Staffordshire University logo
STORE - Staffordshire Online Repository

Who are you Today? Profiling the ID Theft Fraudster

Angelopoulou, Olga, VIDALIS, Stilianos and Robinson, Ian (2012) Who are you Today? Profiling the ID Theft Fraudster. In: 11th European Conference on Information Warfare and Security ECIW-2012, 5 - 6 July 2012, The Institute Ecole Supérieure en Informatique, Electronique et Automatique, Laval, France.

Full text not available from this repository. (Request a copy)

Abstract or description

Online Identity Theft is a significant problem in our modern knowledge-based and social-driven computing era. This type of cybercrime can be achieved in a number of different ways; and more of the point, various statistical figures suggest it is on the increase. The target is individual privacy and self-assurance, while efforts and measures for increased security and protection appear inadequate to prevent it.
While personal identities are increasingly being stored and shared on digital media in virtualised environments, the threat of personal and private information that is used fraudulently cannot be eliminated.
This trend in crime can result in complex investigations that involve virtualised information technologies, both as a medium for analysis and as evidence at the same time. Fraudsters are obtaining more sophisticated technological ways and increase their capability not only for committing but also for concealing their crimes. It is believed that fraudsters of this kind of crime are not acting individually, but rather they operate in an organised and well-structured manner. Indeed ID theft is nowadays directly linked to drug trafficking, money laundering and terrorism.
ID theft, like almost all different types of crime, involves two parts, at least one victim and at least one fraudster. We argue that the differentiation of the investigation procedure between the victim’s and the fraudster’s side, depends on the ownership and control of the digital media involved in the crime, and can provide results on a more crime-focused basis. In addition it provides information gathering, understanding and knowledge about the way the fraudster acts and could potentially assist in future investigations.
Different pieces of evidence can be discovered on each side (victim-fraudster) concerning the techniques that have been used to perpetrate the crime. The online ID theft techniques can leave evidence on both the victim’s and the fraudster’s system. However, the evidence tends to contain different elements on each side that can reveal information about the fraudster and eventually profile him in relation to the attack.
There is an approach of profiling the ID theft fraudster based on the findings that arise during the forensic investigation process in this paper. We discuss the extent of ID theft as a problem and the role of the fraudster in different ID theft techniques. We aim to demonstrate processes that could assist the profiling of the fraudster under the forensic investigation of ID theft.

Item Type: Conference or Workshop Item (Paper)
Additional Information: Work towards the crime-specific investigative frameworks.
Faculty: Previous Faculty of Computing, Engineering and Sciences > Computing
Event Title: 11th European Conference on Information Warfare and Security ECIW-2012
Event Location: The Institute Ecole Supérieure en Informatique, Electronique et Automatique, Laval, France
Event Dates: 5 - 6 July 2012
Depositing User: Stilianos VIDALIS
Date Deposited: 23 Aug 2013 15:32
Last Modified: 24 Feb 2023 13:39

Actions (login required)

View Item View Item

DisabledGo Staffordshire University is a recognised   Investor in People. Sustain Staffs
Legal | Freedom of Information | Site Map | Job Vacancies
Staffordshire University, College Road, Stoke-on-Trent, Staffordshire ST4 2DE t: +44 (0)1782 294000