Cybercrime and Computer Crime
Cybercrime and Computer Crime
The Encyclopedia of Criminology and Criminal Justice, First Edition. Edited by Jay S. Albanese.
© 2014 John Wiley & Sons, Inc. Published 2014 by John Wiley & Sons, Inc.
DOI: 10.1002/9781118517383.wbeccj244
2 Cybercrime and Computer Crime
would access from a computer. Unauthorized The same techniques that can be used to
access to these accounts may be achieved in a commit computer and cyber crimes against
variety of ways, ranging from purely social to private individuals and organizations can also
highly technical. For example, using a method be employed against nation-states. Common
known as “social engineering,” a criminal may scenarios include the use of unauthorized access
contact a customer support line and impersonate to extract sensitive information, the use of
a customer to induce employees into divulging viruses or worms to disable computer-dependent
information that may grant the criminal access governmental functions, or the use of malicious
to the system. “Phishing,” a type of social engi- programs to damage national infrastructures
neering that involves asking the user to divulge (Congressional Research Service 2012). Cyber
their credentials by posing as a trusted authority, attacks can also use the internet to spread
can also be used to steal the credentials of a legit- misinformation in a broad campaign, such as
imate user (Anderson et al. 2012). In addition, one to undermine public trust in a government,
an attacker with sufficient access to a target may or more acutely, such as by widely reporting
simply attempt to guess any required credentials. a false emergency to prompt mass panic. The
Guesses may draw on specific knowledge of the complexity of such attacks can also make it
user (or similar users), or may employ a special- difficult to determine whether the attack is an act
ized computer program that can try billions of of war, an act of terrorism, or simply a crime,
guesses in seconds, a technique known as “brute which may have a significant impact on the
force.” Other more technical methods for gaining response that may be brought to bear upon such
user credentials include the use of malicious com- an attack (Brenner 2007).
While the potential exists to use computer
puter programs, called “keyloggers,” to record the
and cyber crimes as acts of war, many common
information a user types into the computer and
forms of computer crime are much more mun-
relay the information to the attacker as is com-
dane. Fraud is one of the most common goals
mon in the current variants of the Zeus banking
of computer and cyber crime, and it is a key
trojan (Anderson et al. 2012).
example of how a traditional crime can take on
The common use of the term “hacking” may
new dimensions through computers (Anderson
even extend to attacks against electronic resources
et al. 2012). Fraud occurs when someone misleads
that do not involve unauthorized access. The most
another party, typically to gain financial bene-
frequent such attacks, called denial-of-service fits. One common type of fraud, identity theft,
attacks, take aim at the systems that allow users often relies on collecting personal information
to access websites and network resources to make surreptitiously. Cyber identity thieves exploit the
them unavailable to intended users. Typically, the increased use of computing in our everyday lives
attacker simply overloads the infrastructure that to devise new ways of gaining access to personal
supports the system. By tying up the system’s information.
resources, the hacker ensures that the system will A cyber identity thief, like a hacker, may use
not be available to respond to legitimate requests. phishing techniques to deceive victims. In the
The attack may be accomplished with a single case of identity theft, the phishing often involves
malicious program, but it is also common for bot- the impersonation of a trustworthy source in an
nets to be used to overload the target system from electronic communication, generally an e-mail
several machines at once (Anderson et al. 2012). or website. For example, a phisher may send an
While some attacks are motivated by pure mal- e-mail to the victim purporting to be from a
ice, denial-of-service attacks are also frequently financial institution and claiming that there is
employed by those seeking to make a politi- a problem with the victim’s account (Anderson
cal statement (Congressional Research Service et al. 2012). The victim is then asked to verify
2012). Thus, the websites of governments, politi- his or her identity by providing the phisher with
cians, and businesses are common targets. Smaller personal information, such as a social security
organizations are most vulnerable, because their number or password, which the phisher will
infrastructures are often designed to accommo- then use to impersonate the victim to legitimate
date fewer users. businesses. Fraudulent identity information may
Cybercrime and Computer Crime 3
even be used to claim benefits from government 2012), and opportunities for the exploitation of
agencies; for example, in 2011, the United States those users abound. Even commonly used web-
Internal Revenue Service issued an estimated five sites can become potential sources of crimes.
