Sie sind auf Seite 1von 7

Computer crime

Computer crime, or Cybercrime, refers to any crime • Malware (malicious code)


that involves a computer and a network.[1] The computer
may have been used in the commission of a crime, or Crimes that use computer networks or devices to advance
it may be the target.[2] Netcrime is criminal exploita- other ends include:
tion of the Internet.[3] Dr. Debarati Halder and Dr.
K. Jaishankar (2011) define Cybercrimes as: “Offences
that are committed against individuals or groups of in- • Cyberstalking
dividuals with a criminal motive to intentionally harm
• Fraud and identity theft
the reputation of the victim or cause physical or men-
tal harm to the victim directly or indirectly, using mod- • Information warfare
ern telecommunication networks such as Internet (Chat
rooms, emails, notice boards and groups) and mobile • Phishing scams
phones (SMS/MMS)".[4] Such crimes may threaten a na-
tion’s security and financial health.[5] Issues surrounding Spam
these types of crimes have become high-profile, particu-
larly those surrounding cracking, copyright infringement, The unsolicited sending of bulk email for commercial
child pornography, and child grooming. There are also purposes, is un-lawful in some jurisdictions. While anti-
problems of privacy when confidential information is lost spam laws are relatively new, limits on unsolicited elec-
or intercepted, lawfully or otherwise. tronic communications have existed for some time.[8] An-
other cyber crime that’s kind of new is called phishing.[9]
An Australian nationwide survey conducted in 2006 which is mostly propagated via email. Phishing emails
found that two in three convicted cyber-criminals were may contain links to other websites that are affected by
between the ages of 15 and 26. malware.[10] Sometimes can be used in online banking
Internationally, both governmental and non-state actors when the site reports that the account number is incor-
engage in cybercrimes, including espionage, financial rect. One is then redirected to the page again and usually
theft, and other cross-border crimes. Activity crossing in- there is a small change to the screen, but it is hard to rec-
ternational borders and involving the interests of at least ognize. If one re-enters the personal information again,
one nation state is sometimes referred to as cyber warfare. the phishers have the private bank account information.
The international legal system is attempting to hold actors
accountable for their actions through the International
Criminal Court.[6] 1.1 Computer as tool
A report (sponsored by McAfee) estimates the annual When the individual is the main target of Cybercrime, the
damage to the global economy at $445 billion.[7] computer can be considered as the tool rather than the tar-
get. These crimes generally involve less technical exper-
tise as the damage done manifests itself in the real world.
1 Classification Human weaknesses are generally exploited. The damage
dealt is largely psychological and intangible, making le-
Computer crime encompasses a broad range of activi- gal action against the variants more difficult. These are
ties. Generally, however, it may be divided into two cat- the crimes which have existed for centuries in the offline.
egories: (1) crimes that target computers directly; (2) Scams, theft, and the likes have existed even before the
crimes facilitated by computer networks or devices, the development in high-tech equipment. The same criminal
primary target of which is independent of the computer has simply been given a tool which increases his potential
network or device. pool of victims and makes him all the harder to trace and
apprehend.[11]
Crimes that primarily target computer networks or de-
vices include:
1.2 Computer as a target
• Computer viruses
These crimes are committed by a selected group of crim-
• Denial-of-service attacks inals. Unlike crimes using the computer as a tool, these

