The comeback of cursive

The comeback of cursive

Once derided as a relic of the past, handwriting looks poised for a revival

refer to the Article via

http://www.economist.com/news/science-and-technology/21706459-once-derided-relic-past-handwriting-looks-poised-revival-comeback-cursive

PARENTS are not the only ones bemoaning the way so many schools have given up teaching children to write longhand. Researchers are also aware that more than mere pride in penmanship is lost when people can no longer even read, let alone write, cursive script. Not being able to exchange notes with the boss or authenticate signatures, for instance, can hurt a person’s chances of promotion. More importantly—and intriguingly—though, learning to join letters up in a continuous flow across the page improves a child’s ability to retain and understand concepts and inferences in a way that printing those letters (and, a fortiori, typing them on a keyboard) does not. It even allows insights gained in one learning experience to be applied to wholly different situations.

Neurophysiologists in Norway and France, for example, have found that different parts of the brain are stimulated when reading letters learned by writing them on paper, rather than by typing them on a keyboard. The movement and tactile response involved in handwriting leaves a memory trace in the sensorimotor part of the brain, which are retrieved when reading the letters involved. Being essentially the same for each key stroke, the feedback from typing lacks the kind of motor memories associated with individual letters. If handwriting reinforces reading, the implications for teaching are huge.

Similarly, researchers in America tested how college students performed when taking notes of a lecture by hand as opposed to using a laptop. While the laptop users took copious (mostly verbatim) notes, they fared far worse than the pen-and-paper scribblers when tested on what they recalled about the concepts and inferences of the lecture. Being slower, taking notes by hand forced those who did so to process what the lecturer was saying and then paraphrase it. This reflection and reframing allowed them to understand and recall the material better. In contrast, typing merely led to mindless processing.

In America, two developments have thrust penmanship back into the public arena. One is the reaction to the Common Core curriculum—a set of national benchmarks adopted recently by a majority of American public schools. This requires legible handwriting to be taught only in kindergarten and first-grade (ie, from age five to seven). Thereafter, the emphasis is on teaching keyboard skills.

The other, more subtle development stems from the way knowledge workers have lately become a good deal less desk-bound. As tablets and smart phones let people capture information while on the move or in the field, the bulky laptop is going the way of the portable typewriter a generation before. Meanwhile, the big strides made recently in software for handwriting recognition are rendering even screen-based virtual keyboards a clunky way of inputting data. One consequence is that employers hiring new staff are prizing the ability to write speedily and legibly in cursive.

As a result, a number of school boards in America have instigated a return to basics—especially time spent learning longhand. So far, more than half a dozen states—including California, Massachusetts and North Carolina—have made teaching cursive handwriting mandatory throughout their public schools. More than 40 other states are currently weighing similar measures.

The concern is over how best to encourage critical thinking, rather than how to help the young communicate. The problem is not that young people are writing less. They are writing hundreds, if not thousands, more words a day than they did a decade or so ago, says Anne Trubek in her recent book “The History and Uncertain Future of Handwriting”. But this outpouring is done largely by pecking at a keyboard (real or virtual) rather than by pushing a pen across paper. Ironically, in the age of the mobile phone, chatting verbally over the ether has been superseded largely by texting, posting, e-mailing and social networking. Gone, it would seem, are the days of the inky-fingered wretch.

Not all that long ago, the penmanship taught in American schools was the envy of the world. The so-called Palmer handwriting method, adopted widely during the first half of the 20th century, relied on the muscles of the arm, rather than hand and fingers, to guide the pen across the page in a rhythmic, looping motion. In supplanting the slower and more elaborate Spencerian form of handwriting used in America from the 1840s onwards (see the Coca-Cola or Ford logos), the openness and simplicity of Palmer longhand let office workers match the speed of the increasingly popular typewriter.

While well suited for modern times, the Palmer method fell out of fashion in the 1950s. Educators deemed its regimented learning process inhibited free expression. The dogma of the day insisted children needed to be free to express themselves on the page as early as possible. The Zaner-Bloser writing method which gained favour instead taught first-graders to print in manuscript (ie, block letters) rather than learn to form cursive characters; only later would they be taught how to join the characters up into a continuous stream of words. Inevitably, the fad faded, as the burden of adding an extra learning stage took its toll. By then, however, the Palmer company had ceased to publish its landmark text book.

Certainly Ms Trubek is right about the impact technology has had on handwriting. The ballpoint pen is a case in point. Though the idea was originally patented in America in 1888, it was not until László Bíró, a Hungarian journalist, devised a thicker, quicker-drying ink in the late 1930s that the ballpoint (the eponymous “Biro”) became a practical utensil. Even then, it took a couple of decades more for the ballpoint to become cheap enough to rival the pencil, let alone the fountain-pen. Where the original Biro sold for the equivalent of $100 in 1943, the cost had plummeted to less than 20 cents by 1957, thanks to manufacturing improvements made by the French licensee, Marcel Bich. Billions of “Bic” pens and ballpoints from other license-holders have been sold over the subsequent years.

