Summary
With the ever-increasing importance of identity and identity management in the information society, identity-related crime is also on the rise. Combating crimes like identity theft and identity fraud, not in the least with the help of identity forensics, is a key challenge for policy makers. This chapter aims at contributing to addressing that challenge. It summarises the findings of five years of FIDIS research on identity-related crime and identity forensics. A typology is given of the various forms of identity-related crime. After an analysis of relevant socio-economic, cultural, technical, and legal aspects of identity-related crime, potential countermeasures are discussed. We then move on to forensic aspects, with a critical analysis of pitfalls in forensic identification and case studies of mobile networks and biometric devices. Next, forensic profiling is discussed from a wide range of perspectives. The chapter concludes with lessons drawn from the five years of FIDIS research in the area of identity-related crime and forensic aspects of identity.
Bert-Jaap Koops is responsible for sections 1, 2, and 5 of this chapter. Zeno Geradts is responsible for sections 3 and 4 of this chapter.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Reference
Aalberg, L., Andersson, K., Bertler, C., Borén, H., Cole, M. D., Dahlén, J., Finnon, Y., Huizer, H., Jalava, K., Kaa, E., Lock, E., Lopes, A., Poortman-Van der Meer, A., Sip-pola, E. (2007a), ‘Development of a harmonised method for the profiling of amphetamines I. Synthesis of standards and compilation of analytical data’, Forensic Science International 169: 219–229.
Aalberg, L., Andersson, K., Bertler, C., Borén, H., Cole, M. D., Finnon, Y., Huizer, H., Jalava, K., Kaa, E., Lock, E., Lopes, A., Poortman-Van der Meer, A., Sippola, E., Dahlén, J. (2007b), ‘Development of a harmonised method for the profiling of amphetamines II. Stability of impurities in organic solvents’, Forensic Science International 169: 231–241.
Aitken, C. C. G. and Taroni, F. (2004), Statistics and the Evaluation of Evidence for Forensic Scientists. John Wiley & Sons, London.
Anderson, D.S., Fleizach, C., Savage, S., Voelker, G. M. (2006), ‘Spamscatter: Characterizing Internet Scam Hosting infrastructure’, Proceedings of the USENIX Security Symposium, Boston, MA.
Buitelaar, H. (ed.) (2007), FIDIS Deliverable D13.3: Study on ID Number Policies, Download: www.fidis.net/resources/deliverables/.
Byford, L. (1981), ‘The Yorkshire Ripper Case: Review of the Police Investigation of the Case’, H.M.s.I.o. Constabulary, Home Office.
Cook, R., Evett, I. W., Jackson, G., Jones, P. J., Lambert, J. A. (1998), ‘A hierarchy of propositions: deciding which level to address in casework’,. Science & Justice 38: 103–111.
De Vries, U. R. M. T. et al. (2007), ‘Identiteitsfraude: een afbakening. Een internationale begripsvergelijking en analyse van nationale strafbepalingen’, WODC, Utrecht, http://www.wodc.nl/images/1496_%20volledige_tekst_tcm44-86343.pdf.
Egger, S.A. (1984), ‘A Working Definition of Serial Murder and the Reduction of Linkage Blindness’, Journal of Police Science and Administration 12(3): 348–355.
Frattini, F. (2007), ‘Closing speech on Public Security (20 November 2007)’, Speech /07/ 728. Privacy and Technology Conference on Public Security, Privacy and Technology, Brussels.
Geradts, Z. and Sommer, P. (eds.) (2006), FIDIS Deliverable D6.1: Forensic Implications of Identity Management Systems, Download: www.fidis.net/resources/deliverables/ .
Geradts, Z. and Sommer, P. (eds.) (2008), FIDIS Deliverable D6.7c: Forensic Profiling, Download: www.fidis.net/resources/deliverables/.
Goldstein, H. (1990), Problem Oriented Policing. Temple University Press, Philadelphia.
