Cybercrime More Lucrative Than Drugs 282
prostoalex writes "Yahoo is reporting that global cybercrime overtook global drug trafficking in terms of revenue this past year. In related news, only 4% of Internet users can flag 100% of phishing e-mails as fraudulent, and Americans filed 207,000 reports on cybercrime to FBI."
dotCrime Bubbles (Score:5, Interesting)
Cybercrime requires constant training, otherwise your hacking skills can be out of date in just a few months. On the contrary, a crowbar-trained criminal can still make a living in today's high-tech security world.
I foresee in 5-10 years' time, traditional crimes will go mainstream again as many cyber-criminals will be out of jobs^H^H^H^Hcrimes by then.
Re:dotCrime Bubbles (Score:5, Insightful)
Petty crime has plenty of 'local' variables like where the police hang out, which places have alarms and electronics, et cetera, but most have similar principles; electronic crimes have different rootkits and different websites to fake and emails to send and addresses to harvest and spam filters to bypass, but again, most have similar principles. Unless you're manufacturing the (crowbar|rootkit/botnet) things won't change much.
Re:dotCrime Bubbles (Score:2)
Re:dotCrime Bubbles (Score:4, Informative)
Drug dealers are mostly young people a bad neighborhood who have nothing better to do. There was a study (in the book Freakonomics) that said that the average lifespan of a guy who stayed in the business to be around four years. Four years! And considering all that, the money they made in profit, with the jail time, etc., they made minimum wage. Being a drug dealer, the study found, had a significant degree of status and a lottery chance of being a kingpin. And that's about all they get from it.
Cybercriminals are sophisticated folks. Many phishers for online brokerages have graduate degrees in finance. (This week's Business Week.) They have capital to invest in their enterprise, too. Of course they're going to make more money and get away with it as compared to drug dealers, even the "high" level ones.
Anyway, I've been crazily modded down recently in weird ways. Look at my history. What the hell is going on? Someone leave me a message.
The obvious solution... (Score:5, Funny)
Re:The obvious solution... (Score:3, Funny)
New Slogan: (Score:5, Funny)
Re:New Slogan: (Score:2)
/. fix (Score:5, Funny)
Curbing malware and cyberthreats (Score:3, Insightful)
When I started, the USENET application would inform me that my message would be spread across tens of thousands of computers at immeasurable cost as a subtle hint to keep things interesting, and Internet Chat required some basic knowledge of Makefiles and attention to documentation before you could run a client. Frankly, things became unmanageable at the point the Internet was made accessible to anybody with a web browser; anybody who's been around this long knows what I'm talking about.
It's a short hop to realizing that the problems we're experiencing with virii and worms are the same problem. Intimate knowledge of x86 assembly used to be a requirement -- along with a malcontent-type disposition -- in order to wreak the sort of havoc that today requires fifteen minutes and an Effective VBScript In Fifteen Minutes manual. Every document is now a program, and e-mail doubles as FTP.
Many experts believe we should raise the barrier of entry by requiring programmers to undergo education, certification, and maybe even an oath to do no harm as part of the certification process if going into a security field. It used to take years to do what kids today can do in months; additionally, a would-be programmer who spends a few months picking up Visual Basic or whatever has hardly learned the fundamentals of programming any more than someone who reads a manual about his DVD player has become a laser engineer. I suggest that the field and the general user experience would be greatly enhanced by limiting access to compilers/assemblers (by means of pricing and with the cooperation of the open source community) and by separating macros or other executable content from documents.
It makes more sense than trying to go out and educate every user. Think about it; in what other field do we "educate" "users"? We don't try to educate people with electrical outlets and let any curious individual perform as a licensed electrician. We don't "educate" passengers and let anyone who cares be a bus driver give it a try. Why are things always so difficult when it comes to computers?
Re:Curbing malware and cyberthreats (Score:5, Funny)
Re:Curbing malware and cyberthreats (Score:3, Insightful)
So in order to have posting access you'd have to abandon your #638 account and get another one?
I wonder if Cmdr Taco has already reserved # 1,000,000 for himself to avoid being trapped in the 1-999 ghetto.
Re:Curbing malware and cyberthreats (Score:3, Insightful)
However, I do agree that we have no reason to put executable code in documents.
