Skip to main content
Log in

Understanding crime and fostering security using forensic science: The example of turning false identity documents into forensic intelligence

  • Original Article
  • Published:
Security Journal Aims and scope Submit manuscript

Abstract

Detecting and understanding organised forms of crime involved in the manufacture, diffusion and/or use of false identity and travel documents is a complex challenge. It is postulated that a monitoring approach rooted in the systematic examination and profiling of counterfeit and forged documents using forensic science methods shall provide novel, relevant and useful crime intelligence. A method has been developed to process, manage and compare systematically features of false identity documents. The method enables the detection and monitoring of patterns, trends and links between cases. Their interpretation through different forms of analysis points to potential crime groups, prolific offenders and prominent modus operandi. This article highlights how such forensic intelligence may support the elicitation of hypotheses and contribute to the understanding of crime markets and criminal networks. Such a systematic and scientific processing of any forensic science data can foster a more phenomenological and traceological approach to crime and security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8

Similar content being viewed by others

Notes

  1. The word clique is used here in the sense put forward by graph theory, that is, a group of nodes or entities in which every two nodes or entities are connected by a link (Rossy, 2011).

References

  • Aepli, P., Ribaux, O. and Summerfield, E. (2011) Decision Making in Policing – Operations and Management. Lausanne, Switzerland: EPFL Press, Forensic Sciences.

    Google Scholar 

  • Baechler, S., Fivaz, E., Ribaux, O. and Margot, P. (2011) Le Profilage Forensique Des Fausses Pièces D’identité: Une Méthode Prometteuse Pour Lutter Contre La Fraude Documentaire. Revue Internationale De Criminologie Et De Police Technique Et Scientifique 64(4): 467–480.

    Google Scholar 

  • Baechler, S., Ribaux, O. and Margot, P. (2012) Toward a novel forensic intelligence model: Systematic profiling of false identity documents. Forensic Science Policy & Management: An International Journal 3(2): 70–84.

    Article  Google Scholar 

  • Baechler, S., Terrasse, V., Pujol, J.-P., Fritz, T., Ribaux, O. and Margot, P. (2013) The systematic profiling of false identity documents: Method validation and performance evaluation using seizures known to originate from common and different sources. Forensic Science International 232(1–3): 180–190.

    Article  Google Scholar 

  • Baechler, S. et al (2015) Forensic intelligence framework. Part II: Study of the main generic building blocks and challenges through the examples of illicit drugs and false identity documents monitoring. Forensic Science International 250: 44–52.

    Article  Google Scholar 

  • Champod, C. (2014) Research focused mainly on bias will paralyse forensic science. Science & Justice 54(2): 107–109.

    Article  Google Scholar 

  • Clarke, R.V. and Eck, J.E. (2005) Crime analysis for problem solvers in 60 small steps. Center for Problem Oriented Policing, http://www.popcenter.org/Learning/60steps/Index.Cfm?Page=Foreword, accessed 21 September 2015.

  • Cleland, C.E. (2013) Common cause explanation and the search for a smoking gun. The Geological Society of America: Special Paper 502(1): 1–9.

    Article  Google Scholar 

  • Cohen, L.E. and Felson, M. (1979) Social change and crime rate trends: A routine activity approach. American Sociological Review 44(4): 588–608.

    Article  Google Scholar 

  • Corazza, D. and Esseiva, P. (2013) L’apport De La Trace Matérielle Dans L'enquête Criminelle: Évaluation De La Contribution Des Liens Chimiques Issus Du Profilage De Produits Stupéfiants Par L'analyse Des Réseaux Sociaux. Revue Internationale De Criminologie Et De Police Technique Et Scientifique 66(3): 341–363.

    Google Scholar 

  • Cornish, D.B. and Clarke, R.V. (1986) The Reasoning Criminal. New York: Springer-Verlag.

    Book  Google Scholar 

  • Crispino, F. (2008) Nature and place of crime scene management within forensic sciences. Science & Justice 48(1): 24–28.

