Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Organized crime
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Cybercrime=== {{main|Cybercrime}} ====Internet fraud==== {{main|Identity theft|internet fraud}} Identity theft is a form of [[fraud]] or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Victims of identity theft (those whose identity has been assumed by the identity thief) can suffer adverse consequences if held accountable for the perpetrator's actions, as can organizations and individuals who are defrauded by the identity thief, and to that extent are also victims. Internet fraud refers to the actual use of [[Internet]] services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. In the context of organized crime, both may serve as means through which other criminal activity may be successfully perpetrated or as the primary goal themselves. [[Email fraud]], [[advance-fee fraud]], [[romance scam]]s, [[employment scams]], and other [[phishing]] scams are the most common and most widely used forms of identity theft,<ref>{{cite journal |last=Choo|title=Organized crime groups in cyberspace: a typology|journal=Trends in Organized Crime|date=2008|volume=11| issue=3|doi=10.1007/s12117-008-9038-9|pages=270β295|s2cid=144928585}}</ref> though with the advent of social networking fake websites, accounts and other fraudulent or deceitful activity has become commonplace. ====Copyright infringement==== {{main|Copyright infringement}} Copyright infringement is the unauthorized or prohibited use of works under [[copyright]], infringing the copyright holder's [[exclusive right]]s, such as the right to reproduce or perform the copyrighted work, or to make [[derivative work]]s. Whilst almost universally considered under [[civil procedure]], the impact and intent of organized criminal operations in this area of crime has been the subject of much debate. Article 61 of the [[Agreement on Trade-Related Aspects of Intellectual Property Rights]] (TRIPs) requires that signatory countries establish [[criminal]] procedures and penalties in cases of willful trademark counterfeiting or copyright piracy on a commercial scale. More recently copyright holders have demanded that states provide criminal sanctions for all types of copyright infringement.<ref>{{cite book |last=Li & Correa|title=Intellectual property enforcement: international perspectives |date=2009 |publisher=Edward Elgar Publishing|url=https://books.google.com/books?id=bN3o1uwpKF4C&q=copyright+infringement+international+acta|isbn=9781848449251 }}</ref> Organized criminal groups capitalize on consumer complicity, advancements in security and anonymity technology, emerging markets and new methods of product transmission, and the consistent nature of these provides a stable financial basis for other areas of organized crime.<ref>[https://legamart.com/articles/guide-on-us-copyright-protection-in-foreign/A Primer on the US Copyright Protection InternationallySneha Solanki] Retrieved 6 October 2023</ref><ref>[https://www.ip-watch.org/2012/03/15/more-foreigners-find-themselves-targets-of-us-copyright-law/More Foreigners Find Themselves Targets Of US Copyright Law] Retrieved 6 October 2023</ref> ====Cyberwarfare==== {{main|Cyberwarfare}} {{further|Titan Rain|Moonlight Maze}} '''Cyberwarfare''' refers to politically motivated [[Computer crime|hacking]] to conduct [[Cyber spying|sabotage]] and [[espionage]]. It is a form of [[information warfare]] sometimes seen as analogous to [[conventional warfare]]<ref name="DOD - Cyberspace">{{cite web |url=http://www.dtic.mil/doctrine/jel/doddict/data/c/01473.html |title=DOD - Cyberspace |publisher=Dtic.mil |access-date=2011-12-17 |url-status=dead |archive-url=https://web.archive.org/web/20111118162815/http://www.dtic.mil/doctrine/jel/doddict/data/c/01473.html |archive-date=November 18, 2011 }}</ref> although this analogy is [[#Controversy over terms|controversial]] for both its accuracy and its political motivation. It has been defined as activities by a nation-state to penetrate another nation's computers or networks with the intention of causing civil damage or disruption.<ref name=Clarke>Clarke, Richard A. ''Cyber War'', HarperCollins (2010)</ref> Moreover, it acts as the "fifth domain of warfare,"<ref name=Economist>[http://www.economist.com/node/16481504?story_id=16481504&source=features_box1 "Cyberwar: War in the Fifth Domain"] ''Economist'', July 1, 2010</ref> and [[William J. Lynn]], U.S. Deputy [[United States Secretary of Defense|Secretary of Defense]], states that "as a doctrinal matter, [[the Pentagon]] has formally recognized cyberspace as a new domain in warfare . . . [which] has become just as critical to military operations as land, sea, air, and space."