Open Access. Powered by Scholars. Published by Universities.®

Forensic Science and Technology Commons

Open Access. Powered by Scholars. Published by Universities.®

219 Full-Text Articles 387 Authors 21843 Downloads 32 Institutions

All Articles in Forensic Science and Technology

Faceted Search

219 full-text articles. Page 1 of 10.

Science 108-001 Essentials Of Forensic Science Fall 2015, Christina Beatty 2017 Parkland College

Science 108-001 Essentials Of Forensic Science Fall 2015, Christina Beatty

Christina Beatty

No abstract provided.


Innovative Silver-Based Catalyst For Oxidation Of Methane To Methanol, Ashley Gordon 2017 Long Island University

Innovative Silver-Based Catalyst For Oxidation Of Methane To Methanol, Ashley Gordon

Post & Beyond

Methane is a main component of many natural gas reserves. It is fundamental for an effective method to be developed for inexpensive and abundant methane to be converted to value added chemicals, such as methanol, formaldehyde, acetic acid, carbon monoxide, and fuel. The primary goal of this research is for the development of an innovative silver-based catalyst for effective conversion of methane to methanol. The Ag-based solution we developed can be tuned to be either acidic or basic to adapt to different catalyst support. The solution was characterized by Ultraviolet-visible spectroscopy and the Ag adsorption was determined. The heterogeneous catalyst ...


Development Of A Novel Cu-Zn Based Heterogeneous Catalyst For Direct Methane Conversion, Wan Yee Lam 2017 Long Island University

Development Of A Novel Cu-Zn Based Heterogeneous Catalyst For Direct Methane Conversion, Wan Yee Lam

Post & Beyond

Many researchers are working on an efficient method to convert methane into methanol because the main cause of global warming is due to the burning of petroleum, which emits greenhouse gases. The extraction of crude oil would pollute our environment. The present method of methanol production is inefficient and generally yields less than 5%. Moreover, the traditional two-step process is very expensive and energy intensive. Therefore, the primary objective of my research is to develop a novel Cu-Zn based heterogeneous catalyst to enhance the catalytic conversion of methane for the synthesis of value added chemical such as methanol. The Cu-Zn-based ...


Neuroscience Evidence In Forensic Contexts: Ethical Concerns, Stephen J. Morse 2017 University of Pennsylvania Law School

Neuroscience Evidence In Forensic Contexts: Ethical Concerns, Stephen J. Morse

Faculty Scholarship

This is a chapter in a volume, Ethics Dilemmas in Forensic Psychiatry and Psychology Practice, edited by Ezra E. H. Griffith, M.D. and to be published by Columbia University Press. The chapter addresses whether the use of new neuroscience techniques, especially non-invasive functional magnetic resonance imaging (fMRI) and the data from studies employing them raise new ethical issues for forensic psychiatrists and psychologists. The implicit thesis throughout is that if the legal questions, the limits of the new techniques and the relevance of neuroscience to law are properly understood, no new ethical issues are raised. A major ethical lapse ...


Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou 2016 Washington University in St. Louis

Indoor Scene Localization To Fight Sex Trafficking In Hotels, Abigail Stylianou

Engineering and Applied Science Theses & Dissertations

Images are key to fighting sex trafficking. They are: (a) used to advertise for sex services,(b) shared among criminal networks, and (c) connect a person in an image to the place where the image was taken. This work explores the ability to link images to indoor places in order to support the investigation and prosecution of sex trafficking. We propose and develop a framework that includes a database of open-source information available on the Internet, a crowd-sourcing approach to gathering additional images, and explore a variety of matching approaches based both on hand-tuned features such as SIFT and learned ...


In Support Of Huber, Jon F. Merz 2016 University of New Hampshire

In Support Of Huber, Jon F. Merz

RISK: Health, Safety & Environment

The author takes exception to two recent reviews of GALILEO'S REVENGE.


