Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Social and Behavioral Sciences

Crime And Psychiatric Disorders Among Youth In The Us Population: An Analysis Of The National Comorbidity Survey-Adolescent Supplement, Kendell L. Coker, Philip H. Smith, Alexander Westphal, Howard V. Zonana, Sherry A. Mckee Aug 2014

Crime And Psychiatric Disorders Among Youth In The Us Population: An Analysis Of The National Comorbidity Survey-Adolescent Supplement, Kendell L. Coker, Philip H. Smith, Alexander Westphal, Howard V. Zonana, Sherry A. Mckee

Psychology Faculty Publications

Objective Current knowledge regarding psychiatric disorders and crime in youth is limited to juvenile justice and community samples. This study examined relationships between psychiatric disorders and self-reported crime involvement in a sample of youth representative of the US population. Method The National Comorbidity Survey–Adolescent Supplement (N = 10,123; ages 13–17 years; 2001–2004) was used to examine the relationship between lifetime DSM-IV–based diagnoses, reported crime (property, violent, other), and arrest history. Logistic regression compared the odds of reported crime involvement with specific psychiatric disorders to those without any diagnoses, and examined the odds of crime by psychiatric comorbidity. Results Prevalence of …


Preliminary Forensic Analysis Of The Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues Aug 2014

Preliminary Forensic Analysis Of The Xbox One, Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues

Electrical & Computer Engineering and Computer Science Faculty Publications

Video game consoles can no longer be viewed as just gaming consoles but rather as full multimedia machines, capable of desktop computer-like performance. The past has shown that game consoles have been used in criminal activities such as extortion, identity theft, and child pornography, but with their ever-increasing capabilities, the likelihood of the expansion of criminal activities conducted on or over the consoles increases. This research aimed to take the initial step of understanding the Xbox One, the most powerful Microsoft console to date. We report the outcome of conducting a forensic examination of the Xbox One, and we provide …


Testing The Forensic Soundness Of Forensic Examination Environments On Bootable Media, Ahmed F.A.L. Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim Baggili Aug 2014

Testing The Forensic Soundness Of Forensic Examination Environments On Bootable Media, Ahmed F.A.L. Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work we experimentally examine the forensic soundness of the use of forensic bootable CD/DVDs as forensic examination environments. Several Linux distributions with bootable CD/DVDs which are marketed as forensic examination environments are used to perform a forensic analysis of a captured computer system. Before and after the bootable CD/DVD examination, the computer system's hard disk is removed and a forensic image acquired by a second system using a hardware write blocker. The images acquired before and after the bootable CD/DVD examination are hashed and the hash values compared. Where the hash values are inconsistent, a differential analysis is …


On The Database Lookup Problem Of Approximate Matching, Frank Breitinger, Harald Baier, Douglas White May 2014

On The Database Lookup Problem Of Approximate Matching, Frank Breitinger, Harald Baier, Douglas White

Electrical & Computer Engineering and Computer Science Faculty Publications

Investigating seized devices within digital forensics gets more and more difficult due to the increasing amount of data. Hence, a common procedure uses automated file identification which reduces the amount of data an investigator has to look at by hand. Besides identifying exact duplicates, which is mostly solved using cryptographic hash functions, it is also helpful to detect similar data by applying approximate matching.

Let x denote the number of digests in a database, then the lookup for a single similarity digest has the complexity of O(x). In other words, the digest has to be compared against …


Life (Logical Ios Forensics Examiner): An Open Source Ios Backup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore May 2014

Life (Logical Ios Forensics Examiner): An Open Source Ios Backup Forensics Examination Tool, Ibrahim Baggili, Shadi Al Awawdeh, Jason Moore

Electrical & Computer Engineering and Computer Science Faculty Publications

In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence …


An Experimental Study To Quantify Error Rates Resulting From Measurement Deviation In Area Of Origin Reconstructions Of Blunt Force Impact Patterns, Mark Davison, Timothy Palmbach Apr 2014

An Experimental Study To Quantify Error Rates Resulting From Measurement Deviation In Area Of Origin Reconstructions Of Blunt Force Impact Patterns, Mark Davison, Timothy Palmbach