1
2 1 CLASSIFICATION

crimes requires the technical knowledge of the perpetra- 1.5 Harassment


tors. These crimes are relatively new, having been in ex-
istence for only as long as computers have - which ex- Whereas content may be offensive in a non-specific way,
plains how unprepared society and the world in general harassment directs obscenities and derogatory comments
is towards combating these crimes. There are numerous at specific individuals focusing for example on gender,
crimes of this nature committed daily on the internet. race, religion, nationality, sexual orientation. This often
occurs in chat rooms, through newsgroups, and by send-
ing hate e-mail to interested parties (see cyber bullying,
1.3 Fraud & Financial Crimes cyber stalking, hate crime, Online predator, and stalking).
Any comment that may be found derogatory or offensive
is considered harassment.
Computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing some- There are instances where committing a crime, which in-
thing which causes loss. In this context, the fraud will volves the use of a computer, can lead to an enhanced
result in obtaining a benefit by: sentence. For example, in the case of United States
v. Neil Scott Kramer, Kramer was served an enhanced
sentence according to the U.S. Sentencing Guidelines
• Altering in an unauthorized way. This requires little Manual §2G1.3(b)(3)[12] for his use of a cell phone to
technical expertise and is common form of theft by “persuade, induce, entice, coerce, or facilitate the travel
employees altering the data before entry or entering of, the minor to engage in prohibited sexual conduct.”
false data, or by entering unauthorized instructions Kramer argued that this claim was insufficient because
or using unauthorized processes; his charge included persuading through a computer de-
vice and his cellular phone technically is not a computer.
• Altering, destroying, suppressing, or stealing output, Although Kramer tried to argue this point, U.S. Sen-
usually to conceal unauthorized transactions. This is tencing Guidelines Manual states that the term computer
difficult to detect; “means an electronic, magnetic, optical, electrochemical,
or other high speed data processing device performing
• Altering or deleting stored data; logical, arithmetic, or storage functions, and includes
any data storage facility or communications facility di-
• Altering or misusing existing system tools or soft- rectly related
[13]
to or operating in conjunction with such
ware packages, or altering or writing code for fraud- device.”
ulent purposes. Connecticut was the first state to pass a statute making
it a criminal offense to harass someone by computer.
Michigan, Arizona, and Virginia have also passed laws
Other forms of fraud may be facilitated using computer
banning harassment by electronic means.[14][15]
systems, including bank fraud, identity theft, extortion,
and theft of classified information. Harassment as defined in the U.S. computer statutes is
typically distinct from cyberbullying, in that the former
A variety of Internet scams target direct to consumers.
usually relates to a person’s “use a computer or computer
network to communicate obscene, vulgar, profane, lewd,
lascivious, or indecent language, or make any suggestion
1.4 Obscene or offensive content or proposal of an obscene nature, or threaten any illegal or
immoral act,” while the latter need not involve anything
The content of websites and other electronic communica- of a sexual nature.
tions may be distasteful, obscene or offensive for a variety
of reasons. In some instances these communications may
be illegal. 1.6 Threats
Over 25 jurisdictions within the USA place limits on cer-
Main article: Intimidation
tain speech and ban racist, blasphemous, politically sub-
versive, libelous or slanderous, seditious, or inflammatory
material that tends to incite hate crimes. Although freedom of speech is protected by law in most
democratic societies, (in US this is done by First Amend-
The extent to which these communications are unlawful ment) it does not include all types of speech. In fact spo-
varies greatly between countries, and even within nations. ken or written “true threat” speech/text is criminalized
It is a sensitive area in which the courts can become in- because of “intent to harm or intimidate”, that also ap-
volved in arbitrating between groups with strong beliefs. plies for online or any type of network related threats in
One area of Internet pornography that has been the target written text or speech.[16] The US Supreme Court defi-
of the strongest efforts at curtailment is child pornogra- nition of “true threat” is “statements where the speaker
phy. means to communicate a serious expression of an intent
1.9 Cyber warfare 3

to commit an act of unlawful violence to a particular in- FBI and many go unreported in order to keep the victim’s
dividual or group”.[16] name out of the public domain. Perpetrators typically use
a distributed denial-of-service attack.[17]