    Article  Google Scholar 

  • Cusson, M. and Cordeau, G. (1994) Le Crime Du Point De Vue De L’analyse Stratégique. In: D. Szabo and M. Leblanc (eds.) Traité De Criminologie Empirique, 2nd edn. Montreal, Canada: Les Presses De l’Université De Montréal.

    Google Scholar 

  • Delémont, O., Lock, E. and Ribaux, O. (2014) Forensic science And criminal investigation. In: G. Bruinsma and D. Weisburd (eds.) Encyclopedia of Criminology and Criminal Justice. New York: Springer.

    Google Scholar 

  • Estabrooks, C., Gilmour, C., Park, H., Vallières, R. and Warias, C. (2004) Authentication of travel documents via the imagexpert system. Journal of The American Society of Questioned Document Examiners 7(2): 97–104.

    Google Scholar 

  • Europol. (2009) Organised crime threat assessment, https://www.europol.europa.eu/content/publication/octa-2009-eu-organised-crime-threat-assessment-1463, accessed 21 September 2015.

  • Europol. (2013) EU serious and organised crime threat assessment, https://www.Europol.Europa.Eu/Content/Eu-Serious-And-Organised-Crime-Threat-Assessment-Socta, accessed 21 September 2015.

  • Federal Department of Justice and Police. (2013) Réglementation Du Séjour. Secrétariat d'État Aux Migrations, https://www.Bfm.Admin.Ch/Bfm/Fr/Home/Publiservice/Weisungen-Kreisschreiben/Auslaenderbereich/Aufenthaltsregelung.Html, accessed 21 September 2015.

  • Fedpol. (2013) Rapport Annuel 2012 Sur La Lutte De La Confédération Contre La Criminalité, https://www.Fedpol.Admin.Ch/Fedpol/Fr/Home/Aktuell/News/2013/2013-06-25.Html.

  • Girod, A., Champod, C. and Ribaux, O. (2008) Traces De Souliers, Collection Sciences Forensiques. Lausanne, Switzerland: Presses Polytechniques Et Universitaires Romande.

    Google Scholar 

  • Goldstein, H. (1990) Problem Oriented Policing. Philadelphia, PA: Temple University Press.

    Google Scholar 

  • Gordon, G.R. and Willox, N.A. (2003) Identity fraud: A critical national and global threat. Economic Crime Institute, http://www.Utica.Edu/Academic/Institutes/Ecii/Publications/Media/Identity_Fraud.Pdf, accessed 21 September 2015.

  • Groebner, V. (2007) Who are You?: Identification, Deception, and Surveillance in Early Modern Europe. New York: Zone Books.

    Google Scholar 

  • Grossrieder, L., Alertetti, F., Stoffel, K. and Ribaux, O. (2013) Des Données Aux Connaissances, Un Chemin Difficile: Réflexion Sur La Place Du Data Mining En Analyse Criminelle. Revue Internationale De Criminologie Et De Police Technique Et Scientifique 66(1): 99–116.

    Google Scholar 

  • Hodgson, A. (2010) Technologies for Identity Document Verification. NIP26: International Conference on Digital Printing Technologies and Digital Fabrication, Austin, TX.

  • ICAO (International Civil Aviation Organization). (1980) Document 9303, http://www.Icao.Int/Security/Mrtd/Pages/Document9303.Aspx, accessed 21 September 2015.

  • Levinson, J. (1984) Passport examination. Journal of Forensic Sciences 29(2): 628–632.

    Google Scholar 

  • Lima, M. (2011) Visual Complexity: Mapping Patterns of Information. New York: Princeton Architectural Press.

    Google Scholar 

  • Lloyd, M. (2003) The Passport: The History of Man’s Most Travelled Document. Gloucestershire, UK: Sutton Publishing.

    Google Scholar 

  • Locard, E. (1920) L’enquête Criminelle Et Les Méthodes Scientifiques. Paris, France: Flammarion.

