Result: Proposed Methodology for Cyber Criminal Profiling
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Psychopathology. Psychiatry. Clinical psychology
FRANCIS
Further Information
Criminal profiling is an important tool employed by law enforcement agencies in their investigations. Criminal profiling is much more than an educated guess; it requires a scientific-based methodology. Cyber crimes are occurring at an alarming rate globally. Law enforcement agencies follow similar techniques to traditional crimes. As is the case in traditional criminal investigation, cyber criminal profiling is a key component in cyber crime investigations as well. This paper examines cyber criminal profiling techniques prevalent today, including inductive and deductive profiling, and the need for employing a hybrid technique that incorporates both inductive and deductive profiling. This paper proposes a cyber criminal profiling methodology based on the hybrid technique. Criminal behavior and characteristics are identified by analyzing the data against a predefined set of metrics.
AN0099753634;[6mr3]01aug.14;2019Mar05.12:18;v2.2.500
Proposed Methodology for Cyber Criminal Profiling.
Criminal profiling is an important tool employed by law enforcement agencies in their investigations. Criminal profiling is much more than an educated guess; it requires a scientific-based methodology. Cyber crimes are occurring at an alarming rate globally. Law enforcement agencies follow similar techniques to traditional crimes. As is the case in traditional criminal investigation, cyber criminal profiling is a key component in cyber crime investigations as well. This paper examines cyber criminal profiling techniques prevalent today, including inductive and deductive profiling, and the need for employing a hybrid technique that incorporates both inductive and deductive profiling. This paper proposes a cyber criminal profiling methodology based on the hybrid technique. Criminal behavior and characteristics are identified by analyzing the data against a predefined set of metrics.
Keywords: cyber attacks; cyber criminal profiling; forensics; profiling framework
INTRODUCTION
The growing reliance on the cyber space among government institutions and businesses alike has led to a tremendous surge in cybercrimes. The Internet Crime Reports published yearly by the Internet Crime Complaint Center (IC3) is testimony to the menace of cybercrime. IC3 received 289,874 consumer complaints with an adjusted dollar loss of $525,441,1101, an 8.3% increase in reported losses since 2011 (Annual Report, [1]).
Before we dig deeper into cyber crime profiling, it is important to understand what cyber crime is. There is no official meaning of cyber crime written in any dictionary. Cyber crime is a subgroup of computer crime (Shinder & Tittel, [13]). Computer crime, as per the U.S. Department of Justice (DOJ), is defined as "any violation of criminal law that involves the knowledge of computer technology for its perpetration, investigation or prosecution" (Shinder et al., [13]). There are varying definitions on cyber crime as described by legislators and organizations. The United Nations (UN) defines cyber crime as "any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession of and offering or distributing information by means of a computer system or network" (Shinder et al.,
[13]). Symantec (n.d.) defines cyber crime as "any crime that is committed using a computer or network, or hardware device. The computer or device may be the agent of the crime, the facilitator of the crime, or the target of the crime."
There is a motive behind every crime, and cyber crimes are no different. Cyber crimes are performed for the various motives such as financial gain, intellectual property (IP) theft, espionage, terrorism, and for thrill. A UN study (Malby et al., [10]) on cyber crime states that "upwards of 80% of cybercrime acts are estimated to originate in some form of organized activity, with cybercrime black markets established on a cycle of malware creation, computer infection, botnet management, harvesting of personal and financial data, data sale, and 'cashing out' of financial information."
PROFILING
Criminal profiling is a key tool available to investigators used to narrow the range of suspects and evaluate the likelihood of a suspect committing a crime. Criminal profiling is a scientific technique to assess and analyze the scene of a crime and deduce behavioral characteristics of the individual committing the crime <bold>(</bold>Kirwan & Power, [8]). A profile consists of a set of characteristics likely to be shared by criminals who commit a particular type of crime (Shinder et al., [13]). Profiling methods are based on two assumptions (Kirwan et al., [8]) that are as follows:
Two types of criminal profiling methods are prevalent today. These are inductive profiling and deductive profiling.
Inductive profiling method (Figure 1) employs a database that contains extensive data on criminals committing a type of crime. The profiler analyzes the data, establishes correlations, and deduces the characteristics common to statistically large number of offenders committing a specific type of crime (Shinder et al., [13]).
Graph: FIGURE 1 Inductive profiling methodology.
Deductive profiling (Figure 2) involves analysis of forensic evidence and victim profiling to determine the motive and attacker characteristics (Tennakoon, [15]). The profiler analyzes the forensic evidence, employs the principles of victimology, and utilizes his/or her experience to deduce criminal characteristics (Shinder et al., [13]).
Graph: FIGURE 2 Deductive profiling methodology.
CYBER CRIMINAL PROFILING
Criminal profiling plays a key role in investigations. This paper uses the definition provided in "Examination of Cyber-criminal Behavior" (Jahankhani & Al-Nemrat, [7]), which is as follows: "An educated attempt to provide specific information as to the type of individual who committed a certain crime. A profile based on characteristics patterns or factors of uniqueness that distinguishes certain individuals from the general population."
