This document discusses cyber crime and money laundering. It begins by introducing cyber crime as illegal activity committed online, where computers are used as either a tool or target. It then categorizes cyber crimes as those where the computer is the target, such as hacking, or where it is used as a weapon to enable real-world crimes like credit card fraud or cyberterrorism. Specific cyber crimes discussed include hacking, viruses, spam, cyber vandalism, software theft, and crimes against children. The document also discusses money laundering and how it involves disguising illegally obtained money to make it appear legitimate. The stages of money laundering are described as placement, layering, and integration. The consequences are discussed as increased crime and