That is both good and bad. Being ubiquitous and essentially disposable, something to write with indelibly is almost always to hand. Unfortunately, the need to press a ballpoint into the paper to get the ink to flow—rather than having it glide like a nib across the surface—not only cramps the writer’s style but also tires the wrist and fingers, forcing the writer to adopt a more upright grip to alleviate the discomfort. Doing so, however, provides less control over the way the loops and letters are formed.

Gel- and water-based inks have eased the problem somewhat. However, by being free to move in any direction, the ballpoint (and its close cousin, the roller-ball) can never provide the “guidance” a relief nib offers through being more mono-directional. That is why, prior to the introduction of the ballpoint, cursive italic script had not changed much since Renaissance times. Whether the writer used a sharpened quill or a relief nib dipped in ink, it was the most comfortable and natural way to write.

Those who have cultivated cursive handwriting often exhibit two quite different styles: a carefully formed “fair hand” for composing formal letters; and a scribble for making hurried personal notes. The two styles may appear different, but either will identify the writer as one and the same person. It turns out that handwriting is as unique an identifier as a person’s fingerprints. Even identical twins who share exactly the same complement of genes have different handwriting. A person may make a passable copy of another’s handwriting, but expert analysts will spot the forgery at a glance.

What makes handwriting a unique identifier stems in large part from where the writer was born, the first language spoken and, of course, the handwriting method taught at school. Individual experiences play a role, as do childhood diseases. Children with ADHD, for instance, can readily be diagnosed from the random nature of their handwriting. Overall, the characteristics that make a script uniquely one’s own include the roundness or pointedness of the characters; their size, slope and spacing, as well as the thickness of the individual strokes. Two other identifiers are the pressure exerted on the paper and the arrhythmic pattern of certain elements. The two latter features are used widely in point-of-sale terminals to authenticate a person’s signature.

To Ms Trubek, a former professor of English at Oberlin College in Ohio, the disappearance of handwriting (or telephone conversations) from daily life does not necessarily signify a decline in civil intercourse. More likely, it denotes the end of one stage in the evolution of communication and the beginning of another—just as the Gutenberg printing press put paid to the livelihood of monks who produced illuminated manuscripts.

Digital ink may well be the Gutenberg press of today. This emerging technology (Windows Ink from Microsoft and Interactive Ink from MyScript Labs are good examples) uses machine learning and contextual analysis to recognise anything that can be written or drawn by hand on a touch-sensitive screen, and then turns it into digital form ready to be searched, stored, shared, annotated and edited collaboratively. The technology can handle free-hand sketches, mathematical equations, chemical structures and musical notation just as readily as cursive handwriting.

With nothing more than a tablet computer, digital ink lets users capture their spontaneous thoughts, as if doodling on paper. Though still in the early stages of its development, the technology promises to turn sketches and scribbles instantly into web pages, polished documents or anything else that needs to be published. Adding digital power to the ancient art of inscribing symbols on surfaces may, indeed, mark the next stage in the evolution of communication. If so, handwriting, far from falling by the wayside, would seem poised for prime time once more.

World Without Cancer; The Story of Vitamin B17

World Without Cancer; The Story of Vitamin B17

by G. Edward Griffin (Author)

Mr. Griffin marshals the evidence that cancer is a deficiency disease – like scurvy or pellagra – aggravated by the lack of an essential food compound in modern man s diet. That substance is vitamin B17. In its purified form developed for cancer therapy, it is known as Laetrile. This story is not approved by orthodox medicine. The FDA, the AMA, and The American Cancer Society have labeled it fraud and quackery. Yet the evidence is clear that here, at last, is the final answer to the cancer riddle. Why has orthodox medicine waged war against this non drug approach? The author contends that the answer is to be found, not in science, but in politics – and is based upon the hidden economic and power agenda of those who dominate the medical establishment. This is the most complete and authoritative treatise available on this topic.

 

 

Negotiating the Impossible: How to Break Deadlocks and Resolve Ugly Conflicts (without Money or Muscle)

Negotiating the Impossible: How to Break Deadlocks and Resolve Ugly Conflicts (without Money or Muscle) Hardcover – April 4, 2016

How to spot a liar

On any given day we’re lied to from 10 to 200 times, and the clues to detect those lie can be subtle and counter-intuitive. Pamela Meyer, author of Liespotting, shows the manners and “hotspots” used by those trained to recognize deception — and she argues honesty is a value worth preserving.

