*I could tell you where I got this text, but it reads very John Brunner when it's just info-dumped on the page without any explanation.
ABBREVIATIONS
ACS Automated Card Shop
ADSL Asymmetric Digital Subscriber Line
AIOTI Alliance for Internet of Things Innovation
APT Advanced Persistent Threat
APWG Anti-Phishing Working Group
AQ al-Qaeda
ATM automated teller machine
AV anti-virus
AVC Automated Vending Card
BEC Business Email Compromise
CaaS Crime-as-a-Service
CAM child abuse material
CEO chief executive officer
CERT computer emergency response team
CGN Carrier-Grade Network Address Translation
CI critical infrastructure
CJEU European Court of Justice
CNP card-not-present
CSE child sexual exploitation
CSEM child sexual exploitation material
CSIRT Computer Security Incident Response Team
CVV Card Verification Value
DDoS Distributed Denial of Service
DEA United States Drug Enforcement Agency
DNS Domain Name System
DRD Data Retention Directive
EAST European Association for Secure Transactions
EBF European Banking Federation
ECTEG European Cybercrime Training and Education Group
EC3 European Cybercrime Centre
EIO European Investigation Order
EMAS Europol Malware Analysis System
EMMA European Money Mule Actions
EMPACT European Multidisciplinary Platform Against
Criminal Threats
EMV Europay, MasterCard and Visa
ENISA European Union Agency for Network and
Information Security
EUCTF European Cybercrime Task Force
EUIPO European Union Intellectual Property Office
FBI United States Federal Bureau of Investigation
GAAD Global Airport Action Day
GDPR General Data Protection Regulation
GSM Global System for Mobile Communications
HDFS Hadoop Distributed File System
I2P Invisible Internet Project
IAP Internet Access Provider
ICS Industrial Control Systems
ICSE Interpol International Child Sexual Exploitation database
ICT information & communications technology
IOCTA Internet Organised Crime Threat Assessment
IoT Internet of Things
IP Internet Protocol
IPC3 Intellectual Property Crime Coordinated Coalition
IPR intellectual property rights
IPv4 Internet Protocol version 4
IRC Internet Relay Chat
IRU EU Internet Referral Unit
IS Islamic State
ISDN Integrated Services Digital Network
ISP Internet service provider
IT information technology
IWF Internet Watch Foundation
J-CAT Joint Cybercrime Action Taskforce
KYC Know Your Customer
LDCA Live-Distant Child Abuse
LEA law enforcement agency
MBR Master Boot Record
MO modus operandi
MOTO Mail Order/Telephone Order
mTAN Mobile Transaction Authentication Number
NAT Network Address Translation
NCMEC National Center for Missing and Exploited Children
NFC Near Field Communication
NGO non-governmental organisation
NIS network and information systems
NPS new psychoactive substances
OCG organised crime group
OPSEC operations security
OSINT open-source intelligence
OTP one-time pad
P2P peer to peer, or people to people
PBX Private Branch Exchange
PIN personal identification number
PoS point-of-sale
QKD Quantum Key Distribution
RAT Remote Access Trojan
SCADA supervisory control and data acquisition systems
SCE sexual coercion and extortion
SEPA Single Euro Payments Area
SGIM self-generated indecent material
SGSEM self-generated sexually explicit material
SIENA Secure Information Exchange Network Application
SOCTA Serious and Organised Crime Threat Assessment
SWIFT Society for Worldwide Interbank Financial
Telecommunications
TAN Transaction Authentication Number
THB trafficking in human beings
Tor The Onion Router
UCC United Cyber Caliphate
URL uniform resource locator
VIDTF Victim Identification Task Force
VoIP Voice-over-Internet Protocol
VPN virtual private network