Você está na página 1de 12

Journal of Digital Forensics, Security and Law, Vol.

9(1)

This work is licensed under a Creative Commons Attribution 4.0 International License.

IDIOGRAPHIC DIGITAL PROFILING: BEHAVIORAL


ANALYSIS BASED ON DIGITAL FORENSICS
Chad M. Steel
George Mason University
P.O. Box 6136
McLean, Virginia 22102
csteel@gmu.edu

ABSTRACT
Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics.
Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand
the aggregate behaviors of cybercriminals. This work is the first to take an idiographic approach by examining
a particular subject's digital footprints for immediate use in an ongoing investigation. IDP provides a
framework for investigators to analyze digital behavioral evidence for the purposes of case planning, subject
identification, lead generation, obtaining and executing warrants, and prosecuting offenders.
Keywords: digital profiling, behavioral analysis, forensic psychology

1. INTRODUCTION taxonomy relevant to hackers that included most


traditional cybercrimes including virus writing,
Behavioral analysis, once the exclusive domain of
hacking, and professional criminals. (Rogers, A two-
the Federal Bureau of Investigations profilers, had
dimensional circumplex approach to the
turned into a mainstream area of scientific study.
development of a hacker taxonomy, 2006). Rogers
Originally focused on violent offenders, behavioral
(2010) further applied the concept of social learning
analysis utilizes concepts like motive, modus
theory and moral disengagement toward furthering
operandi, signature behaviors, offender typologies
the understanding of cybercriminal behavior.
and victim profiles to better investigate criminal
activity, understand offender motivations, link Victimology has been studied in several areas of
criminal acts, and target demographics for digital crime. Online fraud and how victims are
prevention efforts. selected was studied as part of a Microsoft study on
Nigerian 419 scammers (Herley, 2012). Similarly,
Digital behavioral analysis is a relatively new field
Ngo and Paternoster (2011) looked at victim profiles
that applies the concepts of traditional behavioral
in general across multiple types of cybercrime.
analysis to the digital footprints of criminals. The
crimes analyzed can be digital crimes, or those that Finally, profiles of user behavior on computers have
are digitally facilitated through researching, been researched. In Digital Profiling: A Computer
planning, communicating, documenting, or Forensics Approach and Digital Scene of Crime:
otherwise enabling criminal activity. Some Technique of Profiling Users, Colombini and
preliminary work was done in this field by applying Collella (2013) develop a set-theoretic approach to
a traditional criminological approach to cybercrime. building a usage profile of an individual on a device
Grabosky proposed a criminological approach to for the purposes of linking profiles across devices
computer crime, providing a categorization of (Colombini, Colella, & Italian Army, 2012).
computer-specific offenses (Grabosky, 2000).
Most of the prior art takes a nomothetic approach to
The development of typologies and taxonomies of behavioral analysis by attempting to understand the
cybercriminals has also been proposed. Krone aggregate behaviors of cybercriminals. This work is
proposed a typology for a specific type of computer the first to take an idiographic approach to digital
criminalthe child pornographer (Krone, 2004). profiling by examining a particular subjects Internet
Nykodym, et al. (2005) proposed a similar typology activities and electronic media for the purposes of
for insider cybercriminals. Rogers (2010) detailed a

7
Journal of Digital Forensics, Security and Law, Vol. 9(1)

using digital footprints left behind for immediate use Ulbricht with a picture that matched his Google+ and
in an ongoing investigation. LinkedIn pictures.
The Dread Pirate Roberts contain a link to mises.org
2. GOALS OF IDIOGRAPHIC DIGITAL
in his signature on Silk Road postings. The Dread
PROFILES
Pirate Roberts regularly posted using a Pacific
Building a profile of a subject in a criminal Standard Time (PST) time code.
investigation can be used to provide probable cause
IP address logs showed logins to the Silk Road
for and facilitate the execution of search warrants,
website from an administrator at an Internet cade
assist in subject interviews, link criminal activity,
near Ulbricht's home in San Francisco.
and provide additional case leads. An informative
example can be found in the criminal complaint filed The logins to Ulbricht's Google account occurred
against Ross William Ulbricht, aka The Dread from the home of a friend of Ulbrichts. Ulbricht and
Pirate Roberts, the alleged mastermind behind Silk his friend posted YouTube videos confirming they
Road, the Darknet service that facilitated the sale of lived together.
illegal drugs and banned items over TOR. Silk Road
Ulbricht logged on to the site Stack Overflow with
was estimated to have over one billion dollars (US)
his Google account information and asked "How can
in annual revenue. Some of the key profile findings
I connect a Tor hidden service using curl in php?"
that assisted in tracking Ulbricht and obtaining a
One minute after posting, Ulbricht changed his Stack
warrant for his arrest include the following:
Overflow name from "Ross Ulbricht" to "frosty" and
The first mention of Silk Road was on his registered email to "frosty@frosty.com". The
www.shroomery.org by the user altoid, appearing SSH key on the Silk Road server was
to be a veiled advertisement for the service and frosty@frosty.com.
provide pointers on how to find it. Altoid only
The special agents investigating Ulbricht eventually
posted one message to the site, and directed users to
tracked a shipment of fake identity documents that
the blog silkroad420.wordpress.com, which was
he solicited as the Dread Pirates Roberts to his home,
started 4 days earlier by an anonymous TOR user.
and used the above information to tie him to the
Two days later, a user with the name altoid posted illicit Silk Road marketplace. The FBI seized the
another advertisement with similar wording for a Silk Road web servers on 2 October 2013 (United
heroin store on bitcointalk.org and pointed users States Government, 2013).
to the same blog.
The Silk Road forensics work highlights some of the
Eight months later, the user altoid posted another key elements of creating a digital profile for an
message to the bitcointalk.org board looking for an originally unknown offender. Their investigators
IT pro. The post requested the user respond to found key identifiers associated with the crime,
rossulbricht@gmail.com. linked the anonymous identifiers to sites that had
real name identities, obtained information on the
The Google account was registered to a Ross
technical expertise and social interactions of the
Ulbricht. The picture on his Google+ account was
subject, and used IP address geolocation to tie
the same as a Ross Ulbricht that had registered a
activity in the virtual world to a physical address.
LinkedIn account. The LinkedIn account listed
This highlights several of the goals in developing an
Ulbricht as being 29 years old, with a BS in physics
idiographic digital profile:
from the University of Texas and attendance at a
graduate program at the University of Pennsylvania Cross-site Tracking. Tracing an individuals
in Materials Science and Engineering. Ulbricht actions across multiple sites through their
stated in his profile that he was now involved in an use of common phrases, signatures, or
"economic simulation" of living in a "world without usernames can open up previously unknown
the systemic use of force" by "institutions and leads. Creating a list of relevant sites can
governments. also generate a list of locations where the
Ulbricht's Google+ profile contained a link to videos subjects passwords can be obtained more
on mises.org. The site had a user profile for Ross easily in the event strong encryption is

