LIE DETECTION – A MYTH OR SCIENCE?

LIE DETECTION – A MYTH OR SCIENCE?

FADI ABU ZUHRI

INTRODUCTION

In the current era of technological advancements, there is an increasing interest of testing the lie detection methods. Different scholars have gained interest in testing whether lie detection is a science or myth. What is evident is that, in most cases, liars may not offer telltale signs of their dishonesty. As such, it is difficult to identify the persons who are telling the truth or those who tell lies. In most cases, a lie could be embedded in some truth. There is also a small difference between the people telling the truth and those who tell lies. A common mistake that has been made by lie detectors is putting so much emphasis on the nonverbal cues. For example, lie detectors neglect the actions of an individual when he or she is telling the truth. They only record the actions of liars when they are lying. Lie detectors have also proved to be overly confident in their skill of detection (Ask, Granhag, Juhlin, & Vrij, 2013). In this case, there have been a number of misconceptions when it comes to deceptions. This paper discusses the fact that lie detection is science rather that a myth believed by some proponents.

WHAT IS LYING

Lying can be defined using many approaches. Lying is seen as communication that is falsified and intended to benefit only one party. This classification covers a broad range of subjects – from humans to plants. In a plant, deception may be experienced in a situation where a male wasp is seduced by orchid flower, which produces smell creating an illusion of mating. The gainer is the orchid because, in the course of deception, the wasp acts as an agent of pollination. This approach is not conventionally used because it includes an act of misleading as a way of deception. Lying can be defined as an act that is meant to manipulate other people believe something he or she knows is untrue (Zuckerman, DePaulo, & Rosenthal, 1981; Krauss, 1981). Lying is a part of everyday life, sometimes causing harm and sometimes “white lies” may even benefit the lie receiver by acting as a social lubricant (Vrij, 2008).

GOOD LIARS AND POOR LIARS

Vrij (2008) argues that everybody has an idea of what lying is. Everybody knows that lying is something that is not acceptable in the society. The myth here is pretending that we seldom lie because humans cannot accept themselves as miserable liars. Since lying is unacceptable in society, people opt for others means of deceit. In the long run, they spend little time with liars and completely avoid them. Most individuals in the world are sick liars; they forget that they are lying and reveal their deceit by being nervous or avoiding eye contact. The author notes that people tend to be good detectors when monitoring their children, and close friends. Criminals accomplish their objective by deceiving others. Then there are professional lie catchers who are technically trained to catch lies. There has been a revolution in technology with the development of machines technically designed to detect lies. An example is the brain-scanner, which is used by researchers to monitor the thoughts and feeling of somebody directly (Vrij, 2008).

There is a big difference between good liars and poor lie detectors. Most people assume that they don’t lie and by so doing they are underestimating their ability to lie. There are many ways of telling why people believe that they are the worst liars than they thought. First, they overestimate how honest they are with their feelings and thought to others. By saying so, Vrij (2008) implied that people believe that their lies trend all the way. Second, the selfish act makes people see themselves as more morally upright than others (Kaplar & Gordon, 2004). When someone admits that he or she is a good liar, he or she complicates the good self-image. People will tend to disclose their white lies and hide dangerous lies (Elaad, 2003). This shows that it is easy to detect a dangerous lie compared to white lie because people will remember the lies that can be easily noticed. Lastly, people will remember instances when they lied and were detected that than instances when they lied successfully. When people forget how easily they can lie, they are underestimating their ability to lie (Vrij, 2008).

WHY LIES REMAIN UNNOTICED

The reason why people lies go unnoticed is that no efforts are put in detecting them, and they do not want to know the truth. Vrij (2008) calls it the ostrich effect and states that there are at least three reasons as to why people don’t like to know or accept the truth. One, the truth may be bitter and people prefer to stay ignorant by believing a more “pleasant” lie. Second, people fear consequences that the truth may present. They are afraid of what they would need to do if they were to accept the truth. Third, people fear not knowing what to do if they came to know the truth.

THE TECHNOLOGY BEHIND LIE DETECTION

Even though, lie detection has been used in many contexts, the technique has been misunderstood in many ways. Lie detection is one complex technique and requires a personal judgment. The scientific underpinnings used in lie detection are less straightforward than other tests like the breath-alcohol test. The nature of lie detection makes it interesting to analyze especially from the basis of science. It uses the methods and conclusions of a number of disciplines that deal with behavior and human physiology. Lie detection also offers a vital probability issue that is applicable in criminal law (O’Sullivan, 2007).

