Talk:Cybercrime/Archive 1

Stub or not
I'm not quite sure whether to call this a stub or not. Most of what could be added is already covered in the articles it links to. There's not a lot of consistency in these, which is no suprise, there are lots of opinions in this area. But I think overall the coverage of the topic is pretty good already. Always room for improvement of course. Andrewa 21:06, 15 Oct 2003 (UTC)

Who was the first person to ever start Computer Forensics?
I just was wondering if anyone knew who was the first to start that. I have to write a paper about it, but i cant seem to find it anywhere. Please Help. mrswayzee thomas trevenoi he did it all —Preceding unsigned comment added by 206.77.200.87 (talk) 19:38, 8 October 2009 (UTC)

Getting lottery emails and fund transfer emails regularly
hello I am getting such type of emails regularly. They asks processing charges to transfer the winning amount. All from Sweden, Netherland.

From Nigeria fund transfer email comes. They have 10 million US Dollors to transfer, they offer 30% to me. Rest to them. What Profit they gets by this transfer, God only knows. But the thing which I know is these all are crimes.

Manoj Sinha


 * Nigerian Letter, Lottery Scams, etc. fit under the category of Advance fee fraud. They profit by falsely promising money in return for a relatively small advance fee, paid by the victim. Check out the Wikipedia article for more info. 206.174.154.125 05:30, 1 September 2006 (UTC)

Grammar?
"...except where a non-commercial distribution has a not-insignificant effect on the copyright owner's business."

Shouldn't it be "significant effect"? Or are double negatives cool when you do law?


 * All I do is copy it down as parliament wrote it. Sadly, I did not make this up which would have been a not-unamusing thing to have done. David91 05:30, 1 February 2006 (UTC)

many kids find ways to hack on to the computer and do the wrong things. this should be stopped and men should have respect and leave kids alone. internet crime is to much. to many kids are being abused and raped from the wrong people.

as a student :gina


 * I'd like to see you find a way to stop computer crime. Especially when the combined governments of the world can't. And, this talk page is a discussion about the article, NOT a debate about the morality of computer crime. Also learn some English and basic sentence structure/grammar. 203.13.41.4 06:33, 6 April 2006 (UTC)

Child Porn?
The article says " Child pornography is illegal in most states." Are there States in America where child pornography IS legal??!! 203.13.41.4 01:51, 31 March 2006 (UTC)


 * I am sorry. Was it the use of the word "state" that made you think I was talking about America? Sadly, your assumption is completely unjustified. Most states in the world. . . When I write material relevant only to the U.S., I use U.S. state. David91 02:50, 31 March 2006 (UTC)


 * Fair enough. Thanks for clarifying that. 203.13.41.4 06:31, 6 April 2006 (UTC)

What about US law
Would be useful if this article covered US computer crime laws, as well as British ones. Despite being British myself, I actually came here to find out about the US equivalents. Perhaps there's somewhere we could request help on this one? JulesH 17:31, 3 July 2006 (UTC)

hacking
hacking is used as a crime term this is incorect hacking can refer to more things then just internet crime please use a better term for this

My facebook account has been hacked and all tje email addresses and password are changed. I cannot login my fb account. Khelaom (talk) 15:58, 6 February 2021 (UTC)

Fraud
The fruad section breaks my margins
 * Dustin 19:43, 25 September 2006 (UTC)

Merge
It has been suggested that the article Cybercrime be merged into Computer crime. I would be against that, but would be in favour of a merge the other way as this is topic covered by an international treaty Convention on Cybercrime. The scope of the Cybercrime Convention can be used to defines the core scope of the merged article.

Stealing memory from a computer or stealing laptops is a computer crime as it is a crime that involves computers, but it is not cybercrime which is what this article seems to be about. --Philip Baird Shearer (talk) 22:24, 26 April 2008 (UTC)

My solution would be to move the article Cybercrime to an archive talk page and move this article over the redirect created by that move so preserving the history of this article. If there is a consensus to do this and there is no friendly administrator to hand then leave a message on my talk page (as I do not watch this talk page) and as such a move is limited to an administrator making it. --Philip Baird Shearer (talk) 22:38, 26 April 2008 (UTC)


 * I have also proposed internet crime be also merged, it's a poorly written article with alot of overlap with both this article and cybercrime. -- neon white talk 17:02, 21 June 2008 (UTC)


 * Due to lack of discussion i think this needs vbold action. Below is a list of references from the cybercrime article to be merged here. There were no inlines so if anyone can sort them out it would be appreciated. -- neon white talk 13:30, 13 October 2008 (UTC)


