
202 Cyberpower
outlines appropriate hacking activities and eschews cybercrime. The document
states that hackers will not obtain money through stealing from the public. Hack-
ing groups will also not spread knowledge or tools that are meant to take income.
“The public’s privacy, especially that of children and minors, will be protected,”
the document says. Any activity to buy or sell people’s private information is con-
sidered inappropriate[…]
24
7.6 Summary
The criminals who use the Internet to carry out and optimise their activities are
cybercriminals. Information and communications technologies are the means
and the targets of their criminality ...