    Google Scholar 

  • Margot, P. (2014) Traçologie: La Trace Comme Vecteur Fondamental De La Police Scientifique. Revue Internationale De Criminologie Et De Police Technique Et Scientifique 67(1): 72–97.

    Google Scholar 

  • Mathyer, J. (1980) Quelques Remarques Sur Le Problème De La Sécurité Des Pièces D’identité Et Des Pièces De Légitimation: Une Solution Intéressante. Revue Internationale De Police Criminelle 35(336): 66–79.

    Google Scholar 

  • McGloin, J.M. (2005) Policy and intervention considerations of a network analysis of street gangs. Criminology & Public Policy 4(3): 607–635.

    Article  Google Scholar 

  • Medina, R.M. (2014) Social network analysis: A case study of the Islamist terrorist network. Security Journal 27(1): 97–121.

    Article  Google Scholar 

  • Milne, R. (2012) Forensic Intelligence. Boca Raton, FL: CRC Press.

    Book  Google Scholar 

  • Miro, R.J. and Curtis, G.E. (2003) Organized crime and terrorist activity In Mexico, 1999–2002. Federal Research Division Of The Library Of Congress, http://www.loc.gov/rr/frd/pdf-files/OrgCrime_Mexico.pdf, accessed 21 September 2015.

  • Morelato, M. et al (2014) Forensic intelligence framework. Part I: Induction of a transversal model by comparing illicit drugs and false identity documents monitoring. Forensic Science International 236: 181–190.

    Article  Google Scholar 

  • Morselli, C. (2009) Inside Criminal Networks. New York: Springer Science+Business Media.

    Book  Google Scholar 

  • Morselli, C., Turcotte, M. and Louis, G. (2008) Le Crime Organisé Et Les Contre-Mesures. In: M. Cusson, B. Dupont and F. Lemieux (eds.) Traité De Sécurité Intérieure. Lausanne, Switzerland: Presses Polytechniques Et Universitaires Romandes.

    Google Scholar 

  • NCIS (National Criminal Intelligence Service). (2000) The national intelligence model, http://www.Intelligenceanalysis.Net/National%20Intelligence%20Model.Pdf, accessed 21 September 2015.

  • Ombelli, D. and Knopjes, F. (2008) Documents: The developer’s toolkit. International Organisation for Migration, http://Publications.Iom.Int/Bookstore/Free/Toolkit.Pdf, accessed 21 September 2015.

  • Peirce, C.S. (1931) The Collected Papers. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Pfefferli, P.W., Steiner, J., Oneta, C. and Gähwiler, H. (1999) Bekämpung Von Ausweis- Und Visums-Fälschungen: Ein Lagebericht. Kriminalistik 53(12): 833.

    Google Scholar 

  • Ratcliffe, J. (2008) Intelligence-Led Policing. Portland, OR: Willan.

    Google Scholar 

  • Ratcliffe, J. (2009) Strategic Thinking in Criminal Intelligence. Sydney, Australia: The Federation Press.

    Google Scholar 

  • Revault d’Allonnes, D. (2004) Les Passeports Voyagent Plus En Sécurité. Libération, http://www.Liberation.Fr/Societe/2004/05/20/Les-Passeports-Voyagent-Plus-En-Securite_480151, accessed 21 September 2015.

  • Ribaux, O. (2014) Police Scientifique: Le Renseignement Par La Trace. Lausanne, Switzerland: Presses Polytechniques Et Universitaires Romandes.

    Google Scholar 

  • Ribaux, O. et al (2010) Intelligence-led crime scene processing. Part I: Forensic intelligence. Forensic Science International 195(1–3): 10–16.

    Article  Google Scholar 

  • Ribaux, O., Girod, A., Walsh, S.J., Margot, P., Mizrahi, S. and Clivaz, V. (2003) Forensic intelligence and crime analysis. Law, Probability and Risk 2(1): 47–60.

    Article  Google Scholar 

  • Ribaux, O. and Margot, P. (2008) La Trace Comme Vecteur D’information Au Service Du Renseignement. In: M. Cusson, B. Dupont and F. Lemieux (eds.) Traité De Sécurité Intérieure. Lausanne, Switzerland: Presses Polytechniques Et Universitaires Romandes.

