You are here: Resources > FIDIS Deliverables > Forensic Implications > D6.7c: Forensic Profiling > 
Conclusions and Recommendations  Title:
BIBLIOGRAPHY
 

 

Bibliography

 

Aalberg L., K. Andersson, C. Bertler, H. Borén, M. D. Cole, J. Dahlén, Y. Finnon, H. Huizer, K. Jalava, E. Kaa, E. Lock, A. Lopes, A. P.-v. d. Meer and E. Sippola (2007a). “Development of a harmonised method for the profiling of amphetamines I. Synthesis of standards and compilation of analytical data.” Forensic Science International 169: 219-229    

 

Aalberg L., K. Andersson, C. Bertler, H. Borén, M. D. Cole, Y. Finnon, H. Huizer, K. Jalava, E. Kaa, E. Lock, A. Lopes, A. P.-v. d. Meer, E. Sippola and J. Dahlén (2007b). “Development of a harmonised method for the profiling of amphetamines II. Stability of impurities in organic solvents.” Forensic Science International 169: 231-241    

 

Aitken C. C. G. and F. Taroni (2004). Statistics and the Evaluation of Evidence for Forensic Scientists. John Wiley & Sons, London. 

 

Anderson D. S., C. Fleizach, S. Savage and G. M. Voelker (2006). Spamscatter: Characterizing Internet Scam Hosting infrastructure. Proceedings of the USENIX Security Symposium, Boston, MA. 

 

Andersson K., E. Lock, K. Jalava, H. Huizer, S. Jonson, E. Kaa, A. Lopes, A. P.-v. d. Meer, E. Sippola, L. Dujourdy and J. Dahlén (2007c). “Development of a harmonised method for the profiling of amphetamines VI. Evaluation of methods for comparison of amphetamine.” Forensic Science International 169: 86-99 

 

Andersson K., K. Jalava, E. Lock, Y. Finnon, H. Huizer, E. Kaa, A. Lopes, A. P.-v. d. Meer, M. D. Cole, J. Dahlén and E. Sippola (2007a). “Development of a harmonised method for the profiling of amphetamines III. Development of the gas chromatographic method.” Forensic Science International 169: 50-63 

 

Andersson K., K. Jalava, E. Lock, Y. Finnon, H. Huizer, E. Kaa, A. Lopes, A. P.-v. d. Meer, M. D. Cole, J. Dahlén and E. Sippola (2007b). “Development of a harmonised method for the profiling of amphetamines IV. Optimisation of sample preparation.” Forensic Science International 169: 64-76 

 

Anrig B., W. Browne and M. Gasson (2008). The Role of Algorithms in Profiling. Profiling the European Citizen: Cross Disciplinary Perspective. M. Hildebrandt and S. Gutwirth. Springer. 39-50. 

 

Audit commission (1993). Helping with Enquiries. London, HMSO: Police paper no. 12. 

Birrer S., O. Ribaux, J. Cartier, Q. Rossy, S. Capt and M. Zufferey (2007). “Exploratory study for the detection and analysis of links between prospective advance fee fraud e-mails in an intelligence perspective.” IALEA Journal 17: 11-21 

 

Breyer, P. (2005). Telecommunications Data Retention and Human Rights: The Compatibility of Blanket Traffic Data Retention with the ECHR. European Law Journal 11, pp. 365-375. 

Brodeur J.-P. (2005). “L’enquête criminelle.” Criminologie 38(2): 39-64 

Bruce C. W., Hick S. R., and Cooper J. P. (2004). Exploring Crime Analysis: Readings on Essential Skills. International Association of Crime Analysts, Overland Park. 

 

Byford, L. (1981). The Yorkshire Ripper Case: Review of the Police Investigation of the Case. H. M. s. I. o. Constabulary, Home Office. 

 

Bygrave, L. A. (2002). "Data Protection Law: approaching its rationale, logic and limits," Kluwer Law international. 

 

Campbell v. United Kingdom (1992), European Court of Human Rights, 15 EHRR 137. 

 

Chen W, Y. Q. Shi, and W. Su. Image splicing detection using 2-d phase congruency and statistical moments of characteristic function. In E. J. Delp and P. W. Wong, editors, Proceedings of SPIE: Security and Watermarking of Multimedia Content IX, volume 6505, page 65050R, 2007. 

