skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 150176 Add to Shopping cart Find in a Library
Title: Understanding the Computer Criminal
Journal: Security Awareness Bulletin  Issue:1-94  Dated:(March 1994)  Pages:13- 16
Author(s): N S Hibler; J Christy
Date Published: 1994
Page Count: 4
Sponsoring Agency: National Institute of Justice/
Rockville, MD 20849
NCJRS Photocopy Services
Rockville, MD 20849-6000
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Type: Report (Study/Research)
Format: Article
Language: English
Country: United States of America
Annotation: This article explains the formation of a nationally based study of computer crime, the nature of information collected, and the nature of computer criminals in four case examples.
Abstract: The research committee for Project Slammer decided to establish a research base from cases that showed intentional malice and those that manifested the newest violation technologies. The research effort is a collaboration between a variety of disciplines, each working closely with the other to build a better understanding of computer crime, how to prevent it, and how to investigate it. Case summaries show some of the information that has been assessed. One case is an example of low-tech computer crime, in which a U.S. soldier with little computer knowledge defected to a foreign nation, taking a standard lap top computer and two floppy disks that contained sensitive information. The second case involved a youthful offender who was able to conduct sophisticated computer violations that resulted in hundreds of thousands of dollars worth of damage. The major reasons for this offender's illegal activity included curiosity and intellectual challenge. The third case involved a co-conspirator of the subject in the second case. He had a history of delinquent behavior and was proud of his disruptive computer penetrations that resulted in cancellations of garbage and water services, passing along telephone numbers of those targeted to other hackers, and interrupting operating systems by removing entry access to authorized users. The fourth case also involved a youthful offender who illegally penetrated computer systems. Ego needs were apparently the main motive for the computer crimes, although he professed the hope that his computer penetrations would yield fraud opportunities or recruitment by some foreign or domestic power for his computer talents. These case studies are important because of what they reveal about offenders' motives and situational factors that facilitate or deter computer crime.
Main Term(s): Computer related crime
Index Term(s): Case studies; Criminology; Offender profiles
Note: A paper presented at the Department of Defense Computer Crime Conference, Monterey, Calif., 1993.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.