 * 1) Adamski A. (1998) Crimes Related to the Computer Network. Threats and Opportunities: A Criminological Perspective. Helsinki, Finland: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI). Retrieved on December 15 2006, from http://www.ulapland.fi/home/oiffi/enlist/resources/HeuniWeb.htm
 * 2) Jaishankar  K. (2007). Cyber Criminology: Evolving a novel discipline with a new journal.  International Journal of Cyber Criminology, Vol 1 Issue 1 January 2007.Retrieved on March 15 2007, from http://www40.brinkster.com/ccjournal/editorial.htm
 * 3) Jewkes Yvonne (2006). Comment on the book 'Cyber crime and Society by Majid Yar, Sage Publications. Retrieved on December 15 2006, from http://www.sagepub.co.uk/booksProdDesc.nav?prodId=Book227351
 * 4) Littlewood, A. (2003) ‘Cyberporn and moral panic: an evaluation of press reactions to pornography on the internet’, Library and Information Research, 27(86), 8–18.
 * 5) McKenzie, S. (2000). Child Safety on the Internet: An Analysis of Victorian Schools and Households using the Routine Activity Approach. A thesis submitted to the University of Melbourne, February, 2000. Retrieved on December 15 2006, from http://www.criminology.unimelb.edu.au/research/internet/childsafety/index.html
 * 6) Mann, David and Sutton, Mike, (1999). NetCrime. More Change in the Organisation of Thieving, British Journal of Criminology, vol. 38, no. 2, Spring 1998.
 * 7) Thomas, D. and Loader, B. (2000) ‘Introduction – cyber crime: law enforcement, security and surveillance in the information age’, in: D. Thomas and B. Loader (Eds.), Cyber crime: Law Enforcement, Security and Surveillance in the Information Age, London: Routledge.
 * 8) Wall, D.S. (2007) Cybercrime: The transformation of crime in the information age, Cambridge: Polity
 * Yar, M. (2005) The Novelty of ‘Cyber crime’: An Assessment in Light of Routine Activity Theory European Journal of Criminology, Volume 2 (4): 407–427:

Cleanup
I personally believe the article needs a complete rewrite, some of it is so poorly written that it makes little sense, then there is the issue of sources or lack of them in this case. This is how i think the article should be structured. :- -- neon white talk 13:41, 13 October 2008 (UTC)
 * Lead section/intro/definitions - sourced of course
 * Types of crime with sub sections if enough info is available. Most have seperate artcles so we only need to be brief
 * section on law
 * documented cases
 * links
 * references
 * I think that is a good format. I'll start implementing the structure. LH (talk) 22:20, 2 January 2009 (UTC)


 * I've done some cleanup work. I hope this is what other editors have in mind. These issues need to be addressed:


 * Tight, but comprehensive list of Specific Crimes, with links to the main page on the specific crime. Also, references inline/footnote to the specific jurisdiction's laws.
 * Cleanup the list of laws. Extortion, for instance, should not be listed here (yes it could be done with a computer, but it is unhelpful to call it a specific "computer crime")
 * Better general explanations. Should have media section, a history section, and perhaps a discussion about white-hat, grey-hat, black-hat crime, including links to specific incidents.
 * The list of incidents needs to have some objective inclusion criteria. I would suggest whether or not the incident was notable enough to have its own WP article. If it does, then it can be included. If the list balloons too much it should be split off to its own article.
 * I look forward to feedback from everyone else.

LH (talk) 22:57, 2 January 2009 (UTC)

Added to Cyberterrorism
I added a definition to cyberextortion, a type of cyberterrorism and extended it to link to a page for cyberextortionists.

leeaaro4 15:05, 17 February 2011 (UTC)


 * I think the part talking about cyber extortion should be re-written;
 * it's poorly written
 * cyber extortion isn't a form of cyber terrorism, it's just that in the cases given cyber terrorism is used as a means to do cyber extortion
 * uses cyberextortion and cyberterrorism instead of cyber extortion and cyber terrorism


 * Aisteco (talk) 21:16, 9 September 2012 (UTC)

Potential rewrite?
It seems that the poor organization of the the article could be improved upon. It seems like this is more of a list of types of computer crime at the top, possible reasons/effects/uses and then famous documented cases at the bottom. It could be more beneficial to have a more fleshed out design, one that more on each of the uses of computer crime and then categorizes each of the cases into related topics instead of being one large paragraph. — Preceding unsigned comment added by Andersme (talk • contribs) 20:22, 14 October 2011 (UTC)

External links modified
Hello fellow Wikipedians,

I have just added archive links to 1 one external link on Computer crime. Please take a moment to review my edit. If necessary, add after the link to keep me from modifying it. Alternatively, you can add to keep me off the page altogether. I made the following changes:
 * Added archive https://web.archive.org/20080410230359/http://www.nerac.com:80/family/NeracReports/Cybercrimes_CT.htm to http://www.nerac.com/family/NeracReports/Cybercrimes_CT.htm

When you have finished reviewing my changes, please set the checked parameter below to true to let others know.