 

Choi, K.S; E. Y. Lam, and K. K. Y. Wong. Automatic source camera identification using intrinsic lens radial distortion. Optics Express, 14(24):11551–11565, 2006. 

 

Citron, D. K. (2007). Technological Due Process. University of Maryland Legal Studies Research Paper No. 2007-26 Available at SSRN: http://ssrn.com/abstract=1012360. 

 

Clarke R. V. and J. Eck (2003). Become a Problem Solving Crime Analyst in 55 Small Steps. Jill Dando Institute of Crime Science, University College London. 

 

COM(90) 314 final - SYN 287, Brussels, 13 September 1990. Commission of the European Communities. Proposal for a Council Directive Concerning the Protection of Individuals in Relation to the Processing of Personal Data.  

 

Convention for the Protection of Individuals with regards to Automatic Processing of Personal Data. European Treaty Series, no. 108, Strasbourg, 28 January 1981; International Legal Materials, 1981, I: 422". 

 

Cook R., I. W. Evett, G. Jackson, P. J. Jones and J. A. Lambert (1998). “A hierarchy of propositions: deciding which level to address in casework.” Science & Justice 38: 103-111 

 

Council Framework Decision 2006/960/JHA of 18 December 2006 on simplifying the exchange of information and intelligence between law enforcement authorities of the Member States of the European Union. OJEU of 29 December 2006, L386/89. 

 

Council of Europe, Recommendation nº R (87) 15, regulating the use of personal data in the police sector, 17 September 1987. 

 

De Hert, P. Presentation 4: Profiling issues and due process. Fidis Deliverable D.6.5/6.6: Second thematic workshop forensic implications combined with the workshop on forensic profiling: Crime control and due process. 

 

Dinant, J.-M., Lazaro, C., Poullet, Y, Lefever, N., Rouvroy, A. (2008). Application of Convention 108 to the profiling mechanism. Some ideas for the future work of the consultative committee (T-PD) Available at: http://www.coe.int/t/e/legal_affairs/legal_cooperation/data_protection/Documents/Reports_and_studies_by_Experts/CRID_Profiling_2008_en.pdf  

 

Directive 2006/24/EC of the European Parliament and of the Council on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Official Journal L105, 15 March 2006, pp. 54-63. 

 

Directive 91/308/EEC, on prevention of the use of the financial system for the purpose of preventing criminal offences, of 10 June 1991. Official Journal L 166 of 28.06.1991. 

 

Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L 281, 23 November 1995. 

 

Dujourdy L., G. Barbati, F. Taroni, O. Guéniat, P. Esseiva, F. Anglada and P. Margot (2003). “Evaluation of links in heroin seizures.” Forensic Science International 131: 171-183 

 

Egger S. A. (1984). “A Working Definition of Serial Murder and the Reduction of Linkage Blindness.” Journal of Police Science and Administration 12(3): 348-355 

 

Esseiva P., L. Dujourdy, F. Anglada, F. Taroni and P. Margot (2003). “A Methodology for Illicit Heroin Seizures Comparison in a Drug Intelligence Perspective Using Large Databases.” Forensic Science International 132: 139-152 

 

Farid, H. Digital image ballistics from JPEG quantization. Technical Report TR2006-583, Department of Computer Science, Dartmouth College, Hanover, NH, USA, 2006. 

 

Farrell G. and K. Pease (2001). “Repeat Victimization.” Crime Prevention Studies 12: special issue 

 

Felson M. and R. V. Clarke (1998). Opportunity Makes the Thief: Practical theory for crime prevention. Police Research Series. London, Home Office, Research, Development and Statistics Directorate, Policing and Reducing Crime Unit: 98. 

 

First Opinion of the EDPS on the proposed Framework Decision, OJ C 47, 25.2.2006, p. 27. 

Franco Frattini, European Commissioner responsible for Justice, Freedom and Security, Closing speech on Public Security (20 November 2007). Speech /07/728. Privacy and Technology Conference on Public Security, Privacy and Technology", Brussels, Charlemagne building. 

 

Geradts Z., J. Keijer and I. Keereweer (1999). “A new Approach to Automatic Comparison of Striation Marks.” Journal of Forensic Sciences 39(4): 974-980 

 

Girod A. (2002). Exploitation et gestion systématiques des traces de souliers: une approche complémentaire pour l’investigation criminelle des cambriolages. Ecole des Sciences Criminelles, Université de Lausanne, PhD Thesis. 

 

Girod A., O. Ribaux, S. J. Walsh and P. Margot (2004). “Bases de données ADN: un potentiel peu exploité de mise en relation d’événements criminels.” Revue Internationale de Criminologie et de Police Technique et Scientifique(2): 131-147 

 

Gloe, T; M. Kirchner, A. Winkler, and R. Böhme. Can we trust digital image forensics? In MULTIMEDIA ‘07: Proceedings of the 15th international conference on Multimedia, September 24–29, 2007, Augsburg, Germany, pages 78–86, New York, NY, USA, 2007. ACM Press.

 

GNIM (2005). Guidance on the National Intelligence Model, ACPO, http://police.homeoffice.gov.uk/news-and-publications/publication/police-reform/Interactive_NIM_1_.pdfhttp://police.homeoffice.gov.uk/news-and-publications/publication/police-reform/Interactive_NIM_1_.pdf (last access December 14th, 2007). 

 

Godwin M. (2001). Weakness in Computerized Linking Databases. Criminal Psychology and Forensic Technology. M. Godwin. CRC Press. London. 

 

Goldstein H. (1990). Problem Oriented Policing. Temple University Press, Philadelphia. 

Grubin D., P. Kelly and C. Brunsdone (2001). Linking Serious Sexual Assaults through Behaviour, Home Office, Development and Statistics Directorate: Research Study 215. 

Guéniat O. and P. Esseiva (2005). Le profilage de l’héroïne et de la cocaïne. Presses Polytechniques et Universitaires Romandes, Lausanne.

 

Hildebrandt M. (2008). Defining profiling: a new type of knowledge ? Profiling the European Citizen: Cross Disciplinary Perspective. M. Hildebrandt and S. Gutwirth. Springer. 39-50. 

 

Hildebrandt, M. (2008). Profiling and the Identity of the European Citizen. In "Profiling the European Citizen: Cross-disciplinary Perspectives" (M. Hildebrandt and S. Gutwirth, eds.), pp. 320-360. Springer. 

 

Hildebrandt, M. (2008). Profiling and the Identity of the European Citizen. Profiling the European Citizen: Cross-disciplinary Perspectives. M. Hildebrandt and S. Gutwirth, Springer: 320-360. 

 

Hildebrandt, M., Gutwirth, S., and De Hert, P. (2005). "Deliverable 7.4. Implications of profiling practices on democracy and rule of law.." FIDIS (Future of Identity in the Information Society). 

Hildebrandt, M., S. Gutwirth, et al. (2005). Deliverable 7.4. Implications of profiling practices on democracy and rule of law., FIDIS (Future of Identity in the Information Society). 

 

House of Lords, Mr. R. Thomas, Mr. David Smith and Mr. J. Bamford, "Surveillance and data collection", Minutes of the Evidence of hearing taken before the select Committee on the Constitution, 14 November 2007. 

 

Initiative of the Federal Republic of Germany, with a view to adopting a Council Decision on the implementation of Decision 2007/…/JHA on the stepping up of cross-border cooperation, particularly in combating terrorism and cross-border crime, 9 November 2007, OJ [2007] C267, p. 4. 

 

Ioset S., P. Esseiva, O. Ribaux, C. Weyermann, F. Anglada, S. Lociciro, P. Hayoz, I. Baer, L. Gasté, Anne-LaureTerrettaz-Zufferey, C. Delaporte and P. Margot (2005). “Establishment of an operational system for drug profiling: a Swiss experience.” Bulletin of Narcotics 57 (1-2): 121-146 

 

Jackson G. (2004). The Nature of Forensic Science Opinion – a Possible Framework to Guide Thinking and Practice in Investigations and in Court Proceedings. Forensic science society autumn meeting, Wyboston, UK. 

 

Jackson G., C. Champod, I. W. Evett and S. McCrossan (2006). “Investigator/Evaluator - a Possible Framework to Guide Thinking and Practice for Forensic Scientist.” Science & Justice 46(1): 33-45 

 

Jaquet-Chiffelle D.-O. (2008). Reply: Direct and Indirect Profiling in the Light of Virtual Persons. Profiling the European Citizen: Cross Disciplinary Perspective. M. Hildebrandt and S. Gutwirth. Springer. 55-63. 