1.7 Drug trafficking


1.9 Cyber warfare
“Drug traffickers are increasingly taking advantage of the
Internet” according to cyber authorities and personnel. to
sell their illegal substances through encrypted e-mail and
other Internet Technology. Some drug traffickers arrange
deals at internet cafes, use courier Web sites to track ille-
gal packages of pills, and swap recipes for amphetamines
in restricted-access chat rooms.
The rise in Internet drug trades could also be attributed to
the lack of face-to-face communication. These virtual ex-
changes allow more intimidated individuals to more com-
fortably purchase illegal drugs. The sketchy effects that
are often associated with drug trades are severely mini-
mized and the filtering process that comes with physical
interaction fades away.
Sailors analyze, detect and defensively respond to unauthorized
activity within U.S. Navy information systems and computer net-
works
1.8 Cyber terrorism
Main article: Cyber warfare
Main article: Cyber terrorism
The U.S. Department of Defense (DoD) notes that
Government officials and Information Technology secu- the cyberspace has emerged as a national-level concern
rity specialists have documented a significant increase through several recent events of geo-strategic signifi-
in Internet problems and server scans since early 2001. cance. Among those are included, the attack on Estonia's
But there is a growing concern among federal officials infrastructure in 2007, allegedly by Russian hackers. “In
that such intrusions are part of an organized effort by August 2008, Russia again allegedly conducted cyber at-
cyberterrorists, foreign intelligence services, or other tacks, this time in a coordinated and synchronized kinetic
groups to map potential security holes in critical systems. and non-kinetic campaign against the country of Georgia.
A cyberterrorist is someone who intimidates or coerces a Fearing that such attacks may become the norm in future
government or organization to advance his or her political warfare among nation-states, the concept of cyberspace
or social objectives by launching computer-based attack operations impacts and will be adapted by warfighting
against computers, network, and the information stored military commanders in the future.[18]
on them.
Cyber terrorism in general, can be defined as an act of ter-
rorism committed through the use of cyberspace or com- 2 Documented cases
puter resources (Parker 1983). As such, a simple pro-
paganda in the Internet, that there will be bomb attacks June 2012 LinkedIn and eHarmony had been attacked,
during the holidays can be considered cyberterrorism. As compromising 65 million passwords, 30,000 passwords
well there are also hacking activities directed towards in- were cracked and 1.5 million EHarmony passwords were
dividuals, families, organized by groups within networks, posted online.[19]
tending to cause fear among people, demonstrate power,
collecting information relevant for ruining peoples’ lives, December 2012 Wells Fargo website experienced a de-
robberies, blackmailing etc. nial of service attack. Potentially compromising 70 mil-
lion customers and 8.5 million active viewers. Other
Cyberextortion is a form of cyberterrorism in which a banks thought to be compromised: Bank of America, J.
website, e-mail server, or computer system is subjected P. Morgan U.S. Bank, and PNC Financial Services.[20]
to repeated denial of service or other attacks by malicious
hackers, who demand money in return for promising to In January 2012 Zappos.com experienced a security
stop the attacks. According to the Federal Bureau of In- breach after as many as 24 million customers’ credit card
vestigation, cyberextortionists are increasingly attacking numbers, personal information, [21]billing and shipping ad-
corporate websites and networks, crippling their ability dresses had been compromised.
to operate and demanding payments to restore their ser- One of the highest profiled banking computer crime oc-
vice. More than 20 cases are reported each month to the curred during a course of three years beginning in 1970.
4 4 SEE ALSO

