Identity Fmud the Cmouflage of Choice: Controlling the Chameleon
Total Page:16
File Type:pdf, Size:1020Kb
IDENTITY FMUD THE CMOUFLAGE OF CHOICE: CONTROLLING THE CHAMELEON Master of Arts (Criminal Intelligence) Charles Sturt University Faculty of Arts 20'" June 2007 Student: Bernadette Beard Graduate Diploma of Criminal Intelligence Graduate Certificate in Applied Police Management TABLE OF CONTENTS STATEMENT OF ORIGINALITY ..................................................................................... 4 ACKNOWLEDGEMENTS ..................................................................................................5 ABSTRACT .........................................................................................................................6 LIST OF GRAPHS AND TABLES ...................................................................................... 9 CHAPTER 1................................................................................................ 10 CHAPTER 1................................................................................................ 10 INTRODUCTION .............................................................................................................. 10 CHAPTER 2 ............................................................................................... 12 METHODOLOGY ..............................................................................................................12 CHAPTER 3 ............................................................................................... 15 HISTORICAL OVERVIEW................................................................................................ 15 CHAPTER 4 ............................................................................................... 20 CRIMINAL METHODOLOGY ........................................................................................20 CHAPTER 5 ............................................................................................... 25 COST AND MAGNITUDE ............................................................................................... 25 CHAPTER 6 ...............................................................................................43 VICTIM ASSISTANCE AND PREVENTION................................................................. 43 CHAPTER 7 ............................................................................................... 60 FACILITATION OF TERRORISM .................................................................................. 60 CHAPTER 8 ...............................................................................................67 IDENTITY DOCUMENTS ............................................................................................. 67 CHAPTER 9 ...............................................................................................83 BIOMETRICS.................................................................................................................. 83 CHAPTER 10 ......................................................................................... 101 LEGISLATIVE ANALYSIS ........................................................................................... 101 CHAPTER 11 ............................................................................................ I20 CONCLUSION ..................................................................................................................120 REFERENCES.................................................................................................................. 126 STATEMENT OF ORIGINmITY I hereby declare that rhs subrmssioii is my own work and that, to the best of my knowledge and behef, ~t contams no matenal prev~ouslypubhshed or wrltten by another person nor lnatenal which to a substallual extent has been accepted for the award of any other degree or diploma at Charles Sturt 1Jniverslt~or any other educational msutuuon, except where duc acltnowledgement 1s made 111 the dissertation. Any contribuuon made to the research by colleagues with whom 1 have worlced at (Iharles Sturt IJniversity or elsewhere durlng my candidature 1s fully aclu~otvledgcd. 1 agree that this dissertation be accessible for the purpose of study and research in accordance wlth the normal conditions established by tbc 1i:xecutive llirector, Library Services or nominee, for the care, loan and reproducuon of dissertat~on. Bernadette Beard Many thanks to Patrick Walsh, my subject Coorbator for your guldancc and assistance throughout the completion of this &ssertatiotl. In appreclauon of the understandng and paueilce of my huslx112d \v110 has supported me throughout this penod. Wlthout your asilstancc dl\ crting the attention of our nvln bables, I would stdl be comple~t~gthls dlssertatlon. Idenuty crme 1s one of the most msi&o~tsdevelopments of fraud, both as a stand alone actn-ity atid in its abd~tyto fachtate other htgh level crninal actnrities such as drug traffickmg, people smugghng, money laundesll~gand terrorism. 