Re:Curbing malware and cyberthreats (Score:3, Funny)
Re:Curbing malware and cyberthreats (Score:2)
That doesn't work for doctors and lawyers, why would it work for programmers?
I suggest that the field and the general user experience would be greatly enhanced by limiting access to compilers/assemblers (by means of pricing and with the cooperation of the open source co
Don't be such an ass. (Score:5, Insightful)
> limiting access to compilers/assemblers (by means of pricing and with the cooperation of
> the open source community) and by separating macros or other executable content from
> documents.
[eg. the premise: artificially raise the cost of compilers and nastybad people will stop writing viruses, etc. just like gangsters in New York improvised zip guns when guns cost too much... oh, wait, that's a bad analogy... bad people just make do.]
You should also consider separating "clueless" from "malicious" in your thought process. HTH.
> Think about it; in what other field do we "educate" "users"?
Other than prenatal care, disaster response, home safety, poison control, vehicular operation, wildfire control, diabetes management, power tools, gun storage, and how to program your VCR? Can't think of any offhand...
> We don't try to educate people
> with electrical outlets and let any curious individual perform as a licensed electrician.
But we'll sell wire cutters and conduit to any moron at Home Depot, along with a Hole Hawg and a 3 foot masonry bit. Surprisingly, a license is not required to burn down your house as a DIY repairman, nor is it required to pack a thousand pounds of fertilizer, some gasoline, and some nails into the back of a van, detonate it, and cause much worse harm.
Cars are deadly weapons, as are guns; both require a license to operate, but in neither case does that eliminate fatalities caused thereby. (In fact, on the evening news last night, I noticed that a Class C licensed bus driver rolled over an embankment, killing 2 people and one fetus, injuring the other 39 people on the bus. More than likely, a smaller percentage of licensed commercial drivers do this than, say, unregulated Pakistani mountain bus jockeys, but I have no useful measure of the protective effect conferred by this certifying process.)
Bad people will still be bad people, and "the cooperation of the opensource community" is not something I think you can depend on for this venture. (cf. PGP and SSL export restrictions)
Stack protection, virtualization, perhaps legal penalties for willfully distributing software known to pose a risk to the users without their awareness or education (cf. the Theramed); maybe an overhaul of the communications system, and use of (NON-unicode) certificates required for financial communications. I don't know for certain, but I do believe that your rant about compilers holds little relevance to phishing at this point in time.
Full disclosure: I learned to program on an HP-80 and a Timex-Sinclair ZX-81. I was using Usenet before AOL 'broke' it. And I still think you're chasing the wrong idea.
Re:Don't be such an ass. (Score:2)
Re:Curbing malware and cyberthreats (Score:2)
Re:Curbing malware and cyberthreats (Score:5, Funny)
I suggest that the field and the general user experience would be greatly enhanced by limiting access to compilers/assemblers
Hah! I shall SAVE THE WORLD with my carefully hidden away TURBO PASCAL 5.0 floppy!
The Old Days (Score:5, Funny)
Re:The Old Days (Score:2)
Then I had to walk back, six miles in the snow, uphill (again), and boot up my brand new monochrome NeXT cube. It was the first computer I ever had that was coal free -whi
Re:Curbing malware and cyberthreats (Score:2)
This got modded insightful? Hey buddy, you want me to go sit in the back of the internet because I haven't been on as long as you have?
Jackass.
spelling tip: Grammer is spelled "Grammar" (Score:2)
Now any fool who can type can come along and they don't even have to hand-assemble their programs! Sheesh!
Re:Curbing malware and cyberthreats (Score:2)
Re:Curbing malware and cyberthreats (Score:2)
Oil (Score:5, Interesting)
Re:Oil (Score:2)
I dunno, Microsoft seem do be doing all right with their version of the same thing.
Re:Oil (Score:4, Insightful)
Ohhh (Score:2)
Or maybe what you meant to say was 'fund rich capitalists'.
No new law needed (Score:5, Interesting)
All kidding aside, I don't personally believe in cybercrime. Some cybercrime victims are merely stupid users, and no law can fix them. Other cybercrimes that do disturb one's property should be covered by laws already in place.
My fear is that defending the cybercrime idea will only help make more wealthy lawyers and give politicians more abusive power.
