This document discusses cyber crimes and security. It defines cyber crime as illegal behavior directed through electronic means that targets computer security and data. It outlines different types of cyber attacks including those by military, businesses, terrorists, and individuals. It also describes common types of offenders and various cyber crimes like breaches of physical, personnel, communications, operations and data security. Specific crimes covered include dumpster diving, emanations interception, denial of service attacks, masquerading, and software piracy. The document provides steps to take after a security breach and suggestions to address cyber crimes through laws and cooperation.