billion dollars in fraudulent income tax refunds Internet-based money laundering schemes, for
to identity thieves (TIGTA 2012). example, are increasingly common on employ-
Cyber identity thieves may also employ less ment websites, where they are often disguised as
direct techniques to collect information. Crim- work-from-home ventures (Hutchings and Lind-
inals can intercept information provided to a ley 2012). Social media sites such as Facebook also
genuine retailer over the internet, such as by present ways to identify targets. Sexual predators
utilizing the keyloggers discussed earlier or by may use the internet to contact victims, particu-
electronically eavesdropping on open or poorly larly taking advantage of the prevalence of web
encrypted wireless networks (Peretti 2008). Even use among children and teens. Such sites may
transactions that do not occur purely online can also provide the means for computer and cyber
provide opportunities for electronic identity theft crimes including stalking (or cyberstalking), and
through a technique called skimming, in which harassment.
an electronic device is used to collect infor- The use of the internet for communication
mation from credit and banking cards. Retail and distribution of information among crim-
employees may use a skimming device to copy inals is another important hallmark of cyber
card information before completing a customer’s crime. This includes electronic copyright infringe-
legitimate transaction, or skimmers may attach ment, or piracy, which uses networked comput-
the devices to places where cardholders swipe ers to share unauthorized copies of copyrighted
the cards themselves, such as automatic teller works, including movies, music, and video games
machines (Anderson et al. 2012). Viruses and (Anderson et al. 2012). It may also include the
worms may also be employed to collect personal distribution of content that is prohibited in all
identity information. contexts, such as child pornography. Criminal
The internet has also breathed new life into conspiracies may also take advantage of the inter-
some common confidence tricks, such as advance net. In particular, terrorist organizations increas-
fee fraud. Advance fee fraud is when a victim is ingly use websites and message boards to recruit
promised a sum of money in exchange for pro- members and raise money (Hinnen 2004). Addi-
viding some smaller sum to the con artist. Some tionally, the internet provides opportunities for
variants of advance fee fraud are Spanish Pris- criminals to buy and sell stolen goods, including
oner schemes, and scams including the Nigerian identities.
Letter, or 419 scam, which refers to a section of Computer and cyber crimes present several
the Nigerian Criminal Code dealing with fraud challenges for law enforcement. Historically, the
(Anderson et al. 2012). In a typical cyber scam, the greatest problem with pursuit and prosecution of
victim is contacted by someone claiming to know cyber and computer criminals has been technical.
where a large fortune is hidden or being held. The As law enforcement gains technical abilities to
scammer also claims to need some advance fee track and thwart modern attacks, however, classi-
to gain access to the fortune, and the victim is cal policing issues are becoming more significant
promised a generous reward in exchange for help. problems (Congressional Research Service 2012).
The explanation for the advance fees varies, but Jurisdictional difficulties, incompatible laws, and
the con artist may cite a need for money for travel significant underreporting all plague the inves-
to the location of the fortune, or to hire a lawyer tigation of computer and cyber crime. Experts
to get access to the fortune, or to bribe corrupt agree that most cyber criminals are not caught;
officials into releasing the fortune. some estimates suggest that as few as 5% of all
As cyber identity theft and cyber advance fee perpetrators are prosecuted (Kshetri 2009).
fraud both illustrate, the internet provides not Investigations are difficult to start as less than
only a means to accomplish the crime, but also 50% of computer and cyber crimes are ever
a means to locate and contact victims. Accord- reported; some experts estimate less than 10%
ing to recent estimates, there are more than two (Kshetri 2009). Some specific types of cyber
billion internet users worldwide (World Bank crime, specifically cyber espionage and extortion
4 Cybercrime and Computer Crime
World Bank (2012) Internet users. http://data. Skibell, R. (2003) Cybercrimes & misdemeanors: A
worldbank.org/indicator/IT.NET.USER/countries, reevaluation of the Computer Fraud and Abuse Act.
accessed January 21, 2013. Berkeley Technology Law Journal 18(3), 909–944.
Sommer, P. (2004) The future for the policing of
cybercrime. Computer Fraud & Security 2004 (1),
Further Readings 8–12.
United States Government Accountability Office (2007)
Cybercrime: Public and private entities face challenges
Brenner, S., & Schwerha IV, J. (2008) Cybercrime in addressing cyber threats. Washington, DC: Gov-
havens. The Computer & Internet Lawyer 25(9), ernment Accountability Office.
19–21. Wall, D. (2007) Policing cybercrimes: Situating the pub-
Provos, N., Abu Rajab, M., & Mavrommatis, P. (2009) lic police in networks of security within cyberspace.
Cybercrime 2.0: When the cloud turns dark. Com- Police Practice and Research 8(2), 183–205.
munications of the ACM 53(4), 43–47.