Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal of Digital Forensics, Security and Law

Discipline
Keyword
Publication Year

Articles 61 - 90 of 530

Full-Text Articles in Law

Table Of Contents Aug 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Publication Information Aug 2018

Publication Information

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Aug 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Drone Forensic Analysis Using Open Source Tools, M A Hannan Bin Azhar, Thomas Edward Allen Barton, Tasmina Islam Mar 2018

Drone Forensic Analysis Using Open Source Tools, M A Hannan Bin Azhar, Thomas Edward Allen Barton, Tasmina Islam

Journal of Digital Forensics, Security and Law

Carrying capabilities of drones and their easy accessibility to public have led to an increase in crimes committed using drones in recent years. For this reason, the need for forensic analysis of drones captured from the crime scenes and the devices used for these drones is also paramount. This paper presents the extraction and identification of important artefacts from the recorded flight data as well as the associated mobile devices using open source tools and some basic scripts developed to aid the analysis of two popular drone systems- the DJI Phantom 3 Professional and Parrot AR. Drone 2.0. Although different …


Front Matter Mar 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Hierarchical Bloom Filter Trees For Approximate Matching, David Lillis, Frank Breitinger, Mark Scanlon Mar 2018

Hierarchical Bloom Filter Trees For Approximate Matching, David Lillis, Frank Breitinger, Mark Scanlon

Journal of Digital Forensics, Security and Law

Bytewise approximate matching algorithms have in recent years shown significant promise in detecting files that are similar at the byte level. This is very useful for digital forensic investigators, who are regularly faced with the problem of searching through a seized device for pertinent data. A common scenario is where an investigator is in possession of a collection of "known-illegal" files (e.g. a collection of child abuse material) and wishes to find whether copies of these are stored on the seized device. Approximate matching addresses shortcomings in traditional hashing, which can only find identical files, by also being able to …


Cover Mar 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Mar 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Mar 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Preface Mar 2018

Preface

Journal of Digital Forensics, Security and Law

No abstract provided.


Testing Memory Forensics Tools For The Macintosh Os X Operating System, Charles B. Leopard, Neil C. Rowe, Michael R. Mccarrin Mar 2018

Testing Memory Forensics Tools For The Macintosh Os X Operating System, Charles B. Leopard, Neil C. Rowe, Michael R. Mccarrin

Journal of Digital Forensics, Security and Law

Memory acquisition is essential to defeat anti-forensic operating-system features and investigate cyberattacks that leave little or no evidence in secondary storage. The forensic community has developed tools to acquire physical memory from Apple’s Macintosh computers, but they have not much been tested. This work tested three major OS X memory-acquisition tools. Although the tools could capture system memory accurately, the open-source tool OSXPmem appeared advantageous in size, reliability, and support for memory configurations and versions of the OS X operating system.


Subscription Information Mar 2018

Subscription Information

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Mar 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina Feb 2018

Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina

Journal of Digital Forensics, Security and Law

The authors analyze the selection of preventive measures in the form of house arrest in Russian criminal procedures on the basis of universal and European standards of guaranteeing respect for individual rights. The article states that the application of preventive measures significantly restricts the right to protect the dignity of the individual, the right to freedom and personal inviolability, the right to free movement, choose the place of residence. The authors argue for the alternative method of applying the house arrest. as a form of prevention This preventive measure, unlike detention does not provide for the isolation of a person …


Cover Front Dec 2017

Cover Front

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr. Dec 2017

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.

Journal of Digital Forensics, Security and Law

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …


Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell Dec 2017

Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …


Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr. Dec 2017

Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr.

