1 / 9

Modus Operandi, Motive and Technology

Modus Operandi, Motive and Technology. Dr. John P. Abraham Professor UTPA. Internet. Wild west of technology Ax to the murderer as internet to the criminal New types of crimes and criminals emerging. Modus Operandi (MO). Method of operating How a crime is committed

rafe
Download Presentation

Modus Operandi, Motive and Technology

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Modus Operandi, Motive and Technology Dr. John P. Abraham Professor UTPA

  2. Internet • Wild west of technology • Ax to the murderer as internet to the criminal • New types of crimes and criminals emerging

  3. Modus Operandi (MO) • Method of operating • How a crime is committed • Repeated offenders leave similar Mos • Mo is intended to: • Hide offender’s identity • Ensure successful completion of the crime • Facilitate the offender’s escape

  4. Examples of MOs cyber crime • Planning – notes, emails, etc. • Computer system type, software, etc. • Presurveillance of the crime scene or victim • Offence location • Use of weapon – computer virus etc. • Use of aliases, ip spoofing, etc.

  5. Technologies used for • Selecting the victim • Keeping the victim under surveillance • Grooming/contacting the victim • Stalking/harassing • Stealing identity, money, etc. • Destroying assets (network, intellectual property) • Gathering and storing confidential materials • Distributing confidential information

  6. Case examples • Pages 290 and 291 explains cases involving child pornography and cybersex sting operation. • Example 1: Digital imaging technology and the Internet enhanced an existing MO. • Example 2: Females attracted to uniforms (Blue Magnet) called groupies. A teenager contacted vulnerable police officers and the offers eventually were caught.

  7. Motive and Technology • Motive – a need that impels and is satisfied by a behavior. • Study indicates that even rapists satisfy emotional needs. FBI uses Groth rapist motivational typology.

  8. Behavioral motivational typology • Power reassurance – criminal behavior that restore self-confidence. Low aggression • Power Assertive – high aggression means. Attacks to show his own virility. Not to harm necessarily but to possess. • Anger Retaliatory – Rage toward a person, group or symbol. Retaliating for wrongs perceived or real. • Sadistic – Anger Excitation. Sexual gratification gained from victim’s pain. • Profit oriented.

  9. Current technologies • Computer virus • Trojan • Key logger • A public email discussion list

More Related