8
Journal of Digital Forensics, Security and Law, Vol. 9(1)

encountered locally, given likely password investigators to have the requisite skills
reuse (Gaw & Felten, 2006). available to assist the interviewers.
Identifying an Anonymous Subject. The ultimate goal of the proposed framework is to
Anonymous users are likely to break organize digital intelligence regarding a subject into
discipline and inadvertently use real a timely, actionable profile.
information (or a real location) at some
point, creating an avenue for identification. 3. DIGITAL PROFILE FRAMEWORK
Using the cross-site tracking information
and legal processes (e.g., subpoenas), a The proposed digital profile framework is broken up
users true identity can be uncovered. into two sections, digital biographical information
Mapping a Criminal Enterprise. The skills and a multi-axis competency/affinity profile. The
and sophistication of a subject can identify digital biographical information consists of
their role in a criminal enterprise, ranging identifiers, websites, signatures, usernames,
from head boss to technical advisor to hired passwords, and other information that can provide a
gun. Skills can be criminally oriented, such pattern of usage for a subject. It can also include real
as building IEDs or hacking, or legitimate life biographical data if that information is known.
skills that can support criminal activity, such The profile axes are both quantitative and
as financial or coding expertise. qualitativethey evaluate the subjects abilities in
Enumerating Associates. Understanding the four areas: technical ability, countermeasures,
social network that a subject engages with is sociability, and domain ability. Both sections of the
helpful in targeting underlings or peers for profile should be considered dynamic and should be
initial investigative action. By prosecuting revised as more information is obtained about the
other subjects lower down the food chain, subject.
investigators can work upward (or sideways,
in the case of peers) to the prime subject. 3.1 Digital Biography
Having an assessment of the sociability of The digital biography serves as a tracking
the subject can also assist in decision mechanism for all currently known (and suspected)
making regarding the likely efficacy of information about the subjects Internet activities.
consensual monitoring or account takeover The search for information should be iterative
actions. identifying a unique, new username might trigger a
Obtaining and Executing a Warrant. The Google search for permutations of that same
material gathered during the creation of the username. Similarly, the identification of a signature
profile can help link the subjects activities in a web forum posting may trigger a search for that
to assist in obtaining probable cause for a same signature, leading to additional usernames on
search and/or arrest warrant. Obtaining a different forum. The information included can be
information on the countermeasures considered probabilistic until confirmed through
deployed by the subject (in the Silk Road independent corroboration.
case, deletion of information on a VPN
Generally, a single email address or message posting
server) can help in planning the execution to
is the starting point for gathering information. That
avoid unintentional or deliberate data
identifier is then searched for and the relevant,
destruction.
resulting pages are subpoenaed to obtain subscriber
Providing Subject Interview Insights.
information, with any additional identifiers taken
Understanding the motivation and mindset
from the returns. That information is then collected,
of a subject can assist investigators in theme
and the process is repeated iteratively until all leads
development for an interview. Additionally,
are exhausted (Compton & Hamilton, 2011).
being able to assess the technical skills of
Information may be obtained directly via subpoena
the subject provides a barometer to
or through a Mutual Legal Assistance Treaty
determine if an individual is being deceptive
(MLAT), but not all information is likely to be
regarding those skills, and allows
located with providers that are accessible through
these mechanisms and some leads may not be able

9
Journal of Digital Forensics, Security and Law, Vol. 9(1)

to be fully explored. The information that should be circumstances, investigators can request a
included in the biographical section includes the trap/trace on any IP addresses of interest,
following: and may want to consider subpoenas to the
major search providers for additional
Identifiers. Any usernames/email
activity from those IP addresses. All IP
addresses/handles used on any websites are
addresses identified should have the date
useful in tracking the activities of a subject.
and time noted for later correlation through
The more obscure the username, the easier
device forensics.
it is to search for and individuate. When
Locations. Any physical locations
subpoenaing information from providers,
mentioned by the subject or associated with
any subscriber information, IP addresses
the subject (through IP geolocation, for
that accessed the site under that subscribers
example) should be collected. Posting times
identity, passwords (if available), and
(and time zone information) should be
answers to recovery questions should be
collected as well for future use in tracking
obtained.
the subjects movements and determining
Passwords. Because subjects are likely to
the subjects current location. Codepages
reuse passwords, any passwords available
used and browser languages in request
from sites that do not store hashes (or store
strings, if logged, can assist in country-of-
non-salted hashes that can be attacked)
origin checks.
should be obtained. Subjects may re-use
Associates. The identifiers of all of the
those same passwords on harder-to-break
subjects associates, from contacts on social
drive encryption like TrueCrypt or PGP, or
networking sites to individuals using the
may use permutations of a previous
same IP addresses, should be collected and
password. Personal information, including
retained. The decision on whether or not to
other passwords, can be used to create a
build a profile on known associates will be
custom attack dictionary for tools like
an investigation specific decision based on
AccessDatas DNA or the Passware suite.
resource availability.
Sites Visited. Each of the sites visited by the
subject can be cross-searched for all of the The biographical information can be correlated with
other identifiers found and the results can be any non-digital information acquired from
monitored on a go-forward basis. The types commercial and governmental sources. In the United
of sites visited may provide insight into States, this includes law enforcement databases like
interests or hobbies, technical the Federal Bureau of Investigations National
competencies, or social contacts that are Crime Information Center and commercial
helpful in building a profile. The aggregators like Choicepoint, TLO, and Lexis-
investigator should request the web logs of Nexis. The non-digital information can be iteratively
any accesses from the same IP addresses at combined with the digital information until all
identified sites. These may include referrer reasonable leads have been followed.
information that links to other sites used by
the subject, or browser string history that 3.2 Affinity/Competency Axes
will provide details about the subjects web As noted above, psychographic information about an
access methods. offender obtained through digital forensics is used to
IP Addresses. IP addresses used by the create a multi-axis profile. The technical ability axis
subject can be obtained based on the web covers a subjects technical skill, as well as their
logs from all of the identified sites as noted adoption of new technologies (technophilia). The
above, and through subpoenas to the countermeasures axis looks at the subjects use of
subjects residential Internet Service protective measures both before and after criminal
Provider. The investigator should also activity. The sociability axis looks at a subjects
search for all IP addresses in Google (some social interactions, both online and offline. The
sites leave web logs or similar tracking domain ability axis evaluates the subjects
mechanisms viewable). Depending on the criminally relevant skillset, generally with the help

10
Journal of Digital Forensics, Security and Law, Vol. 9(1)

of a domain expert. While each axis can be 3.2.1.2 Casual User. The casual user is the most
quantified, which may be helpful in multi-offender common subject encountered. These subjects grew
conspiracies when deciding which subject to target, up using digital technology or acquired skills and
they are more useful as qualitative measures in built proficiency through extensive work or personal
investigative planning, developing interview use. They will use technologies that they are
themes, and performing investigative actions. comfortable with, and will adopt new technologies
as they become more commonplace.
3.2.1 Technical Ability
The casual user may have gaps in their knowledge,
Technical ability, for the purposes of profiling,
but will know how to conduct Internet searches,
consists of a subjects expertise with digital
install software, send emails and instant messages,
technologies, as opposed to other technical skills
and take pictures with their smartphone and send
(e.g., engine repair). There are two distinct subareas
them via MMS. The casual user does not understand
that are of interest in the investigative profile
nor seeks to understand the science behind most of
general expertise and the adoption of new
what they do, does not read technical blogs, and is
technologies.
not interested in technology for technologys sake.
General computer literacy can be difficult to assess, The amount of digital material that the casual user
even through direct testing. Self-assessment has possesses is going to be a factor of their
been shown to be inaccurate (Merritt, Smith, & discretionary income and their need to keep up with
Renzo, 2005), and the assessor needs to have an the Joneses. They will regularly upgrade their cell
equal or greater level of literacy than the subject to phones every two years, will own a tablet and a
adequately evaluate their skills. As such, it is laptop, and may have a digital camera lying around.
invaluable to utilize digital forensics specialists in The casual user is not likely to have multiple hard
making this assessment. While investigators may drives or extensive amounts of external storage
encounter subjects who have a deep expertise in a beyond what they use for backup.
narrow area of computing (e.g., printer repair), this
The casual user may have an expansive online
is atypical and can be accounted for by noting the
footprint. Extensive use of social media and the
discrepancy in skills as part of the profile. Subjects
presence of a small number of email accounts are not
can be grouped into five categories based on their
uncommon, and are bounded by the sociability axis
general computer abilities.
rather than technological understanding. They are
3.2.1.1 Functionally Illiterate. These subjects are likely to use a single search engine, and may
not likely to make use of digital technologies. They regularly visit web locations based on their non-
will have little to no online footprint beyond a single computing interests. The casual user has no
email account, and if they do utilize a computer it is problems ordering goods from Amazon, watching
to perform a specific task, such as checking email, Netflix on their Xbox, or doing banking online.
that they have learned through rote memorization. If
3.2.1.3 Power User. The power user is differentiated
they have a cell phone at all, it is likely to be a feature
by a love of technology, but does not have a formal
phone and used solely for voice calls. They are not
background in computer science or computer
likely to own or use digital cameras, tablets, or other
engineering. The power user is very likely to utilize
high tech gear.
preventative measures (see countermeasures below)
The functionally illiterate subject will resist adopting without a deep understanding of how to deploy
new technologies unless provided a use case that them. They may utilize software like TOR out of
makes it impractical to avoid. There will likely be curiosity, and then abandon it shortly thereafter.
minimal digital evidence to examine with these They will have multiple email accounts and an
subjects, though the use of older technologies may extensive online presence. The power user is more
be more common due to their comfort level and likely than the casual user to adopt multiple online
memorization-based understanding. In general, personas, and may use different personas for
individuals that are functionally illiterate dont different actions.
require a digital profile.
Power users understand how technology works
together, but are missing many of the foundational