<ref name=Lynn>Lynn, William J. III. [http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain "Defending a New Domain: The Pentagon's Cyberstrategy"], ''Foreign Affairs'', September/October 2010, pp. 97-108</ref> Cyber [[espionage]] is the practice of obtaining confidential, sensitive, proprietary or classified information from individuals, competitors, groups, or governments using illegal exploitation methods on internet, networks, software or computers. There is also a clear military, political, or economic motivation. Unsecured information may be intercepted and modified, making [[espionage]] possible internationally. The recently established [[Cyber Command]] is currently debating whether such activities as commercial espionage or theft of intellectual property are criminal activities or actual "breaches of national security."<ref name=Clark2/> Furthermore, military activities that use computers and [[satellite]]s for coordination are at risk of equipment disruption. Orders and communications can be intercepted or replaced. Power, water, fuel, communications, and transportation infrastructure all may be vulnerable to [[sabotage]]. According to Clarke, the civilian realm is also at risk, noting that the security breaches have already gone beyond stolen credit card numbers, and that potential targets can also include the electric power grid, trains, or the stock market.<ref name=Clark2>[http://www.hometownannapolis.com/news/top/2010/09/24-11/Clarke-More-defense-needed-in-cyberspace.html "Clarke: More defense needed in cyberspace"] {{Webarchive|url=https://web.archive.org/web/20120324191031/http://www.hometownannapolis.com/news/top/2010/09/24-11/Clarke-More-defense-needed-in-cyberspace.html |date=2012-03-24 }} ''HometownAnnapolis.com'', September 24, 2010</ref> ====Computer viruses==== {{main|Computer virus|denial-of-service attack}} The term "computer virus" may be used as an overarching phrase to include all types of true viruses, [[malware]], including [[computer worm]]s, [[Trojan horse (computing)|Trojan horse]]s, most [[rootkit]]s, [[spyware]], dishonest [[adware]] and other malicious and unwanted software (though all are technically unique),<ref>{{cite journal |last=Grabowsky|title=The Internet, Technology, and Organized Crime|journal=Asian Journal of Criminology |date=2007 |volume=2 |issue=2 |doi=10.1007/s11417-007-9034-z |pages=145β161|s2cid=144677777|hdl=1885/21260 |hdl-access=free }}</ref> and proves to be quite financially lucrative for criminal organizations,<ref>{{cite journal |last=Williams|title=Organized Crime and Cybercrime: Synergies, Trends, and Responses|journal=Global Issues|date=2001|volume=6|issue=2|url=http://www.ncjrs.gov/App/AbstractDB/AbstractDBDetails.aspx?id=191389 |id={{NCJ|191389}} }}</ref> offering greater opportunities for [[fraud]] and [[extortion]] whilst increasing security, secrecy and anonymity.<ref>{{cite journal|last=O'Neil |title=Rebels for the System? Virus Writers, General Intellect, Cyberpunk and Criminal Capitalism |journal=Continuum: Journal of Media & Cultural Studies |date=2006 |volume=20 |issue=2 |pages=225β241 |url=http://adsri.anu.edu.au/pubs/ONeil/O%27Neil_VirusWriters.pdf |url-status=dead |archive-url=https://web.archive.org/web/20110407174526/http://adsri.anu.edu.au/pubs/ONeil/O%27Neil_VirusWriters.pdf |archive-date=April 7, 2011 |doi=10.1080/10304310600641760 |s2cid=39204645 |hdl=1885/30644 |hdl-access=free }}</ref> Worms may be utilized by organized crime groups to exploit security [[vulnerability (computing)|vulnerabilities]] (duplicating itself automatically across other computers a given network),<ref>{{cite book | last1 = Weaver | first1 = Nicholas | last2 = Paxson | first2 = Vern | last3 = Staniford | first3 = Stuart | last4 = Cunningham | first4 = Robert| title = Proceedings of the 2003 ACM workshop on Rapid malcode | chapter = A taxonomy of computer worms|pages=11β18 |date=2003 |chapter-url=http://portal.acm.org/citation.cfm?id=948190 |doi=10.1145/948187.948190 |isbn=1581137850 |s2cid=2298495}}</ref> while a Trojan horse is a program that appears harmless but hides malicious functions (such as retrieval of stored confidential data, corruption of information, or interception of transmissions). Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Applying the Internet model of organized crime, the proliferation of computer viruses and other malicious software promotes a sense of detachment between the perpetrator (whether that be the criminal organization or another individual) and the victim; this may help to explain vast increases in cyber-crime such as these for the purpose of ideological crime or terrorism.<ref>{{cite book |last=Linden|title=Focus on Terrorism|date=2007|publisher=Nova Publishing|url=https://books.google.com/books?id=wl-Ds42YMDIC&q=Focus+on+Terrorism+linden|isbn=9781600217098}}</ref> In mid July 2010, security experts discovered a malicious software program that had infiltrated factory computers and had spread to plants around the world. It is considered "the first attack on critical industrial infrastructure that sits at the foundation of modern economies," notes the ''New York Times.''<ref>[http://bits.blogs.nytimes.com/2010/09/24/malware-hits-computerized-industrial-equipment/ "Malware Hits Computerized Industrial Equipment"] ''New York Times'', September 24, 2010</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Organized crime
(section)
Add topic