Re:No new law needed (Score:2)
Re:No new law needed (Score:3, Interesting)
I pass on so many contracts daily because the power of contract is now only a corporate priviledge. I won't sign anything without cutting out portions, and often companies won't let me be a customer without accepting their contract. In a market where people's expectations are tied to a contract, I doubt this would happen.
Con men take advantage
Re:No new law needed (Score:4, Interesting)
That's like saying you don't believe in wire fraud, or don't believe in insurance scams. The point is that it's a class of criminal activity that wouldn't exist without the internet. The internet doesn't create those crimes, but those particular crimes couldn't exist without it. Just like cars don't cause auto theft, but without which, it wouldn't happen. Do you believe in the theft of automobiles? I don't need to believe in it - it's real no matter what I label it.
Some cybercrime victims are merely stupid users
Which users are those? Surely you're not suggesting that people, out of stupidity, inadvertantly transfer their life's savings into an offshore bank account owned by the Russian mob? Or do you mean users that are so dumb that they accidentally go online and have expensive electronics shipped to someone they don't know in the Bronx? Maybe it's stupid users that are so dumb that somehow they cause someone else to get a line of credit with their personal info? Obviously that's all BS... only the actions of the Bad Guys can actually leverage someone's ignorance and steal their money or fraudulently use their ID in the commission of a crime. Again: you don't have to believe in those acts... they're happening all around you, and not just because someone's grandma isn't savvy enough to see through a phishing scheme. The fact of her ignorance doesn't cause the guy in Russia using a zombie machine in Korea to send her that fake e-mail and then run off with her cash or reputation. Her igornance is a weakness, just like the glass windows on your house are a weakness that another sort of criminal easily exploits.
My fear is that defending the cybercrime idea will only help make more wealthy lawyers and give politicians more abusive power.
If you're worried about that, then why worry about other compartmentalized flavors of crime? Securities fraud involves some particular methods, practitioners, and types of victims. Enough so that we have a special name for it, even though it's still just basically deceit and theft. If specialized pursuit and prosecution of a certain type of crime is just going to make lawyers rich and politicians abusive, then would you recommend backing off of the guys that ran Enron's investors into the ground because we already have laws against theft and fraud?
We live in a highly specialized civilization, and need to deal with criminal specialists with specilialized laws and enforcement.
Re:No new law needed (Score:4, Insightful)
Belief means placing trust or confidence in something. I don't believe (trust) that cybercrime exists beyond the basic property crimes we already have laws against.
Drugs (Score:2)
well then... (Score:2)
10% (Score:2, Interesting)
I wonder if aggregate underground economy percentages have increased, or if more traditional underground trade has just moved online.
Re:10% (Score:4, Funny)
Re:10% (Score:2, Insightful)
Dealers tell the media how much they make? (Score:4, Insightful)
Dunno 'bout the rest of you guys here, but I never told the police or the press how much profit I made back when I was a small time dealer (can't touch me, young offenders act!
If I didn't, you can be damn sure that big-time or organized criminals do not share these figures either.
Neither do the users. (How many crack-heads report the amount they spend on their habit?)
So what the hell is the premise on which these "statistics" have ever been based on?
I can think of a few ways to fudge up some statistics about people screwed outta their money on the net, but I can't see a way to truly gauge that either. Again, if I fell for the "send me a grand and I'll send you a million" I sure as hell wouldn't tell anyone I was that stupid.
Hence, I dub the entire original article as BS, just like the 'War on Drugs' and even the 'War on Spam'
min wage (Score:5, Informative)
As for the phishing problem, I really don't understand why people fall for those. Your bank, or eBay, or Paypal, will never, ever, ever, ever, ever send you an email asking you to disclose any account information. If those people want to contact you for an important reason, they will either call or send you actual mail. This seems like a simple rule to remember, doesn't it?
Re:min wage (Score:2)
They say that, but they ask me to sign into my account to see the latest balance transfer offer or to sign up for "account guard" all of the time.
Re:min wage (Score:2)
Re:min wage (Score:2)
So overtaking drug earnings is still big news.
Re:min wage (Score:2)
Re:min wage (Score:2)
Replace "drug dealers" with "CEOs" and you'll get a very good indication of why people sell (and use) drugs. The opportunities for advancement are better, your enemies identify themselves clearly (by shooting at you) instead of manipulating office politics, and you die if you fail, so there's no messy bankruptcy/reposession process if you're young, or humiliating retirement/de
Re:min wage (Score:2)
But is the average drug dealer a full time dealer or on top of other income? And by other income I also mean social security and other things you won't get along with a regular job. Is it their way of being able to afford their own habit, instead of being a hobo because they're stoned and couldn't keep a real job? Or are the
Re:min wage (Score:2)
If I give you my credit card number will you write it down for me?
Aw c'mon... (Score:2)
"No country is immune from cybercrime, which includes corporate espionage, child pornography, stock manipulation, extortion and piracy, said Valerie McNiven, who advises the U.S. Treasury on cybercrime."
So "child porn" and "piracy" makes more money than the drug trade? I don't think so...
Re:Aw c'mon... (Score:2)
Sure they do. Let's use the numbers favored by the RIAA and MPAA, the foremost industry advocacy groups dealing with this scourge of "cybercrime."
50,000,000 American teenagers * $1,000,000 in economic damage per pirated MP
Re:Aw c'mon... (Score:2)
That's my point... (Score:2)
It's ANOTHER to say that piracy has more INCOME than the drug trade.
Now, pirated items "sold" over the internet like actual goods, yeah, that's revenue. But I highly doubt that number has overtaken the drug revenue number. But you KNOW they're including all the free traders on the p2p services in those numbers just so they can scare people into tighter legislation.
You don't get it (Score:2)
In other words, this article is almost certainly BS, which you could have just assumed when you saw Reuters.
4% is bogus (Score:3, Informative)
Re:4% is bogus (Score:2)
Re:4% is bogus (Score:3, Insightful)
Re:4% is bogus (Score:3, Insightful)
If they gain control of a large mail server or active router, they could easily and reliably associate thousands of account digits with the correct email addresses, and use that information to gain credibility. Email that's this important should be sent encrypted for the receiver and the signature verified against a certificate exchanged when the account or service was established.
Re:4% is bogus (Score:2)
Secondly, there is no "standard" (as in supported by ALL clients) method for encrypting emails. I know most OSS clients support PGP, but Microsoft Outlook Express doesn't and thats what many people use if they are not using web-based email.
Re:4% is bogus (Score:2)
Showing that the financial institutions are doing their part in confusing people. There were definite evidence of phishing in those messages (bank name being a sub domain of an obscure domain and a variation of the primary name). Why does Bank of America point its customers to bankofamerica1.com if they're aware of phishing issues?
Even with edge-cases like this removed, I doubt the results would be much more encouraging. But 4 % success rate is worse tha
Re:4% is bogus (Score:2)
Re:4% is bogus (Score:2, Insightful)
Re:4% is bogus (Score:5, Insightful)
Re:4% is not measuring what you think it is (Score:2)
Re:4% is not measuring what you think it is (Score:3, Interesting)
But a Problematic Comparison (Score:2)
Inflated numbers (Score:4, Interesting)
With the stock manipulation, this is also a pretty nebulous number. Did they include only verified cases of people doing this? What did they consider manipulation? The article is very thin.
Definition of 'cybercrime' (Score:5, Interesting)
That's a pretty open-ended definition. So is old-school white collar insider trading or shenanigans now Cyber-Crime just because they do it from a workstation? It'd be interesting to see just what is a cyber-crime now and how it breaks down into that total 150 billion dollars they just throw out there. Of course such data might pop the balloon of FUD as delicious as this.
Re:Definition of 'cybercrime' (Score:2)
I didn't read the article (a great Slashdotter mantra), but I imagine that their definition of "drug dealing" is a pretty open-ended as well. Sure, there is cultivating, manufacturing, and distributing - Do they account for drug-related paraphanelia? (Those glass-blown tobacco-pipes/Bongs gotta cost something) Do they account for drug-related crimes and profits? (prostitution, theft, and gambling are tied into drug dealing as well)
Of course such data might pop the b
Re:Definition of 'cybercrime' (Score:2, Interesting)
fishing survey is bullshit (Score:5, Funny)
I consider all email from commercial entities as fraudulent.
Re:fishing survey is bullshit (Score:3, Insightful)
Re:fishing survey is bullshit (Score:3, Informative)
Assuming their message doesn't get caught by my spam filters, it will never get past my own two eyeballs.
If a company that I do business with wants to e-mail me something, they'd better just say "go to our website" because I (and many others) won't ever give it a second look otherwise.