Cheers. —cyberbot II  Talk to my owner :Online 10:33, 18 October 2015 (UTC)

Requested move 2 November 2015

 * The following is a closed discussion of a requested move. Please do not modify it. Subsequent comments should be made in a new section on the talk page. Editors desiring to contest the closing decision should consider a move review. No further edits should be made to this section. 

The result of the move request was: moved. A history swap was also required in order to preserve the history of the target page for attribution purposes. Jenks24 (talk) 04:59, 10 November 2015 (UTC)

Computer crime → Cybercrime – I have merged all of Category:Computer crime into Category:Cybercrime and now I am ready to change the primary topic accordingly. Cybercrime is also the broader term, encompassing crime that happens in cyberspace which may not require advanced technical skilled typically associated with hacking under a traditional computer crime definitions. E.g. Cyberbulling, Internet fraud, Internet troll and so on. Deku-shrub (talk) 14:18, 2 November 2015 (UTC)
 * Support not all computer crime involves networks or the internet, this article is only about those crime that involve such, and therefore this is not a computer crime article per se, rather it is the more narrow cybercrime. -- 70.51.44.60 (talk) 15:53, 2 November 2015 (UTC)
 * So are you saying that if I steal files that are in the computer, it's not cybercrime? All jokes aside, I support this move. -- Notecardforfree (talk) 20:49, 3 November 2015 (UTC)
 * Support per reasons above.  Film Fan  12:25, 4 November 2015 (UTC)


 * The above discussion is preserved as an archive of a requested move. Please do not modify it. Subsequent comments should be made in a new section on this talk page or in a move review. No further edits should be made to this section.

External links modified
Hello fellow Wikipedians,

I have just modified 1 one external link on Cybercrime. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20041118085257/http://www.ahtcc.gov.au:80/ to http://www.ahtcc.gov.au/

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at ).

Cheers.— InternetArchiveBot  (Report bug) 22:10, 3 December 2016 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified 3 external links on Cybercrime. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Corrected formatting/usage for http://www.ere-security.ca/PDF/Cyberextortion%20by%20DoS%2C%20Risk%20Magazine%20June%202006.pdf
 * Added archive https://web.archive.org/web/20100528122405/http://www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm to http://www.ojp.usdoj.gov/nij/topics/technology/electronic-crime/welcome.htm
 * Corrected formatting/usage for http://www.ahtcc.gov.au/

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 22:12, 15 August 2017 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified 2 external links on Cybercrime. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20161217213634/https://www2.fbi.gov/cyberinvest/cyberhome.htm to https://www.fbi.gov/cyberinvest/cyberhome.htm
 * Added archive https://web.archive.org/web/20080608160657/http://www.ustreas.gov/usss/financial_crimes.shtml to http://www.ustreas.gov/usss/financial_crimes.shtml

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 07:04, 10 December 2017 (UTC)

Improving the “documented cases” section
The documented cases section is currently a bit wild, so to speak, so how about putting in subsections for classifications of crime? for example “malware attacks”, “DDOS”, “Drop Catching”(or Domain hijacking), “automated privacy violations”, those sorts of cybercrimes could be easier to understand if in subsections rather than jumbled up as they currently are in the article. Perhaps the priority should be a subsection or a section itself (hey, might as well do a separate article!) on SOCIAL MEDIA CYBERCRIME, to ensure Wikipedia readers do not confuse the different types of computer misuse.49.104.0.50 (talk) 06:44, 30 April 2019 (UTC)

Online harassment
First up the image that precedes this section is confusing and I'm not sure what point it's trying to make.

Secondly I feel it should be emphasized that calling people mean names is only illegal in less democratic countries like the UK, Saudi Arabia, and China. Instead believable threats and intimidation should be emphasized as online harassment, since that is widely illegal rather than just in a select few third world countries.

