Unlawful or forcible entry or attempted entry of a residence. This crime usually, but not always, involves theft. The illegal entry may be by force, such as breaking a window or slashing a screen, or may be without force by entering through an unlocked door or an open window. As long as the person entering has no legal right to be present in the structure a burglary has occurred. Furthermore, the structure need not be the house itself for a burglary to take place; illegal entry of a garage, shed, or any other structure on the premises also constitutes household burglary. If breaking and entering occurs in a hotel or vacation residence, it is still classified as a burglary for the household whose member or members were staying there at the time the entry occurred.
Attempted forcible entry - A form of burglary in which force is used in an attempt to gain entry.
Completed burglary - A form of burglary in which a person who has no legal right to be present in the structure successfully gains entry to a residence, by use of force or without force.
Forcible entry - A form of completed burglary in which force is used to gain entry to a residence. Some examples include breaking a window or slashing a screen.
Unlawful entry without force - A form of completed burglary committed by someone having no legal right to be on the premises, even though no force is used.
A company, service or membership organization consisting of one or more establishments under common ownership or control. For this survey, major subsidiaries were treated as separate businesses.
An organization that works with the U.S. Computer Emergency Readiness Team (CERT) and the private sector. CERT C.C. studies computer and network security in order to provide incident response services to victims of attacks, publish alerts concerning vulnerabilities and threats, and offer information to help improve computer and network security.
A hidden fragment of computer code which propagates by inserting itself into or modifying other programs. Includes viruses, worms, and Trojan horses. Excludes spyware, adware, and other malware.
Denial of service
The disruption, degradation, or exhaustion of an Internet connection or e-mail service that results in an interruption of the normal flow of information. Denial of service is usually caused by ping attacks, port scanning probes, or excessive amounts of incoming data.
The unlawful misappropriation of money or other things of value, by the person to whom the property was entrusted (typically an employee), for his or her own purpose. Includes instances in which a computer was used to wrongfully transfer, counterfeit, forge or gain access to money, property, financial documents, insurance policies, deeds, use of rental cars, or various services by the person to whom they were entrusted.
The intentional misrepresentation of information or identity to deceive others, the unlawful use of a credit or debit card or ATM, or the use of electronic means to transmit deceptive information, in order to obtain money or other things of value. Fraud may be committed by someone inside or outside the business. Includes instances in which a computer was used to defraud the business of money, property, financial documents, insurance policies, deeds, use of rental cars, or various services by forgery, misrepresented identity, credit card or wire fraud. Excludes incidents of embezzlement.
Information Sharing and Analysis Centers (ISACs)
Organizations that work with the U.S. Government, law enforcement agencies, technology providers, and security associations such as U.S. CERT. ISACs maintain secure databases, analytic tools and information gathering and distribution facilities designed to allow authorized individuals to submit reports about information security threats, vulnerabilities, incidents and solutions.
An information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the Federal Bureau of Investigation and the private sector.
The unlawful taking of property other than a motor vehicle from the possession of another, by stealth, without force or deceit. Includes pocket picking, nonforcible purse snatching, shoplifting, and thefts from motor vehicles. Excludes receiving and/or reselling stolen property (fencing) and thefts through fraud or deceit.
Completed motor vehicle theft - The successful taking of a vehicle by an unauthorized person.
Attempted motor vehicle theft - The unsuccessful attempt by an unauthorized person to take a vehicle.
Other computer security incidents
Incidents that do not fit within the definitions of the specific types of cyber attacks and cyber theft. Encompasses spyware, adware, hacking, phishing, spoofing, pinging, port scanning, sniffing, and theft of other information, regardless of whether damage or losses were sustained as a result.
Completed or attempted theft of property or cash without personal contact. Incidents involving theft of property from within the sample household are classified as theft if the offender has a legal right to be in the house (e.g., a maid, delivery person, or guest). If the offender has no legal right to be in the house, the incident is classified as a burglary.
Completed theft - To successfully take without permission property or cash without personal contact between the victim and offender.
Attempted theft - To unsuccessfully attempt to take property or cash without personal contact.
Theft of intellectual property
The illegal obtaining of copyrighted or patented material, trade secrets, or trademarks (including designs, plans, blueprints, codes, computer programs, software, formulas, recipes, graphics) usually by electronic copying. Excludes theft of personal or financial data such as credit card or social security numbers, names and dates of birth, financial account information, or any other type of information.
Theft of personal or financial data
The illegal obtaining of information that potentially allows someone to use or create accounts under another name (individual, business, or some other entity). Personal information includes names, dates of birth, social security numbers, or other personal information. Financial information includes credit, debit, or ATM card account or PIN numbers. Excludes theft of intellectual property such as copyrights, patents, trade secrets, and trademarks. Excludes theft of any other type of information.
The United States Computer Emergency Readiness Team is a partnership between the Department of Homeland Security and the public and private sectors. Established in 2003 to protect the nation's Internet infrastructure, U.S. CERT coordinates defense against and responses to cyber attacks across the nation.