background image
· 30 ·
F
inding its roots since time immemorial,
criminal activity has always been part of a
cat-and-mouse game with Justice
.
In the last decades, we have seen this game gradually transposed to the
cyber domain as well, where crime discovered a new and broad field for its
perpetration. Never was it so easy to find a new victim or a group of victims ­
they are in reach of a criminal's fingers ­ and never was it so easy for criminals
to hide their whereabouts and identities.
Though in this cat-and-mouse game our investigative techniques and tools
have evolved with time, so have the modus operandi of cyber criminals. We
need to admit that we are facing some interesting challenges. No, we are not
talking about the classic "It wasn't me, it was a Trojan in my computer!" argument.
We are talking about a wealth of hiding mechanisms like anonymous proxies,
compromised computers, public internet cafes (virtually, we have internet
access everywhere!) and anonymity networks like Tor, i2p and Freenet, all of
them being misused and making life harder for law enforcement. Criminals
are enjoying all these means with a unique sense of freedom and impunity to
promote a black market and sell drugs, guns, criminal services, organ trafficking
and share child pornography.
Actually, these mechanisms are being used by a broader group, classified as
"cyber offenders" in this article and related literature. This group of individuals
includes not only typical cyber criminals, but also state-sponsored actors
who engage in attacks against foreign critical infrastructures as well hacktivists
spreading their word and launching DDoS attacks against their target of choice.
It does not matter which class of individual we are dealing with. When we need
to figure out who is behind that masked IP address in our log files or who is
behind that fake Twitter account, the "attribution problem" rises.
While dealing with such a challenge, maybe we should think whether we are
overlooking all those roots of criminal activity ­ offender activity here - and
how they usually can be manifested in a crime scene. The cyber offender is
clearly enjoying some advantages, so we need to adapt ourselves. As said by
Collin Williams in the welcome message of this magazine's first issue, "we
must re-think our approach to the pursuit of the safety and security of the human
experience in the cyber domain."
It makes sense here.
A digital crime scene is still a crime scene, and a digital crime (or digital offence,
in broad terms) is still an act that has at least a minimum of planning, counts on
at least a minimum of resources and it is committed by an individual or a group
of individuals with specific motivations. We should agree that most methods and
tools are new on cybercrimes, but when we are talking about revenge, activism,
PROFILING
CYBER OFFENDERS
Lucas Donato
de monfort university