In 1895, a mix of pulse reading and blood pressure was used to investigate crime. Other experiments done in lie detection have used blood pressure, and respiratory recordings. The science of lie detection was equally tested by the polygraph created by Larson John. The polygraph used the three measurements (pulse, blood pressure, and respiration) in lie detection. The Keeler, made by Leonarder Keeler, introduced the galvanic response of the skin to the list. The key improvement in the Keeler is the ability to obviate and record the blood pressure distortions especially in the readings that could result from muscular flexing (Evans & Stanovich, 2013).

In most cases, the procedure used in lie detection such as the polygraph test is done by experienced examiners in a controlled environment. The examiner will engage in questions that depend on the preliminary interview results together with different circumstances and facts that create an accusation basis. Some questions would be variable depending on the individual being questioned. Many studies on lie detection have proposed the use of some systematically designed models as ways of measuring the physiological activities and creating the last credibility judgment (Frank & Ekman, 2004).

Even though lie detection appears extremely useful, a number of results obtained from lie detectors have been excluded from trial (Albrechtsen, Meissner, & Susa, 2009). There is a possibility that the validation and the verdict could be wrong just like the lie detector (Etcoff, Ekman, Magee, & Frank, 2000). In this case, lie detection procedures have no independent means of checking the phenomena which is lying or confirming whether the accused person lied.

DIFFICULTIES WITH DETECTING LIES

Detecting liars and lies is not an easy task. Even professional lie detectors, like police officers and intelligence officers, fail to do so in most cases. Research shows that professionals also make wrong decisions and fail to distinguish between a lie and truth. One reason behind failing to detect a lie is due to the complexity of the task. There is no single response from a liar that a lie detector can rely on to truly capture a liar. A liar who is determined to lie will avoid being caught at all cost, and there will be an attempt to hide nonverbal, psychological and verbal signs. Liars will try at all cost to create an accurate impression to lie detectors to avoid being caught. They will employ informed tactics to fool whoever is trying to fool them, living the lie detector with mixed feelings about the situation. There are many errors committed by lie detectors that hinder them from knowing the truth; they may tend to focus more on signs that are not linked with the lie. This may be contributed to the fact that they were trained to do so. Some of the techniques the detectors are trained to might be well known by the liars thus making it hard for them to separate the truth from a lie (Vrij, 2008).

Lack of realism is another contributor to the lack of ability to detect lies. Many studies mention that a lie can be detected by observing how people are behaving, screening their speech and analyzing their psychological responses. When lie detectors are conversant with these principles, they are so proud to have the ability to detect deception. Research experts have claimed to have the capacity to detect lies, but they fail to support their study with evidence. Interestingly, lie detectors who have been trained to look for certain cues tend to perform worse than those who do not (Kassin & Fong, 1999; Mann, Vrij, & Bull, 2004).

CONCLUSION

Lie detection is a science and not a myth since the procedure used in lie detection follows a practical and intellectual activity involving a systematic study of behavior and structure of the natural and physical world using experiment and observation (Moore, Cappelli, Caron, Shaw, Spooner, & Trzeciak, 2011). The process of lie detection, however, could be improved if methods of testing the validity are improved.

While it is important to understand nonverbal, verbal, and physiological indicators of deceit, it is equally important for a lie detector to know which is indicator is more valuable. We sometimes tend to place more emphasis on nonverbal cues when detecting deception, however differences in cultural behaviors may define nonverbal indicators more than lying itself. This leads us to suggest that Emotional Intelligence (EQ), a combination of People Intelligence (PQ) and Cultural Intelligence (CQ), has a key role to play in lie detection.

REFERENCES

1.Albrechtsen, J. S., Meissner, C. A., & Susa, K. J. (2009). Can intuition improve deception detection performance? Journal of Experimental Social Psychology , 45, 1052–1055.

2.Ask, K., Granhag, P. A., Juhlin, F., & Vrij, A. (2013). Intending or pretending? Automatic evaluations of goal cues discriminate true and false intentions. Applied Cognitive Psychology , 27, 173–177.

3.Elaad, E. (2003). Effects of feedback on the overestimated capacity to detect lies and the underestimated ability to tell lies. Applied Cognitive Psychology , 17, 349–363.

4.Etcoff, N. L., Ekman, P., Magee, J. J., & Frank, M. G. (2000). Lie detection and language comprehension. Nature , 405, 159.

5.Evans, J. S., & Stanovich, K. E. (2013). Dual-process theories of higher cognition: Advancing the debate. Perspectives on Psychological Science , 8, 223–241.

6.Frank, M. G., & Ekman, P. (2004). Appearing truthful generalizes across different deception situations. Journal of Personality and Social Psychology , 86, 486–495.

