Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Embry-Riddle Aeronautical University

Journal

2020

Discipline
Keyword
Publication

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara Oct 2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara

Journal of Digital Forensics, Security and Law

Following a series of high profile miscarriages of justice in the UK linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008. The main objective of this role is to improve the standard of practitioner competences and forensic procedures. One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice. Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales. However, the Forensic Science Regulator …


A Forensic First Look At A Pos Device: Searching For Pci Dss Data Storage Violations, Stephen Larson, James Jones, Jim Swauger Oct 2020

A Forensic First Look At A Pos Device: Searching For Pci Dss Data Storage Violations, Stephen Larson, James Jones, Jim Swauger

Journal of Digital Forensics, Security and Law

According to the Verizon 2018 Data Breach Investigations Report, 321 POS terminals (user devices) were involved in about 14% of the 2,216 data breaches in 2017 (Verizon, 2018). These data breaches involved standalone POS terminals as well as associated controller systems. This paper examines a standalone Point-of-Sale (POS) system which is ubiquitous in smaller retail stores and restaurants. An attempt to extract unencrypted data and identify possible violations of the Payment Card Industry Data Security Standard (PCI DSS) requirement to protect stored cardholder data were be made. Persistent storage (flash memory chips) were removed from the devices and their contents …


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas Aug 2020

A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper …


What’S In The Cloud? - An Examination Of The Impact Of Cloud Storage Usage On The Browser Cache., Graeme Horsman Jun 2020

What’S In The Cloud? - An Examination Of The Impact Of Cloud Storage Usage On The Browser Cache., Graeme Horsman

Journal of Digital Forensics, Security and Law

Cloud storage is now a well established and popular service adopted by many individuals, often at limited or no cost. It provides users with the ability to store content on a cloud service provider’s infrastructure offering the benefit of redundancy, reliability, security, flexibility of access and the potential assumed liability of the provider for data loss within the contexts of a licensing agreement. Consequently, this form of remote storage provides a regulatory challenge as content which once resided upon a seized digital exhibit, available for scrutiny during a digital forensic investigatory, may no longer be present where attempting to acquire …


An Evaluation Of Data Erasing Tools, Andrew Jones, Isaac Afrifa Jun 2020

An Evaluation Of Data Erasing Tools, Andrew Jones, Isaac Afrifa

Journal of Digital Forensics, Security and Law

The permanent removal of data from media is a major area of concern mainly because of the misconception that once a file is deleted or storage media is formatted, it cannot be recovered. There has been the development of both commercial and freeware data erasing tools, which all claim complete file or disk erasure. This report analyzes the efficiency of a number of these tools in performing erasures on an electromechanical drive. It focuses on a selection of popular and modern erasing tools; taking into consideration their usability, claimed erasing standards and whether they perform complete data erasure with the …


Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through Apr 2020

Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through

Journal of Digital Forensics, Security and Law

Data carving is a technique used in data recovery to isolate and extract files based on file content without any file system guidance. It is an important part of data recovery and digital forensics, but it is also useful in teaching computer science students about file structure and binary encoding of information especially within a digital forensics program. This work demonstrates how the authors teach data carving using a real world problem they encounter in digital forensics evidence processing involving the extracting of text messages from unstructured small device binary extractions. The authors have used this problem for instruction in …


Cyber-Security Risks Of Fedwire, Mark J. Bilger Apr 2020

Cyber-Security Risks Of Fedwire, Mark J. Bilger

Journal of Digital Forensics, Security and Law

This paper will review the risks associated with the Federal Reserve's Fedwire network as a key resource necessary for the efficient function of the American financial system. It will examine the business model of the Fedwire system of real-time interbank transfers, the network characteristics of Fedwire, and the possibility of a successful attack on Fedwire and its potential impact on the U.S. financial system.


