The Guardian</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060430/https://www.theguardian.com/world/2016/aug/26/israeli-firm-accused-of-creating-iphone-spyware">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">24 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Guardian&rft.atitle=Israeli+firm+accused+of+creating+iPhone+spyware&rft.date=2016-08-26&rft.aulast=Beaumont&rft.aufirst=Peter&rft_id=https%3A%2F%2Fwww.theguardian.com%2Fworld%2F2016%2Faug%2F26%2Fisraeli-firm-accused-of-creating-iphone-spyware&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.silicon.co.uk/mobility/mobile-apps/totok-spy-tool-for-uae-325873">"Chat App ToTok Is Spy Tool For UAE – Report"</a>. <i>Silicon UK Tech News</i>. 27 December 2019. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20191227191240/https://www.silicon.co.uk/mobility/mobile-apps/totok-spy-tool-for-uae-325873">Archived</a> from the original on 27 December 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">27 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Silicon+UK+Tech+News&rft.atitle=Chat+App+ToTok+Is+Spy+Tool+For+UAE+%E2%80%93+Report&rft.date=2019-12-27&rft_id=https%3A%2F%2Fwww.silicon.co.uk%2Fmobility%2Fmobile-apps%2Ftotok-spy-tool-for-uae-325873&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJardine2015" class="citation journal cs1">Jardine, Eric (2015). <a rel="nofollow" class="external text" href="http://www.ssrn.com/abstract=2634590">"Global Cyberspace Is Safer than You Think: Real Trends in Cybercrime"</a>. <i>SSRN Electronic Journal</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2139%2Fssrn.2634590">10.2139/ssrn.2634590</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1556-5068">1556-5068</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060424/https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2634590">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">10 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=SSRN+Electronic+Journal&rft.atitle=Global+Cyberspace+Is+Safer+than+You+Think%3A+Real+Trends+in+Cybercrime&rft.date=2015&rft_id=info%3Adoi%2F10.2139%2Fssrn.2634590&rft.issn=1556-5068&rft.aulast=Jardine&rft.aufirst=Eric&rft_id=http%3A%2F%2Fwww.ssrn.com%2Fabstract%3D2634590&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBarnard-WillsAshenden2012" class="citation journal cs1">Barnard-Wills, David; Ashenden, Debi (21 March 2012). "Securing Virtual Space: Cyber War, Cyber Terror, and Risk". <i>Space and Culture</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1177%2F1206331211430016">10.1177/1206331211430016</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:146501914">146501914</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Space+and+Culture&rft.atitle=Securing+Virtual+Space%3A+Cyber+War%2C+Cyber+Terror%2C+and+Risk&rft.date=2012-03-21&rft_id=info%3Adoi%2F10.1177%2F1206331211430016&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A146501914%23id-name%3DS2CID&rft.aulast=Barnard-Wills&rft.aufirst=David&rft.au=Ashenden%2C+Debi&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-:0-79"><span class="mw-cite-backlink">^ <a href="#cite_ref-:0_79-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:0_79-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrenner2010" class="citation book cs1">Brenner, Susan W. (2010). <i>Cybercrime : criminal threats from cyberspace</i>. Santa Barbara, Calif.: Praeger. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780313365461" title="Special:BookSources/9780313365461"><bdi>9780313365461</bdi></a>. <a href="/wiki/OCLC_(identifier)" class="mw-redirect" title="OCLC (identifier)">OCLC</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/oclc/464583250">464583250</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Cybercrime+%3A+criminal+threats+from+cyberspace&rft.place=Santa+Barbara%2C+Calif.&rft.pub=Praeger&rft.date=2010&rft_id=info%3Aoclcnum%2F464583250&rft.isbn=9780313365461&rft.aulast=Brenner&rft.aufirst=Susan+W.&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime">"Facts + Statistics: Identity theft and cybercrime"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060424/https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">2 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Facts+%2B+Statistics%3A+Identity+theft+and+cybercrime&rft_id=https%3A%2F%2Fwww.iii.org%2Ffact-statistic%2Ffacts-statistics-identity-theft-and-cybercrime&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-Zehra_Ali-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-Zehra_Ali_81-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZehra_Ali2018" class="citation web cs1">Zehra Ali (21 January 2018). <a rel="nofollow" class="external text" href="https://www.privacyend.com/mandatory-data-retention/">"Mandatory Data Retention Worldwide"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20181217110743/https://www.privacyend.com/mandatory-data-retention/">Archived</a> from the original on 17 December 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">17 December</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Mandatory+Data+Retention+Worldwide&rft.date=2018-01-21&rft.au=Zehra+Ali&rft_id=https%3A%2F%2Fwww.privacyend.com%2Fmandatory-data-retention%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150319194419/http://www.unafei.or.jp/english/pdf/RS_No79/No79_15RC_Group2.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://www.unafei.or.jp/english/pdf/RS_No79/No79_15RC_Group2.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 19 March 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">23 July</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Archived+copy&rft_id=http%3A%2F%2Fwww.unafei.or.jp%2Fenglish%2Fpdf%2FRS_No79%2FNo79_15RC_Group2.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-:1-83"><span class="mw-cite-backlink">^ <a href="#cite_ref-:1_83-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:1_83-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.fbi.gov/investigate/cyber">"Cyber Crime"</a>. <i>Federal Bureau of Investigation</i><span class="reference-accessdate">. Retrieved <span class="nowrap">4 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Federal+Bureau+of+Investigation&rft.atitle=Cyber+Crime&rft_id=https%3A%2F%2Fwww.fbi.gov%2Finvestigate%2Fcyber&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-:2-84"><span class="mw-cite-backlink">^ <a href="#cite_ref-:2_84-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:2_84-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dhs.gov/cisa/combating-cyber-crime">"Combating Cyber Crime"</a>. <i>Department of Homeland Security</i>. 19 June 2012. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060426/https://www.cisa.gov/combatting-cyber-crime">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">1 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Department+of+Homeland+Security&rft.atitle=Combating+Cyber+Crime&rft.date=2012-06-19&rft_id=https%3A%2F%2Fwww.dhs.gov%2Fcisa%2Fcombating-cyber-crime&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20191231015231/https://www.ncfi.usss.gov/ncfi/pages/about.xhtml?dswid=-4902">"NCFI - About"</a>. <i>www.ncfi.usss.gov</i>. Archived from <a rel="nofollow" class="external text" href="https://www.ncfi.usss.gov/ncfi/pages/about.xhtml?dswid=-4902">the original</a> on 31 December 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">4 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.ncfi.usss.gov&rft.atitle=NCFI+-+About&rft_id=https%3A%2F%2Fwww.ncfi.usss.gov%2Fncfi%2Fpages%2Fabout.xhtml%3Fdswid%3D-4902&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-:3-86"><span class="mw-cite-backlink">^ <a href="#cite_ref-:3_86-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:3_86-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.secretservice.gov/investigation/">"Investigation"</a>. <i>www.secretservice.gov</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170916015010/https://www.secretservice.gov/investigation/">Archived</a> from the original on 16 September 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">3 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.secretservice.gov&rft.atitle=Investigation&rft_id=https%3A%2F%2Fwww.secretservice.gov%2Finvestigation%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-87">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cisa.gov/combatting-cyber-crime">"Combatting Cyber Crime | CISA"</a>. <i>www.cisa.gov</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060453/https://www.cisa.gov/combatting-cyber-crime">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">17 February</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.cisa.gov&rft.atitle=Combatting+Cyber+Crime+%7C+CISA&rft_id=https%3A%2F%2Fwww.cisa.gov%2Fcombatting-cyber-crime&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-88">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.floridatechonline.com/blog/information-technology/the-importance-of-understanding-encryption-in-cybersecurity/">"The Importance of Understanding Encryption in Cybersecurity"</a>. <i>Florida Tech Online</i>. 18 August 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20191204014723/https://www.floridatechonline.com/blog/information-technology/the-importance-of-understanding-encryption-in-cybersecurity/">Archived</a> from the original on 4 December 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">4 December</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Florida+Tech+Online&rft.atitle=The+Importance+of+Understanding+Encryption+in+Cybersecurity&rft.date=2016-08-18&rft_id=https%3A%2F%2Fwww.floridatechonline.com%2Fblog%2Finformation-technology%2Fthe-importance-of-understanding-encryption-in-cybersecurity%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-89">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cisa.gov/cdm">"Continuous Diagnostics and Mitigation Program | CISA"</a>. <i>www.cisa.gov</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220406154053/https://www.cisa.gov/cdm">Archived</a> from the original on 6 April 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">1 April</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.cisa.gov&rft.atitle=Continuous+Diagnostics+and+Mitigation+Program+%26%23124%3B+CISA&rft_id=https%3A%2F%2Fwww.cisa.gov%2Fcdm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-ECS_1-90"><span class="mw-cite-backlink">^ <a href="#cite_ref-ECS_1_90-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ECS_1_90-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cisa.gov/enhanced-cybersecurity-services-ecs">"Enhanced Cybersecurity Services (ECS)"</a>. <a href="/wiki/Cybersecurity_and_Infrastructure_Security_Agency" title="Cybersecurity and Infrastructure Security Agency">Cybersecurity and Infrastructure Security Agency</a>. 