11
Journal of Digital Forensics, Security and Law, Vol. 9(1)

concepts of computing. They know what an IP understanding. They may continue to use a platform
address is, but do not understand how routing works. for an extended period, staying with Android phones
They will be able to talk about the features of the instead of moving to iOS just because a sleek new
latest chipset, but would not be able to build a logic device is available. Because they have a strong
gate. The power user is also likely to overestimate knowledge investment, they may hold on to older
their knowledge base in relation to others. systems longer, but once they do switch they quickly
attain a mastery level of the new technology. While
Power users are very interested in new technologies,
power users and IT professionals may have
and will acquire the latest and greatest toys to play
programming skills, the computer scientist has
with. The power user will install numerous software
software engineering skills. While a programmer
packages on their systems. Executing a warrant on
can develop new software, a computer scientist
the residence of a power user is likely to require
develops new algorithms.
extensive time, as they will have multiple devices
from most current technological categories. Executing a search warrant on the home of a
computer scientist should be done with caution.
3.2.1.4 IT Professional. Unlike the power user, the
They are not as likely to have made mistakes in
IT professional uses technology as a means to an
setting up their systems, and may have employed
end. They are likely to have a degree or other formal
less common (or even homebrewed) protections on
training in information technology, and are likely to
their systems.
hold certificates in networking or system
administration. They may have programming skills, Determining what level of skill a particular subject
and possess an accurate understanding of the terms is at can be challenging, but there are areas that can
and concepts related to technology that they use in assist in the determination, including:
conversation.
Education. Does the individual possess
The IT professional, unlike the power user, is more degrees or certifications in digital
likely to bring home their knowledge and expertise technology, or have they attended basic or
to professionalize their personal technology usage. advanced skills training?
They are likely to have a backup strategy, to Terminology. In the subjects
maintain up-to-date antivirus on their systems, and communications, do they discuss
to employ encryption appropriately. technology and do they use technical terms
The IT professional may or may not have an accurately?
extensive online footprint, depending on their Sites Visited. Are the sites they visit
sociability. Their usage of technology sites is more oriented toward gadgets, toward
likely to be learning and problem-solving oriented, implementation guidance, or toward
as opposed to gadget-oriented. Some IT research? Does the subject post on
professionals may be technophileslike the power discussion boards related to technology, and
user they might spend discretionary income on tech are they asking for guidance or providing it?
toysbut they are more likely to understand concepts Device Ownership. How frequently does
like upgrade cycles and not necessarily buy or the subject purchase new cell phones,
deploy the first version of a new technology. tablets, or laptops? What does the subject do
with their old equipment?
3.2.1.5 Computer Scientist. The computer scientist Physical Activities. Does the subject attend
has a deep background in computing, with degrees conferences related to information
in computer science or computer engineering technology or subscribe to professional
(although rare, autodidacts at this level do exist). journals?
They possess a deep understanding of computer
operations, and can develop their own software and The subjects technical ability and financial standing
hardware if needed. both impact their technophilia, or desire to possess
and use new equipment. A subject may spend a large
While the power user employs technology for its amount of their discretionary income on acquiring
own sake, the computer scientist will be more likely the latest technology for social standing reasons as
to stay with a technology for which they have a deep well as technical reasons. Because of this, the