As is the case with a crime, cyber criminal profiling must be used as a tool for cyber crime investigations. Cyber criminal profiling is effective as a law enforcement tool only when a standard methodology is used in developing profiles and is not based on an educated guess.
Cyber criminal profiling is garnering tremendous attention due to the rise in cyber crimes. Although it is similar to traditional criminal profiling, it presents numerous challenges to investigators. The perpetrators of the crime are remote and may be residing on different continents (Jahankhani et al., [7]). An interdisciplinary approach is required that applies not only psychology, criminology, and law but also a technological understanding on the subject of cyber crime (Tennakoon, [15]).
Profiling is still based on educated guesses wherein investigators try to identify patterns by comparing with recorded cyber crimes that may lead to results that are inaccurate. Without a proper use of a scientific methodology and empirical analysis, profilers may come to different conclusions and recommendations (Broucek & Turner, [4]). Therefore, a standard methodology is required for cyber criminal profiling to be a credible and effective tool for law enforcement agencies.
Forensic psychology offender profiling techniques are being used in cyber crime investigations as well. Inductive profiling involves a statistical analysis and is a method frequently used by the Federal Bureau of Investigation (Jahankhani et al., [7]). The inductive profiling method utilizes data mining techniques to develop models for pattern detection and involves the examination of data to identify patterns that match known fraud profiles (Wheelbarger, [18]).
Much academic work has been done on building a database of cyber criminal profiles. One of the projects known as the Hackers Profiling Project revolved around building a huge database on existing hacker profiles that included demographics, socioeconomic background, social relationships, and psychological traits (Kirwan et al., [8]). However, profiling was based on data obtained from self-reporting questionnaires rather than hacker activities and offenses (Kirwan et al., [8]). Donato ([5]) in his paper on criminal profiling proposes a methodology on how to use criminal profiling to improve digital forensics and cybercrime investigations. Donato's methodology focuses on finding the capability of the attacker in terms of skill level and deducing psychological characteristics on basis of the evidence (Kirwan et al., [8]). Donato's methodology does not look at empirical analysis to establish patterns, nor does it look at demographic characteristics of previous offenders (Kirwan et al., [8]).
In the cyber world, technology keeps on changing and hackers develop and employ new techniques known as zero day attacks. Their behavior is dynamic and may change over time with the acquisition of new skills (Jahankhani et al., [7]). The other issue is that the data are based on generalizations, and the sampling leaves out a dataset of skillful people who avoid detection over a period of time, thereby introducing inaccuracies in the results (Benny, [3]). Therefore, relying on inductive profiling only is not suitable for cyber criminal profiling. On the other hand, relying just on deductive profiling will leave investigators oblivious to the current trends such as popular attack methods, likely targets and victims (Tennakoon, [15]). Therefore, a hybrid methodology must be employed for cyber criminal profiling.
PROPOSED METHODOLOGY
The proposed methodology is based on a hybrid profiling model wherein the initial processes are deductive in nature and statistical analysis is performed to identify common patterns and characteristics. Digital forensics data can provide vital clues about the attacker such as sophistication of attack, motivation, tools used, and vulnerabilities exposed (Kwan, Ray, & Stephens, [9]). Cyber criminals, like traditional offenders, have their modus operandi that they tend to repeat at each crime (Shinder et al., [13]).
The proposed methodology employs six
The proposed methodology is a four-step process as follows:
Process 1 or P1
The first stage (Figure 3) involves victim profiling. P1 involves identifying the various aspects of an individual or an organization that attracted criminals (Tennakoon, [15]).
Graph: FIGURE 3 Process 1/ P1 of the proposed methodology.
Process 2 or P2
The second stage (Figure 4) involves identifying the motive behind the attack. A motive is closely associated with a victim. For example, an attack on government implies that the motive is espionage. This stage also involves analyzing the digital forensic evidence to deduce possible characteristics.
Graph: FIGURE 4 Process 2/ P2 of the proposed methodology.
Process 3 or P3
This stage involves an empirical analysis on the data and an identification of trends by conducting a statistical analysis (Figure 5). Criminal behavior and characteristics are identified by analyzing the data against the above mentioned metrics.
TABLE 1 Cyber Criminal Profiles
Graph: FIGURE 5 Process 3/ P3 of the proposed methodology.
Process 4 or P4
This is the final stage and involves building cyber criminal profiles from the characteristics that have been identified. For example, an extremely skillful attacker that employs zero day exploits to target defense institutions to extract sensitive information falls under the cyber spy bucket.
Cyber criminals are classified into six profiles (see Table 1).
Hacktivists
Hacktivists are politically motivated and target governments, news groups, and companies doing business with governments. Their motive for hacking is to get their political message across. Most hacktivist groups are not organized and rely on freely available tools with the intention of conveying their political message (Nachreiner, [11]). Their skill level can vary from basic to intermediate.
