Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

749 Full-Text Articles 1,021 Authors 81,454 Downloads 49 Institutions

All Articles in Forensic Science and Technology

Faceted Search

749 full-text articles. Page 1 of 30.

Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman 2018 City University of New York (CUNY)

Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman

Student Theses

This thesis will examine the ways in which various cryptocurrencies have impacted certain traditional crimes. While crime is always evolving with technology, cryptocurrencies are a game changer in that they provide anonymous and decentralized payment systems which, while they can be tracked in a reactive sense via the blockchain, are seen by criminals as having better uses for them than traditional fiat currencies, such as the ability to send money relatively fast to another party without going through an intermediary, or the ability to obscure the origin of the money for money laundering purposes. Every week there are new cryptocurrencies ...


Forensic Analysis Of Fiber Dyes Via Surface-Enhanced Raman Spectroscopy, Mircea A. Comanescu 2018 The Graduate Center, City University of New York

Forensic Analysis Of Fiber Dyes Via Surface-Enhanced Raman Spectroscopy, Mircea A. Comanescu

All Dissertations, Theses, and Capstone Projects

Fibers are a common piece of evidence found at crime scenes that may become a link between the scene and a suspect, or allow for the reconstruction of certain crime events. Although a big portion of fibers are still white cottons, the advancement of commercial fiber production and dyeing in the past century led to an increase in types of synthetic fibers and dye applications that can be found and used in forensic analyses. Nonetheless, the fiber evidentiary value is not fully explored, as for the most part, the separation and analysis of the dye on the fiber is not ...


Investigating Physicians Billing For Services Not Rendered: Fraud Detection, Interviewing And Referral To Law Enforcement, Glenn Forte Jr 2018 La Salle University

Investigating Physicians Billing For Services Not Rendered: Fraud Detection, Interviewing And Referral To Law Enforcement, Glenn Forte Jr

Economic Crime Forensics Capstones

This qualitative study examines the role of healthcare insurance investigators related to medical fraud among physicians billing for services not rendered. Grounded in academic scholarship, industry case studies and first-hand knowledge, this study introduces methods identifying fraudulent activities, fraud detection practices and implications from discovering fraud among physicians, patients, and health insurance companies. The three types of methodologies employed provide a lens into determining misappropriation of healthcare insurance and patient monetary funds.

Healthcare fraud falls within the arena of white-collar crime. It consists of filing dishonest healthcare claims to receive a profit. Fraudulent healthcare schemes come in many forms. The ...


Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger 2018 University of New Haven

Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyber forensics has encountered major obstacles over the last decade and is at a crossroads. This paper presents data that was obtained during the National Workshop on Redefining Cyber Forensics (NWRCF) on May 23-24, 2017 supported by the National Science Foundation and organized by the University of New Haven. Qualitative and quantitative data were analyzed from twenty-four cyber forensics expert panel members. This work identified important themes that need to be addressed by the community, focusing on (1) where the domain currently is; (2) where it needs to go and; (3) steps needed to improve it. Furthermore, based on the ...


I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili 2018 Florida State University

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest ...


Understanding The Sexual Assault Kit Backlog In Pennsylvania, Kallie Crawford, Lyndsie Ferrara 2018 Duquesne University

Understanding The Sexual Assault Kit Backlog In Pennsylvania, Kallie Crawford, Lyndsie Ferrara

Graduate Student Research Symposium

According to the FBI, to date, there are more than 400,000 untested sexual assault kits nationwide. While this is a huge issue that cannot be solved overnight, continual improvements and changes are needed to reduce and hopefully eliminate the backlog.

This research examines work going on nationwide and aims to better understand the backlog issues specifically in Pennsylvania. Furthermore, the research examines a program utilized by the law enforcement community that garnered necessary resources. First, a comprehensive review of improved practices in proactive jurisdictions of Ohio, Houston, Texas, and Detroit, Michigan was conducted to identify general policies and procedures ...


Open-Source Tools For Dense Facial Tissue Depth Mapping (Ftdm) Of Computed Tomography Models, Terrie Simmons-Ehrhardt, Catyana Falsetti, Anthony B. Falsetti, Christopher J. Ehrhardt 2018 School of World Studies, Virginia Commonwealth University

Open-Source Tools For Dense Facial Tissue Depth Mapping (Ftdm) Of Computed Tomography Models, Terrie Simmons-Ehrhardt, Catyana Falsetti, Anthony B. Falsetti, Christopher J. Ehrhardt

Human Biology Open Access Pre-Prints

Computed tomography (CT) scans provide anthropologists with a resource to generate three- dimensional (3D) digital skeletal material to expand quantification methods and build more standardized reference collections. The ability to visualize and manipulate the bone and skin of the face simultaneously in a 3D digital environment introduces a new way for forensic facial approximation practitioners to access and study the face. Craniofacial relationships can be quantified with landmarks or with surface processing software that can quantify the geometric properties of the entire 3D facial surface. This paper describes tools for the generation of dense facial tissue depth maps (FTDMs) using ...


Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky 2018 Australian National University

Welcoming Remarks From The Ijcic Honorary Editor, Peter Grabosky

International Journal of Cybersecurity Intelligence & Cybercrime

No abstract provided.


Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi 2018 National Institute of Criminology Hungary

Architecture Of Aggression In Cyberspace. Testing Cyber Aggression In Young Adults In Hungary, Katalin Parti, Tibor Kiss, Gergely Koplányi

International Journal of Cybersecurity Intelligence & Cybercrime

In order to test whether and how violence is exacerbated in online social networking sites, we utilized the BryantSmith Aggression Scale (Bryant & Smith, 2001), and included examples in the questionnaire offering solutions for 7 different hypothetical cases occurring online (Kiss, 2017). The questionnaire was sent to social work and law school students in Hungary. Prevalence and levels of aggression and its manifestation as violence online proved to be not more severe than in offline social relations. Law students were more aware than students of social work that online hostile acts are discrediting. Students of social work were significantly more prone ...


An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever 2018 New Mexico State University

An Argument For Interdisciplinary Programs In Cybersecurity, Dennis Giever

International Journal of Cybersecurity Intelligence & Cybercrime

In this commentary Dr. Giever presents a compelling argument for interdisciplinary programs in cybersecurity at the university level. He argues that we no longer have the luxury of allowing barriers to exist between those tasked with IT security and those who provide physical security. He recommends that any security program take an “all possible paths” or “balanced approach” to the protection of assets within an organization. Students in computer science, criminal justice, business, human resources, and others should work collaboratively within education programs learning these necessary skills. A team effort is needed to accomplish the myriad of tasks necessary to ...


Environmental Factors Affecting Rapid Shear In Fibers From The Passage Of A Bullet, Laura Molina 2018 CUNY John Jay College

Environmental Factors Affecting Rapid Shear In Fibers From The Passage Of A Bullet, Laura Molina

Student Theses

Evaluation of fabric defects may provide insight on the specific cause of fiber fracture. In forensic casework, fabric defects may provide a determination of previous occurrences connected to a case. Different methods of fabric breakage impart differing physical characteristics on individual fibers. These alterations to otherwise highly ordered fibers are determined by a multitude of factors, among them temperature. The process of rapid shear occurs in thermoplastic materials following high-speed impact. It results in distinct features caused by excessive heat generated through the interaction which is unable to dissipate at a rate that would leave the fibers unchanged. Rapid shear ...


The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-shick Choi, Claire Seungeun Lee 2018 Bridgewater State University

The Present And Future Of Cybercrime, Cyberterrorism, And Cybersecurity, Kyung-Shick Choi, Claire Seungeun Lee

International Journal of Cybersecurity Intelligence & Cybercrime

Cybercriminology combines knowledge from criminology, psychology, sociology, computer science, and cybersecurity to provide an in-depth understanding of cybercrime. Cybercrime and cybersecurity are interconnected across many places, platforms, and actors. Cybercrime issues are continuously and expeditiously changing and developing, especially with the advent of new technologies. The International Journal of Cybersecurity Intelligence and Cybercrime (IJCIC) aims to contribute to the growing field of cybercriminology and cybersecurity. The IJCIC is eager to work with scholars, policy analysts, practitioners, and others to enhance theory, methods, and practice within cybercrime and cybersecurity at the regional, national, and international levels.


Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger 2018 University of New Haven

Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics ...


Luminescence: Lighting The Invisible World Of Crime Scenes, Jessica Alexander 2018 Western Oregon University

Luminescence: Lighting The Invisible World Of Crime Scenes, Jessica Alexander

Academic Excellence Showcase Proceedings

No abstract provided.


A Novel On‐Chip Method For Differential Extraction Of Sperm In Forensic Cases, Fatih Inci, Mehmet O. Ozen, Yeseren Saylan, Morteza Miansari, Duygu Cimen, Raghu Dhara, Thiruppathiraja Chinnasamy, Mehmet Yuksekkaya, Chiara Filippini, Deepan Kishore Kumar, Semih Calamak, Yusuf Yesil, Naside Gozde Durmus, George Duncan, Leonard Klevan, Utkan Demirci 2018 Stanford University

