Open Access. Powered by Scholars. Published by Universities.®

Legal Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

15,504 Full-Text Articles 11,761 Authors 21,968,315 Downloads 297 Institutions

All Articles in Legal Studies

Faceted Search

15,504 full-text articles. Page 161 of 333.

Correspondence: Between Dwc Task Forces And Committees. 1990-1999, American Society of Criminology. Division on Women and Crime, Evelyn Gilbert, Susan T. Krumholz, Chris Rasche, Susan L. Millar 2017 University of North Florida

Correspondence: Between Dwc Task Forces And Committees. 1990-1999, American Society Of Criminology. Division On Women And Crime, Evelyn Gilbert, Susan T. Krumholz, Chris Rasche, Susan L. Millar

Division on Women and Crime Documents and Correspondence

Primarily incoming and outgoing letters regarding individual committee activities, nominations for awards and elections, and membership issues.


Correspondence: Dwc Nominations And Elections, 1991-94., American Society of Criminology. Division on Women and Crime, Lynne Goodstein, Jane Foraker-Thompson, Meda Chesney-Lind, Margaret Farnworth, Sally Simpson, Elizabeth Stanko 2017 University of North Florida

Correspondence: Dwc Nominations And Elections, 1991-94., American Society Of Criminology. Division On Women And Crime, Lynne Goodstein, Jane Foraker-Thompson, Meda Chesney-Lind, Margaret Farnworth, Sally Simpson, Elizabeth Stanko

Division on Women and Crime Documents and Correspondence

Primarily incoming and outgoing letters regarding individual committee activities, nominations for awards and elections, and membership issues.


Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland 2017 Norwegian Police

Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland

Annual ADFSL Conference on Digital Forensics, Security and Law

Investigations of crimes against children are often complex, both in terms of the varied and large amount of digital technology encountered and the offensive nature of the crimes. Such cases are numerous, large, and prioritised, requiring digital forensics competence. Earlier digital forensics was considered and treated as a typical forensic science like fingerprint analysis, performed in a laboratory isolated from the investigative team. This decoupled way of working has proved to be both inefficient and error prone.

At the Digital Forensic Unit of Oslo Police District we have developed a new way of working that addresses many of the problems …


Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell 2017 University of Illinois at Urbana-Champaign

Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell

Annual ADFSL Conference on Digital Forensics, Security and Law

The analysis phase of the digital forensic process is the most complex. The analysis phase remains very subjective to the views of the forensic practitioner. There are many tools dedicated to assisting the investigator during the analysis process. However, they do not address the challenges. Digital forensics is in need of a consistent approach to procure the most judicious conclusions from the digital evidence. The objective of this paper is to discuss the ability of graph theory, a study of related mathematical structures, to aid in the analysis phase of the digital forensic process. We develop a graph-based representation of …


Digital Forensics Tool Selection With Multi-Armed Bandit Problem, Umit Karabiyik, Tugba Karabiyik 2017 Sam Houston State University

Digital Forensics Tool Selection With Multi-Armed Bandit Problem, Umit Karabiyik, Tugba Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics investigation is a long and tedious process for an investigator in general. There are many tools that investigators must consider, both proprietary and open source. Forensics investigators must choose the best tool available on the market for their cases to make sure they do not overlook any evidence resides in suspect device within a reasonable time frame. This is however hard decision to make, since learning and testing all available tools make their job only harder. In this project, we define the digital forensics tool selection for a specific investigative task as a multi-armed bandit problem assuming that …


Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio 2017 University of Louisville

Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio

Annual ADFSL Conference on Digital Forensics, Security and Law

Forensic practice is an inherently human-mediated system, from processing and collection of evidence to presentation and judgment. This requires attention to human factors and risks which can lead to incorrect judgments and unjust punishments.

