Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (2)
- Child Exploitation Material (1)
- Computer Cache (1)
- Conflict Escalation (1)
- Critical Infrastructure (1)
-
- Cryptography (1)
- Cyber Conflict (1)
- Cyber Peacekeeping (1)
- Cyber Terrorism (1)
- Cyber War (1)
- Cyberspace (1)
- Digital forensics (1)
- Fifth Amendment (1)
- IOS forensics (1)
- Intention to Possess (1)
- Intention to View (1)
- International Relations (1)
- International Security (1)
- Knowing Possession (1)
- Law (1)
- Passwords (1)
- Self-incriminating testimony (1)
- Sexting (1)
- Vault apps (1)
- Viewing Child Exploitation Material (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Law
Forensic Discoverability Of Ios Vault Applications, Alissa Gilbert, Kathryn C. Seigfried-Spellar
Forensic Discoverability Of Ios Vault Applications, Alissa Gilbert, Kathryn C. Seigfried-Spellar
Journal of Digital Forensics, Security and Law
Vault Applications are used to store potentially sensitive information on a smartphone; and are available on Android and iOS. The purpose of using these applications could be used to hide potential evidence or illicit photos. After comparing five different iOS photo vaults, each vault left evidence and photos behind. However, of the three forensic toolkits used, each produced different results in their scans of the phone. The media left behind was due to the photo vaults not protecting their information as claimed, and using basic obfuscation techniques in place of security controls. Future research will look at how newer security …
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips
Journal of Digital Forensics, Security and Law
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Journal of Digital Forensics, Security and Law
When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Journal of Digital Forensics, Security and Law
Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the …