12
Journal of Digital Forensics, Security and Law, Vol. 9(1)

possession of the latest device is not necessarily an countermeasures are likely to be encountered. While
indicator of technical ability, but it does show a password reuse is a boon for investigators when
willingness to adopt new technology. strong encryption is encountered, reuse tends to be
inversely proportional to the complexity of the
Subjects who have low technical ability but adopt
password employed (Florencio & Herley, 2007).
technology extensively are frequently the best
individuals to digitally exploit. They are more likely 3.2.2.2 Device Sharing. Subjects that share physical
to incorporate technology into all aspects of their space with others, including spouses and roommates,
life, including the criminal ones, and their low ability may have common devices. These can include
may mean they have not taken adequate protective anything from wireless access points to laptops, and
steps (or implemented them properly if they have). may have separate user accounts for each individual.
Because sharing generally requires setting up an
3.2.2 Countermeasures
additional account, the act of not sharing is a low-
Related to but separate from the technical axis is the level countermeasure. Subjects that
subjects use of countermeasures. While there is compartmentalize their criminal activities may share
some overlap between the subjects technical ability some devices but refuse to allow access to others,
and their use of basic protections, it is not absolute. potentially making the restricted use devices higher
The computer scientist may not bother to encrypt value targets when performing a forensic triage.
their hard drive for performance reasons, while the
3.2.2.3 Network Usage. The conditions under which
casual user may have a password and encryption
a subject connects to the Internet can show both their
employed on their new iPhone because it was
technical knowledge and risk aversion. At home, a
recommended by a friend.
reasonable countermeasure would be the use of
Countermeasures can be grouped into two WPA2, which comes pre-configured on most
categoriesthose that are deployed to prevent modern routers. Using a wired-only connection may
detection, and those that are deployed to hamper an be a countermeasure (or may indicate the subject is
investigation. Some technologies, such as a high-end gamer or using older equipment). An
encryption, can serve both purposesa child aware subject isnt likely to login to their personal
pornographer might encrypt files that they send to email from a hotel kiosk, but they may use open
other child pornographers to prevent their email wireless access points in places with few cameras to
provider from detecting the contraband traversing connect to the Internet semi-anonymously.
their network. Similarly, they may encrypt their files
3.2.2.4 Basic Software Protections. Most
at rest to prevent them from being used as evidence
computers come with at least a trial version of anti-
against them if they are caught.
virus and anti-malware software pre-installed.
Although the use of digital countermeasures by Because automatic updates to the operating system
criminals has been well documented for decades, are turned on by default in modern operating
(Denning & Baugh Jr., 1999) they have not been systems, patch currency is less of an indicator than it
evaluated on a continuum to-date. There are multiple used to be. More technical users may custom
levels of digital countermeasure that can be configure software firewalls, turn off unnecessary
deployed by criminals detailed below, and each services, or run additional anti-malware software. At
represents a higher degree of protection (and the extreme, a subject may run a profiling
possibly paranoia). application to identify new applications or services
3.2.2.1 Passwords. Passwords have become so on their system.
ubiquitous that their absence is more of an anomaly 3.2.2.5 Encryption. The use of encryption generally
than their presence. Despite user education, requires the subject to take active steps to install and
however, most users will choose poor passwords in manage additional software. Subjects can use
the absence of complexity controls. Additionally, encryption at-rest, and software including PGP and
users will re-use passwords (or variants of TrueCrypt can provide encrypted files, encrypted
passwords) on multiple sites. Choosing stronger containers, or encrypted drives that cannot be
passwords and not re-using passwords show unencrypted by brute force if the subject chooses a
disciplined behavior and more complex strong password. Encrypted containers and

13
Journal of Digital Forensics, Security and Law, Vol. 9(1)

encrypted files are of particular interest in that they more likely to be vigilant about aberrant connections
indicate selective encryption and can provide and processes. Finally, the use of extreme
pointers to areas of interest. At the high end, a countermeasures by individuals with low technical
subject may employ encryption for network ability may indicate the involvement of outside
communications as well in the form of a VPN. A expertise.
subject that is using open wireless access points and
3.2.3 Sociability
a VPN connection to a third party server is utilizing
very high levels of countermeasures. Sociability, or the preference for engaging with
others instead of being alone, is a more important
3.2.2.6 Anonymizers. At the easy end of anonymity,
measurement for profile development than shyness
a subject may use In Private modes in their web
(an emotional tension when interacting with others).
browsing software. While this prevents the
The willingness of an individual to engage in social
recording locally of activity, it does not provide
interactions is a more important factor in deciding
anonymity to the server. For this, subjects need to
how to approach an individual than their internal
use web-based anonymizers to hide their browsing.
emotional state when the interaction is occurring.
Similar services are available for email via
Additionally, for online communications, shyness
anonymous remailers. Even more sophisticated is
has been found to have an impact on certain
the use of onion routing software like TOR to route
technologies but not others. Shyness is negatively
traffic through multiple hops before reaching its
correlated with the number of Facebook friends an
destination. This provides layers of anonymity that
individual has (Orr, et al., 2009), but not correlated
are difficult to trace back, but comes at a speed cost.
with email or chat usage (Scealy, Phillips, &
Subjects using TOR have made a conscious decision
Stevenson, 2002). While sociability is of primary
to trade usability for protection.
use, noting factors related to shyness may explain
3.2.2.7 Steganography. While steganography is excessive nervousness or anxiety during the baseline
much-hyped, in practical terms it has limited uses as questioning in an interview.
a countermeasure. When communicating covertly,
The Cheek and Buss five point sociability scale can
steganography can be used to hide content in plain
be used as a baseline for measuring sociability in the
sight, but encryption is a more general purpose tool
profiling process. While their scale includes self-
to transmit secret messages. As such, steganography
reported answers to questions like "I'd be unhappy if
identified on a subjects machine is indicative of fear
I were prevented from making many social
of the presence of a message being found out as
contacts", the same characteristics can be measured
opposed to the message itself.
indirectly (albeit with less precision) using features
3.2.2.8 Counterforensics. At the highest end of the extracted during the digital forensics process
countermeasure spectrum are counterforensics (Cheeck & Buss, 1981). The following four features
techniques. These include false flag operations should be reviewed to evaluate the sociability of a
(intentionally fabricating forensics information to subject.
frame another individual or entity), cleanup routines
3.2.3.1 Sources of Interaction. The different
that alter logfiles to remove traces of a subjects
methods that an individual uses to communicate
activities, and destructive wiping which makes
online can be enumerated. Methods may include but
logical data irrecoverable for later analysis. The use
are not limited to social media pages, forums, chat
of counterforensics techniques indicates that there is
rooms, instant messaging clients, and email. The
strong technical knowledge present in either the
number of different methods and the number of
subject or someone advising the subject, and that the
accounts present for each method can be compared
subject places a high value on their criminal
to expected numbers based on the persons age,
activities not being uncovered.
position, financial status, and technical ability.
Identifying the countermeasures in use can allow Additionally, the immediacy and directness of
investigators to avoid digital tripwires in serving interaction should be considered. Posting to a forum
warrants or seizing devices. Additionally, any digital does not involve a real-time conversation, and is
surveillance can be curtailed for subjects who generally not to a specific person. Skype chats,
employ more extreme countermeasures as they are however, are real time and are closer to in-person

