Share Email Print

Proceedings Paper

On the application of semantic technologies to the domain of forensic investigations in financial crimes
Author(s): Tobias Scheidat; Ronny Merkel; Volker Krummel; Andreas Gerlach; Michala Weisensee; Jana Zeihe; Jana Dittmann
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

In daily police practice, forensic investigation of criminal cases is mainly based on manual work and the experience of individual forensic experts, using basic storage and data processing technologies. However, an individual criminal case does not only consist of the actual offence, but also of a variety of different aspects involved. For example, in order to solve a financial criminal case, an investigator has to find interrelations between different case entities as well as to other cases. The required information about these different entities is often stored in various databases and mostly requires to be manually requested and processed by forensic investigators. We propose the application of semantic technologies to the domain of forensic investigations at the example of financial crimes. Such combination allows for modelling specific case entities and their interrelations within and between cases. As a result, an explorative search of connections between case entities in the scope of an investigation as well as an automated derivation of conclusions from an established fact base is enabled. The proposed model is presented in the form of a crime field ontology, based on different types of knowledge obtained from three individual sources: open source intelligence, forensic investigators and captive interviews of detained criminals. The modelled crime field ontology is illustrated at two examples using the well known crime type of explosive attack on ATM and the potentially upcoming crime type data theft by NFC crowd skimming. Of these criminal modi operandi, anonymized fictional are modelled, visualized and exploratively searched. Modelled case entities include modi operandi, events, actors, resources, exploited weaknesses as well as flows of money, data and know how. The potential exploration of interrelations between the different case entities of such examples is illustrated in the scope of a fictitious investigation, highlighting the potential of the approach.

Paper Details

Date Published: 5 October 2017
PDF: 15 pages
Proc. SPIE 10441, Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies, 104410G (5 October 2017); doi: 10.1117/12.2277695
Show Author Affiliations
Tobias Scheidat, Otto-von-Guericke Univ. Magdeburg (Germany)
Ronny Merkel, Otto-von-Guericke Univ. Magdeburg (Germany)
Volker Krummel, Wincor Nixdorf International GmbH (Germany)
Andreas Gerlach, Wincor Nixdorf International GmbH (Germany)
Michala Weisensee, SBSK GmbH & Co. KG (Germany)
Jana Zeihe, SBSK GmbH & Co. KG (Germany)
Jana Dittmann, Otto-von-Guericke Univ. Magdeburg (Germany)

Published in SPIE Proceedings Vol. 10441:
Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies
Henri Bouma; Felicity Carlysle-Davies; Robert James Stokes; Yitzhak Yitzhaky, Editor(s)

© SPIE. Terms of Use
Back to Top