Who are you today? Profiling the ID theft fraudster

Conference item


Angelopoulou, Olga, Vidalis, Stilianos and Robinson, Ian 2012. Who are you today? Profiling the ID theft fraudster. Academic Publishing International Limited.
AuthorsAngelopoulou, Olga, Vidalis, Stilianos and Robinson, Ian
Abstract

Online Identity Theft (ID theft) is a significant problem in our modern knowledge-based and social driven computing era. This type of cybercrime can be achieved in a number of different ways; and more of the point, various statistical figures suggest it is on the increase. The target is individual privacy and self-assurance, while efforts and measures for increased security and protection appear inadequate to prevent it. While personal identities are increasingly being stored and shared on digital media in virtualised environments, the threat of personal and private information that is used fraudulently cannot be eliminated. This trend in crime can result in complex investigations that involve virtualised information technologies, both as a medium for analysis and as evidence at the same time. Fraudsters are obtaining more sophisticated technological ways and increase their capability not only for committing but also for concealing their crimes. It is believed that fraudsters of this kind of crime are not acting individually, but rather they operate in an organised and well-structured manner. Indeed ID theft is nowadays directly linked to drug trafficking, money laundering and terrorism. ID theft, like almost all different types of crime, involves two parts, at least one victim and at least one fraudster. We argue that the differentiation of the investigation procedure between the victim’s and the fraudster’s side, depends on the ownership and control of the digital media involved in the crime, and can provide results on a more crime-focused basis. In addition it provides information gathering, understanding and knowledge about the way the fraudster acts and could potentially assist in future investigations. Different pieces of evidence can be discovered on each side (victim-fraudster) concerning the techniques that have been used to perpetrate the crime. The online ID theft techniques can leave evidence on both the victim’s and the fraudster’s system. However, the evidence tends to contain different elements on each side that can reveal information about the fraudster and eventually profile him in relation to the attack. There is an approach of profiling the ID theft fraudster based on the findings thatarise during the forensic investigation process in this paper. We discuss the extent of ID theft as a problem and the role of the fraudster in different ID theft techniques. We aim to demonstrate processes that could assist the profiling of the fraudster under the forensic investigation of ID theft.

Online Identity Theft (ID theft) is a significant problem in our modern knowledge-based and social driven computing era. This type of cybercrime can be achieved in a number of different ways; and more of the point, various statistical figures suggest it is on the increase. The target is individual privacy and self-assurance, while efforts and measures for increased security and protection appear inadequate to prevent it. While personal identities are increasingly being stored and shared on digital media in virtualised environments, the threat of personal and private information that is used fraudulently cannot be eliminated. This trend in crime can result in
complex investigations that involve virtualised information technologies, both as a medium for analysis and as evidence at the same time. Fraudsters are obtaining more sophisticated technological ways and increase their
capability not only for committing but also for concealing their crimes. It is believed that fraudsters of this kind of crime are not acting individually, but rather they operate in an organised and well-structured manner. Indeed ID
theft is nowadays directly linked to drug trafficking, money laundering and terrorism. ID theft, like almost all different types of crime, involves two parts, at least one victim and at least one fraudster. We argue that the
differentiation of the investigation procedure between the victim’s and the fraudster’s side, depends on the ownership and control of the digital media involved in the crime, and can provide results on a more crime-focused basis. In
addition it provides information gathering, understanding and knowledge about the way the fraudster acts and could potentially assist in future investigations. Different pieces of evidence can be discovered on each side
(victim-fraudster) concerning the techniques that have been used to perpetrate the crime. The online ID theft techniques can leave evidence on both the victim’s and the fraudster’s system. However, the evidence tends to contain different elements on each side that can reveal information about the fraudster and eventually profile him
in relation to the attack. There is an approach of profiling the ID theft fraudster based on the findings thatarise during the forensic investigation process in this paper. We discuss the extent of ID theft as a problem and the role of the fraudster in different ID theft techniques. We aim to demonstrate processes that could assist the profiling of the fraudster under the forensic investigation of ID theft.

KeywordsIdentity theft; Computer crime; Fraudster profiling
Year2012
PublisherAcademic Publishing International Limited
ISSN2048-9897
2048-9870
Web address (URL)http://hdl.handle.net/10545/249573
hdl:10545/249573
File
File Access Level
Open
File
File Access Level
Open
File
File Access Level
Open
Publication datesJul 2012
Publication process dates
Deposited19 Oct 2012, 11:57
ContributorsUniversity of Derby and University of Wales, Newport
Permalink -

https://repository.derby.ac.uk/item/94wz6/who-are-you-today-profiling-the-id-theft-fraudster

Download files


File
license_url
File access level: Open

license_rdf
File access level: Open

license.txt
File access level: Open

  • 31
    total views
  • 0
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as