    Google Scholar 

  • Ribaux, O., Margot, P., Julian, R. and Kelty, S.F. (2013) Forensic intelligence. In: J.A. Siegel and P.J. Saukko (eds.) Encyclopedia of Forensic Sciences, 2nd edn. Waltham, MA: Academic Press.

    Google Scholar 

  • Ribaux, O. and Talbot-Wright, B. (2014) Expanding forensic science through forensic intelligence. Science & Justice 54(6): 494–501.

    Article  Google Scholar 

  • Ribaux, O., Walsh, S.J. and Margot, P. (2006) The contribution of forensic science to crime analysis and investigation: Forensic intelligence. Forensic Science International 156(2): 171–181.

    Article  Google Scholar 

  • Rossy, Q. (2011) Méthodes De Visualisation En Analyse Criminelle: Approche Générale De Conception Des Schémas Relationnels Et Développement D’un Catalogue De Patterns. PhD Dissertation, School of Criminal Sciences, Lausanne, Switzerland: University of Lausanne.

  • Rossy, Q. and Ribaux, O. (2012) La Conception De Schémas Relationnels En Analyse Criminelle: Au-Delà De La Maîtrise Des Outils. Revue Internationale De Criminologie Et De Police Technique Et Scientifique 65(3): 345–362.

    Google Scholar 

  • Rossy, Q. and Ribaux, O. (2014) A collaborative approach for incorporating forensic case data into crime investigation using criminal intelligence analysis and visualisation. Science & Justice 54(2): 146–53.

    Article  Google Scholar 

  • Steinmann, S., Baechler, S., Fivaz, E., Villettaz, P. and Aebi, M. (2013) L’usage De Faux Documents D’identité: Situations Récurrentes, Profil Des Auteurs Et Jugements Pénaux. Revue Internationale De Criminologie Et De Police Technique Et Scientifique 66(3): 295–320.

    Google Scholar 

  • The 9/11 Commission. (2004) The 9/11 Commission Report, http://www.9-11commission.Gov/Report/911Report.Pdf, accessed 21 September 2015.

  • UNODC. (2010a) Report of observations and conclusions of the session on the use of forensic sciences to combat and prevent identity-related crime, 21–22 January 2010, 4th Meeting of the International Core Group of Experts on Identity-Related Crime, Vienna, Austria, 18-2. Integration and coordination of efforts by the United Nations Office on Drugs and Crime and by Member States in the field of crime prevention and criminal justice. Vienna: Commission on Crime Prevention and Criminal Justice of the United Nations, United Nations Office on Drugs and Crime.

  • UNODC. (2010b) Guide for the development of forensic document examination capacity, https://www.unodc.org/documents/scientific/Forensic_Document_Examination_Capacity.pdf, accessed 21 September 2015..

  • UNODC. (2011) Criminal intelligence: Manual for analysts, https://www.Unodc.Org/Documents/Organized-Crime/Law-Enforcement/Criminal_Intelligence_For_Analysts.Pdf, accessed 21 September 2015.

  • Wortley, R. and Mazerolle, L. (2008) Environmental Criminology and Crime Analysis. Cullompton, UK: Willan.

    Google Scholar 

Download references

Acknowledgements

The authors are grateful to the Institut de Recherche Criminelle de la Gendarmerie Nationale (IRCGN) in France, to the Swiss cantonal police departments of Aargau, Bern, Fribourg, Genève, Neuchâtel, Ticino, Valais, Vaud and Zürich, and to the Swiss Federal Office of Police for providing data and for their collaboration to this research work. They would also like to thank Benjamin Talbot-Wright for proofreading the manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simon Baechler.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Baechler, S., Margot, P. Understanding crime and fostering security using forensic science: The example of turning false identity documents into forensic intelligence. Secur J 29, 618–639 (2016). https://doi.org/10.1057/sj.2015.26

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/sj.2015.26

Keywords

Navigation