#public - **Cyber Crime**: Use computer/digital device to further illegal ends > "nothings black and white in what we do, everything's got some gray" ## Types of crime - **Crimes Against People**: A digital crime where the victim is a person - **Crimes Against Property**: A digital crime that damages, or illegally interacts with property - **Crimes Against Government**: A digital crime to undermine the efficacy of a government > Life is not Black and White, Consider what the greatest impact is | Crime | category | | --- | --- | | Harrassement | People | | Stalking | People | | Credit Card fraud | People | | Id theft | People | | DOS attack | Property | | Hacking | Property | | Vandalism | Property | | Cyber Warfare | Government| | Cyber Terrorism | Government| > Online Harassment is a growing field, stalking, bullying, doxing, etc. > Modern wars be started with infrastructure hacks, Power grid hacks of Ukraine, Iran, Etc. ### Cyber-stalking and bullying - **Cyber Bulling**: People attacking reputation and self esteem of other people trough online means like social media campaigns. - **Cyber Stalking**: Stalking someone through their online footprint. Often to find information with which to exploit the victim. > Typically older person stalking a younger person. As opposed to bullying, which is usually across the same age ### Cyber Terrorism - **Cyber Terrorism**: Politically motivated attacks on major infrastructure Money can be a factor, but usually the political is the primary motivation - Instill fear in a society to elicit some reaction - financial/reputation gain - revenge - etc. ## Examples Stux-Net Nation-state attacks on power grids before Wars - **Sneaker Net**: Moving information across barriers physicality > proving an attack is one of the hardest questions to answer # U.S. National cyber strategy - **U.S. National cyber strategy**: anually updated policy document from the white house detailing the national cyber objectives > it has been similar last few years - promote American people - promoting American prosperity - preserve peace through strength - deterrent - advanced American cyber influence - strong alliances - promote international policies - Shaping adversary behavior - regulatory environment - Federal government security - criticial infrastructure security - cyber skills workforce gap