Skip to main content

Advertisement

Log in

Document Fraud: Will Your Identity Be Secure in the Twenty-first Century?

  • Published:
European Journal on Criminal Policy and Research Aims and scope Submit manuscript

Abstract

Document fraud has been qualified by Europol as one of the major cross-cutting engines of organised crime. The use of fraudulent identity and travel documents has been linked to a broad spectrum of criminal activities, ranging from financial scams and trafficking in human beings to terrorism and beyond. Criminals have used counterfeit and forged documents since the emergence of official identity and travel documents in the Late Middle Ages. Since then, criminals have become more creative, adapting and evolving in response to technological advancements in document security. In this regard, despite the introduction of biometric documents, the promise of tamper-proof official documents remains a holy grail, and document fraud still has a future ahead in the twenty-first century. Based on scientific and law enforcement data and sources, this article presents the imaginative modus operandi used by defrauders to counterfeit and forge documents. Considering the point of view of criminologists, forensic scientists, law enforcement and forgers, this article provides insights and opinions about current trends and challenges as well as future prospects. Key issues are raised, such as the involvement of organised crime and criminal networks, as well as the use of the Internet to trade fraudulent identity and travel documents. Current and future methods to investigate and study document fraud are also outlined, and finally four main challenges are presented to provide guidance for future policy implications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2

Similar content being viewed by others

Notes

  1. The dividing line between identity documents and travel documents becomes increasingly blurred and therefore pointless in our humble opinion. For instance, a passport is at the same time an identity document and a travel document. Identity cards or residence permits enable one to travel throughout the Schengen Area in Europe. This article covers all these sorts of documents altogether.

References

  • About, I., & Denis, V. (2010). Histoire de l’identification des personnes. In Repères. La Découverte.

  • Aebi, M. (2006). Comment mesurer la délinquance ? Armand Colin.

  • Arsseniev, D., & Bernadou, P. (2011). 441, faux et usage de faux. Florent Massot.

  • Auberson, M., Baechler, S., Zasso, M., Genessay, T., Patiny, L., & Esseiva, P. (2016). Development of a systematic computer vision-based method to analyse and compare images of false identity documents for forensic intelligence purposes–part I: acquisition, calibration and validation issues. Forensic Science International, 260, 74–84. https://doi.org/10.1016/j.forsciint.2016.01.016.

    Article  Google Scholar 

  • Baechler, S., Fivaz, E., Ribaux, O., & Margot, P. (2011). Le profilage forensique des fausses pièces d’identité : une méthode prometteuse pour lutter contre la fraude documentaire. Revue Internationale de Criminologie et de Police Technique et Scientifique, 64(4), 467–480.

  • Baechler, S. (2015). Des faux documents d’identité au renseignement forensique : développement d’une approche systématique et transversale du traitement de la donnée forensique à des fins de renseignement criminel. Université de Lausanne.

  • Baechler, S. (2019). Do we need to know each other? Bridging the gap between the university and the professional field. Policing: A Journal of Policy and Practice, 13(1), 102–114. https://doi.org/10.1093/police/pax091.

    Article  Google Scholar 

  • Baechler, S., & Margot, P. (2016). Understanding crime and fostering security using forensic science: the example of turning false identity documents into forensic intelligence. Security Journal, 29(4), 618–639. https://doi.org/10.1057/sj.2015.26.

    Article  Google Scholar 

  • Baechler, S., Ribaux, O., & Margot, P. (2012). Toward a novel forensic intelligence model: systematic profiling of false identity documents. Forensic Science Policy & Management: An International Journal, 3(2), 70–84. https://doi.org/10.1080/19409044.2012.744120.

    Article  Google Scholar 

  • Baechler, S., Terrasse, V., Pujol, J.-P., Fritz, T., Ribaux, O., & Margot, P. (2013). The systematic profiling of false identity documents: method validation and performance evaluation using seizures known to originate from common and different sources. Forensic Science International, 232(1–3), 180–190. https://doi.org/10.1016/j.forsciint.2013.07.022.