Thirdly, if you really *must* keep that weak definition of harassment, you should remove all protected classes (i.e. the part that defines it based on "gender, race, religion, nationality, sexual orientation"). This is an extremely biased view that progressives take which doesn't align with reality; "public shaming" as progressives like to call it in a vain attempt to separate it from harassment, is just as valid a form of harassment, despite not necessarily having anything to do with protected classes such as gender, race, etc (See: the Online shaming page, most notably the iconic case of Justine Sacco and her joke that ended up ruining her life). If you disagree with me, tell me, what do you think is worse, and what counts as harassment more: thousands of Twitter users emailing someone's employer to get them fired, or some anonymous troll calling a person "f*ggot"? I think the answer is pretty clear here, harassment has absolutely nothing to do with protected classes. — Preceding unsigned comment added by 203.87.101.64 (talk) 05:17, 17 August 2019 (UTC)

Cybercrime Darknet
Hey fellow Wiki users! This isn't finalized yet but I would like to add this to bring more light of cyber crime on darknet markets. Any feedback will be great. Thank You! I plan to add more to it after some more research. I will also add some titles/headings when I figure out everything I want to add. Any suggestions would be great! Samuel Simpson14 (talk) 23:49, 23 June 2020 (UTC)

Darknet markets have had an up-rise in traffic in recent years for many reasons. One of the biggest contributors being the anonymity and safety that goes along when using the markets[1]. Many of the sellers and vendors go through great lengths at keeping their identity a secret when online. Many use VPNs, Tails, and Tor to help hide any trail they could leave behind for investigators. Darknet markets makes the user feel safer as they can get what they want from the comfort of their home. Most people can easily gain access to a Tor browser such as DuckDuckGo that allows a user to explore much deeper than other browsers such as Google Chrome. However actually gaining access to a darknet market selling drugs isn't as simple as typing it in on the search engine like you would with google. Many darknet markets have links that are changing everyday and their address ends in .onion which makes it much harder to track down the users on the markets. To add to privacy the biggest currency on these markets is Bitcoin. Bitcoin allows transactions to be committed between people by exchanging wallet addresses and never having to know anything about the person you're sending money to. [2]

One of the biggest issues many of the users face who use marketplaces are the vendors or market itself exit scamming.[3] This is when usually a vendor will act as if they're still selling on the market and have users send them money. The vendor will then close off his account after receiving money from multiple buyers and never give what they paid for. It's hard for the customers to get their money back as they usually purchased something illegal. In 2019 a market called Wall Street Market had allegedly exit scammed, stealing 30 million dollars from the vendors and buyers wallets.[4]The websites Admins and Managers had sent messages to many of the top vendors blackmailing them to send bitcoin to a specific address or risk having their private information leaked. [4]This further proving that darknet markets are unsecure to anyone who uses them.

Federal agents have had a huge crackdown on these markets. In July of 2017 federal agents seized one of the biggest markets called Alphabay.[5]Many investigators pose as a buyer and order packages from darknet vendors in the hopes they left a trail they can follow. Law enforcement biggest crackdown on vendors are those sell drugs with fentanyl and opiates. With thousands of dying each year due to drug over dose it was long over due for law enforcement to crack down on these markets. Vendors don't realize the extra charges that go along with selling drugs online. Many get charged with money laundering and extra charges brought when the drugs are shipped in the mail. [6]Each state has it's laws and regulations on drugs therefore vendors have the face multiple charges from different states. In 2019 a vendor was sentenced to 10 years in prison after selling cocaine and methamphetamine under the name JetSetLife. [7]

Sources Arora, Beenu. "Council Post: Five Key Reasons Dark Web Markets Are Booming". Forbes. Retrieved 2020-06-23. "Guide: What is Bitcoin and how does Bitcoin work? - CBBC Newsround". Retrieved 2020-06-23. Christian, Jon (2015-02-04). "The 'Exit Scam' Is the Darknet's Perfect Crime". Vice. Retrieved 2020-06-23. "Darknet Users Allege Wall Street Market Exit Scammed, Possibly Snatching $30M". Bitcoin News. 2019-04-20. Retrieved 2020-06-23. Brandom, Russell (2019-02-17). "The golden age of dark web drug markets is over". The Verge. Retrieved 2020-06-23. "The Consequences of Mailing Drugs and Other Banned Substances". www.cottenfirm.com. Retrieved 2020-06-23. "Darknet drug vendor sentenced to 10 years prison". www.dea.gov. Retrieved 2020-06-23.

