Who are you today? Profiling the ID theft fraudster
Conference item
Authors | Angelopoulou, Olga, Vidalis, Stilianos and Robinson, Ian |
---|---|
Abstract | Online Identity Theft (ID theft) is a significant problem in our modern knowledge-based and social driven computing era. This type of cybercrime can be achieved in a number of different ways; and more of the point, various statistical figures suggest it is on the increase. The target is individual privacy and self-assurance, while efforts and measures for increased security and protection appear inadequate to prevent it. While personal identities are increasingly being stored and shared on digital media in virtualised environments, the threat of personal and private information that is used fraudulently cannot be eliminated. This trend in crime can result in complex investigations that involve virtualised information technologies, both as a medium for analysis and as evidence at the same time. Fraudsters are obtaining more sophisticated technological ways and increase their capability not only for committing but also for concealing their crimes. It is believed that fraudsters of this kind of crime are not acting individually, but rather they operate in an organised and well-structured manner. Indeed ID theft is nowadays directly linked to drug trafficking, money laundering and terrorism. ID theft, like almost all different types of crime, involves two parts, at least one victim and at least one fraudster. We argue that the differentiation of the investigation procedure between the victim’s and the fraudster’s side, depends on the ownership and control of the digital media involved in the crime, and can provide results on a more crime-focused basis. In addition it provides information gathering, understanding and knowledge about the way the fraudster acts and could potentially assist in future investigations. Different pieces of evidence can be discovered on each side (victim-fraudster) concerning the techniques that have been used to perpetrate the crime. The online ID theft techniques can leave evidence on both the victim’s and the fraudster’s system. However, the evidence tends to contain different elements on each side that can reveal information about the fraudster and eventually profile him in relation to the attack. There is an approach of profiling the ID theft fraudster based on the findings thatarise during the forensic investigation process in this paper. We discuss the extent of ID theft as a problem and the role of the fraudster in different ID theft techniques. We aim to demonstrate processes that could assist the profiling of the fraudster under the forensic investigation of ID theft. |
Online Identity Theft (ID theft) is a significant problem in our modern knowledge-based and social driven computing era. This type of cybercrime can be achieved in a number of different ways; and more of the point, various statistical figures suggest it is on the increase. The target is individual privacy and self-assurance, while efforts and measures for increased security and protection appear inadequate to prevent it. While personal identities are increasingly being stored and shared on digital media in virtualised environments, the threat of personal and private information that is used fraudulently cannot be eliminated. This trend in crime can result in | |
Keywords | Identity theft; Computer crime; Fraudster profiling |
Year | 2012 |
Publisher | Academic Publishing International Limited |
ISSN | 2048-9897 |
2048-9870 | |
Web address (URL) | http://hdl.handle.net/10545/249573 |
hdl:10545/249573 | |
File | File Access Level Open |
File | File Access Level Open |
File | File Access Level Open |
Publication dates | Jul 2012 |
Publication process dates | |
Deposited | 19 Oct 2012, 11:57 |
Contributors | University of Derby and University of Wales, Newport |
https://repository.derby.ac.uk/item/94wz6/who-are-you-today-profiling-the-id-theft-fraudster
Download files
File
license_url | ||
File access level: Open |
license_rdf | ||
File access level: Open |
license.txt | ||
File access level: Open |
40
total views0
total downloads2
views this month0
downloads this month