The Non-Management Side Of Academic Administration,
2010
University of Pennsylvania Carey Law School
The Non-Management Side Of Academic Administration, Michael A. Fitts
All Faculty Scholarship
No abstract provided.
A Dean's Perspective On Ed Baker,
2010
University of Pennsylvania Carey Law School
A Dean's Perspective On Ed Baker, Michael A. Fitts
All Faculty Scholarship
No abstract provided.
Quasi-Preemption: Nervous Breakdown In Our Constitutional System,
2010
University of Pennsylvania Carey Law School
Quasi-Preemption: Nervous Breakdown In Our Constitutional System, Geoffrey C. Hazard Jr.
All Faculty Scholarship
No abstract provided.
International Idealism Meets Domestic-Criminal-Procedure Realism,
2010
University of Pennsylvania Carey Law School
International Idealism Meets Domestic-Criminal-Procedure Realism, Stephanos Bibas, William W. Burke-White
All Faculty Scholarship
Though international criminal justice has developed into a flourishing judicial system over the last two decades, scholars have neglected institutional design and procedure questions. International criminal-procedure scholarship has developed in isolation from its domestic counterpart but could learn much realism from it. Given its current focus on atrocities like genocide, international criminal law’s main purpose should be not only to inflict retribution, but also to restore wounded communities by bringing the truth to light. The international justice system needs more ideological balance, more stable career paths, and civil-service expertise. It also needs to draw on the domestic experience of federalism …
The Ongoing Revolution In Punishment Theory: Doing Justice As Controlling Crime,
2010
University of Pennsylvania Carey Law School
The Ongoing Revolution In Punishment Theory: Doing Justice As Controlling Crime, Paul H. Robinson
All Faculty Scholarship
This lecture offers a broad review of current punishment theory debates and the alternative distributive principles for criminal liability and punishment that they suggest. This broader perspective attempts to explain in part the Model Penal Code's recent shift to reliance upon desert and accompanying limitation on the principles of deterrence, incapacitation, and rehabilitation.
Constitutional Constructions And Constitutional Decision Rules: Thoughts On The Carving Of Implementation Space,
2010
University of Pennsylvania Carey Law School
Constitutional Constructions And Constitutional Decision Rules: Thoughts On The Carving Of Implementation Space, Mitchell N. Berman
All Faculty Scholarship
No abstract provided.
Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners,
2010
California State Polytechnic University
Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley
Journal of Digital Forensics, Security and Law
The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …
Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage,
2010
AGH University of Science and Technology
Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz
Journal of Digital Forensics, Security and Law
Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.
Table Of Contents,
2010
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification,
2010
University of South Australia
Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay
Journal of Digital Forensics, Security and Law
The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery,
2010
Tokyo Denki University
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Journal of Digital Forensics, Security and Law
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity,
2010
Edith Cowan University
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Journal of Digital Forensics, Security and Law
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness,
2010
The University of British Columbia
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Journal of Digital Forensics, Security and Law
This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach,
2010
University of South Florida, St. Petersburg
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …
Book Review: Digital Forensic Evidence Examination (2nd Ed.),
2010
Gary Kessler Associates
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Journal of Digital Forensics, Security and Law
On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …
Table Of Contents,
2010
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Reeling In Big Phish With A Deep Md5 Net,
2010
University of Alabama, Birmingham
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …
Trust Account Fraud And Effective Information Security Management,
2010
University of South Australia
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Journal of Digital Forensics, Security and Law
The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …
Forensic Analysis Of The Windows 7 Registry,
2010
Khalifa University of Science, Technology and Research (KUSTAR)
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Journal of Digital Forensics, Security and Law
The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …
Malware Forensics: Discovery Of The Intent Of Deception,
2010
Edith Cowan University
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Journal of Digital Forensics, Security and Law
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …