Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
D5.1: A survey on legislation on ID theft in the EU and….
D5.2: ID Fraud Workshop.
D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
D5.2c: Identity related crime in the world of films.
D5.3: A Multidisciplinary Article on Identity-related Crime.
D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
D6.1: Forensic Implications of Identity Management Systems.
D6.5/D6.6: Second thematic Workshop forensic implications.
D6.7b: Workshop on Forensic Profiling.
D6.7c: Forensic Profiling.
HighTechID.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
Table Of Content
- Executive Summary
- Introduction
- Definitions
- Introduction
- Definition of forensic profiling
- Forensic profiling in its context
- Profiling and the reconstruction process
- The different forms of forensic profiling in the judicial process
- The interpretation process and profiling
- Structuring evidence and profiling
- Forensic profiling in an investigative perspective
- Categorical elimination
- Repetition of crimes as a fertile area for forensic profiling
- Repetition of crimes – crime series
- Repetition of crimes – problems and phenomena
- Repetition of crimes – tactical, operational and strategic analysis
- Intelligence, risk analysis, detection and surveillance from a forensic profiling perspective
- Perspectives: virtual persons and forensic profiling
- Emerging Profiling Technologies
- Digital Image Forensics
- Tracking people and cars using 3D modelling and CCTV
- Setting up a centre of expertise on intelligent data analysis
- Example of intelligence management system through forensic profiling: drug profiling
- Legal implications of forensic profiling: of good old data protection legislation and novel legal safeguards for due processing.
- Forensic profiling the old and the new way
- Scope of application of the different data protection instruments
- Criminal data as personal data
- Data protection instruments applicable to forensic profiling
- Forensic profiling and the interconnection of police databases
- Accuracy of the information processed
- Re-use of personal data
- Storage of personal data
- Risk profiling
- Risk profiling – acting proactively on information inferred from aggregative data
- Keeping Risk Profiling fair: Due Process?
- Critical analysis of the existing safeguards with regard to risk profiling
- Alternative legal safeguards for Risk Profiling: Adequate Remedies and Due Processing.
- Adequate remedies
- Instead of Due Process: Due Processing
- Values guiding the Due Processing: Legitimacy and Proportionality
- Conclusions and Recommendations
- Bibliography