7.Frank, M. G., & Feeley, T. H. (2003). To catch a liar: Challenges for research in lie detection training. Journal of Applied Communication Research , 31, 58-75.

8.Kaplar, M. E., & Gordon, A. K. (2004). The enigma of altruistic lying: Perspec- tive differences in what motivates and justifies lie telling within romantic relationships. Personal Relationships , 11, 489–507.

9.Kassin, S. M., & Fong, C. T. (1999). “I’m innocent!”: Effects of training on judgments of truth and deception in the interrogation room. Law and Human Behavior , 23, 499–516.

10.Krauss, R. M. (1981). Impression formation, impression management, and nonverbal behaviors. In E. T. Higgins, C. P. Herman, & M. P. Zanna, Social cognition: The Ontario Symposium (Vol. 1, pp. 323–341). Hillsdale, NJ: Erlbaum.

11.Mann, S., Vrij, A., & Bull, R. (2006). Looking through the eyes of an accurate lie detector. Journal of Credibility Assessment and Witness Psychology , 7 (1–16).

12.Moore, P., Cappelli, D., Caron, T., Shaw, E., Spooner, D., & Trzeciak, R. (2011). A preliminary model of insider theft of intellectual property. Retrieved 2016, from http://www.sei.cmu.edu

13.O’Sullivan, M. (2007). Unicorns or Tiger Woods: are lie detection experts myths or rarities? A Response to on lie detection “wizards” by Bond and Uysal. Law Hum Behav , 31 (1), 117-23.

14.Vrij, A. (2008). Detecting Lies and Deceit: Pitfalls and Opportunities (Second ed.). Chichester, West Sussex, England : John Wiley & Sons Ltd.

15.Zuckerman, M., DePaulo, B. M., & Rosenthal, R. (1981). Verbal and non- verbal communication of deception. In L. Berkowitz, Advances inexperimental social psychology. 14, 1–57.

THE EFFECTIVE ROLE OF CYBER FORENSIC INVESTIGATION IN INTELLECTUAL PROPERTY VIOLATIONS

THE EFFECTIVE ROLE OF CYBER FORENSIC INVESTIGATION IN INTELLECTUAL PROPERTY VIOLATIONS

FADI ABU ZUHRI

INTRODUCTION

Cyber Forensics has been defined in different terms in available literature. ISO (2012) terms it the identification, collection, acquisition and preservation of digital evidence of substantial value. A better, more broadbased definition that clarifies the legal context is credited to Easttom (2013), which defines Cyber Forensics as the identification, preservation, collection, transportation, analysis, and presentation of digital evidence according to legally accepted processes and procedures.

This paper focuses on the crucial role of Cyber Forensic investigation as related to Intellectual Property. In this context, Intellectual Property is classified as copyright, trademark, trade secrets, licensing and patents. Copyright protects the original “author” or owner the exclusive right to reproduce the work. Definition of copyright might vary across countries. The World Intellectual Property Organization clarifies that computer programs, databases, designs and architecture also counts as copyright (WIPO, 2003). Trademark is a brand name and includes a word, a name, a symbol or a a combination of these to uniquely identify the goods/ services. Trade secrets are confidential business information. Licensing refers to the legal agreement between the Intellectual Property rights owner and another party (licensee). Patents are Intellectual Property rights granted by the government to the inventor. Patents are usually for limited durations (Stephenson, 2014).

INVESTIGATION STEPS

Cyber Forensics is tasked with a structured investigation that will maintain a chain of custody. In many cases, the Cyber Forensic investigation follows set procedures that are based on well-established scientific principles (Stephenson, 2014). The device in question would be isolated to ensure it cannot be contaminated accidentally. Then, the investigators prepare a copy of the storage media in the device. After copying that original media, the information will be locked in a safe facility to ensure that the pristine conditions are maintained. Then, investigation will be carried out on the stored copy of digital media.

More often than not, the investigators may apply different techniques and the proprietary software in examining and searching all the hidden files. All the unallocated disk space with deleted, damaged, or encrypted files are checked as well. The evidence found on the device is then documented carefully as a report. The evidence will then be verified and made ready for the legal proceedings. The legal proceedings involve depositions, actual litigation and discovery of the collected evidence.

WHY INSIDERS STEAL INFORMATION?

Cyber Forensic has been used to deal with threats of Intellectual Property initiated internally, by former or current employees and externally, by business partners, contractors and third parties. This section reviews the motivation behind theft of Intellectual Property based on established models. There are two dominant models that explain information stealing within organizations. One is the Entitled Independent model where an insider is acting alone to steal information to help in a new job or own business. The other model is the Ambitious Leader model where a leader, someone with a larger purpose, recruits insiders to steal information.

