Elsevier

Digital Investigation

Volume 2, Issue 4, December 2005, Pages 261-267
Digital Investigation

Criminal profiling and insider cyber crime

https://doi.org/10.1016/j.diin.2005.11.004Get rights and content

Abstract

On a global scale, cyber crime has skyrocketed with the advancement of the electronic medium. While progress is being made in combating cyber crime (particularly with the Council of Europe's Convention on Cyber Crime), a large gap continues to exist in legislative compatibility across international borders. Often overlooked in regard to profiling is cyber crime. The idea that an individual committing crime in cyberspace can fit a certain outline (a profile) may seem far-fetched, but evidence suggests that certain distinguishing characteristics do regularly exist in cyber criminals. This can be particularly useful for companies (the most often hindered victims of cyber crime) attempting to do away with cyber criminals inside their own walls (the most common type of cyber criminals). Whether they are simply breaking company policy by browsing the Internet while on the clock or embezzling thousands of dollars through the company's network, insiders are a very real problem that companies spend millions of dollars annually to prevent. An accurate profile of an inside cyber criminal may help in identification both prospectively and retrospectively.

Section snippets

History of profiling

The profiling of criminals dates back to the 15th century. The investigative technique's path through history has been, at times, poorly documented and marred with occasional inaccurate findings and prejudices. As many adversaries as the method seems to have, however, there exists strong instances throughout history in which the process has produced incredible results that demand attention and consideration. Today, profiling takes a very different form than it did in the 1400s. Since the 1970s

Cyber crimes against business

Cyber crime is a hot topic of the 20th century. The world stands at a crossroads for developing defense mechanisms against it. Cyber crime by its most general definition can be any crime committed over a computer network.17 These crimes have been occurring since the creation of the Internet. If there is information to be shared, there is information to be sabotaged. The challenge is faced by every online individual, company or

Insider cyber crime and abuses

Insider abuse of Net access and unauthorized insider access are two concerns for employers. While insider abuse of net access went up to US$50,099,000 from US$35,001,650 in 2001, the unauthorized insider access decreased to US$4,503,000 from US$6,064,000 (Power, 2002).25 Upwards of 70% of all computer crime directed toward companies is committed by insiders.26 The insider abuse of

Profiles and cyber criminals

There are many differences between cyber crime and conventional crime both in committing the crime and in prosecuting it. All of which seem to favor the criminals. This makes it very difficult to track, catch, and prosecute cyber criminals within the current legal system. Many times, the cyber criminal may be far away from the place where the crime takes place. The attackers can choose the place they will be at the time that the crime is to be committed because cyber crime does not require a

Applying profiles to insiders

In order to make the most precise profile of an inside cyber criminal, the first step will be to divide the type of cyber crime into one of many possible subcategories. Insider cyber crime can be generalized in four main categories: espionage, theft, sabotage, and personal abuse of the organizational network.

A spy is: “a person who keeps close and secret watch on the activities and words of another or others” or “a person who seeks to obtain confidential information about the activities, plans,

References (0)

Cited by (26)

  • Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information

    2015, Digital Investigation
    Citation Excerpt :

    Our proposed profiling system, which comprises mobile devices and a remote server, is analogous to criminal profiling. In the real world, criminal profiling, also known as offender profiling, is a methodology that is intended for helping investigators accurately predict and profile the characteristics of unknown criminal subjects or offenders (Kocsis, 2009; Nykodym et al., 2005; Rogers, 2003). We adopt criminal profiling methodology in the malware analysis domain.

  • Impacts of increasing volume of digital forensic data: A survey and future research challenges

    2014, Digital Investigation
    Citation Excerpt :

    Producing a profile of a suspect is another facet of criminal intelligence. Nykodym et al. (2005) discuss the application of psychological profiling techniques to create profiles in relation to cyber criminals and cyber-crimes. Abraham (2006) discusses the application of investigative or criminal profiling to identify the personality characteristics of a user, such as email authorship analysis.

View all citing articles on Scopus
View full text