Cybercrime Classification and Measurement (2025)

Chapter: Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime

Previous Chapter: Appendix A: Recent Federal Law on Cybercrime Classification
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.

Appendix B

Detailed Definitions and Inclusions, Panel’s Recommended Classification of Cybercrime

Code Offense, Definition, and Inclusions/Exclusions
1 ACTS TARGETED AGAINST MACHINES, DATA, OR SYSTEMS
Unlawful acts that are cyberdependent, in that computers, data, or systems are the target of the action and the offense could not happen without a computer or system
1A Ransomware Deployment of malware1 to render files on the computer/system inaccessible until a ransom2 is paid
  • Note: Selection of this category should require that an offense of extortion/blackmail be coded for the incident

___________________

1 Malware is software developed for any malicious purpose, regardless of the type of harm to be created by the software (i.e., system monitoring or keystroke logging) or the manner by which it is deployed (e.g., direct insertion onto computer, email attachment, or link distributed via social media). Malware also includes alternative development processes such as Malware-as-a-Service in which the malware developer leases or sells the code to other actors to deploy after customization. Malware may take the form of or be described using terms including virus, worm, trojan, spyware, scareware, rootkit, exploit kit, or bots/botnets.

2 Ransom is the payment demanded in return for the release of something that has been held hostage. In the context of ransomware, the ransom is commonly a payment in untraceable cryptocurrency, though it need not be a monetary payment; it may be performance of a particular action.

Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
  • Include:
  • — Any like offense in which ransom is demanded to restore access, whether the malware works through encrypting files or through locking users out/altering their permissions
  • — Any like offense in which ransom is demanded to prevent removal of data or public release of sensitive information
  • — Involvement in the production of Ransomware-as-a-Service
  • Exclude: Any like offense in which ransom is not demanded
1B Unlawful Access or Deprivation of Access
Malicious cyberactivity intended to obtain access to computers, data, or systems—without permission or in excess of authorized use—or to make a computer or system unavailable to other users
  • Include:
  • — Cybertrespassing
  • — Unlawful access to a computer, network, or system (or the unsuccessful attempt to gain such access) to compromise a system or disrupt a service, including exploitation of vulnerability,3 unauthorized login attempts,4 spoofing or manipulating Domain Name System (DNS) servers to obtain access, and general attempts to bypass or override a network’s access control system—as well as login via a compromised account using stolen (legitimate) access credentials
  • — Denial- of- Service or Distributed Denial- of-Service attacks intended to disrupt the normal processing and response capacity of targeted systems by, for example, mass bombardment of requests, queries, network packets, or emails directed toward a service or network5
  • — Sabotage of system access, or deliberate physical or logical activities that make the targeted system inaccessible to other users (rather than damage, change, or delete the system content)

___________________

3 Exploitation of vulnerability attempts can take such forms as SQL Injection, malicious SQL language to interfere with database queries; Cross-Site Scripting, malicious scripts introduced into web pages and applications; and file-inclusion techniques, using loopholes in web applications to input and execute local or remote malicious files.

4 Unauthorized login attempts include attempts to gain access to a system via routine access control mechanisms, such as brute forcing (i.e., sequentially stepping through possible credentials/passkeys), password cracking (i.e., breaking the protective cryptographic keys to login credentials), dictionary attack (i.e., attempting login using credentials previously archived in a dictionary), or password spraying (i.e., attempting login via commonly used and repeated passwords across multiple user names/accounts).

5 Such attacks may be known as email bombs, floods, amplification attacks, or reflection attacks; attacks specific to telephone communications may be termed Telephony Denial of Service.

Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
1C Unlawful Interference, Tampering, or Content Release
Malicious cyberactivity intended to alter, change, distort, or undermine the integrity of the information content or the functioning of a network or system, or to exfiltrate/release data without authorization
  • Include:
  • — Unlawful access to a computer, network, or system to alter or destroy information or the functioning of a network or system, including Man-in-the-Middle attacks6
  • — Unlawful data breach or data exfiltration, in which information is accessed and sold, leaked, or otherwise disseminated without authorization
1D Other Acts Targeted Against Machines, Data, or Systems
Other malicious cyberactivity for purposes not previously listed
  • Include:
  • — Other acts of creating, developing, or distributing malware for purposes not previously listed, such as Command and Control (C2, C&C)7
  • — Unlawful active or passive information gathering8 on systems or networks that is not intended to alter information content or change system functioning
  • — Advanced Persistent Threats, or programs of sustained, layered cyberattacks (potentially involving multiple attack modes), premised on stealth and long-term presence and monitoring on a system or network to achieve criminal goals
  • — As applied to computers, data, or systems critical to states and nations, such cyber-dependent acts could be termed political interference, cyberwarfare, or espionage
2 FRAUD AND ACTS TARGETED AGAINST PROPERTY
Unlawful cyberactivity premised on the use of deceit or other dishonest conduct to result in the loss of property (including data and money) by an individual or organization

___________________

6 Man-in-the-Middle attacks are malicious acts against communication channels for purposes of intercepting and potentially modifying transmitted data, without the knowledge of the communicating parties. Such acts specifically targeting mobile devices (e.g., distribution of fake apps) have been termed Man-in-the-Mobile attacks.