According to the Entitled Independent model, without an interview, it would be difficult to find out the magnitude to which an insider would feel in charge of the information stolen. In a number of cases, the interviews and findings found out that 60% of the class of insiders who had their information stolen supported the hypothesis that they felt in charge of the stolen information. About three quarters of the entitled independents had their information stolen in their responsibility area, and 37% of the cases were involved partially in developing the stolen information. About 42% of the Entitled Independents had stolen the information or products despite having signed the Intellectual Property agreement with specific organizations (Moore et al., 2011).

Figure 1: Insider theft and deception (Moore et al., 2011)

Moore et al. (2011) found out that this kind of entitlement may be severe especially once the insider considers his function important in product development. In a case where the role of the insider is focused on contributing to a specific product, the insider would have a greater ownership sense regarding the information and product resulting into a huge entitlement. Different from the good management practice, individuals could get positive feedback due to their efforts and could interpret it as some kind of reinforcement provided their predispositions.

A number of cases depicted evidence of entitlement. For example, an entitled independent who stole, and marketed a copy of his employer’s critical software established a huge manuscript that detailed his innocence and considered the persons involved in the trial dead. Similarly, another insider stole the database of the client and offered the company some threats just because he was denied a raise (Moore et al., 2011).

Some dissatisfaction had a role to play in about 33% of the cases of independent entitlement. In most cases, the dissatisfaction came about from insider’s denial of requests. The requests denied in the cases studied involved benefits and raises, promotion application, and relocation requests. Some dissatisfaction also lead to threats of layoff in the organization victim (Moore et al., 2011).

Some of the things that trigger an insider into contemplating to steal information include the insider’s plan to move into the competing organization, dissatisfaction with their job, and the sense of entitlement to the products. As a result, the need to steal information became strong resulting into theft. Some organization may not be able to detect the theft. In some organization, the employee’s actions which appear suspicious may be observed and action taken (Moore et al., 2011).

The concerns over being caught when stealing could make the insider not to steal the information. This could be explained by the psychological predisposition of entitlement that makes an individual overestimate his abilities while underestimating the capabilities of other. Even though, the agreement of Intellectual Property may be in place, in any cases, a very low percentage of the entitled independents attempt to deceive the organization when they try to take the information (Moore et al., 2011).

According to the Ambitious Leader model, some leader may recruit the insider to steal some information especially for a larger purpose. Some of the cases include the specific plans in developing competing product or using information in attracting clients away from the organization victim. More than 50% of cases of the stealing Intellectual property fall in this category. About 38% of the cases involve insiders who were working with the competing organization so as to help his new employer. About 30% fall in this category. The last category of insider involves those who sell the information to competing firms. About 10% of the cases may fall in this category (Moore et al., 2011).

Figure 2: Theft planning by Ambitious Leader (Moore et al., 2011)

The cases where foreign entities were benefitted fit into the Ambitious Leader scenario. The study also showed that the loyalty to the native country was higher than the loyalty to the employer. Some insiders who stole the Intellectual Property were influenced by the Ambitious Leader. The insiders with loyalty to the foreign country were influenced by the goal to bring value to and relocate to the given country. All the cases of the Ambitious Leader involved an individual being influenced and motivated to promote the crime (Moore et al., 2011).

COPYRIGHT INFRINGEMENT

Cyber Forensic investigation helps establish the provisions that target the infringement of Intellectual Property. For example, the United States No Electronic Theft Act attempts to criminalize noncompetitive infringement. On the other hand, the Digital Millennium Copyright Act offers penalties for crimes like conduct, and the circumventing of the codes designed to have the copyright material protection (Moohr, 2001).

Cyber Forensic investigation helps prevent theft of copyright. For example, the Copyright Law targeted at preventing the infringement by the competitors holding copyright. The law acknowledges that the infringement by competitors for commercial reasons is a crime classified as misdemeanor. Initially, the criminal offense was applicable to only the people who infringed for reasons of profit and the economic competitors were subjected to some liability. However, the new legislation included a penalty to protect different type of copyright material and increased the criminal penalties severity, while ensuring that the quasi-copyright material is protected by the criminal provisions. In this case, the infringement of copy right for private financial gain, and commercial advantage were included in the law provision (Moohr, 2001).

The goal of the Copyright Law is to benefit the public through the promotion of the ideas and learning. To promote this law, authors are granted exclusive rights. The law protects the interest of the author as ways of having an end protection. In this case, the law provides access to the authors work when the statutory grant expires (Moohr, 2001).

