Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
Articles 1 - 8 of 8
Full-Text Articles in Law
Out Of The Prison And Onto The Streets: The Trafficking Of Incarcerated Women (A Trans-Disciplinary Media Research Project), Mei-Ling Mcnamara
Out Of The Prison And Onto The Streets: The Trafficking Of Incarcerated Women (A Trans-Disciplinary Media Research Project), Mei-Ling Mcnamara
Biennial Conference: The Social Practice of Human Rights
Women are being actively targeted for the sex trafficking trade within US prisons and are recruited by a network of fellow inmates who are given "finders fees" for supplying victims. In prisons from Florida to North Carolina, Ohio to Massachusetts, women are promised housing and food in exchange for work upon release but instead are deceived and prostituted for the human trafficking trade. Some traffickers stalk their victims through public-access profiles from statewide prison websites, then groom them over months through correspondence and phone calls.
Inside the largest women’s prison in the United States, the Florida Lowell Correctional Institution, officers …
Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland
Case Study: A New Method For Investigating Crimes Against Children, Hallstein Asheim Hansen, Stig Andersen, Stefan Axelsson, Svein Hopland
Annual ADFSL Conference on Digital Forensics, Security and Law
Investigations of crimes against children are often complex, both in terms of the varied and large amount of digital technology encountered and the offensive nature of the crimes. Such cases are numerous, large, and prioritised, requiring digital forensics competence. Earlier digital forensics was considered and treated as a typical forensic science like fingerprint analysis, performed in a laboratory isolated from the investigative team. This decoupled way of working has proved to be both inefficient and error prone.
At the Digital Forensic Unit of Oslo Police District we have developed a new way of working that addresses many of the problems …
Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell
Exploring Digital Evidence With Graph Theory, Imani Palmer, Boris Gelfand, Roy Campbell
Annual ADFSL Conference on Digital Forensics, Security and Law
The analysis phase of the digital forensic process is the most complex. The analysis phase remains very subjective to the views of the forensic practitioner. There are many tools dedicated to assisting the investigator during the analysis process. However, they do not address the challenges. Digital forensics is in need of a consistent approach to procure the most judicious conclusions from the digital evidence. The objective of this paper is to discuss the ability of graph theory, a study of related mathematical structures, to aid in the analysis phase of the digital forensic process. We develop a graph-based representation of …
Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio
Downstream Competence Challenges And Legal/Ethical Risks In Digital Forensics, Michael M. Losavio, Antonio Losavio
Annual ADFSL Conference on Digital Forensics, Security and Law
Forensic practice is an inherently human-mediated system, from processing and collection of evidence to presentation and judgment. This requires attention to human factors and risks which can lead to incorrect judgments and unjust punishments.
For digital forensics, such challenges are magnified by the relative newness of the discipline and the use of electronic evidence in forensic proceedings. Traditional legal protections, rules of procedure and ethics rules mitigate these challenges. Application of those traditions better ensures forensic findings are reliable. This has significant consequences where findings may impact a person's liberty or property, a person's life or even the political direction …
Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe
Understanding Deleted File Decay On Removable Media Using Differential Analysis, James H. Jones Jr, Anurag Srivastava, Josh Mosier, Connor Anderson, Seth Buenafe
Annual ADFSL Conference on Digital Forensics, Security and Law
Digital content created by picture recording devices is often stored internally on the source device, on either embedded or removable media. Such storage media is typically limited in capacity and meant primarily for interim storage of the most recent image files, and these devices are frequently configured to delete older files as necessary to make room for new files. When investigations involve such devices and media, it is sometimes these older deleted files that would be of interest. It is an established fact that deleted file content may persist in part or in its entirety after deletion, and identifying the …
Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089
Development Of A Professional Code Of Ethics In Digital Forensics, Kathryn C. Seigfried-Spellar, Marcus Rogers, Danielle M. Crimmins 2184089
Annual ADFSL Conference on Digital Forensics, Security and Law
Academics, government officials, and practitioners suggest the field of digital forensics is in need of a professional code of ethics. In response to this need, the authors developed and proposed a professional code of ethics in digital forensics. The current paper will discuss the process of developing the professional code of ethics, which included four sets of revisions based on feedback and suggestions provided by members of the digital forensic community. The final version of the Professional Code of Ethics in Digital Forensics includes eight statements, and we hope this is a step toward unifying the field of digital forensics …
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou
Annual ADFSL Conference on Digital Forensics, Security and Law
In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …
Rape Crisis Center Professionals' Perception Of Sexual Violence Policy: A Qualitative Analysis, Stephanie Manieri
Rape Crisis Center Professionals' Perception Of Sexual Violence Policy: A Qualitative Analysis, Stephanie Manieri
Scholarly and Creative Works Conference (2015 - 2021)
The purpose of this study is to collect information about the perceptions of rape crisis center professionals regarding the current policies surrounding sexual violence crimes that victimize people over the age of 18. This research aims to gather information about effective and ineffective policies from professionals who are first- responders to sexual assaults.