7 Command and Control (C2, C&C) is use of a bot or botnet to seize control of a computer or system to execute commands on another system or to channel information between systems.

8 In this context, information gathering includes such acts as scanning (i.e., scanning a network to identify open ports or services or active subsystems), sniffing (i.e., logical or physical interception and reading of network traffic or communications), or transfer of DNS zones.

Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
2A Identity Theft
Unlawful cyberactivity resulting in the possession or acquisition of personal or financial identifying information without the consent of the affected person or the use of said identifying information to further any unlawful purpose
  • Note: Selection of this category should require that an offense of identity theft be coded for the incident
  • Include:
  • — Consumer financial and product/services fraud perpetrated through cyberactivity against individual persons that involves the use of personal or financial identifying information to misuse an existing account (e.g., bank, credit card, other financial service, email/social media) in a person’s name, to open a new account in a person’s name, or for other unlawful purposes
  • — Unlawful impersonation of another person
2B Fraud
Unlawful cyberactivity premised on the use of deceit, deception, persuasion, or other dishonest conduct to obtain some benefit or consequence or to evade a liability, wherein said benefit or consequence may be nonexistent, unnecessary, never intended to be provided, or deliberately distorted
  • Note: Selection of this category should require that an offense of fraud be coded for the incident
  • Include:
  • — Information-gathering actions based on use of fraud and deception, including phishing9 and social engineering, or that enable phishing or information gathering (e.g., hosting or constructing a website that looks like a trusted authority as a front for phishing; pharming10)

___________________

9 Phishing involves attempted elicitation of sensitive information from individuals by deceptively pretending to be a legitimate, trustworthy entity. Specific labels are commonly applied to phishing based on the medium by which the deceptive communications are delivered—whaling when messages are delivered by email, smishing/SMS phishing when delivered by short message service (SMS) text messages, or vishing/voice phishing when done by telephone or Voice over Internet Protocol. When phishing is done against specifically targeted recipients (i.e., employees of a particular company) rather than a broader, “public” net casting, the practice has been termed spear phishing.

10 Pharming is the redirection of users from a legitimate/trusted website to a fraudulent, attacker-controlled website, based on the manipulation of DNS servers or stored caches, such that the redirection is unknown to the user.

Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
  • — Consumer financial and product/services fraud perpetrated through cyberactivity against individual persons but not directly premised upon acquiring and using personal or financial identifying information, including false pretenses/swindle/confidence game11
  • — Wire fraud, or the use of computer or electronic communications in the commission or furtherance of a fraud against a person or an organization, including variants such as advanced fee/overpayment, Business Email Compromise/Email Account Compromise, confidence/romance schemes
  • — Fraud against businesses, establishments, nonprofit organizations, or government agencies perpetrated through cyberactivity, including false representation, misrepresentation, impersonation of a business or institution,12 and welfare fraud
  • — Pump-and-dump schemes13 and similar forms of securities and investment fraud in which the promulgation of misleading information by electronic means is central to the offense
  • — Tech support fraud against persons or organizations, in which the offender impersonates technical support or customer service personnel for fraudulent purposes
2C Other Acts Targeted Against Property
Other fraudulent or property-affecting cyberactivity not previously described
  • Include:
  • — Computer-related forgery or counterfeiting
  • — Computer-related intellectual property offenses, including copyright infringements, trademark-related offenses, and digital piracy
  • — Cryptolaundering (money laundering in cryptocurrency)
3 ACTS AGAINST INDIVIDUALS, NONSEXUAL IN NATURE
Unlawful cyberactivity, not purely of a sexual nature, that is meant to instill fear or emotional distress in another person

___________________

11 False pretenses/swindle/confidence game offenses include such variants as investment fraud (e.g., monetary and real estate), lottery/sweepstakes/inheritance, and nonpayment/nondelivery.

12 False representation is the unauthorized use of the name of an institution for purposes of carrying out fraudulent activities. Government impersonation is the impersonation of a government official or office to perpetrate fraud.

13 In the “pump” phase of a pump-and-dump scheme, perpetrators artificially inflate the price of a stock they have acquired at low cost through use of fraudulent and deceptive communications (primarily through electronic means) to make the low-cost stock attractive to buyers. The stock is then sold during the “dump” phase—the massive sale typically causing the stock price to plummet and causing loss to investors. See https://www.investor.gov/introduction-investing/investing-basics/glossary/pump-and-dump-schemes

Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
  • Include:
  • — Cyberharassment (harassment by cyberactivity, including social media)14
  • — Cyberbullying (bullying by cyberactivity)15
  • — Cyberstalking (stalking by cyberactivity)16
  • — Unlawful trolling, or the deliberate posting of inflammatory or derogatory comments on social media or electronic forums for the purpose of eliciting strong reactions from others, constituting more than benign chatter but falling short of the course-of-conduct nature of harassment, bullying, or stalking
  • — Doxing (or doxxing), or the online posting of another individual’s personal identifying information to threaten, harass, intimidate, or humiliate an individual or incite a violent crime against that individual17

___________________

14 As in National Academies of Sciences, Engineering, and Medicine (2016a; National Academies), harassment is defined as engaging in an unlawful course of conduct of words or actions that, being directed at a specific person, annoys, alarms, or causes substantial emotional distress in that person. In turn, a course of conduct is a pattern composed of a series of two or more acts over a period of time, however short, demonstrating a continuity of purpose.

