Across
- 2. Illegally downloading or distributing movies, music, or software.
- 5. Sending emails that appear to come from a trusted source.
- 8. Altering or deleting digital files to hide crimes.
- 11. Creating fake accounts pretending to be another person.
- 12. Repeated online harassment using texts, posts, or images.
- 13. Selling fake items or never delivering purchased goods.
- 15. Secretly tracking someone’s phone, texts, or location.
- 16. Stealing digital wallets or crypto assets.
- 17. Using digital tools to harass, threaten, or monitor a victim.
Down
- 1. Illegally accessing or monitoring wireless networks.
- 3. Using stolen card numbers for online purchases.
- 4. Fake emails or messages designed to trick victims into giving login or banking info.
- 6. Encrypting a victim’s files and demanding payment to unlock them.
- 7. Stealing sensitive data from companies, schools, or government systems.
- 9. Stealing personal information to impersonate someone online.
- 10. Creating or spreading viruses, spyware, or trojans.
- 14. Employees stealing or leaking confidential digital information.
