were once limited by time
were once limited by societal constraints
communicate easily forming social groups/communities
identity theft and money laundering
cyber terrorism
information freely obtained anonymously connecting deviants
use virtual communities to communicate and organize
unregulated, information privately posted
their communities validate and support their identities/behavior
hacking and cyber bullying/harassment
helps create virus wares