Open Access. Powered by Scholars. Published by Universities.®

Legal Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Legal Studies

Attributes Of Police Vehicle Crashes, David Lambert Dec 2016

Attributes Of Police Vehicle Crashes, David Lambert

Criminal Justice Faculty Publications

While overall on-duty law enforcement deaths has decreased moderately from over 160 in 1980 to a level under 120 per year in the late 2000s, fatalities by motor vehicle collisions have steadily increased. This descriptive analysis examines police vehicle crashes during specific conditions such as emergency response, road surface, lighting, and weather in a large statewide police agency. Police vehicle crashes are most likely to occur on dry roads, in daylight conditions, and in clear weather on weekdays as opposed to weekends. Weather and lighting conditions are not the most frequent factors associated with cruiser crashes in this examination.


Collecting Quality Infrared Spectra From Microscopic Samples Of Suspicious Powders In A Sealed Cell, Brooke Weinger Kammrath, Pauline E. Leary, John A. Reffner Sep 2016

Collecting Quality Infrared Spectra From Microscopic Samples Of Suspicious Powders In A Sealed Cell, Brooke Weinger Kammrath, Pauline E. Leary, John A. Reffner

Forensic Science Publications

The infrared (IR) microspectroscopical analysis of samples within a sealed-cell containing barium fluoride is a critical need when identifying toxic agents or suspicious powders of unidentified composition. The dispersive nature of barium fluoride is well understood and experimental conditions can be easily adjusted during reflection–absorption measurements to account for differences in focus between the visible and IR regions of the spectrum. In most instances, the ability to collect a viable spectrum is possible when using the sealed cell regardless of whether visible or IR focus is optimized. However, when IR focus is optimized, it is possible to collect useful data …


Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger Aug 2016

Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The term “artifact” currently does not have a formal definition within the domain of cyber/ digital forensics, resulting in a lack of standardized reporting, linguistic understanding between professionals, and efficiency. In this paper we propose a new definition based on a survey we conducted, literature usage, prior definitions of the word itself, and similarities with archival science. This definition includes required fields that all artifacts must have and encompasses the notion of curation. Thus, we propose using a new term e curated forensic artifact (CuFA) e to address items which have been cleared for entry into a CuFA database (one …


Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger Aug 2016

Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process.We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker …


Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger Aug 2016

Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital forensic community. Thus, new research initiatives and strategies must be formulated to address this growing problem. In this work we first collect and categorize 308 antidigital forensic tools to survey the field. We then devise an extended anti-forensic taxonomy to the one proposed by Rogers (2006) in order to create a more comprehensive taxonomy and facilitate linguistic standardization. Our work also takes into consideration anti-forensic activity which utilizes tools that were not originally designed for antiforensic purposes, but can still be used with malicious intent. This category …


Juvenile Transfer To Adult Court: Ongoing Search For Scientific Support, David Myers Jul 2016

Juvenile Transfer To Adult Court: Ongoing Search For Scientific Support, David Myers

Criminal Justice Faculty Publications

(From p. 3) The basic question addressed in this body of research is as follows: Does transferring juvenile offenders to the adult criminal justice system produce a specific deterrent, criminogenic, or null effect? Unfortunately, despite two decades of research and the meta-analytic techniques employed in this study, a definitive answer to this question remains unclear. Nevertheless, when the results of this meta-analysis are considered along with findings from other relevant research conducted during the past 20 years, it seems clear that the practice of treating juveniles as adults should be limited to the most serious, violent, and chronic offenders, who …


Assessing The Relevance Of Statistics And Crime Analysis Courses For Working Crime Analysts, Jonathan A. Kringen, Christopher M. Sedelmaier, Elink-Schuurman-Laura Jun 2016

Assessing The Relevance Of Statistics And Crime Analysis Courses For Working Crime Analysts, Jonathan A. Kringen, Christopher M. Sedelmaier, Elink-Schuurman-Laura

Criminal Justice Faculty Publications

Crime analysts study criminal activity and police function to improve performance. Analysts inform operations, aid resource allocation, and evaluate programs. These tasks require high levels of statistical literacy. Given that most analysts are college-educated civilians, college coursework in statistics and/or crime analysis may represent the foundational knowledgebase within the profession. However, little research has attempted to determine if coursework teaches the skills needed by analysts. Underlying this issue is a limited understanding about what technical skills crime analysts regularly use. Analyzing parallel surveys of 98 criminal justice educators and 146 crime analysts, this study compares the skills taught in undergraduate-level …


Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili Jun 2016

Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Android malware is a well-known challenging problem and many researchers/vendors/practitioners have tried to address this issue through application analysis techniques. In order to analyze Android applications, tools decompress APK files and extract relevant data from the Dalvik EXecutable (DEX) files. To acquire the data, investigators either use decompiled intermediate code generated by existing tools, e.g., Baksmali or Dex2jar or write their own parsers/dissemblers. Thus, they either need additional time because of decompiling the application into an intermediate representation and then parsing text files, or they reinvent the wheel by implementing their own parsers. In this article, we present Rapid Android …


A Cyber Forensics Needs Analysis Survey: Revisiting The Domain's Needs A Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, Andrew Marrington Mar 2016

A Cyber Forensics Needs Analysis Survey: Revisiting The Domain's Needs A Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, Andrew Marrington

Electrical & Computer Engineering and Computer Science Faculty Publications

The number of successful cyber attacks continues to increase, threatening financial and personal security worldwide. Cyber/digital forensics is undergoing a paradigm shift in which evidence is frequently massive in size, demands live acquisition, and may be insufficient to convict a criminal residing in another legal jurisdiction. This paper presents the findings of the first broad needs analysis survey in cyber forensics in nearly a decade, aimed at obtaining an updated consensus of professional attitudes in order to optimize resource allocation and to prioritize problems and possible solutions more efficiently. Results from the 99 respondents gave compelling testimony that the following …


A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili Mar 2016

A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The omnipresence of mobile devices (or small scale digital devices - SSDD) and more importantly the utility of their associated applications for our daily activities, which range from financial transactions to learning, and from entertainment to distributed social presence, create an abundance of digital evidence for each individual. Some of the evidence may be a result of illegal activities that need to be identified, understood and eventually prevented in the future. There are numerous tools for acquiring and analyzing digital evidence extracted from mobile devices. The diversity of SSDDs, types of evidence generated and the number of tools used to …


The Cost Of War: Weighing Civilian Losses In The Afghan War, Jibey Asthappan Mar 2016

The Cost Of War: Weighing Civilian Losses In The Afghan War, Jibey Asthappan

Criminal Justice Faculty Publications

Spending almost US $700 billion to combat insurgents in Afghanistan, the U.S. population should be hopeful that they “bought” something of value as the Afghan War concludes. This exploratory study focuses on evaluating operations within Afghanistan by accounting for enemy and civilian losses. Integration of civilian losses offers an opportunity to evaluate operations that represent societal losses to the Afghan people. Regression estimates using zero-inflated negative-binomial models indicate that military operations resulted in more civilian casualties than enemy losses.


Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili Jan 2016

Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …


Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee Jan 2016

Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee

Electrical & Computer Engineering and Computer Science Faculty Publications

Over the past few years, the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested, and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a file) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper, we show that by using simple pre-processing, we significantly can influence the outcome. Although our test set …


Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger Jan 2016

Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a signi_cant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Jan 2016

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


The Dark Figure Of Online Property Crime: Is Cyberspace Hiding A Crime Wave?, Maria Tcherni-Buzzeo, Andrew Davis, Giza Lopes, Alan Lizotte Jan 2016

The Dark Figure Of Online Property Crime: Is Cyberspace Hiding A Crime Wave?, Maria Tcherni-Buzzeo, Andrew Davis, Giza Lopes, Alan Lizotte

Criminal Justice Faculty Publications

A pronounced drop in crime, since the early 1990s, has encompassed every crime category tracked by the FBI’s Uniform Crime Reports, including property crime. However, over the same period, the rates of online property crime (OPC) have been on the rise according to available evidence. We delineate the extent of our knowledge and data concerning cybercrime and identity theft and, using data from several nationally representative victimization surveys, offer an alternative view of property crime trends while pointing out the glaring gap in crime reporting and accounting in relation to the growing category of property crimes perpetrated online. In addition, …


Transnational Criminal Organizations (Tcos): The Case Of Combating Criminal Biker Gangs, Petter Gottschalk, Vesna Markovic Jan 2016

Transnational Criminal Organizations (Tcos): The Case Of Combating Criminal Biker Gangs, Petter Gottschalk, Vesna Markovic

Criminal Justice Faculty Publications

Transnational crime organizations (TCOs) represent a challenge to societies all over the world. This article explores combating criminal biker gangs, where stakeholders in the community and governments vary in their responses. These stakeholders include the government, law enforcers, courts, and the communities. The variation in responses is conceptualized in terms of a four stage of growth model. This model includes criminal biker gang members being treated as movie stars, individual criminals, organized criminals, and finally, enemies of the state. A stage model is a theoretical approach to understanding different levels of maturity in combating criminal biker gangs. Due to the …


Species Identification Of Golden And Bald Eagle Talons Using Morphometrics, Avery J. Appleton, R. Christopher O'Brien, Pepper W. Trail Jan 2016

Species Identification Of Golden And Bald Eagle Talons Using Morphometrics, Avery J. Appleton, R. Christopher O'Brien, Pepper W. Trail

Forensic Science Publications

The Golden Eagle (Aquila chrysaetos) and Bald Eagle (Haliaeetus leucocephalus) are the largest avian predators in North America, and are thus species of great ecological importance and cultural significance. There is a long history of human use of eagle body parts, and this use continues today: Bald and Golden eagles are among the North American birds most affected by the illegal wildlife trade. Detached eagle talons are often recovered in both law enforcement and archaeological contexts, but data to allow morphological identification of these talons have been lacking. This study documents measureable differences in the morphology of Bald Eagle and …


Screening Of Exosomal Micrornas From Colorectal Cancer Cells, Cillian Clancy, Sonja Khan, Claire L. Glynn, Emma Holian, Peter Dockery, Pierce Lalor, James A.L. Brown, Myles Joyce, Michael J. Kerin, Roisin M. Dwyer Jan 2016

Screening Of Exosomal Micrornas From Colorectal Cancer Cells, Cillian Clancy, Sonja Khan, Claire L. Glynn, Emma Holian, Peter Dockery, Pierce Lalor, James A.L. Brown, Myles Joyce, Michael J. Kerin, Roisin M. Dwyer

Forensic Science Publications

BACKGROUND: Cells release extracellular membrane vesicles including microvesicles known as exosomes. Exosomes contain microRNAs (miRNAs) however the full range within colorectal cancer cell secreted exosomes is unknown. OBJECTIVE: To identify the full range of exosome encapsulated miRNAs secreted from 2 colorectal cancer cell lines and to investigate engineering of exosomes over-expressing miRNAs. METHODS: Exosomes were isolated from HCT-116 and HT-29 cell lines. RNA was extracted from exosomes and microRNA array performed. Cells were engineered to express miR-379 (HCT-116-379) or a non-targeting control (HCT-116-NTC) and functional effects were determined. Exosomes secreted by engineered cells were transferred to recipient cells and the …


Overcoming Human Trafficking Via Operations Research And Analytics: Opportunities For Methods, Models, And Applications, Renata A. Konrad, Andrew C. Trapp, Timothy Palmbach Jan 2016

Overcoming Human Trafficking Via Operations Research And Analytics: Opportunities For Methods, Models, And Applications, Renata A. Konrad, Andrew C. Trapp, Timothy Palmbach

Forensic Science Publications

Human trafficking is a transnational complex societal and economic issue. While human trafficking has been studied in a variety of contexts, including criminology, sociological, and clinical domains, to date there has been very little coverage in the operations research (OR) and analytics community. This paper highlights how operations research and analytics techniques can be used to address the growing issue of human trafficking. It is intended to give insight to operations research and analytics professionals into the unique concerns, problems, and challenges in human trafficking; the relevance of OR and analytics to key pillars of human trafficking including prevention, protection, …