Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 26 of 26
Full-Text Articles in Physical Sciences and Mathematics
Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian
Coomassie Brilliant Blue Dye As A Method For Analyzing Fracture Markings In Bone, Abigail Hoffmeister, David Harutunyan, Matthew Aizawa, Everett Baker, Brandon Mendoza, Chase Freeman, Siran Iskanian
Seaver College Research And Scholarly Achievement Symposium
Coomassie Brilliant Blue Dye is a dye commonly used to stain proteins. Because of its ability to adhere to proteins, this research has focused on perfecting a method of dyeing a fractured flat bone in order to most accurately observe and analyze fracture markings within the trabecular layer. Stereoscopic microscopy was the chosen technique of analysis for this research because of its proven effectiveness in glass and ceramic fractography to observe varying depths. In order to most effectively apply stereoscopic microscopy to this research, the following variables were manipulated to maximize color contrast in the trabecular layer in order to …
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Reply To Response By Fbi Laboratory Filed In Illinois V. Winfield And Affidavit By Biederman Et Al. (2022) Filed In Us V. Kaevon Sutton (2018 Cf1 009709), Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia Carriquiry
Department of Statistics: Faculty Publications
1 Preliminaries
1.1 Scope
The aim of this document is to respond to issues raised in Federal Bureau of Investigation1 and Alex Biedermann, Bruce Budowle & Christophe Champod.2
1.2 Conflict of Interest
We are statisticians employed at public institutions of higher education (Iowa State University and University of Nebraska, Lincoln) and have not been paid for our time or expertise when preparing either this response or the original affidavit.3 We provide this information as a public service and as scientists and researchers in this area.
1.3 Organization
The rest of the document precedes as follows: we begin …
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Firearms And Toolmark Error Rates, Susan Vanderplas, Kori Khan, Heike Hofmann, Alicia L. Carriquiry
Department of Statistics: Faculty Publications
We have outlined several problems with the state of error rate studies on firearm and toolmark examination. Fundamentally, we do not know what the error rate is for these types of comparisons. This is a failure of the scientific study of toolmarks, rather than the examiners themselves, but until this is corrected with multiple studies that meet the criteria described in Section 3, we cannot support the use of this evidence in criminal proceedings.
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Electrical & Computer Engineering and Computer Science Faculty Publications
The ongoing popularity of health and fitness applications catalyzes
the need for exploring forensic artifacts produced by them. Sensitive
Personal Identifiable Information (PII) is requested by the applications
during account creation. Augmenting that with ongoing
user activities, such as the user’s walking paths, could potentially
create exculpatory or inculpatory digital evidence. We conducted
extensive manual analysis and explored forensic artifacts produced
by (n = 13) popular Android mobile health and fitness applications.
We also developed and implemented a tool that aided in the timely
acquisition and identification of artifacts from the examined applications.
Additionally, our work explored the type of …
Compound-Specific Isotope Analysis Of Amino Acids In Biological Tissues: Applications In Forensic Entomology, Food Authentication And Soft-Biometrics In Humans, Mayara Patricia Viana De Matos
Compound-Specific Isotope Analysis Of Amino Acids In Biological Tissues: Applications In Forensic Entomology, Food Authentication And Soft-Biometrics In Humans, Mayara Patricia Viana De Matos
Graduate Theses, Dissertations, and Problem Reports
In this work we demonstrate the power of compound-specific isotope analysis (CSIA) to analyze proteinaceous biological materials in three distinct forensic applications, including: 1) linking necrophagous blow flies in different life stages to their primary carrion diet; 2) identifying the harvesting area of oysters for food authentication purposes; and 3) the ability to predict biometric traits about humans from their hair.