Cyber Criminals
Cyber criminals are driven by financial gains and target consumers and businesses. They are not organized and their skill level ranges from basic to intermediate.
Cyber Syndicates
They are highly organized, well-funded, and headed by crime organizations. They are responsible for stealing billions of dollars from consumers and businesses each year and also buy and sell the private information and intellectual property and trade attack toolkits, zero day exploit code, malware code (Nachreiner, [11]).
Cyber Spies
Cyber spies are state sponsored and very well-funded. Their motive is espionage and IP theft. They target government organizations and business dealing with governments to extract sensitive information. They are highly advanced and create customized codes incorporating previously undiscovered software vulnerabilities (Nachreiner, [11]). They often leverage the most advanced attack and evasion techniques into their attack, using kernel level rootkits, stenography, and encryption to avoid detection (Nachreiner).
Novice
This class of hackers has basic skill level and relies on freely available hacking tools. They do this for fun and entertainment.
Cyber Terrorists
This group is well funded, organized, and engage in hacktivism as well as criminal activity (Bednarz, [2]).
The cyber criminal profiling methodology, as illustrated in Figure 6, must be an interactive process for accuracy and effectiveness. Investigations are iterative in nature. Initial investigations reveal basic details. As the investigations moves from basic to advanced stages, more and more information on the victim is collected, which may help in identifying additional motives that were missed in the initial investigation. Additional evidence may also be collected providing more data for profile characterization.
Graph: FIGURE 6 Iterative Process.
CONCLUSION
Cyber criminal profiling must be based on a scientific process. A standard profiling methodology is required for accuracy, reliability, and effectiveness. The cyber criminal profiling methodology proposed in this paper is based on a hybrid profiling model that involves both inductive as well as deductive profiling. This methodology needs to be tested by simulating different scenarios in a lab setting.
Footnotes
1 Color versions of one or more of the figures in the article can be found online at www.tandfonline.com/uiss.
REFERENCES
Annual Report. (2012). Internet Crime Report. Internet Crime Complaint Center (IC3) , p. 4.
2 Bednarz , A. (2004). Profiling cybercriminals: A promising but immature science. Networkworld. Retrieved from http://www.networkworld.com/
3 Benny , D (2007). The uses of inductive and deductive reasoning in investigations and criminal profiling. BECCA Report , pp. 7 – 9.
4 Broucek , V. , and Turner , P. (2006). Winning the battles , losing the war? Rethinking methodology for forensic computing research. Journal in Computer Virology , 3 – 12.
5 Donato , L. (2009). An introduction to how criminal profiling could be used as a support for computer hacking investigations. Journal of Digital Forensic Practice , 2 , 183 – 195.
6 Drummond , D. (2010). A new approach to China. Google Blog. Retrieved from www. googleblog.blogspot.com
7 Jahankhani , H. , and Al-Nemrat , A. (2010). Examination of cyber-criminal behavior. International Journal of Information Science and Management , 41 – 48.
8 Kirwan , G. , and Power , A. (2011). The psychology of cyber crime , 1st edition. IGI Global.
9 Kwan , L. , Ray , P. , and Stephens , G. (2008). Towards a methodology for profiling cyber criminals. IEEE Computer Society. Proceedings of the 41st Hawaii International Conference on System Sciences , pp. 3 – 5.
Malby , S. , Mace , R. , Holterhof , A. , Brown , C. , Kascherus , S. , and Ignatuschtschenko , E. (2013). Comprehensive study on cybercrime. United Nations Office on Drugs and Crime , pp. 38 – 39
Nachreiner , C. (2013). Profiling modern hacktivists, criminals and cyber spies. Watchguard Security Center. Retrieved from www.watchguardsecuritycenter.com
Shinder , D. (2010). Profiling and categorizing cybercriminals. TechRepublic. Retrieved from www.techrepublic.com
Shinder , D. , and Tittel , E. (2002.) Scene of the cybercrime – computer forensics handbook , 1st edition. Syngress Publishing.
Symantec. (n.d.). What is cybercrime? Symantec. Retrieved from www.us.norton.com
Tennakoon , H (2011). The need for a comprehensive methodology for profiling cyber-criminals. New Security Learning. Retrieved www.newsecuritylearning.com
Tompsett , B. C. , Marshall , A. M. , and Semmens , N. C. (2005). Cybrprofiling: Offender profiling and geographic profiling of crime on the Internet. Computer Network Forensics Research Workshop , p. 1.
Vidalis , S. and Jones , A. (2003). Using vulnerability trees for decision making in threat assessment. School of Computing Technical Report CS-03-2, School of Computing , University of Glamorgan , pp. 5 – 8.
Wheelbarger , S (2009). CyberForensics. Criminal justice collaboratory. Colby Community College. Retrieved from www.colbycriminaljustice.wikidot.com/cyberforensics
By Arun Warikoo
Reported by Author
Arun Warikoo is a security solutions specialist. He has worked extensively in the private sectors to improve the security of their critical information systems. His research focuses on improving the governance around security and developing frameworks on cyber security.