Forensic Science Publications

The intent of this study was to attempt to quantify error associated with the measurements required in area of origin reconstructions resulting from the analysis of blunt force impact patterns. Mathematical tables were constructed in order to examine trends associated with changing width and length ratios and the influence of impact angle change and area of convergence deviations. The analysis of the trends enabled informed stain selection, mitigating potential error. The analysis of the influence of stain measurement error and gamma angle error was conducted by reconstructing experimentally created blunt force impact patterns using the Tangent Method, comparing the resulting …


Development Of A Quantitative Real-Time Polymerase Chain Reaction (Rt-Pcr) Assay For Plant Species, Kayla Curtis, Heather Miller Coyle Mar 2014

Development Of A Quantitative Real-Time Polymerase Chain Reaction (Rt-Pcr) Assay For Plant Species, Kayla Curtis, Heather Miller Coyle

Forensic Science Publications

In order to facilitate optimal plant DNA quantitation and identification, an assay has been developed that uses generic plant PCR primers that amplify a region in the chloroplast genome of plant samples. The assay uses the SYBR green detection dye to detect the PCR product with a universal PCR primer set to the large subunit of ribulose bisphosphate carboxylase, rbcL, but can be used with any of the universal barcode primers for land plants (rbcL, matK, trnH, psbA). Standard dilutions of control wheat DNA of varying concentrations were tested to create a standard curve. Several plant DNA extractions of different …


Impact Of Tumour Epithelial Subtype On Circulating Micrornas In Breast Cancer Patients, Peadar S. Waters, Roisin M. Dwyer, Cathy Brougham, Claire L. Glynn, Deidre Wall, Peter Hyland, Maria Duignan, Mark Mcloughlin, John Newell, Michael J. Kerin Mar 2014

Impact Of Tumour Epithelial Subtype On Circulating Micrornas In Breast Cancer Patients, Peadar S. Waters, Roisin M. Dwyer, Cathy Brougham, Claire L. Glynn, Deidre Wall, Peter Hyland, Maria Duignan, Mark Mcloughlin, John Newell, Michael J. Kerin

Forensic Science Publications

While a range of miRNAs have been shown to be dysregulated in the circulation of patients with breast cancer, little is known about the relationship between circulating levels and tumour characteristics. The aim of this study was to analyse alterations in circulating miRNA expression during tumour progression in a murine model of breast cancer, and to detemine the clinical relevance of identified miRNAs at both tissue and circulating level in patient samples. Athymic nude mice received a subcutaneous or mammary fat pad injection of MDA-MB-231 cells. Blood sampling was performed at weeks 1, 3 and 6 following tumour induction, and …


Utilizing Dna Analysis To Combat The World Wide Plague Of Present Day Slavery – Trafficking In Persons, Timothy Palmbach, Jeffrey Bloom, Emily Hoynes, Dragan Primorac, Mario Thomas Gaboury Feb 2014

Utilizing Dna Analysis To Combat The World Wide Plague Of Present Day Slavery – Trafficking In Persons, Timothy Palmbach, Jeffrey Bloom, Emily Hoynes, Dragan Primorac, Mario Thomas Gaboury

Forensic Science Publications

A study was conducted to determine if modern forensic DNA typing methods can be properly employed throughout the world with a final goal of increasing arrests, prosecutions, and convictions of perpetrators of modern day trafficking in persons while concurrently reducing the burden of victim testimony in legal proceedings. Without interruption of investigations, collection of samples containing DNA was conducted in a variety of settings. Evidentiary samples were analyzed on the ANDE Rapid DNA system. Many of the collected swabs yielded informative short tandem repeat profiles with Rapid DNA technology.


Terrorism, International., Jibey Asthappan Jan 2014

Terrorism, International., Jibey Asthappan

Criminal Justice Faculty Publications

International terrorism is a relatively new phenomenon considering the age of terrorism. Terrorism has been used for over 2,000 years, but international terrorism as we know it today was made possible by technological advances. This entry begins by reviewing pivotal historical events that led to terrorism's use, as well as the underlying reasons for terrorism today. The article then discusses the influence of political stability and culture on international terrorism. Finally, a brief discussion of counter-terrorism strategies highlights the means by which terrorism is prevented.


