{"id":1650,"date":"2015-01-20T11:19:08","date_gmt":"2015-01-20T09:19:08","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1650"},"modified":"2015-01-21T08:02:09","modified_gmt":"2015-01-21T06:02:09","slug":"2-reports-on-cybercime","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1650","title":{"rendered":"2 Reports on Cybercrime"},"content":{"rendered":"<p><a href=\"https:\/\/www.europol.europa.eu\/ec3\">EC3<\/a> (European Cybercrime Centre at Europol) has published a good report on the cybercrime, worth to take a look. The other report by McAfee complements with estimations of the costs.<\/p>\n<p><strong>Definitions<\/strong><\/p>\n<blockquote>\n<p><a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/cybercrime\">TechTarget<\/a>: Cybercrime is a term for any illegal activity that uses a computer as its primary means of commission.<\/p>\n<p><a href=\"http:\/\/itlaw.wikia.com\/wiki\/Cybercrime\">IT Law Wiki<\/a>: Cybercrime is criminal activities that specifically target a computer or network for damage or infiltration and also refers to the use of computers as tools to conduct criminal activity<\/p>\n<p><a href=\"http:\/\/www.oxforddictionaries.com\/definition\/english\/cybercrime\">Oxford<\/a>: Criminal activities carried out by means of computers or the Internet.<\/p>\n<p><a href=\"http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=44375\">ISO 27032<\/a>: criminal activity where services or applications in the Cyberspace are used for or are the target of a crime, or<br \/>\nwhere the Cyberspace is the source, tool, target, or place of a crime.<\/p>\n<blockquote>\n<p>the Cyberspace: complex environment resulting from the interaction of people, software and services on the Internet by means<br \/>\nof technology devices and networks connected to it, which does not exist in any physical form.<\/p>\n<\/blockquote>\n<\/blockquote>\n<p><strong>iOCTA (Internet Organised Crime Threat Assessment )<\/strong><\/p>\n<p>Selected extracts from the report (<a href=\"https:\/\/www.europol.europa.eu\/sites\/default\/files\/publications\/europol_iocta_web.pdf\">2014 pdf<\/a>):<\/p>\n<blockquote>\n<p>The <strong>Crime-as-a-Service<\/strong> (CaaS) business model drives the digital underground economy by providing a wide range of commercial services that facilitate almost any type of cybercrime.<br \/>\nThe <strong>anonymisation techniques<\/strong> used in parts of the Internet, known as Darknets, allow users to communicate freely without the risk of being traced.<\/p>\n<\/blockquote>\n<p><img loading=\"lazy\" alt=\"Cybercrime-iocta01\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2015\/01\/cybercrime-iocta01.png\" width=\"550\" height=\"413\" \/><\/p>\n<p>Social engineering related confidence tricks (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Confidence_trick\">scams<\/a>)<\/p>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2015\/01\/cybercrime-iocta02.png\"><img loading=\"lazy\" alt=\"Cybercrime-iocta02\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2015\/01\/cybercrime-iocta02-small.png\" width=\"550\" height=\"273\" \/><\/a><\/p>\n<p><strong>Global Cost of Cybercrime<\/strong><\/p>\n<p>Selected extracts from &#8220;<a href=\"http:\/\/www.mcafee.com\/fr\/resources\/reports\/rp-economic-impact-cybercrime2.pdf\">Net Losses: Estimating the Global Cost of Cybercrime<\/a>&#8220;<\/p>\n<p>Comparing cost of cybercrime with other costs.<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BACKGROUND: #bfbfbf; BORDER-TOP: windowtext 1pt solid; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">Activity<\/span><\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BACKGROUND: #bfbfbf; BORDER-TOP: windowtext 1pt solid; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">Cost As % of GDP<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">Maritime Piracy<\/span><\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">0.02% (global)<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">Transnational Crime<\/span><\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">1.2% (global)<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">Counterfeiting\/Piracy<\/span><\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">0.89% (global)<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">Pilferage<\/span><\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">1.5% (US)<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">Car Crashes<\/span><\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\"><span lang=\"EN-US\">1.0% (US)<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\">Narcotics<\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\">0.9% (global)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: windowtext 1pt solid; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 118.8pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"158\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\">Cybercrime<\/p>\n<\/td>\n<td style=\"BORDER-BOTTOM: windowtext 1pt solid; BORDER-LEFT: medium none; PADDING-BOTTOM: 0cm; PADDING-LEFT: 5.4pt; WIDTH: 99.25pt; PADDING-RIGHT: 5.4pt; BORDER-TOP: medium none; BORDER-RIGHT: windowtext 1pt solid; PADDING-TOP: 0cm\" valign=\"top\" width=\"132\">\n<p style=\"LINE-HEIGHT: normal; MARGIN-BOTTOM: 0pt\" class=\"MsoNormal\">0.8% (global)<\/p>\n<\/td>\n<\/tr>\n<\/table>\n<p>Showing estiamated cost for some countries.<\/p>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2015\/01\/cybercrime-mcafee.png\"><img loading=\"lazy\" alt=\"Cybercrime-mcafee\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2015\/01\/cybercrime-mcafee-small.png\" width=\"550\" height=\"184\" \/><\/a><\/p>\n<p><strong>Other Links<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/conventions.coe.int\/Treaty\/Commun\/QueVoulezVous.asp?CL=ENG&amp;NT=185\">Budapest Convention on Cybercrime<\/a>, in <a href=\"http:\/\/en.wikipedia.org\/wiki\/Convention_on_Cybercrime\">wikipedia<\/a>,<\/li>\n<li><a href=\"http:\/\/www.ic3.gov\/media\/annualreports.aspx\">Annual reports at the IC3<\/a> (Internet Crime Complaint Center)<\/li>\n<li><a href=\"http:\/\/www.pwc.com\/us\/en\/increasing-it-effectiveness\/publications\/2014-us-state-of-cybercrime.jhtml\">2014 US State of Cybercrime Survey<\/a> (by PwC)<\/li>\n<\/ul>\n<blockquote>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2015\/01\/cybercrime-us-state.png\"><img loading=\"lazy\" alt=\"Cybercrime-US-state\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2015\/01\/cybercrime-us-state-small.png\" width=\"550\" height=\"163\" \/><\/a><\/p>\n<\/blockquote>\n<ul dir=\"ltr\">\n<li><a href=\"http:\/\/www.cio.com\/article\/2438631\/spyware\/a-brief-history-of-malware-and-cybercrime.html\">A Brief History of Malware and Cybercrime<\/a>\n<ul>\n<li>Spam, Rootkits, Viruses, Computer intrusions,<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>EC3 (European Cybercrime Centre at Europol) has published a good report on the cybercrime, worth to take a look. The other report by McAfee complements with estimations of the costs. Definitions TechTarget: Cybercrime is a term for any illegal activity &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1650\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[15,32,44],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1650"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1650"}],"version-history":[{"count":5,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1650\/revisions"}],"predecessor-version":[{"id":1655,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1650\/revisions\/1655"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}