14
Journal of Digital Forensics, Security and Law, Vol. 9(1)

interactions. More direct, extensive sources of conduct may be hacking ability, virus writing, or the
interaction would tend to indicate a higher acquisition of child pornography. Offline expertise
sociability score. could include anything from the ability to break into
a house to bomb building. Cross-domain criminal
3.2.3.2 Volume of Interaction. While the total
skills can include talents that are applicable to
number of accounts the subject has is indicative of
multiple criminal endeavors and include areas
their signing up for various services, they may do so
ranging from observational skills to social
to test out an application or for a one-time use (e.g.,
engineering.
throwaway email accounts used to register for a
questionable website). The number of individuals Ericsson, et al. (1993) identified 10,000 hours of
that a subject interacts with and the frequency of practice as the defining time to becoming an expert
interaction with each individual can provide insight in a variety of fields, ranging from chess to music.
into sociability. This can include email contacts, Similar work has shown that criminals develop
Facebook friends, or chat room partners. In addition expertise in their specific areas based primarily on
to the number of interactions, longer responses to experience. Wright, et al. (1995) studied residential
messages and attempts to prolong conversations by burglaries and showed that experienced burglars
asking questions or engaging on other topics can be identify more vulnerabilities in homes than lay
seen as markers of high sociability. persons. Additionally, criminal experience has been
shown to develop expertise in the perceptions of
3.2.3.3 Responsivity. Individuals with a high
violent criminals (Topalli, 2004). In the online
sociability are more likely to seek out interaction,
world, the value placed on criminal technical skills
and a higher rate of conversations that they initiate
is evidenced by the purchase of these skills by
(as opposed to respond to) is expected. Additionally,
groups ranging from traditional profit-seeking
developing a forensic timeline of a subjects usage
cybercriminals to terrorists (Radianti, Rich, &
patterns can show how quickly they interact with
Gonzalez, 2009; Warren & Streeter, 2006).
others once they begin using a device or service.
Most of the criminals encountered will have sub-
3.2.3.4 Interaction Duration. Subjects with higher
expert skill levels in their domain. This provides an
sociability would be expected to have longer
opportunity and a challenge. The opportunity is that,
conversations, and more verbose and thoughtful
if the investigative team has a true expert available,
qualitative responses to individual messages. For
they will likely be able to accurately assess an
real-time conversations, the exact duration of
individual of lesser skills. The challenge is that, in
interaction can be directly measured based on
many criminal domains, a subject with sub-expert
session time. For offline interactions, the time
level skills can still have a large impact, and the
between the first and last posting by the subject can
difference between a talented amateur and an expert
serve as a long-term communications duration.
may not be meaningful in developing a profile.
Individuals who have a large number of meaningful
There are several steps involved in building a
interactions that show positive sociability are more
technical profile based on a subjects criminal
likely to want to engage during an interview.
domain knowledge. Identifying a relevant domain,
Additionally, they may make better targets for
assessing the amount of time the subject has spent in
potential consensual monitoring engagements, and
that domain, evaluating the subjects use of language
are more likely to have spoken with associates about
and terminology related to the domain, and
information that may be meaningful to an
determining the subjects standing amongst others in
investigation. For those with extremely high
that domain are the key factors in evaluating the
sociability, investigators may only need to make
subjects criminal expertise.
themselves available online in the proper context
and the subject may engage them. 3.2.4.1 Identify Relevant Domain(s). The criminal
domains of interest are generally pre-determined
3.2.4 Domain Knowledge
from the type of crime being investigated and
The most difficult factor to qualify (or quantify) is determined prior to the technical profile
the subject matter expertise of an individual in the development. In a virus writing case, malware
criminal conduct of interest. For online crimes, the development would be the relevant domain. For a

