AIS Automatic Identification System
ATM automated teller machine
BYOD bring-your-own-device
BYOC bring-your-own-cloud
BYOX bring-your-own-everything
CaaS Crime-as-a-Service
CAM child abuse material
C&C command and control
CERT computer emergency response team
CNP card-not-present
CSE child sexual exploitation
CSECO commercial sexual exploitation of children online
CSEO child sexual exploitation online
DDoS Distributed Denial of Service
DHCP Dynamic Host Configuration Protocol
DNS Domain Name System
DoS Denial of Service
EC3 European Cybercrime Centre
ECI European Critical Infrastructure
EMPACT European Multidisciplinary Platform Against Criminal Threats
EMV Europay, MasterCard and Visa
EU European Union
FP Focal Point
GPS global positioning system
I2P Invisible Internet Project
IaaS Infrastructure-as-a-Service
ICS Industrial Control System
ICT information and communications technology
iOCTA Internet Organised Crime Threat Assessment
IoE Internet of Everything
IoT Internet of Things
IP Internet protocol
IPv Internet Protocol version
ISP Internet service provider
J-CAT Joint Cybercrime Action Taskforce
LE law enforcement
M2M machine to machine
MaaS Malware-as-a-Service
MLAT Mutual Legal Assistance Treaty
MS Member State(s)
NIST National Institute of Standards and Technology
OCG organised crime group
OSINT open-source intelligence
P2M people to machine
P2P peer to peer, or people to people
PaaS Platform-as-a-Service
PCF payment card fraud
PGP Pretty Good Privacy
PIN personal identification number
PoS point-of-sale
RAT Remote Access Tool
SaaS Software-as-a-Service
SCADA Supervisory Control and Data Acquisition
SEPA Single Euro Payments Area
SMS short message service
SPOC Single Points of Contact
TCP Transmission Control Protocol
TCSO travelling child sex offender
TOR The Onion Router
URL uniform resource locator
USB universal serial bus
VoIP Voice-over-Internet Protocol
VPN virtual private network