The chief teller at the Park Avenue branch of New York’s pedophile ring Dreamboard. The website had approx-
Union Dime Savings Bank embezzled over $1.5 million imately 600 members, and may have distributed up to
from hundreds of accounts.[22] 123 terabytes of child pornography (roughly equivalent
A hacking group called MOD (Masters of Deception), to 16,000 DVDs). To date this is the single largest U.S.
allegedly stole passwords and technical data from Pacific prosecution of an international child
[25]
pornography ring;
Bell, Nynex, and other telephone companies as well 52 arrests were made worldwide.
as several big credit agencies and two major universi- On March 1, 2011 at Lassiter High School, two students
ties. The damage caused was extensive, one company, were accused of impersonation of a staff member via cy-
Southwestern Bell suffered losses of $370,000 alone.[22] bercrime, but both claimed they were uninvolved. The
In 1983, a nineteen-year-old UCLA student used his PC offense was made a felony in the Cobb County School
to break into a Defense Department international com- District two months after the impersonation had hap-
munications system.[22] pened. Shortly afterwards, the head of the LHS School
Board said “The teacher just wouldn't do this at all”. The
Between 1995 and 1998 the Newscorp satellite pay to case ended on May 9, and no evidence was found.
view encrypted SKY-TV service was hacked several
times during an on-going technological arms race be- April 23, 2013 saw the Associated Press’ Twitter ac-
tween a pan-European hacking group and Newscorp. The count’s hacking to release a hoax tweet about fictional
in the White House that left President Obama
original motivation of the hackers was to watch Star Trek attacks [26]
re-runs in Germany; which was something which News- injured. This erroneous tweet resulted in a brief plunge
corp did not have the copyright to allow.[23] of 130 points from the Dow Jones Industrial Average, re-
moval of $136 billion from S&P 500 index,[27] and the
On 26 March 1999, the Melissa worm infected a docu- temporary suspension of their Twitter account. The Dow
ment on a victim’s computer, then automatically sent that Jones later restored its session gains.
document and a copy of the virus spread via e-mail to
other people.
In February 2000, an individual going by the alias of 3 Combating Computer Crime
MafiaBoy began a series denial-of-service attacks against
high profile websites, including Yahoo!, Amazon.com, A computer can be a source of evidence. Even where
Dell, Inc., E*TRADE, eBay, and CNN. About fifty com- a computer is not directly used for criminal purposes, it
puters at Stanford University, and also computers at the may contain records of value to criminal investigators in
University of California at Santa Barbara, were amongst the form of a logfile. In most countries Internet Service
the zombie computers sending pings in DDoS attacks. Providers are required, by law, to keep their logfiles for
On 3 August 2000, Canadian federal prosecutors charged a predetermined amount of time. For example; a Eu-
MafiaBoy with 54 counts of illegal access to computers, ropean wide directive[28] (applicable to all EU member
plus a total of ten counts of mischief to data for his at- states) states that all E-mail traffic should be retained for
tacks. a minimum of 12 months.
The Russian Business Network (RBN) was registered as Penalties for computer related crimes in New York State
an internet site in 2006. Initially, much of its activity was can range from a fine and a short period of jail time for
legitimate. But apparently the founders soon discovered a Class A misdemeanor such as unauthorized use of a
that it was more profitable to host illegitimate activities computer up to computer tampering in the first degree
and started hiring its services to criminals. The RBN which is a Class C felony and can carry 3 to 15 years in
has been described by VeriSign as “the baddest of the prison.[29][30]
bad”.[24] It offers web hosting services and internet ac-
cess to all kinds of criminal and objectionable activities,
with an individual activities earning up to $150 million in
one year. It specialized in and in some cases monopolized 4 See also
personal identity theft for resale. It is the originator of
MPack and an alleged operator of the now defunct Storm
botnet.
On 2 March 2010, Spanish investigators arrested 3 in in-
fection of over 13 million computers around the world. • Computer trespass
The “botnet” of infected computers included PCs inside • Cyber-
more than half of the Fortune 1000 companies and more
than 40 major banks, according to investigators. • Cyber bullying
In August 2010 the international investigation Operation
• Cyber defamation law
Delego, operating under the aegis of the Department
of Homeland Security, shut down the international • Cyberheist
5

• Cyber terrorism [6] “Cyber Warfare And The Crime Of Aggression: The
Need For Individual Accountability On Tomorrow’S Bat-
• Economic and Industrial Espionage tlefield”. Law.duke.edu. Retrieved 2011-11-10.

• Federal Bureau of Investigation (FBI) [7] “Cyber crime costs global economy $445 billion a year:
report”. Reuters. 2014-06-09. Retrieved 2014-06-17.
• Hacking
[8] See, e.g., Telephone Consumer Protection Act of 1991,
• Immigration and Customs Enforcement (ICE) Do-Not-Call Implementation Act of 2003, CAN-SPAM
Act of 2003.
• Internet homicide
[9] https://en.wikipedia.org/wiki/Phishing
• Internet stalking
[10] “Save browsing”. google.
• Internet suicide [11] “Cyber Crime definition”.
• Internet War [12] “2011 U.S. Sentencing Guidelines Manual §
2G1.3(b)(3)".
• INTERPOL
[13] “United States of America v. Neil Scott Kramer”. Re-
• Legal aspects of computing trieved 2013-10-23.

• List of computer criminals [14]

• Metasploit Project [15] “Section 18.2-152.7:1”. Code of Virginia. Legislative In-


formation System of Virginia. Retrieved 2008-11-27.
• Online predator
[16] Susan W. Brenner, Cybercrime: Criminal Threats from
• Organized crime Cyberspace, ABC-CLIO, 2010, pp. 91

[17] http://www.ere-security.ca/PDF/Cyberextortion%
• Penetration test
20by%20DoS,%20Risk%20Magazine%20June%
• Personal Jurisdiction over International Defendants 202006.pdf
in US Courts [18] http://www.carlisle.army.mil/DIME/documents/War%
20is%20War%20Issue%20Paper%20Final2.pdf
• Police National E-Crime Unit
[19] Salvador Rodriguez (June 6, 2012). “Like LinkedIn,
• Protected computer eHarmony is hacked; 1.5 million passwords stolen”. Los
Angeles Times.
• Techno-thriller
[20] Rick Rothacker (Oct 12, 2012). “Cyber attacks against
• United States Secret Service Wells Fargo “significant,” handled well: CFO”. Reuters.

• White collar crime [21] DAVID K. LI (January 17, 2012). “Zappos cyber attack”.
New York Post.

[22] Weitzer, Ronald (2003). Current Controversies in Crimi-


5 References nology. Upper Saddle River, New Jersey: Pearson Edu-
cation Press. p. 150.
[1] Moore, R. (2005) “Cyber crime: Investigating High- [23] David Mann And Mike Sutton (2011-11-06).
Technology Computer Crime,” Cleveland, Mississippi: ">>Netcrime”. Bjc.oxfordjournals.org. Retrieved
Anderson Publishing. 2011-11-10.
[2] Warren G. Kruse, Jay G. Heiser (2002). Computer foren- [24] “A walk on the dark side”. The Economist. 2007-09-30.
sics: incident response essentials. Addison-Wesley. p.
392. ISBN 0-201-70719-5. [25] “DHS: Secretary Napolitano and Attorney General Holder
Announce Largest U.S. Prosecution of International
[3] David Mann And Mike Sutton (2011-11-06). Criminal Network Organized to Sexually Exploit Chil-
“Netcrime”. Bjc.oxfordjournals.org. Retrieved 2011-11- dren”. Dhs.gov. Retrieved 2011-11-10.
10.
[26] “AP Twitter Hack Falsely Claims Explosions at White
[4] • Halder, D., & Jaishankar, K. (2011) Cyber crime House”. Samantha Murphy. April 23, 2013. Retrieved
and the Victimization of Women: Laws, Rights, April 23, 2013.
and Regulations. Hershey, PA, USA: IGI Global.
ISBN 978-1-60960-830-9 [27] “Fake Tweet Erasing $136 Billion Shows Markets Need
Humans”. Bloomberg. April 23, 2013. Retrieved April
[5] Internet Security Systems. March-2005. 23, 2013.
6 7 EXTERNAL LINKS

[28] Data Retention (EC Directive) Regulations SI 2007/2199 • Robertson, J. (2010, March 2). Authorities bust 3 in
infection of 13m computers. Retrieved March 26,
[29] Kenniff, Raiser. “New York Internet Crimes Laws”. 2010, from Boston News: Boston.com
[30] Computer fraud charges in New York. May 2011. Bukh • Walden, I. (2007) Computer Crimes and Digital In-
Law Firm, PC - 14 Wall St, New York NY 10005 - (212)
vestigations, Oxford: Oxford University Press.
729-1632. New York computer fraud lawyer
• Rolón, Darío N. Control, vigilancia y respuesta pe-
nal en el ciberespacio, Latin American’s New Secu-
6 Further reading rity Thinking, Clacso, 2014, pp. 167/182

• Balkin, J., Grimmelmann, J., Katz, E., Kozlovski, • Wall, D.S. (2007) Cybercrimes: The transformation
N., Wagman, S. & Zarsky, T. (2006) (eds) Cyber- of crime in the information age, Cambridge: Polity.
crime: Digital Cops in a Networked Environment,
• Williams, M. (2006) Virtually Criminal: Crime, De-
New York University Press, New York.
viance and Regulation Online, Routledge, London.
• Brenner, S. (2007) Law in an Era of Smart Technol- • Yar, M. (2006) Cybercrime and Society, London:
ogy, Oxford: Oxford University Press Sage.
• Csonka P. (2000) Internet Crime; the Draft council
of Europe convention on cyber-crime: A response
to the challenge of crime in the age of the internet? 7 External links
Computer Law & Security Report Vol.16 no.5.
• Centre for Cyber Victim Counselling (CCVC)
• Easttom C. (2010) Computer Crime Investigation
and the Law • The American Society of Digital Forensics & eDis-
covery - Cybercrime Information
• Fafinski, S. (2009) Computer Misuse: Response, reg-
ulation and the law Cullompton: Willan • A Guide to Computer Crime from le-
gal.practitioner.com
• Glenny, Misha, DarkMarket : cyberthieves, cyber-
cops, and you, New York, NY : Alfred A. Knopf, • International Journal of Cyber Criminology
2011. ISBN 978-0-307-59293-4
• Virtual Forum Against Cybercrime
• Grabosky, P. (2006) Electronic Crime, New Jersey: • High Technology Crime Investigation Association
Prentice Hall
• Computer Crime Research Center
• Halder, D., & Jaishankar, K. (2011) Cyber crime
and the Victimization of Women: Laws, Rights, and • CyberCrime Asia Research Center - Information
Regulations. Hershey, PA, USA: IGI Global. ISBN about computer crime, Internet fraud and CyberT-
978-1-60960-830-9 errorism in Asia

• Jaishankar, K. (Ed.) (2011). Cyber Criminology: • Information and Research Center for Cybercrime
Exploring Internet Crimes and Criminal behavior. Germany
Boca Raton, FL, USA: CRC Press, Taylor and Fran-
cis Group.
7.1 Government resources
• McQuade, S. (2006) Understanding and Managing
Cybercrime, Boston: Allyn & Bacon. • Cybercrime.gov from the United States Department
of Justice
• McQuade, S. (ed) (2009) The Encyclopedia of Cy-
bercrime, Westport, CT: Greenwood Press. • National Institute of Justice Electronic Crime Pro-
gram from the United States Department of Justice
• Parker D (1983) Fighting Computer Crime, U.S.:
Charles Scribner’s Sons. • FBI Cyber Investigations home page

• Pattavina, A. (ed) Information Technology and the • US Secret Service Computer Fraud
Criminal Justice System, Thousand Oaks, CA: Sage. • Australian High Tech Crime Centre
• Paul Taylor. Hackers: Crime in the Digital Sublime
(November 3, 1999 ed.). Routledge; 1 edition. p.
200. ISBN 0-415-18072-4.
7

