Background
Criminal profiling is a phenomenon which serves as tool in aiding law enforcement and forensic investigators to apprehend and understand criminal offenders. The use of such a method can be linked back to early 19th century England, where investigators attempted to create a profile of Jack the Ripper. A criminal profile is a collection of inferences about the qualities of the person responsible for committing a crime or a series of crimes [BT08]. In contemporary society, the United States' Federal Bureau of Investigation (FBI) has since modernized a model of criminal profiling that is now used internationally, throughout multiple jurisdictions.

Integrating the arts with the sciences, criminal profiling is a process that includes analyses of the crime scene and victims and comparing to information of similar crimes with known offender personalities. From this, profilers are able to predict factors such as age, sex, motivation, level of mental stability, and geographic location of the unknown offender. In addition, investigators are also able to link a series of offences to one offender from the modus operandi and signature of the offender indicated by physical evidence found at the crime scenes, and the setting in which the offences were committed. Simply put, criminal profiling is based upon the notion that the format in which offences are committed reflect upon the personality and behavior of the offender himself.

Although criminal profiling has primarily focused on serial violent crimes such as murders and sexual assaults, the rapid expansion of modern technology has increased interest and emphasis on applying criminal profiling to the world of cybercrime. Applying criminal profiling theory to the world of cybercrime certainly requires a different approach. Numerous cybercrimes are serial in nature, in that offenders commit multiple offences and habituate their behaviour. From this, the modus operandi and signature can then be drawn. For example, analysis of the technical indicators of the ˇ§digital crime sceneˇ¨ of an attack may provide insight to a computer hacker as well as determine future intrusion activity. However, profiling research on serial computer criminals has so far been focused on classifying the individuals so that predictive indicators can be established. Therefore, such a call for more research on applying criminal profiling to cyber-criminal activity exists, as it is a means of aiding law enforcement and counter-acting the increase in computer crime-related issues that also emerge with the advances in information technology.

Modern profiling process takes two approaches: inductive and deductive. Inductive profiling attempts to generalize behavioral patterns from a statistical analysis on the characteristics of previous offenders. It is based on inductive logic to narrow down and predict who will commit these specific types of offenses. On the other hand, deductive profiling is more evidence-based. It attempts to analyze the evidence from the case to construct a behavioral profile of that offender. Regardless of the method used, although the goal of criminal profiling is not solving crime on its own, it aims to provide help in assisting law enforcement and investigators in numerous cases, and one can argue it to be of the same when applying it to cybercrime.

Previous research conducted on applying the concept of profiling to the issue of online crime has been limited and minimal. Even profiling itself has only mainly focused on the subject of criminal activity. What is perhaps one of very few applications on drawing research on criminal profiling in the digital world is the Hackerˇ¦s Profiling Project (HPP) designed by Chiesa and Ducci in 2003 [CD09]. The HPP was more specifically designed to apply the concept of criminal profiling to the problem of computer hackers. Consisting of eight stages that included serving questionnaires to real-life hackers, the HPP focused mainly on data collection in order to create a model of ˇ§hacker profilesˇ¨. Their project also aimed to use their results to provide prevention techniques to the corporate world where information security could be improved.

Criminal profiling has been applied in another aspect of computer crimes, that is the insider computer attack within a company. Nykodym et al. divided insider computer criminals by type of act into spies, saboteurs, thieves and net abusers [NT05]. They outlined the profiles for these types of insider criminals by inductive studies. Shaw further discussed the role of behavioral research and profiling in malicious cyber insider investigations [SD06]. He reviewed the empirical evidence garnered from inductive studies of insiders and suggested the use of a specific deductive profiling approach to insider investigation. We note that our proposed research is different from these projects as we are targeting cyber criminals in the three specific types of online crimes, Internet piracy, auction site fraud and cyberstalking, while they focused on criminals in insider threats.

Recently, a former police officer and criminal justice instructor [DS10] writes an article on profiling and categorizing cybercriminals. He only outlines a profile of typical cybercriminals and some common motivating factors. Without analyzing the different types of cybercrime individually, such a general profile is deemed not very useful.
From the above summary of related works, we understand that applying criminal profiling on cybercrime is an attainable approach to assisting cybercrime investigation and analysis. However, no research has been done on profiling the three types of crimes targeted in this project.