1 Criminal Profiling of insiders. Developed in USA in the early

advertisement
Criminal Profiling of insiders.
Lecturer: Roberta Bruzzone, Psychologist and Criminologist – International Crime
Analysis Association (ICAA)
bruzzone@icaa-italia.org
mobile +39 3393597995
Developed in USA in the early seventies within the ambit of violent crime
analysis (and more specifically of serial matrix), Criminal profiling is a support
investigative activity that provides a possible psycho-behavioural profile of the
(still) unknown subject that has committed a given crime. This investigative
technique is primarily used to narrow the number of suspects in order to
address investigative resources only towards the ones that have some
personality and behavioural characteristics (that are emerged from crime
scene analysis or rather from the way a crime has been committed). From this
perspective then, the primary aim is represented by the possibility to help
investigators to manage with greater effectiveness their suspect list.
In general Criminal profiling can be divided into three main approach models:
inductive, deductive and mixed. Inductive profiling is founded on generalized
behavioural patterns that start from statistic analysis of data coming from a
sample of known offendesr that have committed a give crime.
Deductive profiling, differently from the former, is not founded on
generalizations obtained from the analysis of a given sample of subjects but it
is based on logical evaluations focused on the specific case analysed. In fact
evidences from the case are analysed and then used to build a specific
behavioural profile, exclusively valid for the case that is under investigation at
the moment.
Among the mixed models, the more modern and effective approach seems the
one proposed some years ago by Marco Strano in USA and developed by an
ICAA1 international research team (project N.N.P.C.P. Neural Network for
Psychological Criminal Profiling) at the Laboratory of Intelligent Systems and
Control della Duke University – L.I.S.C. Durham, North Carolina. The
application of NNPCP system, based on a neural network and evolved data
mining, in practice proposes itself as a sort of digital profiler that analyses
crime scene and provides to investigators a biographical, psychological and
motivational profile of an unknown offender.
From biographical profile point of view (Bartol 1999), the most part of inside
crimes is committed by male unmarried employees, less than 30 years old.
Regarding motivational profile of insiders, Bologna and Shaw (1997), and more
recently Strano (2000, 2001, 2003), underline that the inspiration to commit
crime inside the company/organization is a product of criminals’s mind and
that motivation is of secondary importance to understand a criminal action
1
International Crime Analysis Association – www.icaa-italia.org
1
because the latter is often spread even among persons that don’t commit and
that will never commit crimes.
In other words, motivation (as the need of money, for example) must find a
compatible psychological base in order to manage to nourish a criminal action.
To evaluate and analyse the motivational base of insider criminals is in any
case useful to plan prevention training courses that can have an influence on
the social environment, reducing, as much as possible, conditions that can
favour a crime.
Regarding this aspect, Fischer and Green (1992), Maree (2003) and Lydon,
propose some “typical” situations, statistically correlated with crimes
committed at workplace (inside companies/organizations and in particular
misappropriation crimes):
1.Personal financial difficulties. At the origin of many inside crimes can be
placed a period of financial difficulty connected, for example, to reckless
investments, to gambling or simply to the craving of a higher standard of
living. Some employees in fact steal for the simple reason that they need more
money to supplement their income or because at the moment they are
crossing a period of particular economic difficulties and want to be able again
to pay their bills.
2. Revenge. Employees believe that in some way they have been treated
unfairly by their own employers and because they (the employees) don’t have
the power or financial means enough to contrast their employers, they commit
sabotage or misappropriation crimes to revenge themselves.
3. Inadequate pay. Employees are convinced that they are not properly paid
for their work. Instead of negotiating in order to get a rise, they steal
money/goods to their employers. Employees justify their actions stating that
they have the right to steal because underpaid.
4. Work dissatisfaction. The most part of sabotage, fraud and theft cases are
committed by those employees that show dissatisfaction towards some aspects
of their own work, above all towards their employer.
5. Feeling of being not esteemed by the company. An important psychological
factor that can be placed at the base of insider crimes is represented by the
feeling of the employee about the opinion that the company/organization can
have about him/her.
6. Psychiatric disorders and drug abuse. Alcohol and drug abuse and some
psychopathological disorders can represent a motivational base for insider
crime, both of vandalic-destructive type and embezzling type. However this
dimension represents a smaller sample of total workplace crimes.
Of course these conditions can be detected even in subjects that are very
distant from any form of crime. Psychological and motivational characteristics
of insiders have been focused by only few accurate studies carried out by some
American researchers (Parker, 1976-1998) in the early eighties that have used
some classifications based on known insider criminals (that have been
detected) and based only on a little sample of cases.
2
These approaches present the risk of generalizations and can say not much
about those insiders that have never been detected (that seem to be the most
part of active insiders).
In Europe the research experience carried out by Prof. Marco Strano’s team,
started in the early nineties, is focused on an operating tool for criminal
profiling of insiders. This tool tries to reduce systematic errors by proposing a
system based on neural network and data mining (IAD System).
The ICAA IAD system (Inside Attack Database)
As formerly documented by a wide international scientific literature, private
companies and Public Administration demonstrate a considerable reluctance to
publicize through reports to Law Enforcement Agencies the attacks that they
have suffered and in particular the ones defined “inside attacks” (committed by
subjects that belong to the organization). This situation has made very difficult
scientific research on the topic and, more in general, the circulation of useful
information to contrast this criminal phenomenon. The ICAA’s target is to offer
to security specialists a new intervention tool that is called IAD (Inside Attack
Database).
Experimentations to apply NNPCP software (Neural Network for Psychological
Criminal Profiling) even to insider crimes have started in 2005 and represent
the last born among ICAA research projects in partnership with Duke
University and other professional associations that operate in information
security sector. IAD system contains data on computer crime inside cases and
allows to security specialists and investigators to acquire immediate infooperating elements on different kinds of inside attacks.
The system in practice, in the line of NNPCP project, provides to operators a
“decisional support” in the investigative phase. NNPCP software, in fact, is able
to realize a socio-biographical, motivational and technological profile of the
attacker supporting operators in cases of unknown offender. To feed the
system, ICAA and AISIC2 have created a sort of security specialists ‘ s “club”
that, since years, is feeding IAD system with cases in an anonymous form. Of
course, the ones that contribute to train IAD system through real cases can
then interrogate it for free in case of necessity.
From first application of IAD system are emerged confirmations as regards the
fact that insiders normally are included into 3 categories with different
characteristics: high profile insiders, low profile insiders and unaware insiders.
2
AISIC (Associazione Italiana per la Sicurezza nelle Informazioni e nelle Comunicazioni)
3
Download