2024. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230223022025/https://www.cisa.gov/enhanced-cybersecurity-services-ecs">Archived</a> from the original on 23 February 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">6 January</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Enhanced+Cybersecurity+Services+%28ECS%29&rft.pub=Cybersecurity+and+Infrastructure+Security+Agency&rft.date=2024&rft_id=https%3A%2F%2Fwww.cisa.gov%2Fenhanced-cybersecurity-services-ecs&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-91">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20191107023624/https://www.cisa.gov/detection-and-prevention">"Detection and Prevention | CISA"</a>. <i>www.cisa.gov</i>. Archived from <a rel="nofollow" class="external text" href="https://www.cisa.gov/detection-and-prevention">the original</a> on 7 November 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">1 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.cisa.gov&rft.atitle=Detection+and+Prevention+%7C+CISA&rft_id=https%3A%2F%2Fwww.cisa.gov%2Fdetection-and-prevention&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-92">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://venturebeat.com/2022/04/26/report-74-of-security-leaders-say-that-prevention-first-strategies-will-fail/">"Report: 74% of security leaders say that prevention-first strategies will fail"</a>. <i>VentureBeat</i>. 26 April 2022. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220728111735/https://venturebeat.com/2022/04/26/report-74-of-security-leaders-say-that-prevention-first-strategies-will-fail/">Archived</a> from the original on 28 July 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">3 May</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=VentureBeat&rft.atitle=Report%3A+74%25+of+security+leaders+say+that+prevention-first+strategies+will+fail&rft.date=2022-04-26&rft_id=https%3A%2F%2Fventurebeat.com%2F2022%2F04%2F26%2Freport-74-of-security-leaders-say-that-prevention-first-strategies-will-fail%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-93">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGhosemajumder2017" class="citation news cs1">Ghosemajumder, Shuman (4 December 2017). <a rel="nofollow" class="external text" href="https://hbr.org/2017/12/you-cant-secure-100-of-your-data-100-of-the-time">"You Can't Secure 100% of Your Data 100% of the Time"</a>. <i>Harvard Business Review</i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0017-8012">0017-8012</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230828214607/https://hbr.org/2017/12/you-cant-secure-100-of-your-data-100-of-the-time">Archived</a> from the original on 28 August 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">3 May</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Harvard+Business+Review&rft.atitle=You+Can%27t+Secure+100%25+of+Your+Data+100%25+of+the+Time&rft.date=2017-12-04&rft.issn=0017-8012&rft.aulast=Ghosemajumder&rft.aufirst=Shuman&rft_id=https%3A%2F%2Fhbr.org%2F2017%2F12%2Fyou-cant-secure-100-of-your-data-100-of-the-time&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNikishin2015" class="citation book cs1">Nikishin, A. (2015). <a rel="nofollow" class="external text" href="https://dx.doi.org/10.1049/ic.2015.0003">"ICS Threats. A Kaspersky Lab view, predictions and reality"</a>. <i>Cyber Security for Industrial Control Systems</i>. Institution of Engineering and Technology. pp. 01 (43 .). <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1049%2Fic.2015.0003">10.1049/ic.2015.0003</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-78561-010-3" title="Special:BookSources/978-1-78561-010-3"><bdi>978-1-78561-010-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.atitle=ICS+Threats.+A+Kaspersky+Lab+view%2C+predictions+and+reality&rft.btitle=Cyber+Security+for+Industrial+Control+Systems&rft.pages=01+%2843+.%29&rft.pub=Institution+of+Engineering+and+Technology&rft.date=2015&rft_id=info%3Adoi%2F10.1049%2Fic.2015.0003&rft.isbn=978-1-78561-010-3&rft.aulast=Nikishin&rft.aufirst=A.&rft_id=http%3A%2F%2Fdx.doi.org%2F10.1049%2Fic.2015.0003&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKshetri" class="citation web cs1">Kshetri, Nir. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20151018103250/http://web.a.ebscohost.com/ehost/detail/detail?vid=3&sid=21efdb54-ad43-447f-ab46-ce7fa854a98f%40sessionmgr4003&hid=4109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=55328703/">"Diffusion and Effects of Cyber Crime in Developing Countries"</a>. Archived from <a rel="nofollow" class="external text" href="http://web.a.ebscohost.com/ehost/detail/detail?vid=3&sid=21efdb54-ad43-447f-ab46-ce7fa854a98f%40sessionmgr4003&hid=4109&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=55328703/">the original</a> on 18 October 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">29 April</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Diffusion+and+Effects+of+Cyber+Crime+in+Developing+Countries&rft.aulast=Kshetri&rft.aufirst=Nir&rft_id=http%3A%2F%2Fweb.a.ebscohost.com%2Fehost%2Fdetail%2Fdetail%3Fvid%3D3%26sid%3D21efdb54-ad43-447f-ab46-ce7fa854a98f%2540sessionmgr4003%26hid%3D4109%26bdata%3DJnNpdGU9ZWhvc3QtbGl2ZQ%253d%253d%23db%3Dbuh%26AN%3D55328703%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://csrc.nist.gov/nist-cyber-history">"NIST Cybersecurity Program History and Timeline | CSRC"</a>. <i>csrc.nist.gov</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060958/https://csrc.nist.gov/nist-cyber-history">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">17 February</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=csrc.nist.gov&rft.atitle=NIST+Cybersecurity+Program+History+and+Timeline+%7C+CSRC&rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fnist-cyber-history&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKesanHayes2019" class="citation book cs1">Kesan, Jay P.; Hayes, Carol M. (2019). <i>Cybersecurity and privacy law in a nutshell</i>. Nutshell series. St. Paul, MN: West Academic Publishing. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-63460-272-3" title="Special:BookSources/978-1-63460-272-3"><bdi>978-1-63460-272-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Cybersecurity+and+privacy+law+in+a+nutshell&rft.place=St.+Paul%2C+MN&rft.series=Nutshell+series&rft.pub=West+Academic+Publishing&rft.date=2019&rft.isbn=978-1-63460-272-3&rft.aulast=Kesan&rft.aufirst=Jay+P.&rft.au=Hayes%2C+Carol+M.&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-98">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNortham2015" class="citation news cs1">Northam, Jackie (April 2015). <a rel="nofollow" class="external text" href="https://www.npr.org/blogs/thetwo-way/2015/04/01/396811276/u-s-creates-first-sanctions-program-against-cybercriminals/">"U.S. Creates First Sanctions Program Against Cybercriminals"</a>. <i>NPR</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060933/https://www.npr.org/sections/thetwo-way/2015/04/01/396811276/u-s-creates-first-sanctions-program-against-cybercriminals/">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=NPR&rft.atitle=U.S.+Creates+First+Sanctions+Program+Against+Cybercriminals&rft.date=2015-04&rft.aulast=Northam&rft.aufirst=Jackie&rft_id=https%3A%2F%2Fwww.npr.org%2Fblogs%2Fthetwo-way%2F2015%2F04%2F01%2F396811276%2Fu-s-creates-first-sanctions-program-against-cybercriminals%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-99">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMoise2015" class="citation journal cs1">Moise, Adrian Cristian (2015). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20151208231600/http://jolas.ro/wp-content/uploads/2015/07/jolas_sia38.pdf">"Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level"</a> <span class="cs1-format">(PDF)</span>. <i>Journal of Law and Administrative Sciences</i>. Archived from <a rel="nofollow" class="external text" href="http://jolas.ro/wp-content/uploads/2015/07/jolas_sia38.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 8 December 2015.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Journal+of+Law+and+Administrative+Sciences&rft.atitle=Analysis+of+Directive+2013%2F40%2FEU+on+attacks+against+information+systems+in+the+context+of+approximation+of+law+at+the+European+level&rft.date=2015&rft.aulast=Moise&rft.aufirst=Adrian+Cristian&rft_id=http%3A%2F%2Fjolas.ro%2Fwp-content%2Fuploads%2F2015%2F07%2Fjolas_sia38.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-100">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cnbc.com/2017/05/31/chinas-new-cybersecurity-law-takes-effect-today.html">"China's new cybersecurity law takes effect today"</a>. <i><a href="/wiki/CNBC" title="CNBC">CNBC</a></i>. June 2017. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240718060935/https://www.cnbc.com/2017/05/31/chinas-new-cybersecurity-law-takes-effect-today.html">Archived</a> from the original on 18 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">11 January</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=CNBC&rft.atitle=China%27s+new+cybersecurity+law+takes+effect+today&rft.date=2017-06&rft_id=https%3A%2F%2Fwww.cnbc.com%2F2017%2F05%2F31%2Fchinas-new-cybersecurity-law-takes-effect-today.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-OMH-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-OMH_101-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20181217111209/https://www.omh.ny.gov/omhweb/forensic/manual/html/chapter1.htm">"Criminal Justice System for Adults in NYS"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.omh.ny.gov/omhweb/forensic/manual/html/chapter1.htm">the original</a> on 17 December 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">17 December</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Criminal+Justice+System+for+Adults+in+NYS&rft_id=https%3A%2F%2Fwww.omh.ny.gov%2Fomhweb%2Fforensic%2Fmanual%2Fhtml%2Fchapter1.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-102">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131105202421/http://appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf">"Managing the Risks Posed by Offender Computer Use - Perspectives"</a> <span class="cs1-format">(PDF)</span>. December 2011. Archived from <a rel="nofollow" class="external text" href="http://appaweb.csg.org/Perspectives/Perspectives_V35_N4_P40.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 5 November 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">25 January</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Managing+the+Risks+Posed+by+Offender+Computer+Use+-+Perspectives&rft.date=2011-12&rft_id=http%3A%2F%2Fappaweb.csg.org%2FPerspectives%2FPerspectives_V35_N4_P40.