skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 156176 Find in a Library
Title: Computer Crime Categories: How Techno-Criminals Operate
Journal: FBI Law Enforcement Bulletin  Volume:64  Issue:7  Dated:(July 1995)  Pages:21-27
Author(s): D L Carter
Date Published: 1995
Page Count: 7
Sponsoring Agency: National Institute of Justice/
Rockville, MD 20849
NCJRS Photocopy Services
Rockville, MD 20849-6000
Sale Source: National Institute of Justice/
NCJRS paper reproduction
Box 6000, Dept F
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Document: PDF
Type: Survey
Format: Article
Language: English
Country: United States of America
Annotation: This article discusses various types of computer crimes and possible investigative strategies for law enforcement.
Abstract: While there are four primary types of computer crimes, multiple crimes can occur during any given criminal transaction. Crimes in which the computer is the target include the theft of intellectual property or marketing information, blackmail, or sabotage of operating systems and programs. In all of these crimes, the offender uses the computer to obtain information or to damage operating programs. In the second type of crime, the processes of the computer, that is, its instrumentality, rather than the content of actual files, is used to commit the crime. Offenses in this category include fraudulent use of automated teller machines, credit card fraud, and telecommunications fraud. In another type of computer crime, the computer is not essential for the crime to occur, but is related to the criminal act. For example, drug offenders may use computers to record information on their money laundering, trafficking, and other illegal activities. The fourth category includes recently invented crimes related to the proliferation of computers, such as software piracy, black marketeering, and theft of computer equipment. Some unique problems related to computer crime pertain to intellectual property issues, the concept of malfeasance by computer, and international issues.
Main Term(s): Computers
Index Term(s): Computer related crime; Crime typologies; Offense characteristics
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.