Chapter 6 Modus Operandi Motive and Technology A

  • Slides: 20
Download presentation
Chapter 6 Modus Operandi, Motive, and Technology A note on the use of these

Chapter 6 Modus Operandi, Motive, and Technology A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in Power. Point form so you can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following: q If you use these slides (e. g. , in a class) in substantially unaltered form, that you mention their source (after all, we’d like credit for our effort!) q If you post any slides in substantially unaltered form on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Digital Evidence and Computer Crime, 2 nd edition. Eoghan Casey Elsevier Academic Press, July 2004. Thanks and enjoy! IG/DS All material copyright 2004 -2008 Isaac Ghansah, Dick Smith, All Rights Reserved Modus Operandi, Motive, Technology 1

Chapter 6: Introduction Our goal: q get “feel” and terminology q more depth, detail

Chapter 6: Introduction Our goal: q get “feel” and terminology q more depth, detail later in course q approach: v use cases Overview: q Discuss development of computer and Internet technologies as they relate to both offender MO and motive. Modus Operandi, Motive, Technology 2

Chapter 6: roadmap 6. 1 Axes to Pathological Criminals and Other Unintended Consequences 6.

Chapter 6: roadmap 6. 1 Axes to Pathological Criminals and Other Unintended Consequences 6. 2 Modus Operandi 6. 3 Technology and Modus Operandi 6. 4 Motive and Technology 6. 4. 1 Power Reassurance (Compensatory) 6. 4. 2 Power Assertive (Entitlement) 6. 4. 3 Anger Retaliatory (Anger or Displaced) 6. 4. 4 Anger Excitation (Sadistic) 6. 4. 5 Profit Oriented 6. 5 Current Technologies 6. 5. 1 A Computer Virus 6. 5. 2 A Public E-mail Discussion List 6. 6 Summary Modus Operandi, Motive, Technology 3

6. 1 Axes to Pathological Criminals and Other Unintended Consequences q Internet today not

6. 1 Axes to Pathological Criminals and Other Unintended Consequences q Internet today not what the designers dreamed. q Goal was to make a mechanism to communicate between military installations. q Not intended for criminals to use as robust tools for stealing information, monitoring individuals, covert communication and dispersing illicit material. q Like many technological advances can result in unintended social consequences. Modus Operandi, Motive, Technology 4

6. 2 Modus Operandi q Latin term means “a method of operating”. q Criminals

6. 2 Modus Operandi q Latin term means “a method of operating”. q Criminals MO reflects HOW they committed their crimes. q Whereas motive have to do with WHY they committed the crime. q Criminals MO consists of learned behaviors that can evolve and develop over time. q Serves (or fails to serve) three purposes: v v v Protects offenders identity; Ensures successful completion of crime; Facilitates offenders escape. Modus Operandi, Motive, Technology 5

6. 2 Modus Operandi continued q Examples of MO behaviors related to computer and

6. 2 Modus Operandi continued q Examples of MO behaviors related to computer and Internet crimes: Amount of planning before a crime v Materials used by offender v Pre-surveillance of crime scene v Offense location selection v Use of weapon during crime v Offender precautionary acts v Modus Operandi, Motive, Technology 6

6. 3 Technology and Modus Operandi q Computer and Internet technologies maybe used to

6. 3 Technology and Modus Operandi q Computer and Internet technologies maybe used to facilitate the following criminal activities: Victim selection; v Victim surveillance; v Victim contact; v Stalking/harassment; v Theft of assets v Locating illicit materials; v Broad dissemination of confidential and/or illicit materials. v Modus Operandi, Motive, Technology 7

6. 3 Technology and Modus Operandi q CASE EXAMPLE 1 (REUTERS 1997): Swiss couple

6. 3 Technology and Modus Operandi q CASE EXAMPLE 1 (REUTERS 1997): Swiss couple arrested in New York charged with smuggling thousands of CD-ROMS of computerized pictures of children having sex into the U. S. One CD-ROM had over 7, 000 images. q CASE EXAMPLE 2 (WIRED NEWS 1998): From Wired magazine February 1998. Police in 4 states victimized by cybersex sting in reverse. 17 year old Illinois girl encountered police officers in chat room and relationships became sexually explicit. The girl told her mother who contacted authorities in those states. This same teenager who acted under the alias “Rollerbabe” was involved in similar incidents which were published in News Observer of North Carolina in November 1998. Several officers career’s were ruined and there was suspicion that the woman’s mother was involved in the e-mail. However no criminal charges were brought against the pair. Modus Operandi, Motive, Technology 8

6. 3 Technology and Modus Operandi q Maury Roy Travis made an inadvertent slip-up

6. 3 Technology and Modus Operandi q Maury Roy Travis made an inadvertent slip-up in a recent case out of St Louis, Missouri, resulting in the apprehension of alleged serial killer. A 36 year old hotel waiter was angered by a news story sympathetic to one of his victims. He wrote a letter to the publications to let them know of his dissatisfaction and so they would believe him he included details of an undiscovered victim. q This prompted the detectives to start looking closer and discovered a trail of several killings of prostitutes all linked together. q The map included in the letter proved to be crucial and had logged his IP address so authorities were able to identify him. Modus Operandi, Motive, Technology 9

