Extortion

Results: 118



#Item
41Regression analysis / Geography of Indonesia / Geography of Asia / Econometrics / Banda Aceh / Aceh

“The Simple Economics of Extortion: Evidence from Trucking in Acheh” Comments on Olken & Barron by Justin Wolfers, Wharton & NBER NBER Economics of Crime Working Group

Add to Reading List

Source URL: users.nber.org

Language: English - Date: 2013-06-27 13:34:58
42National Organization for Women / Hobbs Act / Criminal law / Racketeer Influenced and Corrupt Organizations Act / Commerce Clause / National Organization for Women /  Inc. v. Scheidler / Extortion / Threat / Robbery / Law / Crimes / Class action lawsuits

547US1 Unit: $U37[removed]:09:21] PAGES PGT: OPIN

Add to Reading List

Source URL: www.endroe.org

Language: English - Date: 2011-05-02 13:05:28
43Ransomware / Malware / Crime / Extortion

Scam Alert – Ransomware Threat Demands PC Users Pay Or Else A threat previously seen mostly in Eastern Europe has recently hit the United States. Known as ransomware, the scheme is essentially online extortion that

Add to Reading List

Source URL: lancaster.ne.gov

Language: English - Date: 2013-02-16 13:23:18
44Spanish-speaking countries / Presidents of Guatemala / Americas / Guatemalan National Revolutionary Unity / Government / Politics / Guatemala / MINUGUA / Vinicio Cerezo / Guatemalan Civil War / Member states of the United Nations / Republics

Eichhorst, Vom Umgang mit Störenfrieden Human Rights Watch (Hrsg.), 2006: Funding the »Final War«. LTTE Intimidation and Extortion in the Tamil Diaspora, Vol. 18, No. 1 C, March, New York. International Crisis Group,

Add to Reading List

Source URL: www.swisspeace.ch

Language: English - Date: 2010-11-26 08:17:54
45Denial-of-service attacks / Computer network security / Computer crimes / Extortion / Ransomware / Computer security / Denial-of-service attack / Antivirus software / Near field communication / Malware / Technology / Cyberwarfare

1 2 January 2015 Volume 10, Issue 1

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-02-02 11:40:16
46Denial-of-service attacks / Computer network security / Computer crimes / Extortion / Ransomware / Computer security / Denial-of-service attack / Antivirus software / Near field communication / Malware / Technology / Cyberwarfare

1 2 January 2015 Volume 10, Issue 1

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-02-02 11:40:16
47Payola / Censorship in the United States / Law / Government / Federal Communications Commission / Eliot Spitzer / Michael Powell / Communication / Criminal law / Extortion / Music industry

FCC Launches Payola Probes of 4 Radio Giants - Los Angeles Times search[removed]:50 AM

Add to Reading List

Source URL: msl1.mit.edu

Language: English - Date: 2006-04-20 08:50:54
48Malware / Technology / Denial-of-service attacks / Computer crimes / Extortion / Ransomware / Denial-of-service attack / Antivirus software / Near field communication / Computer network security / Cyberwarfare / Computer security

From the Desk of [Insert Name Here] For this year’s outlook newsletter edition, we’ve asked experts at the Center for Internet Security (CIS) to share their thoughts on what issues we’ll be talking about and dealin

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-01-13 12:29:35
49Malware / Technology / Denial-of-service attacks / Computer crimes / Extortion / Ransomware / Denial-of-service attack / Antivirus software / Near field communication / Computer network security / Cyberwarfare / Computer security

From the Desk of [Insert Name Here] For this year’s outlook newsletter edition, we’ve asked experts at the Center for Internet Security (CIS) to share their thoughts on what issues we’ll be talking about and dealin

Add to Reading List

Source URL: msisac.cisecurity.org

Language: English - Date: 2015-01-13 12:29:35
50Email / Computing / Backup / Internet / Cyberwarfare / Malware / Extortion / Ransomware

Protect your business from ransomware Ransomware is malicious software (malware) designed to block access to a computer system, ostensibly until a sum of money is paid. CERT Australia has been contacted by a number of or

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-01-23 10:49:14
UPDATE