Understanding the MO of cybercriminals
Summary

In a previous article, we have seen how cybercrime is, by nature, difficult to define. However, criminologists have successfully categorized different generations of cybercriminals and constantly observe their evolution compared to technology. In this article, we’ll explore the categories of cybercrime based on criminal opportunity (modus operandi). 

What is an MO?

The MO involves all the actions, techniques, and choices an offender makes while committing a crime. This includes how they gain access, specific weapons, time patterns, select their victims, unusual or consistent actions during the crime, and methods for cleaning up a scene. 

The MO is crucial for law enforcement because it helps link crimes, identify offenders, develop criminal profiles, and predict future crimes. 

Types of cybercrime based on MO

Given a new invention, there will always be some people who see only its potential to do good, while others see new opportunities to commit crime or make money.

According to criminology professor David S. Wall, online offending falls into one of three basic types of crime, each invoking a different body of law. These groups are: 

Page 2

Real case scenarios often involve two or more categories, so their lines can be blurred. For example, in a phishing attack, offenders engage their victims through spam (crime against the machine), deceive them through a bogus website (crime that uses the machine), and eventually steal their information (crime in the machine). 

Cybercrimes against the machine (computer integrity crimes)

Once they get into a system, offenders move laterally across it to increase their privileges and access more remote areas where valuable information is stored. Depending on the motive, they might want to steal, destroy or block others to access it. 

Crimes against the machine usually prepare the ground for a range of further crimes, either enabled by the machine or in the machine. 

Cybercrimes using the machine (computer-enabled or computer-related crimes)

Crimes using machines are mainly economic crimes that involve dishonestly acquiring money, goods, or services. Most jurisdictions now have theft acts, legal procedures for recovering lost assets, and intellectual property laws to protect citizens against the illicit acquisition or the expression of ideas.

Cybercrimes in the machine (computer content crimes)

There are three main areas of crime falling in this category: 

Often, this informational content illustrates evidence of wrongdoing; sometimes, possession of it is evidence in and of itself. 

The focus of criminal opportunity online

An important consideration when understanding cybercrime is who the designated victims are. What motivates offenders to target them? 

Page 3

Victim groups differ in whether offenders target individual citizens, organizations and businesses, or have a bigger political picture in mind and seek to victimize nation states via their economies and infrastructures (cyberwarfare). 

The Internet has created opportunities for old crimes and new crimes. Understanding cybercriminals’ motives, opportunities, and victims helps investigators catch them. 

Share this post :

PID Perspectives is migrating to European Servers. Please, let us know if you experience a slow response or technical issues.