For digital forensics, such challenges are magnified by the relative newness of the discipline and the use of electronic evidence in forensic proceedings. Traditional legal protections, rules of procedure and ethics rules mitigate these challenges. Application of those traditions better ensures forensic findings are reliable. This has significant consequences where findings may impact a person's liberty or property, a person's life or even the political direction …


Detecting Deception In Asynchronous Text, Fletcher Glancy 2017 Oklahoma State University - Main Campus

Detecting Deception In Asynchronous Text, Fletcher Glancy

Annual ADFSL Conference on Digital Forensics, Security and Law

Glancy and Yadav (2010) developed a computational fraud detection model (CFDM) that successfully detected financial reporting fraud in the text of the management’s discussion and analysis (MDA) portion of annual filings with the United States Securities and Exchange Commission (SEC). This work extends the use of the CFDM to additional genres, demonstrates the generalizability of the CFDM and the use of text mining for quantitatively detecting deception in asynchronous text. It also demonstrates that writers committing fraud use words differently from truth tellers.


Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe 2017 George Mason University

Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital content created by picture recording devices is often stored internally on the source device, on either embedded or removable media. Such storage media is typically limited in capacity and meant primarily for interim storage of the most recent image files, and these devices are frequently configured to delete older files as necessary to make room for new files. When investigations involve such devices and media, it is sometimes these older deleted files that would be of interest. It is an established fact that deleted file content may persist in part or in its entirety after deletion, and identifying the …


Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089 2017 Purdue University

Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089

Annual ADFSL Conference on Digital Forensics, Security and Law

Academics, government officials, and practitioners suggest the field of digital forensics is in need of a professional code of ethics. In response to this need, the authors developed and proposed a professional code of ethics in digital forensics. The current paper will discuss the process of developing the professional code of ethics, which included four sets of revisions based on feedback and suggestions provided by members of the digital forensic community. The final version of the Professional Code of Ethics in Digital Forensics includes eight statements, and we hope this is a step toward unifying the field of digital forensics …


Rape Culture, Victim Blaming, And The Role Of Media In The Criminal Justice System, Lily K. Thacker 2017 Eastern Kentucky University

Rape Culture, Victim Blaming, And The Role Of Media In The Criminal Justice System, Lily K. Thacker

Kentucky Journal of Undergraduate Scholarship

Rape culture and the practice of victim blaming are inherently linked phenomena, and both are prevalent in American society. The existence of a rape culture which normalizes sexual violence and blames rape victims for the attacks against them strongly affects the American criminal justice system, influencing both the outcomes of rape trials and the treatment of rape victims. In particular, the media’s methods of discussing and portraying rape are examined as primary sources for the perpetuation of rape culture, and the effects of these media representations of rape on the outcomes of real rape trials are also examined. The problematic …


Fast Filtering Of Known Png Files Using Early File Features, Sean McKeown, Gordon Russell, Petra Leimich 2017 Napier University

Fast Filtering Of Known Png Files Using Early File Features, Sean Mckeown, Gordon Russell, Petra Leimich

Annual ADFSL Conference on Digital Forensics, Security and Law

A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algorithms such as SHA256, for each image on a given media, comparing individual digests with a database of known contraband. However, the large capacities of modern storage media, and increased time pressure on forensics examiners, necessitates that more efficient processing mechanisms be developed. This work describes a technique for creating signatures for images of the PNG format which only requires a tiny fraction of the file to effectively distinguish between a large number of images. Highly …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou 2017 Stockholm University

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


Detect Kernel-Mode Rootkits Via Real Time Logging & Controlling Memory Access, Satoshi Tanda, Irvin Homem, Igor Korkin 2017 Stockholm University

Detect Kernel-Mode Rootkits Via Real Time Logging & Controlling Memory Access, Satoshi Tanda, Irvin Homem, Igor Korkin

Annual ADFSL Conference on Digital Forensics, Security and Law

Modern malware and spyware platforms attack existing antivirus solutions and even Microsoft PatchGuard. To protect users and business systems new technologies developed by Intel and AMD CPUs may be applied. To deal with the new malware we propose monitoring and controlling access to the memory in real time using Intel VT-x with EPT. We have checked this concept by developing MemoryMonRWX, which is a bare-metal hypervisor. MemoryMonRWX is able to track and trap all types of memory access: read, write, and execute. MemoryMonRWX also has the following competitive advantages: fine-grained analysis, support of multi-core CPUs and 64-bit Windows 10. MemoryMonRWX …


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora 2017 University of Alabama, Birmingham

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner 2017 University of Alabama, Birmingham

