Analysis of Computer Crime Pattern and Criminal Characteristics

博士 === 中央警察大學 === 犯罪防治研究所 === 89 === Current studies which deal with increasingly serious computer crimes can be divided into two categories: one is applying security technique to prevent computer crimes; the other is enacting new laws to prosecute and punish computer criminals. However, no matter h...

Full description

Bibliographic Details
Main Authors: Liao, You-lu, 廖有祿
Other Authors: Lin, Tsan-chang
Format: Others
Language:zh-TW
Published: 2001
Online Access:http://ndltd.ncl.edu.tw/handle/uj3fmw
id ndltd-TW-089CPU00102014
record_format oai_dc
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 博士 === 中央警察大學 === 犯罪防治研究所 === 89 === Current studies which deal with increasingly serious computer crimes can be divided into two categories: one is applying security technique to prevent computer crimes; the other is enacting new laws to prosecute and punish computer criminals. However, no matter how difficult password cracking is and how tight access control has become, there are still some potential criminals who are able to break through security loopholes. Moreover, since the related evidence of computer crimes is very vulnerable to destruction and the source of criminal trailing is difficult to identify, the dark figure of computer crime is terribly high. In order to fill the disjunction between the security technique and the legal norm, it is crucial to make improvement in the skill and the technique of investigation. The approach of deploying intangible psychological evidence to explore the motivation and modus operandi of criminals has been applied, whereby the scope of investigation can be narrowed progressively to identify specific suspects. This criminal profiling technique, though newly developed, has been adopted and proved to be useful in the investigation of crimes like serial killing, rape, bank robbery and arson. Due to its success, the technique has also been applied to the tracing of computer and cyber criminals and related studies. Studies of this type are characterized by their threefold procedures. At the beginning, information about the criminals is solicited from their relatives and friends in order to understand their growing history. Secondly, a content analysis of official records and related evidences of law enforcement is conducted so as to get familiar with the whole process of criminal proceedings. The third and also the most important part is to interview criminals face to face to develop a clear picture of their modus operandi and crime signature. A lot of information and material can be accumulated through this and thereby facilitate prevention and investigation of these crimes. This research is an empirical study of computer crime. It focuses on classifying and analyzing various aspects of relevant data gathered empirically, aiming to find out the pattern of computer crimes, profile the motivation of criminals, and establish a theoretical framework. The ultimate goal is to help investigators interpret computer crimes easily but correctly and provide useful and practical literature for future studies. According to the analysis of computer crime characteristics, the majority of computer crimes are regarding distribution of pornography and copyright infringement. The crime is mainly residence in urban areas. Crimes are mostly committed alone and repeatedly until being discovered. The motivation is mainly for profit. The offenders are, for the most part, male, young at age, unemployed(or students), well educated with college degrees or higher and usually possess no criminal records. Many handicapped people are involved. The investigation and trial of such crimes fall within the jurisdiction of few criminal justice agencies. The funnel effect, therefore, emerges. The number of crime is getting higher due to the lenient punishment and high rate of fines and probation. While doing the crime pattern analysis, related cases were first classified and divided into 26 patterns, which were then synthesized into nine types. In the next step, three categories were separated, namely computer as communication tools, storage media, and criminal targets. A general pattern of overall computer crimes was abstracted finally. This pattern includes eight phases, including triggering incidents, preparation, instruments and methods, option of space and time, escape supervision, taking actions, afterward disposal, and vanishing evidence. The pattern is so complete that it is of great value in helping us understand, prevent and investigate computer crimes. As to the analysis of criminal characteristics, 13 offenders and correspondents were interviewed. After a general observation, the criminals’ backgrounds, course of criminality, processing modes and afterward review were examined. Nine types of crimes were covered, including illegal sale, inciting crime, cyber fraud, impair reputation, copyright refringement, distribution of pornography, infringement of secrets, computer virus, and illegal use of computers. In addition to the above-mentioned data analysis, the summary and discussion of findings as well as the comparison between research findings and previous studies are also important parts of the research. Although the new technique is more complicated and difficult to undergo, the information and results acquired can undoubtedly make up for the inadequacy of official data, and correct deviant perspectives of the public and law enforcers.
author2 Lin, Tsan-chang
author_facet Lin, Tsan-chang
Liao, You-lu
廖有祿
author Liao, You-lu
廖有祿
spellingShingle Liao, You-lu
廖有祿
Analysis of Computer Crime Pattern and Criminal Characteristics
author_sort Liao, You-lu
title Analysis of Computer Crime Pattern and Criminal Characteristics