 

Johnson M.K. and H. Farid. Exposing digital forgeries by detecting inconsistencies in lighting. In MM&Sec’05, Proceedings of the Multimedia and Security Workshop 2005, August 1-2, 2005, New York, NY, USA, pages 1–10, 2005. 

 

Johnson M.K. and H. Farid. Exposing digital forgeries through chromatic aberration. In MM&Sec’06, Proceedings of the Multimedia and Security Workshop 2006, September 26-27, 2006, Geneva, Switzerland, pages 48–55, 2006. 

 

Kharrazi, M.; H. T. Sencar, and N. Memon. Blind source camera identification. In Proceedings of the 2004 IEEE International Conference on Image Processing (ICIP 2004), pages 709–712, 2004. 

 

Kind S. S. (1987). The Scientific Investigation of Crime. Forensic Science Services Ltd, Harrogate. 

 

Kind S. S. (1994). “Crime investigation and the criminal trial: a three chapter paradigm of evidence.” Journal of the Forensic Science Society 34(3): 155-164 

Kosta, E., Coudert, F., and Dumortier, J. (2007). Data protection in the third pillar: in the aftermath of the ECJ decision on PNR data and the data retention directive. International Review of Law, Computers and Technology 21, 343-358. 

 

Lin, Z; R. Wang, X. Tang, and H.-Y. Shum. Detecting doctored images using camera response normality and consistency. In Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), volume 1, pages 1087–1092, 2005. 

 

Lock E., L. Aalberg, K. Andersson, J. Dahlén, M. D. Cole, Y. Finnon, H. Huizer, K. Jalava, E. Kaa, A. Lopes, A. P.-v. d. Meer and E. Sippola (2007). “Development of a harmonised method for the profiling of amphetamines V. Determination of the variability of the optimised method.” Forensic Science International 169(77-85) 

 

Lukáš J. and J. Fridrich. Estimation of primary quantization matrix in double compressed JPEG images. In Digital Forensic Research Workshop, Cleveland, 2003. 

 

Lyon, D. (2007). Surveillance Studies. An Overview. Cambridge, Polity Press. 

Mennell J. (2006). “The Future of Forensic and Crime Scene Science Part II, A UK Perspective on Forensic Science Education.” Forensic Science International 157(Supplement 1): S13-S20 

 

Mennell J. and I. Shaw (2006). “The Future of Forensic and Crime Scene Science Part I - A UK Forensic Science User and Provider Perspective.” Forensic science international 157(Supplement 1): S7-S12. 

 

Oatley G., B. Ewart and J. Zeleznikow (2006). “Decision support systems for police: Lessons form the application of data mining techniques to “soft” forensic evidence.” Artificial Intelligence and Law 14: 35-100. 

 

Opinion on the draft Proposal for a Council Framework Decision on the use of Passenger Name Record (PNR) data for law enforcement purposes, 20 December 2007. European Data Protection Supervisor. 

 

Peterson M., B. Morehouse and R. Wright (2000). Intelligence 2000: Revising the Basic Elements. Law Enforcement Intelligence Unit (L.E.I.U.) et International Association of Law Enforcement Intelligence Analysts (IALEIA), Sacramento, Lawrenceville. 

 

Popescu, A.C. and H. Farid. Exposing digital forgeries by detecting traces of re-sampling. IEEE Transactions on Signal Processing, 53(2):758–767, 2005. 

 

Popescu, A.C. and H. Farid. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing, 53(10):3948–3959, 2005. 

 

Proposal for a Council Framework Decision on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters (produced by the  

German Council Presidency), EU doc no: 7315/07 of 13 March 2007, available at: http://register.consilium.europa.eu/ 

 

Proposal for a Council Framework Decision on the protection of personal data processed in the framework of police and judicial cooperation in criminal matters, EU doc no: 16069/07 of 11 December 2007, available at: http://register.consilium.europa.eu/ 

 

Proposal for a Council Framework Decision on the use of Passenger Name Record (PNR) data for law enforcement purposes, European Commission, COM(2007) 654, 22 October 2007. 

 

Proposal for a Council Framework Decision on the use of Passenger Name Record (PNR) for law enforcement purposes, COM(2007) 654 final, 6 November 2007. 

 

Psychology and Law enforcement - Criminal profiling. APA Monitor on Psychology, 35, July/August 2004, No. 7, available at: http://www.apahelpcenter.org/articles/pdf.php?id=64. 

