26 resultados para Documents administratius
em Université de Lausanne, Switzerland
L'usage de faux documents d'identité: situations récurrentes, profil des auteurs et jugements pénaux
Resumo:
Cette étude vise à mesurer les caractéristiques, l'étendue et l'évolution des cas d'usage de faux documents d'identité traités par la police et le système de justice pénale suisse, ainsi qu'à proposer des mesures de prévention spécifiques pour ce délit. La partie empirique repose sur l'analyse de 445 affaires traitées par la police de deux cantons suisses entre 2005 et 2011, ainsi que sur l'analyse de 172 décisions judiciaires concernant ces affaires. L'analyse des dossiers de police est conduite à travers de la grille de lecture du triangle du crime. Cette grille de lecture proposée par l'approche situationnelle en criminologie permet d'établir les profils des auteurs, des faux documents, des situations dans lesquelles ces derniers ont été utilisés, et des gardiens concernés par la fraude documentaire. La période étudiée permet aussi d'évaluer l'influence de l'entrée de la Suisse dans l'espace Schengen sur l'évolution de ce type de délit. De plus, la combinaison de données policières et judiciaires pour un même groupe d'individus permet également d'observer le processus pénal dès la découverte de l'infraction jusqu'à la décision judiciaire, tout en portant une attention spéciale aux taux de condamnations et aux peines imposées. Finalement, ces analyses permettent de proposer des mesures concrètes de prévention situationnelle de la délinquance qui pourraient être mises en place par la police et par certaines institutions privées concernées par la fraude documentaire.
Resumo:
A forensic intelligence process was conducted over cross-border seizures of false identity documents whose sources were partly known to be the same. Visual features of 300 counterfeit Portuguese and French identity cards seized in France and Switzerland were observed and integrated in a structured database developed to detect and analyze forensic links. Based on a few batches of documents known to come from common sources, the forensic profiling method could be validated and its performance evaluated. The method also proved efficient and complementary to conventional means of detecting connections between cases. Cross-border links were detected, highlighting the need for more collaboration. Forensic intelligence could be produced, uncovering the structure of counterfeits' illegal trade, the concentration of their sources and the evolution of their quality over time. In addition, two case examples illustrated how forensic profiling may support specific investigations. The forensic intelligence process and its results will underline the need to develop such approaches to support the fight against fraudulent documents and organized crime.
Resumo:
The development of forensic intelligence relies on the expression of suitable models that better represent the contribution of forensic intelligence in relation to the criminal justice system, policing and security. Such models assist in comparing and evaluating methods and new technologies, provide transparency and foster the development of new applications. Interestingly, strong similarities between two separate projects focusing on specific forensic science areas were recently observed. These observations have led to the induction of a general model (Part I) that could guide the use of any forensic science case data in an intelligence perspective. The present article builds upon this general approach by focusing on decisional and organisational issues. The article investigates the comparison process and evaluation system that lay at the heart of the forensic intelligence framework, advocating scientific decision criteria and a structured but flexible and dynamic architecture. These building blocks are crucial and clearly lay within the expertise of forensic scientists. However, it is only part of the problem. Forensic intelligence includes other blocks with their respective interactions, decision points and tensions (e.g. regarding how to guide detection and how to integrate forensic information with other information). Formalising these blocks identifies many questions and potential answers. Addressing these questions is essential for the progress of the discipline. Such a process requires clarifying the role and place of the forensic scientist within the whole process and their relationship to other stakeholders.
Resumo:
Under the influence of intelligence-led policing models, crime analysis methods have known of important developments in recent years. Applications have been proposed in several fields of forensic science to exploit and manage various types of material evidence in a systematic and more efficient way. However, nothing has been suggested so far in the field of false identity documents.This study seeks to fill this gap by proposing a simple and general method for profiling false identity documents which aims to establish links based on their visual forensic characteristics. A sample of more than 200 false identity documents including French stolen blank passports, counterfeited driving licenses from Iraq and falsified Bulgarian driving licenses was gathered from nine Swiss police departments and integrated into an ad hoc developed database called ProfID. Links detected automatically and systematically through this database were exploited and analyzed to produce strategic and tactical intelligence useful to the fight against identity document fraud.The profiling and intelligence process established for these three types of false identity documents has confirmed its efficiency, more than 30% of documents being linked. Identity document fraud appears as a structured and interregional criminality, against which material and forensic links detected between false identity documents might serve as a tool for investigation.
Resumo:
The determination of the age of a document is a very frequent query, however it is also one of the most challenging and controversial areas of questioned document examination. Several approaches were defined to address this problem. The first is based on the introduction date of raw constituents (like paper or ink) on the market. The second approach is based on the aging of documents, which is unfortunately not only influenced by passing time, but also by storage conditions and document composition. The third approach considers the relative age of documents and aims at reconstructing their chronology. The three approaches are equally complex to develop and encounter quantity of problems which are not negligible. This article aims to expose the potential applications and limitations of current ink dating methods. Method development and validation and the interpretation of evidence prove to be essential criteria for the dating of documents.
Resumo:
False identity documents constitute a potential powerful source of forensic intelligence because they are essential elements of transnational crime and provide cover for organized crime. In previous work, a systematic profiling method using false documents' visual features has been built within a forensic intelligence model. In the current study, the comparison process and metrics lying at the heart of this profiling method are described and evaluated. This evaluation takes advantage of 347 false identity documents of four different types seized in two countries whose sources were known to be common or different (following police investigations and dismantling of counterfeit factories). Intra-source and inter-sources variations were evaluated through the computation of more than 7500 similarity scores. The profiling method could thus be validated and its performance assessed using two complementary approaches to measuring type I and type II error rates: a binary classification and the computation of likelihood ratios. Very low error rates were measured across the four document types, demonstrating the validity and robustness of the method to link documents to a common source or to differentiate them. These results pave the way for an operational implementation of a systematic profiling process integrated in a developed forensic intelligence model.
Resumo:
Transparency is now seen as a key tool of democratic governance. The European Union's commitment to transparency is now at the centre of a crucial debate between the Commission and the Parliament on the future of citizen's right of access to information. This article presents the main characteristics of the current regime and questions the pertinence of the proposed changes in light of the international drive at modernising access to information laws and the attempt at identifying the ̳proper limits of transparency'. The questions raised range from the identification of what can be accessed to the definition of exemption and the protection of competing interests.
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.