Motivations of the Cyber Criminal: A Criminological Theory Approach

MOTIVATIONS OF THE CYBER
CRIMINAL: A CRIMINOLOGICAL
THEORY APPROACH
CAITLIN V. M. CORNELIUS, PHD
VIRGINIA MODELING ANALYSIS AND SIMULATION CENTER
OLD DOMINION UNIVERSITY
TODAY’S PRESENTATION
• Introduction
• Demographics of Offenders
• Typology of Offenders
• Relevant Criminological Theories
• Future Research
INTRODUCTION
• Cyber crime and cyber terrorism represents a significant threat to global
security interests and results in losses and damages every year.
• Criminology is an underutilized tool for understanding cyber crime
• The motivations of this type of criminal could hold the key to devising
strategies for reducing this type of crime.
DEMOGRAPHICS OF OFFENDERS
• Mostly Male
• Outcasts/Non-Mainstream
• Mid 20’s age range for most activity (although there are anomalies)
• Interact better on-line rather than in person
• “disease prone” rather than “self-healing”
• “Type A” personalities; perfectionists, task-oriented
TYPOLOGY OF OFFENDERS
• Typologies most often created via the type of crime being examined:
•
•
•
•
Hackers
Online Harassers
Software/Hardware Pirates
Scammers
TYPOLOGY OF OFFENDERS
• Many typologies of offenders exist, but generally fall into similar categories:
•
•
•
•
•
•
The Wannabes “Script Kiddies”
The Scammers-too good to be true offers, send money to make money
Legit Hackers-have skills, work in groups or alone
Phishers-fake login pages, enter personal info to get things
Political Groups/Foreign Governments
Insiders (Insider threat)
TYPOLOGY OF OFFENDERS
• Typology of cyber criminal motivations:
•
•
•
•
•
The thrill seeker/boredom killer
The control freak/out-smarter/game player
The political/religious zealot
The money maker
The sexual deviant
THEORIES
• Routine Activities Theory: Cohen and Felson (1979)
• Motivated offender + Suitable Target + Absence of capable guardian = Crime
• Particularly useful in explaining the occurrence of:
•
•
Online-Harassment
Malware Victimization
THEORIES
• Strain Theory: Robert Merton (1938), Scott Agnew (1992)
• (Stress associated with socially constructed goals) + (lack of legitimate opportunities to
achieve these goals, and/or, roadblocks in the achievement of these) = crime
• Social Learning Theory: Akers (1968)
• Crime is a learned behavior, the learning process occurs in intimate groups, the learning
includes techniques of committing the crime and motives/rationalizations/justifications:
• Digital and software piracy
• Hacking
THEORIES
• Techniques of Neutralization: Sykes and Matza (1964)
• Crime results when internal mechanisms of control fail
• Originally used to explain street gang behavior, applicable to cyber crime (specifically
hacker) subgroups
• General Theory of Crime: Gottfredson and Hirschi (1990)
• Crime occurs because of lack of self-control
FUTURE RESEARCH
• Many of the typologies and theories discussed pair well together and should
be the basis of future studies
• The street gang theories/literature applicable to hacker groups
• The strain theories applicable to outsiders/those that find it difficult to interact “in real
life”
FUTURE RESEARCH
• Further investigation needed; replication of previously conducted studies as
starting point
• Street crime/gang studies
• Effective control mechanisms (policing and policy implementation)
• Further synthesize the typologies, operationalize variables and characteristics,
employ uniform terminology