 

Ratle F., C. Gagné, Anne-LaureTerrettaz-Zufferey, M. Khanevski, P. Esseiva and O. Ribaux (2007). “Advanced Clustering Methods for Mining Chemical Databases in Forensic Science.” Chemometrics and Intelligent laboratory Systems in press 

 

Ribaux O. and P. Margot (2007). La trace comme vecteur d’information au service du renseignement. Traité de sécurité intérieure. M. Cusson, B. Dupont and F. Lemieux. Hurtubise HMH. Montréal: 300-321. 

 

Ribaux O., S. J. Walsh and P. Margot (2006). “The Contribution of Forensic Science to Crime Analysis and Investigation: Forensic Intelligence”.” Forensic Science International(156): 171-181 

 

Rix B. (2004). “The contribution of shoemark data to police intelligence, crime detection and prosecution.” Findings, Home Office, Research, Development and Statistics Directorate(236) 

 

Rossmo K. (1999). Geographical Profiling. CRC Press. 

 

Rotaru vs. Romania, nº 28341/95. Vol. Official Journal L 166 of 28.06.1991. 

 

Second evaluation report of the relevance of recommendation N° R (87) 15 regulating the use of personal data in the police sector, Council of Europe, 1998. 

 

Second Opinion of the EDPS on the proposed Framework Decision, available on the EDPS website: www.edps.europa.eu. 

 

Sheptycki J. (2004). “Organizational Pathologies in Police Intelligence: Some Contributions to the Lexicon of Intelligence-led Policing.” European Journal of Criminology 1(3): 307-332 

 

Steinbock, D. (2005). “Data Matching, Data Mining, and Due Process.” Georgia Law Review 40(1): 1-84. 

 

Steinbock, D. (2005). Data Matching, Data Mining, and Due Process. Georgia Law Review 40, 1-84. 

 

Stepping up of cross-border cooperation, particularly in combating terrorism and cross-border crime, European Parliament, the Legislative Observatory, 2007, Procedure file on the Prüm  

 

Treaty, available online at: http://www.europarl.europa.eu/oeil/file.jsp?id=5456232.  

 

Terrettaz-Zufferey A.-L., F. Ratle, O. Ribaux, P. Esseiva and M. Kanevski (2006).  

 

“Assessment of Data Mining Methods for Forensic Case Data Analysis.” Journal of Criminal Justice and Security (Varstovoslovje) Special issue(3-4): 350-355 

 

Terrettaz-Zufferey A.-L., F. Ratle, O. Ribaux, P. Esseiva and M. Khanevski (2007). “Pattern  

Detection in Forensic Case Data Using Graph-Theory: Application to Heroin Cutting Agents.” Forensic Science International 167: 242-246 

 

The United Kingdom Parliament, Home Affairs, Third report, 24 May 2007. Available at: http://www.publications.parliament.uk/pa/cm200607/cmselect/cmhaff/76/7602.htm 

 

Third Opinion of the EDPS on the proposed Framework Decision, OJ C 50, 23.6.2007, p. 1. 

Travis, A. (2007). New powers vital to avert surveillance society, says watchdog. The Guardian, 1 May 2007. 

 

Travis, A. (2007). New powers vital to avert surveillance society, says watchdog. The Guardian. 

 

United States (2004). The 9/11 Commission Report. 

 

Völlmer A. (1919). “Revision of the Atcherley Modus operandi System.” Journal of the American Institute of Criminal Law and Criminology 10: 229-274 

 

Warren, S. D., and Brandeis, L. D. (1890). The Right to Privacy. Harvard Law Review 4, 193-220. 

 

Wiggett A., A. Walters, L. O’Hanlon and F. Ritchie (2003). “Forensic Science Society Spring Meeting 2002: Intelligence.” Science & Justice 43(2): 109-118 

 

Witzig E. W. (2003). “The New VICAP.” FBI Law Enforcement Bulletin(June): 1-7 

 

Wolfgang M., R. Figlio and T. Sellin, Eds. (1972). Delinquency in a Birth Cohort. University of Chicago Press. 

 

Zarsky, T. Z. (2002-2003). ““Mine Your own Business!”: Making the Case for the Implications of the Data Mining of Personal Information in the Forum of Public Opinion.” Yale Journal of Law & Technology 5: 1-56 

 

 

Conclusions and Recommendations  fidis-wp6-del6.7c.Forensic_Profiling.sxw  
27 / 27