 

Liespotting: Proven Techniques to Detect Deception by Pamela Meyer (July 20 2010) Hardcover – July 20, 2010

Agility Shift: Creating Agile and Effective Leaders, Teams, and Organizations Hardcover – September 29, 2015

As contrary as it sounds, “planning” — as we traditionally understand the term–can be the worst thing a company can do. Consider that volatile weather events disrupt trusted supply chains, markets, and promised delivery schedules. Ever-shifting geo-political tensions, as well as internal political upheaval within U.S. and global governments, derail long-planned new ventures. Technology failures block opportunities. Competitors suddenly change their product or release date; your team cannot meet the pace of innovations in your market niche, leaving you sidelined. There are myriad ways in the current business environment for a company’s well-considered business plans to go awry.  Most business schools continue to prepare managers to be effective in stable and predictable environments, conditions that, if they ever existed at all, are long gone. The Agility Shift shows business leaders exactly how to make the radical mindset and strategy shift necessary to create an agile, entrepreneurial organization that can innovate and thrive in complex, ever-changing contexts. As author Pamela Meyer explains, there is much more involved than a reconfiguration of the org chart and job descriptions. It requires relinquishing the illusion of control at the very foundation of most management training and business practice. Despite most leaders’ approaches, “Agility is not simply accelerated planning.”  Unlike many agility books on the market, The Agility Shift provides specific, actionable strategies and tactics for leaders at all levels of the organization to put into practice immediately to improve agility and achieve results.

The Need For A Comprehensive Methodology For Profiling Cyber-Criminals

THE NEED FOR A COMPREHENSIVE METHODOLOGY FOR PROFILING CYBER-CRIMINALS

FADI ABU ZUHRI

Since the middle ages era, the definition of crime has been limited to types of crimes committed in the physical world. In the same way, theories aimed at explaining crime including the Conflict Theory, the Theory of Social Control among others have defined crime within the confines of the physical world. Strategies aimed at dealing with criminal activities have also been limited in their scope when defining crime within the context of the physical world. However, the growth of information systems, ICT, mass media, and increased interconnectivity facilitated by the internet has revealed a new and unique form of crime: the digital world crime. These types of crimes present several challenges including legal, geographic, and Web barriers as well as the anonymity of the internet. The environment in which these crimes occur also pose a create challenge to crime specialists. These challenges have created the need to identify and modify techniques used to combat crime committed in the physical world such as criminal profiling with a view to make them applicable to e-crimes. This paper discusses the possibility of penetrating these barriers by applying the modified version of criminal profiling techniques to e-crimes.

PROFILING CYBER CRIMINALS IN THE PHYSICAL WORLD

Since 1970s, experts within the Behavioral Science Unit (BSU) of the FBI have been helping Federal, local and state law enforcement agencies in investigating violent crimes. This practice was initiated the idea of offender profiling with a view to providing personality and behavioral traits of the perpetrator. It started as an analytical technique for identifying the characteristics of the offender based on the examination of the crime scene and crime dynamics and continued developing over years as a tool for investigation aimed at aiding security officers to advance their casework and narrow down a suspect pool (Alison et al., 2010). The offender profiling was offered within the BSU as analytical tool and a product of training programs.

Currently, forensic psychologists often employ deductive or inductive profiling in dealing with crimes committed in the physical world. They often apply these techniques to ascertain the characteristics of criminals in the physical world. Deductive profiling techniques involve the use of data including crime scene evidence, forensic evidence, offender characteristics and victimology. In deductive profiling, the available information is processed by applying personal experiences with the profiler assuming one or more facts of a case as self-evident about an offender or crime and then following hunches and work experience, arrives at conclusions. The “truth” of facts or conclusions arrived at using deductive profiling is depends upon the truth (i.e., contingent truth). Also, in deductive profiling method, the conclusions are true if the hypothesis and the premises are true and valid. On the other hand, inductive criminal profiles are created by studying statistical data including studying the demographic characteristics and behavioral patterns shared by criminals. Inductive profiling is also theory-driven and based on the available cases of crime. The inductive profiling relies on information collected through interviews with offenders and this forms the foundation for investigators’ profiles. Again, the inductive profile technique involves hypothesis (formalized operational definitions) for testing, the coding of data to allow for statistical analysis.

The applicable of these techniques has been possible in crimes committed in the physical world. However, the applicability of these techniques to deal with crimes committed in the digital world is still debatable. It has been argued that criminal profiling is an immature but promising science. Perhaps this may explain the little attention given to the technique by both the academicians and practitioners. In the digital world, forensic psychologists have the knowledge about the law, criminology and psychology and understand the technological aspects relating to the scene of crime in order to develop cyber-criminal profiles. As such, they are required to take an interdisciplinary approach when dealing with cyber crimes. Unfortunately, highlighted issues of tractability, geography, law and anonymity makes it difficult for forensic psychologists to collect any information about criminals and cyber-crimes (Tompsett, Marshall, & Semmens, 2005). Again, most cyber-crimes go either unnoticed or unreported and hence go unpunished. Importantly, it is possible to draw some parallels between non-cyber-crimes and cyber crimes. It is also possible to develop a profile from the existing techniques that can be used for law enforcement.