title_short Analysis of Computer Crime Pattern and Criminal Characteristics
title_full Analysis of Computer Crime Pattern and Criminal Characteristics
title_fullStr Analysis of Computer Crime Pattern and Criminal Characteristics
title_full_unstemmed Analysis of Computer Crime Pattern and Criminal Characteristics
title_sort analysis of computer crime pattern and criminal characteristics
publishDate 2001
url http://ndltd.ncl.edu.tw/handle/uj3fmw
work_keys_str_mv AT liaoyoulu analysisofcomputercrimepatternandcriminalcharacteristics
AT liàoyǒulù analysisofcomputercrimepatternandcriminalcharacteristics
AT liaoyoulu diànnǎofànzuìmóshìjífànzuìzhětèzhēngfēnxīzhīyánjiū
AT liàoyǒulù diànnǎofànzuìmóshìjífànzuìzhětèzhēngfēnxīzhīyánjiū
_version_ 1719090795331452928
spelling ndltd-TW-089CPU001020142019-05-15T19:37:29Z http://ndltd.ncl.edu.tw/handle/uj3fmw Analysis of Computer Crime Pattern and Criminal Characteristics 電腦犯罪模式及犯罪者特徵分析之研究 Liao, You-lu 廖有祿 博士 中央警察大學 犯罪防治研究所 89 Current studies which deal with increasingly serious computer crimes can be divided into two categories: one is applying security technique to prevent computer crimes; the other is enacting new laws to prosecute and punish computer criminals. However, no matter how difficult password cracking is and how tight access control has become, there are still some potential criminals who are able to break through security loopholes. Moreover, since the related evidence of computer crimes is very vulnerable to destruction and the source of criminal trailing is difficult to identify, the dark figure of computer crime is terribly high. In order to fill the disjunction between the security technique and the legal norm, it is crucial to make improvement in the skill and the technique of investigation. The approach of deploying intangible psychological evidence to explore the motivation and modus operandi of criminals has been applied, whereby the scope of investigation can be narrowed progressively to identify specific suspects. This criminal profiling technique, though newly developed, has been adopted and proved to be useful in the investigation of crimes like serial killing, rape, bank robbery and arson. Due to its success, the technique has also been applied to the tracing of computer and cyber criminals and related studies. Studies of this type are characterized by their threefold procedures. At the beginning, information about the criminals is solicited from their relatives and friends in order to understand their growing history. Secondly, a content analysis of official records and related evidences of law enforcement is conducted so as to get familiar with the whole process of criminal proceedings. The third and also the most important part is to interview criminals face to face to develop a clear picture of their modus operandi and crime signature. A lot of information and material can be accumulated through this and thereby facilitate prevention and investigation of these crimes. This research is an empirical study of computer crime. It focuses on classifying and analyzing various aspects of relevant data gathered empirically, aiming to find out the pattern of computer crimes, profile the motivation of criminals, and establish a theoretical framework. The ultimate goal is to help investigators interpret computer crimes easily but correctly and provide useful and practical literature for future studies. According to the analysis of computer crime characteristics, the majority of computer crimes are regarding distribution of pornography and copyright infringement. The crime is mainly residence in urban areas. Crimes are mostly committed alone and repeatedly until being discovered. The motivation is mainly for profit. The offenders are, for the most part, male, young at age, unemployed(or students), well educated with college degrees or higher and usually possess no criminal records. Many handicapped people are involved. The investigation and trial of such crimes fall within the jurisdiction of few criminal justice agencies. The funnel effect, therefore, emerges. The number of crime is getting higher due to the lenient punishment and high rate of fines and probation. While doing the crime pattern analysis, related cases were first classified and divided into 26 patterns, which were then synthesized into nine types. In the next step, three categories were separated, namely computer as communication tools, storage media, and criminal targets. A general pattern of overall computer crimes was abstracted finally. This pattern includes eight phases, including triggering incidents, preparation, instruments and methods, option of space and time, escape supervision, taking actions, afterward disposal, and vanishing evidence. The pattern is so complete that it is of great value in helping us understand, prevent and investigate computer crimes. As to the analysis of criminal characteristics, 13 offenders and correspondents were interviewed. After a general observation, the criminals’ backgrounds, course of criminality, processing modes and afterward review were examined. Nine types of crimes were covered, including illegal sale, inciting crime, cyber fraud, impair reputation, copyright refringement, distribution of pornography, infringement of secrets, computer virus, and illegal use of computers. In addition to the above-mentioned data analysis, the summary and discussion of findings as well as the comparison between research findings and previous studies are also important parts of the research. Although the new technique is more complicated and difficult to undergo, the information and results acquired can undoubtedly make up for the inadequacy of official data, and correct deviant perspectives of the public and law enforcers. Lin, Tsan-chang Chang, Ping-wu 林燦璋 張平吾 2001 學位論文 ; thesis 245 zh-TW