The law offers some rights to the initial expression of ideas to overly restrict the access by the public. Confining the protection involves setting out limited rights and restricting the period of time for the rights, while maintaining an existence of material in the public domain. The law helps others to build on ideas freely.

CONCLUSION

From the study, it is evidenced that Cyber Forensic investigation helps prevent theft of Intellectual Property, helps establish the provisions that target the infringement of copyright, helps identify the motivation behind theft of Intellectual Property, and helps deal with the threats of Intellectual Property. Some of the reasons behind theft of Intellectual Property involve benefiting the foreign entities, stealing information especially for a larger purpose, insider’s plan to move into the competing organization, dissatisfaction with their job, and the sense of entitlement to the products. The two theories used to explain the insider’s motivation include the Ambitious Leader model, and the Entitled Independent model. Laws like the Copyright Law have been enacted to protect the authors against theft of Intellectual Property. In summary, Cyber Forensic investigators need to give sufficient importance to Intellectual Property rights when obtaining and reviewing digital evidence.

REFERENCES

1.Easttom, C. (2013). System forensics, investigation and response 2nd ed. . Burlington, MA: Jones & Bartlett Learning.

2.ISO. (2012). ISO/IEC 27037:2012 Information technology — Security techniques — Guidelines for identification, collection, acquisition and preservation of digital evidence. Retrieved from https://www.iso.org/obp/ui/#iso:std:iso-iec:27037:ed-1:v1:en

3.Moohr, G. (2001). The crime of copyright infringement: An inquiry based on morality, harm, and criminal theory. Retrieved October 2016, from https://www.law.uh.edu/faculty/gmoohr/Criminal.pdf

4.Moore, P., Cappelli, D., Caron, T., Shaw, E., Spooner, D., & Trzeciak, R. (2011). A preliminary model of insider theft of intellectual property. Retrieved October 9, 2016, from http://www.sei.cmu.edu

5.Stephenson, P. (2014). Official (ISC)2® Guide to the CCFP CBK. CRC Press.

6.WIPO. (2003, June). What is Intellectual Property? Retrieved 2017, from World Intellectual Property Organization: http://www.wipo.int/edocs/pubdocs/en/intproperty/450/wipo_pub_450.pdf

Captivate: The Science of Succeeding with People

Captivate: The Science of Succeeding with People Hardcover – April 25, 2017

Practical Female Psychology: For the Practical Man

Practical Female Psychology: For the Practical Man Kindle Edition

Transformational Energy Coaching as per Karen

Transformational Energy Coaching

Transformational Energy Coaching is a unique combination of Reiki energy healing and transformational coaching that assist clients on their journey to understanding their life’s purpose and bring it openly into the world in their personal and professional lives. By threading a tether on which clients can move between their spiritual and human aspects they can explore their spirituality as well as examine their daily lives in reality. The tether allows clients to move easily from the human day to day into the ethereal aspect of their spiritual selves. Awareness of being both human and spirit creates balance and knowing. This in turn brings peace and understanding into the lives of those who experience this type of energy coaching.

Energy is everywhere. In that energy is information. Using a transformational coaching conversation and combining it with healing energy that is always present, clients open in a way that he/she can see themselves, their behaviors, and places where they are stuck. Through this awareness comes transformational healing and growth on all levels. A shift occurs and a new way of being appears.

Working one-on-one and through workshops and seminars, Transformational Energy Coaching moves clients to their own truth and freedom. Filled with love and compassion, clients are held in a non-judgmental way, embracing everything as the teacher, while creating a container of safety to explore even the darkest thoughts in an empowering way.

Benefits of Transformational Energy Coaching

  1. Resolving life long issues
  2. Making meaningful life decisions
  3. Discovering life purpose
  4. Becoming self aware
  5. Escalated spiritual Growth
  6. Resolving Family/Relationship issues
  7. Becoming aware of life skills and talents
  8. Freedom and Resourcefulness
  9. Getting in touch with inner wisdom
  10. Letting go of guilt and shame
  11. Letting go of negative thoughts
  12. Embracing what serves you
  13. Know your truth
  14. Decide how you to live and work in the world

    For more refer to www.tabularasacoaching.com

Psychology of Emotion: Self Discipline by Conscious Emotional Continence

Psychology of Emotion: Self Discipline by Conscious Emotional Continence Hardcover – June, 1971

Fight Club: A Novel

Fight Club: A Novel Paperback – October 17, 2005

However, as per the The Resident @ RT ‘Fight Club’ author Chuck Palahniuk is taking credit for the term “snowflake” that is being used for “liberals” who are seemingly melting down after the 2016 election. He wrote in the book, ” You are not special. You are not a beautiful and unique snowflake.”

