Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Social and Behavioral Sciences

Key Factors To Promote Successful Comprehensive Reentry Initiatives, Jeff Mellow, Kevin Barnes-Ceeney Dec 2017

Key Factors To Promote Successful Comprehensive Reentry Initiatives, Jeff Mellow, Kevin Barnes-Ceeney

Criminal Justice Faculty Publications

From page 22: "In this article we describe key features of CRIs, their goals, and critical implementation indicators identified from the literature and experience that must be considered to ensure the short- and long-term success of high-quality multifaceted reentry initiatives. The factors will provide a roadmap to policy makers, program and initiative developers, and practitioners when they consider the time, resources, and engagement levels to successfully implement a new reentry initiative."


Morphologically-Directed Raman Spectroscopy For Forensic Soil Analysis, Brooke Weinger Kammrath, Andrew Koutrakos, Josemar A. Castillo, Cathryn Langley, Debbie Huck-Jones Dec 2017

Morphologically-Directed Raman Spectroscopy For Forensic Soil Analysis, Brooke Weinger Kammrath, Andrew Koutrakos, Josemar A. Castillo, Cathryn Langley, Debbie Huck-Jones

Forensic Science Publications

Morphologically-directed Raman spectroscopy (MDRS) is a novel yet reliable analytical technique that can be used for a variety of forensic applications, enabling scientists to gain more information from samples than they obtain using more traditional methods. In soil forensics, MDRS delivers particle size distribution and microscopic morphological characteristics for the particles present, and at the same time allows secure mineral identification. In this article, we explore the benefits of utilizing soil in forensic investigations, and demonstrate the value of applying MDRS. Two case studies illustrate the real-life potential and applications of this technology.


A Comparative Analysis Of Protein And Peroxidase Blood Enhancement Reagents Following Laundering And Their Impact On Dna Recovery, Gabrielle Hartley, Claire L. Glynn Sep 2017

A Comparative Analysis Of Protein And Peroxidase Blood Enhancement Reagents Following Laundering And Their Impact On Dna Recovery, Gabrielle Hartley, Claire L. Glynn

Forensic Science Publications

Blood is a commonly encountered biological fluid in criminal investigations concerning a violent incident, and visual traces of the fluid on a suspect’s clothing can be diminished through laundering. This study aims to analyze the effects of laundering and the application of commercially available blood enhancement reagents commonly used to improve visualization of dilute bloodstains and their impact on DNA recovery. Enhancement reagents Hungarian Red, Coomassie Blue, Amido Black, luminol, Bluestar® Forensic Magnum, and aqueous Leuco Crystal Violet (LCV) were used to enhance human blood on cotton, polyester, denim, and wool following laundering. DNA was extracted from these samples using …


Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger Aug 2017

Forensic State Acquisition From Internet Of Things (Fsaiot): A General Framework And Practical Approach For Iot Forensics Through Iot Device State Acquisition, Christopher S. Meffert, Devon R. Clark, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

IoT device forensics is a difficult problem given that manufactured IoT devices are not standardized, many store little to no historical data, and are always connected; making them extremely volatile. The goal of this paper was to address these challenges by presenting a primary account for a general framework and practical approach we term Forensic State Acquisition from Internet of Things (FSAIoT). We argue that by leveraging the acquisition of the state of IoT devices (e.g. if an IoT lock is open or locked), it becomes possible to paint a clear picture of events that have occurred. To this end, …


Breaking Into The Vault: Privacy, Security And Forensic Analysis Of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, Frank Breitinger Aug 2017

Breaking Into The Vault: Privacy, Security And Forensic Analysis Of Android Vault Applications, Xiaolu Zhang, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work we share the first account for the forensic analysis, security and privacy of Android vault applications. Vaults are designed to be privacy enhancing as they allow users to hide personal data but may also be misused to hide incriminating files. Our work has already helped law enforcement in the state of Connecticut to reconstruct 66 incriminating images and 18 videos in a single criminal case. We present case studies and results from analyzing 18 Android vault applications (accounting for nearly 220 million downloads from the Google Play store) by reverse engineering them and examining the forensic artifacts …


The Effect Of Fabric Type And Laundering Conditions On The Detection Of Semen Stains, Tyler G. Schlagetter, Claire L. Glynn Jul 2017

The Effect Of Fabric Type And Laundering Conditions On The Detection Of Semen Stains, Tyler G. Schlagetter, Claire L. Glynn

Forensic Science Publications

There has been little research into the effect of fabric type and different laundering conditions on the ability to detect semen stains on washed fabrics. This study aimed to investigate three potential factors affecting semen identification on laundered clothing: fabric type, water temperature during washing, and whether the stain was dry at the time of washing. Following laundering, semen stains on four fabric types (cotton, polyester, denim, and wool) were examined and tested with three common methods used to detect semen; screening with an alternate light source, acid phosphatase press test, and histological staining of spermatazoa. It was determined that …


Understanding Shoplifting Of Fast-Moving Consumer Goods: An Application Of The Craved Model, Brian T. Smith Jul 2017