    Article  Google Scholar 

  • Baechler, S., Morelato, M., Ribaux, O., Beavis, A., Tahtouh, M., Kirkbride, K. P., Esseiva, P., Margot, P., & Roux, C. (2015). Forensic intelligence framework. Part II: study of the main generic building blocks and challenges through the examples of illicit drugs and false identity documents monitoring. Forensic Science International, 250, 44–52. https://doi.org/10.1016/j.forsciint.2015.02.021.

    Article  Google Scholar 

  • Bellido, L., Baechler, S., & Rossy, Q. (2017). La vente de faux documents d’identité sur Internet. Revue Internationale de Criminologie et de Police Technique et Scientifique, 70(2), 233–249.

    Google Scholar 

  • Bobak, A. K., Hancock, P. J., & Bate, S. (2016). Super-recognisers in action: evidence from face-matching and face memory tasks. Applied Cognitive Psychology, 30(1), 81–91.

    Article  Google Scholar 

  • Borisova, B., Rossy, Q., & Baechler, S. (2018). La recherche inversée par image : un moyen pour débusquer les espaces de vente sur Internet pourvoyeurs de faux documents d’identité. Revue Internationale de Criminologie et de Police Technique et Scientifique, 71(4), 418–427.

    Google Scholar 

  • Brongers, D. (2003). Genuine (ly) unreliable passport – how to obtain a second identity. Keesing Journal of Documents & Identity, 2, 16–17.

    Google Scholar 

  • Casey, E., Ribaux, O., & Roux, C. (2018). The Kodak syndrome: risks and opportunities created by decentralization of forensic capabilities. Journal of Forensic Sciences, 2, 1–10. https://doi.org/10.1111/1556-4029.13849.

    Article  Google Scholar 

  • Chibafa, J. (2009). Sentencing in false ID cases. Archbold News, 4, 4–5.

    Google Scholar 

  • Conseil de l’Union Européenne. (2009). Glossaire : documents sécurisés, éléments de sécurités et autres termes techniques qui y sont liés http://www.consilium.europa.eu/prado/FR/glossaryPopup.html. Secrétariat général du Conseil de l’Union européenne (SGC). Accessed 20 Aug 2019.

  • Council of the European Union. (2019). PRADO. Public Register of Authentic Travel and Identity Documents Online.

  • Crinion, C. (2008). Sentencing for possession of false identity documents. Criminal Law Review, 9, 702–706.

    Google Scholar 

  • Delval, P. (1998). Faux et fraudes : la criminalité internationale des faux documents. Presses Universitaires de France.

  • Egmont. (1999). In G. Coles, J. Brown, L. Nieuwenkamp, & G. van Dijk (Eds.), 100 cases from the Egmont Group. Toronto: Egmont Group.

  • Europol. (2009). Fact sheet 2009 : facilitated illegal immigration into the European Union. General Report on Europol Activities. 2010 – 51 pp. – 21 x 29,7 cm. ISSN 1681-1550 https://doi.org/10.2813/13382.

  • Europol. (2013). EU serious and organised crime threat assessment 2013.

  • Europol. (2017a). Cyber-patrolling week. Official Web Page. https://www.europol.europa.eu/activities-services/europol-in-action/operations/cyber-patrolling-week. Accessed 20 Aug 2019.

  • Europol. (2017b). European union serious and organised crime threat assessment. Report Organised Crime (SOCTA/OCTA), 28 February 2017. https://www.europol.europa.eu/activities-services/main-reports/european-union-serious-and-organised-crime-threat-assessment-2017.

  • Fahrmeir, A. (2001). Government and forgers: passports in nineteenth-century Europe. In J. Caplan & J. Torpey (Eds.), Documenting individual identity. Princeton University Press.

  • Feng, X., & Burton, A. (2019). Identity documents bias face matching. Perception, 48(12), 1163–1174.