'I'hc first step in identifying the risk of identity crltnc to the tlustralian cornrnunlty is to quanu@ the extent of the problem. ?'here extsts a sul)stantx~linadecluacy in rncasurlng and understandmg the scope, extent and fiscal cost of 1dentit-y fraud wltllln thts country. This paper is a qualitative research and analysis of a stglificant breadth of publislied and ulipublishcd literature inclu&ng documents, reports and a myrlad of mter-related pleccs of legislation relatlng to the issucs of identity wlme, l~eing both the 'stealing' of a person's idenuty and the creation of a. fictiaous iclentlty. In addition, a cornparatwe approach was adopted to examme mternational trends 111 tdcr~ttfyfraud 1n order to g~ugc,Iustralta's progrcss in dcaltng with these issues compared to other countries such as the I:1<, IS, and Western l i'uropean countries wit11 slmllar cultural and economic values. 'I'he autl?or also rel~edon industry expertise in the subject matter, as a senlor pohce officer responsible for the managerncnt of cr~i-ninaliritelhget~ce analpsls of fraud within New South Wales. Onll- once the true extent and nature of 1denut-j crme m Xustralta 1s fully comprehended can the most appropnate treatment opuons, such as l>tometric ~dentlfiers,faclal recognition technology, or the mtroductton of tdentlty cards be tlioughtfullj7 considered. As such, ~twould be prudent for the ~mplementationof a centrahsed na~onaldatabase on incidents of 1denut-y crmie 'I he collection of thls mformatton would assist to fachtate an m-depth analysls as to the mat,mttude of ldenfity crune m Austraha. Other recoinmendat~onsarising from ths paper include: the promc)tron of victlrn hardening strateges by gos-ernment and private sector organlsat~ons,the creatlon of a central reglster of stolen documents, promotmg the sharing of data l~etxvcen law enforcement and government agencies, u-nproving the mltlal aurhcntlc:ltlon of an m&vldual idenuty when issung documents and a standardtxed lcgisl:ltt\~e approach to ~den~tycrme through natIo11aUy consistent (:ommonwc;ilth and State legslation.. The lack of rehable quanutauve data available may arguably 11e the result of :i hstory of governments, and their respective departments, not comprehendmg thc significance of identlty theft and identity fraud, resulting m a fallure to proactivcly pursue strategic interdctlon polic~esalmed towards elevatmg the notlon of identity as a major personal and national security imperative Now however, there 1s enougl~nauonal and internauonal evldence to suggest that ths IS no longer thc case. The establ~shmentof a Commonwealth Government 1cd Cornmisston of lnyuiry into the prevalence of tdentq fraud wlthm Australia, 1s required In order to fac~lltateappropriate soluixons that balance security, accuracy, privacy, technolo~yand penalt) 50 as to proacuvely combat thts seaous orgarused cruntnal actl\,it-y. LIST OF GRAPHS AND TABLES GRIPH 1 .USE OF FALSEIDENTITIES IN SERI()US FR,irrn (1. is~s........................... 29 GRAPH2 .NULLBER OF ~O...JLTIPLE IDENTITIES USED BY CNTENDERS ...................30 TABLE2 T~TEsOF NOiX MONET-IRY H_%F31.IS mP(IRTED 'I0'TI Ilk 1;'I'C @-~I~EI\IBER1999 ~oSEPTE~IBER 2001) .............................................................49 TABLE3 SULILL~RYOF GAO'S INTER\~IE\YSOF VIC'IIAIS......................................... 50 TABLE4: LIST OF 25 COUNTRIESHA%VING SUFFERED hIOST FK( )hi '1 IXR( )IUS'I li'IT~+CI<SSINCE 1986 ..............................................................................................62 Chapter 1 INTRODUCTION Idenuty crime is one of the most pervasive developments of fraud. It encompasses both identlty theft, whereby the ~dentityof an individual is 'stolen' and subsequently assumed by another, and Identity fraud which tnvolves elther the creatlon of a totally fict~tiousidentlty or usmg a comb~natlonof 'real7and fictltlous ldentlfiers to ultunatel~partake in an dlegal activity with the aim of remaLnlng undetected. It is the enabling abhties of identity crime to fachtate other high level criminal actmities such as drug traffickmg, people smuggling, money laundcrlng and terrorism that is cause for siplficant concern, particularly when onc considers the ever increasing prevalence of identity crime. .Is noted earher, thls paper is 21 qu:thtative research and analysis of a ssgnificant breadth of published and urlpublished hterature includsng documents, reports and a myriad of inter-related pieces of legislation relating to the issues of idcnuty crme, being both the 'stealing' of a person's rdcntity and the creatlon of a fictit~ous identity. This paper will focus on