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-103">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBowker2012" class="citation book cs1">Bowker, Art (2012). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150402094342/http://www.ccthomas.com/details.cfm?P_ISBN13=9780398087289"><i>The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century</i></a>. Springfield: Thomas. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/9780398087289" title="Special:BookSources/9780398087289"><bdi>9780398087289</bdi></a>. Archived from <a rel="nofollow" class="external text" href="http://www.ccthomas.com/details.cfm?P_ISBN13=9780398087289">the original</a> on 2 April 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">25 January</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=The+Cybercrime+Handbook+for+Community+Corrections%3A+Managing+Risk+in+the+21st+Century&rft.place=Springfield&rft.pub=Thomas&rft.date=2012&rft.isbn=9780398087289&rft.aulast=Bowker&rft.aufirst=Art&rft_id=http%3A%2F%2Fwww.ccthomas.com%2Fdetails.cfm%3FP_ISBN13%3D9780398087289&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-104">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFeinberg2008" class="citation journal cs1">Feinberg, T (2008). "Whether it happens at school or off-campus, cyberbullying disrupts and affects". <i>Cyberbullying</i>: 10.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Cyberbullying&rft.atitle=Whether+it+happens+at+school+or+off-campus%2C+cyberbullying+disrupts+and+affects.&rft.pages=10&rft.date=2008&rft.aulast=Feinberg&rft.aufirst=T&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-105">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://explodingtopics.com/blog/cybersecurity-stats">"The Ultimate List of Cyber Attack Stats (2024)"</a>. <i>Exploding Topics</i>. 7 February 2022. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240323183440/https://explodingtopics.com/blog/cybersecurity-stats">Archived</a> from the original on 23 March 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">23 March</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Exploding+Topics&rft.atitle=The+Ultimate+List+of+Cyber+Attack+Stats+%282024%29&rft.date=2022-02-07&rft_id=https%3A%2F%2Fexplodingtopics.com%2Fblog%2Fcybersecurity-stats&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-DT_1-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-DT_1_106-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://docs.broadcom.com/doc/dridex-financial-trojan">"Dridex: Tidal waves of spam pushing dangerous financial Trojan"</a>. <a href="/wiki/Gen_Digital" title="Gen Digital">Symantec</a>. 16 February 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240106135415/https://docs.broadcom.com/doc/dridex-financial-trojan">Archived</a> from the original on 6 January 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">6 January</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Dridex%3A+Tidal+waves+of+spam+pushing+dangerous+financial+Trojan&rft.pub=Symantec&rft.date=2016-02-16&rft_id=https%3A%2F%2Fdocs.broadcom.com%2Fdoc%2Fdridex-financial-trojan&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-fireeye.com-107"><span class="mw-cite-backlink">^ <a href="#cite_ref-fireeye.com_107-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-fireeye.com_107-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html">"Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware « Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware"</a>. <i>FireEye</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20191006082415/https://www.fireeye.com/blog/threat-research/2017/09/apt33-insights-into-iranian-cyber-espionage.html">Archived</a> from the original on 6 October 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">3 January</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=FireEye&rft.atitle=Insights+into+Iranian+Cyber+Espionage%3A+APT33+Targets+Aerospace+and+Energy+Sectors+and+has+Ties+to+Destructive+Malware+%C2%AB+Insights+into+Iranian+Cyber+Espionage%3A+APT33+Targets+Aerospace+and+Energy+Sectors+and+has+Ties+to+Destructive+Malware&rft_id=https%3A%2F%2Fwww.fireeye.com%2Fblog%2Fthreat-research%2F2017%2F09%2Fapt33-insights-into-iranian-cyber-espionage.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-108">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJanofsky2018" class="citation news cs1">Janofsky, Adam (19 September 2018). <a rel="nofollow" class="external text" href="https://www.wsj.com/articles/how-ai-can-help-stop-cyberattacks-1537322940">"How AI Can Help Stop Cyberattacks"</a>. <i><a href="/wiki/The_Wall_Street_Journal" title="The Wall Street Journal">The Wall Street Journal</a></i>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0099-9660">0099-9660</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180920123113/https://www.wsj.com/articles/how-ai-can-help-stop-cyberattacks-1537322940">Archived</a> from the original on 20 September 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">20 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Wall+Street+Journal&rft.atitle=How+AI+Can+Help+Stop+Cyberattacks&rft.date=2018-09-19&rft.issn=0099-9660&rft.aulast=Janofsky&rft.aufirst=Adam&rft_id=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fhow-ai-can-help-stop-cyberattacks-1537322940&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-109">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNoyes" class="citation news cs1">Noyes, Katherine. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180920122924/https://www.computerworld.com/article/3081326/security/this-company-uses-ai-to-stop-cyberattacks-before-they-start.html">"This company uses A.I. to stop cyberattacks before they start"</a>. <i>Computerworld</i>. Archived from <a rel="nofollow" class="external text" href="https://www.computerworld.com/article/3081326/security/this-company-uses-ai-to-stop-cyberattacks-before-they-start.html">the original</a> on 20 September 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">20 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Computerworld&rft.atitle=This+company+uses+A.I.+to+stop+cyberattacks+before+they+start&rft.aulast=Noyes&rft.aufirst=Katherine&rft_id=https%3A%2F%2Fwww.computerworld.com%2Farticle%2F3081326%2Fsecurity%2Fthis-company-uses-ai-to-stop-cyberattacks-before-they-start.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.interpol.int/en/Crimes/Cybercrime/Cybercrime-threat-response">"Cybercrime threat response"</a>. <i>www.interpol.int</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230428163611/https://www.interpol.int/en/Crimes/Cybercrime/Cybercrime-threat-response">Archived</a> from the original on 28 April 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">17 May</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.interpol.int&rft.atitle=Cybercrime+threat+response&rft_id=https%3A%2F%2Fwww.interpol.int%2Fen%2FCrimes%2FCybercrime%2FCybercrime-threat-response&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-111">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichet2011" class="citation journal cs1">Richet, Jean-Loup (2011). "Adoption of deviant behavior and cybercrime 'Know how' diffusion". <i>York Deviancy Conference</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=York+Deviancy+Conference&rft.atitle=Adoption+of+deviant+behavior+and+cybercrime+%27Know+how%27+diffusion&rft.date=2011&rft.aulast=Richet&rft.aufirst=Jean-Loup&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichet2012" class="citation journal cs1">Richet, Jean-Loup (2012). "How to Become a Black Hat Hacker? An Exploratory Study of Barriers to Entry Into Cybercrime". <i>17th AIM Symposium</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=17th+AIM+Symposium&rft.atitle=How+to+Become+a+Black+Hat+Hacker%3F+An+Exploratory+Study+of+Barriers+to+Entry+Into+Cybercrime.&rft.date=2012&rft.aulast=Richet&rft.aufirst=Jean-Loup&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> <li id="cite_note-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-113">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20210703044553/https://asean.org/asean-declaration-prevent-combat-cybercrime/">"ASEAN Declaration to Prevent and Combat Cybercrime"</a>. <i>ASEAN</i>. 14 November 2017. Archived from <a rel="nofollow" class="external text" href="https://asean.org/asean-declaration-prevent-combat-cybercrime/">the original</a> on 3 July 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">5 June</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=ASEAN&rft.atitle=ASEAN+Declaration+to+Prevent+and+Combat+Cybercrime&rft.date=2017-11-14&rft_id=https%3A%2F%2Fasean.org%2Fasean-declaration-prevent-combat-cybercrime%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></span> </li> </ol></div> <p>Cyber Crime. (n.d.). [Folder]. Federal Bureau of Investigation. Retrieved April 24, 2024, from <a rel="nofollow" class="external free" href="https://www.fbi.gov/investigate/cyber">https://www.fbi.gov/investigate/cyber</a> </p><p>Herrero, J., Torres, A., Vivas, P., & Urueña, A. (2022). Smartphone Addiction, Social Support, and Cybercrime Victimization: A Discrete Survival and Growth Mixture Model: Psychosocial Intervention. Psychosocial Intervention, 31(1), 59–66. <a rel="nofollow" class="external free" href="https://doi.org/10.5093/pi2022a3">https://doi.org/10.5093/pi2022a3</a> </p> <div class="mw-heading mw-heading2"><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=26" title="Edit section: Further reading"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li>Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, N., Wagman, S. & Zarsky, T. (2006) (eds) <i>Cybercrime: Digital Cops in a Networked Environment</i>, <a href="/wiki/New_York_University_Press" title="New York University Press">New York University Press</a>, New York.</li> <li>Bowker, Art (2012) "The Cybercrime Handbook for Community Corrections: Managing Risk in the 21st Century" <a href="/w/index.php?title=Charles_C._Thomas_Publishers,_Ltd.&action=edit&redlink=1" class="new" title="Charles C. Thomas Publishers, Ltd. (page does not exist)">Charles C. Thomas Publishers, Ltd.</a> Springfield.