Skip to main content

Summary

With the ever-increasing importance of identity and identity management in the information society, identity-related crime is also on the rise. Combating crimes like identity theft and identity fraud, not in the least with the help of identity forensics, is a key challenge for policy makers. This chapter aims at contributing to addressing that challenge. It summarises the findings of five years of FIDIS research on identity-related crime and identity forensics. A typology is given of the various forms of identity-related crime. After an analysis of relevant socio-economic, cultural, technical, and legal aspects of identity-related crime, potential countermeasures are discussed. We then move on to forensic aspects, with a critical analysis of pitfalls in forensic identification and case studies of mobile networks and biometric devices. Next, forensic profiling is discussed from a wide range of perspectives. The chapter concludes with lessons drawn from the five years of FIDIS research in the area of identity-related crime and forensic aspects of identity.

Bert-Jaap Koops is responsible for sections 1, 2, and 5 of this chapter. Zeno Geradts is responsible for sections 3 and 4 of this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  • Aalberg, L., Andersson, K., Bertler, C., Borén, H., Cole, M. D., Dahlén, J., Finnon, Y., Huizer, H., Jalava, K., Kaa, E., Lock, E., Lopes, A., Poortman-Van der Meer, A., Sip-pola, E. (2007a), ‘Development of a harmonised method for the profiling of amphetamines I. Synthesis of standards and compilation of analytical data’, Forensic Science International 169: 219–229.

    Google Scholar 

  • Aalberg, L., Andersson, K., Bertler, C., Borén, H., Cole, M. D., Finnon, Y., Huizer, H., Jalava, K., Kaa, E., Lock, E., Lopes, A., Poortman-Van der Meer, A., Sippola, E., Dahlén, J. (2007b), ‘Development of a harmonised method for the profiling of amphetamines II. Stability of impurities in organic solvents’, Forensic Science International 169: 231–241.

    Google Scholar 

  • Aitken, C. C. G. and Taroni, F. (2004), Statistics and the Evaluation of Evidence for Forensic Scientists. John Wiley & Sons, London.

    Book  Google Scholar 

  • Anderson, D.S., Fleizach, C., Savage, S., Voelker, G. M. (2006), ‘Spamscatter: Characterizing Internet Scam Hosting infrastructure’, Proceedings of the USENIX Security Symposium, Boston, MA.

    Google Scholar 

  • Buitelaar, H. (ed.) (2007), FIDIS Deliverable D13.3: Study on ID Number Policies, Download: www.fidis.net/resources/deliverables/.

  • Byford, L. (1981), ‘The Yorkshire Ripper Case: Review of the Police Investigation of the Case’, H.M.s.I.o. Constabulary, Home Office.

    Google Scholar 

  • Cook, R., Evett, I. W., Jackson, G., Jones, P. J., Lambert, J. A. (1998), ‘A hierarchy of propositions: deciding which level to address in casework’,. Science & Justice 38: 103–111.

    Google Scholar 

  • De Vries, U. R. M. T. et al. (2007), ‘Identiteitsfraude: een afbakening. Een internationale begripsvergelijking en analyse van nationale strafbepalingen’, WODC, Utrecht, http://www.wodc.nl/images/1496_%20volledige_tekst_tcm44-86343.pdf.

  • Egger, S.A. (1984), ‘A Working Definition of Serial Murder and the Reduction of Linkage Blindness’, Journal of Police Science and Administration 12(3): 348–355.

    Google Scholar 

  • Frattini, F. (2007), ‘Closing speech on Public Security (20 November 2007)’, Speech /07/ 728. Privacy and Technology Conference on Public Security, Privacy and Technology, Brussels.

    Google Scholar 

  • Geradts, Z. and Sommer, P. (eds.) (2006), FIDIS Deliverable D6.1: Forensic Implications of Identity Management Systems, Download: www.fidis.net/resources/deliverables/ .

  • Geradts, Z. and Sommer, P. (eds.) (2008), FIDIS Deliverable D6.7c: Forensic Profiling, Download: www.fidis.net/resources/deliverables/.

  • Goldstein, H. (1990), Problem Oriented Policing. Temple University Press, Philadelphia.

    Google Scholar 

  • Grijpink, J. H. A. M. (2006), ‘Identiteitsfraude en overheid’, Justitiële verkenningen 32(7): 37–57.

