preview

Criminal Typology Analysis

Decent Essays

Criminal Typology The fundamental task when analysing Chinese cybercrime landscape is dissecting its typology. Nonetheless, this errand proves to be easier said than done. Within this paper, the author only suggests three major intertwining aspects covering the most ground to analyse. They include: the perpetrators’ motivation, the organization of miscreants and their exploiting means. The first constituent, motivation, raises the question of whether cybercrime is extrinsically motivated or intrinsically motivated (Kshetri 2013). Meaning that the culprits carry out the wrongdoings for external gains such as monetary rewards and intellectual property (extrinsically motivated) or for their own satisfaction, motivation and belief (intrinsically …show more content…

However, there is a significant portion of culprits aiming for secretive intellectual properties, much more than their Eastern European counterparts, whose goal is profit from toxic malwares (Kshetri 2013). Interestingly, Chinese intrinsic hackers hack for some noble causes such as patriotism, political and communal obligations (Kshetri 2013). Typical Chinese perpetrators are overwhelmingly males working individually. They are young amateurs, mostly 17 to 45 years old, with some still in junior high-school. They use toolkits, botnets predisposed online for petty crimes. Contrast to common belief, most don’t receive good education, usually high-school students, unemployed individuals, low-rank employees or manual workers. Group based cyber crimes, on the other hand, are more complicated. These groups are highly specialized, diversely scattered and horizontally organized. They are tailored to specific task-for-hire such as creating botnets or releasing Trojan malwares. Their members are located across China and work as equal with little to none hierarchical order. The interconnectedness and space-time boundlessness of cyber-world help them expand greatly, even passing through sovereign borders with one incident when Chinese hackers attacked the US conglomerate DuPont somewhere between 2009 and 2010. Due to the wild success of online frauds, many traditional criminal organizations have switched to Internet based operations. Some online groups go further and get backed up by legitimate corporates seeking extra profit under the table (Chan & Wang

Get Access