</li> <li>Brenner, S. (2007) <i>Law in an Era of Smart Technology,</i> Oxford: <a href="/wiki/Oxford_University_Press" title="Oxford University Press">Oxford University Press</a></li> <li>Broadhurst, R., and Chang, Lennon Y.C. (2013) "<a rel="nofollow" class="external text" href="https://link.springer.com/chapter/10.1007%2F978-1-4614-5218-8_4#page-1">Cybercrime in Asia: trends and challenges</a>", in B. Hebenton, SY Shou, & J. Liu (eds), Asian Handbook of Criminology (pp. 49–64). New York: Springer (<link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-4614-5217-1" title="Special:BookSources/978-1-4614-5217-1">978-1-4614-5217-1</a>)</li> <li>Chang, L.Y. C. (2012) <i><a rel="nofollow" class="external text" href="http://www.e-elgar.com/shop/cybercrime-in-the-greater-china-region?___website=uk_warehouse">Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention across the Taiwan Strait</a></i>. Cheltenham: Edward Elgar. (<link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-85793-667-7" title="Special:BookSources/978-0-85793-667-7">978-0-85793-667-7</a>)</li> <li>Chang, Lennon Y.C., & Grabosky, P. (2014) "<a rel="nofollow" class="external text" href="https://link.springer.com/chapter/10.1007%2F978-1-349-67284-4_15#page-1">Cybercrime and establishing a secure cyber world</a>", in M. Gill (ed) Handbook of Security (pp. 321–339). NY: Palgrave.</li> <li>Csonka P. (2000) Internet Crime; the Draft council of Europe convention on cyber-crime: A response to the challenge of crime in the age of the internet? <i>Computer Law & Security Report</i> Vol.16 no.5.</li> <li>Easttom, C. (2010) <i>Computer Crime Investigation and the Law</i></li> <li>Fafinski, S. (2009) <i>Computer Misuse: Response, regulation and the law</i> Cullompton: Willan</li> <li>Glenny, M. <a rel="nofollow" class="external text" href="https://archive.org/details/darkmarketcybert0000glen"><i>DarkMarket : cyberthieves, cybercops, and you</i></a>, New York, NY : Alfred A. Knopf, 2011. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-307-59293-4" title="Special:BookSources/978-0-307-59293-4">978-0-307-59293-4</a></li> <li>Grabosky, P. (2006) <i>Electronic Crime,</i> New Jersey: <a href="/wiki/Prentice_Hall" title="Prentice Hall">Prentice Hall</a></li> <li>Halder, D., & Jaishankar, K. (2016). <a rel="nofollow" class="external text" href="https://us.sagepub.com/en-us/nam/cyber-crimes-against-women-in-india/book253900">Cyber Crimes against Women in India</a>. New Delhi: SAGE Publishing. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-9385985775" title="Special:BookSources/978-9385985775">978-9385985775</a>.</li> <li>Jaishankar, K. (Ed.) (2011). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=cWOQWx4QPFYC">Cyber Criminology: Exploring Internet Crimes and Criminal behavior.</a> Boca Raton, FL, US: CRC Press, Taylor, and Francis Group.</li> <li>McQuade, S. (2006) <i>Understanding and Managing Cybercrime,</i> Boston: <a href="/wiki/Allyn_%26_Bacon" title="Allyn & Bacon">Allyn & Bacon</a>.</li> <li>McQuade, S. (ed) (2009) <i>The Encyclopedia of Cybercrime,</i> Westport, CT: <a href="/wiki/Greenwood_Press" class="mw-redirect" title="Greenwood Press">Greenwood Press</a>.</li> <li>Parker D (1983) <i>Fighting Computer Crime,</i> U.S.: <a href="/wiki/Charles_Scribner%27s_Sons" title="Charles Scribner's Sons">Charles Scribner's Sons</a>.</li> <li>Pattavina, A. (ed) <i>Information Technology and the Criminal Justice System,</i> Thousand Oaks, CA: Sage.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTaylor1999" class="citation book cs1">Taylor, Paul (1999). <i>Hackers: Crime in the Digital Sublime</i> (3 November 1999 ed.). Routledge; 1 edition. p. 200. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-0-415-18072-6" title="Special:BookSources/978-0-415-18072-6"><bdi>978-0-415-18072-6</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Hackers%3A+Crime+in+the+Digital+Sublime&rft.pages=200&rft.edition=3+November+1999&rft.pub=Routledge%3B+1+edition&rft.date=1999&rft.isbn=978-0-415-18072-6&rft.aulast=Taylor&rft.aufirst=Paul&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></li> <li>Richet, J.L. (2013) From Young Hackers to Crackers, <i>International Journal of Technology and Human Interaction (IJTHI)</i>, 9(3), 53–62.</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichet2022" class="citation journal cs1">Richet, J.L. (2022). <a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.techfore.2021.121282">"How cybercriminal communities grow and change: An investigation of ad-fraud communities"</a>. <i>Technological Forecasting and Social Change</i>. <b>174</b> (121282): 121282. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.techfore.2021.121282">10.1016/j.techfore.2021.121282</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0040-1625">0040-1625</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a> <a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:239962449">239962449</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Technological+Forecasting+and+Social+Change&rft.atitle=How+cybercriminal+communities+grow+and+change%3A+An+investigation+of+ad-fraud+communities&rft.volume=174&rft.issue=121282&rft.pages=121282&rft.date=2022&rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A239962449%23id-name%3DS2CID&rft.issn=0040-1625&rft_id=info%3Adoi%2F10.1016%2Fj.techfore.2021.121282&rft.aulast=Richet&rft.aufirst=J.L.&rft_id=https%3A%2F%2Fdoi.org%2F10.1016%252Fj.techfore.2021.121282&rfr_id=info%3Asid%2Fen.wikipedia.org%3ACybercrime" class="Z3988"></span></li> <li>Robertson, J. (2 March 2010). Authorities bust 3 in infection of 13m computers. Retrieved 26 March 2010, from Boston News: <a rel="nofollow" class="external text" href="https://www.boston.com/business/technology/articles/2010/03/02/authorities_bust_3_in_infection_of_13m_computers/">Boston.com</a></li> <li>Rolón, D. N. <a rel="nofollow" class="external text" href="https://de.scribd.com/doc/215756732/Dario-N-Rolon-Vigilancia-informatica-y-responsabilidad-penal-de-proveedores-de-internet">Control, vigilancia y respuesta penal en el ciberespacio</a>, Latin American's New Security Thinking, Clacso, 2014, pp. 167/182</li> <li>Walden, I. (2007) <i>Computer Crimes and Digital Investigations,</i> Oxford: Oxford University Press.</li> <li>Wall, D.S. (2007) <i>Cybercrimes: The transformation of crime in the information age,</i> Cambridge: Polity.</li> <li>Williams, M. (2006) <i>Virtually Criminal: Crime, Deviance and Regulation Online,</i> Routledge, London.</li> <li>Yar, M. (2006) <i>Cybercrime and Society,</i> London: Sage.</li></ul> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=27" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Cybercrime" class="extiw" title="commons:Category:Cybercrime">Cybercrime</a></span>.</div></div> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237033735"><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/d/df/Wikibooks-logo-en-noslogan.svg/40px-Wikibooks-logo-en-noslogan.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/d/df/Wikibooks-logo-en-noslogan.svg/60px-Wikibooks-logo-en-noslogan.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/d/df/Wikibooks-logo-en-noslogan.svg/80px-Wikibooks-logo-en-noslogan.svg.png 2x" data-file-width="400" data-file-height="400" /></span></span></div> <div class="side-box-text plainlist">The Wikibook <i><a href="https://en.wikibooks.org/wiki/The_Computer_Revolution" class="extiw" title="wikibooks:The Computer Revolution">The Computer Revolution</a></i> has a page on the topic of: <i><b><a href="https://en.wikibooks.org/wiki/The_Computer_Revolution/Security/Computer_Crime" class="extiw" title="wikibooks:The Computer Revolution/Security/Computer Crime">Computer Crime</a></b></i></div></div> </div> <ul><li><a rel="nofollow" class="external text" href="http://www.cybercrimejournal.com">International Journal of Cyber Criminology</a></li> <li><a rel="nofollow" class="external text" href="https://www.ibm.com/services/business-continuity/cyber-attack">Common types of cyber attacks</a></li> <li><a rel="nofollow" class="external text" href="https://www.ibm.com/services/business-continuity/ransomware-attack">Countering ransomware attacks</a></li></ul> <div class="mw-heading mw-heading3"><h3 id="Government_resources">Government resources</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Cybercrime&action=edit&section=28" title="Edit section: Government resources"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a rel="nofollow" class="external text" href="https://www.cybercrime.gov/">Cybercrime.gov</a> from the <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">United States Department of Justice</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20100528122405/http://www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm">National Institute of Justice Electronic Crime Program</a> from the <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">United States Department of Justice</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20161217213634/https://www2.fbi.gov/cyberinvest/cyberhome.htm">FBI Cyber Investigators home page</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20080608160657/http://www.ustreas.gov/usss/financial_crimes.shtml#Computer">US Secret Service Computer Fraud</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20041118085257/http://www.ahtcc.gov.au/">Australian High Tech Crime Centre</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131014171419/http://www.nationalcrimeagency.gov.uk/about-us/what-we-do/national-cyber-crime-unit">UK National Cyber Crime Unit</a> from the <a href="/wiki/National_Crime_Agency" title="National Crime Agency">National Crime Agency</a></li></ul> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Information_security" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Information_security" title="Template:Information security"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Information_security" title="Template talk:Information security"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Information_security" title="Special:EditPage/Template:Information security"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Information_security" style="font-size:114%;margin:0 4em"><a href="/wiki/Information_security" title="Information security">Information security</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related security categories</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Automotive_security" title="Automotive security">Automotive security</a></li> <li><a class="mw-selflink selflink">Cybercrime</a> <ul><li><a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></li> <li><a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></li></ul></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electromagnetic_warfare" class="mw-redirect" title="Electromagnetic warfare">Electromagnetic warfare</a></li> <li><a href="/wiki/Information_warfare" title="Information warfare">Information warfare</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></li> <li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li></ul> </div></td><td class="noviewer navbox-image" rowspan="3" style="width:1px;padding:0 0 0 2px"><div><figure class="mw-halign-center" typeof="mw:File"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description" title="vectorial version"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/150px-CIAJMK1209-en.svg.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/225px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/300px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption>vectorial version</figcaption></figure></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">Threats</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced persistent threat</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">Arbitrary code execution</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li>Bombs <ul><li><a href="/wiki/Fork_bomb" title="Fork bomb">Fork</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic</a></li> <li><a href="/wiki/Time_bomb_(software)" title="Time bomb (software)">Time</a></li> <li><a href="/wiki/Zip_bomb" title="Zip bomb">Zip</a></li></ul></li> <li><a href="/wiki/Hardware_backdoor" title="Hardware backdoor">Hardware backdoors</a></li> <li><a href="/wiki/Code_injection" title="Code injection">Code injection</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Cross-site_scripting" title="Cross-site scripting">Cross-site scripting</a></li> <li><a href="/wiki/Cross-site_leaks" title="Cross-site leaks">Cross-site leaks</a></li> <li><a href="/wiki/DOM_clobbering" title="DOM clobbering">DOM clobbering</a></li> <li><a href="/wiki/History_sniffing" title="History sniffing">History sniffing</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnets</a></li> <li><a href="/wiki/Data_breach" title="Data breach">Data breach</a></li> <li><a href="/wiki/Drive-by_download" title="Drive-by download">Drive-by download</a></li> <li><a href="/wiki/Browser_Helper_Object" title="Browser Helper Object">Browser Helper Objects</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Viruses</a></li> <li><a href="/wiki/Data_scraping" title="Data scraping">Data scraping</a></li> <li><a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">Denial-of-service attack</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Email_spoofing" title="Email spoofing">Email spoofing</a></li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploits</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialers</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Insecure_direct_object_reference" title="Insecure direct object reference">Insecure direct object reference</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke loggers</a></li> <li><a href="/wiki/Malware" title="Malware">Malware</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a> <ul><li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice</a></li></ul></li> <li><a href="/wiki/Polymorphic_engine" title="Polymorphic engine">Polymorphic engine</a></li> <li><a href="/wiki/Privilege_escalation" title="Privilege escalation">Privilege escalation</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkits</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shellcode" title="Shellcode">Shellcode</a></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Software_bug" title="Software bug">Software bugs</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a></li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojans</a></li> <li><a href="/wiki/Remote_access_trojan" class="mw-redirect" title="Remote access trojan">Remote access trojans</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shells</a></li> <li><a href="/wiki/Wiper_(malware)" title="Wiper (malware)">Wiper</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worms</a></li> <li><a href="/wiki/SQL_injection" title="SQL injection">SQL injection</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defenses</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a> <ul><li><a href="/wiki/Secure_coding" title="Secure coding">Secure coding</a></li> <li>Secure by default</li> <li><a href="/wiki/Secure_by_design" title="Secure by design">Secure by design</a> <ul><li><a href="/wiki/Misuse_case" title="Misuse case">Misuse case</a></li></ul></li></ul></li> <li><a href="/wiki/Computer_access_control" title="Computer access control">Computer access control</a> <ul><li><a href="/wiki/Authentication" title="Authentication">Authentication</a> <ul><li><a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></li></ul></li> <li><a href="/wiki/Authorization" title="Authorization">Authorization</a></li></ul></li> <li><a href="/wiki/Computer_security_software" title="Computer security software">Computer security software</a> <ul><li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Security-focused_operating_system" title="Security-focused operating system">Security-focused operating system</a></li></ul></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Code_obfuscation" class="mw-redirect" title="Code obfuscation">Obfuscation (software)</a></li> <li><a href="/wiki/Data_masking" title="Data masking">Data masking</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a> <ul><li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">Host-based intrusion detection system</a> (HIDS)</li> <li><a href="/wiki/Anomaly_detection" title="Anomaly detection">Anomaly detection</a></li></ul></li> <li><a href="/wiki/Information_security_management" title="Information security management">Information security management</a> <ul><li><a href="/wiki/Information_risk_management" class="mw-redirect" title="Information risk management">Information risk management</a></li> <li><a href="/wiki/Security_information_and_event_management" title="Security information and event management">Security information and event management</a> (SIEM)</li></ul></li> <li><a href="/wiki/Runtime_application_self-protection" title="Runtime application self-protection">Runtime application self-protection</a></li> <li><a href="/wiki/Site_isolation" title="Site isolation">Site isolation</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="English_criminal_law" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:English_criminal_law" title="Template:English criminal law"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:English_criminal_law" title="Template talk:English criminal law"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:English_criminal_law" title="Special:EditPage/Template:English criminal law"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="English_criminal_law" style="font-size:114%;margin:0 4em"><a href="/wiki/English_criminal_law" title="English criminal law">English criminal law</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Classes of crimes</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Indictable_offence" title="Indictable offence">Indictable</a></li> <li><a href="/wiki/Hybrid_offence" title="Hybrid offence">Either way</a></li> <li><a href="/wiki/Summary_offence" title="Summary offence">Summary</a></li> <li><a href="/wiki/Regulatory_offence" title="Regulatory offence">Regulatory (lowered mens rea)</a></li> <li><a href="/wiki/Statutory_law" class="mw-redirect" title="Statutory law">Statutory</a></li> <li><a href="/wiki/Common_law_offence" title="Common law offence">Common law</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Elements of crimes</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><i><a href="/wiki/Actus_reus" title="Actus reus">Actus reus</a></i></li> <li><a href="/wiki/Causation_(law)" title="Causation (law)">Causation</a></li> <li><i><a href="/wiki/Mens_rea" title="Mens rea">Mens rea</a></i></li> <li><a href="/wiki/Intention_(criminal_law)" title="Intention (criminal law)">Intention (criminal law)</a></li> <li><a href="/wiki/Intention_in_English_law" title="Intention in English law">Intention in English law</a></li> <li><a href="/wiki/Recklessness_(law)" title="Recklessness (law)">Recklessness</a></li> <li><a href="/wiki/Criminal_negligence" title="Criminal negligence">Criminal negligence</a></li> <li><a href="/wiki/Corporate_liability" title="Corporate liability">Corporate</a> / <a href="/wiki/Vicarious_liability_(criminal)" title="Vicarious liability (criminal)">Vicarious</a> / <a href="/wiki/Strict_liability_(criminal)" title="Strict liability (criminal)">Strict liability</a></li> <li><a href="/wiki/Omissions_in_English_criminal_law" title="Omissions in English criminal law">Omissions</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Doctrines</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Lesser_included_offense" title="Lesser included offense">Lesser included offences</a></li> <li><a href="/wiki/Concurrence" title="Concurrence">Concurrence</a></li> <li><i><a href="/wiki/Ignorantia_juris_non_excusat" title="Ignorantia juris non excusat">Ignorantia juris non excusat</a></i></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Inchoate_offences_in_English_law" title="Inchoate offences in English law">Inchoate offences</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Encouraging_or_assisting_a_crime_in_English_law" title="Encouraging or assisting a crime in English law">Encouraging or assisting a crime</a></li> <li><a href="/wiki/Criminal_conspiracy" title="Criminal conspiracy">Conspiracy</a></li> <li><a href="/wiki/Accessories_and_Abettors_Act_1861" title="Accessories and Abettors Act 1861">Accessory</a></li> <li><a href="/wiki/Attempt" title="Attempt">Attempt</a></li> <li><a href="/wiki/Common_purpose" title="Common purpose">Common purpose</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defences</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Self-defence_in_English_law" title="Self-defence in English law">Self-defence</a></li> <li><a href="/wiki/Duress_in_English_law" title="Duress in English law">Duress</a></li> <li><a href="/wiki/Necessity_in_English_criminal_law" title="Necessity in English criminal law">Necessity</a></li> <li><a href="/wiki/Loss_of_control_defence" title="Loss of control defence">Loss of control</a></li> <li><a href="/wiki/Consent_(criminal_law)" title="Consent (criminal law)">Consent</a> <ul><li>inc. participation in a <a href="/wiki/Sporting_event" class="mw-redirect" title="Sporting event">sporting event</a></li> <li><a href="/wiki/Medical_procedure" title="Medical procedure">Medical procedures</a></li></ul></li> <li><a href="/wiki/Criminal_Law_Act_1967" title="Criminal Law Act 1967">Prevention of crime</a></li> <li><a href="/wiki/Lawful_excuse" class="mw-redirect" title="Lawful