The worlds of counter terrorism and fraud prevention should increase their ties. Systems that are already implemented in one world may be applied to the other. Solution providers and policy makers from both worlds need to meet up and share ideas, thoughts and experience for the benefit of both.
Once a Software Vendor discovers that their software has been pirated, the gut reaction is to put an immediate stop to it. If piracy is discovered, it’s best to react, but don’t overreact. Be proactive, yet patient.
There are many security companies, individual researchers and certain circles in academia that hold a wealth of information on cybercrime activities that could be the difference between a bust and a cybercrime investigation that leads to a dead end. It’s not just about collaboration with other law enforcement agencies, but also about collaboration with the security industry.
When it comes to infrastructure, money mules are important - if not more important - than having a botnet or a phishing attack set up. After all, what use are online banking credentials if you can’t cash them out?
“The Norton Cybercrime Report: The Human Impact,” showed that two-thirds (65 percent) of Internet users globally, and almost three-quarters (73 percent) of U.S. Web surfers have been a victim of cybercrime.