APPLICATION OF THE DEDUCTIVE AND INDUCTIVE PROFILING TECHNIQUES TO PROFILE CYBER CRIMINALS

From the perspective of the deductive profiling methods, cyber-criminal profile should be developed in a four-step process. The first step of the four-step process is the victomology. This stage involves understanding the aspects of organization and individuals attract cyber-criminals. Today, criminals victimize both organizations and individuals. This stage leads to and is associated with motive identification, which is the next step. Victimology helps the security specialists to understand the offender’s motive behind the crime. Victomology include the following: (1) politically motivated crimes (i.e., cyber-terrorists); (2) crimes committed driven by emotional reasons (i.e., cyber-stalking); (3) crimes committed and driven by sexual impulses (i.e., paedophiles); and (4) crimes known to be less dangerous such as sharing software by individuals, sharing copyrighted movies (Shinder, 2010).

The motives and victimology leads to the identification of offender characteristics, which is the third stage. Several topologies and ways to classify cyber criminals based on offenders’ motives have been introduced (Rogers, 2006). However, changes in the criminal behavior changes with the changing technological environment necessitating modification and reclassification of existing schemes. Other studies, have suggested that crime can be addictive and that in the cyber world, criminals become addicted to the internet and computers (Nykodym et al., 2008). It is also argued that this addiction, aided by various opportunities including the access and availability of the internet and computers, and fueled by criminal’s motives, could facilitate the making of the cyber-criminal. This understanding may be used in analyzing the modus operandi of cyber-criminal. Modulus operandi reflects cybercriminal’s character (Lickiewicz, 2011). For instance, a cyber-criminal may destroy information by using a virus that is attached to the e-mail while another may hack into a computer system by attacking the server with a view to steal information. This suggests that one’s technical expertise helps him or her to understand the behavior of cyber-criminal. A cybercriminal may be required to have level of technical efficacy in order to successfully penetrate a highly sophisticated and secure network (Kirwan, & Power, 2013). On the other hand, “script kiddie” may use an already developed program to attack a computer system. It is worth noting that human elements such as social engineering skills possessed by some professional cyber-criminals should not be disregarded. This is because cyber-criminals with average technical skills can participate in a crime by simply employing simple techniques of subtle psychological manipulations and friendly persuasion. Kirwan, and Power (2013) affirm that indeed technical skills and other skills including social skills and motives determine the modus operandi of cyber-offender.

The stage four of the deductive cyber-profiling technique involves analyzing digital forensic evidence. Digital forensic is important because it is the means through which the cyber-criminal profiler can trace the offender in the event there is no physical evidence (Kwan, Ray, & Stephens, 2008). In view of Lickiewicz (2011) not all criminals are traceable as one out of three cyber-criminals manages to remove or modify the audit trail by wiping off their traceable digital footprints. The four-stage approach that has been suggested is an iterative process. The new information regarding the offender, motive, victim, the victim and forensic evidence could be revealed while in the process of investigation.

As for inductive profiling methods, they can be applied alongside the deductive techniques described above to help deal with the cyber-crimes. For example, the statistical analysis data technique that involve studying the demographic characteristics and behavioral patterns shared by criminals and breaches in cyber-security could be employed to identify trends in criminal attacks such as the motive for attack, the type of victims who are likely to be targeted by criminals, and the most common mode of attack used by cyber-criminals. This may help in identify serial offenders and other cases with similar modus operandi.

CONCLUSION

The techniques and tools discussed in this paper are worth testing in practical scenario. It is believed that if cyber-criminal profiling would be used effectively, the issue of cyber-crime in cyberspace would be a forgotten issue. Considering the current trend of increasing rates of cyber-crimes, it would be important for academic and practitioners to collaborate. These practices may be useful for law enforcement officers as it may help them gather legally valid and binding evidence from cyber-criminals in order to take appropriate actions against these criminals.

REFERENCES

Alison, L., Goodwill, A., Almond, Louise, Heuvel, C. & Winter, J. (2010) Pragmatic solutions to offender profiling and behavior investigative advice. Legal and criminological psychology, 15, 115-132.

Kirwan, G., & Power, A. (2013). Cybercrime: Psychology of cybercrime. Dublin: Dun Laoghaire Institute of Art, Design and Technology.

Kwan, L., Ray, P. and Stephens, G. (2008). Towards a Methodology for Profiling Cyber Criminals. IEEE Computer Society. Proceedings of the 41st Hawaii International Conference on System Sciences.

Lickiewicz, J. (2011). Cyber Crime psychology-proposal of an offender psychological profile. Problems of forensic sciences, 2(3): 239-252.

Nykodym, N., Ariss, S. and Kurtz, K. (2008) ‘Computer addiction and cyber crime’. Journal of Leadership, Accountability and Ethics, 35: 55-59.

Rogers, M. K. (2006) ‘A two-dimensional circumplex approach to the development of a hacker taxonomy’. Digital Investigation, 3 (2): 97-102.

Shinder, D. (2010) Profiling and categorizing cybercriminals. Retrieved on 6th July 2016 from http://www.techrepublic.com/blog/security/profiling-and-categorizing-cybercriminals/4069.