Understanding Shoplifting Of Fast-Moving Consumer Goods: An Application Of The Craved Model, Brian T. Smith

Criminal Justice Faculty Publications

This study examines the variation in theft of shoplifted fast-moving consumer goods. Typically, shoplifting is estimated using shrinkage—a composite of several causes of lost retail merchandise. This study, however, benefits from access to a retailer’s database, in which extraordinary steps are taken to identify and record losses due to shoplifting only. This study is unique because of the more valid measure of shoplifting. A 1-year cross-sectional sample of 7468 products, sold in 204 U.S. chain supermarkets, was drawn from the retailer’s specialized database. Using Clarke’s (Hot products: understanding, anticipating, and reducing demand for stolen goods. Policing and Reducing Crime Unit, …


Leveraging The Srtp Protocol For Over-The-Network Memory Acquisition Of A Ge Fanuc Series 90-30, George Denton, Filip Karpisek, Frank Breitinger, Ibrahim Baggili Jan 2017

Leveraging The Srtp Protocol For Over-The-Network Memory Acquisition Of A Ge Fanuc Series 90-30, George Denton, Filip Karpisek, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Programmable Logic Controllers (PLCs) are common components implemented across many industries such as manufacturing, water management, travel, aerospace and hospitals to name a few. Given their broad deployment in critical systems, they became and still are a common target for cyber attacks; the most prominent one being Stuxnet. Often PLCs (especially older ones) are only protected by an outer line of defense (e.g., a firewall) but once an attacker gains access to the system or the network, there might not be any other defense layers. In this scenario, a forensic investigator should not rely on the existing software as it …


Availability Of Datasets For Digital Forensics–And What Is Missing, Cinthya Grajeda, Frank Breitinger, Ibrahim Baggili Jan 2017

Availability Of Datasets For Digital Forensics–And What Is Missing, Cinthya Grajeda, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

This paper targets two main goals. First, we want to provide an overview of available datasets that can be used by researchers and where to find them. Second, we want to stress the importance of sharing datasets to allow researchers to replicate results and improve the state of the art. To answer the first goal, we analyzed 715 peer-reviewed research articles from 2010 to 2015 with focus and relevance to digital forensics to see what datasets are available and focused on three major aspects: (1) the origin of the dataset (e.g., real world vs. synthetic), (2) if datasets were released …


Reasons For Gaps In Crime Reporting: The Case Of White-Collar Criminals Investigated By Private Fraud Examiners In Norway, Petter Gottschalk, Maria Tcherni-Buzzeo Jan 2017

Reasons For Gaps In Crime Reporting: The Case Of White-Collar Criminals Investigated By Private Fraud Examiners In Norway, Petter Gottschalk, Maria Tcherni-Buzzeo

Criminal Justice Faculty Publications

A private investigation is an examination of facts, sequence of events, causes for deviance, and responsibilities for negative incidents. Recent years have seen an increasing use of private internal investigations in terms of the assessment of financial irregularities. The form of inquiry aims to uncover vulnerabilities to unrestricted opportunities, failing internal controls, abuse of position, and any financial misconduct such as corruption, fraud, embezzlement, theft, manipulation, tax evasion and other forms of economic crime. When fraud examiners discover evidence of white-collar crime, they almost always leave it to their clients to decide whether or not to report crime to the …


Drop (Drone Open Source Parser) Your Drone: Forensic Analysis Of The Dji Phantom Iii, Devon R. Clark, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger Jan 2017

Drop (Drone Open Source Parser) Your Drone: Forensic Analysis Of The Dji Phantom Iii, Devon R. Clark, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The DJI Phantom III drone has already been used for malicious activities (to drop bombs, remote surveillance and plane watching) in 2016 and 2017. At the time of writing, DJI was the drone manufacturer with the largest market share. Our work presents the primary thorough forensic analysis of the DJI Phantom III drone, and the primary account for proprietary file structures stored by the examined drone. It also presents the forensically sound open source tool DRone Open source Parser (DROP) that parses proprietary DAT files extracted from the drone's nonvolatile internal storage. These DAT files are encrypted and encoded. The …


The Use Of Raman Spectroscopy For The Identification Of Forensically Relevant Body Fluid Stains, Tyler Schlagetter, Claire L. Glynn, Brooke Weinger Kammrath Jan 2017

The Use Of Raman Spectroscopy For The Identification Of Forensically Relevant Body Fluid Stains, Tyler Schlagetter, Claire L. Glynn, Brooke Weinger Kammrath

Forensic Science Publications

Raman spectroscopy is fast becoming a popular technique in the forensic science discipline, and more recently its focus has turned to biological samples. This study reveals the ability of Raman spectroscopy to identify some forensically relevant body fluids, both individually and within mixed samples, that can be crucial in some forensic investigations. This study also further demonstrates the capabilities of Raman as a means for human blood identification in simulated crime scene samples to include bloodstains on a variety of fabrics, at varying dilutions, following laundering, and with the use of various blood-enhancement reagents. The impact of washing and blood-enhancement …