Social:Forensic profiling
Part of a series on |
Forensic science |
---|
Forensic profiling is the study of trace evidence in order to develop information which can be used by police authorities. This information can be used to identify suspects and convict them in a court of law.
The term "forensic" in this context refers to "information that is used in court as evidence" (Geradts Sommer). The traces originate from criminal or litigious activities themselves. However traces are information that is not strictly dedicated to the court. They may increase knowledge in broader domains linked to security that deal with investigation, intelligence, surveillance, or risk analysis (Geradts Sommer).
Forensic profiling is different from offender profiling, which only refers to the identification of an offender to the psychological profile of a criminal.
In particular, forensic profiling should refer to profiling in the information sciences sense, i.e., to "The process of 'discovering' correlations between data in data bases that can be used to identify and represent a human or nonhuman subject (individual or group), and/or the application of profiles (sets of correlated data) to individuate and represent a subject or to identify a subject as a member of a group or category" (Geradts Sommer).
Profiling techniques
Forensic profiling is generally conducted using datamining technology, as a means by which relevant patterns are discovered, and profiles are generated from large quantities of data.[1]
A distinction of forms of profiles that are used in a given context is necessary before evaluating applications of data mining techniques for forensic profiling.
Data available
The data available to law enforcement agencies are divided into two categories (Geradts Sommer):
- Nominal data directly designates persons or objects (recidivists, intelligence files and suspect files, stolen vehicles or objects, etc.) and their relations. Nominal data may also be obtained in the framework of specific investigations, for instance a list of calls made with a mobile phone (card and/or phone) that cover a certain period of time, a list of people corresponding to a certain profile, or data obtained through surveillances;
- Crime data consist of traces that result from criminal activities: physical traces, other information collected at the scene, from witness or victims or some electronic traces, as well as reconstructed descriptions of cases (modus operandi, time intervals, duration and place) and their relations (links between cases, series).
Types
- DNA profiling Used for the identification of individuals on the basis of their respective DNA profiles.[2]
- Digital Image Forensics. This covers: image source identification (which is based on specific characteristics of the image acquisition device or technology) and malicious post-processing or tampering (which aim is for instance to verify the integrity of particular features) (Popescu Farid).
- Illicit drug profiling, which refers to the systematic extraction and storage of chemical attributes of drugs seized in order to obtain indications on the manufacture and distribution processes, the size and the evolution of the market). (Terrettaz-Zufferey Ratle)
- Forensic Information Technology (forensic IT), which refers to the analysis of the digital traces that people leave when using information technology.[3]
- Offender profiling i.e. psychological profiling of the criminal.[4]
Issues
The use of profiling techniques represents threats to the privacy of the individual and to the protection of fundamental freedoms. Indeed, criminal data, i.e., data which are collected and processed for suppressing criminal offences, often consists of personal data. One of the issues is the re-use of personal data collected within one criminal investigation for another purpose than the one for which it was collected. An example from the book, “The Psychology and Sociology of Wrongful Convictions: Forensic Science Reform,” there was a profiling error, in which this woman was raped and slaughtered by a serial killer. The suspect was named the Boston Strangler and investigators worked hard in trying to gather a profile for this criminal. Experts eventually came up with the Boston Strangler being two people and that both men lived alone, most likely schoolteachers, and one of them was homosexual. The criminal finally confessed to the crime and his DNA matched up with the scene, but his profile didn’t fit the crime. The profile the experts came up with didn’t match any characteristics of the killer (pp.6). Creating profiles just creates tunnel vision because investigators will be focusing on finding a specific individual that the profile fits, when in reality, the profiling system is insanely flawed and is considered useless to the investigators.
Several methods-including technical, legal, and behavioral-are available to address some of the issues associated with forensic profiling. For instance, in Europe the European Convention on Human Rights provides a number of instruments for the Protection of Individuals with regard to Automatic Processing of Personal Data.
See also
- Forensic identification
- Profiling (disambiguation)
- Use of social network websites in investigations
References
- Geradts, Zeno; Sommer, Peter (2006), "D6.1: Forensic Implications of Identity Management Systems", FIDIS Deliverables 6 (1), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp6-del6.1.forensic_implications_of_identity_management_systems.pdf
- Geradts, Zeno; Sommer, Peter (2008), "D6.7c: Forensic Profiling", FIDIS Deliverables 6 (7c), http://www.fidis.net/fileadmin/fidis/deliverables/fidis-wp6-del6.7c.Forensic_Profiling.pdf
- Popescu, A.C.; Farid, H. (2005), "Exposing digital forgeries in color filter array interpolated images", IEEE Transactions on Signal Processing 167 (53): 3948–3959, doi:10.1109/TSP.2005.855406, Bibcode: 2005ITSP...53.3948P, http://www.cs.dartmouth.edu/farid/publications/sp05a.html, retrieved 2009-03-09
- {{Citation
| last1=Terrettaz-Zufferey | first1=A.-L. | last2=Ratle | first2=F. | last3=Ribaux | first3=O. | last4=Esseiva | first4=P. | last5=Khanevski | first5=M. | year=2007 | title=Pattern Detection in Forensic Case Data Using Graph-Theory: Application to Heroin Cutting Agents | journal=Forensic Science International | volume=167 | issue=2 | pages=242–246 | doi=10.1016/j.forsciint.2006.06.059 | url=http://osiris.sunderland.ac.uk/~cs0her/CIS302%20Lectures/content/PBL1/ribaux2007heroin.pdf | pmid=16884878
- ↑ "Pre-Crime Data Mining". http://v5.books.elsevier.com/bookscat/samples/9780750676137/9780750676137.pdf.
- ↑ Curtis, Caitlin; Hereward, James (August 29, 2017). "From the crime scene to the courtroom: the journey of a DNA sample". The Conversation. https://theconversation.com/from-the-crime-scene-to-the-courtroom-the-journey-of-a-dna-sample-82250.
- ↑ "An introduction to Computer Forensics by Forensic Control" (in en-GB). Forensic Control. https://forensiccontrol.com/resources/beginners-guide-computer-forensics/.
- ↑ "Error: no
|title=
specified when using {{Cite web}}". https://www.apa.org/monitor/julaug04/criminal.
Original source: https://en.wikipedia.org/wiki/Forensic profiling.
Read more |