December 2, 2015 By Martin McKeay 3 min read

Being the inspiration for “CSI: Cyber” is not likely an honor many people in the security field would be happy to claim. But this is exactly the tag line that cyberpsychologist Professor Mary Aiken is often given. As the director of the CyberPsychology Research Center (CPRC) in Dublin, she has an interesting viewpoint on cybercriminals and hackers around the world.

Aiken is one of the leaders looking into the motivations and psychology of the people who are committing crimes using computers and the Internet. It’s criminal psychology specializing in crimes carried out via technology. Without a doubt, the type of work she is doing is needed in today’s society.

The Psychology of Hackers

We live in an age in which many if not most crimes involve a computer at some point, so it stands to reason that research on how the involvement of computers changes both the nature of the crime and the criminal is necessary. Reading about Aiken’s recent presentation at the 2015 Web Summit in The Guardian, it’s interesting to see her comments about hacking as a Freudian “cyber-sexual urge to penetrate,” especially seeing the term cyber once again added to the mix.

Research into particular psychology that marks hackers isn’t actually all that new. There have been studies that started as far back as 2005 trying to link hacking culture with neurological conditions. But to see something that’s receiving attention in a mainstream event like the Web Summit and to see it covered by publications such as The Guardian is something new.

Beware of Stereotypes

The potential danger resulting from the attention Aiken is receiving is that it further fuels the stereotype of a hacker as a young adult male, wearing a hoodie and living in his parents’ basement. It puts nice, intellectual words and psychology jargon around the description, but despite the polysyllabic pronouncements, it’s the same stereotype we’ve seen in the news since the press took control of the word hacker. No matter how pretty the veneer her talks put on the term, what she’s telling the world is the same story we’ve heard again and again, and that’s disappointing.

That said, stereotypes generally exist for a reason: If you go to DEF CON in Las Vegas or Chaos Computer Club in Europe, you’ll see hundreds of examples of the lone hacker, tattooed and wearing a dark hoodie. But for every one of those people putting on a public show, there are tens if not hundreds of people who spend their time breaking systems for fun and profit. Many of them are successful businesspeople, wearing a suit to work every day, looking and acting no different from everyone else. To some people, committing crimes using a computer is as much a 9-to-5 job as protecting computer systems is.

It’s almost certain that Professor Aiken’s research extends beyond the stereotypes. Unfortunately, what comes out in shows like “CSI: Cyber” and the press is that preconceived notion of a hacker. The idea that it’s a 15-year-old kid in his basement is further reinforced by events like the recent TalkTalk hack, but this type of event is now the outlier and less of a threat than the press makes it seem.

The bigger worry is attacks that last for weeks, months and even years, undetected until an external entity calls to notify the victim that they’ve been compromised. Hackers who go unnoticed and undetected aren’t attacking for fun or to fulfill some cyber-sexual urge; they’re attacking because it’s how they make their living, and they’re good at it.

More to Be Done

We need to see more research into the criminal motivations of the people who are compromising networks and businesses around the world. But the model of the lone hacker no more applies to the psychology of modern cybercriminals than the profile of a single serial killer could be generalized to all murderers. We need to broaden the research, move beyond the old model and understand the larger populace of criminal behaviors that happen to involve computers and the Internet. We’ll probably find that it’s not all that different from any other type of crime.

Unfortunately, it appears that Aiken won’t be the one to do broader research into computer-related criminals, at least in Ireland. Shortly before her talk at the Web Summit, it was announced that the Royal College of Surgeons Ireland (RSCI), the home of her organization, would be shutting down the CPRC.

It seems that the research being done there no longer aligns with the direction the RCSI believes it needs to take. Hopefully Aiken and the CyberPsychology Research Center can find a new home and broaden their research from the stereotypes and into the real world of cybercriminals. The need for this information won’t be going away any time soon.

More from Threat Intelligence

Hive0051 goes all in with a triple threat

13 min read - As of April 2024, IBM X-Force is tracking new waves of Russian state-sponsored Hive0051 (aka UAC-0010, Gamaredon) activity featuring new iterations of Gamma malware first observed in November 2023. These discoveries follow late October 2023 findings, detailing Hive0051's use of a novel multi-channel method of rapidly rotating C2 infrastructure (DNS Fluxing) to deliver new Gamma malware variants, facilitating more than a thousand infections in a single day. An examination of a sample of the lures associated with the ongoing activity reveals…

Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns

13 min read - As of March 2024, X-Force is tracking multiple ongoing ITG05 phishing campaigns featuring lure documents crafted to imitate authentic documents of government and non-governmental organizations (NGOs) in Europe, the South Caucasus, Central Asia, and North and South America. The uncovered lures include a mixture of internal and publicly available documents, as well as possible actor-generated documents associated with finance, critical infrastructure, executive engagements, cyber security, maritime security, healthcare, business, and defense industrial production. Beginning in November 2023, X-Force observed ITG05…

CVE-2023-20078 technical analysis: Identifying and triggering a command injection vulnerability in Cisco IP phones

7 min read - CVE-2023-20078 catalogs an unauthenticated command injection vulnerability in the web-based management interface of Cisco 6800, 7800, and 8800 Series IP Phones with Multiplatform Firmware installed; however, limited technical analysis is publicly available. This article presents my findings while researching this vulnerability. In the end, the reader should be equipped with the information necessary to understand and trigger this vulnerability.Vulnerability detailsThe following Cisco Security Advisory (Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities - Cisco) details CVE-2023-20078 and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today