چکیده:
Cybercrime is the world’s biggest growth industry and is now costing an
estimated €180 billion loss to organisations and individuals, every year. The
creation of ‘virtual identities’ gives a greater anonymity to the activities of
organised criminals. Today our commonwealth is protected by firewalls
rather than firepower. This is an issue of global importance as new
technology has provided a world of opportunity for criminals. As a
consequence law enforcement agencies all over the world are struggling to
cope. Therefore, today’s top priority is to use computer technology to fight
computer crime.
خلاصه ماشینی:
The means to communicate provides both the law enforcer and the criminal with the ability to direct resources and share information within their communities, in order to maximise their operational efficiency, flexibility and speed of response.
In particular with the development of early telephone systems into the new telecommunications systems, including the Internet and mobile technologies, have created opportunities for such criminal groups to disseminate information of value in a timely manner.
Cybercrime E-security is an issue of global importance and the methods cyber-criminals use are far-reaching, cunning and technologically advanced.
Broadly speaking, cybercrime can be divided into two categories; • New crimes that are a result of Internet and can only be committed online • Old-style crimes that use hi-tech and going online Organised criminals have the resources to acquire the services of the necessary people.
Criminal profiling is the process of Investigating and examining criminal behaviour in order to help identify the type of person responsible (Turvey, 2002).
To date, all the national security organisations depend on data and text mining techniques to detect and predict criminal activities, while data mining refers to the exploration and analysis of large quantities of data to discover meaningful patterns and rules, (Kanellis, Kiountouzis, Kolokotronis & Martakos, 2006).
Investigator can use the technique to construct a network that illustrates criminal's roles, the flow of tangible and intangible goods and information (Chau, Xu & Chen, 2002).
BEA was developed by the profiler Brent Turvey, in order to overcome some of the FBI and Investigative Psychology (IP) models, (Rogers, 2003; Turvey, 2002; Nykodym, Taylor & Vilela, 2005).