Career Page

Understanding the Affect that Social Cybersecurity has on Cyber crime Investigators

There is a perception that cybersecurity is a field entirely dominated by policy and statistics. While it is true that those fields are very important towards the functionality of those in the field, social aspects cannot be ignored. Social patterns define why cybercriminals perform their actions. Without an understanding of why cybercriminals perform malicious acts, any policies or new technologies to combat those actions would be to waste, due to the root cause of the malpractice not being fully understood. In terms of being a cybercrime investigator, having a true grasp as to why cybercriminals perform their actions can lead to a more thorough understanding of their case. If we first fully understand the responsibilities of a cybercrime investigator, we can then begin to understand how social concepts of cybersecurity then begin to tie in.

Roles of a Cybercrime investigator

            According to the Department of Defense, the role of a cybercrime investigator has many core functions to fulfill. For example, a day in the life of a cybercrime investigator could include, but not be limited to: analyzing log files to collect evidence, examine data that has been recovered, identify any elements that would prove a crime has been committed, and preserve incriminating evidence against a client. On top of that, many additional tasks may need to be performed by cybercrime investigators. These tasks could include determining the scope of cyberthreats, and placing safeguard against those threats, conducting interviews with suspects and witnesses, and developing a gameplan to survey suspecting crime on the internet.

The Affect Social Concepts Have on the Above Role

            After analyzing the roles that cybercrime investigators often fill, it has become increasingly abundant that a deep social understanding of cybercrime is vital to the position. For example, surveillance on a suspect social engineering scheme needs sufficient social understanding to be fully addressed. Social Engineering is a method in which victims are manipulated into giving malicious users their personal data, such as bank information, medical records, and personal identifiable information. This method of cybercrime has grown in popularity due to factors such as rises in AI technology, and reduced effectiveness of malware due to stronger firewalls and antivirus software. Cybercrime investigations need to understand the social concepts that make social engineering so effective. Social engineering often relies on intimidation to pressure people into trusting the criminal. Social engineering also heavily relies on concern from the user, due to many social engineering scams beginning with fake Microsoft or antivirus software. If cybercrime investigators understand this concept, social engineering scams can be identified easier, and a game plan can be effectively created to curb the threat.

            Those in the field that are required to interview suspects also massively benefit from understanding the social concepts of cybersecurity. When trying to pin a motive to a suspect, it’s imperative to keep in mind cybercriminals often are ostracized in the real world. Many cybercriminals chose their path due to feelings of social ineptitude, and that cybercriminal communities welcome these people with open arms. Having a deep understanding of network security and being a vulnerable individual can be sparks that ignite the ability to perform cybercrime. Some cybercriminals are entirely focused on monetary gain. Cyberlaw vastly varies between regions. In areas that have lax cybercrime laws, a population with a low digital aptitude, and/or areas with wealthy business and medical industries can be prime targets for cybercriminals. These factors often lead to cybercrime being a low risk, high reward profession. Lastly, areas of the world with imminent political instability are often a breeding ground for cybercrime. Regions like the Caucasus, the Korean Peninsula, and the Middle East often face significant cybercrime challenges. These Cybercriminals potentially belong to paramilitary or terror groups, with the goal of causing cyber-chaos for political motives. With these factors being said, if a cybercrime investigator understood these concepts, they could then easier pin a criminal with a motive, so that their cybercrime could be persecuted in the eye of the law.

Conclusion

            In total, it is evident how crucial an understanding of social aspects is to cybercrime investigations. When we understand the tasks that this profession is expected to carry out, we can then apply what we know about cybercriminals. Interviewing suspects with an understanding of social concepts could lead to a greater rate of prosecution and punishment for cybercrime, due to real motives being attached to a suspect. On top of that, understanding how different methods of cybercrime prey on people, such as social engineering, can expose the social concepts these scams use to perform malpractice. If the cybersecurity industry continues to focus on the “why’s” of crime, they can then form more effective policies and prosecute criminals at a higher rate.