excuse">Lawful excuse</a></li> <li><a href="/wiki/M%27Naghten_rules" title="M'Naghten rules">Insanity</a></li> <li><a href="/wiki/Diminished_responsibility_in_English_law" title="Diminished responsibility in English law">Diminished responsibility</a></li> <li><a href="/wiki/Intoxication_in_English_law" title="Intoxication in English law">Intoxication</a></li> <li><i><a href="/wiki/Category:Criminal_defenses" title="Category:Criminal defenses">Category:Criminal defences</a></i></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Offence_against_the_person" title="Offence against the person">Offences against<br />the person</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Homicide_in_English_law" title="Homicide in English law">Homicide</a> (<a href="/wiki/Murder_in_English_law" title="Murder in English law">Murder</a> / <a href="/wiki/Manslaughter_in_English_law" title="Manslaughter in English law">Manslaughter</a> / <a href="/wiki/Corporate_manslaughter_in_English_law" title="Corporate manslaughter in English law">Corporate manslaughter</a> / <a href="/wiki/Infanticide_Act_1938" title="Infanticide Act 1938">Infanticide</a>)</li> <li><a href="/wiki/Unlawful_killing" title="Unlawful killing">Unlawful killing</a></li> <li><a href="/wiki/Child_destruction" title="Child destruction">Child destruction</a></li> <li><a href="/wiki/Concealment_of_birth" title="Concealment of birth">Concealment of birth</a></li> <li><a href="/wiki/Grievous_bodily_harm" title="Grievous bodily harm">Wounding or causing grievous bodily harm</a></li> <li><a href="/wiki/Assault_occasioning_actual_bodily_harm" title="Assault occasioning actual bodily harm">Assault occasioning actual bodily harm</a></li> <li><a href="/wiki/Common_assault" title="Common assault">Common assault</a></li> <li>Attempting to choke, &c. in order to commit any indictable offence</li> <li><a href="/wiki/Assault_with_intent_to_rob" class="mw-redirect" title="Assault with intent to rob">Assault with intent to rob</a></li> <li><a href="/wiki/Robbery" title="Robbery">Robbery</a></li> <li><a href="/w/index.php?title=Assault_with_intent_to_rape&action=edit&redlink=1" class="new" title="Assault with intent to rape (page does not exist)">Assault with intent to rape</a></li> <li><a href="/wiki/Assault_with_intent_to_resist_arrest" title="Assault with intent to resist arrest">Assault with intent to resist lawful apprehension</a></li> <li><a href="/wiki/Assaulting_a_constable_in_the_execution_of_his_duty" title="Assaulting a constable in the execution of his duty">Assaulting a constable in the execution of his duty</a></li> <li><a href="/wiki/Battery_(crime)" title="Battery (crime)">Battery</a></li> <li><a href="/wiki/Kidnapping" title="Kidnapping">Kidnapping</a></li> <li><a href="/wiki/Child_abduction" title="Child abduction">Child abduction</a></li> <li><a href="/wiki/False_imprisonment" title="False imprisonment">False imprisonment</a></li> <li><a href="/wiki/Protection_from_Harassment_Act_1997" title="Protection from Harassment Act 1997">Harassment</a></li> <li><a href="/wiki/Offences_Against_the_Person_Act_1861" title="Offences Against the Person Act 1861">Offences Against the Person Act 1861</a></li> <li><a href="/wiki/Treason" title="Treason">Treason</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Sexual_offences_in_the_United_Kingdom" title="Sexual offences in the United Kingdom">Sexual offences</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Rape_in_English_law" title="Rape in English law">Rape</a></li> <li><a href="/wiki/Sexual_assault" title="Sexual assault">Sexual assault</a></li> <li><a href="/wiki/Sexual_Offences_Act_2003" title="Sexual Offences Act 2003">Sexual Offences Act 2003</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Public-order_crime" title="Public-order crime">Public order offences</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Riot" title="Riot">Riot</a></li> <li><a href="/wiki/Violent_disorder" title="Violent disorder">Violent disorder</a></li> <li><a href="/wiki/Affray" title="Affray">Affray</a></li> <li><a href="/wiki/Unlawful_assembly" title="Unlawful assembly">Unlawful assembly</a></li> <li><a href="/wiki/Fear_or_provocation_of_violence" title="Fear or provocation of violence">Fear or provocation of violence</a></li> <li><a href="/wiki/Harassment,_alarm_or_distress" class="mw-redirect" title="Harassment, alarm or distress">Harassment, alarm or distress</a> <ul><li><a href="/wiki/Intentional_harassment,_alarm_or_distress" title="Intentional harassment, alarm or distress">intent aggravates</a></li></ul></li> <li><a href="/wiki/Public_Order_Act_1986" title="Public Order Act 1986">Public Order Act 1986</a></li> <li><a href="/wiki/Incitement_to_ethnic_or_racial_hatred" title="Incitement to ethnic or racial hatred">Incitement to ethnic or racial hatred</a></li> <li><a href="/wiki/Nuisance_in_English_law" title="Nuisance in English law">Nuisance</a></li> <li>Causing <a href="/wiki/Public_nuisance" title="Public nuisance">Public nuisance</a></li> <li><a href="/wiki/Outraging_public_decency" title="Outraging public decency">Outraging public decency</a></li> <li><a href="/wiki/Effecting_a_public_mischief" class="mw-redirect" title="Effecting a public mischief">Effecting a public mischief</a></li> <li>Keeping a <a href="/wiki/Disorderly_house" title="Disorderly house">disorderly house</a></li> <li><a href="/wiki/Preventing_the_lawful_burial_of_a_body" title="Preventing the lawful burial of a body">Preventing the lawful burial of a body</a></li> <li><a href="/wiki/Breach_of_the_peace" title="Breach of the peace">Breach of the peace</a></li> <li><a href="/wiki/Rout" title="Rout">Rout</a></li> <li><a href="/wiki/Forcible_entry" title="Forcible entry">Forcible entry</a></li> <li><a href="/wiki/Accessory_(legal_term)" title="Accessory (legal term)">Accessory (legal term)</a></li> <li><a href="/wiki/Misconduct_in_a_public_office" class="mw-redirect" title="Misconduct in a public office">Misconduct in a public office</a></li> <li><a href="/wiki/Misfeasance_in_public_office" title="Misfeasance in public office">Misfeasance in public office</a></li> <li><a href="/wiki/Abuse_of_authority" class="mw-redirect" title="Abuse of authority">Abuse of authority</a></li> <li><a href="/wiki/Perjury" title="Perjury">Perjury</a> of oath</li> <li><a href="/wiki/Dereliction_of_duty" class="mw-redirect" title="Dereliction of duty">Dereliction of duty</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Property_crime" title="Property crime">Offences against property</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Arson" title="Arson">Arson</a></li> <li><a href="/wiki/Dishonesty" title="Dishonesty">Dishonesty</a></li> <li><a href="/wiki/Cheating_(law)" title="Cheating (law)">Cheating (law)</a></li> <li><a href="/wiki/Burglary_in_English_law" title="Burglary in English law">Burglary</a></li> <li><a href="/wiki/Robbery" title="Robbery">Robbery</a></li> <li><a href="/wiki/Theft" title="Theft">Theft</a></li> <li><a href="/wiki/Criminal_damage_in_English_law" title="Criminal damage in English law">Criminal damage</a></li> <li><a href="/wiki/Squatting" title="Squatting">Squatting</a></li> <li><a href="/wiki/Trespass" title="Trespass">Trespass</a></li> <li><a href="/wiki/Taking_without_owner%27s_consent" title="Taking without owner's consent">Taking without owner's consent</a></li> <li><a href="/wiki/Deception_(criminal_law)" title="Deception (criminal law)">Deception</a></li> <li><a href="/wiki/Handling_stolen_goods" class="mw-redirect" title="Handling stolen goods">Handling stolen goods</a></li> <li><a href="/wiki/Misappropriation" title="Misappropriation">Misappropriation of funds</a></li> <li><a href="/wiki/Blackmail" title="Blackmail">Blackmail</a></li> <li><a href="/wiki/Extortion" title="Extortion">Extortion</a></li> <li><a class="mw-selflink selflink">Cybercrime</a></li> <li><a href="/wiki/Theft_Act_1968" title="Theft Act 1968">Theft Act 1968</a></li> <li><a href="/wiki/Theft_Act_1978" title="Theft Act 1978">Theft Act 1978</a></li> <li><a href="/wiki/Fraud_Act_2006" title="Fraud Act 2006">Fraud Act 2006</a></li> <li><a href="/wiki/Fraud_by_abuse_of_position" class="mw-redirect" title="Fraud by abuse of position">Fraud by abuse of position</a></li> <li><a href="/wiki/Conspiracy_to_defraud" title="Conspiracy to defraud">Conspiracy to defraud</a></li> <li><a href="/wiki/Fare_evasion" title="Fare evasion">Fare evasion</a></li> <li><a href="/wiki/Webcam_blackmail" class="mw-redirect" title="Webcam blackmail">Webcam blackmail</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Forgery, personation<br />and cheating</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Forgery" title="Forgery">Forgery</a></li> <li><a href="/wiki/Cheating_the_public_revenue" class="mw-redirect" title="Cheating the public revenue">Cheating the public revenue</a></li> <li><a href="/wiki/Uttering" title="Uttering">Uttering</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Offences against justice</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Bribery" title="Bribery">Bribery</a></li> <li><a href="/wiki/Perjury" title="Perjury">Perjury</a></li> <li><a href="/wiki/Perverting_the_course_of_justice" title="Perverting the course of justice">Perverting the course of justice</a></li> <li><a href="/wiki/Witness_intimidation" class="mw-redirect" title="Witness intimidation">Witness intimidation</a></li> <li><a href="/wiki/Witness_tampering" title="Witness tampering">Witness tampering</a></li> <li><a href="/wiki/Misprision_of_treason" title="Misprision of treason">Misprision of treason</a></li> <li><a href="/wiki/Jury_tampering" title="Jury tampering">Jury tampering</a></li> <li><a href="/wiki/Assault_with_intent_to_resist_arrest" title="Assault with intent to resist arrest">Assault with intent to resist lawful apprehension</a></li> <li><a href="/wiki/Assaulting_a_constable_in_the_execution_of_his_duty" title="Assaulting a constable in the execution of his duty">Assaulting a constable in the execution of his duty</a></li> <li><a href="/wiki/Harboring_a_fugitive" class="mw-redirect" title="Harboring a fugitive">Harboring a fugitive</a></li> <li><a href="/wiki/Encouraging_or_assisting_a_crime_in_English_law" title="Encouraging or assisting a crime in English law">Encouraging or assisting a crime</a></li> <li><a href="/wiki/Prison_escape" title="Prison escape">Escape from lawful custody</a></li> <li><a href="/wiki/Obstruction_of_justice" class="mw-redirect" title="Obstruction of justice">Obstruction of justice</a></li> <li><a href="/wiki/Resisting_arrest" class="mw-redirect" title="Resisting arrest">Obstruction of a police officer</a></li> <li><a href="/wiki/Wasting_police_time" title="Wasting police time">Wasting police time</a></li> <li><a href="/wiki/Refusing_to_assist_a_constable" class="mw-redirect" title="Refusing to assist a constable">Refusing to assist a constable</a></li> <li><a href="/wiki/Sedition" title="Sedition">Sedition</a></li> <li><a href="/wiki/Espionage" title="Espionage">Espionage</a></li> <li><a href="/wiki/Contempt_of_court" title="Contempt of court">Contempt of court</a></li> <li><a href="/wiki/False_evidence" title="False evidence">Fabrication of false evidence</a></li> <li><a href="/w/index.php?title=Rescuing_a_prisoner&action=edit&redlink=1" class="new" title="Rescuing a prisoner (page does not exist)">Rescuing a prisoner</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Common_law" title="Common law">Other common law areas</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Contract" title="Contract">Contract</a></li> <li><a href="/wiki/Tort" title="Tort">Tort</a></li> <li><a href="/wiki/Property_law" title="Property law">Property</a></li> <li><a href="/wiki/Will_(law)" class="mw-redirect" title="Will (law)">Wills</a></li> <li><a href="/wiki/Trust_law" class="mw-redirect" title="Trust law">Trusts</a> and <a href="/wiki/Estate_(law)" title="Estate (law)">estates</a></li> <li><a href="/wiki/Evidence_(law)" title="Evidence (law)">Evidence</a></li> <li><a href="/wiki/Criminal_procedure" title="Criminal procedure">Criminal procedure</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow hlist" colspan="2"><div> <ul><li><b><a href="/wiki/Portal:Law" title="Portal:Law">English law portal</a></b></li> <li>For obsolete aspects see <b><a href="/wiki/Template:History_of_English_criminal_law" title="Template:History of English criminal law">History of English criminal law</a> table</b></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Scams_and_confidence_tricks" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Scams_and_confidence_tricks" title="Template:Scams and confidence tricks"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Scams_and_confidence_tricks" title="Template talk:Scams and confidence tricks"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Scams_and_confidence_tricks" title="Special:EditPage/Template:Scams and confidence tricks"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Scams_and_confidence_tricks" style="font-size:114%;margin:0 4em">Scams and confidence tricks</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Terminology</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Scam" title="Scam">Scam</a></li> <li><a href="/wiki/Error_account" title="Error account">Error account</a></li> <li><a href="/wiki/Shill" title="Shill">Shill</a></li> <li><a href="/wiki/Shyster" title="Shyster">Shyster</a></li> <li><a href="/wiki/Sucker_list" title="Sucker list">Sucker list</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Variants</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Advance-fee_scam" title="Advance-fee scam">Advance-fee scam</a></li> <li><a href="/wiki/Art_student_scam" title="Art student scam">Art student scam</a></li> <li><a href="/wiki/Badger_game" title="Badger game">Badger game</a></li> <li><a href="/wiki/Bait-and-switch" title="Bait-and-switch">Bait-and-switch</a></li> <li><a href="/wiki/Black_money_scam" title="Black money scam">Black money scam</a></li> <li><a href="/wiki/Blessing_scam" title="Blessing scam">Blessing scam</a></li> <li><a href="/wiki/Bogus_escrow" title="Bogus escrow">Bogus escrow</a></li> <li><a href="/wiki/Boiler_room_(business)" title="Boiler room (business)">Boiler room</a></li> <li><a href="/wiki/Bride_scam" title="Bride scam">Bride scam</a></li> <li><a href="/wiki/Charity_fraud" title="Charity fraud">Charity fraud</a></li> <li><a href="/wiki/Clip_joint" title="Clip joint">Clip joint</a></li> <li><a href="/wiki/Coin-matching_game" title="Coin-matching game">Coin-matching game</a></li> <li><a href="/wiki/Coin_rolling_scams" title="Coin rolling scams">Coin rolling scams</a></li> <li><a href="/wiki/Drop_swindle" title="Drop swindle">Drop swindle</a></li> <li><a href="/wiki/Embarrassing_cheque" title="Embarrassing cheque">Embarrassing cheque</a></li> <li><a href="/wiki/Exit_scam" title="Exit scam">Exit scam</a></li> <li><a href="/wiki/Extraterrestrial_real_estate" title="Extraterrestrial real estate">Extraterrestrial real estate</a></li> <li><a href="/wiki/Fiddle_game" class="mw-redirect" title="Fiddle game">Fiddle game</a></li> <li><a href="/wiki/Fine_print" title="Fine print">Fine print</a></li> <li><a href="/wiki/Foreclosure_rescue_scheme" title="Foreclosure rescue scheme">Foreclosure rescue scheme</a></li> <li><a href="/wiki/Foreign_exchange_fraud" title="Foreign exchange fraud">Foreign exchange fraud</a></li> <li><a href="/wiki/Fortune_telling_fraud" title="Fortune telling fraud">Fortune telling fraud</a></li> <li><a href="/wiki/Gem_scam" title="Gem scam">Gem scam</a></li> <li><a href="/wiki/Get-rich-quick_scheme" title="Get-rich-quick scheme">Get-rich-quick scheme</a></li> <li><a href="/wiki/Green_goods_scam" title="Green goods scam">Green goods scam</a></li> <li><a href="/wiki/Hustling" title="Hustling">Hustling</a></li> <li><a href="/wiki/Indian_coal_allocation_scam" title="Indian coal allocation scam">Indian coal allocation scam</a></li> <li><a href="/wiki/IRS_impersonation_scam" title="IRS impersonation scam">IRS impersonation scam</a></li> <li><a href="/wiki/Scams_in_intellectual_property" title="Scams in intellectual property">Intellectual property scams</a></li> <li><a href="/wiki/Kansas_City_Shuffle" title="Kansas City Shuffle">Kansas City Shuffle</a></li> <li><a href="/wiki/Locksmith_scam" title="Locksmith scam">Locksmith scam</a></li> <li><a href="/wiki/Long_firm_fraud" title="Long firm fraud">Long firm</a></li> <li><a href="/wiki/Mismarking" title="Mismarking">Mismarking</a></li> <li><a href="/wiki/Mock_auction" title="Mock auction">Mock auction</a></li> <li><a href="/wiki/Moving_scam" title="Moving scam">Moving scam</a></li> <li><a href="/wiki/Overpayment_scam" title="Overpayment scam">Overpayment scam</a></li> <li><a href="/wiki/Patent_safe" title="Patent safe">Patent safe</a></li> <li><a href="/wiki/Pig_in_a_poke" title="Pig in a poke">Pig in a poke</a></li> <li><a href="/wiki/Pigeon_drop" title="Pigeon drop">Pigeon drop</a></li> <li><a href="/wiki/Pork_barrel" title="Pork barrel">Pork barrel</a></li> <li><a href="/wiki/Pump_and_dump" title="Pump and dump">Pump and dump</a></li> <li><a href="/wiki/Redemption_movement" title="Redemption movement">Redemption/A4V schemes</a></li> <li><a href="/wiki/Reloading_scam" title="Reloading scam">Reloading scam</a></li> <li><a href="/wiki/Return_fraud" title="Return fraud">Return fraud</a></li> <li><a href="/wiki/Salting_(confidence_trick)" title="Salting (confidence trick)">Salting</a></li> <li><a href="/wiki/Shell_game" title="Shell game">Shell game</a></li> <li><a href="/wiki/Sick_baby_hoax" title="Sick baby hoax">Sick baby hoax</a></li> <li><a href="/wiki/SIM_swap_scam" title="SIM swap scam">SIM swap scam</a></li> <li><a href="/wiki/Slavery_reparations_scam" title="Slavery reparations scam">Slavery reparations scam</a></li> <li><a href="/wiki/Spanish_Prisoner" title="Spanish Prisoner">Spanish Prisoner</a></li> <li><a href="/wiki/SSA_impersonation_scam" title="SSA impersonation scam">SSA impersonation scam</a></li> <li><a href="/wiki/SSC_Scam" title="SSC Scam">SSC Scam</a></li> <li><a href="/wiki/Strip_search_phone_call_scam" title="Strip search phone call scam">Strip search phone call scam</a></li> <li><a href="/wiki/Swampland_in_Florida" title="Swampland in Florida">Swampland in Florida</a></li> <li><a href="/wiki/Tarmac_scam" title="Tarmac scam">Tarmac scam</a></li> <li><a href="/wiki/Technical_support_scam" title="Technical support scam">Technical support scam</a></li> <li><a href="/wiki/Telemarketing_fraud" title="Telemarketing fraud">Telemarketing fraud</a></li> <li><a href="/wiki/Thai_tailor_scam" title="Thai tailor scam">Thai tailor scam</a></li> <li><a href="/wiki/Thai_zig_zag_scam" title="Thai zig zag scam">Thai zig zag scam</a></li> <li><a href="/wiki/Three-card_monte" title="Three-card monte">Three-card monte</a></li> <li><a href="/wiki/Trojan_horse_(business)" title="Trojan horse (business)">Trojan horse</a></li> <li><a href="/wiki/Wash_trading" class="mw-redirect" title="Wash trading">Wash trading</a></li> <li><a href="/wiki/White_van_speaker_scam" title="White van speaker scam">White van speaker scam</a></li> <li><a href="/wiki/Work-at-home_scheme" title="Work-at-home scheme">Work-at-home scheme</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Internet_fraud" title="Internet fraud">Internet scams</a> and<br />countermeasures</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Avalanche_(phishing_group)" title="Avalanche (phishing group)">Avalanche</a></li> <li><a href="/wiki/Pig_butchering_scam" title="Pig butchering scam">Pig Butchering</a></li> <li><a href="/wiki/Carding_(fraud)" title="Carding (fraud)">Carding</a></li> <li><a href="/wiki/Catfishing" title="Catfishing">Catfishing</a></li> <li><a href="/wiki/Click_fraud" title="Click fraud">Click fraud</a></li> <li><a href="/wiki/Clickjacking" title="Clickjacking">Clickjacking</a></li> <li><a href="/wiki/Cramming_(fraud)" title="Cramming (fraud)">Cramming</a></li> <li><a href="/wiki/Category:Cryptocurrency_scams" title="Category:Cryptocurrency scams">Cryptocurrency scams</a></li> <li><a class="mw-selflink selflink">Cybercrime</a></li> <li><a href="/wiki/CyberThrill" title="CyberThrill">CyberThrill</a></li> <li><a href="/wiki/DarkMarket" title="DarkMarket">DarkMarket</a></li> <li><a href="/wiki/Domain_name_scams" class="mw-redirect" title="Domain name scams">Domain name scams</a></li> <li><a href="/wiki/Email_authentication" title="Email authentication">Email authentication</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Internet_vigilantism" title="Internet vigilantism">Internet vigilantism</a></li> <li><a href="/wiki/Lenny_(bot)" title="Lenny (bot)">Lenny anti-scam bot</a></li> <li><a href="/wiki/Lottery_scam" title="Lottery scam">Lottery scam</a></li> <li><a href="/wiki/PayPaI" title="PayPaI">PayPai</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a></li> <li><a href="/wiki/Referer_spoofing" title="Referer spoofing">Referer spoofing</a></li> <li><a href="/wiki/Ripoff_Report" title="Ripoff Report">Ripoff Report</a></li> <li><a href="/wiki/Rock_Phish" title="Rock Phish">Rock Phish</a></li> <li><a href="/wiki/Romance_scam" title="Romance scam">Romance scam</a></li> <li><a href="/wiki/Russian_Business_Network" title="Russian Business