    Google Scholar 

  • Hildebrandt, M. (2008a), ‘Defining profiling: a new type of knowledge?’ In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 39–50.

    Google Scholar 

  • Hildebrandt, M. (2008b), ‘Profiling and the Identity of the European Citizen’. In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 320–360.

    Google Scholar 

  • Ioset, S., Esseiva, P., Ribaux, O., Weyermann, C., Anglada, F., Lociciro, S., Hayoz, P., Baer, I., Gasté, L., Terrettaz-Zufferey, A. L., Delaporte, C., Margot, P. (2005), ‘Establishment of an operational system for drug profiling: a Swiss experience’, Bulletin of Narcotics 57 (1–2): 121–146.

    Google Scholar 

  • Jaquet-Chiffelle, D. O. (2008), ‘Reply: Direct and Indirect Profiling in the Light of Virtual Persons’. In: Hildebrandt, M. and Gutwirth, S. (eds.), Profiling the European Citizen: Cross Disciplinary Perspectives. Springer, pp 55–63.

    Google Scholar 

  • Kind, S. S. (1987), The Scientific Investigation of Crime. Forensic Science Services Ltd, Harrogate.

    Google Scholar 

  • Kind, S. S. (1994), ‘Crime investigation and the criminal trial: a three chapter paradigm of evidence’, Journal of the Forensic Science Society 34(3): 155–164.

    Article  Google Scholar 

  • Koops, B.-J. (2005), FIDIS Deliverable D5.1: A survey on legislation on ID theft in the EU and a number of other countries, Download: www.fidis.net/resources/deliverables/ .

  • Koops, B.-J. and Leenes, R. E. (2006), ‘ID Theft, ID Fraud and/or ID-related Crime. Definitions matter’, Datenschutz und Datensicherheit (9): 553–556.

    Google Scholar 

  • Koops, B.-J. et al. (2009), ‘A typology of identity-related crime: conceptual, technical, and legal issues’, Information Communication & Society 12(1): 1–24.

    Article  Google Scholar 

  • Kosta, E., Coudert, F., Dumortier, J. (2007), ‘Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive’, International Review of Law, Computers and Technology 21: 343–358.

    Article  Google Scholar 

  • Leenes, R. E. (ed.) (2006), FIDIS Deliverable D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research, Download: www.fidis.net/resources/deliv-erables/.

  • Peterson, M., Morehouse, B., Wright, R. (2000), ‘Intelligence 2000: Revising the Basic Elements’. Law Enforcement Intelligence Unit (L.E.I.U.) et International Association of Law Enforcement Intelligence Analysts (IALEIA), Sacramento, Lawrenceville.

    Google Scholar 

  • Pintér, R. (ed.) (2007), FIDIS Deliverable D5.2c: Identity related crime in the world of films, Download: www.fidis.net/resources/deliverables/.

  • Rossmo, K. (1999) Geographical Profiling. CRC Press.

    Google Scholar 

  • Sheptycki, J. (2004), ‘Organizational Pathologies in Police Intelligence: Some Contributions to the Lexicon of Intelligence-led Policing’, European Journal of Criminology 1(3): 307–332.

    Article  Google Scholar 

  • Sproule, S. and Archer, N. (2006), ‘Defining Identity Theft — A Discussion Paper’, 6 April 2006, http://www.business.mcmaster.ca/IDTDefinition/lit&links.htm.

  • Terrettaz-Zufferey, A.-L., Ratle, F., Ribaux, O., Esseiva, P., Khanevski, M. (2007), ‘Pattern Detection in Forensic Case Data Using Graph-Theory: Application to Heroin Cutting Agents’, Forensic Science International 167: 242–246.

    Article  Google Scholar 

  • United States (2004) The 9/11 Commission Report, National Commission on Terrorist Attacks, http://govinfo.library.unt.edu/911/report/index.htm.

  • Van der Meulen, N. and Koops, B.-J. (eds.) (2008), FIDIS Deliverable D12.7: Identity-related Crime in Europe — Big Problem or Big Hype?, Download: www.fidis.net/resources/deliverables/.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Koops, BJ., Geradts, Z. (2009). Identity-Related Crime and Forensics. In: Rannenberg, K., Royer, D., Deuker, A. (eds) The Future of Identity in the Information Society. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01820-6_8

Download citation

Publish with us

Policies and ethics