    Article  Google Scholar 

  • Friedrich, E. (2001). Fälschungskriminalität und Prävention - Sicherungstechnische Anforderungen an Ausweisdokumente. Kriminalistik, 55(4), 271–277.

    Google Scholar 

  • Frontex. (2019). Risk analysis for 2019. https://frontex.europa.eu/publications/risk-analysis-for-2019-RPPmXE.

  • Geradts, Z. (2018). Detecting face morphing in video and documents. 8th European Academy of Forensic Science Conference.

  • Girelli, C. M. A. (2015). Laterally reversed fingerprints detected in fake documents. Journal of Forensic Identification, 65(1), 1–17.

    Google Scholar 

  • Girelli, C. M. A. (2016). The use of fingerprints available on the web in false identity documents: analysis from a forensic intelligence perspective. Forensic Science International, 262, 84–96. https://doi.org/10.1016/j.forsciint.2016.02.041.

    Article  Google Scholar 

  • Gordon, G. R., & Willox, N. A. (2003). Identity fraud: a critical national and global threat (A Joint Project of the Economic Crime Institute of Utica College and LexisNexis, a Division of Reed Elsevier Inc.). https://www.lexisnexis.com/presscenter/hottopics/ECIReportFINAL.pdf.

  • Groebner, V. (2007). Who are you?: identification, deception, and surveillance in early modern Europe. New York: Zone books.

  • Heaton, R. (2000). The prospects for intelligence-led policing: some historical and quantitative considerations. Policing and Society, 9(4), 337–355.

    Article  Google Scholar 

  • Hesseling, R. (1994). Displacement: a review of the empirical literature. In R. V. Clarke (Ed.), Crime Prevention Studies (pp. 197–230). Monsey, NY: Criminal Justice Press.

  • Hofer, R., Tschopp, H., Rossi, B., & Ardüser, R. (2007). In K. A. d. K. Z. Urkundenlabor (Ed.), Echt falsch – Leitfaden zur Erkennung von Fälschungen: Vol. 3. Auflage. Kik: Swiss Police Edition.

    Google Scholar 

  • IciLome.com. (2010). Transports: 457 faux permis saisis par la direction des transports routiers. http://www.IciLome.com. Accessed 20 Aug 2019.

  • Keesing ID Academy. (2018). Study of foregeries: optical variable device. Keesing Technologies.

  • KLPD. (2013). EdisonTD. Korps Landelijke Politiediensten. http://www.edisontd.net/. Accessed 20 Aug 2019.

  • Koops, B.-J., Leenes, R., Meints, M., van der Meulen, N., & Jaquet-Chiffelle, D.-O. (2009). A typology of identity-related crime. Information, Communication & Society, 12(1), 1–24.

    Article  Google Scholar 

  • Lecci, S. (2016). Détermination de la présence de liens entre les sites de vente de faux documents d’identité sur Internet : proposition et expérimentation d’une méthode. University of Lausanne.

  • Lecerf, J.-R. (2005). Rapport d’information fait au nom de la commission des Lois constitutionnelles, de législation, du suffrage universel, du Règlement et d’administration générale (1) par la mission d’information (2) sur la nouvelle génération de documents d’identité et la : Vol. Annexé au (Sénat (ed.); Issue 439). Sénat, session ordinaire de 2004-2005.

  • Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., Félegyházi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., McCoy, D., Weaver, N., Paxson, V., Voelker, G. M., & Savage, S. (2011). Click trajectories: end-to-end analysis of the spam value chain. IEEE Symposium on Security and Privacy (SP), 431–446.

  • Levinson, J. (1984). Passport examination. Journal of Forensic Sciences, 29(2), 628–632.

    Google Scholar 

  • Lloyd, M. (2003). The passport: the history of man’s most travelled document. Gloucestershire: Sutton publishing.

  • Locard, E. (1920). L’enquête criminelle et les méthodes scientifiques. In Bibliothèque de philosophie scientifique. Flammarion.

