This document lists and defines examples of computer crimes such as copyright violation, cracking protected data, cyberbullying, creating malware, identity theft, illegal online sales, human trafficking, spying, wiretapping, and cyber terrorism. Some examples include stealing copyrighted material without permission, breaking encryption codes, harassing others online, writing viruses and spyware, pretending to be someone else, buying or selling drugs and guns online, participating in human trafficking, spying on individuals and businesses, tapping phone lines to listen to conversations, and hacking and blackmailing to instill terror.
This document lists and defines examples of computer crimes such as copyright violation, cracking protected data, cyberbullying, creating malware, identity theft, illegal online sales, human trafficking, spying, wiretapping, and cyber terrorism. Some examples include stealing copyrighted material without permission, breaking encryption codes, harassing others online, writing viruses and spyware, pretending to be someone else, buying or selling drugs and guns online, participating in human trafficking, spying on individuals and businesses, tapping phone lines to listen to conversations, and hacking and blackmailing to instill terror.
This document lists and defines examples of computer crimes such as copyright violation, cracking protected data, cyberbullying, creating malware, identity theft, illegal online sales, human trafficking, spying, wiretapping, and cyber terrorism. Some examples include stealing copyrighted material without permission, breaking encryption codes, harassing others online, writing viruses and spyware, pretending to be someone else, buying or selling drugs and guns online, participating in human trafficking, spying on individuals and businesses, tapping phone lines to listen to conversations, and hacking and blackmailing to instill terror.