Tompsett, E.C., Marshall, A.M., & Semmens, C.N. (2005). Cyberprofiling: Offender Profiling and Geographic Profiling of Crime on the Internet. Computer Network Forensics Research Workshop.

Raising An Emotionally Intelligent Child The Heart of Parenting

Raising An Emotionally Intelligent Child The Heart of Parenting Paperback – August 12, 1998

 

Cyber Crime Offender Profiling: The Human Factor

CYBER CRIME OFFENDER PROFILING: THE HUMAN FACTOR

FADI ABU ZUHRI

The process of offender profiling draws on the human factor of the cyber Crime Offender profiling both the nonphysical and physical information. This includes evidence on what the offender did to the victim, the offender’s behavior before and after the offence, the sequence of events, and the layout of the crime and crime scene in relation to the absence or presence of significant items or the disposition of the victim. From these data, one can draw inferences about the possible motivation and meaning of the particular action (Kirwan, & Power, 2013). For instance, tying up the victim may suggest the necessity for control. Location of crime, characteristics of the victim, and use of vehicles may suggest demographic and social feature of the criminal offender, such as age, occupation, or race. The goal of criminal profiling is to try and narrow the area of investigation with the basic assumptions being that the behavior of the offender at the crime scene reflects the method of committing crime and consistencies in personality of the offender.

In majority of criminal cases, criminal profiling is useful in sexual assaults and serial crimes and in crime scenes that reflect psychopathology including rapes, cut and satanic killings and sadistic assaults (Kirwan & Power, 2013). Worth noting is that the human factor of cyber crime offender profiling draws on the offender’s characteristics. Human factor means the impact of background and personal characteristics of the offender/perpetrator in commissioning crimes and the internal and environmental factors that shape the criminal careers of the perpetrators (Aebi, et al., 2016).

In a nutshell the human factor addresses the human or social aspect of cybercrime. It focuses on exploring the perpetrators of cybercrimes, their criminal careers, their modus operandi, how criminal hackers pick or select their vulnerable targets, and how they can effectively be deterred. This paper explores these features.

In the era where computer criminals are becoming increasing difficult to combat, law enforcement specialists are increasingly becoming interested in the offenders themselves, their personalities, as well as traits existing in their actions in the broadest sense. The special role of identifying the human factor of cyber crime offender profiling is often played by a psychological profiler professional. Psychological profiling involves utilizing a method to map the psychological description of the unknown offender (Kirwan, & Power, 2013). The result of the process is the creation of the offender’s short, concise and dynamic profile describing the most important manifestations of behavior and characteristics of the unknown perpetrator. As observed by Tompsett, Marshall, & Semmens (2005) psychological experience and knowledge allows the security specialists to interpret the pieces of information and evidence found at the scene of the crime and enables them to further determine the personality type of the perpetrator.

The basic rules of offender profiling state that there is a correlation between the act committed by the offender and his or her personality (Tompsett, Marshall, & Semmens, 2005). As a result, one may infer about the offender’s psychophysical characteristics including his or her behavior and motivation based on the traces left by the offender and the modus operandi (the method of operating). Identical relations concerns hacks or network attacks. As suggested by Lickiewicz (2011), computer crime perpetrators count on internet anonymity. However, the anonymity of the internet does concern their signatures they leave, their motivation, and modus operandi.

According to Lickiewicz (2011) each cyber criminal is his unique way of doing thing with own software and techniques which he/she utilizes for break-ins. Generally, compute crimes are of the serial nature. As such, it is possible for the security specialists to determine the profile of the offender. Lickiewicz (2011) holds that it is important to prepare the profiles of the internet criminals since they are considered a threat to the network security. Of great importance when creating the perpetrator’s profile is the database. If properly prepared, database on offender profiling can enable the security specialists to accumulate information on perpetrators of crimes of similar nature. It also enables investigators and scientists to search for information and analogies in other future cases.

There are two types of investigations in computer crime related cases. First, a situation involving the occurrence of the network incidences in which the identity of the offender is unknown such as the network break-in cases. The second computer crime case involves a situation in which both the offender and crime are known. Sahito, and Slany (2013) emphasizes that in these types of investigations, deductive profiling is useful. However, it is somewhat difficult talking about offender profiling in the second case of computer crime. In investigative psychology, profiling is understood as involving the creation of the psychological profile of the unknown offender but not the individual who has been already arrested by security agencies. Sahito, and Slany (2012) suggest that when creating the offender profile, data should be analyzed in such as way that the analysts can narrow down the search process to a certain group. This way, one may define the offender’s motivation and his or her skills. The offender profile also includes information the area of the internet that should be searched for a given criminal.