Drug trafficking
Hey Wiki Users I added some information in the drug trafficking section. Please post any suggestions/issues with my edit found below:

Darknet markets have had an up-rise in traffic in recent years for many reasons. One of the biggest contributors being the anonymity and safety that goes along when using the markets. Many of the sellers and vendors go through great lengths at keeping their identity a secret when online. Many use VPNs, Tails, and Tor to help hide any trail they could leave behind for investigators. Darknet markets make the user feel safer as they can get what they want from the comfort of their home. Most people can easily gain access to a Tor browser such as DuckDuckGo that allows a user to explore much deeper than other browsers such as Google Chrome. However actually gaining access to a market selling drugs isn't as simple as typing it in on the search engine like you would with google. Many darknet markets have links that are changing everyday and their address ends in .onion opposed to the typical .com, .net. and .org domain extensions. To add to privacy the biggest currency on these markets is Bitcoin. Bitcoin allows transactions to be committed between people by exchanging wallet addresses and never having to know anything about the person you're sending money to.

One of the biggest issues many of the users face who use marketplaces are the vendors or market itself exit scamming. This is when usually a vendor with a high rating will act as if they're still selling on the market and have users send them money. The vendor will then close off his account after receiving money from multiple buyers and never send what they purchased. The vendors all being involved in illegal activities have a low chance at not exit scamming when they no longer want to be a vendor. In 2019, an entire market called Wall Street Market had allegedly exit scammed, stealing 30 million dollars from the vendors and buyers wallets in bitcoin.The market's Admins and Managers sent messages to many of the top vendors blackmailing them to send bitcoin to a specific address or risk having their private information leaked. This further proving that darknet markets are unsafe to anyone who uses them.

Federal agents have had a huge crackdown on these markets. In July of 2017 federal agents seized one of the biggest markets called Alphabay.Many investigators will pose as a buyer and order packages from darknet vendors in the hopes they left a trail they can follow. One investigation had an investigator pose as a firearms seller and for six months people purchased from them and provided home addresses. They were able to make over a dozen arrests during this six month investigation. Another one of law enforcement's biggest crackdowns are on vendors selling fentanyl and opiates. With thousands of dying each year due to drug over dose it was long over due for law enforcement to crack down on these markets. Many Vendors don't realize the extra charges that go along with selling drugs online. Many get charged with money laundering and extra charges brought when the drugs are shipped in the mail. Each state has it's laws and regulations on drugs therefore vendors have the face multiple charges from different states. In 2019 a vendor was sentenced to 10 years in prison after selling cocaine and methamphetamine under the name JetSetLife. Although many investigators spend a lot of time tracking down people in the course of a year only 65 suspects were identified who bought and sold illegal goods on some of the biggest markets. This is compared to the thousands of transactions taking place daily on these markets. — Preceding unsigned comment added by Samuel Simpson14 (talk • contribs) 21:40, 14 July 2020 (UTC)

Tianfu Cup International Cybersecurity Contest
I have included the link to the website of Tianfu Cup International Cybersecurity Contest to the main article. This event is becoming a notable cybersecurity event in China, it probably needs its own wikipage. Here is the link: Tianfu Cup International Cybersecurity Contest

-- Devoke water  (talk)  10:43, 16 November 2020 (UTC)

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 26 August 2019 and 11 December 2019. Further details are available on the course page. Student editor(s): Corynneemmerson, ToruOyama1. Peer reviewers: Sadiemacd, Noahcamin, Js27=123.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 08:38, 18 January 2022 (UTC)

Wiki Education Foundation-supported course assignment
This article was the subject of a Wiki Education Foundation-supported course assignment, between 29 August 2020 and 29 August 2020. Further details are available on the course page. Student editor(s): Samuel Simpson14.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 08:38, 18 January 2022 (UTC)

Uncorrected vandalism
I tried to undo this edit here, but this could not be done because of "conflicting intermediate edits." Jarble (talk) 22:33, 23 January 2022 (UTC)

Annual losses
This line in the header: "A 2016 report by Cybersecurity Ventures predicted that global damages incurred as a result of cybercrime would cost up to $6 trillion annually by 2021 and $10.5 trillion annually by 2025.[9]". I think it needs to go. Yes, you can find these statistics EVERYWHERE online, but they're clearly garbage now. Good luck finding ACTUAL data, since search results are overwhelmed by these numbers. The report might have seemed reasonable in 2016. I don't think so, but it was at least arguable. Now it's outdated, over-reported, doesn't match the real-life trends at all, and was always from a biased source. $6 trillion annually is 7% of the world's GDP. The real number MIGHT top $1 trillion, but the best numbers I've found put it closer to $500 billion. This guy has a nice rant on Twitter about why it's bad stats, but that's not a good source for the article.

https://twitter.com/sawaba/status/938595776904785920 LordQwert (talk) 14:49, 15 June 2022 (UTC)