15 As in National Academies (2016a), bullying is a variant of criminal harassment in which the offender exploits a real or perceived imbalance of power (either physical or social) with the objective of dominating and belittling victim(s); cyberbullying is the use of social media and electronic communications to conduct those behaviors. As in National Academies (2016a, p. 219), we note that state law commonly addresses the offense of bullying in education code rather than penal/criminal code, treating bullying as behavior between minors that is handled by local schools; however, states have taken a firmer hand in criminalizing cyberbullying in penal code language, likely because of incidences of adults impersonating children to conduct bullying behavior and communications.

16 As in National Academies (2016a), stalking is the act of engaging in a course of conduct directed at a specific person—including but not limited to acts in which the perpetrator follows, monitors, observes, surveils, or threatens the victim—in which the perpetrator knows or should know that the course of conduct would cause a reasonable person to fear for his or her safety or the safety of a third person (e.g., a family member), or to suffer other emotional distress. Cyberstalking is the use of social media and electronic communications to conduct those behaviors.

17 Doxing could also be classified under category 2A as identity theft, given the nature of the information being unlawfully disclosed. However, we classify it here following the lead of U.S. federal law, which includes “knowingly mak[ing] restricted personal information about a covered person [or member of their immediate family] publicly available [with] the intent to threaten, intimidate, or incite the commission of a crime of violence” against the person (18 U.S.C. § 119) under the broad heading of assault. The provision defines “covered person” as any officer or employee of the federal government acting in their official duties; any juror, witness, informant, or officer of any court of the United States; or any state/local law enforcement officer being doxed in retaliation for their participation in a federal criminal investigation.

Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
  • — Swatting, or the reporting of a false violent crime emergency to prompt a large response by law enforcement personnel as a means of threat or harassment, when there is a cyber hook to the offense (e.g., use of Caller ID spoofing, phishing, or other techniques)
  • — Computer-related acts of extortion or coercion against an individual, not consistent with ransomware but also not purely of a sexual or prurient nature
4 ACTS AGAINST INDIVIDUALS, SEXUAL IN NATURE
Unlawful cyberactivity of a sexual or prurient nature that is meant to instill fear or emotional distress in another person
  • Include:
  • — Unlawful possession, creation, access to, or distribution of child sexual exploitation material or child pornography through electronic means
  • — Unlawful possession, creation, access to, or distribution of adult sexual exploitation material through electronic means
  • — Unlawful cyberactivity for purposes of grooming or enticement of prospective victims of sexual exploitation
  • — Unlawful online sexual extortion (sextortion) of children or adults, typically in which payment is demanded to prevent the release or publication of intimate images
  • — Other unlawful image-based sexual abuse, including cyberflashing (unsolicited sending of intimate or prurient images), “revenge porn,” and nonconsensual pornography
5 ACTS TARGETED AGAINST GROUPS
Malicious cyberactivity involving the dissemination of abusive or unsolicited content to groups of individuals
  • Include:
  • — Email bombs or excessive spam, involving the unlawful sending of an unusually large quantity of unsolicited or unwanted email messages
  • — Unlawful computer-related actions against groups based on protected characteristics, including unlawful hate speech and religious offenses
  • — Computer-related acts of terrorism and radicalization
  • — Unlawful computer-related incitement to violence
6 ACTS INVOLVING INCIDENTAL TECHNOLOGY USE
Criminal acts that may involve the use of computers or networks but in which the cyberactivity is not central to the execution of the crime
  • Include:
  • — Criminal communications
  • — Electronic records of unlawful gaming and gambling
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
  • — Using information and communication technology to lure a victim into a physical attack
  • — Computer and telecommunications use in money laundering, including money muling
NA ACTS WITH NO CYBER/COMPUTER INVOLVEMENT

SOURCES: Generated by the panel, drawing in particular from Phillips et al. (2022), National Academies (2016a), and Wright and Parker (2023).

Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 113
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 114
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 115
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 116
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 117
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 118
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 119
Suggested Citation: "Appendix B: Detailed Definitions and Inclusions, Panel's Recommended Classification of Cybercrime." National Academies of Sciences, Engineering, and Medicine. 2025. Cybercrime Classification and Measurement. Washington, DC: The National Academies Press. doi: 10.17226/29048.
Page 120
Next Chapter: Appendix C: Cybercrime Offenses Defined in Current Systems and Law
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.