What Makes a Cyber Criminal?

What Makes a Cyber Criminal?

In my days when I worked for the police, we would constantly try and profile criminals because it made our investigations easier. We would even regularly use specialist criminal profilers and psychologists to help with slow cases in order to gather clues from the unknown, which at the very least would indicate a direction in determining “whodunnit.” 

While I worked in the digital forensics unit, in which I spent nearly a decade, the profiling of a computer criminal became increasingly more difficult to decipher as time went by. However, around 60% of the crimes we reactively investigated were to do with paedophiles which was a dark part of society to try and come to terms with.

Nevertheless, profiling a paedophile in the early days was easier to categorise than say a fraudster as they would usually fall into a small number of predetermined profiled groups. This was more straight forward as we would be told about the offence and then given full access into their computers and phones to look for evidence which would naturally give us an insight into their lives, families and hobbies. Most interesting would be that some would look “normal” on the outside but once you delve into their hard drive and google history, you would start to unravel a darker side.

Sociopaths

At its worst, I started to think everyone could potentially be a criminal but I soon realised that if I carried on with that attitude I would simply never have faith in society again. However, the lives in which I would delve into searching for evidence to submit to court shocked me: to think these people were up until now hidden in plain sight, masquerading as upstanding citizens. My investigations “hit list” of convicted paedophiles included a teacher, a scout leader, a police officer, and even the head of children services from a local council.

In my personal view from meeting these individuals and researching their lives prior to charge and conviction, I would only be able to sum these people up by calling them sociopaths. They were able to convince society that they were respectable and decent human beings, yet able to hide something so dark and sinister behind closed doors.  

How does this relate to all cyber criminals? Are they sociopaths too? Well sadly it’s not as easy to profile and not that easy to get hold of a series of results to create a synopsis such as when I was in the Digital Forensics Unit with the ability to analyse all those computers from people on bail.

Researching criminals such as murderers, paedophiles, fraudsters and drug dealers all leave evidence on their computers for the digital forensics investigators to locate because of one flaw – they usually aren’t technical. Or at least not technical enough to even think how to mitigate the chance of capture. Yes, they can learn it, but they are usually late to the game when swotting up on forensic traces and hence leave a plethora of evidence leading an investigator back to the perpetrator. Moreover, crimes such as murder are usually in the heat of the moment or derived from passion which leaves little time to open a TOR browser and buy a weapon with a digital currency. 

The face of today’s cyber-criminal is relatively unknown (and that’s nothing to do with the fact he/she is usually in a hoodie). The number of arrested cyber criminals is miniscule in comparison to the amount of cyber-crimes that take place each year. When someone is arrested for murder or fraud etc, they have their phone, tablet and laptop etc seized in order to analyse for evidence which may support the case. In more occasions than not, these were a needle in a haystack exercise, but at least there was information to go on. On the other hand, if someone wants to become a cyber-criminal they can meticulously learn the details before striking and learn how to not leave tracks. 

In fact, when someone can download an anonymous browser, search for malware as a service fully equipped with a service hotline and full money back guarantee in minutes, then the demographic of someone following simple procedure steps suddenly becomes even harder to predict and profile. In simple terms, anyone can be a cybercriminal. Anyone can learn how to do it in a lunch hour and with little evidence left behind, it can be argued that it is quite attractive to even the less experienced wannabe “hacker”. 

Cat and mouse

Criminals are still lazy, it’s just they are cleverer nowadays. That’s probably why they don’t walk into banks with a balaclava in a good old fashioned “stick ’em up” anymore. It’s easier to steal stuff online without leaving a ton of evidence behind and to some – slightly more satisfying.

The problem is, the police get a tough time for “not doing enough” when it comes to combatting cyber-crime yet they are playing a huge cat and mouse game with the gap widening by the day. Funding will always be an issue but that just seems like a quick way of the police saying they can’t do it so they go back to investigating “real world” crimes where DNA and fingerprints lead them to suspects. 

Criminals no longer wear balaclavas or hoodies. They are amongst us and hidden in plain sight, which makes understanding them increasingly difficult. Law enforcement are struggling, but just as it may sound like all doom and gloom, there is one small glimpse of a win: prevention. If we all simply up our own game and awareness on security, we all stand a better chance on outing the scams, making them pointless. 

*

Jake Moore is a Security Specialist for ESET, Europe’s number one Internet Security and Antivirus company. He is also a well respected industry expert when it comes to commenting in the media regularly in a range of tier one publications. He previously worked for Dorset Police spanning 14 years primarily investigating computer crime in the Digital Forensics Unit on a range of offences from fraud to murder. Within law enforcement powers, he learnt how to retrieve digital evidence from all devices whilst learning all sorts of ways to ethically break security in order to help protect innocent victims of crime. He then became a cyber security consultant for the force delivering tailored advice to the public and local businesses in order to help protect the community and build upon their security foundations.

Kelly Pereira, CISM

Senior Intelligence Manager | Content/IP Protection in Video/Gaming | OSINT veteran since 2001 | Social engineer | Advocate of #OSINTforGood, with emphasis on conservation causes. Available for speaking opp's

6 年

Or we can dive in and infiltrate their communities... Great overview and interesting read.

Rennie Lakhan Financial Crimes AML CFT Professional

MSc Criminology & Criminal Justice/AML/CFT Professional

6 年

Great info

Hannah O.

Head of Network & Club Distribution | Mortgages & Marketing at United Trust Bank

6 年
?? Andrew Onung

MSc Information Security Management| InfoSec GRC Analyst| ISO 27001:2022 LA| GDPR Practitioner

6 年

Excellent write up

Clare Cave

Supporting 500+ Independent Schools save time and money through compliant fee collection solutions

6 年

Interesting stuff.? We can help independent schools gauge their cyber risk by producing a FREE report if any schools are interested

要查看或添加评论,请登录

Jake Moore的更多文章

  • Deepfakes: When seeing isn’t believing

    Deepfakes: When seeing isn’t believing

    Deepfakes are rapidly becoming easier and quicker to create and they’re opening a door into a new form of cybercrime…

    3 条评论
  • Is Cyber Insurance Ethical?

    Is Cyber Insurance Ethical?

    When you work in IT and you’re at a dinner party and somebody asks, ‘What do you do?’ you can usually see the blood run…

    13 条评论
  • What do hackers do with your stolen phone?

    What do hackers do with your stolen phone?

    What would a hacker want from a mobile and why security measures are so important. As you pat down all your pockets and…

    11 条评论
  • Why I Hacked Myself

    Why I Hacked Myself

    Hands up who's forgotten a password before! Surely it's one of those trusty few passwords we always use, right? The…

    3 条评论
  • Cyberchology: The Art of Cyber Manipulation

    Cyberchology: The Art of Cyber Manipulation

    Being conned out of cash is unfortunately not a new concept. Scam artists have been tricking people out of their hard…

    5 条评论
  • My Top Five Future Cyber Predictions

    My Top Five Future Cyber Predictions

    Whilst giving cyber protection advice on a daily basis, people often ask me what my predictions are when it comes to…

    5 条评论
  • 2016: The Year of the Hack

    2016: The Year of the Hack

    As this year comes to an end, it's a good time to review your passwords, especially if you're one of those with a…

    2 条评论
  • Hacking The Human

    Hacking The Human

    What I have learnt over the last few months is that there is most certainly job security in computer security…

  • Online Is The New Frontline

    Online Is The New Frontline

    There’s a war going on against cyber security. The really scary thing is that we are losing the battle against hackers…

    3 条评论

社区洞察

其他会员也浏览了