–https://www.youtube.com/watch?v=fK1bSzrAkkg

What’s NLP? as per Tarek

NLP is a hybrid science that was developed in the late 1960’s and early 1970’s by computer scientist, Richard Bandler, and linguist, John Grinder. They began a study of three therapists with excellent results transforming their clients’ ways of thinking, feeling and behaving. They modelled family therapist Virginia Satir, gestalt therapist Fritz Perls, and hypnotherapist Milton Erickson who legitimised hypnotherapy as a healing treatment modality by the American Medical Association.

As a result they devised a set of specific techniques that deliberately restructure toward positive functioning the brain’s thinking and the body’s behaviours by aligning the conscious with the unconscious mind and body. NLP offers highly refined tools to take charge of every area of life in the most effective way possible to produce results. It enables individuals to pro-actively design their physical and emotional response.

NLP techniques can help you:

  • Completely eradicate bad habits
  • Change old, unproductive thought patterns into positive actions
  • Exchange limiting beliefs for more productive ones
  • Replace unhealthy behaviours or desires with healthy ones
  • Motivate self and others to take action on goals
  • Create congruency within self and others
  • Increase likelihood of specific future outcomes
  • Improve learning abilities
  • Model and incorporate strategies from anyone
  • Eliminate mental and emotional blockage that prevent fulfilment of desires
  • Create new responses to old problems
  • Learn needed lessons from any experience to move on from it
  • Strengthen self image and charisma
  • Attract others

And much, much more…

refer to

NLP

http://www.nlppersuasion.com

 

 

Master Your T: The Definitive Guide To Raising Your Testosterone Naturally

Master Your T: The Definitive Guide To Raising Your Testosterone Naturally Paperback – September 12, 2016

WHY ARE CYBERCRIMINALS ATTRACTED TO COMMIT CRIMES

WHY ARE CYBERCRIMINALS ATTRACTED TO COMMIT CRIMES

FADI ABU ZUHRI

INTRODUCTION

Cybercrime has emerged as a new form of crime following the introduction of the internet. The actions of these crimes range from petty theft to destruction with malicious intent. Individuals who engage in cybercrime have a psychological mindset that is attuned to it. Like other forms of physical crime, cybercriminals are drawn to committing cybercrimes because of certain factors. As such, to curb cybercrime, law enforcement officers must understand their nature, why they get attracted to it, and how they can effectively reduce criminal behaviour. This paper discusses the motive behind cybercrime and what makes cybercrime attractive to cybercriminals.

Cybercrime attracts individuals with a will and ability to choose between right and wrong. The will to choose is influenced by the environment and heredity factors. Rogers (2010) believes that characteristic such as personality traits and socio-demographics and others correlate with the type of crime a cybercriminal commits. Rogers (2010) asserts that psychologists can develop taxonomies of criminals and their profiles based on these common features. These categories can be useful to law enforcement officers when developing effective and practical approaches to help reduce cybercrimes.

NINE MODELS OF CYBERCRIMINALS

Rogers, Smoak and Jia (2006) categorizes cybercrimes into nine models: Scrip Kiddies (SK) or Novice (NV), Cyber Punks (CP), Hachtivist (H) or Political Activists (PA), Thieves (T) or Petty Thieves (PT), Virus Writers (VW), Internals (IN), Old Guard Hackers (OG), Professional Group (P) or Professional Criminals (PC), Cyber-Terrorist (CT) or Information Warriors (IW).

The Novice (NV) criminals have limited programming and computer skills. They can only conduct their attacks when they have toolkits. Their motives for committing a cybercrime is primarily media attention. Cyber-Punks (CP) have advanced technical skills and can write their own software. They are well informed about the system they attack with many engaging in telecommunication fraud and stealing credit card numbers. Internals (IN) include the disgruntled ex-employees or employees, Petty Thieves (PT), Virus Writers (VW), Information Warriors (IW), Professional Criminals (PC), and Old Guard Hackers (OG). Virus Writers (VW) are coders that write script and use automated tools. They basically mentor Novice (NV). They seek to gain prestige and power. They have the capability of using strong malware such as Trojans to commit cybercrime. Disgruntled ex-employees or employees with technological know-how pose a security threat. They use the privileges of knowing the system to commit cybercrime (Rogers, Siegfried, & Tidke, 2006).