File Detection On Network Traffic Using Approximate Matching, Frank Breitinger, Ibrahim Baggili Jan 2014

File Detection On Network Traffic Using Approximate Matching, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

In recent years, Internet technologies changed enormously and allow faster Internet connections, higher data rates and mobile usage. Hence, it is possible to send huge amounts of data / files easily which is often used by insiders or attackers to steal intellectual property. As a consequence, data leakage prevention systems (DLPS) have been developed which analyze network traffic and alert in case of a data leak. Although the overall concepts of the detection techniques are known, the systems are mostly closed and commercial. Within this paper we present a new technique for network traffic analysis based on approximate matching (a.k.a …


Automated Evaluation Of Approximate Matching Algorithms On Real Data, Frank Breitinger, Vassil Roussev Jan 2014

Automated Evaluation Of Approximate Matching Algorithms On Real Data, Frank Breitinger, Vassil Roussev

Electrical & Computer Engineering and Computer Science Faculty Publications

Bytewise approximate matching is a relatively new area within digital forensics, but its importance is growing quickly as practitioners are looking for fast methods to screen and analyze the increasing amounts of data in forensic investigations. The essential idea is to complement the use of cryptographic hash functions to detect data objects with bytewise identical representation with the capability to find objects with bytewise similarrepresentations.

Unlike cryptographic hash functions, which have been studied and tested for a long time, approximate matching ones are still in their early development stages and evaluation methodology is still evolving. Broadly, prior approaches have …


Unmasking Cancer As A Consequence Of Human Trafficking: A Multidisciplinary Challenge, Barbara Moynihan, Katherine Olive Jan 2014

Unmasking Cancer As A Consequence Of Human Trafficking: A Multidisciplinary Challenge, Barbara Moynihan, Katherine Olive

Forensic Science Publications

This article will focus on the development of cancer as a potential consequence of human trafficking. Various subtle sequelae of trafficking, such as the insidious development of cancer, may not be seen until well after the victim has been freed. There are a myriad of factors that contribute to missed or inadequate health care for victims and survivors of human trafficking. These health care needs (both medical as well as mental health) may be overlooked until many months or years post-trafficking. We will address the risk factors consistent with human trafficking that should be considered by health care professionals who …


An Efficient Similarity Digests Database Lookup -- A Logarithmic Divide And Conquer Approach, Frank Breitinger, Christian Rathgeb, Harald Baier Jan 2014

An Efficient Similarity Digests Database Lookup -- A Logarithmic Divide And Conquer Approach, Frank Breitinger, Christian Rathgeb, Harald Baier

Electrical & Computer Engineering and Computer Science Faculty Publications

Investigating seized devices within digital forensics represents a challenging task due to the increasing amount of data. Common procedures utilize automated file identification, which reduces the amount of data an investigator has to examine manually. In the past years the research field of approximate matching arises to detect similar data. However, if n denotes the number of similarity digests in a database, then the lookup for a single similarity digest is of complexity of O(n). This paper presents a concept to extend existing approximate matching algorithms, which reduces the lookup complexity from O(n) to O(log(n)). Our proposed approach is based …


Quantifying Relevance Of Mobile Digital Evidence As They Relate To Case Types: A Survey And A Guide For Best Practices, Shahzad Saleem, Ibrahim Baggili, Oliver Popov Jan 2014

Quantifying Relevance Of Mobile Digital Evidence As They Relate To Case Types: A Survey And A Guide For Best Practices, Shahzad Saleem, Ibrahim Baggili, Oliver Popov

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work, a survey was conducted to help quantify the relevance of nineteen types of evidence (such as SMS) to seven types of digital investigations associated with mobile devices (MD) (such as child pornography). 97 % of the respondents agreed that every type of digital evidence has a different level of relevance to further or solve a particular investigation. From 55 serious participants, a data set of 5,772 responses regarding the relevance of nineteen types of digital evidence for all the seven types of digital investigations was obtained. The results showed that (i) SMS belongs to the most relevant …