Network">Russian Business Network</a></li> <li><a href="/wiki/SaferNet" title="SaferNet">SaferNet</a></li> <li><a href="/wiki/Scam_baiting" title="Scam baiting">Scam baiting</a> <ul><li><a href="/wiki/419eater.com" title="419eater.com">419eater.com</a></li> <li><a href="/wiki/Jim_Browning_(YouTuber)" title="Jim Browning (YouTuber)">Jim Browning</a></li> <li><a href="/wiki/Kitboga_(streamer)" title="Kitboga (streamer)">Kitboga</a></li> <li><a href="/wiki/Scammer_Payback" title="Scammer Payback">Scammer Payback</a></li></ul></li> <li><a href="/wiki/ShadowCrew" title="ShadowCrew">ShadowCrew</a></li> <li><a href="/wiki/Spoofed_URL" title="Spoofed URL">Spoofed URL</a></li> <li><a href="/wiki/Spoofing_attack" title="Spoofing attack">Spoofing attack</a></li> <li><a href="/wiki/Stock_Generation" title="Stock Generation">Stock Generation</a></li> <li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice phishing</a></li> <li><a href="/wiki/Reputation_management" title="Reputation management">Website reputation ratings</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Pyramid_scheme" title="Pyramid scheme">Pyramid</a> and<br /><a href="/wiki/Ponzi_scheme" title="Ponzi scheme">Ponzi schemes</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Aman_Futures_Group" class="mw-redirect" title="Aman Futures Group">Aman Futures Group</a></li> <li><a href="/wiki/Bernard_Cornfeld" title="Bernard Cornfeld">Bernard Cornfeld</a></li> <li><a href="/wiki/Caritas_(Ponzi_scheme)" title="Caritas (Ponzi scheme)">Caritas</a></li> <li><a href="/wiki/Dona_Branca" title="Dona Branca">Dona Branca</a></li> <li><a href="/wiki/Earl_Jones_(investment_advisor)" title="Earl Jones (investment advisor)">Earl Jones</a></li> <li><a href="/wiki/Ezubao" title="Ezubao">Ezubao</a></li> <li><a href="/wiki/Foundation_for_New_Era_Philanthropy" title="Foundation for New Era Philanthropy">Foundation for New Era Philanthropy</a></li> <li><a href="/wiki/Franchise_fraud" title="Franchise fraud">Franchise fraud</a></li> <li><a href="/wiki/High-yield_investment_program" title="High-yield investment program">High-yield investment program (HYIP)</a></li> <li><a href="/wiki/Investors_Overseas_Service" title="Investors Overseas Service">Investors Overseas Service</a></li> <li><a href="/wiki/Kapa_investment_scam" class="mw-redirect" title="Kapa investment scam">Kapa investment scam</a></li> <li><a href="/wiki/Kubus_scheme" title="Kubus scheme">Kubus scheme</a></li> <li><a href="/wiki/Madoff_investment_scandal" title="Madoff investment scandal">Madoff investment scandal</a></li> <li><a href="/wiki/Make_Money_Fast" title="Make Money Fast">Make Money Fast</a></li> <li><a href="/wiki/Matrix_scheme" title="Matrix scheme">Matrix scheme</a></li> <li><a href="/wiki/MMM_(Ponzi_scheme_company)" title="MMM (Ponzi scheme company)">MMM</a></li> <li><a href="/wiki/Petters_Group_Worldwide" title="Petters Group Worldwide">Petters Group Worldwide</a></li> <li><a href="/wiki/Pyramid_schemes_in_Albania" title="Pyramid schemes in Albania">Pyramid schemes in Albania</a></li> <li><a href="/wiki/Reed_Slatkin" title="Reed Slatkin">Reed Slatkin</a></li> <li><a href="/wiki/Saradha_Group_financial_scandal" title="Saradha Group financial scandal">Saradha Group financial scandal</a></li> <li><a href="/wiki/Secret_Sister" title="Secret Sister">Secret Sister</a></li> <li><a href="/wiki/Scott_W._Rothstein" title="Scott W. Rothstein">Scott W. Rothstein</a></li> <li><a href="/wiki/Stanford_Financial_Group" title="Stanford Financial Group">Stanford Financial Group</a></li> <li><a href="/wiki/Welsh_Thrasher_faith_scam" title="Welsh Thrasher faith scam">Welsh Thrasher faith scam</a></li> <li><a href="/wiki/WinCapita" title="WinCapita">WinCapita</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Lists</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/List_of_con_artists" title="List of con artists">Con artists</a></li> <li><a href="/wiki/List_of_confidence_tricks" class="mw-redirect" title="List of confidence tricks">Confidence tricks</a></li> <li><a href="/wiki/List_of_criminal_enterprises,_gangs,_and_syndicates" title="List of criminal enterprises, gangs, and syndicates">Criminal enterprises, gangs and syndicates</a></li> <li><a href="/wiki/List_of_impostors" title="List of impostors">Impostors</a></li> <li>In the media <ul><li><a href="/wiki/Confidence_tricks_in_film_and_television" title="Confidence tricks in film and television">Film and television</a></li> <li><a href="/wiki/Confidence_tricks_in_literature" title="Confidence tricks in literature">Literature</a></li></ul></li> <li><a href="/wiki/List_of_Ponzi_schemes" title="List of Ponzi schemes">Ponzi schemes</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1038841319"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1038841319"></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q29137#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/4010452-7">Germany</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh85029492">United States</a></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="Criminalité informatique"><a rel="nofollow" class="external text" href="https://catalogue.bnf.fr/ark:/12148/cb13735387b">France</a></span></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="Criminalité informatique"><a rel="nofollow" class="external text" href="https://data.bnf.fr/ark:/12148/cb13735387b">BnF data</a></span></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.ndl.go.jp/auth/ndlna/00561444">Japan</a></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="počítačová kriminalita"><a rel="nofollow" class="external text" href="https://aleph.nkp.cz/F/?func=find-c&local_base=aut&ccl_term=ica=ph124505&CON_LNG=ENG">Czech Republic</a></span></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&local_base=NLX10&find_code=UID&request=987007545777405171">Israel</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐api‐int.codfw.main‐849f99967d‐gkkmc Cached time: 20241123182540 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.557 seconds Real time usage: 1.794 seconds Preprocessor visited node count: 8208/1000000 Post‐expand include size: 305913/2097152 bytes Template argument size: 6818/2097152 bytes Highest expansion depth: 14/100 Expensive parser function count: 23/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 462211/5000000 bytes Lua time usage: 0.987/10.000 seconds Lua memory usage: 7488078/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1518.414 1 -total 52.30% 794.157 1 Template:Reflist 25.10% 381.123 77 Template:Cite_web 10.17% 154.431 8 Template:Cite_book 6.79% 103.097 1 Template:Criminology 6.65% 101.031 1 Template:Sidebar 6.59% 100.052 1 Template:Short_description 5.51% 83.676 13 Template:Cite_journal 5.50% 83.505 15 Template:Cite_news 5.39% 81.866 2 Template:Sister_project --> <!-- Saved in parser cache with key enwiki:pcache:idhash:341598-0!canonical and timestamp 20241123182540 and revision id 1259160224. Rendering was triggered because: api-parse --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Cybercrime&oldid=1259160224">https://en.wikipedia.org/w/index.php?title=Cybercrime&oldid=1259160224</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Cybercrime" title="Category:Cybercrime">Cybercrime</a></li><li><a href="/wiki/Category:Crime_by_type" title="Category:Crime by type">Crime by type</a></li><li><a href="/wiki/Category:Computer_security" title="Category:Computer security">Computer security</a></li><li><a href="/wiki/Category:Organized_crime_activity" title="Category:Organized crime activity">Organized crime activity</a></li><li><a href="/wiki/Category:Harassment_and_bullying" title="Category:Harassment and bullying">Harassment and bullying</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1:_long_volume_value" title="Category:CS1: long volume value">CS1: long volume value</a></li><li><a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">CS1 maint: archived copy as title</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_April_2019" title="Category:Use dmy dates from April 2019">Use dmy dates from April 2019</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_November_2023" title="Category:Articles with unsourced statements from November 2023">Articles with unsourced statements from November 2023</a></li><li><a href="/wiki/Category:Articles_with_limited_geographic_scope_from_March_2016" title="Category:Articles with limited geographic scope from March 2016">Articles with limited geographic scope from March 2016</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_January_2024" title="Category:Articles with unsourced statements from January 2024">Articles with unsourced statements from January 2024</a></li><li><a href="/wiki/Category:Commons_category_link_is_on_Wikidata" title="Category:Commons category link is on Wikidata">Commons category link is on Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 23 November 2024, at 18:25<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Cybercrime&mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-ckdzv","wgBackendResponseTime":160,"wgPageParseReport":{"limitreport":{"cputime":"1.557","walltime":"1.794","ppvisitednodes":{"value":8208,"limit":1000000},"postexpandincludesize":{"value":305913,"limit":2097152},"templateargumentsize":{"value":6818,"limit":2097152},"expansiondepth":{"value":14,"limit":100},"expensivefunctioncount":{"value":23,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":462211,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1518.414 1 -total"," 52.30% 794.157 1 Template:Reflist"," 25.10% 381.123 77 Template:Cite_web"," 10.17% 154.431 8 Template:Cite_book"," 6.79% 103.097 1 Template:Criminology"," 6.65% 101.031 1 Template:Sidebar"," 6.59% 100.052 1 Template:Short_description"," 5.51% 83.676 13 Template:Cite_journal"," 5.50% 83.505 15 Template:Cite_news"," 5.39% 81.866 2 Template:Sister_project"]},"scribunto":{"limitreport-timeusage":{"value":"0.987","limit":"10.000"},"limitreport-memusage":{"value":7488078,"limit":52428800}},"cachereport":{"origin":"mw-api-int.codfw.main-849f99967d-gkkmc","timestamp":"20241123182540","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Cybercrime","url":"https:\/\/en.wikipedia.org\/wiki\/Cybercrime","sameAs":"http:\/\/www.wikidata.org\/entity\/Q29137","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q29137","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2003-10-15T20:50:47Z","dateModified":"2024-11-23T18:25:29Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/e\/e4\/Social_Network_Diagram_%28segment%29.svg","headline":"any crime that involves a computer and a network"}</script> </body> </html>