8 Text and image sources, contributors, and licenses


8.1 Text
• Computer crime Source: http://en.wikipedia.org/wiki/Computer%20crime?oldid=634387385 Contributors: Damian Yerrick, Freckle-
foot, Edward, D, Ixfd64, Sannse, Dori, Ihcoyc, Ronz, Jebba, Darkwind, Andrewa, Julesd, Andres, Kaihsu, GCarty, Ww, Zoicon5,
Katana0182, Robbot, ZimZalaBim, Lowellian, Desmay, UtherSRG, Alan Liefting, Everyking, Edcolins, Utcursch, Antandrus, Jorm,
Beland, Joyous!, Ta bu shi da yu, DanielCD, Discospinster, Rich Farmbrough, ArnoldReinhold, MarkS, Elwikipedista, Narcisse, Cm-
drjameson, Elipongo, Vishnu vijay, Timmywimmy, ADM, Zachlipton, Alansohn, Arthena, Snowolf, Wtmitchell, L33th4x0rguy, Tainted-
Mustard, Harej, RainbowOfLight, H2g2bob, BlastOButter42, Y0u, Woohookitty, Wikiklrsc, Prashanthns, BD2412, Galwhaa, Josh Par-
ris, Rjwilmsi, Bill37212, Bruce1ee, Bhadani, Amelio Vázquez, Rabreu, Nivix, Gurch, Tieno007, Czar, Alphachimp, David91, Bgwhite,
Wavelength, Phantomsteve, SpuriousQ, IanManka, Akamad, Stephenb, Markjx, NawlinWiki, Welsh, Renata3, FoolsWar, Lippard, Zzu-
uzz, Gtdp, Rurik, CWenger, Tom Morris, Sardanaphalus, Crystallina, SmackBot, Reedy, Stifle, Canthusus, Nil Einne, Gilliam, Skizzik,
Jrkagan, Kurykh, JDCMAN, Dimonicquo, Silly rabbit, Mihairad, Twp, ConMan, Expugilist, Savidan, RolandR, FlyHigh, Prehistoricmas-
ter2, Kuru, Ocee, Shadowlynk, Joffeloff, Kirkoconnell, Barrycarlyon, Beetstra, Invisifan, Hu12, MikeWazowski, Iridescent, Kencf0618,
CapitalR, Sim8183, Tawkerbot2, Dlohcierekim, CmdrObot, Ale jrb, JohnCD, Penbat, MrFish, Equendil, Anthonyhcole, DumbBOT,
ErrantX, Heathniederee, Epbr123, Mojo Hand, Vertium, Esemono, The Legendary Ranger, Dzubint, I already forgot, AntiVandalBot,
Oducado, QuiteUnusual, Paste, Joe Schmedley, Oddity-, Wayiran, Gilliantayloryoung, JAnDbot, Dustin gayler, Levitica, SiobhanHansa,
VoABot II, Maheshkumaryadav, Joellee, Kiwimandy, Edper castro, DerHexer, JaGa, Mahnol, Cocytus, MartinBot, Lordmyx, Jeannealcid,
Jim.henderson, Rhlitonjua, Psychoair, Jerry teps, Bemsor, Nixonmahilum, Tgeairn, JonBurrows, Jmm6f488, Kemiv, Semaja, Reno911,
Boxmoor, Neon white, NYCRuss, Vanillagorillas, Tokyogirl79, Turner70, HiLo48, DadaNeem, Olegwiki, Druss666uk, Ja 62, Funandtrvl,
Metallicaguy007, VolkovBot, Philip Trueman, MissionInn.Jim, Technopat, Sparkzy, Helpper, Jose figueredo, Sankalpdravid, Qxz, Anna
Lincoln, The3stars, Tpk5010, Snowbot, Jlhw, Milan Keršláger, Billinghurst, Enigmaman, Falcon8765, Justmeherenow, Noncompliant
one, Cool110110, DeanC81, Yintan, LeadSongDog, Flyer22, Jojalozzo, Iestynpugh, Oxymoron83, Harry, Techman224, Manway, Mill-
stream3, AMbot, Mr. Stradivarius, Barry Jameson, Denisarona, Jons63, Elassint, ClueBot, Kai-Hendrik, Binksternet, The Thing That
Should Not Be, Jotag14, Taroaldo, Tomas e, Chris.tripledot, CounterVandalismBot, Trivialist, PMDrive1061, Chaserx7, Canis Lupus,
Rhododendrites, Imaximax1, Vivon1, Jmaio2, Aleksd, Light show, Agilentis, Thingg, PCHS-NJROTC, Johnuniq, MBK-iPhone, BarretB,
XLinkBot, Roxy the dog, Gonzonoir, Afpre, Charco2006, Bamford, Addbot, Some jerk on the Internet, Gpershing, MrOllie, Jgkjfdls-
gkjd, Fatboy500, PranksterTurtle, Debresser, Favonian, Jaydec, 5 albert square, Tide rolls, Bultro, Jarble, HerculeBot, Matt.T, Albeiror24,
Jackelfive, Ben Ben, Kurtis, Publicly Visible, Luckas-bot, Yobot, Legobot II, II MusLiM HyBRiD II, Mdolphy, KamikazeBot, JackCoke,
Lessandmore, IW.HG, Ircpresident, Vörös, Backslash Forwardslash, AnomieBOT, Kerfuffler, Jim1138, IRP, Darkblazikenex2, Nick UA,
Materialscientist, ArthurBot, Quebec99, Justwiki, Xqbot, JimVC3, Capricorn42, RoodyAlien, Mrc1028, Srich32977, Pradameinhoff,
Wikieditor1988, Tankrider, Lior1075, Shadowjams, Yashansi, YOKOTA Kuniteru, Blockyeyes, Ka4, Buchana4, Dejan33, Sfafinski, Bob-
mack89x, Pinethicket, I dream of horses, Gajic32, Professional7, MJ94, Mentmic, Full-date unlinking bot, Merlion444, FoxBot, Lotje,
Callanecc, Vrenator, Aoidh, Reaper Eternal, ThinkEnemies, Reach Out to the Truth, Minimac, DARTH SIDIOUS 2, Fred11111111,
RjwilmsiBot, VernoWhitney, Agent Smith (The Matrix), Becritical, EmausBot, John of Reading, Immunize, Sophie, Angrytoast, Kather-
ine, Minimac’s Clone, RenamedUser01302013, Tommy2010, Wikipelli, Dcirovic, Ida Shaw, Pragnesh89, Josve05a, Michael Essmeyer,
Empty Buffer, Forgottenking, Bustermythmonger, EneMsty12, Christina Silverman, Kjg0972, Erianna, Umni2, Donner60, Yulli67, Chuis-
pastonBot, Petrb, ClueBot NG, Mechanical digger, Sagaa2010, Gareth Griffith-Jones, AznBurger, 6ii9, Hiral NJITWILL, Widr, Leeaaro4,
Helpful Pixie Bot, Aigendon, HMSSolent, Nightenbelle, Markthing Inc., Titodutta, KLBot2, BG19bot, VasundraTaneja, Jhanov1999,
Ramesh Ramaiah, FxHVC, Najma El Shelhi, Frze, AvocatoBot, SusanBREN, Metricopolus, Mark Arsten, Lochfyneman, Dainomite,
Harizotoh9, MrBill3, Glacialfox, Klilidiplomus, Yasht101, Aisteco, CrimeWeb, Fylbecatulous, Agent 78787, Darylgolden, Riley Huntley,
Iristotle, Pratyya Ghosh, Khazar2, Bamachick20, HelicopterLlama, Lugia2453, Frosty, Metalytics, FrostieFrost, Mason Doering, PinkAm-
persand, Greengreengreenred, Dddege, LectriceDuSoir, Reziebear, Glaisher, Bullblade, EdynBliss, Ginsuloft, Quenhitran, Cindy123456,
Jnguyenx3, Keatonhouse, M3osol1301, Skr15081997, Kacyoconnor14, Lordangel101, Altaythegooner, AKS.9955, Cybersecurity101,
Pinklights2323, S166865h, StaceyHutter, Johnc123456, Willhesucceed, Vanyaxd, Hellys320 and Anonymous: 619

8.2 Images
• File:Scale_of_justice_2.svg Source: http://upload.wikimedia.org/wikipedia/commons/0/0e/Scale_of_justice_2.svg License: Public do-
main Contributors: Own work Original artist: DTR
• File:U.S._Navy_Cyber_Defense_Operations_Command_monitor.jpg Source: http://upload.wikimedia.org/wikipedia/commons/d/
d6/U.S._Navy_Cyber_Defense_Operations_Command_monitor.jpg License: Public domain Contributors: http://www.navy.mil/
management/photodb/photos/081203-N-2147L-390.jpg Original artist: Mass Communications Specialist 1st Class Corey Lewis , U.S.
Navy
• File:Wikibooks-logo-en-noslogan.svg Source: http://upload.wikimedia.org/wikipedia/commons/d/df/Wikibooks-logo-en-noslogan.
svg License: CC-BY-SA-3.0 Contributors: Own work Original artist: User:Bastique, User:Ramac et al.

8.3 Content license


• Creative Commons Attribution-Share Alike 3.0

Das könnte Ihnen auch gefallen