Collecting Quality Infrared Spectra From Microscopic Samples Of Suspicious Powders In A Sealed Cell, Brooke Weinger Kammrath, Pauline E. Leary, John A. Reffner 2016 University of New Haven

Collecting Quality Infrared Spectra From Microscopic Samples Of Suspicious Powders In A Sealed Cell, Brooke Weinger Kammrath, Pauline E. Leary, John A. Reffner

Forensic Science Publications

The infrared (IR) microspectroscopical analysis of samples within a sealed-cell containing barium fluoride is a critical need when identifying toxic agents or suspicious powders of unidentified composition. The dispersive nature of barium fluoride is well understood and experimental conditions can be easily adjusted during reflection–absorption measurements to account for differences in focus between the visible and IR regions of the spectrum. In most instances, the ability to collect a viable spectrum is possible when using the sealed cell regardless of whether visible or IR focus is optimized. However, when IR focus is optimized, it is possible to collect useful ...


Science Maps Of Global And Indian Wildlife Forensics: A Comparative Analysis, John Jeyasekar Jesubright, Saravanan P 2016 Forensic Sciences Department, Chennai, India

Science Maps Of Global And Indian Wildlife Forensics: A Comparative Analysis, John Jeyasekar Jesubright, Saravanan P

Library Philosophy and Practice (e-journal)

Science map is a useful tool to understand the structure of a discipline, research networks and collaborations. Wildlife forensics is an emerging field of Forensic Sciences, where science is applied to legal cases involving wildlife. This study is aimed at creating science maps of Wildlife Forensics, both at global level and regional (i.e. India) level using PubMed database. A total of 303 records pertaining to global and 29 records pertaining to India published between 2001 and 2015 are obtained from the PubMed. These bibliometric data are analysed and maps are constructed using MS-Excel spreadsheets, VOSviewer and Pajek software. The ...


Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger 2016 University of New Haven

Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital forensic community. Thus, new research initiatives and strategies must be formulated to address this growing problem. In this work we first collect and categorize 308 antidigital forensic tools to survey the field. We then devise an extended anti-forensic taxonomy to the one proposed by Rogers (2006) in order to create a more comprehensive taxonomy and facilitate linguistic standardization. Our work also takes into consideration anti-forensic activity which utilizes tools that were not originally designed for antiforensic purposes, but can still be used with malicious intent. This category ...


Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger 2016 University of New Haven

Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The term “artifact” currently does not have a formal definition within the domain of cyber/ digital forensics, resulting in a lack of standardized reporting, linguistic understanding between professionals, and efficiency. In this paper we propose a new definition based on a survey we conducted, literature usage, prior definitions of the word itself, and similarities with archival science. This definition includes required fields that all artifacts must have and encompasses the notion of curation. Thus, we propose using a new term e curated forensic artifact (CuFA) e to address items which have been cleared for entry into a CuFA database (one ...


Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger 2016 University of New Haven

Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process.We used the TD3, a popular, validated, touch screen disk duplicator and hardware ...


Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili 2016 Jilin University

Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Android malware is a well-known challenging problem and many researchers/vendors/practitioners have tried to address this issue through application analysis techniques. In order to analyze Android applications, tools decompress APK files and extract relevant data from the Dalvik EXecutable (DEX) files. To acquire the data, investigators either use decompiled intermediate code generated by existing tools, e.g., Baksmali or Dex2jar or write their own parsers/dissemblers. Thus, they either need additional time because of decompiling the application into an intermediate representation and then parsing text files, or they reinvent the wheel by implementing their own parsers. In this article ...


Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman 2016 PayPal Inc.

Assessing The Gap: Measure The Impact Of Phishing On An Organization, Brad Wardman

Annual Conference on Digital Forensics, Security and Law

Phishing has become one of the most recognized words associated with cybercrime. As more organizations are being targeted by phishing campaigns, there are more options within the industry to deter such attacks. However, there is little research into how much damage these campaigns are causing organizations. This paper will show how financial organizations can be impacted by phishing and present a method for accurately quantifying resultant monetary losses. The methodology presented in this paper can be adapted to other organizations in order to quantify phishing losses across industries.