In the first application, we measured the amino-acid-level fractionation that occurs at each major life stage of Calliphora vicina (Robineau-Desvoidy) (Diptera: Calliphoridae) blow flies. Adult blow flies oviposited on raw pork muscle, beef muscle, or chicken liver. Larvae, pupae …
Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger
Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Cyber forensics has encountered major obstacles over the last decade and is at a crossroads. This paper presents data that was obtained during the National Workshop on Redefining Cyber Forensics (NWRCF) on May 23-24, 2017 supported by the National Science Foundation and organized by the University of New Haven. Qualitative and quantitative data were analyzed from twenty-four cyber forensics expert panel members. This work identified important themes that need to be addressed by the community, focusing on (1) where the domain currently is; (2) where it needs to go and; (3) steps needed to improve it. Furthermore, based on the …
Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili
Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Our work presents the primary account for exploring the forensics of immersive Virtual Reality (VR) systems and their social applications. The Social VR applications studied in this work include Bigscreen, Altspace VR, Rec Room and Facebook Spaces. We explored the two most widely adopted consumer VR systems: the HTC Vive and the Oculus Rift. Our tests examined the efficacy of reconstructing evidence from network traffic as well as the systems themselves. The results showed that a significant amount of forensically relevant data such as user names, user profile pictures, events, and system details may be recovered. We anticipate that this …
Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger
Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …
Breaking Into The Vault: Privacy, Security And Forensic Analysis Of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, Frank Breitinger
Breaking Into The Vault: Privacy, Security And Forensic Analysis Of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
In this work we share the first account for the forensic analysis, security and privacy of Android vault applications. Vaults are designed to be privacy enhancing as they allow users to hide personal data but may also be misused to hide incriminating files. Our work has already helped law enforcement in the state of Connecticut to reconstruct 66 incriminating images and 18 videos in a single criminal case. We present case studies and results from analyzing 18 Android vault applications (accounting for nearly 220 million downloads from the Google Play store) by reverse engineering them and examining the forensic artifacts …
The Optimization Of Pressure Cycling Technology (Pct) For Differential Extraction Of Sexual Assault Casework, Vanessa Martinez
The Optimization Of Pressure Cycling Technology (Pct) For Differential Extraction Of Sexual Assault Casework, Vanessa Martinez
FIU Electronic Theses and Dissertations
A two-step protocol has been devised as a rapid and selective alternative to conventional differential extraction techniques with an increased recovery of DNA. The protocol involves pressure cycling with the Barocycler® NEP 2320 from Pressure Biosciences. Inc. in alkaline conditions for epithelial cell lysis and removal. This step is followed by alkaline lysis at 95º C for extraction of sperm cell DNA. At 1:1 or 2:1 female to male cell ratios, high selectivity and complete separation can be achieved. But at higher ratios, male allelic dropout is observed. This protocol has been modified to generate a clean male …
Identification Of Characteristic Volatile Organic Compounds Released During The Decomposition Process Of Human Remains And Analogues, Norma Iris Caraballo
Identification Of Characteristic Volatile Organic Compounds Released During The Decomposition Process Of Human Remains And Analogues, Norma Iris Caraballo
FIU Electronic Theses and Dissertations
The manner in which remains decompose has been and is currently being researched around the world, yet little is still known about the generated scent of death. In fact, it was not until the Casey Anthony trial that research on the odor released from decomposing remains, and the compounds that it is comprised of, was brought to light. The Anthony trial marked the first admission of human decomposition odor as forensic evidence into the court of law; however, it was not “ready for prime time” as the scientific research on the scent of death is still in its infancy.
This …
Exploring Forensic Implications Of The Fusion Drive, Shruti Gupta, Marcus Rogers
Exploring Forensic Implications Of The Fusion Drive, Shruti Gupta, Marcus Rogers
Journal of Digital Forensics, Security and Law
This paper explores the forensic implications of Apple’s Fusion Drive. The Fusion Drive is an example of auto-tiered storage. It uses a combination of a flash drive and a magnetic drive. Data is moved between the drives automatically to maximize system performance. This is different from traditional caches because data is moved and not simply copied. The research included understanding the drive structure, populating the drive, and then accessing data in a controlled setting to observe data migration strategies. It was observed that all the data is first written to the flash drive with 4 GB of free space always …
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Journal of Digital Forensics, Security and Law
Media and network systems capture and store data about electronic activity in new, sometimes unprecedented ways; computational systems make for new means of analysis and knowledge development. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But autonomy, identity and authenticity concerns with electronic data raise issues of public policy, privacy and proper police oversight of civil society. We examine those issues and their implications for digital and computational forensics
Relating Admissibility Standards For Digital Evidence To Attack Scenario Reconstruction, Changwei Liu, Anoop Singhal, Duminda Wijesekera
Relating Admissibility Standards For Digital Evidence To Attack Scenario Reconstruction, Changwei Liu, Anoop Singhal, Duminda Wijesekera
Journal of Digital Forensics, Security and Law
Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-forensic tools to make it difficult to find incriminating evidence and reconstruct attack scenarios that can stand up to the expected level of evidence admissibility in a court of law. As a solution, we propose to integrate the legal aspects of evidence correlation into a Prolog based reasoner to address the admissibility requirements by creating most probable attack scenarios that satisfy admissibility standards for substantiating evidence. Using a prototype implementation, we show how evidence extracted by using forensic tools can be integrated with legal reasoning to reconstruct …
Effects Of The Factory Reset On Mobile Devices, Riqui Schwamm, Neil C. Rowe
Effects Of The Factory Reset On Mobile Devices, Riqui Schwamm, Neil C. Rowe
Journal of Digital Forensics, Security and Law
Mobile devices usually provide a “factory-reset” tool to erase user-specific data from the main secondary storage. 9 Apple iPhones, 10 Android devices, and 2 BlackBerry devices were tested in the first systematic evaluation of the effectiveness of factory resets. Tests used the Cellebrite UME-36 Pro with the UFED Physical Analyzer, the Bulk Extractor open-source tool, and our own programs for extracting metadata, classifying file paths, and comparing them between images. Two phones were subjected to more detailed analysis. Results showed that many kinds of data were removed by the resets, but much user-specific configuration data was left. Android devices did …