Front Matter Mar 2020

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Development Of A Sensor Suite For Atmospheric Boundary Layer Measurement With A Small Multirotor Unmanned Aerial System, Kevin A. Adkins, Christopher J. Swinford, Peter D. Wambolt, Gordon Bease Jan 2020

Development Of A Sensor Suite For Atmospheric Boundary Layer Measurement With A Small Multirotor Unmanned Aerial System, Kevin A. Adkins, Christopher J. Swinford, Peter D. Wambolt, Gordon Bease

International Journal of Aviation, Aeronautics, and Aerospace

Small unmanned aerial systems (sUAS) are increasingly being used to conduct atmospheric research. Because of the dynamic nature and inhomogeneity of the atmospheric boundary layer (ABL), the ability of instrumented sUAS to make on-demand 3-dimensional high-resolution spatial measurements of atmospheric parameters makes them particularly suited to ABL investigations. Both fixed-wing and multirotor sUAS have been used for ABL investigations. Most investigations to date have included in-situ measurement of thermodynamic quantities such as temperature, pressure and humidity. When wind has been measured, a variety of strategies have been used. Two of the most popular techniques have been deducing wind from inertial …


Automatic Gaze Classification For Aviators: Using Multi-Task Convolutional Networks As A Proxy For Flight Instructor Observation, Justin Wilson, Sandro Scielzo, Sukumaran Nair, Eric C. Larson Jan 2020

Automatic Gaze Classification For Aviators: Using Multi-Task Convolutional Networks As A Proxy For Flight Instructor Observation, Justin Wilson, Sandro Scielzo, Sukumaran Nair, Eric C. Larson

International Journal of Aviation, Aeronautics, and Aerospace

In this work, we investigate how flight instructors observe aviator scan patterns and assign quality to an aviator's gaze. We first establish the reliability of instructors to assign similar quality to an aviator's scan patterns, and then investigate methods to automate this quality using machine learning. In particular, we focus on the classification of gaze for aviators in a mixed-reality flight simulation. We create and evaluate two machine learning models for classifying gaze quality of aviators: a task-agnostic model and a multi-task model. Both models use deep convolutional neural networks to classify the quality of pilot gaze patterns for 40 …


A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz Jan 2020

A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz

Journal of Aviation/Aerospace Education & Research

As General Aviation (GA) safety continues to remain a focus of the aviation community, GA pilot weather education and training continues to be an active area of interest within the research community. This study introduces a taxonomy for organizing GA pilot weather education and training materials that was originally conceived as part of the FAA’s Weather Technology In the Cockpit research program. The taxonomy is built upon three main knowledge categories, or tiers:1) Weather Phenomena (which includes hazards); 2) Weather Hazard Products; and 3) Weather Hazard Product Sources and their Application. The concept behind the categorization is to link knowledge …


Implementing Active Learning Techniques In An Undergraduate Aviation Meteorology Course, Daniel J. Halperin, Robert W. Eicher, Thomas A. Guinn, Joseph R. Keebler, Kim O. Chambers Jan 2020

Implementing Active Learning Techniques In An Undergraduate Aviation Meteorology Course, Daniel J. Halperin, Robert W. Eicher, Thomas A. Guinn, Joseph R. Keebler, Kim O. Chambers

Journal of Aviation/Aerospace Education & Research

A course in Aviation Weather is an integral component of multiple degree programs at Embry-Riddle Aeronautical University. Consequently, the course sustains large enrollments with several faculty teaching it. Efforts to promote a consistent experience for students resulted in primarily PowerPoint-based lectures. This paper describes a set of changes made to the course with the goal of improving students’ engagement, understanding, and retention of the course material that are consistent with effective teaching strategies based on prior research. Specifically, daily quizzes, Poll Everywhere questions, in-class activities, flipped classroom sessions, and assertion-evidence based lectures were introduced. These changes initially were implemented in …


Real-Time Urban Weather Observations For Urban Air Mobility, Kevin A. Adkins, Mustafa Akbas, Marc Compere Jan 2020

Real-Time Urban Weather Observations For Urban Air Mobility, Kevin A. Adkins, Mustafa Akbas, Marc Compere

International Journal of Aviation, Aeronautics, and Aerospace

Cities of the future will have to overcome congestion, air pollution and increasing infrastructure cost while moving more people and goods smoothly, efficiently and in an eco-friendly manner. Urban air mobility (UAM) is expected to be an integral component of achieving this new type of city. This is a new environment for sustained aviation operations. The heterogeneity of the urban fabric and the roughness elements within it create a unique environment where flight conditions can change frequently across very short distances. UAM vehicles with their lower mass, more limited thrust and slower speeds are especially sensitive to these conditions. Since …