Again, one should thoroughly analyze actions of the victim on the internet to establish the reason that may have compelled the offender to attack the victim. From this, one can draw up a detailed offender’s profile and set up a honeypot (future trap) for the offender. When creating the profile of the offender, assumptions should be made regarding the offender’s maturity and age. This allows the security agency to gain information on the offender’s aims, culture she/he grew up and the offender’s motivation. The culture in which the perpetrator grew up may condition his or her behavior. This will allow the use of psycholinguistic methods, which enables identification of offenders in future cases.

Profiling helps explain the behavior of the offender and the need for it to be fulfilled. Profiling also enable an investigator to determine the place where the offender committed the operation. A whole team consisting of internet technology specialists, lawyers, and security specialists are required to conduct offender profiling.

A cyber criminal possesses the following characteristics: at least certain minimal technical skills; a feeling that they are outside the reach of legal norms, and disrespect for legal norms; rich fantasy; a strong motivation of various types including the need for entertainment, motives of a political character, and the need to gain material goods (Lickiewicz, 2011). Computer criminals are also reported to have high technical abilities and skills to solve problems and higher than average IQ (intelligence quotient); are brilliant adolescents bore by poorly prepared teachers and an appropriate school system; they rebel against all authorities and symbols.

Technical skills are general knowledge regarding computer systems, programming languages, network security and functioning and have knowledge about applications used for data base development. Hackers also know the operating system and principles of sensing data (Kirwan, & Power, 2013). Having knowledge in these areas enables hackers to make use of the system weaknesses of the system when breaking in. hackers are identified with certain personality traits. They have crucial characteristics that are effective for attacks. They use social influence or technical methods to obtain information directly from the user. They also demonstrate a high degree of openness to new experiences and neuroticism. These features strongly motivate them to aspire and act to break in the system. A high degree of neuroticism conditions them to abuse the communication using the network. It also makes them to have strong want to maintain anonymity. Also, openness to new experiences determines the offenders’ desire to learn need systems; and the unconventionality and creativity to break the security measures (Kirwan, & Power, 2013). They are known to have the high tendency to violate rules being enforced at the workplace, coming into conflict with superiors and ignoring them.

The offender’s social skills constitute a dimension that determine their functioning in a group and how the internalize social norms and use them in professional and private life. Social skills of the offender remain in relation to technical and intelligence skills. It is emphasized in the literature that hackers often demonstrate low social skills. These skills consist of difficulties in relating with colleagues ad family, the inability to establish strong and close interpersonal relations, and a sense of alienation. Computer criminals are also associated with internet addiction. This element makes them to be effective in their attacks on the system. The time they devote to computers translate into knowledge and skills to use them (Lickiewicz, 2011). These characteristics form the human aspect of computer crime and form the basis for creating the hacker’s psychological profile.

It is also worth noting that there is relationship between these human factor elements. For example, the cyber criminals’ method of attack is influence by their personality, and intelligence, technical and social skills. Social skills influence the decision they make with regard to the social techniques used during the attack. Technical skills possessed by offenders help them to master the system and influence the method used.

The success or effectiveness of an attack is determined by the criminal’s level of intelligence. The offender’s indigence and his or her ability to successful conceal traces at the crime scene condition his or her way of behavior while at the scene of the attack. Social skills are useful when utilizing other hackers’ help (Lickiewicz, 2011). Technical skills is related to the understanding the weak side of the system. They also determine the how the offender deals with the data obtained and determine the effectiveness of tasks executed. Methods used by hackers are largely conditioned by technical skills, personality and intelligence. The offender’s personality influences the break-in failure, and determines method used to deal with the broken system.

CONCLUSION

When profiling a person’s characteristics, the profiler of the offender assumes that the behavior of the offender is directed by his or her characteristics and the way he or she thinks. It is the work of the offender profiler to infiltrate the behavior of the person that is indicating of his characteristics rather the prevailing situation.

REFERENCES

Aebi, M., Bijleveld, C., Estrada, F., Getos, A., Kleemans, E., Levi, M., et al. (2016). Terrorism and Cybercrime: the Human Factor. The Position Paper. Retrieved July 5, 2016, from http//www.nscr.nl

Alison, L., Goodwill, A., Almond, L., Heuvel, C. v., & Winter, J. (2010). Pragmatic solutions to offender profiling and behavior investigative advice. Legal and criminological psychology , 15, 115-132.

Kirwan, G., & Power, A. (2013). Cybercrime: Psychology of cybercrime. Dun Laoghaire Institute of Art, Design and Technology, Dublin.

Lickiewicz, J. (2011). Cyber Crime psychology-proposal of an offender psychological profile. Problems of forensic sciences , 2 (3), 239-252.

Sahito, F. H., & Slany, W. (2013). Advanced Personnel Vetting Techniques in Critical Multi-Tennant Hosted Computing Environments. International Journal of Advanced Computer Science and Applications , 4 (5), 11-19.

Sahito, F. H., & Slany, W. (2012). Functional Magnetic Resonance Imaging and the Challenge of Balancing Human Security with State Security. Human Security Perspectives , 1, 38–66.

