Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Table Of Content
- Executive Summary
- Introduction
- Definitions
- Introduction
- Definition of forensic profiling
- Forensic profiling in its context
- Profiling and the reconstruction process
- The different forms of forensic profiling in the judicial process
- The interpretation process and profiling
- Structuring evidence and profiling
- Forensic profiling in an investigative perspective
- Categorical elimination
- Repetition of crimes as a fertile area for forensic profiling
- Repetition of crimes – crime series
- Repetition of crimes – problems and phenomena
- Repetition of crimes – tactical, operational and strategic analysis
- Intelligence, risk analysis, detection and surveillance from a forensic profiling perspective
- Perspectives: virtual persons and forensic profiling
- Emerging Profiling Technologies
- Digital Image Forensics
- Tracking people and cars using 3D modelling and CCTV
- Setting up a centre of expertise on intelligent data analysis
- Example of intelligence management system through forensic profiling: drug profiling
- Legal implications of forensic profiling: of good old data protection legislation and novel legal safeguards for due processing.
- Forensic profiling the old and the new way
- Scope of application of the different data protection instruments
- Criminal data as personal data
- Data protection instruments applicable to forensic profiling
- Forensic profiling and the interconnection of police databases
- Accuracy of the information processed
- Re-use of personal data
- Storage of personal data
- Risk profiling
- Risk profiling – acting proactively on information inferred from aggregative data
- Keeping Risk Profiling fair: Due Process?
- Critical analysis of the existing safeguards with regard to risk profiling
- Alternative legal safeguards for Risk Profiling: Adequate Remedies and Due Processing.
- Adequate remedies
- Instead of Due Process: Due Processing
- Values guiding the Due Processing: Legitimacy and Proportionality
- Conclusions and Recommendations
- Bibliography