6. 3 Technology and Modus Operandi q Before he could be brought to trial,

6. 3 Technology and Modus Operandi q Before he could be brought to trial, let alone be charged q q with murder, he committed suicide in custody. By comparison with other serial killers Mr. Travis was not foolish, impulsive, or unskilled. In fact evidence shows just the opposite: a patient and meticulous offender, conscious of the need for a disposable victim population and nurturing a specific set of sexual control oriented fantasies that required a specific methods of control and “props”. Authorities found numerous video tapes at his home showing him giving the prostitutes crack cocaine to smoke then having consensual sex with them. He apparently let some of them leave at that point. He was among other things sadistic in nature. The case had few tangible leads prior to his cybertrail and was in fact growing cold. Modus Operandi, Motive, Technology 10

6. 4 Motive and Technology q Motive refers to the emotional, psychological, or material

6. 4 Motive and Technology q Motive refers to the emotional, psychological, or material need that impels and is satisfied by, a behavior. q Your author takes credit for the shift in emphasis from classifying offenders - to classifying offense behaviors. q Behaviors: v v v Power Reassurance Power Assertive Anger Retaliatory Sadistic Opportunistic Profit oriented Modus Operandi, Motive, Technology 11

6. 4. 1 Power Reassurance (Compensatory) q Criminal behaviors that are intended to restore

6. 4. 1 Power Reassurance (Compensatory) q Criminal behaviors that are intended to restore the criminal’s self confidence. q May be misguided belief that victim desires the offense behavior. q CASE EXAMPLE (DURFEE 1996): man pled no contest to harassing woman via e-mail and the telephone. Met the woman through computer dating service. After second date woman dumped man via e-mail. Man continued to leave phone messages and e-mail even after police warned to stop. q Times have changed now. People no longer have to leave the confines and comfort of their homes to harass somebody. Modus Operandi, Motive, Technology 12

6. 4. 2 Power Assertive (Entitlement) q Behaviors intended to restore offenders self confidence

6. 4. 2 Power Assertive (Entitlement) q Behaviors intended to restore offenders self confidence or self worth through moderate to high aggression. q In their perception they are entitled to the fruits of their attacks by virtue of being a male and physically stronger. q CASE EXAMPLE (ASSOCIATED PRESS 1997): 15 year old son of a family took control of all electronic devices and manipulated them to the distress of other family members. The victims (parents) although not physically harmed were in great fear that some unknown force appeared to have control over their lives. Modus Operandi, Motive, Technology 13

6. 4. 3 Anger Retaliatory (Anger or Displaced) q Behavior that suggest great deal

6. 4. 3 Anger Retaliatory (Anger or Displaced) q Behavior that suggest great deal of rage, either towards an individual, group, institution or symbol of either. q CASE EXAMPLE (ASSOCIATED PRESS 1997): Husband stabbed wife and then tried to kill himself over wife’s Internet romance. q She had received dozen roses to her online name. Retaliatory behavior circumstances: v v The argument Use of available materials Use of multiple weapons (several knives) Relatively short duration of attack Modus Operandi, Motive, Technology 14

6. 4. 4 Anger Excitation (Sadistic) q Behavior of sexual gratification from victim pain

6. 4. 4 Anger Excitation (Sadistic) q Behavior of sexual gratification from victim pain and suffering. q Example in prior case serial murder Maury Roy Travis. Modus Operandi, Motive, Technology 15

6. 4. 5 Profit Oriented q Offender motivated towards material or personal gain. q

6. 4. 5 Profit Oriented q Offender motivated towards material or personal gain. q CASE EXAMPLE (PIPER 1998): Valdimir Levin, a computer expert used bank customer passwords and codes to steal funds that he transferred to banks in other countries. Modus Operandi, Motive, Technology 16

6. 5 Current Technologies q Text discusses only a small sample of technologies that

6. 5 Current Technologies q Text discusses only a small sample of technologies that is available to the cyber criminal. q The others would take a lot more pages to fully explain all the possibilities. Modus Operandi, Motive, Technology 17

6. 5. 1 A Computer Virus q Virus is a malicious program designed to

6. 5. 1 A Computer Virus q Virus is a malicious program designed to enter a computer and execute one or more functions with out the knowledge or consent of the user. q Function is specified by the creator of the virus. q Used to steal, broadcast, and/or destroy information. q Virus count to top 1 Million by 2009 ** Modus Operandi, Motive, Technology 18

6. 5. 2 A Public E-mail Discussion List q Individuals may develop and maintain

6. 5. 2 A Public E-mail Discussion List q Individuals may develop and maintain or join one of the many public e-mail discussion lists available via the internet to share details and experiences of their lives with others. q Criminal can use information gathered from list to plan a burglary. q Ex-intimate can join a list that their former intimate subscribes, to harass and defame that intimate. Modus Operandi, Motive, Technology 19

Chapter 6: Summary Covered a “ton” of material! q Chapter has illustrated technology developed

Chapter 6: Summary Covered a “ton” of material! q Chapter has illustrated technology developed for one purpose can be adapted for another by those with criminal motive and intent. You now have: q context, overview, “feel” of Modus Operandi and motive. q more depth, detail to follow! Modus Operandi, Motive, Technology 20