Development Of Micro Volume Dna And Rna Profiling Assays To Identify The Donor And Tissue Source Of Origin Of Trace Forensic Biological Evidence, Brittany Morgan
Development Of Micro Volume Dna And Rna Profiling Assays To Identify The Donor And Tissue Source Of Origin Of Trace Forensic Biological Evidence, Brittany Morgan
Electronic Theses and Dissertations
In forensic casework analysis it is necessary to obtain genetic profiles from increasingly smaller amounts of biological material left behind by perpetrators of crime. The ability to obtain profiles from trace biological evidence is demonstrated with so-called ‘touch DNA evidence’ which is perceived to be the result of DNA obtained from shed skin cells transferred from donor to an object or person during physical contact. However, the current method of recovery of trace DNA involves cotton swabs or adhesive tape to sample an area of interest. This "blindswabbing" approach may result in the recovery of biological material from different individuals …
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Analysis Of A Second Hand Google Mini Search Appliance, Stephen Larson
Journal of Digital Forensics, Security and Law
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data (LaTulippe, 2011). One of these solutions is commonly known as a search appliance. Search appliances have been used in e-discovery for several years. The Google Mini Search Appliance (Mini) has not only been used for e-discovery, but for indexing and searching internal documents. To accomplish these tasks, search …
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Comparing Android Applications To Find Copying, Larry Melling, Bob Zeidman
Journal of Digital Forensics, Security and Law
The Android smartphone operating system includes a Java virtual machine that enables rapid development and deployment of a wide variety of applications. The open nature of the platform means that reverse engineering of applications is relatively easy, and many developers are concerned as applications similar to their own show up in the Android marketplace and want to know if these applications are pirated. Fortunately, the same characteristics that make an Android application easy to reverse engineer and copy also provide opportunities for Android developers to compare downloaded applications to their own. This paper describes the process for comparing a developer’s …
Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili
Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software-automated examination).The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an iOS device, then …
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Kindle Forensics: Acquisition & Analysis, Peter Hannay
Journal of Digital Forensics, Security and Law
The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.
Working Inside The Box: An Example Of Google Desktop Search In A Forensic Examination, Timothy J. Latulippe
Working Inside The Box: An Example Of Google Desktop Search In A Forensic Examination, Timothy J. Latulippe
Journal of Digital Forensics, Security and Law
Information and the technological advancements for which mankind develops with regards to its storage has increased tremendously over the past few decades. As the total amount of data stored rapidly increases in conjunction with the amount of widely available computer-driven devices being used, solutions are being developed to better harness this data. These types of advancements are continually assisting investigators and computer forensic examiners. One such application which houses copious amounts of fruitful data is the Google Desktop Search program. Coupled with tested and verified techniques, examiners can exploit the power of this application to cater to their investigative needs. …
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …
Generating System Requirements For A Mobile Digital Evidence Collection System: A Preliminary Step Towards Enhancing The Forensic Collection Of Digital Devices, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Collecting digital devices in a forensically sound manner is becoming more critical since 80% of all cases have some sort of digital evidence involved in them (Rogers, 2006, p. 1) .The process of documenting and tagging digital devices is cumbersome and involves details that might not apply to other types of evidence, since each evidence item has unique physical characteristics (Hesitis & Wilbon, 2005, p. 17). The process becomes less manageable when a large number of digital devices are seized. This paper examines the information and issues investigators should be aware of when collecting digital devices at crime scenes. Furthermore, …
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Graduate Accounting Students' Perception Of It Forensics: A Multi-Dimensional Analysis, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Forensics and information technology (IT) have become increasingly important to accountants and auditors. Undergraduate accounting students are introduced to general IT topics but discussion of forensic knowledge is limited. A few schools have introduced an undergraduate major in forensic accounting. Some graduate schools offer accounting students an emphasis in forensic or fraud accounting that includes instruction in forensics and information technology. When students do not view the IT topics as being equally important to their careers as traditional accounting topics, these attitudes may reduce the quality of the course. In an effort to assess student attitudes, a survey of 46 …
Who Is Reading The Data On Your Old Computer?, Vivienne Mee
Who Is Reading The Data On Your Old Computer?, Vivienne Mee
Journal of Digital Forensics, Security and Law
Researchers at Rits Information Security performed a study in how the Irish population disposes of their old computers. How would you dispose of your old computer, or how would the company you work for dispose of their old computers?
The majority of Irish homeowners, would bring their old computers to local civic amenity centres, give it away to a relative or sell it on to another party.
Some organisations would give their old equipment to a staff member, as a gift gesture, others may simply discard in the local civic amenity site.
What is wrong with the methods currently being …
The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
The Design And Implementation Of An Automated Security Compliance Toolkit: A Pedagogical Exercise, Guillermo Francia, Brian Estes, Rahjima Francia, Vu Nguyen, Alex Scroggins
Journal of Digital Forensics, Security and Law
The demand, through government regulations, for the preservation of the security, integrity, and privacy of corporate and customer information is increasing at an unprecedented pace. Government and private entities struggle to comply with these regulations through various means—both automated and manual controls. This paper presents an automated security compliance toolkit that is designed and developed using mostly open source tools to demonstrate that 1) meeting regulatory compliance does not need to be a very expensive proposition and 2) an undertaking of this magnitude could be served as a pedagogical exercise for students in the areas of collaboration, project management, software …