Cloud criminals are motivated by curiosity, recognition, thrill-seeking, and more. They exhibit aggressive and rude behaviors online due to reduced social cues and anonymity. Common traits include narcissism, neuroticism, and social awkwardness. While organizations cannot control criminal motivations and traits, they can minimize opportunities by strengthening security with talent, budgets, technologies, and diligence.
2. About Utian
• A husband of a wife and a father of five unstoppable kids.
• Mostly live in Bogor, West Java.
• Graduate from EC-Council University with a Master of Science in
Cyber Security (MSCS) specializing in Cloud Security Architect.
• A probation cloud security engineer at PT Akar Inti Data (Nusa Data),
a data marketplace company in Jakarta.
6. “Ingat! Kejahatan tidak hanya terjadi karena niat
pelakunya. Tapi juga karena ada kesempatan.
Waspadalah! Waspadalah!”
“Remember! Crime occurs not only because of the perpetrator's intention.
But also because there is an opportunity. Beware! Beware!”
Bang Napi - Sergap RCTI (2001)
#
8. Computer Criminal Definition (1)
The U.S. National Institute of Justice defines a computer criminal as
any individual who uses a computer or network technology to plan or
perpetrate a law violation. These individuals typically alter or exploit
technology for destructive purposes or financial gain rather than for
benign or creative functions. Common examples of computer crimes
that occur as cloud crimes include web page defacements, creation
and distribution of malware, unauthorized access of technology, theft
of information, distributed denial of service (DDoS), and so on.
10. Cloud Criminal Motivations
• curiosity
• recognition
• thrill-seeking & adventure
• power
• boredom
• addiction
• politics
• anger
• frustration
• ideological opposition to
information restrictions for their
behaviors
• rebellion against authority
• out-group threats
• press/media’s glorification and
glamorization
11. Cloud Criminal Behaviors
• aggressive
• rude
• ad hominem
due to:
• the reduction of available social-context cues in computer-mediated
communication.
• deindividuation as a direct result of anonymity (the loss of self-awareness in
groups)
• subjective feelings of immersion
• the arousing nature of computer and Internet use.
12. Cloud Criminal Traits (1)
• insincerity and dishonesty
• superficial charm and an enhanced intellect
consistent with the Diagnostic and Statistical Manual of Mental
Disorders IV (DSM-IV) criteria for anti-social personality disorder.
commit their illegal behavior for little or no visible rewards despite the
threat of severe punishment.
14. Cloud Criminal Traits (3)
• social awkwardness
• atypical prosody
• lack of social empathy during social interactions
characteristic of Asperger Syndrome (AS)
16. Conclusions
• Cloud criminals have various motivations, behaviors and traits.
• The chance for cloud criminal conducting crime is higher if they have the
crime opportunities (vulnerabilities, security gap) on the organizations'
side.
• Organizations can not control motivations, behaviors and traits of cloud
criminals.
• Organizations can control their security challenges to narrow or
eliminate the cloud crime actions and it need resources (security talent,
budgets, technologies, time, etc).
17. References
• (ISC)2 2022 Cloud Security Report - https://www.isc2.org/-
/media/ISC2/Research/Resource-Thumbnails/Resource-
Center/Research/2021-Cloud-Security-Report-FINAL.ashx
• Computer Security Handbook, 6th edition (2014) -
https://www.wiley.com/en-
us/Computer+Security+Handbook%2C+Set%2C+6th+Edition-p-
9781118851746
• Konsep Kejahatan Siber Dalam Sistem Hukum Indonesia (2019) -
https://business-law.binus.ac.id/2019/06/30/konsep-kejahatan-siber-dalam-
sistem-hukum-indonesia/