Grijpink, J. H. A. M. (2006), ‘Identiteitsfraude en overheid’, Justitiële verkenningen 32(7): 37–57.
Hildebrandt, M. (2008a), ‘Defining profiling: a new type of knowledge?’ In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 39–50.
Hildebrandt, M. (2008b), ‘Profiling and the Identity of the European Citizen’. In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 320–360.
Ioset, S., Esseiva, P., Ribaux, O., Weyermann, C., Anglada, F., Lociciro, S., Hayoz, P., Baer, I., Gasté, L., Terrettaz-Zufferey, A. L., Delaporte, C., Margot, P. (2005), ‘Establishment of an operational system for drug profiling: a Swiss experience’, Bulletin of Narcotics 57 (1–2): 121–146.
Jaquet-Chiffelle, D. O. (2008), ‘Reply: Direct and Indirect Profiling in the Light of Virtual Persons’. In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 55–63.
Kind, S. S. (1987), The Scientific Investigation of Crime. Forensic Science Services Ltd, Harrogate.
Kind, S. S. (1994), ‘Crime investigation and the criminal trial: a three chapter paradigm of evidence’, Journal of the Forensic Science Society 34(3): 155–164.
Koops, B.-J. (2005), FIDIS Deliverable D5.1: A survey on legislation on ID theft in the EU and a number of other countries, Download: www.fidis.net/resources/deliverables/ .
Koops, B.-J. and Leenes, R. E. (2006), ‘ID Theft, ID Fraud and/or ID-related Crime. Definitions matter’, Datenschutz und Datensicherheit (9): 553–556.
Koops, B.-J. et al. (2009), ‘A typology of identity-related crime: conceptual, technical, and legal issues’, Information Communication & Society 12(1): 1–24.
Kosta, E., Coudert, F., Dumortier, J. (2007), ‘Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive’, International Review of Law, Computers and Technology 21: 343–358.
Leenes, R. E. (ed.) (2006), FIDIS Deliverable D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research, Download: www.fidis.net/resources/deliv-erables/.
Peterson, M., Morehouse, B., Wright, R. (2000), ‘Intelligence 2000: Revising the Basic Elements’. Law Enforcement Intelligence Unit (L.E.I.U.) et International Association of Law Enforcement Intelligence Analysts (IALEIA), Sacramento, Lawrenceville.
Pintér, R. (ed.) (2007), FIDIS Deliverable D5.2c: Identity related crime in the world of films, Download: www.fidis.net/resources/deliverables/.
Rossmo, K. (1999) Geographical Profiling. CRC Press.
Sheptycki, J. (2004), ‘Organizational Pathologies in Police Intelligence: Some Contributions to the Lexicon of Intelligence-led Policing’, European Journal of Criminology 1(3): 307–332.
Sproule, S. and Archer, N. (2006), ‘Defining Identity Theft — A Discussion Paper’, 6 April 2006, http://www.business.mcmaster.ca/IDTDefinition/lit&links.htm.
Terrettaz-Zufferey, A.-L., Ratle, F., Ribaux, O., Esseiva, P., Khanevski, M. (2007), ‘Pattern Detection in Forensic Case Data Using Graph-Theory: Application to Heroin Cutting Agents’, Forensic Science International 167: 242–246.
United States (2004) The 9/11 Commission Report, National Commission on Terrorist Attacks, http://govinfo.library.unt.edu/911/report/index.htm.
Van der Meulen, N. and Koops, B.-J. (eds.) (2008), FIDIS Deliverable D12.7: Identity-related Crime in Europe — Big Problem or Big Hype?, Download: www.fidis.net/resources/deliverables/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Koops, BJ., Geradts, Z. (2009). Identity-Related Crime and Forensics. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-01820-6_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88480-4
Online ISBN: 978-3-642-01820-6
eBook Packages: Business and EconomicsBusiness and Management (R0)