Kelihos Botnet: A Never-Ending Saga, Arsh Arora, Max Gannon, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates the recent behavior of the Kelihos botnet, a spam-sending botnet that accounts for many millions of emails sent each day. The paper demonstrates how a team of students are able to perform a longitudinal malware study, making significant observations and contributions to the understanding of a major botnet using tools and techniques taught in the classroom. From this perspective the paper has two objectives: encouragement and observation. First, by providing insight into the methodology and tools used by student researchers to document and understand a botnet, the paper strives to embolden other academic programs to follow a …


Body-Worn Cameras: Reducing Citizen Complaints And Improving Relationships, Julie Bui 2017 San Jose State University

Body-Worn Cameras: Reducing Citizen Complaints And Improving Relationships, Julie Bui

Themis: Research Journal of Justice Studies and Forensic Science

Video recordings of police-citizen interactions, most notably those obtained from the dashboard cameras (dashcams) of police cars, have been successful in objectively capturing police-citizen exchanges. However, since police-civilian interactions do not solely occur in front of police cars, dashcams present significant limitations. Off-camera violent, and sometimes fatal, encounters (such as the notorious Ferguson case) have fueled increased public support for body-worn cameras. This is especially true in cases with conflicting accounts from the officer(s), victim(s), and witness(es). Requiring officers to wear bodycams may reduce incidents of force and citizen complaints, and increase officer accountability. This paper will present peer-reviewed research …


Solitary Confinement: Social Death And Its Afterlives, Jen Rushforth 2017 San Jose State University

Solitary Confinement: Social Death And Its Afterlives, Jen Rushforth

Themis: Research Journal of Justice Studies and Forensic Science

No abstract provided.


How Japan’S Cultural Norms Affect Policing: A Side-By-Side Comparison With The United States, Katrina Tran 2017 San Jose State University

How Japan’S Cultural Norms Affect Policing: A Side-By-Side Comparison With The United States, Katrina Tran

Themis: Research Journal of Justice Studies and Forensic Science

The ways of policing have been critiqued throughout the years—some have advocated for a direct approach while others value diplomatic techniques. Consideration is emphasized by how culture affects policing in the United States and Japan. In the United States, the customs of policing involve violence, individualism, pragmatism, social mobility, and low power distance, whereas Japan encourages non-violence, face-saving, conservatism, and high power distance. The difference in these cultural norms reflects how policing is conducted in these two countries. To understand how policing in these two countries are different, this paper examines the difference of cultural norms and its impact on …


Minimum Education Requirements For Crime Scene Investigators, Araseli Saldivar 2017 San Jose State University

Minimum Education Requirements For Crime Scene Investigators, Araseli Saldivar

Themis: Research Journal of Justice Studies and Forensic Science

The initial crime scene investigation is critical since it is the primary step in the investigative process; therefore, individuals assigned to process a scene should be highly educated. Improperly educated (or uneducated) crime scene investigators (CSIs) can mishandle evidence during an investigation, affecting the outcome of cases. The minimum education requirement for CSIs should transition from a high school diploma—the current requirement—toward a bachelor’s degree. The importance of acquiring a college-level education is observed in a study conducted on crime scene examiners in Australia. To determine the educational requirement for CSIs in the United States, information was gathered electronically from …


Optimizing Collection Of Trace Biological Samples From Vehicle Headrests, Kevin Tang, Jesse Ramirez, John Bond, Jocelyn Weart, Yvette DeLaTorre, Ian Fitch, Steven Lee 2017 San Jose State University

Optimizing Collection Of Trace Biological Samples From Vehicle Headrests, Kevin Tang, Jesse Ramirez, John Bond, Jocelyn Weart, Yvette Delatorre, Ian Fitch, Steven Lee

Themis: Research Journal of Justice Studies and Forensic Science

Tape-lifting and swabbing are two methods commonly used for collecting biological samples in the United Kingdom and United States to investigate vehicle crimes. Determining the optimal collection method may lead to an increase in generating DNA profiles and crime-solving. The objective of this study is to evaluate the efficiency of adhesive tape and the double-swab collection methods for investigating vehicle crimes with possible touch DNA samples. Two experiments were conducted to evaluate the use of tape-lifts and swabs on spiked common vehicle fabric materials. The efficiency of recovery between the two collection methods was performed using qPCR. The results from …


Digital Commons powered by bepress