15
Journal of Digital Forensics, Security and Law, Vol. 9(1)

terrorist attack involving a suicide vest, bomb baseline education and experience as criteria to join.
making would be the relevant domain. Less obvious This may be apparent through emails from a
are the secondary criminal domains that may be professional association or online access to restricted
relevant. The virus writer may have needed expertise journals in a field.
on air gaps in place at a location to write an effective
3.2.4.3 Evaluate a Subjects Use of Terminology.
virus, requiring research and surveillance skills.
There are generally linguistic clues available in a
Similarly, the terror group may have needed
subjects correspondence as to their level of
targeting skills to identify a high impact venue and
expertise in a domain. A subjects use of uncommon
recruiting skills to identify and enlist individuals to
terms particular to a domain, and their proper use of
deploy their weapons. For criminal enterprises, all
those terms, are related to their level of domain
subjects should be assessed against the relevant
expertise. An individual talking intelligently about
domains for the enterprise as a whole to determine
the virtues of Classless Inter-Domain Routing is
their role(s) in the organization.
more likely to have an advanced knowledge of
3.2.4.2 Assess Experience in a Domain. Because networking than a person that refers to opening their
experience is the key factor in expertise, assessing a web browser as clicking on the Internet. The
subjects prior domain experience is valuable. The terminology can be identified as part of processing
duration of the experience, coupled with the amount correspondence, and looking at term frequency of
of time the subject focused on that experience, can the subjects correspondence against the baseline
be partially measured through digital interactions. term frequency of others in a conspiracy (or against
The first visit to a website or forum related to the the general public) can quickly tease out
domain, or the first email exchange to mention differentiators.
keywords related to the domain, may point to the
Terminology-based assessments can be performed
initiation of interest in that area. This will become
on web searches as well. Jenkins et al showed
increasingly true going forward with increased
quantitative differences in how domain experts
adoption of services like Google Mail that allow
search as opposed to non-experts. Domain experts
users to retain correspondence indefinitely.
were shown to have a more depth-first approach in
Following the identification of the initial interest, the their search strategies, and this expertise was able to
percentage of online time spent engaged in a domain be differentiated from search ability (Jenkins,
can likewise be measured. Activity information is Corritore, & Weidenbeck, 2003).
generally readily available through proxy logs,
3.2.4.4 Professional Standing. While investigators
Internet history extracted from seized devices, and
may think of a profession in terms of legal
trap-and-trace order results. While explicit
endeavors, criminals have professions as well. They
information on interests can be gleamed from
form groups that rely on specialized experience to
correspondence if available, implicit interest can be
obtain compensation, and can have hierarchies
identified through time spent on particular web
within these groups that are meaningful. Because
pages and the amount of scrolling done (though
there are no board certifications or elections for
these are both difficult to measure forensically)
hackers, their absolute location and status in the
(Claypool, Le, Wased, & Brown, 2001).
knowledge pantheon cannot be definitively
With an increase in the usage of computer-based identified. Their relative position can be established,
training, including online degree programs, formal however, by an analysis of their interaction with
evidence of related education to a criminal domain others in their profession.
may be available as well. An online masters degree
The primary method for digitally exploiting social
in biochemistry may increase the threat potential of
networks for expertise is through the subjects online
a subject browsing information on chemical warfare,
communications. Link analysis of messaging from
whereas completing a certification program as a
multiple sources can quickly allow investigators to
locksmith would be relevant in a breaking-and-
identify hubs individuals whose expertise is
entering case. Similarly, subjects may have related
sought by others and have larger numbers of
indicators of relevant education, including
interconnections with other experts. On a micro-
memberships in professional organizations that have
scale, individual communications can be examined

16
Journal of Digital Forensics, Security and Law, Vol. 9(1)

to determine the context of the correspondence. If While the agents pursuing Silk Road werent
the ratio of queries within a domain that an necessarily using a formal digital profiling
individual responds to is higher than the ratio of methodology, codifying their work and the work of
queries they generate, whether in online forums, investigators who have faced similar challenges
email communications, or text messages, they are allows for the development of a framework for
likely to be regarded as having a higher level of practical use. The guidance presented in this paper is
expertise. An even more accurate measure, if the provided to investigators to assist in creating an
correspondence is available, is messages between idiographic digital behavioral profile in active
others previously identified as experts that reference criminal cases. The profile can be developed
the subject. Sentiment analysis in linked messages iteratively and refined during the course of an
that mention the subject can provide an evaluation of investigation. When multiple potential users are
their skills that is unbiased, as opposed to being involved, as may be the case with judicially
potentially clouded by the deference that may be authorized data intercepts of Internet traffic (e.g.,
shown in direct communications due to non- from a wireless access point), profiling can assist in
expertise related hierarchical relationships. subject disambiguation. Ultimately, a successful
profile will provide immediate value to investigators
Expertise determinations can help link crimes,
in case planning, subject identification, lead
eliminate subjects, determine how long a subject has
generation, obtaining and executing warrants, and
been operating, and ensure the investigative team
prosecuting offenders.
has the necessary skills to pursue the subject. With
increasing adoption of digital education and the
REFERENCES
breadth of digital communications channels
available for forensic exploitation, a subjects 1. Cheeck, J. M., & Buss, A. H. (1981). Shyness
expertise can be sufficiently approximated before and sociability. Journal of Personality and
the need for direct interaction. Social Psychology, 41(2), 330.
2. Claypool, M., Le, P., Wased, M., & Brown, D.
4. CONCLUSION (2001). Implicit interest indicators. Proceedings
of the 6th International Conference on Intelligent
The Silk Road case provided an excellent window
User Interfaces, ACM, 33-40.
into how a digital profile can be used in an
3. Colombini, C., & Colella, A. (2013). Digital
investigation. The agents involved did an exemplary
profiling: A computer forensics approach.
job and built a digital biography of the Dread Pirate
Availability, Reliability and Security for
Roberts that allowed them to link seemingly
Business, Enterprise and Health Information
unrelated accounts and activities that ultimately
Systems, 330-343.
identified the subject. Additionally, they used
4. Colombini, C., Colella, A., & Italian Army.
affinity and competency evaluations as evidence in
(2012). Digital scene of crime: Technique of
the complaint processseveral of the statements
profiling users. Journal of Wireless Mobile
made by Ulbricht relating to coding and server
Networks, Ubiquitous Computing, and
maintenance were presented as evidence of his
Dependable Applications.
technical expertise and domain knowledge to
5. Compton, D., & Hamilton, J. (2011). An
establish that he was involved in the development
examination of the techniques and implications
and running of the site. Ulbrichts use of
of the crowd-sourced collection of forensic data.
countermeasures became part of his undoing as
Third International Conference on Privacy,
wellhis purchase of fake identity documents and
Security, Risk and Trust (PASSAT), IEEE, 892-
use of encrypted VPN tunnels helped facilitate his
895.
identification and arrest. Finally, agents exploited
6. Denning, D. E., & Baugh Jr., W. E. (1999).
Ulbrichts sociability in communicating with him
Hiding crimes in cyberspace. Information,
when Ulbricht attempted to arrange a murder-for-
Communication & Society, 2(3), 251-276.
hire hit on FriendlyChemist, a former Silk Road
7. Ericsson, K. A., Krampe, R. T., & Tesch-Rmer,
vendor (United States Government, 2013).
C. (1993). The role of deliberate practice in the