  • Lum, C., Telep, C. W., Koper, C. S., & Grieco, J. (2012). Receptivity to research in policing. Justice Research and Policy, 14(1), 61–96. https://doi.org/10.3818/JRP.14.1.2012.61.

    Article  Google Scholar 

  • Martinez, J. A., & Sher, K. J. (2010). Methods of fake id obtainment and use in underage college students. Addictive Behaviors, 35, 738–740.

    Article  Google Scholar 

  • Mathyer, J. (1980). Quelques remarques sur le problème de la sécurité des pièces d’identité et des pièces de légitimation : une solution intéressante. Revue Internationale de Police Criminelle, 35(336), 66–79.

    Google Scholar 

  • Mireault, C., Baechler, S., Côté, R., Roy, J.-F., Daoust, B., & Crispino, F. (2017). What if counterfeit IDs could talk? Chemical profiling of identity documents. Keesing Journal of Documents & Identity, 53, 9–13.

    Google Scholar 

  • Miro, R. J., & Curtis, G. E. (2003). Organized crime and terrorist activity in Mexico, 1999–2002 - Report (L. of C. Federal Research Division under an interagency agreement with the United States government (ed.)). Washington D.C.: Federal Research Division, Library of Congress.

  • Morelato, M., Baechler, S., Ribaux, O., Beavis, A., Tahtouh, M., Kirkbride, P., Roux, C., & Margot, P. (2014). Forensic intelligence framework. Part I: induction of a transversal model by comparing illicit drugs and false identity documents monitoring. Forensic Science International, 236, 181–190. https://doi.org/10.1016/j.forsciint.2013.12.045.

    Article  Google Scholar 

  • Murrill, B. (2006). Introducing operation MAXIM – UK authorities tackle organised immigration crime. Keesing Journal of Documents & Identity, 21, 20–23.

    Google Scholar 

  • National Commission on Terrorist Attacks upon the United States. (2004). The 9/11 Commission report.

  • New South Wales government. (2019). The Digital Driver Licence trial. https://www.service.nsw.gov.au/campaign/digital-driver-licence. Accessed 20 Aug 2020.

  • (OBA-FINMA) (2019) Ordonnance du 3 juin 2015 de l’Autorité fédérale de surveillance des marchés financiers sur la prévention du blanchiment d’argent et du financement du terrorisme

  • Ombelli, D., & Knopjes, F. (2008). Documents: the developer’s toolkit. Lisboa: Via OccidentalisInternational Organisation for Migration.

  • Pfefferli, P. W., Steiner, J., Oneta, C., & Gähwiler, H. (1999). Bekämpung von Ausweis- und Visums-fälschungen : ein Lagebericht. Kriminalistik, 53(12), 833.

    Google Scholar 

  • Phillips, P. J., Yates, A. N., Hu, Y., Hahn, C. A., Noyes, E., Jackson, K., Cavazos, J. G., Jeckeln, G., Ranjan, R., Sankaranarayanan, S., Chen, J.-C., Castillo, C. D., Chellappa, R., White, D., & O’Toole, A. J. (2018). Face recognition accuracy of forensic examiners, superrecognizers, and face recognition algorithms. Proceedings of the National Academy of Sciences of the United States of America, 115(24), 6171–6176.

    Article  Google Scholar 

  • Piazza, P. (2004). Histoire de la carte nationale d’identité. In O. Jacob (Ed.), Histoire.

    Google Scholar 

  • Pontell, H. (2002). Pleased to meet you... you won’t guess my name? Reducing identity fraud in the Australian tax system. Series/Report no.: Centre for Tax System Integrity Workshop: October 2002. Centre for Tax System Integrity (CTSI), Research School of Social Sciences, The Australian National University, Canberra.

  • Ratcliffe, J. (2008). Intelligence-led policing. Portland: Willan Publishing.