Tompsett, E. C., Marshall, A. M., & Semmens, C. N. (2005). Cyberprofiling: Offender Profiling and Geographic Profiling of Crime on the Internet. Computer Network Forensics Research Workshop.

The Complete Dictionary of Ailments and Diseases

The Complete Dictionary of Ailments and Diseases

Now Available: the English version of the Best-Seller “Le grand dictionnaire des malaises et des maladies (2nd Edition)” by Jacques Martel

The book entitled The complete dictionary of ailments and diseases, and such book is highly recommended be kept within anyone books collocation…

read more via http://www.atma.ca/en/

or buy it from Amazon.ca

 

UNIX and Linux Forensic Analysis DVD Toolkit

UNIX and Linux Forensic Analysis DVD Toolkit 1st Edition

The Profile Of A Cybercriminal

THE PROFILE OF A CYBERCRIMINAL

FADI ABU ZUHRI

Profiling is a technique or approach for solving crime. Some scientist define it as a forensic technique used by forensic investigators and law enforcement agencies to understand why criminals are committing crime, to classify criminal behavior and to solve crimes that have already been committed (Saroha, 2014). Others view it as a tool used by forensic experts to identify the offender’s behavioral tendencies, personality traits, demographic variables, and geographical variables based on the information and characteristics of the crime (Lickiewicz, 2011). However, the general consensus is that criminal profiling involves collecting inferences about the traits of the individual responsible for the series of crime or for a particular crime. It involves understanding what a particular crime says about the perpetrator (Kirwan, & Power, 2013). It is used by forensic investigators and law enforcement agencies to understand and apprehend criminal offenders. As a forensic technique, criminal profiling enables investigative agencies to use the specific information to focus their attention on people with personality traits that parallel those of other offenders who have committed other similar offences (Kirwan, & Power, 2013). Integrating the sciences and the arts, criminal profiling allows investigators to analyze victims and crime scene and comparing them to similar crimes committed by known offenders’ personalities and traits. From this, the criminal profiler can predict the unknown offender’s characteristics including sex, age, and level of mental stability, geographical location and motivation (Lickiewicz, 2011). The investigators can also link other offences committed by the offender from the offender’s signature and modus operandi identified from the physical evidence collected at the setting where the crime occurred and scene of crime (Saroha, 2014). As such, criminal profiling contains information about the perpetrators (Kirwan, 2011):

  • Likely demographics (i.e., gender and age)
  • Legal history including history of prior criminal convictions/offenses and any antecedence
  • Vocational backgrounds that is the work the perpetrator is likely to be involved in, if any
  • Social interests and habits (hobbies, sports, and other interests in which the perpetrator may have)
  • Family characteristics including the offender’s family background
  • Various personality characteristics including the offender’s appearance, demeanor etc
  • Mode of transport (i.e., type of vehicle that they offender may have)

In essence, criminal profiling is primarily based on the assertion that the format in which the offender committed the offence reflects his or her behavior and personality.

Modern criminal profiling takes two forms: the deductive and inductive approaches. He former is evidence-based involving analyzing the evidence found from the case in order to construct the offender’s behavioral profile. This way, the offender’s profile is constructed based on the evidences and information found at the crime scene (Kirwan, 2011). Professionals use this approach to get into the mind of the criminal. They try to think in the same way the offender may have thought whiling committing the crime. This type of criminal profiling is largely based on human intelligence rather than on statistical data. The later type of profiling uses the statistical analysis of the previous offender’s characteristics to generate a generalized behavioral pattern of the perpetrator. Comparative and statistical analyses are used to create the profile of the criminal. Information comes from results of studies of previously convicted criminals, their interviews, observation, data from official databases, and the usage of clinical methods. The profiler analyzes all these information and constructs a possible profile of the likely offender of the type of crime basing on the traits of criminals that committed similar types of crimes. The inductive technique is basically based on the inductive logic, which forms the basis of narrowing down and predicting who will commit specific types of crimes (Halder, & Jaishankar, 2011).

In addition to the offender’s biological information; it is worth noting that criminal profiles include information about the perpetrator’s residence and approximate location. This information is the product of geographic profiling. Regardless of the type of criminal profiling approach employed, criminal profiling alone can never solve crimes alone (Long, 2012).