A Novel On‐Chip Method For Differential Extraction Of Sperm In Forensic Cases, Fatih Inci, Mehmet O. Ozen, Yeseren Saylan, Morteza Miansari, Duygu Cimen, Raghu Dhara, Thiruppathiraja Chinnasamy, Mehmet Yuksekkaya, Chiara Filippini, Deepan Kishore Kumar, Semih Calamak, Yusuf Yesil, Naside Gozde Durmus, George Duncan, Leonard Klevan, Utkan Demirci

Biology Faculty Articles

One out of every six American women has been the victim of a sexual assault in their lifetime. However, the DNA casework backlog continues to increase outpacing the nation's capacity since DNA evidence processing in sexual assault casework remains a bottleneck due to laborious and time‐consuming differential extraction of victim's and perpetrator's cells. Additionally, a significant amount (60–90%) of male DNA evidence may be lost with existing procedures. Here, a microfluidic method is developed that selectively captures sperm using a unique oligosaccharide sequence (Sialyl‐LewisX), a major carbohydrate ligand for sperm‐egg binding. This method ...


A 3d Characteristics Database Of Land Engraved Areas With Known Subclass, EnTni Lin 2018 City University of New York (CUNY)

A 3d Characteristics Database Of Land Engraved Areas With Known Subclass, Entni Lin

Student Theses

Subclass characteristics on bullets may mislead firearm examiners when they rely on traditional 2D images. In order to provide indelible examples for training and help avoid identification errors, 3D topography surface maps and statistical methods of pattern recognition are applied to toolmarks on bullets containing known subclass characteristics. This research was conducted by collecting 3D topography surface map data from land engraved areas of bullets fired through known barrels. This data was processed and used to train the statistical algorithms to predict their origin. The results from the algorithm are compared with the “right answers” (i.e. correct IDs) of ...


Identification Of Animal Species By Utilization Of Processed Remains, Melissa I. Gaud 2018 CUNY John Jay College

Identification Of Animal Species By Utilization Of Processed Remains, Melissa I. Gaud

Student Theses

An enzymatic method to process decomposed non-human bone for forensic DNA analysis is presented. Red snapper species is identified by sequencing of the COI gene.

Forensic analysis of DNA from non-human bones can be important in investigating a variety of forensic cases. However, decomposed bone is difficult to process for isolating DNA. In this study, a previously established enzymatic method was utilized to process bone samples that simulate decomposed specimens. Our results demonstrated that this enzymatic processing method is effective for removing decomposed soft tissues and outer surface materials such as mineralized bone connective tissue of bone fragment samples. Our ...


Zolpidem Facilitated Sexual Assaults: A Hair Method Validation, Danielle N. Chasworth 2018 CUNY John Jay College

Zolpidem Facilitated Sexual Assaults: A Hair Method Validation, Danielle N. Chasworth

Student Theses

A liquid chromatography tandem mass spectrometry (LC-MSMS) method was developed and validated to detect for the presence of zolpidem in human hair samples. Zolpidem is a sedative hypnotic whose adverse effects make it a common drug found in drug facilitated crimes (DFC). It is important to be able to detect and quantitate the drug after a long period of time due to the victim’s delayed reporting of the crime. Hair’s long window of detection makes it a useful matrix for DFC investigations. The linear range of the assay was targeted at 2 pg/mg to 1,000 pg ...


Δ-9-Thc Effect On The Dopamine Transporter, Brooke E. Nielsen 2018 CUNY John Jay College

Δ-9-Thc Effect On The Dopamine Transporter, Brooke E. Nielsen

Student Theses

Understanding the mechanism behind drugs of abuse is one of the key elements to understanding why addiction is so prevalent in society. The goal of this research was to determine the effect that a popular cannabinoid, Δ -9-tetrahydrocannabinol has on the regulation of dopamine neurotransmitter in the synapses. It was hypothesized that the addictive high users experience from using Δ-9-THC had a direct effect on lowering the dopamine transporter protein on cell surface causing a buildup of dopamine in the synapse. The results of the study show that the higher concentration of Δ-9-THC that the cells were exposed to caused ...


The Y-Screen Assay: Validation And Evaluation Of Subsequent Str Success, Kassandra Luyando 2018 CUNY John Jay College

The Y-Screen Assay: Validation And Evaluation Of Subsequent Str Success, Kassandra Luyando

Student Theses

There are hundreds of untested sexual assault kits in police custody. As of 2017, New York State passed a law stating that all untested kits must be turned over to forensic laboratories to be tested, causing backlogs at laboratories to increase. The Y-Screen assay is a DNA extraction protocol which utilizes NaOH to rapidly lyse epithelial and sperm cells, and the Quantifiler Trio DNA quantification kit to detect the presence or absence of male DNA prior to standard sample processing. The Y-Screen assay is a commercial product used in this research to test a defined set of validation samples with ...


Digital Commons powered by bepress