  • Rhumorbarbe, D., Staehli, L., Broséus, J., Rossy, Q., & Esseiva, P. (2016). Buying drugs on a Darknet market: a better deal? Studying the online illicit drug market through the analysis of digital, physical and chemical data. Forensic Science International, 267, 173–182.

    Article  Google Scholar 

  • Ribaux, O., Margot, P., Julian, R., & Kelty, S. F. (2013). Forensic intelligence. In J. A. Siegel & P. J. Saukko (Eds.), Encyclopedia of Forensic Sciences (2nd ed., pp. 298–302). Cambridge, MA: Academic Press.

  • Robertson, D., & Burton, A. (2016). Unfamiliar face recognition: security, surveillance and smartphones. The Journal of the United States Homeland Defence and Security Information Analysis Center, 3(1), 14–21.

    Google Scholar 

  • Robertson, D., Middleton, R., & Burton, A. (2015). From policing to passport control: the limitations of photo ID. Keesing Journal of Documents & Identity, 46, 3–8.

    Google Scholar 

  • Robertson, D., Noyes, E., Dowsett, A., Jenkins, R., & Burton, A. (2016). Face recognition by metropolitan police super-recognisers. PLoS One, 11(2), e0150036.

    Article  Google Scholar 

  • Robertson, D., Kramer, R., & Burton, A. (2017). Fraudulent ID using face morphs: experiments on human and automatic recognition. PLoS One, 12(3), e0173319.

    Article  Google Scholar 

  • Robertson, D., Mungall, A., Watson, D., Wade, K., Nightingale, S., & Butler, S. (2018). Detecting mophed passport photos: a training and individual differences approach. Cognitive Research: Principles and Applications, 3(1), 27.

    Google Scholar 

  • Robertson, D., Fysh, M., & Bindemann, M. (2019). Facial identity verification: five challenges facing practitioners. Keesing Journal of Documents & Identity, 59, 3–8.

    Google Scholar 

  • Romagna, M. (2014). The cyber-market of identities: criminological analysis on the illegal market of identity documents within the surface Web and Onionland. Utrecht University. Master thesis, Utrecht.

  • Romagna, M. (2015). Cybermarket for forged identity documents: the illegal trade of identity documents on the surface web and in Onionland. Keesing Journal of Documents & Identity, 47, 12–15.

    Google Scholar 

  • Rudner, M. (2008). Misuse of passports: identity fraud, the propensity to travel, and international terrorism. Studies in Conflict & Terrorism, 31(2), 95–110.

    Article  Google Scholar 

  • Ruey, J. (2018). La vente de faux documents sur Instagram. University of Lausanne. Master thesis, Lausanne.

  • Santschi, C. (2004). Passeports et papiers d’identité. Échos Saléviens : Revue d’histoire Locale, 12(13), 229–250.

    Google Scholar 

  • SavoirNews.com. (2011). Les accidents de la route au Togo: 2.197 morts de 2006 à 2010.

  • Schloenhardt, A. (1999). Organized crime and the business of migrant trafficking. Crime, Law and Social Change, 32, 202–233.

    Article  Google Scholar 

  • Sifaoui, M. (2003). Mes “frères” assassins : comment j’ai infiltré une cellule d’Al-Qaïda. In collection “Documents.”. Le Cherche-Midi.

  • Smith, R. G. (2003). Travelling in cyberspace on a false passport: controlling transnational identity-related crime. The British Criminology Conference: Selected Proceedings, 5. http://www.britsoccrim.org/volume5/004.pdf. Accessed 20 Aug 2019.

  • SOCA. (2009). The United Kingdom threat assessment of serious organised crime 2008/9. Section “Identity fraud and false documents, intellectual property crime and currency counterfeiting”, § 280-287.

  • Steinmann, S., Baechler, S., Fivaz, E., Villettaz, P., & Aebi, M. (2013). L’usage de faux documents d’identité: situations récurrentes, profil des auteurs et jugements pénaux. Revue Internationale de Criminologie et de Police Technique et Scientifique, 66(3), 295–320.

    Google Scholar 

  • Swiss Federal Office of Police. (2019). FRAUDE 2017/18: national comparative statistics on fraudulent documents and fraudulent use of documents. Bern: Swiss Federal Office of Police.

  • Sykes, G., & Matza, D. (1957). Techniques of neutralization: a theory of delinquency. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Talbot-Wright, B., Baechler, S., Morelato, M., Ribaux, O., & Roux, C. (2016). Image processing of false identity documents for forensic intelligence. Forensic Science International, 263, 67–73. https://doi.org/10.1016/j.forsciint.2016.03.054.

    Article  Google Scholar 

  • Telep, C. W. (2017). Police officer receptivity to research and evidence-based policing: examining variability within and across agencies. Crime & Delinquency, 63(8), 976–999.

    Article  Google Scholar 

  • Thelen, R., & Horchert, J. (2018). Aktivisten schmuggeln Fotomontage in Reisepass. Der Spiegel. http://www.spiegel.de/netzwelt/netzpolitik/biometrie-im-reisepass-peng-kollektiv-schmuggelt-fotomontage-in-ausweis-a-1229418.html. Accessed 20 Aug 2019.

  • Thomas, N. (2016). The value of research in modern policing. International Crime and Intelligence Analysis Conference, 1–11.

  • Tisserand-Barthole, C. (2017). Tirer parti de la recherche visuelle et d’images pour la veille. Netsources, 130, 1–7.

    Google Scholar 

  • Towler, A., Kemp, R. I., Burton, A., Dunn, J. D., Wayne, T., Moreton, R., & White, D. (2019). Do professional facial image comparison training courses work? PLoS One, 14(2), e0211037.

    Article  Google Scholar 

  • United States government. (2019). The Opioid Detection Challenge. https://www.opioiddetectionchallenge.com/. Accessed 20 Aug 2019.

  • UNODC. (2010a). Guide for the development of forensic document examination capacity. United Nations Office on Drugs and Crime.

  • UNODC. (2010b). Report of observations and conclusions of the session on the use of forensic sciences to combat and prevent identity-related crime, 21–22 January 2010, 4th Meeting of the International Core Group of Experts on Identity-Related Crime, Vienna, Austria, 18–2. In Integration and coordination of efforts by the United Nations Office on Drugs and Crime and by Member States in the field of crime prevention and criminal justice (Issue E/CN.15/2010/CRP.2). Commission on Crime Prevention and Criminal Justice of the United Nations, United Nations Office on Drugs and Crime.

  • UNODC. (2010c). Smuggling of migrants: a global review and annotated bibliography of recent publications. Vienna: United Nations Office on Drugs and Crime.

  • Webb, S., & Burrows, J. (2009). Organised immigration crime: a post-conviction study. Home Office Research Report, 15.

  • Weisburd, D., & Neyroud, P. (2011). Police science: toward a new paradigm. Washington D.C.: Harvard Kennedy School, Program in Criminal Justice, Policy and Management, U.S. Department of Justice, Office of Justice Programs, National Institute of Justice.

  • Willox, N. A., & Regan, T. M. (2002). Identity fraud: providing a solution. New York: Economic Crime Institute, LexisNexis.

  • Yar, M. (2005). The novelty of ‘Cybercrime’: an assessment in light of routine activity theory. European Journal of Criminology, 2(4), 407–427.

    Article  Google Scholar 

  • Zhang, S., & Chin, K.-L. (2002). Enter the dragon: inside Chinese human smuggling organizations. Criminology, 40(4), 737–768.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simon Baechler.

Additional information

Contribution to the special issue

‘Fraud in the 21st Century’

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Baechler, S. Document Fraud: Will Your Identity Be Secure in the Twenty-first Century?. Eur J Crim Policy Res 26, 379–398 (2020). https://doi.org/10.1007/s10610-020-09441-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10610-020-09441-8

Keywords

Navigation