Keywords: phishing, cybercrime, economics


Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar AlFandi 2016 Zayed University, College of Technological Innovation

Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi

Annual Conference on Digital Forensics, Security and Law

With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in ...


Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu 2016 REU Student Fellow, Department of Biological Science, Morton College

Wban Security Management In Healthcare Enterprise Environments, Karina Bahena, Manghui Tu

Annual Conference on Digital Forensics, Security and Law

As healthcare data are pushed online, consumers have raised big concerns on the breach of their personal information. Law and regulations have placed businesses and public organizations under obligations to take actions to prevent such data breaches. Various vulnerabilities have been identified in healthcare enterprise environments, in which the Wireless Body Area Networks (WBAN) remains to be a major vulnerability, which can be easily taken advantage of by determined adversaries. Thus, vulnerabilities of WBAN systems and the effective countermeasure mechanisms to secure WBAN are urgently needed. In this research, first, the architecture of WBAN system has been explored, and the ...


Investigating Death Using Insects, Meghan Kendell 2016 Western Oregon University

Investigating Death Using Insects, Meghan Kendell

Academic Excellence Showcase Proceedings

No abstract provided.


Cremations Of Remains, Carmela Macedo, Daisy Romero, Julia Borovskiy 2016 Western Oregon University

Cremations Of Remains, Carmela Macedo, Daisy Romero, Julia Borovskiy

Academic Excellence Showcase Proceedings

After attending this presentation, observers will be presented with the results of a study conducted to better understand the rate of decomposition through cremation by three different and readily available resources (wood, coal, and gasoline). This experiment’s objective is to confirm the results of studies that have already been conducted by other members of the forensic community as well as provide insight into which substances burn at a faster rate. As of now, there is a lot of information about the process in which flesh and bone are cremated, but little information on which substances burn at a faster ...


Identifying Sharp-Force Trauma-Serrated Vs. Non-Serrated Blades, Martha Kools, Taylor Maddox, Carlos Sanchez 2016 Western Oregon University

Identifying Sharp-Force Trauma-Serrated Vs. Non-Serrated Blades, Martha Kools, Taylor Maddox, Carlos Sanchez

Academic Excellence Showcase Proceedings

The purpose of this study is to determine the accuracy of techniques devised to identify characteristics of knives used to inflict damage on bone. According to the FBI’s Unified Crime Report, of the nearly 12,000 people murdered in 2014, over 1,500 were killed by sharp force trauma with cutting instruments. While much research has been dedicated towards understanding the different effects on bone caused by sharp and blunt force trauma, forensic anthropology is only beginning to differentiate between individual weapons. Currently, perimortem trauma associated with knives is understood to present as predominantly clean, linear puncture damage, rarely ...


Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian 2016 Department of Computer Science and Information Systems, Mike Cottrell College of Business

Forensics Analysis Of Privacy Of Portable Web Browsers, Ahmad Ghafarian

Annual Conference on Digital Forensics, Security and Law

Web browser vendors offer a portable web browser option which is considered as one of the features that provides user privacy. Portable web browser is a browser that can be launched from a USB flash drive without the need for its installation on the host machine. Most popular web browsers have portable versions of their browsers as well. Portable web browsing poses a great challenge to computer forensic investigators who try to reconstruct the past browsing history, in case of any computer incidence. This research examines various sources in the host machine such as physical memory, temporary, recent, event files ...


Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky 2016 University of Nebraska at Kearney

Reverse Engineering A Nit That Unmasks Tor Users, Matthew Miller, Joshua Stroschein, Ashley Podhradsky

Annual Conference on Digital Forensics, Security and Law

This paper is a case study of a forensic investigation of a Network Investigative Technique (NIT) used by the FBI to deanonymize users of a The Onion Router (Tor) Hidden Service. The forensic investigators were hired by the defense to determine how the NIT worked. The defendant was ac- cused of using a browser to access illegal information. The authors analyzed the source code, binary files and logs that were used by the NIT. The analysis was used to validate that the NIT collected only necessary and legally authorized information. This paper outlines the publicly available case details, how the ...


Digital Commons powered by bepress