Discerning the motivations for committing a particular cyber-crime is important as it helps the forensic expert to build a useful profile for the offender. It is suggested that people may be motivated by different factors to break the law. Based on the perpetrator’s motives, criminals can be categorized into two: criminals whose act of using the internet to commit crime is incidental; and criminals who intentionally and knowingly use the internet to commit crime. Criminals who knowingly use the internet to commit crime include white-collar criminals, hackers, computer con artists, network attackers and crackers (Long, 2012). The second type of criminals use the computer to keep record, use the network to identify and find victims, and those who use e-mail and other services to communicate with their accomplices. The motivations offered by cyber-criminal for their activity seems to be largely influenced by their sensitivity towards agendas raised by various groups to oppose hacking. For example, the computer security industry has been accused of over-emphasizing the pathological aspect of hacking and vandal-oriented motivations. The motivation behind the hacker participation in hacking can be categorized into six: peer recognition, enjoying feelings of power, the urge of curiosity, the feelings of addiction, boredom with education system, and political acts (Long, 2012). For some criminals, they are motivated to do the forbidden act while for others, crime offers them the opportunity to manipulate and control others. Most criminals committing crime in the cyber space are strongly motivated with their motivation ranging from simply want to have fun to the desire or need for emotional or sexual impulse, money, political motives, or compulsions caused by psychiatric conditions of mental illness (Long, 2012). On the other hand, some cybercriminals are driven by less noble motives such as lust, desperation, anger, or plain boredom. It is important to discern motives and motivations for committing a particular crime as forms an important part of creating a useful profile (Schinder, 2010).

Because of the influence of Hollywood and the untypical nature of crime today; there are many stereotypes on how cybercriminals appear. Some of the stereotypes include that all cybercriminals (1) are socially inept but bright; (2) have a great technical skills and knowledge and very high IQs; (3) are males and usually boys; (4) teenage boys with computers and dangerous criminals, and (5) all cybercriminals are never violent. According to Lickiewicz (2011) when creating a profile for cybercriminals, a law enforcement official should always begin with generalities that are identified and typical of cybercriminals. According to Lickiewicz (2011) for an individual to commit a cyber-crime, he or she should have the ability to perform basic tasks on the internet. Some crimes also require greater computer skill and knowledge. These types of criminals are same as those who commit crime in the physical world. They do not believe and respect the law. They believe that some laws should be broken because they are unreasonable. Many of these criminals use the internet to fulfill their fantasies. They use it to build new identities and to play other people’s role. Cybercriminals often use more energy than they get in return (Kirwan, 2011).

Understanding the motives of the criminals is also important because in many jurisdictions, one of the elements of providing that an accused individual is guilt is by showing that he or she posses each of the crime triangle: motive, the opportunity, and the means. The motive is the perpetrator’s reason for committing a crime (Atkinson, & Walker, 2015). The means is the perpetrator’s way of committing a crime. The opportunity is the offender being at the scene at the right time to enable him commits a crime. Therefore, understating the motive of the criminal in an investigation is useful for two reasons: (1) when creating the offender’s profile to help in the identification of the correct perpetrator; and (2) when presenting a case against the suspect. Common motives for criminals committing cybercrimes include: sexual impulses, political motives, monetary profit, just for fun, revenge, anger, and other emotional needs, and serious psychiatric illness (Atkinson, & Walker, 2015). These characteristics should be used when profiling cybercriminals. Every message, every word and every trace is important when creating criminal profile.

CONCLUSION

It is clear from this paper, that criminal profiling means a lot to the investigators. It allows investigators to link motive, character, act and behavior of the offender. Although it primarily focuses on serial violent offenses such as sexual assaults and murders, the changes in technology has increased the emphasis and interest on applying it to cybercrime. Most cybercrimes are by nature serial in that the offender habituates their behavior and commit multiple offenses. From this, signature and modus operandi can be drawn. For example, analysis of indicators of the attack’s “digital crime scene” can determine the computer hacker’s intrusion activity and provide them with an insight. As such, it is an important method when it comes to classifying criminal investigations.

When an investigator uses profiling as the method to solve a criminal case; it is always important to see the scene of crime, find traces, and evidence that a criminal leaves at the crime scene. This way, the profiler can make good profiler of the offender.

REFERENCES

Atkinson, S., & Walker, C. (2015). Psychology and the hacker – Psychological Incident. SANS Institute InfoSec Reading Room.

Halder, D., & Jaishankar, K. (2011), Cyber crime and the victimization of women: laws, rights and regulations, Information Science Reference.

Kirwan G (2011). The Psychology of Cyber Crime: Concepts and Principles. IGI Global.

Kirwan, G., & Power, A. (2013). Cybercrime: Psychology of cybercrime. Dublin: Dun Laoghaire Institute of Art, Design and Technology.

Lickiewicz, J. (2011). Cyber Crime psychology-proposal of an offender psychological profile. Problems of forensic sciences, 2(3): 239-252.

Long, L. (2012). Profiling Hackers. SANS Institute. Retrieved on 8th July 2016 from http://www.sans.org/readingroom/whitepapers/hackers/profiling-hackers-33864

Saroha, R. (2014). Profiling a Cyber Criminal. International Journal of Information and Computation Technology, 4(3): 253-258.

Schinder, D. (2010). Profiling and categorizing cybercriminals. Tech Republic Retrieved on 8 th July 2016 from http://www.techrepublic.com/blog/it-security/profiling-and-categorizing-cybercriminals/handling.

Tompsett, E.C., Marshall, A.M., & Semmens, C.N. (2005). Cyberprofiling: Offender Profiling and Geographic Profiling of Crime on the Internet. Computer Network Forensics Research Workshop.

Translate »