Hachtivist (H) or Political Activists (PA) comprises individuals or a group that justify their behaviour on moral grounds like political issues. However, it is very difficult to ascribe whether these motives are political as their actions have aspects of revenge, power, greed or just public attention (Rogers, Siegfried, & Tidke, 2006).

Petty Thieves (PT) are opportunistic computer literate people who take advantage of the organization’s poor internal security. Old Guard Hackers (OG) seem not to have the intention to commit a crime and are disinterested in intellectual activities. They disrespect personal property. Professional Criminals (PC) are specific in their activities. They hire guns and engage in corporate espionage. They have access to the necessary state-of-the-art equipment. They are also highly trained. Lastly, Information Warriors (IW) are well funded to participate in cyber attacks that may be politically motivated (Rogers, Siegfried, & Tidke, 2006).

Rogers (2010) combines the skill level and motivation into a circumflex model as shown in Figure 1. The four motivational aspects are (1) revenge, (2) financial, (3) notoriety and (4) curiosity. Information Warriors (IW), Professional Criminals (PC), Political Activists (PA) and Old Guard Hackers (OG) are at the highest level of skills. Internals (IN) and Virus Writers (VW) are motivated by revenge; Information Warriors (IW), Petty Thieves (PT) and Professional Criminals (PC) are motivated by financial motives; Cyber Punks (CP) and Political Activists (PA) are motivated by notoriety; and Novice (NV) and Old Guard Hackers (OG) are motivated by curiosity.

Figure 1: A circumplex model describing nine models of cybercriminals, their skill level and motives [Source (Rogers, 2010)]

SOCIAL LEARNING THEORY

Various theories from criminology, sociology and psychology explain why people offend. These theories suggest that the aetiology of cybercriminal behaviour is influenced by diverse factors: social control, industrialization, learning, psychopathologies, class strain and physiological deficiencies. Moral Disengagement and Social Learning Theories are the most popular theories used to explain what attracts cybercriminals to commit their criminals’ activities (Rogers, 2006).

Social Learning Theory posts that a high-level learning process can produce conforming or deviant behaviour. These theories view learning process as operating within the context of interactions, social structure and situations. It is suggested that the conforming or criminal behaviour resulting from the learning process is a function of reinforcement and other variables associated with social learning process. In view of Akers cited in Rogers and Siegfried and Tidke (2006) an individual is more likely to engage in cybercrime when the following circumstances exist. Firstly, the individual is differently related to other individuals who support, commit or model the legal and social norms. Secondly, the individual is less exposed to conforming models and more exposed to deviant models. Thirdly, the individual’s learning favours engaging in deviant acts. Lastly, the individual’s violative behaviour is supported and reinforced at the expense of the behaviour that supports the conformity to existing norms.

Social Learning Theory also suggests that differential imitation and reinforcement are the primary learning mechanisms for a cybercriminal. From this perspective, the learning mechanisms are influenced by and operate through differential association process. The social environment for the criminals is created through differential association (Rogers, 2006). The social environment exposes these offenders to imitation and definitions of models. While in a social environment, cybercriminals acquire definitions by observing, learning and imitation. Similarly, external and internal sources create differential reinforcement that presents themselves in the form of tangible rewards of the criminal activity. The rewards may include social rewards, money and increase in the status of the peer. Over time, the actions’ consequences and reinforcement prominently determines the probability with which the criminal activity will be sustained as imitation become less important. Social Learning Theory suggests that errant behaviour is likely to increase and continue unabated where there is very high ratio of two variables namely positive reinforcement and punishment. In view of this theory traditional learning mechanisms namely operant and classical learning influence the offender’s criminal behaviour. Again, it becomes difficult for law enforcement officers to neutralize the criminal’s errant behaviour where the there is a resilient learning paradigm that is caused by variation in the ratio of positive reinforcement to the punishment administered (Rogers, 2006).

MORAL DISENGAGEMENT MODEL

The Moral Disengagement model by Bandura (1996) examines the process via which criminals justify and rationalize their aberrant or deviant behaviour. The moral engagement asserts that individuals tend to participate in behaviour that goes against their moral standards, and that these actions may lead to self-sanctions and possibly self-condemnation. Bandura (1990) argues that individual behaviours are influenced by moral standards. Bandura (1990)’s self-regulatory system only functions when activated. Bandura (1990) held that it is possible to disengage self-sanctions from behaviour. From the Social Cognitive Theory perspective, these mechanisms are viewed as Moral Disengagement (Bandura, Barbaranelli, Caprara, & Pastorelli, 1996).

