Skip to main content

Discovering Identity Problems: A Case Study

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3495))

Abstract

Identity resolution is central to fighting against crime and terrorist activities in various ways. Current information systems and technologies deployed in law enforcement agencies are neither adequate nor effective for identity resolution. In this research we conducted a case study in a local police department on problems that produce difficulties in retrieving identity information. We found that more than half (55.5%) of the suspects had either a deceptive or an erroneous counterpart existing in the police system. About 30% of the suspects had used a false identity (i.e., intentional deception), while 42% had records alike due to various types of unintentional errors. We built a taxonomy of identity problems based on our findings.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clarke, R.: Human Identification in Information Systems: Management Challenges and Public Policy Issues. Information Technology & People 7(4), 6–37 (1994)

    Article  Google Scholar 

  2. Donath, J.S.: Identity and Deception in the Virtual Community. In: Smith, M.a.K.P. (ed.) Communities in Cyberspace. Routledge, London (1998)

    Google Scholar 

  3. GAO: Law Enforcement: Information on Timeliness of Criminal Fingerprint Submissions to the FBI. GAO-04-260, United States General Accounting Office (GAO) (2004)

    Google Scholar 

  4. HomeOffice, U. K.: Identity Fraud: A Study. United Kingdom HomeOffice (2002)

    Google Scholar 

  5. Jain, A.K., Prabhakar, S., Hong, L., Pankanti, S.: FingerCode: A fingerbank for fingerprint presentation and matching. In: Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (1999)

    Google Scholar 

  6. Levenshtein, V.L.: Binary Codes Capable of Correcting Deletions, Insertions, and Reversals. Soviet Physics Doklady 10, 707–710 (1966)

    MathSciNet  Google Scholar 

  7. Wang, G., Chen, H., Atabakhsh, H.: Automatically Detecting Deceptive Criminal Identities. Communications of the ACM 47(3), 71–76 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, A.G., Atabakhsh, H., Petersen, T., Chen, H. (2005). Discovering Identity Problems: A Case Study. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_30

Download citation

  • DOI: https://doi.org/10.1007/11427995_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25999-2

  • Online ISBN: 978-3-540-32063-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics