
48 Cyberpower
creation, the localization or selling of botnets, impersonation or creation of
fake identities, stealing of credit card numbers, creation of fake credit cards,
spamming, etc.) that every criminal can work efciently while also being
extremely dynamic, mobile and exible, in order to adapt quickly to targets
and escape from counterattacks and police investigation.
A world of opportunities and optimal conditions
for committing crime
Each technology has criminal potential and offers opportunities for manipula-
tions that allow the carrying out of illicit activities. This is an intrinsic risk.
The Internet does not escape from ...