Journal of Digital Forensics, Security and Law

With the evolution in digital technologies, organizations have been forced to change the way they plan, develop, and enact their information technology strategies. This is because modern digital technologies do not only present new opportunities to business organizations but also a different set of issues and challenges that need to be resolved. With the rising threats of cybercrimes, for example, which have been accelerated by the emergence of new digital technologies, many organizations as well as law enforcement agencies globally are now erecting proactive measures as a way to increase their ability to respond to security incidents as well as …


Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald Dec 2017

Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald

Journal of Digital Forensics, Security and Law

Consumer grade broadband routers are integral to accessing the Internet and are primarily responsible for the reliable routing of data between networks. Despite the importance of broadband routers, security has never been at the forefront of their evolution. Consumers are often in possession of broadband routers that are rich in consumer-orientated features yet riddled with vulnerabilities that make the routers susceptible to exploitation. This amalgamation of theoretical research examines consumer grade broadband routers from the perspective of how they evolved, what makes them vulnerable, how they are targeted and the challenges concerning the application of security. The research further explores …


Evidence Verification Complications With Solid-State Drives, Ryne Teague, Michael Black Dec 2017

Evidence Verification Complications With Solid-State Drives, Ryne Teague, Michael Black

Journal of Digital Forensics, Security and Law

Solid-state drives operate on a combination of technologies that create a barrier between the physical data being written and the digital forensics investigator. This barrier prevents the application of evidence verification methods developed for magnetic disk drives because the barrier prevents the investigator from directly controlling and therefore verifying that the underlying physical data has not been manipulated. The purpose of this research is to identify a period of inactivity where the underlying physical data is not being manipulated by wear leveling or garbage collection routines such that evidence can be reliably verified with existing hashing algorithms. An experiment is …


Back Matter Dec 2017

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Back Dec 2017

Cover Back

Journal of Digital Forensics, Security and Law

No abstract provided.


Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko Nov 2017

Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko

Journal of Digital Forensics, Security and Law

Digital technology nowadays covers all the spheres of life of an individual and society’s activities. With this, it is not a secret that it can be used both for the benefit and to the detriment of the person. In digital age, private life is becoming most vulnerable to arbitrary interference. This article considers various violations of the rights to privacy, communication safety and inviolability of privacy security brought in by the digital revolution. The article concludes that the most important task in the sphere of private life safety is to find a balance of interests of the state, the society …


Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado Sep 2017

Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado

Journal of Digital Forensics, Security and Law

Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic …


Contractual Responsibility For The Disclosure Of Bank Secrets, Alexander V. Syatchikhin, Valery G. Golubtsov, Natalia V. Syropiatova Sep 2017

Contractual Responsibility For The Disclosure Of Bank Secrets, Alexander V. Syatchikhin, Valery G. Golubtsov, Natalia V. Syropiatova

Journal of Digital Forensics, Security and Law

In Russia the existing measures of civil liability for disclosure of bank secrecy contribute to the prevention of non-fulfillment of obligations and the restoration of the situation of credit institutions only to a small extent. Thus, the Civil Code of the Russian Federation grants the creditor the right to recover damages. However, it is practically impossible to prove the size of the real damage and loss of profit, as well as the causal relationship between the disclosure of secrecy and losses in fact.

The authors discuss the issue of the possibility of introducing legal design of liquidated damages into domestic …


The Use Of Information Technologies To Combat Counterfeit Alcohol Products And Ensure The Right To Life In Russia, Pavel Syosoevich Pastukhov, Svetlana Polyakova, Evelina Frolovich Sep 2017

The Use Of Information Technologies To Combat Counterfeit Alcohol Products And Ensure The Right To Life In Russia, Pavel Syosoevich Pastukhov, Svetlana Polyakova, Evelina Frolovich

Journal of Digital Forensics, Security and Law

The paper is aimed to analyze implementation of an integrated information system that provides forecasting, monitoring, prevention and elimination of possible threats, such as violation of information support of public authorities, businesses and municipal services and others as well as control of elimination of consequences of emergency situations and offenses with integration under its control action information and control duty subsystems, control, municipal services for their operational cooperation in the interests of of the municipality. In particular, it consideres how this unified system is applied in accounting of production volume and turnover of ethyl alcohol, alcoholic and alcohol-containing products (USAIS) …


Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James Sep 2017

Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James

Journal of Digital Forensics, Security and Law

When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …


Front Matter Sep 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Editorial Sep 2017

Editorial

Journal of Digital Forensics, Security and Law

No abstract provided.