skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 228705 Find in a Library
Title: Cybercrimes Against Critical Infrastructures: A Study of Online Criminal Organization and Techniques
Journal: Criminal Justice Studies  Volume:22  Issue:3  Dated:September 2009  Pages:261-271
Author(s): Aunshul Rege-Patwardhan
Date Published: September 2009
Page Count: 11
Type: Report (Study/Research)
Format: Article
Language: English
Country: United States of America
Annotation: This study examined cyberattacks against critical infrastructures to create an initial typology of cybercriminals and their crimes.
Abstract: Findings showed that an assortment of criminal techniques was employed by different cybercriminals to commit cyberattacks. Certain techniques require greater expertise than others; creating malware, manipulating software, and assembling botnet armies require high levels of technical knowledge. Cybercriminals using toolkits did not require the technological know-how to commit crimes; the lack of technical knowledge did not imply attack failure. Information and communication technologies (ICTs) change the face of crime allowing cybercriminals to use technology to commit deviant acts by offering anonymity, increased flexibility, better efficiency, and speed, which cybercriminals use to organize themselves and their acts. The characteristics of cyberspace that facilitate crime can be accounted for by the acronym SCAREM (Stealth, Challenge, Anonymity, Reconnaissance, Escape, and Multiplicity). Cybercriminals are invisible and anonymous in cyberspace, difficult to detect, highly motivated and rationally choose their targets, and can easily replicate their crimes. The taxonomy of cybercriminals and their crimes created in this study is rudimentary and can serve as a foundation for future research. Table, glossary, and references
Main Term(s): Cyber Terrorism; Science and Technology
Index Term(s): Computer crime prevention measures; Computer related crime; Crime analysis; Crime typologies; Crimes of opportunity; White collar crime
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.