In view of this theory, cybercriminals may defeat their internal moral control in the self-regulatory systems by ensuring their internal moral control decoupled from detrimental conduct in four ways identified in Bandura et al. (1996). These include obscuring personal causal agency, disregarding or misrepresenting the action’s negative consequences, re-construing the conduct, and vilifying the victims, blaming them and mistreating them. Evidence show that cybercriminals often reduce self-censure by using these four methods of Moral Disengagement. It is believed that these criminals often misconstrue or minimize the consequences.

It is also believed that individuals who engage in cybercrimes demonstrate higher rates of differential reinforcement, differential association, and moral disengagement as compared to non-criminals. It is also believed that a combination of these three (i.e., moral disengagement, differential reinforcement and differential association) better predicts the behaviour of a cybercriminal (Rogers, Siegfried, & Tidke, 2006). Social Learning Theory posits that the continuation of a criminal activity may be influenced by the interaction between the reinforcement and the neutralizing definitions.

SOCIAL CONTROL THEORY

Social Control Theory on the other hand provides an explanation on why people obey rules and how behaviour conforms to expectations in society. Social Control Theory suggests that internal constraints develop during childhood and crime occurs because of inadequate constraints. In other words, the free will gives offenders the choice and consequently responsibility for their deviant behaviour (Kempf-Leonard & Morris, 2012).

Social Control Theory supports the assertion that online anonymity encourages permissiveness. According to Social Control Theory, individuals are compelled to refrain from criminal and deviant behaviours where social controls, including social ostracisation and laws are present. However, the deviance grows where the controls or assumed power of controls are missing or diminished (Rogers, Siegfried, & Tidke, 2006).

ANONYMITY

Lastly, a unique factor in cybercrime that attracts cybercriminals is anonymity. Internet protocols allows individuals to operate virtually anonymously. The anonymity afforded by Internet has been leveraged by cyber-predators and paedophiles that gain the victims’ trust by pretending to be young females. Internet’s underlying protocols and technology allows these criminals to make it virtually impossible for victims to track them by obfuscating their physical locations. Studies on individuals’ behaviour online have revealed that individual’s real world behaviour differs from online behaviour. It is believed that people reflect their true nature in the real world where self-control and societal pressures and norms regulate behaviour (Rogers, 2006). It is believed that real world moderate individuals’ behaviour is based on social identity that incorporates cultural morality and social norms.

CONCLUSION

As technology becomes pervasive in our connected world, it has brought certain deviant characters along with it. These cybercriminals have developed their skills to a level where they can cause massive destruction to social life and commerce. This article tries examines the motives behind cybercriminals to understand who engages in these activities and why they do it.

Even though cybercrime is considered a new type of crime, the motives behind it are not new. A model was presented that classifies cybercriminals based on their skill levels and their motives. Motives have been broadly categorised in four – revenge, financial, notoriety and curiosity. Four different social theories were examined – Social Control Theory, Moral Disengagement Theory and Social Control Theory. Anonymity is also seen as a contributor to deviant behaviour.

REFERENCES

Baggili, I. (2009). Effects of anonymity, pre-employment integrity and anti-social behavior on self-reported cyber crime engagement: An exploratory study. Purdue University.

Bandura, A. (1990). Mechanisms of moral disengagement. In W. Reich, Origins of Terrorism; Psychologies, Ideologies, Theologies, States of Mind (pp. 161-191). New York: Cambridge University Press.

Bandura, A., Barbaranelli, C., Caprara, G., & Pastorelli, C. (1996). Mechanisms of moral disengagement in the exercise of moral agency. Journal of Personality and Social Psychology , 71, 364-374.

Bednarz, A. (2004). Profiling cybercriminals: A promising but immature science. Retrieved 2016 from Network World: http://www.networkworld.com/article/2327820/lan-wan/profiling-cybercriminals–a-promising-but-immature-science.html

Rogers, M. K. (2006). The development of a meaningful hacker taxonomy: A two dimensional approach. Digital Investigations , 97–102.

Rogers, M. K. (2010). The Psyche of Cybercriminals: A Psycho-Social Perspective. In S. Ghosh, & E. Turrini, Cybercrimes: A Multidisciplinary Analysis (pp. 217–235). Berlin: Springer-Verlag.

Rogers, M. K., Siegfried, K., & Tidke, K. (2006). Self-reported computer criminal behavior: A psychological analysis. Lafayette: The Digital Forensic Research Conference.

Rogers, M. K., Smoak, N., & Jia, L. (2006). Self-reported criminal computer behavior: A big-5, moral choice and manipulative exploitive behavior analysis. Journal of Deviant Behavior , 27 (3), 245–268.

Translate »