17
Journal of Digital Forensics, Security and Law, Vol. 9(1)

acquisition of expert performance. 20. Rogers, M. K. (2010). The psyche of


Psychological Review, 100(3), 363. cybercriminals: A psycho-Social perspective. In
8. Florencio, D., & Herley, C. (2007). A large- Cybercrimes: A Multidisciplinary Analysis, 217-
scale study of web password habits. Proceedings 235. Springer Berlin Heidelberg.
of the 16th International Conference on World 21. Scealy, M., Phillips, J. G., & Stevenson, R.
Wide Web, ACM, 657-666. (2002). Shyness and anxiety as predictors of
9. Gaw, S., & Felten, E. (2006). Password patterns of Internet usage. CyberPsychology &
management strategies for online accounts. Behavior, 5(6), 507-515.
Proceedings of the Second Symposium on 22. Topalli, V. (2004). Criminal expertise and
Usable Privacy and Security, ACM, 44-45. offender decision-making: An experimental
10. Grabosky, P. (2000). Computer crime: A analysis of how offenders and non-offenders
criminological overview. Workshop on Crimes differentially perceive social stimuli. British
Related to the Computer Network, 10th United Journal of Criminology, 45(3), 269-295.
Nations Congress on the Prevention of Crime 23. United States Government. (2013, September
and the Treatment of Offenders. Vienna. 27). Criminal Complaint. Retrieved on October
11. Herley, C. (2012). Why do Nigerian Scammers 11, 2013 from
say they are from Nigeria? WEIS. http://www.scribd.com/doc/172773407/Ulbrich
12. Jenkins, C., Corritore, C. L., & Weidenbeck, S. t-Criminal-Complaint-Silk-Road
(2003). Patterns of information seeking on the
24. Warren, P., & Streeter, M. (2006). Cyber Alert:
Web: A qualitative study of domain expertise
How the World is Under Attack from a New
and Web expertise. IT & Society, 1(3), 64-89.
Form of Crime. Vision Paperbacks.
13. Krone, T. (2004). A typology of online child
25. Wright, R., Logie, R. H., & Decker, S. H.
pornography offending. Australian Institute of
(1995). Criminal expertise and offender decision
Criminology.
making: An experimental study of the target
14. Merritt, K., Smith, D., & Renzo, J. (2005). An
selection process in residential burglary. Journal
investigation of self-reported computer literacy:
of Research in Crime and Delinquency, 32(1),
Is it reliable. Issues in Information Systems, 6(1),
39-53.
289-295.
15. Ngo, F. T., & Parternoster, R. (2011).
Cybercrime victimization: An examination of
Individual and Situational level factors.
International Journal of Cyber Criminology,
5(1), 773-793.
16. Nykodym, N., Taylor, R., & Vilela, J. (2005).
Criminal profiling and insider cyber crime.
Digital Investigation, 2(4), 261-267.
17. Orr, E., Sisic, M., Ross, C., Simmering, M. G.,
Arseneault, J. M., & Orr, R. R. (2009). The
influence of shyness on the use of Facebook in
an undergraduate sample. CyberPsychology &
Behavior, 12(3), 337-340.
18. Radianti, J., Rich, E., & Gonzalez, J. J. (2009).
Vulnerability black markets: Empirical evidence
and scenario simulation. 42nd Hawaii
International Conference on System Sciences,
IEEE, 1-10.
19. Rogers, M. K. (2006). A two-dimensional
circumplex approach to the development of a
hacker taxonomy. Digital investigation, 3(2),
97-102.

18

Você também pode gostar