This document discusses various types of cyber crimes including cyber graffiti, fraud, terror, and war. It outlines the scale of these threats and notes that developing an effective strategy requires working with other organizations. It examines governmental and industry responses to these issues such as increasing cybersecurity efforts and updating legislation. The document raises questions about managing risks when sharing sensitive data with partners that may have weaker security controls.