Hdl Handle:
http://hdl.handle.net/10545/249573
Title:
Who are you today? Profiling the ID theft fraudster
Authors:
Angelopoulou, Olga; Vidalis, Stilianos; Robinson, Ian
Abstract:
Online Identity Theft (ID theft) is a significant problem in our modern knowledge-based and social driven computing era. This type of cybercrime can be achieved in a number of different ways; and more of the point, various statistical figures suggest it is on the increase. The target is individual privacy and self-assurance, while efforts and measures for increased security and protection appear inadequate to prevent it. While personal identities are increasingly being stored and shared on digital media in virtualised environments, the threat of personal and private information that is used fraudulently cannot be eliminated. This trend in crime can result in complex investigations that involve virtualised information technologies, both as a medium for analysis and as evidence at the same time. Fraudsters are obtaining more sophisticated technological ways and increase their capability not only for committing but also for concealing their crimes. It is believed that fraudsters of this kind of crime are not acting individually, but rather they operate in an organised and well-structured manner. Indeed ID theft is nowadays directly linked to drug trafficking, money laundering and terrorism. ID theft, like almost all different types of crime, involves two parts, at least one victim and at least one fraudster. We argue that the differentiation of the investigation procedure between the victim’s and the fraudster’s side, depends on the ownership and control of the digital media involved in the crime, and can provide results on a more crime-focused basis. In addition it provides information gathering, understanding and knowledge about the way the fraudster acts and could potentially assist in future investigations. Different pieces of evidence can be discovered on each side (victim-fraudster) concerning the techniques that have been used to perpetrate the crime. The online ID theft techniques can leave evidence on both the victim’s and the fraudster’s system. However, the evidence tends to contain different elements on each side that can reveal information about the fraudster and eventually profile him in relation to the attack. There is an approach of profiling the ID theft fraudster based on the findings thatarise during the forensic investigation process in this paper. We discuss the extent of ID theft as a problem and the role of the fraudster in different ID theft techniques. We aim to demonstrate processes that could assist the profiling of the fraudster under the forensic investigation of ID theft.
Affiliation:
University of Derby; University of Wales, Newport
Publisher:
Academic Publishing International Limited
Issue Date:
Jul-2012
URI:
http://hdl.handle.net/10545/249573
Additional Links:
http://academic-conferences.org/pdfs/ECIW_2011-Booklet.pdf
Type:
Meetings and Proceedings
Language:
en
ISSN:
2048-9897; 2048-9870
Appears in Collections:
Department of Electronics, Computing & Maths

Full metadata record

DC FieldValue Language
dc.contributor.authorAngelopoulou, Olgaen
dc.contributor.authorVidalis, Stilianosen
dc.contributor.authorRobinson, Ianen
dc.date.accessioned2012-10-19T11:57:06Zen
dc.date.available2012-10-19T11:57:06Zen
dc.date.issued2012-07en
dc.identifier.issn2048-9897en
dc.identifier.issn2048-9870en
dc.identifier.urihttp://hdl.handle.net/10545/249573en
dc.description.abstractOnline Identity Theft (ID theft) is a significant problem in our modern knowledge-based and social driven computing era. This type of cybercrime can be achieved in a number of different ways; and more of the point, various statistical figures suggest it is on the increase. The target is individual privacy and self-assurance, while efforts and measures for increased security and protection appear inadequate to prevent it. While personal identities are increasingly being stored and shared on digital media in virtualised environments, the threat of personal and private information that is used fraudulently cannot be eliminated. This trend in crime can result in complex investigations that involve virtualised information technologies, both as a medium for analysis and as evidence at the same time. Fraudsters are obtaining more sophisticated technological ways and increase their capability not only for committing but also for concealing their crimes. It is believed that fraudsters of this kind of crime are not acting individually, but rather they operate in an organised and well-structured manner. Indeed ID theft is nowadays directly linked to drug trafficking, money laundering and terrorism. ID theft, like almost all different types of crime, involves two parts, at least one victim and at least one fraudster. We argue that the differentiation of the investigation procedure between the victim’s and the fraudster’s side, depends on the ownership and control of the digital media involved in the crime, and can provide results on a more crime-focused basis. In addition it provides information gathering, understanding and knowledge about the way the fraudster acts and could potentially assist in future investigations. Different pieces of evidence can be discovered on each side (victim-fraudster) concerning the techniques that have been used to perpetrate the crime. The online ID theft techniques can leave evidence on both the victim’s and the fraudster’s system. However, the evidence tends to contain different elements on each side that can reveal information about the fraudster and eventually profile him in relation to the attack. There is an approach of profiling the ID theft fraudster based on the findings thatarise during the forensic investigation process in this paper. We discuss the extent of ID theft as a problem and the role of the fraudster in different ID theft techniques. We aim to demonstrate processes that could assist the profiling of the fraudster under the forensic investigation of ID theft.en
dc.language.isoenen
dc.publisherAcademic Publishing International Limiteden
dc.relation.urlhttp://academic-conferences.org/pdfs/ECIW_2011-Booklet.pdfen
dc.subjectIdentity theften
dc.subjectComputer crimeen
dc.subjectFraudster profilingen
dc.titleWho are you today? Profiling the ID theft fraudsteren
dc.typeMeetings and Proceedingsen
dc.contributor.departmentUniversity of Derbyen
dc.contributor.departmentUniversity of Wales, Newporten
This item is licensed under a Creative Commons License
Creative Commons
All Items in UDORA are protected by copyright, with all rights reserved, unless otherwise indicated.