86 resultados para identity fraud
em Université de Lausanne, Switzerland
Resumo:
Under the influence of intelligence-led policing models, crime analysis methods have known of important developments in recent years. Applications have been proposed in several fields of forensic science to exploit and manage various types of material evidence in a systematic and more efficient way. However, nothing has been suggested so far in the field of false identity documents.This study seeks to fill this gap by proposing a simple and general method for profiling false identity documents which aims to establish links based on their visual forensic characteristics. A sample of more than 200 false identity documents including French stolen blank passports, counterfeited driving licenses from Iraq and falsified Bulgarian driving licenses was gathered from nine Swiss police departments and integrated into an ad hoc developed database called ProfID. Links detected automatically and systematically through this database were exploited and analyzed to produce strategic and tactical intelligence useful to the fight against identity document fraud.The profiling and intelligence process established for these three types of false identity documents has confirmed its efficiency, more than 30% of documents being linked. Identity document fraud appears as a structured and interregional criminality, against which material and forensic links detected between false identity documents might serve as a tool for investigation.
Resumo:
Identification is ever more important in the online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of identity 'theft' or identity fraud; it is wide-ranging and complex, ranging from identity deletion to unlawful identity creation and identity 'theft'. Commonly accepted definitions are lacking, thus blurring available statistics, and policies to combat this new crime are piecemeal at best. To assess the real nature and magnitude of identity-related crime, and to be able to discuss how it can be combated, identity-related crime should be understood in all its aspects. As a first key step, this article introduces a typology of identity-related crime, consisting of conceptual, technical and legal categories, that can be used as a comprehensive framework for future research, countermeasures and policies related to identity related crime.
Resumo:
The identity [r]evolution is happening. Who are you, who am I in the information society? In recent years, the convergence of several factors - technological, political, economic - has accelerated a fundamental change in our networked world. On a technological level, information becomes easier to gather, to store, to exchange and to process. The belief that more information brings more security has been a strong political driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one's behaviour, or needs, or preferences. It can lead to categorizations according to some specific risk criteria, for example, or to direct and personalized marketing. As a consequence, new forms of identities appear. They are not necessarily related to our names anymore. They are based on information, on traces that we leave when we act or interact, when we go somewhere or just stay in one place, or even sometimes when we make a choice. They are related to the SIM cards of our mobile phones, to our credit card numbers, to the pseudonyms that we use on the Internet, to our email addresses, to the IP addresses of our computers, to our profiles... Like traditional identities, these new forms of identities can allow us to distinguish an individual within a group of people, or describe this person as belonging to a community or a category. How far have we moved through this process? The identity [r]evolution is already becoming part of our daily lives. People are eager to share information with their "friends" in social networks like Facebook, in chat rooms, or in Second Life. Customers take advantage of the numerous bonus cards that are made available. Video surveillance is becoming the rule. In several countries, traditional ID documents are being replaced by biometric passports with RFID technologies. This raises several privacy issues and might actually even result in changing the perception of the concept of privacy itself, in particular by the younger generation. In the information society, our (partial) identities become the illusory masks that we choose -or that we are assigned- to interplay and communicate with each other. Rights, obligations, responsibilities, even reputation are increasingly associated with these masks. On the one hand, these masks become the key to access restricted information and to use services. On the other hand, in case of a fraud or negative reputation, the owner of such a mask can be penalized: doors remain closed, access to services is denied. Hence the current preoccupying growth of impersonation, identity-theft and other identity-related crimes. Where is the path of the identity [r]evolution leading us? The booklet is giving a glance on possible scenarios in the field of identity.
Resumo:
False identity documents represent a serious threat through their production and use in organized crime and by terrorist organizations. The present-day fight against this criminal problem and threats to national security does not appropriately address the organized nature of this criminal activity, treating each fraudulent document on its own during investigation and the judicial process, which causes linkage blindness and restrains the analysis capacity. Given the drawbacks of this case-by-case approach, this article proposes an original model in which false identity documents are used to inform a systematic forensic intelligence process. The process aims to detect links, patterns, and tendencies among false identity documents in order to support strategic and tactical decision making, thus sustaining a proactive intelligence-led approach to fighting identity document fraud and the associated organized criminality. This article formalizes both the model and the process, using practical applications to illustrate its powerful capabilities. This model has a general application and can be transposed to other fields of forensic science facing similar difficulties.
Resumo:
A number of studies show that New Public Management reforms have altered the current identity benchmarks of public officials, particularly by hybridizing values or management practices. However, existing studies have largely glossed over the sense of belonging of officials when their organization straddles the concerns of public service and private enterprise, so that the boundary between public and private sector is blurred. The purpose of this article is precisely to explore this sense of belonging in the context of organizational hybridization. It does so by drawing on the results of research conducted among the employees of a public unemployment insurance fund in Switzerland. On the one hand, the analysis shows how much their markers of belonging are hybrid, multiple and constructed in negative terms (with regard to the State), while indicating that the working practices of the employees point to an identity that is nevertheless closely bound with the public sector. On the other hand, the analysis shows that the organization plays strategically with its State status, by exploiting either its private or public identity in line with the needs related to its external image. The article concludes with a discussion of the results highlighting the strategic functionality of the hybrid identity of the actors.
Resumo:
Starting from the observation that ghosts are strikingly recurrent and prominent figures in late-twentieth African diasporic literature, this dissertation proposes to account for this presence by exploring its various functions. It argues that, beyond the poetic function the ghost performs as metaphor, it also does cultural, theoretical and political work that is significant to the African diaspora in its dealings with issues of history, memory and identity. Toni Morrison's Beloved (1987) serves as a guide for introducing the many forms, qualities and significations of the ghost, which are then explored and analyzed in four chapters that look at Fred D'Aguiar's Feeding the Ghosts (1998), Gloria Naylor's Mama Day (1988), Paule Marshall's Praisesong for the Widow (1983) and a selection of novels, short stories and poetry by Michelle Cliff. Moving thematically through these texts, the discussion shifts from history through memory to identity as it examines how the ghost trope allows the writers to revisit sites of trauma; revise historical narratives that are constituted and perpetuated by exclusions and invisibilities; creatively and critically repossess a past marked by violence, dislocation and alienation and reclaim the diasporic culture it contributed to shaping; destabilize and deconstruct the hegemonic, normative categories and boundaries that delimit race or sexuality and envision other, less limited and limiting definitions of identity. These diverse and interrelated concerns are identified and theorized as participating in a project of "re-vision," a critical project that constitutes an epistemological as much as a political gesture. The author-based structure allows for a detailed analysis of the texts and highlights the distinctive shapes the ghost takes and the particular concerns it serves to address in each writer's literary and political project. However, using the ghost as a guide into these texts, taken collectively, also throws into relief new connections between them and sheds light on the complex ways in which the interplay of history, memory and identity positions them as products of and contributions to an African diasporic (literary) culture. If it insists on the cultural specificity of African diasporic ghosts, tracing its origins to African cultures and spiritualities, the argument also follows gothic studies' common view that ghosts in literary and cultural productions-like other related figures of the living dead-respond to particular conditions and anxieties. Considering the historical and political context in which the texts under study were produced, the dissertation makes connections between the ghosts in them and African diasporic people's disillusionment with the broken promises of the civil rights movement in the United States and of postcolonial independence in the Caribbean. It reads the texts' theoretical concerns and narrative qualities alongside the contestation of traditional historiography by black and postcolonial studies as well as the broader challenge to conventional notions such as truth, reality, meaning, power or identity by poststructuralism, postcolonialism or queer theory. Drawing on these various theoretical approaches and critical tools to elucidate the ghost's deconstructive power for African diasporic writers' concerns, this work ultimately offers a contribution to "speciality studies," which is currently emerging as a new field of scholarship in cultural theory.
Resumo:
The proteasome plays a crucial role in the proteolytic processing of antigens presented to T cells in the context of major histocompatibility complex class I molecules. However, the rules governing the specificity of cleavage sites are still largely unknown. We have previously shown that a cytolytic T lymphocyte-defined antigenic peptide derived from the MAGE-3 tumor-associated antigen (MAGE-3(271-279), FLWGPRALV in one-letter code) is not presented at the surface of melanoma cell lines expressing the MAGE-3 protein. By using purified proteasome and MAGE-3(271-279) peptides extended at the C terminus by 6 amino acids, we identified predominant cleavages after residues 278 and 280 but no detectable cleavage after residue Val(279), the C terminus of the antigenic peptide. In the present study, we have investigated the influence of Pro(275), Leu(278), and Glu(280) on the proteasomal digestion of MAGE-3(271-285) substituted at these positions. We show that positions 278 and 280 are major proteasomal cleavage sites because they tolerate most amino acid substitutions. In contrast, the peptide bond after Val(279) is a minor cleavage site, influenced by both distal and proximal amino acid residues.
Resumo:
Although medicine is practised in a secular setting, religious and spiritual issues have an impact on patient perspectives regarding their health and the management of any disorders that may afflict them. This is especially true in psychiatry, as feelings of spirituality and religiousness are very prevalent among the mentally ill. Clinicians are rarely aware of the importance of religion and understand little of its value as a mediating force for coping with mental illness. This book addresses various issues concerning mental illness in psychiatry: the relation of religious issues to mental health; the tension between a theoretical approach to problems and psychiatric approaches; the importance of addressing these varying approaches in patient care and how to do so; and differing ways to approach Christian, Muslim, and Buddhist patients. This is the first book to specifically cover the impact of religion and spirituality on mental illness.
Resumo:
Coastal primary rainforests have suffered damage in Côte d'Ivoire as a result of a lack of protection and urban pressures. Consequently, the highly endemic and critically endangered Wimmer's shrew, Crocidura wimmeri, known only from its type locality, Adiopodoumé, near Abidjan, was considered to have been extinct since 1976. Shrew species assignment is often problematic because of strong phenotypic similarities among many species. The phylogenetic position of C. wimmeri within the African Crocidura species should thus be clarified. In light of its recent rediscovery in the nearby small Banco National Park (34 km2), we investigated the genetic identity of seven specimens of C. wimmeri, based on 1020 bp of the mitochondrial DNA cytochrome b gene compared to other species sampled in the same region and published sequences from GenBank. Crocidura wimmeri formed a well-defined clade, the closest-related species being Crocidura sp., with a distance of 9.3%, a yet unknown species from Taï and Ziama forests. These results thus confirmed the validity of this species. This genetic characterization not only contributes to our knowledge of the evolution of West African shrews, but also may help in the discovery of additional populations of this critically endangered species.