Re:fishing survey is bullshit (Score:2)
I protest... that should have counted as correct.
Uhhh... (Score:2, Funny)
That 'IQ' test is largely pointless (Score:2)
Re:That 'IQ' test is largely pointless (Score:2)
4% of phising (Score:2)
What was annoying? I was supposed to judge the validity of the emails from a jpeg - not from looking at the acutal links on the email. I mean, if I get an email from my bank, and the URL that they send me is NOT the same as my banks - then I know it is phishing spam. I do this because I can tell by the domain/subdomain in the links - not by how the mail "looks".
Having said that, I
4%? (Score:2)
The test is bad (Score:5, Insightful)
Had a look at the test [mailfrontier.com] and this is not surprising. Basically, they just take a screenshot of the mail reader window, ripping out any info (headers, html source) that could be of any help. Not to mention that as long as you assume anything you get from your bank/ebay/paypal/... is *potentially* a phishing e-mail, you don't have to actually be able to tell the difference. Education should not be about recognizing phishing emails because phishers will always be ahead. However, if you *never* click on a link and always use bookmarks (to bank and all) you have, then there's nothing a phisher can do. Of course, education should also be for institutions like my bank which includes its website URL in emails they send me (they're encouraging their customers to learn bad habits).
I've always been paranoid (Score:2)
With the advent of temporary credit card numbers, I fe
All they had to do is look at Microsoft.... (Score:2)
False Positives (Score:2)
No. Half the examples in that test require users to identify suspect emails as Legitimate. Sure enough, few people (especially the ones who practice 'safe browsing' by default -- i.e. tell no one nothing ever) will score 100% by trusting all those suspect examples.
Users can be taught to default to "NO". They are learning.
That said, user credulousness would be a problem even if 99% of users had identified all the fraud examples as fr
Nobody can spot 100% of phishing attempts (Score:2)
4% and phishing test. (Score:3, Insightful)
-Rick
Dump your html email (Score:2)
So only 4% are using text only mail readers like pine? And the rest are looking at the Paypal graphic in the HTML email and deciding the email is genuine?
Poor bastards.
More meat and less bun in a mailreader makes fakes trivial to spot.
One Level of Commonality (Score:2)
Cybercrime more lucrative than drugs?!?!?! (Score:2)
Two totally different crimes (Score:5, Insightful)
If there wasn't a demand for drugs, there would be no drug trade. Conversely, the only reason to steal from others is always greed. Some might steal for fun *cough* winona ryder *cough*, but theft (in person, 3rd person, or via cybercrime) is almost always due to greed. Big difference there... One's there as a result of people wants, and demands. The other is largely parasitic, and exists solely to leech off people.
Personally, I'd rather see my government invest more of our tax dollars into protecting our identities, and investments, as opposed to busting generally harmless dope smokers, and their suppliers (In case you didn't know, marijuana smokers are the most commonly targeted drug demographic these days, and the majority of our tax dollars, go towards fighting marijuana, while proven "bad drugs", such as meth, ruin lives, and run rampant throughout the country).
The reason for all this is greed. The big companies almost write their own laws these days, and meanwhile more and more of our freedoms our lost, as our lawmakers focus on giving their funders (not constituents!) what they want. And surprisingly, things like Cybercrime continue to grow, and be largely ignored (Note, I'm talking real crimes, such as identity theft, phishing, and so on. Not downloading music and videos, which IMHO should be near the bottom of our list of priorities) .
Personally, I'd like to see a major change in how we handle crimes in this country: Elevate identity theft, and other life-altering crimes to the level they deserve, focus our energies and money on bettering our country, and removing our dependence on other countries for our very existance, and stop focusing on the average downloader as being the worst thing to hit the US since Pearl Harbor. Meanwhile, start fighting the real drug problems that are facing our country: Meth, Cocaine, Heroin, and so on, rather than going after the "low hanging fruit", marijaua users, which are largely chosen simply for the ease of busts, and the profit available to cops for doing so.
It's all about priorities, and right now our lawmakers top priorities are largely themselves, as evidenced by recent [cnn.com] events [cnn.com].
Typical bogus (Score:2)
ttyl
Farrell
50% correct can be a GOOD thing! (Score:2)
Maybe the test should say: "IF you had an account with the following entities, would you consider this a genuine or a fake email from them?"
4%? (Score:2)
If you take a look at the survey it not only checks to see if you can spot a fraud, but if you can spot a legitimate email too, and marking a legitimate email as a fraud, which in real world terms is harmless, is given the same penalty has marking a fraudulent email as legitimate... Even in the explanation they say that the message had red flag yet was legitimate, so what's supposed to be the lesson learned here? That users also have a hard time spotting legitimate
The name is Valerie McNevin (Score:4, Informative)
So for all of us who are busy googling for this person, the name is not Valerie McNiven, but Valerie McNevin. She is a lawyer, worked for the state of Colorado in about 2002 and then for the World Bank and is now [yahoo.com] with a private company, Cybrinth, LLC [cybrinth.com] which does consulting on cyber crime. The Reuters correspondent did not bother to reveal this.
The article itself is rather confusing - he is actually claiming that cybercrime is perpetrated by "idle youths looking for quick gain"? In the Third World?? And just for fun, once the Reuters dispatch gets rewritten, she turns into a cybercrime guru [securitypronews.com]...
Now, how she gets the number of more that $100 bn being made by cybercrime, I have no idea. I guess it includes the $40 bn revenue Microsoft makes each year...
Link doesn't support assertion. (Score:3, Insightful)
I took the test [mailfrontier.com] the linked-to article cited as the source of data for that 4% claim. I only scored 80%. Does that mean I flagged only 80% of phish attempts? No, it doesn't. I flagged 100% of the phishing attempts as exactly what they were.
I had two false-positives, which lowered my score. But false-positives are quite a bit safer than false-negatives. In each case, the 'legitimate' email linked to different domains than the origin; the one from Bank of America linked to bankofamerica1.com, and the one from CapitalOne linked to a really odd domain, bfi0.com. That second one is a *huge* red flag, regardless of the content of the email, you'd have to be very trusting or do some extra research in order to *not* flag it as a phishing attempt.
Only 4% of users might score a 100% on that quiz, but that's not at all the same thing as saying that only 4% of users can't flag all phishing scams as such.
Sales data? (Score:3, Funny)
Re:I'm in the top 4% !!! (Score:3, Funny)
Re:Legalize hacking! (Score:3, Insightful)
Re:Drugs (Score:2)
Re:Drugs (Score:2)
around here a few years ago there was a big pot bust, something along the lines of 50- 100 plants worth *millions*
they derived the value by weighing the entire plant, including root ball and soil in the root ball. then multiply that by the cost of an ounce of smokable buds and voila drug estimates RIAA style
Re:So, when I (Score:5, Informative)
This is my field of study, so I feel obliged to throw in my 2 bits here.
When someone refers to a "drug" in the sense of crime, they mean more accurately a "Schedule I Material" (and rarely, Schedule II or III, but usually just I). What does this nonsense mean? Well, in theory anyway, Schedule I is reserved for materials deemed to have no redeeming medical value, with a high possibility of chemical addiction or overdose. Now, given your statement about cigarettes and booze -- you and I both realize that that isn't entirely the case.
While at the core, the doctors who worked with the FDA and the DEA to create the original controlled substances lists were doing so in good faith to protect the population at large from "Snake Oil" and soft drinks with addictive spikes (Ahem, Coca-Cola); there are unfortunately, larger powers at work than even the medical industry today. "Big Tobacco" has been in power in this country for hundreds of years before this country was even a country. So even though nicotine in all scientific methods would be a Schedule I material -- it isn't. This is also the reason THC is Schedule I despite having qualities that should qualify it for Schedule III (your usual prescription medications). Alcohol, for similar social reasons, is not Schedule I either.
Your usual prescription medications are Schedule III; which roughly defined is materials that have useful medical value and low possibility for addiction, but have other qualities such as allergens or drug interactions that merit having a doctor or two check you out before giving you them.
Hope that I have helped
~Rebecca
Re:So, when I (Score:3, Insightful)
MDMA, MDA, TMA, DMT, LSD, Psilocybin, Mescaline, DOET, 2CB, THC, DOB and many many others - none of these substances produce a chemical dependency. Nor it is trivial to get OD'ed on those substances. Furthermore, harm of many psychedelics and empathogens (MDMA would be the most well-known example) is not proved despite extensive research. Makes you think when you compare them to alcohol and tobacco.
Now let's