请输入您要查询的百科知识:

 

词条 Forensic profiling
释义

  1. Profiling techniques

  2. Data available

  3. Types

  4. Issues

  5. See also

  6. References

{{ForensicScience|criminal|image=User_Profile_Info_Model.svg}}

Forensic profiling is the study of trace evidence in order to develop information which can be used by police authorities. This information can be used to identify suspects and convict them in a court of law.

The term "forensic" in this context refers to "information that is used in court as evidence" {{Harv|Geradts|Sommer|2006|p=10}}. The traces originate from criminal or litigious activities themselves. However traces are information that is not strictly dedicated to the court. They may increase knowledge in broader domains linked to security that deal with investigation, intelligence, surveillance, or risk analysis {{Harv|Geradts|Sommer|2008|p=26}}.

Forensic profiling is different than offender profiling, which only refers to the identification of an offender to the psychological profile of a criminal.

In particular, forensic profiling should refer to profiling in the information sciences sense, i.e., to "The process of 'discovering' correlations between data in data bases that can be used to identify and represent a human or nonhuman subject (individual or group), and/or the application of profiles (sets of correlated data) to individuate and represent a subject or to identify a subject as a member of a group or category" {{Harv|Geradts|Sommer|2006|p=41}}.

Profiling techniques

Forensic profiling is generally conducted using datamining technology, as a means by which relevant patterns are discovered, and profiles are generated from large quantities of data.[1]

A distinction of forms of profiles that are used in a given context is necessary before evaluating applications of data mining techniques for forensic profiling.

Data available

The data available to law enforcement agencies are divided into two categories {{Harv|Geradts|Sommer|2008|p=15}}:

  • Nominal data directly designates persons or objects (recidivists, intelligence files and suspect files, stolen vehicles or objects, etc.) and their relations. Nominal data may also be obtained in the framework of specific investigations, for instance a list of calls made with a mobile phone (card and/or phone) that cover a certain period of time, a list of people corresponding to a certain profile, or data obtained through surveillances;
  • Crime data consist of traces that result from criminal activities: physical traces, other information collected at the scene, from witness or victims or some electronic traces, as well as reconstructed descriptions of cases (modus operandi, time intervals, duration and place) and their relations (links between cases, series).

Types

  • DNA profiling Used for the identification of individuals on the basis of their respective DNA profiles[2].
  • Digital Image Forensics. This covers: image source identification (which is based on specific characteristics of the image acquisition device or technology) and malicious post-processing or tampering (which aim is for instance to verify the integrity of particular features) {{Harv|Popescu|Farid|2005}}.
  • Illicit drug profiling, which refers to the systematic extraction and storage of chemical attributes of drugs seized in order to obtain indications on the manufacture and distribution processes, the size and the evolution of the market). {{Harv|Terrettaz-Zufferey|Ratle|Ribaux|Esseiva|Khanevski|2007}}
  • Forensic Information Technology (forensic IT), which refers to the analysis of the digital traces that people leave when using information technology.[3]
  • Offender profiling i.e. psychological profiling of the criminal.

Issues

The use of profiling techniques represents threats to the privacy of the individual and to the protection of fundamental freedoms. Indeed, criminal data, i.e., data which are collected and processed for suppressing criminal offences, often consists of personal data. One of the issues is the re-use of personal data collected within one criminal investigation for another purpose than the one for which it was collected.

Several methods-including technical, legal, and behavioral-are available to address some of the issues associated with forensic profiling. For instance, in Europe the European Convention on Human Rights provides a number of instruments for the Protection of Individuals with regard to Automatic Processing of Personal Data.

See also

  • Forensic identification
  • Profiling (disambiguation)
  • Use of social network websites in investigations

References

  • {{Citation

| last=Geradts | first=Zeno
| last2=Sommer | first2=Peter
| year=2006
| title=D6.1: Forensic Implications of Identity Management Systems
| journal=FIDIS Deliverables
| volume=6 | issue=1
| url=http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp6-del6.1.forensic_implications_of_identity_management_systems.pdf
}}
  • {{Citation

| last=Geradts | first=Zeno
| last2=Sommer | first2=Peter
| year=2008
| title=D6.7c: Forensic Profiling
| journal=FIDIS Deliverables
| volume=6 | issue=7c
| url=http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp6-del6.7c.Forensic_Profiling.pdf
}}
  • {{Citation

| last=Popescu | first=A.C.
| last2=Farid | first2=H.
| year=2005
| title=Exposing digital forgeries in color filter array interpolated images
| journal=IEEE Transactions on Signal Processing
| volume=167 | issue=53 | pages=3948–3959
| doi=10.1109/TSP.2005.855406
| url=http://www.cs.dartmouth.edu/farid/publications/sp05a.html
}}
  • {{Citation

| last=Terrettaz-Zufferey | first=A.-L.
| last2=Ratle | first2=F.
| last3=Ribaux | first3=O.
| last4=Esseiva | first4=P.
| last5=Khanevski | first5=M.
| year=2007
| title=Pattern Detection in Forensic Case Data Using Graph-Theory: Application to Heroin Cutting Agents
| journal=Forensic Science International
| volume=167 | issue=2 | pages=242–246
| doi=10.1016/j.forsciint.2006.06.059
| url=http://osiris.sunderland.ac.uk/~cs0her/CIS302%20Lectures/content/PBL1/ribaux2007heroin.pdf
| pmid=16884878
}}
1. ^{{Cite web|url=http://v5.books.elsevier.com/bookscat/samples/9780750676137/9780750676137.pdf|title=Pre-Crime Data Mining|last=|first=|date=|website=cs.brown.edu/|archive-url=|archive-date=|dead-url=|access-date=}}
2. ^{{Cite news|url=https://theconversation.com/from-the-crime-scene-to-the-courtroom-the-journey-of-a-dna-sample-82250|title=From the crime scene to the courtroom: the journey of a DNA sample|last=Curtis|first=Caitlin|date=August 29, 2017|work=The Conversation|access-date=|archive-url=|archive-date=|dead-url=|last2=Hereward|first2=James}}
3. ^{{Cite news|url=https://forensiccontrol.com/resources/beginners-guide-computer-forensics/|title=An introduction to Computer Forensics by Forensic Control|work=Forensic Control|access-date=2017-10-05|language=en-GB}}

2 : Offender profiling|Forensic disciplines

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/12 11:00:14