Skip to main content

Cybercrime Classification and Measurement

Recently completed

A committee-supported project or activity that has been completed and for which output dissemination has begun. Its committee has been disbanded and closeout procedures are underway.

Under congressional mandate, the National Academies’ Committee on National Statistics (CNSTAT), Computer Science and Telecommunications Board (CTSB), and Committee on Law and Justice (CLAJ) will conduct a consensus panel study to review current measurement and reporting of cybercrime, developing a taxonomy that can be used to measure cyber-enabled and cyber-dependent crimes experienced by individuals and businesses. This study will build on the Modernizing Crime Statistics consensus study (National Academies of Sciences, Engineering, and Medicine, 2016, 2018) and a study by the U.S. Government Accountability Office (2023), and is sponsored by the Federal Bureau of Investigation.

Introduction

Cybercrime poses serious threats and financial costs to individuals and businesses in the United States and worldwide. Reports of data breaches and ransomware attacks on governments and businesses have become common, as have incidents against individuals, such as identity theft, online stalking, and harassment. Concern over cybercrime has increased as the internet has become a ubiquitous part of modern life. However, comprehensive, consistent, and reliable data and metrics on cybercrime still do not exist—a consequence of a shortage of vital information resulting from the decentralized nature of relevant data collection at the national level.

Cybercrime is widespread, underreported, and increasingly complex—yet national crime statistics systems are not currently designed to account for its full scope. Drawing on recent legislation and expert input, this report identifies persistent challenges in how cybercrime is classified, collected, and interpreted, and recommends a taxonomy to support more coherent and coordinated data collection.

Key Facts

Key Facts

Key Recommendations for the Federal Bureau of Investigation (FBI)

Key Recommendations for the Federal Bureau of Investigation (FBI)

Key Recommendations for the Bureau of Justice Statistics (BJS)

Key Recommendations for the Bureau of Justice Statistics (BJS)

Better Data for Understanding Cybercrime

Better Data for Understanding Cybercrime

Key terminology

Malware

is software developed for any malicious purpose, regardless of the type of harm to be created by the software (i.e., system monitoring or keystroke logging) or the manner by which it is deployed (e.g., direct insertion onto computer, email attachment, or link distributed via social media). Malware also includes alternative development processes such as Malware-as-a-Service in which the malware developer leases or sells the code to other actors to deploy after customization. Malware may take the form of or be described using terms including virus, worm, trojan, spyware, scareware, rootkit, exploit kit, or bots/botnets.

Ransom

Ransom is the payment demanded in return for the release of something that has been held hostage. In the context of ransomware, the ransom is commonly a payment in untraceable cryptocurrency, though it need not be a monetary payment; it may be performance of a particular action.

Man-in-the-Middle attacks

Man-in-the-Middle attacks are malicious acts against communication channels for purposes of intercepting and potentially modifying transmitted data, without the knowledge of the communicating parties. Such acts specifically targeting mobile devices (e.g., distribution of fake apps) have been termed Man-in-the-Mobile attacks.

Pharming

Pharming is the redirection of users from a legitimate/trusted website to a fraudulent, attacker-controlled website, based on the manipulation of DNS servers or stored caches, such that the redirection is unknown to the user.

Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.