Forensic profiling is the study of
trace evidence
Trace evidence occurs when objects make contact, and material is transferred. This type of evidence is usually not visible to the naked eye and requires specific tools and techniques to be located and obtained. Due to this, trace evidence is often ...
in order to develop
information
Information is an Abstraction, abstract concept that refers to something which has the power Communication, to inform. At the most fundamental level, it pertains to the Interpretation (philosophy), interpretation (perhaps Interpretation (log ...
that can be used by
police authorities. This information can be used to identify suspects and convict them in a court of law.
The term "
forensic
Forensic science combines principles of law and science to investigate criminal activity. Through crime scene investigations and laboratory analysis, forensic scientists are able to link suspects to evidence. An example is determining the time and ...
" in this context refers to "information that is used in court as evidence" . The traces originate from criminal or litigious activities themselves. However traces are information that is not strictly dedicated to the court. They may increase knowledge in broader domains linked to security that deal with investigation, intelligence, surveillance, or risk analysis .
Forensic profiling is different from
offender profiling
Offender profiling, also known as criminal profiling, is an investigative strategy used by law enforcement agencies to identify likely suspects and has been used by Detective, investigators to link cases that may have been committed by the same ...
, which only refers to the identification of an offender to the psychological profile of a criminal.
In particular, forensic profiling should refer to
profiling in the information sciences sense, i.e., to "The process of 'discovering' correlations between data in data bases that can be used to identify and represent a human or nonhuman subject (individual or group), and/or the application of profiles (sets of correlated data) to individuate and represent a subject or to identify a subject as a member of a group or category" .
Profiling techniques
Forensic profiling is generally conducted using
data mining
Data mining is the process of extracting and finding patterns in massive data sets involving methods at the intersection of machine learning, statistics, and database systems. Data mining is an interdisciplinary subfield of computer science and ...
technology, as a means by which relevant patterns are discovered, and profiles are generated from large quantities of data.
A distinction of forms of profiles that are used in a given context is necessary before evaluating applications of
data mining
Data mining is the process of extracting and finding patterns in massive data sets involving methods at the intersection of machine learning, statistics, and database systems. Data mining is an interdisciplinary subfield of computer science and ...
techniques for forensic profiling.
Data available
The data available to law enforcement agencies is divided into two categories :
* Nominal data directly designates persons or objects (recidivists, intelligence files and suspect files, stolen vehicles or objects, etc.) and their relations. Nominal data may also be obtained in the framework of specific investigations, for instance a list of calls made with a
mobile phone
A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This rad ...
(card and/or phone) that cover a certain time, a list of people corresponding to a certain profile, or data obtained through surveillances.
* Crime data consist of traces that result from criminal activities: physical traces, other information collected at the scene, from witnesses or victims or some electronic traces, as well as reconstructed descriptions of cases (modus operandi, time intervals, duration and place) and their relations (links between cases, series).
Types
*
DNA profiling
DNA profiling (also called DNA fingerprinting and genetic fingerprinting) is the process of determining an individual's deoxyribonucleic acid (DNA) characteristics. DNA analysis intended to identify a species, rather than an individual, is cal ...
Used for the identification of individuals based on their respective DNA profiles.
* Digital Image Forensics. This covers: ''image source identification'' (which is based on specific characteristics of the image acquisition device or technology) and ''malicious post-processing or tampering'' (whose aim is for instance to verify the integrity of particular features) .
* Illicit drug profiling, which refers to the systematic extraction and storage of chemical attributes of drugs seized in order to obtain indications on the manufacture and distribution processes, the size and the evolution of the market).
* Forensic Information Technology (forensic IT), refers to the analysis of the
digital traces
Digital footprint or digital shadow refers to one's unique set of traceable digital activities, actions, contributions, and communications manifested on the Internet or digital devices. Digital footprints can be classified as either passive o ...
that people leave when using
information technology
Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
.
* Offender profiling i.e. psychological profiling of the criminal.
Issues
The use of profiling techniques represents threats to the
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
of the individual and the protection of
fundamental freedoms. Indeed, criminal data, i.e., data which are collected and processed for suppressing criminal offences, often consists of personal data. One of the issues is the re-use of personal data collected within one criminal investigation for a purpose other than the one for which it was collected. An example from the book, “The Psychology and Sociology of Wrongful Convictions: Forensic Science Reform,” there was a profiling error, in which this woman was raped and slaughtered by a serial killer. The suspect was named the Boston Strangler and investigators worked hard in trying to gather a profile for this criminal. Experts eventually came up with the Boston Strangler being two people and that both men lived alone, most likely schoolteachers, and one of them was homosexual. The criminal finally confessed to the crime and his DNA matched up with the scene, but his profile didn’t fit the crime. The profile the experts came up with didn’t match any characteristics of the killer (pp.6). Creating profiles just creates tunnel vision because investigators will be focusing on finding a specific individual that the profile fits, when in reality, the profiling system is insanely flawed and is considered useless to the investigators.
Several methods-including technical, legal, and behavioral available to address some of the issues associated with forensic profiling. For instance, in Europe the
European Convention on Human Rights
The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is a Supranational law, supranational convention to protect human rights and political freedoms in Europe. Draf ...
provides a number of instruments for the Protection of Individuals concerning Automatic Processing of Personal Data.
See also
*
Forensic identification
*
Profiling (disambiguation)
*
Use of social network websites in investigations
References
*
*
*
*
{{reflist
Offender profiling
Profiling