Open Access. Powered by Scholars. Published by Universities.®

Legal Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Legal Studies

Elemental Analysis Of Adhesive Tapes By Laser-Based Methods, Claudia Martinez Lopez Oct 2018

Elemental Analysis Of Adhesive Tapes By Laser-Based Methods, Claudia Martinez Lopez

FIU Electronic Theses and Dissertations

Adhesive tapes are a common type of evidence involved in violent crimes and national security threats. This research evaluated the utility of LA-ICP-MS and LIBS for the characterization of the trace elemental signature in adhesive tapes for forensic comparisons. LA-ICP-MS and LIBS methods were developed, for the first time, for the qualitative and quantitative analysis of adhesive tapes.

The backings of 90 black electrical tapes, previously characterized by conventional techniques (physical examination, IR, Py-GC-MS, and SEM-EDS), were analyzed by LA-ICP-MS to evaluate the ability of the technique to discriminate samples originating from different sources and to associate pieces of tapes …


Ua12/2/2 Talisman: Movement, Wku Student Affairs Oct 2018

Ua12/2/2 Talisman: Movement, Wku Student Affairs

WKU Archives Records

2018 Talisman yearbook.

  • Good, Hannah. Movement
  • Kinser, Nicholas. Tunnel Trap
  • Cozer, Claire. A Day in the Life of a Food Truck – Mike Wilson, Pop’s Street Eats
  • Fletcher, Griffin. Beauty in Power – WKU Women’s Rugby Club
  • Gordon, Zora. The Mixed Experience
  • Hornsby, Morgan. Bonfire
  • Waters, Adrianna. Mispoken – Communication Disorders
  • Chu, Phi. Home Base – Jessica Barks
  • Cooksey, Catrina. Rerouted – Sydney Clark, Austin Clark, Blake Perkins, Sheila Flener, Handicapped Persons
  • Good, Hannah. Not Safe for Work – Prostitution
  • Chu, Phi. Transfigured Night
  • Carter, De’inara. Passing the Plate – International Students, Recipes
  • Robb, Hayley. From Sole to Soul – …


I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili Aug 2018

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest …


Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger Aug 2018

Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyber forensics has encountered major obstacles over the last decade and is at a crossroads. This paper presents data that was obtained during the National Workshop on Redefining Cyber Forensics (NWRCF) on May 23-24, 2017 supported by the National Science Foundation and organized by the University of New Haven. Qualitative and quantitative data were analyzed from twenty-four cyber forensics expert panel members. This work identified important themes that need to be addressed by the community, focusing on (1) where the domain currently is; (2) where it needs to go and; (3) steps needed to improve it. Furthermore, based on the …


Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili Aug 2018

Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Our work presents the primary account for exploring the forensics of immersive Virtual Reality (VR) systems and their social applications. The Social VR applications studied in this work include Bigscreen, Altspace VR, Rec Room and Facebook Spaces. We explored the two most widely adopted consumer VR systems: the HTC Vive and the Oculus Rift. Our tests examined the efficacy of reconstructing evidence from network traffic as well as the systems themselves. The results showed that a significant amount of forensically relevant data such as user names, user profile pictures, events, and system details may be recovered. We anticipate that this …


Pretrial Release And Failure-To-Appear In Mclean County, Il, Jonathan Monsma Jul 2018

Pretrial Release And Failure-To-Appear In Mclean County, Il, Jonathan Monsma

Stevenson Center for Community and Economic Development—Student Research

Actuarial risk assessment tools increasingly have been employed in jurisdictions across the U.S. to assist courts in the decision of whether someone charged with a crime should be detained or released prior to their trial. These tools should be continually monitored and researched by independent 3rd parties to ensure that these powerful tools are being administered properly and used in the most proficient way as to provide socially optimal results. McLean County, Illinois began using the Public Safety Assessment-CourtTM (PSA-Court or simply PSA) risk assessment tool beginning in 2016. This study culls data from the McLean County Jail …


Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili Jul 2018

Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link in the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat education seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring …


Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger Jul 2018

Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …


Volume 10, Taylor Hogg, Tiffany Carter, Brandyn Johnson, Haleigh James, Josh Baker, Tyler Cernak, Kirsten Bauer, Allie Snavely, Mary Zell Galen, Eric Powell, Thomas Wise, Katie Kinsey, Beth Barbolla, Maeleigh Ferlet, Rebecca Morra, Michala Day, Alexandra Evangelista, Max Flores, Harley Hodges, Clardene Jones, Harrison Samaniego, Jamesha Watson, Abby Gargiulo, Heather Green, Haley Klepatzki, Juan Guevara, Dani Bondurant, Michael Joseph Link Jr., Pamela Dahl, Maeve Losen, Charlotte Murphey Apr 2018

Volume 10, Taylor Hogg, Tiffany Carter, Brandyn Johnson, Haleigh James, Josh Baker, Tyler Cernak, Kirsten Bauer, Allie Snavely, Mary Zell Galen, Eric Powell, Thomas Wise, Katie Kinsey, Beth Barbolla, Maeleigh Ferlet, Rebecca Morra, Michala Day, Alexandra Evangelista, Max Flores, Harley Hodges, Clardene Jones, Harrison Samaniego, Jamesha Watson, Abby Gargiulo, Heather Green, Haley Klepatzki, Juan Guevara, Dani Bondurant, Michael Joseph Link Jr., Pamela Dahl, Maeve Losen, Charlotte Murphey

Incite: The Journal of Undergraduate Scholarship

Introduction Dr. Roger A. Byrne

An Analysis of Media Framing in Cases of Violence Against Women by Taylor Hogg

Writing in the Discipline of Nursing by Tiffany Carter

Photography by Brandyn Johnson

The Hidden Life of Beef Cattle: A Study of Cattle Welfare on Traditional Ranches and Industrial Farms by Haleigh James

Bloodworth's by Josh Baker and Tyler Cernak

Prosimians: Little Bodies, Big Significance by Kirsten Bauer

Skinformed by Allie Snavely

Coopertition and Gracious Professionalism: The Effects of First Robotics Folklore and Culture on the Stem Community by Mary Zell Galen

Tilt by Eric Powell And Thomas Wise

The Millennial …


An Information Theory Approach To Hypothesis Testing In Criminological Research, Gohar A. Petrossian, Mike Maxfield Jan 2018

An Information Theory Approach To Hypothesis Testing In Criminological Research, Gohar A. Petrossian, Mike Maxfield

Publications and Research

Background: This research demonstrates how the Akaike information criterion (AIC) can be an alternative to null hypothesis significance testing in selecting best fitting models. It presents an example to illustrate how AIC can be used in this way.

Methods: Using data from Milwaukee, Wisconsin, we test models of place-based predictor variables on street robbery and commercial robbery. We build models to balance explanatory power and parsimony. Measures include the presence of different kinds of businesses, together with selected age groups and social disadvantage.

Results: Models including place-based measures of land use emerged as the best models among the set of …


An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili Jan 2018

An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.


Introduction: Symposium On “Forensics, Statistics, And Law”, Brandon L. Garrett Jan 2018

Introduction: Symposium On “Forensics, Statistics, And Law”, Brandon L. Garrett

Faculty Scholarship

No abstract provided.


If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili Jan 2018

If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was …